summaryrefslogtreecommitdiffstats
path: root/active/CVE-2021-4159
blob: 01654cb3170cec0a3711b7ee2544ce4800575493 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Description: bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()
References:
 https://bugzilla.suse.com/show_bug.cgi?id=1194227
 https://bugzilla.redhat.com/show_bug.cgi?id=2036024
Notes:
 bwh> I think this can be ignored. Privileged users can generally read
 bwh> kernel memory through kprobes/tracepoints. Unprivileged use of
 bwh> eBPF is now disabled by default in all Debian suites.
Bugs:
upstream: released (5.7-rc1) [294f2fc6da27620a506e6c050241655459ccd6bd]
5.10-upstream-stable: N/A "Fixed before branching point"
4.19-upstream-stable: needed
4.9-upstream-stable:
sid: released (5.7.6-1)
5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
4.9-stretch-security: ignored "Too risky to backport, and mitigated by default"

© 2014-2024 Faster IT GmbH | imprint | privacy policy