diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2017-01-14 12:32:38 +0000 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2017-01-14 12:32:38 +0000 |
commit | bc76e5f140f1b04071ba7f4ccc1a971b4cd4afa4 (patch) | |
tree | 7b39a639a5354698740ad5434646e12c8ce1d527 /retired | |
parent | ffe83b224f9033a1aa67284ba75539c338b0b202 (diff) |
Retire CVEs which are released everywhere
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@4836 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired')
-rw-r--r-- | retired/CVE-2015-1350 | 16 | ||||
-rw-r--r-- | retired/CVE-2015-8955 | 11 | ||||
-rw-r--r-- | retired/CVE-2016-5412 | 14 | ||||
-rw-r--r-- | retired/CVE-2016-7097 | 13 | ||||
-rw-r--r-- | retired/CVE-2016-7910 | 10 | ||||
-rw-r--r-- | retired/CVE-2016-8633 | 11 | ||||
-rw-r--r-- | retired/CVE-2016-8658 | 15 | ||||
-rw-r--r-- | retired/CVE-2016-9083 | 11 | ||||
-rw-r--r-- | retired/CVE-2016-9084 | 11 | ||||
-rw-r--r-- | retired/CVE-2016-9754 | 10 | ||||
-rw-r--r-- | retired/CVE-2016-9806 | 12 |
11 files changed, 134 insertions, 0 deletions
diff --git a/retired/CVE-2015-1350 b/retired/CVE-2015-1350 new file mode 100644 index 00000000..a5f632cd --- /dev/null +++ b/retired/CVE-2015-1350 @@ -0,0 +1,16 @@ +Description: chown removes security.capability xattr on other users' files +References: + - http://www.openwall.com/lists/oss-security/2015/01/17/12 + - http://www.openwall.com/lists/oss-security/2015/01/24/5 +Notes: + bwh> The bug seems to have present ever since file capabilities were added + bwh> in 2.6.24. + carnil> prerequisite: 31051c85b5e2aaaf6315f74c72a732673632a905 + carnil> fixes backportable to older versions without breakage? +Bugs: 770492 +upstream: released (4.9-rc1) [030b533c4fd4d2ec3402363323de4bb2983c9cee] +sid: released (4.8.11-1) [bugfix/all/xfs-Propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/ceph-Propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/fuse-Propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/fs-Give-dentry-to-inode_change_ok-instead-of-inode.patch, bugfix/all/fs-Avoid-premature-clearing-of-capabilities.patch] +3.16-jessie-security: released (3.16.39-1) +3.2-wheezy-security: released (3.2.84-1) +3.16-upstream-stable: released (3.16.39) [fs-give-dentry-to-inode_change_ok-instead-of-inode.patch, fs-avoid-premature-clearing-of-capabilities.patch] +3.2-upstream-stable: released (3.2.84) [fs-give-dentry-to-inode_change_ok-instead-of-inode.patch, fs-avoid-premature-clearing-of-capabilities.patch] diff --git a/retired/CVE-2015-8955 b/retired/CVE-2015-8955 new file mode 100644 index 00000000..60b16dc7 --- /dev/null +++ b/retired/CVE-2015-8955 @@ -0,0 +1,11 @@ +Description: Incomplete validation of hardware perf_events on arm64 +References: +Notes: + bwh> Minor issue for Debian since we restrict access to perf_event by default +Bugs: +upstream: released (4.1-rc1) [8fff105e13041e49b82f92eef034f363a6b1c071] +3.16-upstream-stable: released (3.16.39) [arm64-perf-reject-groups-spanning-multiple-hw-pmus.patch] +3.2-upstream-stable: N/A "Vulnerable architecture not present" +sid: released (4.1.3-1) +3.16-jessie-security: released (3.16.39-1) +3.2-wheezy-security: N/A "Vulnerable architecture not present" diff --git a/retired/CVE-2016-5412 b/retired/CVE-2016-5412 new file mode 100644 index 00000000..09d03b71 --- /dev/null +++ b/retired/CVE-2016-5412 @@ -0,0 +1,14 @@ +Description: +References: + https://bugzilla.redhat.com/show_bug.cgi?id=1349916 + https://marc.info/?l=kvm&m=146968629127349&w=2 + https://marc.info/?l=kvm&m=146968629627356&w=2 + https://marc.info/?l=kvm&m=146968629427354&w=2 +Notes: +Bugs: +upstream: released (4.8-rc1) [f024ee098476a3e620232e4a78cfac505f121245, 93d17397e4e2182fdaad503e2f9da46202c0f1c3] +3.16-upstream-stable: released (3.16.37) [kvm-ppc-book3s-hv-pull-out-tm-state-save-restore-into-separate.patch, kvm-ppc-book3s-hv-save-restore-tm-state-in-h_cede.patch] +3.2-upstream-stable: N/A "Transactional memory is not supported" +sid: released (4.7.2-1) +3.16-jessie-security: released (3.16.39-1) +3.2-wheezy-security: N/A "Transactional memory is not supported" diff --git a/retired/CVE-2016-7097 b/retired/CVE-2016-7097 new file mode 100644 index 00000000..37e66c41 --- /dev/null +++ b/retired/CVE-2016-7097 @@ -0,0 +1,13 @@ +Description: Setting a POSIX ACL via setxattr doesn't clear the setgid bit +References: + http://www.spinics.net/lists/linux-fsdevel/msg98328.html + http://marc.info/?l=linux-fsdevel&m=147162313630259&w=2 + https://bugzilla.redhat.com/show_bug.cgi?id=1368938 +Notes: +Bugs: +upstream: released (4.9-rc1) [073931017b49d9458aa351605b43a7e34598caef] +3.16-upstream-stable: released (3.16.39) [posix_acl-clear-sgid-bit-when-setting-file-permissions.patch] +3.2-upstream-stable: released (3.2.84) [posix_acl-clear-sgid-bit-when-setting-file-permissions.patch] +sid: released (4.7.8-1) [bugfix/all/posix_acl-clear-sgid-bit-when-setting-file-permissio.patch] +3.16-jessie-security: released (3.16.39-1) +3.2-wheezy-security: released (3.2.84-1) diff --git a/retired/CVE-2016-7910 b/retired/CVE-2016-7910 new file mode 100644 index 00000000..7bfe7ce8 --- /dev/null +++ b/retired/CVE-2016-7910 @@ -0,0 +1,10 @@ +Description: Use-after-free in /proc/partitions implementation +References: +Notes: +Bugs: +upstream: released (4.8-rc1) [77da160530dd1dc94f6ae15a981f24e5f0021e84] +3.16-upstream-stable: released (3.16.39) +3.2-upstream-stable: released (3.2.84) +sid: released (4.7.2-1) +3.16-jessie-security: released (3.16.39-1) +3.2-wheezy-security: released (3.2.84-1) diff --git a/retired/CVE-2016-8633 b/retired/CVE-2016-8633 new file mode 100644 index 00000000..4bce5886 --- /dev/null +++ b/retired/CVE-2016-8633 @@ -0,0 +1,11 @@ +Description: +References: + https://eyalitkin.wordpress.com/2016/11/06/cve-publication-cve-2016-8633/ +Notes: +Bugs: +upstream: released (4.9-rc4) [667121ace9dbafb368618dbabcf07901c962ddac] +3.16-upstream-stable: released (3.16.39) [firewire-net-guard-against-rx-buffer-overflows.patch] +3.2-upstream-stable: released (3.2.84) [firewire-net-guard-against-rx-buffer-overflows.patch] +sid: released (4.8.7-1) +3.16-jessie-security: released (3.16.39-1) +3.2-wheezy-security: released (3.2.84-1) diff --git a/retired/CVE-2016-8658 b/retired/CVE-2016-8658 new file mode 100644 index 00000000..282f1034 --- /dev/null +++ b/retired/CVE-2016-8658 @@ -0,0 +1,15 @@ +Description: Stack buffer overflow in brcmfmac driver +References: +Notes: + bwh> Appears to have been introduced in 3.7 by commit 1a8733423975, + bwh> contrary to the commit message. Source file was introduced as + bwh> drivers/net/wireless/brcm80211/brcmfmac/wl_cfg80211.c, renamed to + bwh> drivers/net/wireless/brcm80211/brcmfmac/cfg80211.c and then to + bwh> drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c +Bugs: +upstream: released (4.8-rc8) [ded89912156b1a47d940a0c954c43afbabd0c42c] +3.16-upstream-stable: released (3.16.39) [brcmfmac-avoid-potential-stack-overflow-in-brcmf_cfg80211_start_ap.patch] +3.2-upstream-stable: N/A "Vulnerable code not present" +sid: released (4.7.5-1) +3.16-jessie-security: released (3.16.39-1) +3.2-wheezy-security: N/A "Vulnerable code not present" diff --git a/retired/CVE-2016-9083 b/retired/CVE-2016-9083 new file mode 100644 index 00000000..433fb4d3 --- /dev/null +++ b/retired/CVE-2016-9083 @@ -0,0 +1,11 @@ +Description: Incomplete parameter validation in vfio_pci driver +References: +Notes: + https://patchwork.kernel.org/patch/9373631/ +Bugs: +upstream: released (4.9-rc4) [05692d7005a364add85c6e25a6c4447ce08f913a] +3.16-upstream-stable: released (3.16.39) [vfio-pci-fix-integer-overflows-bitmask-check.patch] +3.2-upstream-stable: N/A "Vulnerable code not present" +sid: released (4.8.11-1) [bugfix/all/vfio-pci-Fix-integer-overflows-bitmask-check.patch] +3.16-jessie-security: released (3.16.39-1) +3.2-wheezy-security: N/A "Vulnerable code not present" diff --git a/retired/CVE-2016-9084 b/retired/CVE-2016-9084 new file mode 100644 index 00000000..958a441d --- /dev/null +++ b/retired/CVE-2016-9084 @@ -0,0 +1,11 @@ +Description: Integer overflow in vfio_pci driver +References: +Notes: + https://patchwork.kernel.org/patch/9373631/ +Bugs: +upstream: released (4.9-rc4) [05692d7005a364add85c6e25a6c4447ce08f913a] +3.16-upstream-stable: released (3.16.39) [vfio-pci-fix-integer-overflows-bitmask-check.patch] +3.2-upstream-stable: N/A "Vulnerable code not present" +sid: released (4.8.11-1) [bugfix/all/vfio-pci-Fix-integer-overflows-bitmask-check.patch] +3.16-jessie-security: released (3.16.39-1) +3.2-wheezy-security: N/A "Vulnerable code not present" diff --git a/retired/CVE-2016-9754 b/retired/CVE-2016-9754 new file mode 100644 index 00000000..ce16fa2d --- /dev/null +++ b/retired/CVE-2016-9754 @@ -0,0 +1,10 @@ +Description: Integer overflow in ring_buffer_resize() +References: +Notes: +Bugs: +upstream: released (4.7-rc1) [59643d1535eb220668692a5359de22545af579f6] +3.16-upstream-stable: released (3.16.37) [e5e2cbc7f25c06266bba5072adab68cc64f71401] +3.2-upstream-stable: N/A "Vulnerable code introduced in 3.5-rc1 with 83f40318dab00e3298a1f6d0b12ac025e84e478d +sid: released (4.6.1-1) +3.16-jessie-security: released (3.16.39-1) +3.2-wheezy-security: N/A "Vulnerable code not present" diff --git a/retired/CVE-2016-9806 b/retired/CVE-2016-9806 new file mode 100644 index 00000000..cea1dd4e --- /dev/null +++ b/retired/CVE-2016-9806 @@ -0,0 +1,12 @@ +Description: double free in netlink_dump +References: +Notes: + bwh> Introduced by commit 16b304f3404f "netlink: Eliminate kmalloc in + bwh> netlink dump operation." in 3.12. +Bugs: +upstream: released (4.7-rc1) [92964c79b357efd980812c4de5c1fd2ec8bb5520] +3.16-upstream-stable: released (3.16.37) +3.2-upstream-stable: N/A "Vulnerable code not present" +sid: released (4.6.3-1) +3.16-jessie-security: released (3.16.39-1) +3.2-wheezy-security: N/A "Vulnerable code not present" |