summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2022-21499
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2022-07-04 10:36:50 +0200
committerMoritz Muehlenhoff <jmm@debian.org>2022-07-04 10:36:50 +0200
commitbbbebfb9d7af4f12b4db87cc928e0b38a8e803cd (patch)
treec86e1e8c69b42b5a32e86d13ab8f38fac6319f9d /retired/CVE-2022-21499
parent4b45d2997b2bb2116c15c422ada362526c26c264 (diff)
retire multiple issues
Diffstat (limited to 'retired/CVE-2022-21499')
-rw-r--r--retired/CVE-2022-2149919
1 files changed, 19 insertions, 0 deletions
diff --git a/retired/CVE-2022-21499 b/retired/CVE-2022-21499
new file mode 100644
index 00000000..fe49bebb
--- /dev/null
+++ b/retired/CVE-2022-21499
@@ -0,0 +1,19 @@
+Description: lockdown: also lock down previous kgdb use
+References:
+ https://www.openwall.com/lists/oss-security/2022/05/24/7
+Notes:
+ carnil> Lockdown firstly introduced upstream in 5.4-rc1. On the other
+ carnil> hand though, Debian ships since 4.11-1~exp1 the lockdown
+ carnil> patches (replaced from the securelevel patch). Issue possibly
+ carnil> as well present already in the securelevel patchset.
+ carnil> Fixed as well in 5.17.10 for 5.17.y.
+ bwh> I think we can ignore this since we don't enable kgdb.
+Bugs:
+upstream: released (5.19-rc1) [eadb2f47a3ced5c64b23b90fd2a3463f63726066]
+5.10-upstream-stable: released (5.10.119) [a8f4d63142f947cd22fa615b8b3b8921cdaf4991]
+4.19-upstream-stable: N/A "Vulnerable code not present"
+4.9-upstream-stable: N/A "Vulnerable code not present"
+sid: released (5.17.11-1)
+5.10-bullseye-security: released (5.10.120-1)
+4.19-buster-security: ignored "CONFIG_KGDB not enabled"
+4.9-stretch-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy