summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2021-4159
blob: e837e851282076404c1665b070f8b4fa026e8a79 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Description: bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()
References:
 https://bugzilla.suse.com/show_bug.cgi?id=1194227
 https://bugzilla.redhat.com/show_bug.cgi?id=2036024
Notes:
 bwh> I think this can be ignored. Privileged users can generally read
 bwh> kernel memory through kprobes/tracepoints. Unprivileged use of
 bwh> eBPF is now disabled by default in all Debian suites.
Bugs:
upstream: released (5.7-rc1) [294f2fc6da27620a506e6c050241655459ccd6bd]
5.10-upstream-stable: N/A "Fixed before branching point"
4.19-upstream-stable: released (4.19.256) [6c6b84ef5ea8dc0ca3559ccf69810960e348c555]
4.9-upstream-stable:
sid: released (5.7.6-1)
5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.260-1)
4.9-stretch-security: ignored "Too risky to backport, and mitigated by default"

© 2014-2024 Faster IT GmbH | imprint | privacy policy