summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBen Hutchings <ben@decadent.org.uk>2018-04-17 20:54:38 +0100
committerBen Hutchings <ben@decadent.org.uk>2018-04-17 22:19:33 +0100
commit8a26e89267fc5cacf0aeb45e58efd563b396dd30 (patch)
treedbc4833b3a38d1b225c2ba5b858497d2724d2a3d
parent7c9a4327338a227c6b17cede429ec0379b47d9aa (diff)
Triage and retire various issues that don't need to be fixed anywhere
-rw-r--r--active/CVE-2017-1511617
-rw-r--r--active/CVE-2017-1825512
-rw-r--r--active/CVE-2018-1007412
-rw-r--r--active/CVE-2018-1008714
-rw-r--r--active/CVE-2018-1012414
-rw-r--r--retired/CVE-2017-1511622
-rw-r--r--retired/CVE-2017-1825513
-rw-r--r--retired/CVE-2018-1007413
-rw-r--r--retired/CVE-2018-1008715
-rw-r--r--retired/CVE-2018-1012415
-rw-r--r--retired/CVE-2018-1091 (renamed from active/CVE-2018-1091)10
11 files changed, 84 insertions, 73 deletions
diff --git a/active/CVE-2017-15116 b/active/CVE-2017-15116
deleted file mode 100644
index 79b08077..00000000
--- a/active/CVE-2017-15116
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: crypto: rng - Remove old low-level rng interface
-References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1485815 (not accessible)
- https://bugzilla.redhat.com/show_bug.cgi?id=1514609
-Notes:
- bwh> Clearly we can't apply the upstream fix for this, but need to guard
- bwh> against the null pointer somehow. I can't work out which pointer
- bwh> can be null though.
-Bugs:
-upstream: released (4.2-rc1) [94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6]
-4.9-upstream-stable: N/A "Fixed before branching point"
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid: released (4.2.1-1)
-4.9-stretch-security: N/A "Fixed before branching point"
-3.16-jessie-security:
-3.2-wheezy-security:
diff --git a/active/CVE-2017-18255 b/active/CVE-2017-18255
deleted file mode 100644
index 0441bb81..00000000
--- a/active/CVE-2017-18255
+++ /dev/null
@@ -1,12 +0,0 @@
-Description: DoS in perf_cpu_time_max_percent_handler
-References:
-Notes:
-Bugs:
-upstream: released (4.11-rc1) [1572e45a924f254d9570093abde46430c3172e3d]
-4.9-upstream-stable:
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid: released (4.11.6-1)
-4.9-stretch-security:
-3.16-jessie-security:
-3.2-wheezy-security:
diff --git a/active/CVE-2018-10074 b/active/CVE-2018-10074
deleted file mode 100644
index 93bea858..00000000
--- a/active/CVE-2018-10074
+++ /dev/null
@@ -1,12 +0,0 @@
-Description: clk: hisilicon: hi3660:Fix potential NULL dereference in hi3660_stub_clk_probe()
-References:
-Notes:
-Bugs:
-upstream: released (4.16-rc7) [9903e41ae1f5d50c93f268ca3304d4d7c64b9311]
-4.9-upstream-stable:
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid:
-4.9-stretch-security:
-3.16-jessie-security:
-3.2-wheezy-security:
diff --git a/active/CVE-2018-10087 b/active/CVE-2018-10087
deleted file mode 100644
index 60f35d2a..00000000
--- a/active/CVE-2018-10087
+++ /dev/null
@@ -1,14 +0,0 @@
-Description: kernel/exit.c: avoid undefined behaviour when calling wait4()
-References:
- https://news.ycombinator.com/item?id=2972021
- http://lkml.kernel.org/r/1497264618-20212-1-git-send-email-zhongjiang@huawei.com
-Notes:
-Bugs:
-upstream: released (4.13-rc1) [dd83c161fbcc5d8be637ab159c0de015cbff5ba4]
-4.9-upstream-stable:
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid: released (4.13.4-1)
-4.9-stretch-security:
-3.16-jessie-security:
-3.2-wheezy-security:
diff --git a/active/CVE-2018-10124 b/active/CVE-2018-10124
deleted file mode 100644
index 41a04d78..00000000
--- a/active/CVE-2018-10124
+++ /dev/null
@@ -1,14 +0,0 @@
-Description: kernel/signal.c: avoid undefined behaviour in kill_something_info
-References:
- https://news.ycombinator.com/item?id=2972021
- http://lkml.kernel.org/r/1496670008-59084-1-git-send-email-zhongjiang@huawei.com
-Notes:
-Bugs:
-upstream: released (4.13-rc1) [4ea77014af0d6205b05503d1c7aac6eace11d473]
-4.9-upstream-stable:
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid: released (4.13.4-1)
-4.9-stretch-security:
-3.16-jessie-security:
-3.2-wheezy-security:
diff --git a/retired/CVE-2017-15116 b/retired/CVE-2017-15116
new file mode 100644
index 00000000..01dc4693
--- /dev/null
+++ b/retired/CVE-2017-15116
@@ -0,0 +1,22 @@
+Description: crypto: drbg - null pointer dereference
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1485815 (not accessible)
+ https://bugzilla.redhat.com/show_bug.cgi?id=1514609
+Notes:
+ bwh> Clearly we can't apply the upstream fix for this, but need to guard
+ bwh> against the null pointer somehow. I can't work out which pointer
+ bwh> can be null though.
+ bwh> I've now looked at the RHEL 7 update, and the comment indicates
+ bwh> that the vulnerable code is in crypto/drbg.c. I verified that
+ bwh> it does have a weird special case for slen == 0 && seed != NULL
+ bwh> which no other RNG does. This was added in mainline in 3.17 and
+ bwh> then backported to RHEL's 3.10 branch.
+Bugs:
+upstream: released (4.2-rc1) [94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6]
+4.9-upstream-stable: N/A "Fixed before branching point"
+3.16-upstream-stable: N/A "Vulnerable code not present"
+3.2-upstream-stable: N/A "Vulnerable code not present"
+sid: released (4.2.1-1)
+4.9-stretch-security: N/A "Fixed before branching point"
+3.16-jessie-security: N/A "Vulnerable code not present"
+3.2-wheezy-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2017-18255 b/retired/CVE-2017-18255
new file mode 100644
index 00000000..374a39a9
--- /dev/null
+++ b/retired/CVE-2017-18255
@@ -0,0 +1,13 @@
+Description: DoS in perf_cpu_time_max_percent_handler
+References:
+Notes:
+ bwh> root is supposed to be able to deny service any way they want...
+Bugs:
+upstream: released (4.11-rc1) [1572e45a924f254d9570093abde46430c3172e3d]
+4.9-upstream-stable: ignored "not a security issue"
+3.16-upstream-stable: ignored "not a security issue"
+3.2-upstream-stable: ignored "not a security issue"
+sid: released (4.11.6-1)
+4.9-stretch-security: ignored "not a security issue"
+3.16-jessie-security: ignored "not a security issue"
+3.2-wheezy-security: ignored "not a security issue"
diff --git a/retired/CVE-2018-10074 b/retired/CVE-2018-10074
new file mode 100644
index 00000000..3601b17f
--- /dev/null
+++ b/retired/CVE-2018-10074
@@ -0,0 +1,13 @@
+Description: clk: hisilicon: hi3660:Fix potential NULL dereference in hi3660_stub_clk_probe()
+References:
+Notes:
+ bwh> This is in a newly added driver.
+Bugs:
+upstream: released (4.16-rc7) [9903e41ae1f5d50c93f268ca3304d4d7c64b9311]
+4.9-upstream-stable: N/A "Vulnerable code not present"
+3.16-upstream-stable: N/A "Vulnerable code not present"
+3.2-upstream-stable: N/A "Vulnerable code not present"
+sid: N/A "Vulnerable code not present"
+4.9-stretch-security: N/A "Vulnerable code not present"
+3.16-jessie-security: N/A "Vulnerable code not present"
+3.2-wheezy-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2018-10087 b/retired/CVE-2018-10087
new file mode 100644
index 00000000..178e980e
--- /dev/null
+++ b/retired/CVE-2018-10087
@@ -0,0 +1,15 @@
+Description: kernel/exit.c: avoid undefined behaviour when calling wait4()
+References:
+ https://news.ycombinator.com/item?id=2972021
+ http://lkml.kernel.org/r/1497264618-20212-1-git-send-email-zhongjiang@huawei.com
+Notes:
+ bwh> This looks very unlikely to have any security impact in reality.
+Bugs:
+upstream: released (4.13-rc1) [dd83c161fbcc5d8be637ab159c0de015cbff5ba4]
+4.9-upstream-stable: ignored "Minor issue"
+3.16-upstream-stable: ignored "Minor issue"
+3.2-upstream-stable: ignored "Minor issue"
+sid: released (4.13.4-1)
+4.9-stretch-security: ignored "Minor issue"
+3.16-jessie-security: ignored "Minor issue"
+3.2-wheezy-security: ignored "Minor issue"
diff --git a/retired/CVE-2018-10124 b/retired/CVE-2018-10124
new file mode 100644
index 00000000..cddaf1e6
--- /dev/null
+++ b/retired/CVE-2018-10124
@@ -0,0 +1,15 @@
+Description: kernel/signal.c: avoid undefined behaviour in kill_something_info
+References:
+ https://news.ycombinator.com/item?id=2972021
+ http://lkml.kernel.org/r/1496670008-59084-1-git-send-email-zhongjiang@huawei.com
+Notes:
+ bwh> This looks very unlikely to have any security impact in reality.
+Bugs:
+upstream: released (4.13-rc1) [4ea77014af0d6205b05503d1c7aac6eace11d473]
+4.9-upstream-stable: ignored "Minor issue"
+3.16-upstream-stable: ignored "Minor issue"
+3.2-upstream-stable: ignored "Minor issue"
+sid: released (4.13.4-1)
+4.9-stretch-security: ignored "Minor issue"
+3.16-jessie-security: ignored "Minor issue"
+3.2-wheezy-security: ignored "Minor issue"
diff --git a/active/CVE-2018-1091 b/retired/CVE-2018-1091
index 66ba22fd..9aa9e03b 100644
--- a/active/CVE-2018-1091
+++ b/retired/CVE-2018-1091
@@ -4,12 +4,14 @@ References:
https://marc.info/?l=linuxppc-embedded&m=150535531910494&w=2
https://bugzilla.redhat.com/show_bug.cgi?id=1558149
Notes:
+ bwh> POWER9 support was added around Linux 4.6, so this doesn't affect
+ bwh> older branches.
Bugs:
upstream: released (4.14-rc2) [c1fa0768a8713b135848f78fd43ffc208d8ded70]
4.9-upstream-stable: released (4.9.53) [f89f25b531471a6ba43f0b5658f9359fcf33a285]
-3.16-upstream-stable:
-3.2-upstream-stable:
+3.16-upstream-stable: N/A "Hardware not supported"
+3.2-upstream-stable: N/A "Hardware not supported"
sid: released (4.13.10-1)
4.9-stretch-security: released (4.9.65-1)
-3.16-jessie-security:
-3.2-wheezy-security:
+3.16-jessie-security: N/A "Hardware not supported"
+3.2-wheezy-security: N/A "Architecture no longer supported"

© 2014-2024 Faster IT GmbH | imprint | privacy policy