summaryrefslogtreecommitdiffstats
path: root/retired
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2017-01-14 12:32:38 +0000
committerSalvatore Bonaccorso <carnil@debian.org>2017-01-14 12:32:38 +0000
commitbc76e5f140f1b04071ba7f4ccc1a971b4cd4afa4 (patch)
tree7b39a639a5354698740ad5434646e12c8ce1d527 /retired
parentffe83b224f9033a1aa67284ba75539c338b0b202 (diff)
Retire CVEs which are released everywhere
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@4836 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired')
-rw-r--r--retired/CVE-2015-135016
-rw-r--r--retired/CVE-2015-895511
-rw-r--r--retired/CVE-2016-541214
-rw-r--r--retired/CVE-2016-709713
-rw-r--r--retired/CVE-2016-791010
-rw-r--r--retired/CVE-2016-863311
-rw-r--r--retired/CVE-2016-865815
-rw-r--r--retired/CVE-2016-908311
-rw-r--r--retired/CVE-2016-908411
-rw-r--r--retired/CVE-2016-975410
-rw-r--r--retired/CVE-2016-980612
11 files changed, 134 insertions, 0 deletions
diff --git a/retired/CVE-2015-1350 b/retired/CVE-2015-1350
new file mode 100644
index 00000000..a5f632cd
--- /dev/null
+++ b/retired/CVE-2015-1350
@@ -0,0 +1,16 @@
+Description: chown removes security.capability xattr on other users' files
+References:
+ - http://www.openwall.com/lists/oss-security/2015/01/17/12
+ - http://www.openwall.com/lists/oss-security/2015/01/24/5
+Notes:
+ bwh> The bug seems to have present ever since file capabilities were added
+ bwh> in 2.6.24.
+ carnil> prerequisite: 31051c85b5e2aaaf6315f74c72a732673632a905
+ carnil> fixes backportable to older versions without breakage?
+Bugs: 770492
+upstream: released (4.9-rc1) [030b533c4fd4d2ec3402363323de4bb2983c9cee]
+sid: released (4.8.11-1) [bugfix/all/xfs-Propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/ceph-Propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/fuse-Propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/fs-Give-dentry-to-inode_change_ok-instead-of-inode.patch, bugfix/all/fs-Avoid-premature-clearing-of-capabilities.patch]
+3.16-jessie-security: released (3.16.39-1)
+3.2-wheezy-security: released (3.2.84-1)
+3.16-upstream-stable: released (3.16.39) [fs-give-dentry-to-inode_change_ok-instead-of-inode.patch, fs-avoid-premature-clearing-of-capabilities.patch]
+3.2-upstream-stable: released (3.2.84) [fs-give-dentry-to-inode_change_ok-instead-of-inode.patch, fs-avoid-premature-clearing-of-capabilities.patch]
diff --git a/retired/CVE-2015-8955 b/retired/CVE-2015-8955
new file mode 100644
index 00000000..60b16dc7
--- /dev/null
+++ b/retired/CVE-2015-8955
@@ -0,0 +1,11 @@
+Description: Incomplete validation of hardware perf_events on arm64
+References:
+Notes:
+ bwh> Minor issue for Debian since we restrict access to perf_event by default
+Bugs:
+upstream: released (4.1-rc1) [8fff105e13041e49b82f92eef034f363a6b1c071]
+3.16-upstream-stable: released (3.16.39) [arm64-perf-reject-groups-spanning-multiple-hw-pmus.patch]
+3.2-upstream-stable: N/A "Vulnerable architecture not present"
+sid: released (4.1.3-1)
+3.16-jessie-security: released (3.16.39-1)
+3.2-wheezy-security: N/A "Vulnerable architecture not present"
diff --git a/retired/CVE-2016-5412 b/retired/CVE-2016-5412
new file mode 100644
index 00000000..09d03b71
--- /dev/null
+++ b/retired/CVE-2016-5412
@@ -0,0 +1,14 @@
+Description:
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1349916
+ https://marc.info/?l=kvm&m=146968629127349&w=2
+ https://marc.info/?l=kvm&m=146968629627356&w=2
+ https://marc.info/?l=kvm&m=146968629427354&w=2
+Notes:
+Bugs:
+upstream: released (4.8-rc1) [f024ee098476a3e620232e4a78cfac505f121245, 93d17397e4e2182fdaad503e2f9da46202c0f1c3]
+3.16-upstream-stable: released (3.16.37) [kvm-ppc-book3s-hv-pull-out-tm-state-save-restore-into-separate.patch, kvm-ppc-book3s-hv-save-restore-tm-state-in-h_cede.patch]
+3.2-upstream-stable: N/A "Transactional memory is not supported"
+sid: released (4.7.2-1)
+3.16-jessie-security: released (3.16.39-1)
+3.2-wheezy-security: N/A "Transactional memory is not supported"
diff --git a/retired/CVE-2016-7097 b/retired/CVE-2016-7097
new file mode 100644
index 00000000..37e66c41
--- /dev/null
+++ b/retired/CVE-2016-7097
@@ -0,0 +1,13 @@
+Description: Setting a POSIX ACL via setxattr doesn't clear the setgid bit
+References:
+ http://www.spinics.net/lists/linux-fsdevel/msg98328.html
+ http://marc.info/?l=linux-fsdevel&m=147162313630259&w=2
+ https://bugzilla.redhat.com/show_bug.cgi?id=1368938
+Notes:
+Bugs:
+upstream: released (4.9-rc1) [073931017b49d9458aa351605b43a7e34598caef]
+3.16-upstream-stable: released (3.16.39) [posix_acl-clear-sgid-bit-when-setting-file-permissions.patch]
+3.2-upstream-stable: released (3.2.84) [posix_acl-clear-sgid-bit-when-setting-file-permissions.patch]
+sid: released (4.7.8-1) [bugfix/all/posix_acl-clear-sgid-bit-when-setting-file-permissio.patch]
+3.16-jessie-security: released (3.16.39-1)
+3.2-wheezy-security: released (3.2.84-1)
diff --git a/retired/CVE-2016-7910 b/retired/CVE-2016-7910
new file mode 100644
index 00000000..7bfe7ce8
--- /dev/null
+++ b/retired/CVE-2016-7910
@@ -0,0 +1,10 @@
+Description: Use-after-free in /proc/partitions implementation
+References:
+Notes:
+Bugs:
+upstream: released (4.8-rc1) [77da160530dd1dc94f6ae15a981f24e5f0021e84]
+3.16-upstream-stable: released (3.16.39)
+3.2-upstream-stable: released (3.2.84)
+sid: released (4.7.2-1)
+3.16-jessie-security: released (3.16.39-1)
+3.2-wheezy-security: released (3.2.84-1)
diff --git a/retired/CVE-2016-8633 b/retired/CVE-2016-8633
new file mode 100644
index 00000000..4bce5886
--- /dev/null
+++ b/retired/CVE-2016-8633
@@ -0,0 +1,11 @@
+Description:
+References:
+ https://eyalitkin.wordpress.com/2016/11/06/cve-publication-cve-2016-8633/
+Notes:
+Bugs:
+upstream: released (4.9-rc4) [667121ace9dbafb368618dbabcf07901c962ddac]
+3.16-upstream-stable: released (3.16.39) [firewire-net-guard-against-rx-buffer-overflows.patch]
+3.2-upstream-stable: released (3.2.84) [firewire-net-guard-against-rx-buffer-overflows.patch]
+sid: released (4.8.7-1)
+3.16-jessie-security: released (3.16.39-1)
+3.2-wheezy-security: released (3.2.84-1)
diff --git a/retired/CVE-2016-8658 b/retired/CVE-2016-8658
new file mode 100644
index 00000000..282f1034
--- /dev/null
+++ b/retired/CVE-2016-8658
@@ -0,0 +1,15 @@
+Description: Stack buffer overflow in brcmfmac driver
+References:
+Notes:
+ bwh> Appears to have been introduced in 3.7 by commit 1a8733423975,
+ bwh> contrary to the commit message. Source file was introduced as
+ bwh> drivers/net/wireless/brcm80211/brcmfmac/wl_cfg80211.c, renamed to
+ bwh> drivers/net/wireless/brcm80211/brcmfmac/cfg80211.c and then to
+ bwh> drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
+Bugs:
+upstream: released (4.8-rc8) [ded89912156b1a47d940a0c954c43afbabd0c42c]
+3.16-upstream-stable: released (3.16.39) [brcmfmac-avoid-potential-stack-overflow-in-brcmf_cfg80211_start_ap.patch]
+3.2-upstream-stable: N/A "Vulnerable code not present"
+sid: released (4.7.5-1)
+3.16-jessie-security: released (3.16.39-1)
+3.2-wheezy-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2016-9083 b/retired/CVE-2016-9083
new file mode 100644
index 00000000..433fb4d3
--- /dev/null
+++ b/retired/CVE-2016-9083
@@ -0,0 +1,11 @@
+Description: Incomplete parameter validation in vfio_pci driver
+References:
+Notes:
+ https://patchwork.kernel.org/patch/9373631/
+Bugs:
+upstream: released (4.9-rc4) [05692d7005a364add85c6e25a6c4447ce08f913a]
+3.16-upstream-stable: released (3.16.39) [vfio-pci-fix-integer-overflows-bitmask-check.patch]
+3.2-upstream-stable: N/A "Vulnerable code not present"
+sid: released (4.8.11-1) [bugfix/all/vfio-pci-Fix-integer-overflows-bitmask-check.patch]
+3.16-jessie-security: released (3.16.39-1)
+3.2-wheezy-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2016-9084 b/retired/CVE-2016-9084
new file mode 100644
index 00000000..958a441d
--- /dev/null
+++ b/retired/CVE-2016-9084
@@ -0,0 +1,11 @@
+Description: Integer overflow in vfio_pci driver
+References:
+Notes:
+ https://patchwork.kernel.org/patch/9373631/
+Bugs:
+upstream: released (4.9-rc4) [05692d7005a364add85c6e25a6c4447ce08f913a]
+3.16-upstream-stable: released (3.16.39) [vfio-pci-fix-integer-overflows-bitmask-check.patch]
+3.2-upstream-stable: N/A "Vulnerable code not present"
+sid: released (4.8.11-1) [bugfix/all/vfio-pci-Fix-integer-overflows-bitmask-check.patch]
+3.16-jessie-security: released (3.16.39-1)
+3.2-wheezy-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2016-9754 b/retired/CVE-2016-9754
new file mode 100644
index 00000000..ce16fa2d
--- /dev/null
+++ b/retired/CVE-2016-9754
@@ -0,0 +1,10 @@
+Description: Integer overflow in ring_buffer_resize()
+References:
+Notes:
+Bugs:
+upstream: released (4.7-rc1) [59643d1535eb220668692a5359de22545af579f6]
+3.16-upstream-stable: released (3.16.37) [e5e2cbc7f25c06266bba5072adab68cc64f71401]
+3.2-upstream-stable: N/A "Vulnerable code introduced in 3.5-rc1 with 83f40318dab00e3298a1f6d0b12ac025e84e478d
+sid: released (4.6.1-1)
+3.16-jessie-security: released (3.16.39-1)
+3.2-wheezy-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2016-9806 b/retired/CVE-2016-9806
new file mode 100644
index 00000000..cea1dd4e
--- /dev/null
+++ b/retired/CVE-2016-9806
@@ -0,0 +1,12 @@
+Description: double free in netlink_dump
+References:
+Notes:
+ bwh> Introduced by commit 16b304f3404f "netlink: Eliminate kmalloc in
+ bwh> netlink dump operation." in 3.12.
+Bugs:
+upstream: released (4.7-rc1) [92964c79b357efd980812c4de5c1fd2ec8bb5520]
+3.16-upstream-stable: released (3.16.37)
+3.2-upstream-stable: N/A "Vulnerable code not present"
+sid: released (4.6.3-1)
+3.16-jessie-security: released (3.16.39-1)
+3.2-wheezy-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy