blob: d3df9e6dbf8e52fd985e512a4cf7aee86a2c358b (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
|
Description: bpf: don't prune branches when a scalar is replaced with a pointer
References:
http://www.openwall.com/lists/oss-security/2017/12/21/2
Notes:
carnil> Introduced in f1174f77b50c94eecaa658fdc56fa69b421de4b8 in 4.14-rc1
Bugs:
upstream: released (4.15-rc5) [179d1c5602997fef5a940c6ddcf31212cbfebd14]
4.9-upstream-stable: N/A "Vulnerable code introduced in 4.14-rc1"
3.16-upstream-stable: N/A "Vulnerable code introduced in 4.14-rc1"
3.2-upstream-stable: N/A "Vulnerable code introduced in 4.14-rc1"
sid: released (4.14.7-1) [bugfix/all/bpf-don-t-prune-branches-when-a-scalar-is-replaced-w.patch]
4.9-stretch-security: N/A "Vulnerable code not present"
3.16-jessie-security: N/A "Vulnerable code not present"
3.2-wheezy-security: N/A "Vulnerable code not present"
|