summaryrefslogtreecommitdiffstats
path: root/retired
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2017-04-28 04:22:10 +0000
committerSalvatore Bonaccorso <carnil@debian.org>2017-04-28 04:22:10 +0000
commitf43050596507c5a376a3d6fbd8ee81f4be15d71b (patch)
treee142fb37d55ca9957d05eefd4f4856eec6fbb82d /retired
parent10767387e4a84e948ce275822bd4a100f187a559 (diff)
Retire two CVEs
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@5240 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired')
-rw-r--r--retired/CVE-2017-597015
-rw-r--r--retired/CVE-2017-810619
2 files changed, 34 insertions, 0 deletions
diff --git a/retired/CVE-2017-5970 b/retired/CVE-2017-5970
new file mode 100644
index 00000000..7b30fd0d
--- /dev/null
+++ b/retired/CVE-2017-5970
@@ -0,0 +1,15 @@
+Description: ipv4: Invalid IP options could cause skb->dst drop
+References:
+ http://seclists.org/oss-sec/2017/q1/414
+ https://patchwork.ozlabs.org/patch/724136/
+Notes:
+ bwh> This was actually introduced in 2.6.35 by commit f84af32cbca70
+ bwh> ("net: ip_queue_rcv_skb() helper").
+Bugs:
+upstream: released (4.10-rc8) [34b2cef20f19c87999fff3da4071e66937db9644]
+4.9-upstream-stable: released (4.9.11) [f5b54446630a973e1f27b68599366bbd0ac53066]
+3.16-upstream-stable: released (3.16.41) [ipv4-keep-skb-dst-around-in-presence-of-ip-options.patch]
+3.2-upstream-stable: released (3.2.88) [ipv4-keep-skb-dst-around-in-presence-of-ip-options.patch]
+sid: released (4.9.10-1) [bugfix/all/ipv4-keep-skb-dst-around-in-presence-of-IP-options.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/ipv4-keep-skb-dst-around-in-presence-of-ip-options.patch]
+3.2-wheezy-security: released (3.2.88-1)
diff --git a/retired/CVE-2017-8106 b/retired/CVE-2017-8106
new file mode 100644
index 00000000..d06c24b9
--- /dev/null
+++ b/retired/CVE-2017-8106
@@ -0,0 +1,19 @@
+Description: nVMX: Check current_vmcs12 before accessing in handle_invept()
+References:
+Notes:
+ carnil> Introduced in bfd0a56b90005f8c8a004baf407ad90045c2b11e (3.12-rc1)
+ carnil> for linux-3.2.y commit 02a988e6e4511b1f6d83525710a12db9c5a45149 (3.2.64)
+ carnil> backports bfd0a56b90005f8c8a004baf407ad90045c2b11e but is quite
+ carnil> reduced.
+ bwh> The backport to 3.2 was a *non*-implementation of INVEPT that doesn't
+ bwh> have this issue.
+Bugs:
+ https://bugzilla.kernel.org/show_bug.cgi?id=195167
+ https://launchpad.net/bugs/1678676
+upstream: released (3.16-rc4) [4b855078601fc422dbac3059f2215e776f49780f]
+4.9-upstream-stable: N/A "Fixed before branch point"
+3.16-upstream-stable: N/A "Fixed before branch point"
+3.2-upstream-stable: N/A "Vulnerable code not present"
+sid: released (3.16.2-1)
+3.16-jessie-security: N/A "Vulnerable code not present"
+3.2-wheezy-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy