[kernel-sec-discuss] r4387 - active
Ben Hutchings
benh at moszumanska.debian.org
Mon May 16 00:02:34 UTC 2016
Author: benh
Date: 2016-05-16 00:02:33 +0000 (Mon, 16 May 2016)
New Revision: 4387
Modified:
active/CVE-2016-0758
active/CVE-2016-3070
active/CVE-2016-4482
active/CVE-2016-4485
active/CVE-2016-4486
active/CVE-2016-4569
active/CVE-2016-4578
active/CVE-2016-4794
Log:
Fill in more details of recently added issues
Fixes most of the 'unknown' statuses.
Modified: active/CVE-2016-0758
===================================================================
--- active/CVE-2016-0758 2016-05-15 18:07:09 UTC (rev 4386)
+++ active/CVE-2016-0758 2016-05-16 00:02:33 UTC (rev 4387)
@@ -4,9 +4,9 @@
Notes:
Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1300257
-upstream: pending [23c8a812dc3c621009e4f0e5342aa4e2ede1ceaa]
-3.16-upstream-stable:
+upstream: pending (4.6) [23c8a812dc3c621009e4f0e5342aa4e2ede1ceaa]
+3.16-upstream-stable: needed
3.2-upstream-stable: N/A "Vulnerable code introduced by 42d5ec27f873c654a68f7f865dcd7737513e9508 (3.10-rc1)
sid: pending (4.5.4-1) [bugfix/all/KEYS-Fix-ASN.1-indefinite-length-object-parsing.patch]
-3.16-jessie-security:
+3.16-jessie-security: N/A "Vulnerable code is not built"
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2016-3070
===================================================================
--- active/CVE-2016-3070 2016-05-15 18:07:09 UTC (rev 4386)
+++ active/CVE-2016-3070 2016-05-16 00:02:33 UTC (rev 4387)
@@ -1,10 +1,14 @@
Description: Null pointer dereference in trace_writeback_dirty_page()
References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1306851 (not yet public)
Notes:
+ bwh> Problematic call sequence removed by upstream commit appears to be:
+ bwh> migrate_page_copy() -> __set_page_dirty_nobuffers()
+ bwh> -> account_page_dirtied() -> trace_writeback_dirty_page()
Bugs:
upstream: released (4.4-rc1) [42cb14b110a5698ccf26ce59c4441722605a3743]
-3.16-upstream-stable:
-3.2-upstream-stable:
+3.16-upstream-stable: needed
+3.2-upstream-stable: N/A ("Vulnerable code not present")
sid: released (4.4.2-1)
-3.16-jessie-security:
-3.2-wheezy-security:
+3.16-jessie-security: needed
+3.2-wheezy-security: N/A ("Vulnerable code not present")
Modified: active/CVE-2016-4482
===================================================================
--- active/CVE-2016-4482 2016-05-15 18:07:09 UTC (rev 4386)
+++ active/CVE-2016-4482 2016-05-16 00:02:33 UTC (rev 4387)
@@ -2,10 +2,13 @@
References:
http://www.spinics.net/lists/linux-usb/msg140243.html
Notes:
+ bwh> There may or may not be an information leak here in practice,
+ bwh> depending on how the compiler optimises the structure
+ bwh> initialisation.
Bugs:
-upstream:
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid:
-3.16-jessie-security:
-3.2-wheezy-security:
+upstream: needed
+3.16-upstream-stable: needed
+3.2-upstream-stable: needed
+sid: needed
+3.16-jessie-security: needed
+3.2-wheezy-security: needed
Modified: active/CVE-2016-4485
===================================================================
--- active/CVE-2016-4485 2016-05-15 18:07:09 UTC (rev 4386)
+++ active/CVE-2016-4485 2016-05-16 00:02:33 UTC (rev 4387)
@@ -2,9 +2,9 @@
References:
Notes:
Bugs:
-upstream: pending [b8670c09f37bdf2847cc44f36511a53afc6161fd]
-3.16-upstream-stable:
-3.2-upstream-stable:
+upstream: pending (4.6) [b8670c09f37bdf2847cc44f36511a53afc6161fd]
+3.16-upstream-stable: needed
+3.2-upstream-stable: needed
sid: pending (4.5.4-1) [bugfix/all/net-fix-infoleak-in-llc.patch]
-3.16-jessie-security:
-3.2-wheezy-security:
+3.16-jessie-security: needed
+3.2-wheezy-security: needed
Modified: active/CVE-2016-4486
===================================================================
--- active/CVE-2016-4486 2016-05-15 18:07:09 UTC (rev 4386)
+++ active/CVE-2016-4486 2016-05-16 00:02:33 UTC (rev 4387)
@@ -2,9 +2,9 @@
References:
Notes:
Bugs:
-upstream: pending [5f8e44741f9f216e33736ea4ec65ca9ac03036e6]
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid:
-3.16-jessie-security:
-3.2-wheezy-security:
+upstream: pending (4.6) [5f8e44741f9f216e33736ea4ec65ca9ac03036e6]
+3.16-upstream-stable: needed
+3.2-upstream-stable: needed
+sid: needed
+3.16-jessie-security: needed
+3.2-wheezy-security: needed
Modified: active/CVE-2016-4569
===================================================================
--- active/CVE-2016-4569 2016-05-15 18:07:09 UTC (rev 4386)
+++ active/CVE-2016-4569 2016-05-16 00:02:33 UTC (rev 4387)
@@ -1,11 +1,13 @@
-Description:
+Description: information leak in ALSA timers
References:
http://comments.gmane.org/gmane.linux.kernel/2214250
Notes:
+ bwh> This only affects 64-bit architectures as no padding is needed in
+ bwh> struct snd_timer_tread on 32-bit architectures.
Bugs:
-upstream:
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid:
-3.16-jessie-security:
-3.2-wheezy-security:
+upstream: needed
+3.16-upstream-stable: needed
+3.2-upstream-stable: needed
+sid: needed
+3.16-jessie-security: needed
+3.2-wheezy-security: needed
Modified: active/CVE-2016-4578
===================================================================
--- active/CVE-2016-4578 2016-05-15 18:07:09 UTC (rev 4386)
+++ active/CVE-2016-4578 2016-05-16 00:02:33 UTC (rev 4387)
@@ -1,13 +1,15 @@
-Description:
+Description: information leaks in ALSA timers
References:
https://git.kernel.org/cgit/linux/kernel/git/tiwai/sound.git/commit/?h=for-next&id=9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6
https://git.kernel.org/cgit/linux/kernel/git/tiwai/sound.git/commit/?h=for-next&id=e4ec8cc8039a7063e24204299b462bd1383184a5
But both commits not yet merged in Linus' tree
Notes:
+ bwh> This only affects 64-bit architectures as no padding is needed in
+ bwh> struct snd_timer_tread on 32-bit architectures.
Bugs:
-upstream:
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid:
-3.16-jessie-security:
-3.2-wheezy-security:
+upstream: needed
+3.16-upstream-stable: needed
+3.2-upstream-stable: needed
+sid: needed
+3.16-jessie-security: needed
+3.2-wheezy-security: needed
Modified: active/CVE-2016-4794
===================================================================
--- active/CVE-2016-4794 2016-05-15 18:07:09 UTC (rev 4386)
+++ active/CVE-2016-4794 2016-05-16 00:02:33 UTC (rev 4387)
@@ -1,11 +1,14 @@
-Description:
+Description: Use-after-free in pcpu_extend_area_map, triggered by bpf()
References:
Reproducer: http://www.openwall.com/lists/oss-security/2016/05/12/6
+ http://thread.gmane.org/gmane.linux.network/408459/
Notes:
+ bwh> It's not clear whether this is specific to bpf() or an existing bug
+ bwh> that's now easier to hit (and exploit).
Bugs:
upstream: needed
3.16-upstream-stable:
3.2-upstream-stable:
-sid:
+sid: needed
3.16-jessie-security:
3.2-wheezy-security:
More information about the kernel-sec-discuss
mailing list