In the Linux kernel, the following vulnerability has been resolved:
selinux: Add boundary check in put_entry()
Just like next_entry(), boundary check is necessary to prevent memory out-of-bound access.
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | 2.6.37 | 4.14.291 |
| linux / linux_kernel | 4.15 | 4.19.256 |
| linux / linux_kernel | 4.20 | 5.4.211 |
| linux / linux_kernel | 5.5 | 5.10.137 |
| linux / linux_kernel | 5.11 | 5.15.61 |
| linux / linux_kernel | 5.16 | 5.18.18 |
| linux / linux_kernel | 5.19 | 5.19.2 |