diff options
author | Ben Hutchings <ben@decadent.org.uk> | 2022-12-20 15:56:28 +0100 |
---|---|---|
committer | Ben Hutchings <ben@decadent.org.uk> | 2022-12-20 15:56:28 +0100 |
commit | f7ba59209c2ad16e6ca69838e20e116f02f04599 (patch) | |
tree | 1690cb7c80810f9d7b8bd982f29a10ffa4e86684 /active/CVE-2022-47519 | |
parent | e4404030cdfabb2359e9930df5d762c36d11bb84 (diff) |
Mark wilc1000 issues as needed for 4.19
Diffstat (limited to 'active/CVE-2022-47519')
-rw-r--r-- | active/CVE-2022-47519 | 6 |
1 files changed, 4 insertions, 2 deletions
diff --git a/active/CVE-2022-47519 b/active/CVE-2022-47519 index 7311f3ab5..c72ff40b8 100644 --- a/active/CVE-2022-47519 +++ b/active/CVE-2022-47519 @@ -2,10 +2,12 @@ Description: wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL References: https://lore.kernel.org/r/20221123153543.8568-3-philipturnbull@github.com Notes: + bwh> In 4.19 the vulnerable function is in + bwh> drivers/staging/wilc1000/wilc_wfi_cfgoperations.c. Bugs: upstream: released (6.1-rc8) [051ae669e4505abbe05165bebf6be7922de11f41] 5.10-upstream-stable: released (5.10.157) [905f886eae4b065656a575e8a02544045cbaadcf] -4.19-upstream-stable: +4.19-upstream-stable: needed sid: released (6.0.12-1) 5.10-bullseye-security: released (5.10.158-1) -4.19-buster-security: +4.19-buster-security: needed |