diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2022-12-14 17:04:21 +0100 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2022-12-14 17:04:21 +0100 |
commit | 22bdf8e6c8ade20718e77f8a7361482a4072d612 (patch) | |
tree | 38cb63d7f2449f16db8f27d2cd31d72333a26a51 /retired/CVE-2022-2663 | |
parent | b9a091d612e318a061371b5526c604ab0706eba3 (diff) |
retire issues
Diffstat (limited to 'retired/CVE-2022-2663')
-rw-r--r-- | retired/CVE-2022-2663 | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/retired/CVE-2022-2663 b/retired/CVE-2022-2663 new file mode 100644 index 00000000..aa09e5ac --- /dev/null +++ b/retired/CVE-2022-2663 @@ -0,0 +1,17 @@ +Description: netfilter: nf_conntrack_irc: Tighten matching on DCC message +References: + https://www.openwall.com/lists/oss-security/2022/08/30/1 + https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/ + https://dgl.cx/2022/08/nat-again-irc-cve-2022-2663 +Notes: + carnil> For 5.19.y fixed as well in 5.19.9. + bwh> There are two related fixes that seem to share this single + bwh> CVE ID, but for some reason they weren't applied together. + bwh> Second was applied in 5.19.12. +Bugs: +upstream: released (6.0-rc5) [0efe125cfb99e6773a7434f3463f7c2fa28f3a43], released (6.0-rc7) [e8d5dfd1d8747b56077d02664a8838c71ced948e] +5.10-upstream-stable: released (5.10.143) [e12ce30fe593dd438c5b392290ad7316befc11ca], released (5.10.146) [9a5d7e0acb41bb2aac552f8eeb4b404177f3f66d] +4.19-upstream-stable: released (4.19.258) [3275f7804f40de3c578d2253232349b07c25f146], released (4.19.260) [468adf7aab7a30ffe4467e2c981a65568ba84f0b] +sid: released (5.19.11-1), released (6.0.2-1) +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: released (4.19.260-1) |