summaryrefslogtreecommitdiffstats
path: root/retired
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2017-07-03 07:24:13 +0000
committerSalvatore Bonaccorso <carnil@debian.org>2017-07-03 07:24:13 +0000
commit7fa91dd46d166029686400082dda51d245703aa8 (patch)
treec7c8a62ac0db1735e7ba9a7ef115a2265c52f1c6 /retired
parenteb9f4231ba3f0794e60f8afbeaaf7431450644be (diff)
Retire several CVEs fixed everwhere
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@5401 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired')
-rw-r--r--retired/CVE-2017-100036416
-rw-r--r--retired/CVE-2017-748712
-rw-r--r--retired/CVE-2017-764525
-rw-r--r--retired/CVE-2017-789514
-rw-r--r--retired/CVE-2017-806414
-rw-r--r--retired/CVE-2017-889014
-rw-r--r--retired/CVE-2017-892412
-rw-r--r--retired/CVE-2017-892512
-rw-r--r--retired/CVE-2017-907416
-rw-r--r--retired/CVE-2017-907512
-rw-r--r--retired/CVE-2017-907612
-rw-r--r--retired/CVE-2017-907712
-rw-r--r--retired/CVE-2017-924212
13 files changed, 183 insertions, 0 deletions
diff --git a/retired/CVE-2017-1000364 b/retired/CVE-2017-1000364
new file mode 100644
index 00000000..95397f9a
--- /dev/null
+++ b/retired/CVE-2017-1000364
@@ -0,0 +1,16 @@
+Description: stack gap guard page too small
+References:
+Notes:
+ carnil> original patch series as applied in 4.9.30-2+deb9u1,
+ carnil> 3.16.43-2+deb8u1 and 3.2.89-1 caused regressions.
+ carnil> A regression update following the official upstream
+ carnil> patch will solve those.
+Bugs:
+upstream: released (4.12-rc6) [1be7107fbe18eed3e319a6c3e83c78254b693acb]
+4.9-upstream-stable: released (4.9.34) [cfc0eb403816c5c4f9667d959de5e22789b5421e]
+3.16-upstream-stable: released (3.16.45) [978b8aa1646d4e023edd121c7f1b8f938ccb813d]
+3.2-upstream-stable: released (3.2.90) [640c7dfdc7c723143b1ce42f5569ec8565cbbde7]
+sid: released (4.11.6-1) [bugfix/all/mm-larger-stack-guard-gap-between-vmas.patch]
+4.9-stretch-security: released (4.9.30-2+deb9u1)
+3.16-jessie-security: released (3.16.43-2+deb8u1)
+3.2-wheezy-security: released (3.2.89-1)
diff --git a/retired/CVE-2017-7487 b/retired/CVE-2017-7487
new file mode 100644
index 00000000..5792cecb
--- /dev/null
+++ b/retired/CVE-2017-7487
@@ -0,0 +1,12 @@
+Description: ipx: call ipxitf_put() in ioctl error path
+References:
+Notes:
+Bugs:
+upstream: released (4.12-rc1) [ee0d8d8482345ff97a75a7d747efc309f13b0d80]
+4.9-upstream-stable: released (4.9.30) [820adccd0e3be9bdd2384ca8fc4712108cfdf28b]
+3.16-upstream-stable: released (3.16.44) [c64988b55a19fc5c85f85c433976d6e5210f54dc]
+3.2-upstream-stable: released (3.2.89) [48dc185bcc73e1bb42d007cbaf96ad55cefaf4cb]
+sid: released (4.9.30-1)
+4.9-stretch-security: N/A "Fixed before branching point"
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/ipx-call-ipxitf_put-in-ioctl-error-path.patch]
+3.2-wheezy-security: released (3.2.89-1)
diff --git a/retired/CVE-2017-7645 b/retired/CVE-2017-7645
new file mode 100644
index 00000000..5103c98d
--- /dev/null
+++ b/retired/CVE-2017-7645
@@ -0,0 +1,25 @@
+Description: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c
+References:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645
+ https://marc.info/?l=linux-nfs&m=149218228327497&w=2
+ https://marc.info/?l=linux-nfs&m=149247516212924&w=2
+Notes:
+ carnil> afaict the issue for which CVE-2017-7645 was assigned
+ carnil> is fixed with e6838a29ecb484c97e4efef9429643b9851fba6e
+ carnil> but I think
+ carnil> db44bac41bbfc0c0d9dd943092d8bded3c9db19b (nfsd4: minor
+ carnil> NFSv2/v3 write decoding cleanup) and the following
+ carnil> 13bf9fbff0e5e099e2b6f003a0ab8ae145436309 (nfsd: stricter
+ carnil> decoding of write-like NFSv2/v3 ops) should be applied
+ carnil> as well (should the last commit get a separate CVE id?)
+ carnil> 13bf9fbff0e5e099e2b6f003a0ab8ae145436309 got a separate
+ carnil> CVE: CVE-2017-7895
+Bugs:
+upstream: released (4.11) [e6838a29ecb484c97e4efef9429643b9851fba6e]
+4.9-upstream-stable: released (4.9.26) [fc6445df466f37291a70937642068bda78802a5b]
+3.16-upstream-stable: released (3.16.44) [1d4ab03084d4bace93b1573c57a309e954d05c09]
+3.2-upstream-stable: released (3.2.89) [1eb3e42d91d63fc757a8da38683f417bcdf953a2]
+sid: released (4.9.25-1) [bugfix/all/nfsd-check-for-oversized-NFSv2-v3-arguments.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/nfsd-check-for-oversized-nfsv2-v3-arguments.patch]
+3.2-wheezy-security: released (3.2.89-1)
diff --git a/retired/CVE-2017-7895 b/retired/CVE-2017-7895
new file mode 100644
index 00000000..8269afbb
--- /dev/null
+++ b/retired/CVE-2017-7895
@@ -0,0 +1,14 @@
+Description: nfsd: stricter decoding of write-like NFSv2/v3 ops
+References:
+Notes:
+ carnil> Prerequisite: db44bac41bbfc0c0d9dd943092d8bded3c9db19b (nfsd4: minor
+ carnil> NFSv2/v3 write decoding cleanup)
+Bugs:
+upstream: released (4.11) [13bf9fbff0e5e099e2b6f003a0ab8ae145436309]
+4.9-upstream-stable: released (4.9.26) [d7809b9e99bb75e83bdd13dc70ce27df61faf5de]
+3.16-upstream-stable: released (3.16.44) [bb0ea8af0b69259f5ea1d2fcff52948c98129c5e]
+3.2-upstream-stable: released (3.2.89) [6b9ba0c00cb068a50a409bbdc7cfbe473f1c01a3]
+sid: released (4.9.25-1) [bugfix/all/nfsd-stricter-decoding-of-write-like-NFSv2-v3-ops.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/nfsd-stricter-decoding-of-write-like-nfsv2-v3-ops.patch]
+3.2-wheezy-security: released (3.2.89-1)
diff --git a/retired/CVE-2017-8064 b/retired/CVE-2017-8064
new file mode 100644
index 00000000..faf64491
--- /dev/null
+++ b/retired/CVE-2017-8064
@@ -0,0 +1,14 @@
+Description: [media] dvb-usb-v2: avoid use-after-free
+References:
+Notes:
+ bwh> Introduced in 3.7 by commit d10d1b9ac97b
+ bwh> "[media] dvb_usb_v2: use dev_* logging macros"
+Bugs:
+upstream: released (4.11-rc1) [005145378c9ad7575a01b6ce1ba118fb427f583a]
+4.9-upstream-stable: released (4.9.24) [1992564156b5dc4ac73418e5b95e1a43f12f3cb1]
+3.16-upstream-stable: released (3.16.44) [522182342410708c54eb2b33ff36e85f0b045a6d]
+3.2-upstream-stable: N/A "Vulnerable code not present"
+sid: released (4.9.25-1)
+4.9-stretch-security: N/A "Fixed before branching point"
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/media-dvb-usb-v2-avoid-use-after-free.patch]
+3.2-wheezy-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2017-8890 b/retired/CVE-2017-8890
new file mode 100644
index 00000000..ca5cd021
--- /dev/null
+++ b/retired/CVE-2017-8890
@@ -0,0 +1,14 @@
+Description: dccp/tcp: do not inherit mc_list from parent
+References:
+Notes:
+ bwh> What's weird here is that it's possible to add a socket for a
+ bwh> connection-based protocol to a multicast group.
+Bugs:
+upstream: released (4.12-rc1) [657831ffc38e30092a2d5f03d385d710eb88b09a]
+4.9-upstream-stable: released (4.9.31) [4eed44029507acc666ac7afe9c6a8ea0abf857b7]
+3.16-upstream-stable: released (3.16.44) [e4d8daa3b0d195c8aead116dd70aad8124be60c3]
+3.2-upstream-stable: released (3.2.89) [3d221359fedfc759661fb4a72804b6e798886e8f]
+sid: released (4.9.30-1) [bugfix/all/dccp-tcp-do-not-inherit-mc_list-from-parent.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/dccp-tcp-do-not-inherit-mc_list-from-parent.patch]
+3.2-wheezy-security: released (3.2.89-1)
diff --git a/retired/CVE-2017-8924 b/retired/CVE-2017-8924
new file mode 100644
index 00000000..b9c1d62d
--- /dev/null
+++ b/retired/CVE-2017-8924
@@ -0,0 +1,12 @@
+Description: information leak in io_ti USB driver
+References:
+Notes:
+Bugs:
+upstream: released (4.11-rc2) [654b404f2a222f918af9b0cd18ad469d0c941a8e]
+4.9-upstream-stable: released (4.9.16) [d0ef6ecee85e17742d8bce1559872cb542d6ccac]
+3.16-upstream-stable: released (3.16.44) [f7287278eea268132ab71b30a0425ccf3a13a323]
+3.2-upstream-stable: released (3.2.89) [6d0c587048c85ca94723fc1bd900130cbe875eb3]
+sid: released (4.9.16-1)
+4.9-stretch-security: N/A "Fixed before branching point"
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/usb-serial-io_ti-fix-information-leak-in-completion-.patch]
+3.2-wheezy-security: released (3.2.89-1)
diff --git a/retired/CVE-2017-8925 b/retired/CVE-2017-8925
new file mode 100644
index 00000000..1b5c38f6
--- /dev/null
+++ b/retired/CVE-2017-8925
@@ -0,0 +1,12 @@
+Description: tty exhaustion DoS in omninet USB driver
+References:
+Notes:
+Bugs:
+upstream: released (4.11-rc2) [30572418b445d85fcfe6c8fe84c947d2606767d8]
+4.9-upstream-stable: released (4.9.16) [6d6c5895f45431579c20f4183b25183f0e3afc92]
+3.16-upstream-stable: released (3.16.44) [e766215595e90b7a307cc7c7054ff43e96340731]
+3.2-upstream-stable: released (3.2.89) [8b236342396140be22ab9b486c412666f161af78]
+sid: released (4.9.16-1)
+4.9-stretch-security: N/A "Fixed before branching point"
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/usb-serial-omninet-fix-reference-leaks-at-open.patch]
+3.2-wheezy-security: released (3.2.89-1)
diff --git a/retired/CVE-2017-9074 b/retired/CVE-2017-9074
new file mode 100644
index 00000000..7bf31d55
--- /dev/null
+++ b/retired/CVE-2017-9074
@@ -0,0 +1,16 @@
+Description: ipv6: Prevent overrun when parsing v6 header options
+References:
+Notes:
+ carnil> Requires as well 7dd7eb9513bd02184d45f000ab69d78cb1fa1531
+ carnil> which fixes 2423496af35d94a87156b063ea5cedffc10a70a1
+ bwh> Also requires 6e80ac5cc992ab6256c3dae87f7e57db15e1a58c and
+ bwh> e3e86b5119f81e5e2499bea7ea1ebe8ac6aab789
+Bugs:
+upstream: released (4.12-rc2) [2423496af35d94a87156b063ea5cedffc10a70a1]
+4.9-upstream-stable: released (4.9.31) [a2c845e51a820549a6df5a1e8907ee754422119e]
+3.16-upstream-stable: released (3.16.44) [3bff722de601acaf593a1ade13fbbee54b688e9b]
+3.2-upstream-stable: released (3.2.89) [ad8a4d9d3f255a783d534a47d4b4ac611bb291d8]
+sid: released (4.9.30-1) [bugfix/all/ipv6-prevent-overrun-when-parsing-v6-header-options.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/ipv6-prevent-overrun-when-parsing-v6-header-options.patch]
+3.2-wheezy-security: released (3.2.89-1)
diff --git a/retired/CVE-2017-9075 b/retired/CVE-2017-9075
new file mode 100644
index 00000000..daea32eb
--- /dev/null
+++ b/retired/CVE-2017-9075
@@ -0,0 +1,12 @@
+Description: sctp: do not inherit ipv6_{mc|ac|fl}_list from parent
+References:
+Notes:
+Bugs:
+upstream: released (4.12-rc2) [fdcee2cbb8438702ea1b328fb6e0ac5e9a40c7f8]
+4.9-upstream-stable: released (4.9.31) [5e7d9f0b3f729a64b99e58047f7bb0ff36acb759]
+3.16-upstream-stable: released (3.16.44) [60e7579f4b71e2e8b252d2f1b3ef5ffb3b971a4e]
+3.2-upstream-stable: released (3.2.89) [cc1fa7814bdb7ebee2ee79bbce181c0783de9ad5]
+sid: released (4.9.30-1) [bugfix/all/sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent.patch]
+3.2-wheezy-security: released (3.2.89-1)
diff --git a/retired/CVE-2017-9076 b/retired/CVE-2017-9076
new file mode 100644
index 00000000..05249e5c
--- /dev/null
+++ b/retired/CVE-2017-9076
@@ -0,0 +1,12 @@
+Description: ipv6/dccp: do not inherit ipv6_mc_list from parent (dccp_v6_request_recv_sock)
+References:
+Notes:
+Bugs:
+upstream: released (4.12-rc2) [83eaddab4378db256d00d295bda6ca997cd13a52]
+4.9-upstream-stable: released (4.9.31) [4bd8f5e38e5a1612ce4373068b518b14d3e38ec8]
+3.16-upstream-stable: released (3.16.44) [53d48f98b800059504da76d12bf0074581aa0fe2]
+3.2-upstream-stable: released (3.2.89) [0767192a2c4ac9145a7e8fb00370963bc145a920]
+sid: released (4.9.30-1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
+3.2-wheezy-security: released (3.2.89-1)
diff --git a/retired/CVE-2017-9077 b/retired/CVE-2017-9077
new file mode 100644
index 00000000..dc407781
--- /dev/null
+++ b/retired/CVE-2017-9077
@@ -0,0 +1,12 @@
+Description: ipv6/dccp: do not inherit ipv6_mc_list from parent (tcp_v6_syn_recv_sock)
+References:
+Notes:
+Bugs:
+upstream: released (4.12-rc2) [83eaddab4378db256d00d295bda6ca997cd13a52]
+4.9-upstream-stable: released (4.9.31) [4bd8f5e38e5a1612ce4373068b518b14d3e38ec8]
+3.16-upstream-stable: released (3.16.44) [53d48f98b800059504da76d12bf0074581aa0fe2]
+3.2-upstream-stable: released (3.2.89) [0767192a2c4ac9145a7e8fb00370963bc145a920]
+sid: released (4.9.30-1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
+3.2-wheezy-security: released (3.2.89-1)
diff --git a/retired/CVE-2017-9242 b/retired/CVE-2017-9242
new file mode 100644
index 00000000..fe98b8e2
--- /dev/null
+++ b/retired/CVE-2017-9242
@@ -0,0 +1,12 @@
+Description: ipv6: fix out of bound writes in __ip6_append_data()
+References:
+Notes:
+Bugs:
+upstream: released (4.12-rc3) [232cd35d0804cc241eb887bb8d4d9b3b9881c64a]
+4.9-upstream-stable: released (4.9.31) [304b41014acbdc5fa5126c86bac31dc41a245f9f]
+3.16-upstream-stable: released (3.16.44) [55c51263ff43e3bf5deb1425f4221696f94db1be]
+3.2-upstream-stable: released (3.2.89) [e5238fca9694d61861096d5fb80685c9f6581555]
+sid: released (4.9.30-1) [bugfix/all/ipv6-fix-out-of-bound-writes-in-__ip6_append_data.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/ipv6-fix-out-of-bound-writes-in-__ip6_append_data.patch]
+3.2-wheezy-security: released (3.2.89-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy