summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2022-0742
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2022-03-25 15:45:47 +0100
committerMoritz Muehlenhoff <jmm@debian.org>2022-03-25 15:45:47 +0100
commitf01f9907393d88ce9f869bfe8256f53c8e5b90da (patch)
treea92f4d31c07eebaa836e4d1436dfbbc15d31c2f3 /retired/CVE-2022-0742
parent397449be43725e89574277c5e51e32fb16c087c6 (diff)
retire CVE-2022-0742
Diffstat (limited to 'retired/CVE-2022-0742')
-rw-r--r--retired/CVE-2022-074222
1 files changed, 22 insertions, 0 deletions
diff --git a/retired/CVE-2022-0742 b/retired/CVE-2022-0742
new file mode 100644
index 00000000..1455c1bc
--- /dev/null
+++ b/retired/CVE-2022-0742
@@ -0,0 +1,22 @@
+Description: ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report()
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=2059294
+ https://www.openwall.com/lists/oss-security/2022/03/15/3
+Notes:
+ carnil> As of 2022-03-14 the Red Hat bugzilla entry contains a "TODO
+ carnil> add link to patch when public" marking but not yet references
+ carnil> to upstream fixes, but claims to be introduced in commit
+ carnil> f185de28d9ae ("mld: add new workqueues for process mld
+ carnil> events"). The fix seems to be 2d3916f31891 ("ipv6: fix skb
+ carnil> drops in igmp6_event_query() and igmp6_event_report()"), which
+ carnil> is applied in 5.17-rc7.
+ carnil> For 5.16.y the issue is fixed in 5.16.13.
+Bugs:
+upstream: released (5.17-rc7) [2d3916f3189172d5c69d33065c3c21119fe539fc]
+5.10-upstream-stable: N/A "Vulnerable code not present"
+4.19-upstream-stable: N/A "Vulnerable code not present"
+4.9-upstream-stable: N/A "Vulnerable code not present"
+sid: released (5.16.14-1)
+5.10-bullseye-security: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"
+4.9-stretch-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy