diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2021-12-18 09:39:42 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2021-12-18 09:39:42 +0100 |
commit | f6271401dc5e4e4e63fc7377af8068301e3cb69f (patch) | |
tree | 020625a310797f046571dab67213376a2e79736f /active | |
parent | 85b0a6c7ec4958ee2e91d65234972a4516af6829 (diff) |
Retire some CVEs
Diffstat (limited to 'active')
-rw-r--r-- | active/CVE-2021-4001 | 17 | ||||
-rw-r--r-- | active/CVE-2021-42327 | 22 | ||||
-rw-r--r-- | active/CVE-2021-43056 | 15 | ||||
-rw-r--r-- | active/CVE-2021-43267 | 15 |
4 files changed, 0 insertions, 69 deletions
diff --git a/active/CVE-2021-4001 b/active/CVE-2021-4001 deleted file mode 100644 index ab0035dd9..000000000 --- a/active/CVE-2021-4001 +++ /dev/null @@ -1,17 +0,0 @@ -Description: bpf: Fix toctou on read-only map's constant scalar tracking -References: - https://bugzilla.redhat.com/show_bug.cgi?id=2025645 - https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53 -Notes: - carnil> Commit fixes a23740ec43ba ("bpf: Track contents of read-only - carnil> maps as scalars") introduced in 5.5-rc1. - carnil> For 5.15.y series fixed in 5.15.5. -Bugs: -upstream: released (5.16-rc2) [353050be4c19e102178ccc05988101887c25ae53] -5.10-upstream-stable: released (5.10.83) [33fe044f6a9e8977686a6a09f0bf33e5cc75257e] -4.19-upstream-stable: N/A "Vulnerable code introduced later" -4.9-upstream-stable: N/A "Vulnerable code introduced later" -sid: released (5.15.5-1) -5.10-bullseye-security: released (5.10.84-1) -4.19-buster-security: N/A "Vulnerable code introduced later" -4.9-stretch-security: N/A "Vulnerable code introduced later" diff --git a/active/CVE-2021-42327 b/active/CVE-2021-42327 deleted file mode 100644 index 0105f00e5..000000000 --- a/active/CVE-2021-42327 +++ /dev/null @@ -1,22 +0,0 @@ -Description: drm/amdgpu: fix out of bounds write -References: - https://lists.freedesktop.org/archives/amd-gfx/2021-October/070170.html - https://cgit.freedesktop.org/drm/drm/commit/?id=f23750b5b3d98653b31d4469592935ef6364ad67 -Notes: - bwh> Introduced in 5.10 by commit 918698d5c2b5 "drm/amd/display: Return the - bwh> number of bytes parsed than allocated". This actually introduced the - bwh> same bug in many debugfs write operations in the same source file. - bwh> One of these is fixed in drm-next, so should be in upstream 5.16-rc1. - carnil> Not directly covered by CVE-2021-42327, but 3f4e54bd312d - carnil> ("drm/amdgpu: Fix even more out of bound writes from debugfs") - carnil> should then be applied as well. - carnil> Fixed as well in 5.14.16 for the 5.14.y series. -Bugs: -upstream: released (5.15) [5afa7898ab7a0ec9c28556a91df714bf3c2f725e] -5.10-upstream-stable: released (5.10.77) [eb3b6805e3e9d98b2507201fd061a231988ce623] -4.19-upstream-stable: N/A "Vulnerability introduced later" -4.9-upstream-stable: N/A "Vulnerability introduced later" -sid: released (5.14.16-1) -5.10-bullseye-security: released (5.10.84-1) -4.19-buster-security: N/A "Vulnerability introduced later" -4.9-stretch-security: N/A "Vulnerability introduced later" diff --git a/active/CVE-2021-43056 b/active/CVE-2021-43056 deleted file mode 100644 index 4fb1a0eb1..000000000 --- a/active/CVE-2021-43056 +++ /dev/null @@ -1,15 +0,0 @@ -Description: KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest -References: - https://www.openwall.com/lists/oss-security/2021/10/25/1 - https://lore.kernel.org/linuxppc-dev/87pmrtbbdt.fsf@mpe.ellerman.id.au/T/#u -Notes: - carnil> Fixed in 5.14.15 as well for the 5.14.y branch. -Bugs: -upstream: released (5.15-rc6) [cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337] -5.10-upstream-stable: released (5.10.76) [197ec50b2df12dbfb17929eda643b16117b6f0ca] -4.19-upstream-stable: N/A "Vulnerability introduced later" -4.9-upstream-stable: N/A "Vulnerability introduced later" -sid: released (5.14.16-1) -5.10-bullseye-security: released (5.10.84-1) -4.19-buster-security: N/A "Vulnerability introduced later" -4.9-stretch-security: N/A "Vulnerability introduced later" diff --git a/active/CVE-2021-43267 b/active/CVE-2021-43267 deleted file mode 100644 index c997c5e62..000000000 --- a/active/CVE-2021-43267 +++ /dev/null @@ -1,15 +0,0 @@ -Description: tipc: fix size validations for the MSG_CRYPTO type -References: - https://www.sentinelone.com/labs/tipc-remote-linux-kernel-heap-overflow-allows-arbitrary-code-execution/ -Notes: - carnil> Commit fixes 1ef6f7c9390f ("tipc: add automatic session key - carnil> exchange") in 5.10-rc1. -Bugs: -upstream: released (5.15) [fa40d9734a57bcbfa79a280189799f76c88f7bb0] -5.10-upstream-stable: released (5.10.77) [0b1b3e086b0af2c2faa9938c4db956fe6ce5c965] -4.19-upstream-stable: N/A "Vulnerable code introduced later" -4.9-upstream-stable: N/A "Vulnerable code introduced later" -sid: released (5.14.16-1) -5.10-bullseye-security: released (5.10.84-1) -4.19-buster-security: N/A "Vulnerable code introduced later" -4.9-stretch-security: N/A "Vulnerable code introduced later" |