Description: bpf: Fix out of bounds access from invalid *_or_null type verification References: https://www.openwall.com/lists/oss-security/2022/01/13/1 Notes: carnil> For stable series in 5.10.y, 5.15.y and 5.16.y the commit "bpf: carnil> Fix out of bounds access from invalid *_or_null type carnil> verification" was backported for fixing the issue as the issue carnil> was fixed in mainline through the larger refactoring in carnil> c25b2ae136039ffa820c26138ed4a5e5f3ab3841. Bugs: upstream: pending [c25b2ae136039ffa820c26138ed4a5e5f3ab3841] 5.10-upstream-stable: needed 4.19-upstream-stable: N/A "Vulnerable code not present" 4.9-upstream-stable: N/A "Vulnerable code not present" sid: needed 5.10-bullseye-security: needed 4.19-buster-security: N/A "Vulnerable code not present" 4.9-stretch-security: N/A "Vulnerable code not present"