summaryrefslogtreecommitdiffstats
path: root/active
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-12-18 09:39:42 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2021-12-18 09:39:42 +0100
commitf6271401dc5e4e4e63fc7377af8068301e3cb69f (patch)
tree020625a310797f046571dab67213376a2e79736f /active
parent85b0a6c7ec4958ee2e91d65234972a4516af6829 (diff)
Retire some CVEs
Diffstat (limited to 'active')
-rw-r--r--active/CVE-2021-400117
-rw-r--r--active/CVE-2021-4232722
-rw-r--r--active/CVE-2021-4305615
-rw-r--r--active/CVE-2021-4326715
4 files changed, 0 insertions, 69 deletions
diff --git a/active/CVE-2021-4001 b/active/CVE-2021-4001
deleted file mode 100644
index ab0035dd9..000000000
--- a/active/CVE-2021-4001
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: bpf: Fix toctou on read-only map's constant scalar tracking
-References:
- https://bugzilla.redhat.com/show_bug.cgi?id=2025645
- https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53
-Notes:
- carnil> Commit fixes a23740ec43ba ("bpf: Track contents of read-only
- carnil> maps as scalars") introduced in 5.5-rc1.
- carnil> For 5.15.y series fixed in 5.15.5.
-Bugs:
-upstream: released (5.16-rc2) [353050be4c19e102178ccc05988101887c25ae53]
-5.10-upstream-stable: released (5.10.83) [33fe044f6a9e8977686a6a09f0bf33e5cc75257e]
-4.19-upstream-stable: N/A "Vulnerable code introduced later"
-4.9-upstream-stable: N/A "Vulnerable code introduced later"
-sid: released (5.15.5-1)
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: N/A "Vulnerable code introduced later"
-4.9-stretch-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2021-42327 b/active/CVE-2021-42327
deleted file mode 100644
index 0105f00e5..000000000
--- a/active/CVE-2021-42327
+++ /dev/null
@@ -1,22 +0,0 @@
-Description: drm/amdgpu: fix out of bounds write
-References:
- https://lists.freedesktop.org/archives/amd-gfx/2021-October/070170.html
- https://cgit.freedesktop.org/drm/drm/commit/?id=f23750b5b3d98653b31d4469592935ef6364ad67
-Notes:
- bwh> Introduced in 5.10 by commit 918698d5c2b5 "drm/amd/display: Return the
- bwh> number of bytes parsed than allocated". This actually introduced the
- bwh> same bug in many debugfs write operations in the same source file.
- bwh> One of these is fixed in drm-next, so should be in upstream 5.16-rc1.
- carnil> Not directly covered by CVE-2021-42327, but 3f4e54bd312d
- carnil> ("drm/amdgpu: Fix even more out of bound writes from debugfs")
- carnil> should then be applied as well.
- carnil> Fixed as well in 5.14.16 for the 5.14.y series.
-Bugs:
-upstream: released (5.15) [5afa7898ab7a0ec9c28556a91df714bf3c2f725e]
-5.10-upstream-stable: released (5.10.77) [eb3b6805e3e9d98b2507201fd061a231988ce623]
-4.19-upstream-stable: N/A "Vulnerability introduced later"
-4.9-upstream-stable: N/A "Vulnerability introduced later"
-sid: released (5.14.16-1)
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: N/A "Vulnerability introduced later"
-4.9-stretch-security: N/A "Vulnerability introduced later"
diff --git a/active/CVE-2021-43056 b/active/CVE-2021-43056
deleted file mode 100644
index 4fb1a0eb1..000000000
--- a/active/CVE-2021-43056
+++ /dev/null
@@ -1,15 +0,0 @@
-Description: KVM: PPC: Book3S HV: Make idle_kvm_start_guest() return 0 if it went to guest
-References:
- https://www.openwall.com/lists/oss-security/2021/10/25/1
- https://lore.kernel.org/linuxppc-dev/87pmrtbbdt.fsf@mpe.ellerman.id.au/T/#u
-Notes:
- carnil> Fixed in 5.14.15 as well for the 5.14.y branch.
-Bugs:
-upstream: released (5.15-rc6) [cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337]
-5.10-upstream-stable: released (5.10.76) [197ec50b2df12dbfb17929eda643b16117b6f0ca]
-4.19-upstream-stable: N/A "Vulnerability introduced later"
-4.9-upstream-stable: N/A "Vulnerability introduced later"
-sid: released (5.14.16-1)
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: N/A "Vulnerability introduced later"
-4.9-stretch-security: N/A "Vulnerability introduced later"
diff --git a/active/CVE-2021-43267 b/active/CVE-2021-43267
deleted file mode 100644
index c997c5e62..000000000
--- a/active/CVE-2021-43267
+++ /dev/null
@@ -1,15 +0,0 @@
-Description: tipc: fix size validations for the MSG_CRYPTO type
-References:
- https://www.sentinelone.com/labs/tipc-remote-linux-kernel-heap-overflow-allows-arbitrary-code-execution/
-Notes:
- carnil> Commit fixes 1ef6f7c9390f ("tipc: add automatic session key
- carnil> exchange") in 5.10-rc1.
-Bugs:
-upstream: released (5.15) [fa40d9734a57bcbfa79a280189799f76c88f7bb0]
-5.10-upstream-stable: released (5.10.77) [0b1b3e086b0af2c2faa9938c4db956fe6ce5c965]
-4.19-upstream-stable: N/A "Vulnerable code introduced later"
-4.9-upstream-stable: N/A "Vulnerable code introduced later"
-sid: released (5.14.16-1)
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: N/A "Vulnerable code introduced later"
-4.9-stretch-security: N/A "Vulnerable code introduced later"

© 2014-2024 Faster IT GmbH | imprint | privacy policy