summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBen Hutchings <benh@debian.org>2017-03-14 14:41:30 +0000
committerBen Hutchings <benh@debian.org>2017-03-14 14:41:30 +0000
commit8a44df4fec5f79355bc39998060326e21d404fbb (patch)
treeb913998f6a1fc5233b4593e1a48a5454dc2818b3
parent710455f232bc6c860e183658a65f137b146a9957 (diff)
Ignore CVE-2015-2877 for all branches, and retire it
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@5077 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r--active/CVE-2015-287713
-rw-r--r--active/CVE-2016-102002
-rw-r--r--active/CVE-2017-59672
-rw-r--r--retired/CVE-2015-287715
4 files changed, 17 insertions, 15 deletions
diff --git a/active/CVE-2015-2877 b/active/CVE-2015-2877
deleted file mode 100644
index e84ca796..00000000
--- a/active/CVE-2015-2877
+++ /dev/null
@@ -1,13 +0,0 @@
-Description: Cross-VM ASL INtrospection (CAIN)
-References:
- https://www.usenix.org/conference/woot15/workshop-program/presentation/barresi
-Notes:
- bwh> Depends on KSM, which needs to be explicitly enabled at run-time
-Bugs:
-upstream: needed
-4.9-upstream-stable: needed
-3.16-upstream-stable: needed
-3.2-upstream-stable: needed
-sid: needed
-3.16-jessie-security: needed
-3.2-wheezy-security: needed
diff --git a/active/CVE-2016-10200 b/active/CVE-2016-10200
index e359c9c7..453af291 100644
--- a/active/CVE-2016-10200
+++ b/active/CVE-2016-10200
@@ -8,4 +8,4 @@ upstream: released (v4.9-rc7) [32c231164b762dddefa13af5a0101032c70b50ef]
3.2-upstream-stable: needed
sid: released (4.8.15-1)
3.16-jessie-security: pending (3.16.39-1+deb8u3) [bugfix/all/l2tp-fix-racy-sock_zapped-flag-check-in-l2tp_ip-6-_b.patch]
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.86-2) [bugfix/all/l2tp-fix-racy-sock_zapped-flag-check-in-l2tp_ip-6-_b.patch]
diff --git a/active/CVE-2017-5967 b/active/CVE-2017-5967
index 024a54f8..f04c5342 100644
--- a/active/CVE-2017-5967
+++ b/active/CVE-2017-5967
@@ -14,4 +14,4 @@ upstream: released (4.11-rc1) [dfb4357da6ddbdf57d583ba64361c9d792b0e0b1]
3.2-upstream-stable: ignored "Upstream fix is not suitable for backporting"
sid: released (4.9.13-1) [debian/time-mark-timer_stats-as-broken.patch]
3.16-jessie-security: pending (3.16.39-1+deb8u3) [bugfix/all/timer-restrict-timer_stats-to-initial-pid-namespace.patch]
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.86-2) [bugfix/all/timer-restrict-timer_stats-to-initial-pid-namespace.patch]
diff --git a/retired/CVE-2015-2877 b/retired/CVE-2015-2877
new file mode 100644
index 00000000..bccd0c82
--- /dev/null
+++ b/retired/CVE-2015-2877
@@ -0,0 +1,15 @@
+Description: Cross-VM ASL INtrospection (CAIN)
+References:
+ https://www.usenix.org/conference/woot15/workshop-program/presentation/barresi
+ http://www.antoniobarresi.com/files/cain_advisory.txt
+Notes:
+ bwh> Depends on KSM, which needs to be explicitly enabled at run-time.
+ bwh> It appears to be impractical to fix or mitigate this in KSM.
+Bugs:
+upstream: ignored "Intrinsic risk of KSM feature"
+4.9-upstream-stable: ignored "Intrinsic risk of KSM feature"
+3.16-upstream-stable: ignored "Intrinsic risk of KSM feature"
+3.2-upstream-stable: ignored "Intrinsic risk of KSM feature"
+sid: ignored "Intrinsic risk of KSM feature"
+3.16-jessie-security: ignored "Intrinsic risk of KSM feature"
+3.2-wheezy-security: ignored "Intrinsic risk of KSM feature"

© 2014-2024 Faster IT GmbH | imprint | privacy policy