summaryrefslogtreecommitdiffstats
path: root/active/CVE-2022-47519
diff options
context:
space:
mode:
authorBen Hutchings <ben@decadent.org.uk>2022-12-20 15:56:28 +0100
committerBen Hutchings <ben@decadent.org.uk>2022-12-20 15:56:28 +0100
commitf7ba59209c2ad16e6ca69838e20e116f02f04599 (patch)
tree1690cb7c80810f9d7b8bd982f29a10ffa4e86684 /active/CVE-2022-47519
parente4404030cdfabb2359e9930df5d762c36d11bb84 (diff)
Mark wilc1000 issues as needed for 4.19
Diffstat (limited to 'active/CVE-2022-47519')
-rw-r--r--active/CVE-2022-475196
1 files changed, 4 insertions, 2 deletions
diff --git a/active/CVE-2022-47519 b/active/CVE-2022-47519
index 7311f3ab5..c72ff40b8 100644
--- a/active/CVE-2022-47519
+++ b/active/CVE-2022-47519
@@ -2,10 +2,12 @@ Description: wifi: wilc1000: validate length of IEEE80211_P2P_ATTR_OPER_CHANNEL
References:
https://lore.kernel.org/r/20221123153543.8568-3-philipturnbull@github.com
Notes:
+ bwh> In 4.19 the vulnerable function is in
+ bwh> drivers/staging/wilc1000/wilc_wfi_cfgoperations.c.
Bugs:
upstream: released (6.1-rc8) [051ae669e4505abbe05165bebf6be7922de11f41]
5.10-upstream-stable: released (5.10.157) [905f886eae4b065656a575e8a02544045cbaadcf]
-4.19-upstream-stable:
+4.19-upstream-stable: needed
sid: released (6.0.12-1)
5.10-bullseye-security: released (5.10.158-1)
-4.19-buster-security:
+4.19-buster-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy