summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBen Hutchings <ben@decadent.org.uk>2020-04-20 22:04:36 +0100
committerBen Hutchings <ben@decadent.org.uk>2020-04-20 22:04:36 +0100
commit5d3ae9fd09f1af75d49d8121da800c5f55762910 (patch)
treed8ba7d9b4e1690f2f847bac9dad9b04f92a7a841
parentccf5afcaaac8a27b9e640c3de59071935fbe3885 (diff)
Add notes and status for many issues
-rw-r--r--active/CVE-2019-1888516
-rw-r--r--active/CVE-2019-193183
-rw-r--r--active/CVE-2019-1931918
-rw-r--r--active/CVE-2019-1976816
-rw-r--r--active/CVE-2019-1977012
-rw-r--r--active/CVE-2019-206364
-rw-r--r--active/CVE-2020-00098
-rw-r--r--active/CVE-2020-004112
-rw-r--r--active/CVE-2020-006712
-rw-r--r--active/CVE-2020-1070819
-rw-r--r--active/CVE-2020-116084
-rw-r--r--active/CVE-2020-116094
-rw-r--r--active/CVE-2020-27328
-rw-r--r--active/CVE-2020-86474
-rw-r--r--active/CVE-2020-86484
-rw-r--r--active/CVE-2020-86496
-rw-r--r--active/CVE-2020-88324
-rw-r--r--active/CVE-2020-899210
-rw-r--r--active/CVE-2020-93838
19 files changed, 98 insertions, 74 deletions
diff --git a/active/CVE-2019-18885 b/active/CVE-2019-18885
index 8c2e7a1f..eaf6516c 100644
--- a/active/CVE-2019-18885
+++ b/active/CVE-2019-18885
@@ -2,12 +2,16 @@ Description: btrfs: crafted image causes null deref in btrfs_verify_dev_extent
References:
https://github.com/bobfuzzer/CVE-2019-18885
Notes:
+ bwh> If this issue is strictly limited to btrfs_verify_dev_extent()
+ bwh> then it was introduced at the earliest by the introduction of that
+ bwh> function in 4.19 (commit cf90d884b347). There may be similar
+ bwh> issues elsewhere though.
Bugs:
upstream: released (5.1-rc1) [09ba3bc9dd150457c506e4661380a6183af651c1]
-4.19-upstream-stable:
-4.9-upstream-stable:
-3.16-upstream-stable:
+4.19-upstream-stable: needed
+4.9-upstream-stable: N/A "Vulnerable code not present"
+3.16-upstream-stable: N/A "Vulnerable code not present"
sid: released (5.2.6-1)
-4.19-buster-security:
-4.9-stretch-security:
-3.16-jessie-security:
+4.19-buster-security: needed
+4.9-stretch-security: N/A "Vulnerable code not present"
+3.16-jessie-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2019-19318 b/active/CVE-2019-19318
index 492b76d8..1d6cee30 100644
--- a/active/CVE-2019-19318
+++ b/active/CVE-2019-19318
@@ -4,6 +4,9 @@ References:
Notes:
carnil> Introduced in 78134300579a ("locking/rwsem: Don't call
carnil> owner_on_cpu() on read-owner") in 5.3-rc2?
+ bwh> I don't think so. That commit did not introduce the dereference of
+ bwh> the owner pointer, and the issue is also said to be reproducible on
+ bwh> 5.0.21 (which does not have a backport of it).
Bugs:
upstream: released (5.4)
4.19-upstream-stable:
diff --git a/active/CVE-2019-19319 b/active/CVE-2019-19319
index c5dcf6ff..ae495d4d 100644
--- a/active/CVE-2019-19319
+++ b/active/CVE-2019-19319
@@ -2,16 +2,24 @@ Description: ext4: crafted image causes heap OOB write in ext4_xattr_set_entry
References:
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19319
Notes:
- bwh> The fix is unknown but the PoC is reported to fail on 5.3.11 and 5.4.0.
carnil> Introduced in dec214d00e0d ("ext4: xattr inode deduplication")
carnil> in 4.13-rc1? Cf.
carnil> https://bugzilla.suse.com/show_bug.cgi?id=1158021#c2
+ bwh> SUSE has backported the fix as far as 3.12. It turns out that
+ bwh> they backported *part* of commit dec214d00e0d to fix CVE-2018-1094
+ bwh> which I thought didn't affect older branches. See
+ bwh> <https://github.com/openSUSE/kernel-source/blob/SLE12-SP4/patches.suse/ext4-make-metadata-csum-checks-safer.patch>
+ bwh> and
+ bwh> <https://github.com/openSUSE/kernel-source/blob/SLE12-SP4/patches.suse/ext4-protect-journal-inode-s-blocks-using-block_vali.patch>.
+ bwh> So we should probably apply both of these to 3.16 and 4.9.
+ bwh> Note the follow-up fixes: commits fbbbbd2f28aec, 170417c8c7bb,
+ bwh> 0a944e8a6c66, af133ade9a40.
Bugs:
-upstream: released (5.4)
-4.19-upstream-stable:
+upstream: released (5.2-rc1) [345c0dbf3a30872d9b204db96b5857cd00808cae]
+4.19-upstream-stable: released (4.19.73) [2fd4629de51974002f4e9cf1a35a1926dd6c9d99]
4.9-upstream-stable:
3.16-upstream-stable:
-sid: released (5.3.15-1)
-4.19-buster-security:
+sid: released (5.2.6-1)
+4.19-buster-security: released (4.19.87-1)
4.9-stretch-security:
3.16-jessie-security:
diff --git a/active/CVE-2019-19768 b/active/CVE-2019-19768
index a3a108fb..feff8a3d 100644
--- a/active/CVE-2019-19768
+++ b/active/CVE-2019-19768
@@ -3,11 +3,11 @@ References:
https://bugzilla.kernel.org/show_bug.cgi?id=205711
Notes:
Bugs:
-upstream:
-4.19-upstream-stable:
-4.9-upstream-stable:
-3.16-upstream-stable:
-sid:
-4.19-buster-security:
-4.9-stretch-security:
-3.16-jessie-security:
+upstream: released (5.6-rc4) [c780e86dd48ef6467a1146cf7d0fe1e05a635039]
+4.19-upstream-stable: needed
+4.9-upstream-stable: needed
+3.16-upstream-stable: needed
+sid: released (5.5.13-1)
+4.19-buster-security: needed
+4.9-stretch-security: needed
+3.16-jessie-security: needed
diff --git a/active/CVE-2019-19770 b/active/CVE-2019-19770
index 7c43d180..7bff8f54 100644
--- a/active/CVE-2019-19770
+++ b/active/CVE-2019-19770
@@ -1,15 +1,17 @@
-Description: debugfs_remove use-after-free
+Description: blktrace: debugfs_remove use-after-free
References:
https://bugzilla.kernel.org/show_bug.cgi?id=205713
https://syzkaller.appspot.com/bug?extid=903b72a010ad6b7a40f2
https://lore.kernel.org/lkml/20200206111052.45356-1-yukuai3@huawei.com/
+ https://lore.kernel.org/linux-block/20200402000002.7442-1-mcgrof@kernel.org/
Notes:
+ bwh> Note that only root can access debugfs by default.
Bugs:
-upstream:
-4.19-upstream-stable:
+upstream: needed
+4.19-upstream-stable: needed
4.9-upstream-stable:
3.16-upstream-stable:
-sid:
-4.19-buster-security:
+sid: needed
+4.19-buster-security: needed
4.9-stretch-security:
3.16-jessie-security:
diff --git a/active/CVE-2019-20636 b/active/CVE-2019-20636
index 77fda2d7..7348f7cc 100644
--- a/active/CVE-2019-20636
+++ b/active/CVE-2019-20636
@@ -5,8 +5,8 @@ Bugs:
upstream: released (5.5-rc6) [cb222aed03d798fc074be55e59d9a112338ee784]
4.19-upstream-stable: released (4.19.96) [f5b9bfbe94a042a2e3806efa4c6e1b6ddb4292c4]
4.9-upstream-stable: released (4.9.210) [5f27f97dfed4aa29fb95b98bf5911763bd3ef038]
-3.16-upstream-stable:
+3.16-upstream-stable: needed
sid: released (5.4.13-1)
4.19-buster-security: released (4.19.98-1)
4.9-stretch-security: released (4.9.210-1)
-3.16-jessie-security:
+3.16-jessie-security: needed
diff --git a/active/CVE-2020-0009 b/active/CVE-2020-0009
index c5b6aebb..37309656 100644
--- a/active/CVE-2020-0009
+++ b/active/CVE-2020-0009
@@ -7,8 +7,8 @@ Bugs:
upstream: released (5.6-rc3) [6d67b0290b4b84c477e6a2fc6e005e174d3c7786]
4.19-upstream-stable: released (4.19.107) [a4307700608e43dcf9b8abf1ee74f68227e9c61a]
4.9-upstream-stable: released (4.9.215) [a7fc5dbd17127c7301b0aefc2bcf1f54169c7383]
-3.16-upstream-stable:
+3.16-upstream-stable: needed
sid: released (5.5.13-1)
-4.19-buster-security:
-4.9-stretch-security:
-3.16-jessie-security:
+4.19-buster-security: needed
+4.9-stretch-security: needed
+3.16-jessie-security: ignored "Driver is not enabled or supported"
diff --git a/active/CVE-2020-0041 b/active/CVE-2020-0041
index e35b352a..211529d2 100644
--- a/active/CVE-2020-0041
+++ b/active/CVE-2020-0041
@@ -7,10 +7,10 @@ Notes:
carnil> earlier releases.
Bugs:
upstream: released (5.5-rc2) [16981742717b04644a41052570fb502682a315d2]
-4.19-upstream-stable:
-4.9-upstream-stable:
-3.16-upstream-stable:
+4.19-upstream-stable: N/A "Vulnerability introduced later"
+4.9-upstream-stable: N/A "Vulnerability introduced later"
+3.16-upstream-stable: N/A "Vulnerability introduced later"
sid: released (5.4.6-1)
-4.19-buster-security:
-4.9-stretch-security:
-3.16-jessie-security:
+4.19-buster-security: N/A "Vulnerability introduced later"
+4.9-stretch-security: N/A "Vulnerability introduced later"
+3.16-jessie-security: N/A "Vulnerability introduced later"
diff --git a/active/CVE-2020-0067 b/active/CVE-2020-0067
index e0e784d4..a8fabcf0 100644
--- a/active/CVE-2020-0067
+++ b/active/CVE-2020-0067
@@ -4,10 +4,10 @@ References:
Notes:
Bugs:
upstream: released (5.5-rc1) [688078e7f36c293dae25b338ddc9e0a2790f6e06]
-4.19-upstream-stable:
-4.9-upstream-stable:
-3.16-upstream-stable:
+4.19-upstream-stable: needed
+4.9-upstream-stable: needed
+3.16-upstream-stable: needed
sid: released (5.5.13-1)
-4.19-buster-security:
-4.9-stretch-security:
-3.16-jessie-security:
+4.19-buster-security: needed
+4.9-stretch-security: needed
+3.16-jessie-security: needed
diff --git a/active/CVE-2020-10708 b/active/CVE-2020-10708
index 07500e27..b2f61848 100644
--- a/active/CVE-2020-10708
+++ b/active/CVE-2020-10708
@@ -2,13 +2,16 @@ Description: race condition in kernel/audit.c may allow low privilege users trig
References:
https://www.openwall.com/lists/oss-security/2020/04/17/1
https://bugzilla.redhat.com/show_bug.cgi?id=1822593
+ https://www.openwall.com/lists/oss-security/2020/04/17/4
Notes:
+ bwh> Disputed - it actually requires the administrator to do strange
+ bwh> things.
Bugs:
-upstream:
-4.19-upstream-stable:
-4.9-upstream-stable:
-3.16-upstream-stable:
-sid:
-4.19-buster-security:
-4.9-stretch-security:
-3.16-jessie-security:
+upstream: N/A "Not a security issue"
+4.19-upstream-stable: N/A "Not a security issue"
+4.9-upstream-stable: N/A "Not a security issue"
+3.16-upstream-stable: N/A "Not a security issue"
+sid: N/A "Not a security issue"
+4.19-buster-security: N/A "Not a security issue"
+4.9-stretch-security: N/A "Not a security issue"
+3.16-jessie-security: N/A "Not a security issue"
diff --git a/active/CVE-2020-11608 b/active/CVE-2020-11608
index 2004923c..d988be8f 100644
--- a/active/CVE-2020-11608
+++ b/active/CVE-2020-11608
@@ -5,8 +5,8 @@ Bugs:
upstream: released (5.7-rc1) [998912346c0da53a6dbb71fab3a138586b596b30]
4.19-upstream-stable: released (4.19.114) [747a7431661ab3c22ad1e721558bdf9e3d53d4a6]
4.9-upstream-stable: released (4.9.218) [03e73c3ef017580482d8e4de2db2bac9505facca]
-3.16-upstream-stable:
+3.16-upstream-stable: needed
sid: released (5.5.17-1)
4.19-buster-security: needed
4.9-stretch-security: needed
-3.16-jessie-security:
+3.16-jessie-security: needed
diff --git a/active/CVE-2020-11609 b/active/CVE-2020-11609
index 5b12b04e..560a8c11 100644
--- a/active/CVE-2020-11609
+++ b/active/CVE-2020-11609
@@ -5,8 +5,8 @@ Bugs:
upstream: released (5.7-rc1) [485b06aadb933190f4bc44e006076bc27a23f205]
4.19-upstream-stable: released (4.19.114) [70764334b2bcb15c67dfbd912d9a9f7076f6d0df]
4.9-upstream-stable: released (4.9.218) [be6fdd999bcc66cbfde80efbdc16cfd8a3290e38]
-3.16-upstream-stable:
+3.16-upstream-stable: needed
sid: released (5.5.17-1)
4.19-buster-security: needed
4.9-stretch-security: needed
-3.16-jessie-security:
+3.16-jessie-security: needed
diff --git a/active/CVE-2020-2732 b/active/CVE-2020-2732
index e3dfa1a1..97ae3a29 100644
--- a/active/CVE-2020-2732
+++ b/active/CVE-2020-2732
@@ -11,8 +11,8 @@ Bugs:
upstream: released (5.6-rc4) [07721feee46b4b248402133228235318199b05ec, 35a571346a94fb93b5b3b6a599675ef3384bc75c, e71237d3ff1abf9f3388337cfebf53b96df2020d]
4.19-upstream-stable: released (4.19.107) [ed9e97c35b454ceb1da4f65c318015a7ab298dae, 85dd0eb771e8cef7839dbd4cb61acde0b86ecd9e, e5c0857bd5ccf34d93b5b1ea858ab3d81a685b08]
4.9-upstream-stable: released (4.9.215) [86dc39e580d8e3ffa42c8157d3e28249fd9a12c5, f3e0dfb310e6a6f0190dbb3d6b337513b548507b, 35523a2d9918e36ad4fa6c9c0176279d7c1f4291]
-3.16-upstream-stable:
+3.16-upstream-stable: needed
sid: released (5.5.13-1)
-4.19-buster-security:
-4.9-stretch-security:
-3.16-jessie-security:
+4.19-buster-security: needed
+4.9-stretch-security: needed
+3.16-jessie-security: needed
diff --git a/active/CVE-2020-8647 b/active/CVE-2020-8647
index 8e263319..175c1969 100644
--- a/active/CVE-2020-8647
+++ b/active/CVE-2020-8647
@@ -6,8 +6,8 @@ Bugs:
upstream: released (5.6-rc5) [513dc792d6060d5ef572e43852683097a8420f56]
4.19-upstream-stable: released (4.19.109) [7abe1e0a874418b07524c9e07225df1cbb421ce9]
4.9-upstream-stable: released (4.9.216) 1f04adb4d691ed703b1fbc55d99f622b96cedecc]
-3.16-upstream-stable:
+3.16-upstream-stable: needed
sid: released (5.5.13-1)
4.19-buster-security: needed
4.9-stretch-security: needed
-3.16-jessie-security:
+3.16-jessie-security: needed
diff --git a/active/CVE-2020-8648 b/active/CVE-2020-8648
index 537fa588..861400e2 100644
--- a/active/CVE-2020-8648
+++ b/active/CVE-2020-8648
@@ -7,8 +7,8 @@ Bugs:
upstream: released (5.6-rc3) [07e6124a1a46b4b5a9b3cacc0c306b50da87abf5]
4.19-upstream-stable: released (4.19.109) [31559b59040fc0e6ad363642112d4eb03ad4ebb7]
4.9-upstream-stable: released (4.9.216) [290a9381ccc16131c6ccc19940589141985db6b1]
-3.16-upstream-stable:
+3.16-upstream-stable: needed
sid: released (5.5.13-1)
4.19-buster-security: needed
4.9-stretch-security: needed
-3.16-jessie-security:
+3.16-jessie-security: needed
diff --git a/active/CVE-2020-8649 b/active/CVE-2020-8649
index 57576850..543c5911 100644
--- a/active/CVE-2020-8649
+++ b/active/CVE-2020-8649
@@ -2,12 +2,14 @@ Description: vgacon_invert_region use-after-free
References:
https://bugzilla.kernel.org/show_bug.cgi?id=206357
Notes:
+ bwh> I have a suspicion that this has been confused with CVE-2020-8647,
+ bwh> though it is possible the same fix covers both.
Bugs:
upstream: released (5.6-rc5) [513dc792d6060d5ef572e43852683097a8420f56]
4.19-upstream-stable: released (4.19.109) [7abe1e0a874418b07524c9e07225df1cbb421ce9]
4.9-upstream-stable: released (4.9.216) [1f04adb4d691ed703b1fbc55d99f622b96cedecc]
-3.16-upstream-stable:
+3.16-upstream-stable: needed
sid: released (5.5.13-1)
4.19-buster-security: needed
4.9-stretch-security: needed
-3.16-jessie-security:
+3.16-jessie-security: needed
diff --git a/active/CVE-2020-8832 b/active/CVE-2020-8832
index dbdc5a1f..16347962 100644
--- a/active/CVE-2020-8832
+++ b/active/CVE-2020-8832
@@ -16,8 +16,8 @@ Bugs:
upstream: N/A "Incomplete fix not applied because prerequisite present before"
4.19-upstream-stable: N/A "Incomplete fix not applied because prerequisite present before"
4.9-upstream-stable: needed
-3.16-upstream-stable:
+3.16-upstream-stable: N/A "No support for this hardware"
sid: N/A "Incomplete fix not applied because prerequisite present before"
4.19-buster-security: N/A "Incomplete fix not applied because prerequisite present before"
4.9-stretch-security: needed
-3.16-jessie-security:
+3.16-jessie-security: N/A "No support for this hardware"
diff --git a/active/CVE-2020-8992 b/active/CVE-2020-8992
index 8f9f1386..f95dc091 100644
--- a/active/CVE-2020-8992
+++ b/active/CVE-2020-8992
@@ -2,12 +2,14 @@ Description: ext4: add cond_resched() to ext4_protect_reserved_inode
References:
https://patchwork.ozlabs.org/patch/1236118/
Notes:
+ bwh> Introduced by fix for CVE-2019-19319, so we can avoid it by
+ bwh> applying both fixes at the same time.
Bugs:
upstream: released (5.6-rc2) [af133ade9a40794a37104ecbcc2827c0ea373a3c]
4.19-upstream-stable: released (4.19.105) [a5c03b93e7b5f2080cc574ac65312f0433758158]
-4.9-upstream-stable:
-3.16-upstream-stable:
+4.9-upstream-stable: N/A "Vulnerable code not present"
+3.16-upstream-stable: N/A "Vulnerable code not present"
sid: released (5.5.13-1)
4.19-buster-security: needed
-4.9-stretch-security:
-3.16-jessie-security:
+4.9-stretch-security: N/A "Vulnerable code not present"
+3.16-jessie-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2020-9383 b/active/CVE-2020-9383
index b9dede30..de12cdc4 100644
--- a/active/CVE-2020-9383
+++ b/active/CVE-2020-9383
@@ -5,8 +5,8 @@ Bugs:
upstream: released (5.6-rc4) [2e90ca68b0d2f5548804f22f0dd61145516171e3]
4.19-upstream-stable: released (4.19.107) [c8fd87c53a1509162b910cec91c0c46753c58f9a]
4.9-upstream-stable: released (4.9.215) [5fbaa66c2a51c2260add842bd12cbc79715c5249]
-3.16-upstream-stable:
+3.16-upstream-stable: needed
sid: released (5.5.13-1)
-4.19-buster-security:
-4.9-stretch-security:
-3.16-jessie-security:
+4.19-buster-security: needed
+4.9-stretch-security: needed
+3.16-jessie-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy