summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2022-2663
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2022-12-14 17:04:21 +0100
committerMoritz Muehlenhoff <jmm@debian.org>2022-12-14 17:04:21 +0100
commit22bdf8e6c8ade20718e77f8a7361482a4072d612 (patch)
tree38cb63d7f2449f16db8f27d2cd31d72333a26a51 /retired/CVE-2022-2663
parentb9a091d612e318a061371b5526c604ab0706eba3 (diff)
retire issues
Diffstat (limited to 'retired/CVE-2022-2663')
-rw-r--r--retired/CVE-2022-266317
1 files changed, 17 insertions, 0 deletions
diff --git a/retired/CVE-2022-2663 b/retired/CVE-2022-2663
new file mode 100644
index 00000000..aa09e5ac
--- /dev/null
+++ b/retired/CVE-2022-2663
@@ -0,0 +1,17 @@
+Description: netfilter: nf_conntrack_irc: Tighten matching on DCC message
+References:
+ https://www.openwall.com/lists/oss-security/2022/08/30/1
+ https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/
+ https://dgl.cx/2022/08/nat-again-irc-cve-2022-2663
+Notes:
+ carnil> For 5.19.y fixed as well in 5.19.9.
+ bwh> There are two related fixes that seem to share this single
+ bwh> CVE ID, but for some reason they weren't applied together.
+ bwh> Second was applied in 5.19.12.
+Bugs:
+upstream: released (6.0-rc5) [0efe125cfb99e6773a7434f3463f7c2fa28f3a43], released (6.0-rc7) [e8d5dfd1d8747b56077d02664a8838c71ced948e]
+5.10-upstream-stable: released (5.10.143) [e12ce30fe593dd438c5b392290ad7316befc11ca], released (5.10.146) [9a5d7e0acb41bb2aac552f8eeb4b404177f3f66d]
+4.19-upstream-stable: released (4.19.258) [3275f7804f40de3c578d2253232349b07c25f146], released (4.19.260) [468adf7aab7a30ffe4467e2c981a65568ba84f0b]
+sid: released (5.19.11-1), released (6.0.2-1)
+5.10-bullseye-security: released (5.10.148-1)
+4.19-buster-security: released (4.19.260-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy