Description: bpf: Fix out of bounds access from invalid *_or_null type verification References: https://www.openwall.com/lists/oss-security/2022/01/13/1 https://www.openwall.com/lists/oss-security/2022/01/18/2 https://github.com/tr3ee/CVE-2022-23222 Notes: carnil> For stable series in 5.10.y, 5.15.y and 5.16.y the commit "bpf: carnil> Fix out of bounds access from invalid *_or_null type carnil> verification" was backported for fixing the issue as the issue carnil> was fixed in mainline through the larger refactoring in carnil> c25b2ae136039ffa820c26138ed4a5e5f3ab3841. carnil> Fixed as well in 5.16.1 for 5.16.y, 5.15.15 for 5.15.y. Bugs: upstream: released (5.17-rc1) [c25b2ae136039ffa820c26138ed4a5e5f3ab3841] 5.10-upstream-stable: released (5.10.92) [35ab8c9085b0af847df7fac9571ccd26d9f0f513] 4.19-upstream-stable: N/A "Vulnerable code not present" 4.9-upstream-stable: N/A "Vulnerable code not present" sid: released (5.15.15-1) 5.10-bullseye-security: released (5.10.92-1) 4.19-buster-security: N/A "Vulnerable code not present" 4.9-stretch-security: N/A "Vulnerable code not present"