Description: bpf: force strict alignment checks for stack pointers References: http://www.openwall.com/lists/oss-security/2017/12/21/2 Notes: carnil> Introduced by f1174f77b50c94eecaa658fdc56fa69b421de4b8 in 4.14-rc1 Bugs: upstream: released (4.15-rc5) [a5ec6ae161d72f01411169a938fa5f8baea16e8f] 4.9-upstream-stable: N/A "Vulnerable code introduced in 4.14-rc1" 3.16-upstream-stable: N/A "Vulnerable code introduced in 4.14-rc1" 3.2-upstream-stable: N/A "Vulnerable code introduced in 4.14-rc1" sid: released (4.14.7-1) [bugfix/all/bpf-force-strict-alignment-checks-for-stack-pointers.patch] 4.9-stretch-security: N/A "Vulnerable code not present" 3.16-jessie-security: N/A "Vulnerable code not present" 3.2-wheezy-security: N/A "Vulnerable code not present"