summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2022-23222
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2022-02-11 20:49:40 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2022-02-11 20:49:40 +0100
commit9cf335eee40b048fcb43bc0ab1888785aea3db97 (patch)
treee4f2422bcf78f3c7a812aebb33feefc733cf702e /retired/CVE-2022-23222
parentf5d89cd1f3949a3ac013d86bef157aa8be877e6a (diff)
Retire some CVEs
Diffstat (limited to 'retired/CVE-2022-23222')
-rw-r--r--retired/CVE-2022-2322220
1 files changed, 20 insertions, 0 deletions
diff --git a/retired/CVE-2022-23222 b/retired/CVE-2022-23222
new file mode 100644
index 00000000..a14b4646
--- /dev/null
+++ b/retired/CVE-2022-23222
@@ -0,0 +1,20 @@
+Description: bpf: Fix out of bounds access from invalid *_or_null type verification
+References:
+ https://www.openwall.com/lists/oss-security/2022/01/13/1
+ https://www.openwall.com/lists/oss-security/2022/01/18/2
+Notes:
+ carnil> For stable series in 5.10.y, 5.15.y and 5.16.y the commit "bpf:
+ carnil> Fix out of bounds access from invalid *_or_null type
+ carnil> verification" was backported for fixing the issue as the issue
+ carnil> was fixed in mainline through the larger refactoring in
+ carnil> c25b2ae136039ffa820c26138ed4a5e5f3ab3841.
+ carnil> Fixed as well in 5.16.1 for 5.16.y, 5.15.15 for 5.15.y.
+Bugs:
+upstream: released (5.17-rc1) [c25b2ae136039ffa820c26138ed4a5e5f3ab3841]
+5.10-upstream-stable: released (5.10.92) [35ab8c9085b0af847df7fac9571ccd26d9f0f513]
+4.19-upstream-stable: N/A "Vulnerable code not present"
+4.9-upstream-stable: N/A "Vulnerable code not present"
+sid: released (5.15.15-1)
+5.10-bullseye-security: released (5.10.92-1)
+4.19-buster-security: N/A "Vulnerable code not present"
+4.9-stretch-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy