Description: bpf: don't prune branches when a scalar is replaced with a pointer References: http://www.openwall.com/lists/oss-security/2017/12/21/2 Notes: carnil> Introduced in f1174f77b50c94eecaa658fdc56fa69b421de4b8 in 4.14-rc1 Bugs: upstream: released (4.15-rc5) [179d1c5602997fef5a940c6ddcf31212cbfebd14] 4.9-upstream-stable: N/A "Vulnerable code introduced in 4.14-rc1" 3.16-upstream-stable: N/A "Vulnerable code introduced in 4.14-rc1" 3.2-upstream-stable: N/A "Vulnerable code introduced in 4.14-rc1" sid: released (4.14.7-1) [bugfix/all/bpf-don-t-prune-branches-when-a-scalar-is-replaced-w.patch] 4.9-stretch-security: N/A "Vulnerable code not present" 3.16-jessie-security: N/A "Vulnerable code not present" 3.2-wheezy-security: N/A "Vulnerable code not present"