From be5eb47b8d7dcf0c36da8606c25d7499d76f4d11 Mon Sep 17 00:00:00 2001 From: Ben Hutchings Date: Mon, 20 Jun 2022 23:08:29 +0200 Subject: Fill out the fix list for CVE-2022-0500 --- active/CVE-2022-0500 | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/active/CVE-2022-0500 b/active/CVE-2022-0500 index d5c895c9..aa6f58a5 100644 --- a/active/CVE-2022-0500 +++ b/active/CVE-2022-0500 @@ -21,11 +21,11 @@ Notes: bwh> being fixed, so branches based on 5.10 are affected and older bwh> branches are probably not. Bugs: -upstream: released (5.17-rc1) [34d3a78c681e8e7844b43d1a2f4671a04249c821] +upstream: released (5.17-rc1) [d639b9d13a39cf15639cbe6e8b2c43eb60148a73, 48946bd6a5d695c50b34546864b79c1f910a33c1, 3c4807322660d4290ac9062c034aed6b87243861, c25b2ae136039ffa820c26138ed4a5e5f3ab3841, 20b2aff4bc15bda809f994761d5719827d66c0b4, cf9f2f8d62eca810afbd1ee6cc0800202b000e57, 34d3a78c681e8e7844b43d1a2f4671a04249c821] 5.10-upstream-stable: needed 4.19-upstream-stable: N/A "Vulnerable code not present" 4.9-upstream-stable: N/A "Vulnerable code not present" -sid: released (5.16.10-1) [bugfix/all/bpf-make-per_cpu_ptr-return-rdonly-ptr_to_mem.patch] +sid: released (5.16.10-1) [bugfix/all/bpf-introduce-composable-reg-ret-and-arg-types.patch, bugfix/all/bpf-replace-arg_xxx_or_null-with-arg_xxx-ptr_maybe_null.patch, bugfix/all/bpf-replace-ret_xxx_or_null-with-ret_xxx-ptr_maybe_null.patch, bugfix/all/bpf-replace-ptr_to_xxx_or_null-with-ptr_to_xxx-ptr_maybe_null.patch, bugfix/all/bpf-introduce-mem_rdonly-flag.patch, bugfix/all/bpf-convert-ptr_to_mem_or_null-to-composable-types.patch, bugfix/all/bpf-make-per_cpu_ptr-return-rdonly-ptr_to_mem.patch] 5.10-bullseye-security: needed 4.19-buster-security: N/A "Vulnerable code not present" 4.9-stretch-security: N/A "Vulnerable code not present" -- cgit v1.2.3