From 1e67b86cd97fb5ccdbe0b990e660bb9dd51c9fec Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Fri, 14 Jan 2022 09:52:01 +0100 Subject: CVE-2022-23222 assigned --- active/CVE-2022-23222 | 18 ++++++++++++++++++ active/CVE-2022-oob-invalid_OR_NULL-type-verification | 18 ------------------ 2 files changed, 18 insertions(+), 18 deletions(-) create mode 100644 active/CVE-2022-23222 delete mode 100644 active/CVE-2022-oob-invalid_OR_NULL-type-verification diff --git a/active/CVE-2022-23222 b/active/CVE-2022-23222 new file mode 100644 index 00000000..4b9d3bd0 --- /dev/null +++ b/active/CVE-2022-23222 @@ -0,0 +1,18 @@ +Description: bpf: Fix out of bounds access from invalid *_or_null type verification +References: + https://www.openwall.com/lists/oss-security/2022/01/13/1 +Notes: + carnil> For stable series in 5.10.y, 5.15.y and 5.16.y the commit "bpf: + carnil> Fix out of bounds access from invalid *_or_null type + carnil> verification" was backported for fixing the issue as the issue + carnil> was fixed in mainline through the larger refactoring in + carnil> c25b2ae136039ffa820c26138ed4a5e5f3ab3841. +Bugs: +upstream: pending [c25b2ae136039ffa820c26138ed4a5e5f3ab3841] +5.10-upstream-stable: needed +4.19-upstream-stable: N/A "Vulnerable code not present" +4.9-upstream-stable: N/A "Vulnerable code not present" +sid: pending (5.15.14-1) [bugfix/all/bpf-fix-out-of-bounds-access-from-invalid-_or_null-type-verification.patch] +5.10-bullseye-security: needed +4.19-buster-security: N/A "Vulnerable code not present" +4.9-stretch-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-oob-invalid_OR_NULL-type-verification b/active/CVE-2022-oob-invalid_OR_NULL-type-verification deleted file mode 100644 index 4b9d3bd0..00000000 --- a/active/CVE-2022-oob-invalid_OR_NULL-type-verification +++ /dev/null @@ -1,18 +0,0 @@ -Description: bpf: Fix out of bounds access from invalid *_or_null type verification -References: - https://www.openwall.com/lists/oss-security/2022/01/13/1 -Notes: - carnil> For stable series in 5.10.y, 5.15.y and 5.16.y the commit "bpf: - carnil> Fix out of bounds access from invalid *_or_null type - carnil> verification" was backported for fixing the issue as the issue - carnil> was fixed in mainline through the larger refactoring in - carnil> c25b2ae136039ffa820c26138ed4a5e5f3ab3841. -Bugs: -upstream: pending [c25b2ae136039ffa820c26138ed4a5e5f3ab3841] -5.10-upstream-stable: needed -4.19-upstream-stable: N/A "Vulnerable code not present" -4.9-upstream-stable: N/A "Vulnerable code not present" -sid: pending (5.15.14-1) [bugfix/all/bpf-fix-out-of-bounds-access-from-invalid-_or_null-type-verification.patch] -5.10-bullseye-security: needed -4.19-buster-security: N/A "Vulnerable code not present" -4.9-stretch-security: N/A "Vulnerable code not present" -- cgit v1.2.3