[kernel-sec-discuss] r5210 - active retired

Salvatore Bonaccorso carnil at moszumanska.debian.org
Sun Apr 23 11:09:04 UTC 2017


Author: carnil
Date: 2017-04-23 11:09:04 +0000 (Sun, 23 Apr 2017)
New Revision: 5210

Added:
   retired/CVE-2017-8062
   retired/CVE-2017-8065
   retired/CVE-2017-8068
   retired/CVE-2017-8069
   retired/CVE-2017-8070
Removed:
   active/CVE-2017-8062
   active/CVE-2017-8065
   active/CVE-2017-8068
   active/CVE-2017-8069
   active/CVE-2017-8070
Log:
Reitre more CVEs fixed or N/A everywhere tracked

Deleted: active/CVE-2017-8062
===================================================================
--- active/CVE-2017-8062	2017-04-23 11:09:01 UTC (rev 5209)
+++ active/CVE-2017-8062	2017-04-23 11:09:04 UTC (rev 5210)
@@ -1,11 +0,0 @@
-Description: [media] dw2102: don't do DMA on stack
-References:
-Notes:
-Bugs:
-upstream: released (4.11-rc2) [606142af57dad981b78707234cfbd15f9f7b7125]
-4.9-upstream-stable: released (4.9.16) [06996254a605913cd7c1927d0e8a89b5138e110d
-3.16-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
-3.2-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
-sid: released (4.9.16-1)
-3.16-jessie-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
-3.2-wheezy-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"

Deleted: active/CVE-2017-8065
===================================================================
--- active/CVE-2017-8065	2017-04-23 11:09:01 UTC (rev 5209)
+++ active/CVE-2017-8065	2017-04-23 11:09:04 UTC (rev 5210)
@@ -1,12 +0,0 @@
-Description: crypto: ccm - move cbcmac input off the stack
-References:
-Notes:
- carnil> Should be introduced only with f15f05b0a5de (4.11-rc1)
-Bugs:
-upstream: released (4.11-rc1) [3b30460c5b0ed762be75a004e924ec3f8711e032]
-4.9-upstream-stable: N/A "Vulnerable code not present"
-3.16-upstream-stable: N/A "Vulnerable code not present"
-3.2-upstream-stable: N/A "Vulnerable code not present"
-sid: N/A "Vulnerable code not present"
-3.16-jessie-security: N/A "Vulnerable code not present"
-3.2-wheezy-security: N/A "Vulnerable code not present"

Deleted: active/CVE-2017-8068
===================================================================
--- active/CVE-2017-8068	2017-04-23 11:09:01 UTC (rev 5209)
+++ active/CVE-2017-8068	2017-04-23 11:09:04 UTC (rev 5210)
@@ -1,11 +0,0 @@
-Description: pegasus: Use heap buffers for all register access
-References:
-Notes:
-Bugs:
-upstream: released (4.10-rc8) [5593523f968bc86d42a035c6df47d5e0979b5ace]
-4.9-upstream-stable: released (4.9.11) [878b015bcc726560b13be2d906caf6923428f05d]
-3.16-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
-3.2-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
-sid: released (4.9.10-1) [bugfix/all/pegasus-use-heap-buffers-for-all-register-access.patch]
-3.16-jessie-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
-3.2-wheezy-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"

Deleted: active/CVE-2017-8069
===================================================================
--- active/CVE-2017-8069	2017-04-23 11:09:01 UTC (rev 5209)
+++ active/CVE-2017-8069	2017-04-23 11:09:04 UTC (rev 5210)
@@ -1,11 +0,0 @@
-Description: rtl8150: Use heap buffers for all register access
-References:
-Notes:
-Bugs:
-upstream: released (4.10-rc8) [7926aff5c57b577ab0f43364ff0c59d968f6a414]
-4.9-upstream-stable: released (4.9.11) [e898f6f008aa91c154c9c8fb7be3fb9ec4d333ec]
-3.16-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
-3.2-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
-sid: released (4.9.13-1)
-3.16-jessie-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
-3.2-wheezy-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"

Deleted: active/CVE-2017-8070
===================================================================
--- active/CVE-2017-8070	2017-04-23 11:09:01 UTC (rev 5209)
+++ active/CVE-2017-8070	2017-04-23 11:09:04 UTC (rev 5210)
@@ -1,11 +0,0 @@
-Description:  catc: Use heap buffer for memory size test
-References:
-Notes:
-Bugs:
-upstream: released (4.10-rc8) [2d6a0e9de03ee658a9adc3bfb2f0ca55dff1e478]
-4.9-upstream-stable: released (4.9.11) [970390fd5d53de0817b538350131edd2514a8321]
-3.16-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
-3.2-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
-sid: released (4.9.13-1)
-3.16-jessie-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
-3.2-wheezy-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"

Copied: retired/CVE-2017-8062 (from rev 5209, active/CVE-2017-8062)
===================================================================
--- retired/CVE-2017-8062	                        (rev 0)
+++ retired/CVE-2017-8062	2017-04-23 11:09:04 UTC (rev 5210)
@@ -0,0 +1,11 @@
+Description: [media] dw2102: don't do DMA on stack
+References:
+Notes:
+Bugs:
+upstream: released (4.11-rc2) [606142af57dad981b78707234cfbd15f9f7b7125]
+4.9-upstream-stable: released (4.9.16) [06996254a605913cd7c1927d0e8a89b5138e110d
+3.16-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
+3.2-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
+sid: released (4.9.16-1)
+3.16-jessie-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
+3.2-wheezy-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"

Copied: retired/CVE-2017-8065 (from rev 5209, active/CVE-2017-8065)
===================================================================
--- retired/CVE-2017-8065	                        (rev 0)
+++ retired/CVE-2017-8065	2017-04-23 11:09:04 UTC (rev 5210)
@@ -0,0 +1,12 @@
+Description: crypto: ccm - move cbcmac input off the stack
+References:
+Notes:
+ carnil> Should be introduced only with f15f05b0a5de (4.11-rc1)
+Bugs:
+upstream: released (4.11-rc1) [3b30460c5b0ed762be75a004e924ec3f8711e032]
+4.9-upstream-stable: N/A "Vulnerable code not present"
+3.16-upstream-stable: N/A "Vulnerable code not present"
+3.2-upstream-stable: N/A "Vulnerable code not present"
+sid: N/A "Vulnerable code not present"
+3.16-jessie-security: N/A "Vulnerable code not present"
+3.2-wheezy-security: N/A "Vulnerable code not present"

Copied: retired/CVE-2017-8068 (from rev 5209, active/CVE-2017-8068)
===================================================================
--- retired/CVE-2017-8068	                        (rev 0)
+++ retired/CVE-2017-8068	2017-04-23 11:09:04 UTC (rev 5210)
@@ -0,0 +1,11 @@
+Description: pegasus: Use heap buffers for all register access
+References:
+Notes:
+Bugs:
+upstream: released (4.10-rc8) [5593523f968bc86d42a035c6df47d5e0979b5ace]
+4.9-upstream-stable: released (4.9.11) [878b015bcc726560b13be2d906caf6923428f05d]
+3.16-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
+3.2-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
+sid: released (4.9.10-1) [bugfix/all/pegasus-use-heap-buffers-for-all-register-access.patch]
+3.16-jessie-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
+3.2-wheezy-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"

Copied: retired/CVE-2017-8069 (from rev 5209, active/CVE-2017-8069)
===================================================================
--- retired/CVE-2017-8069	                        (rev 0)
+++ retired/CVE-2017-8069	2017-04-23 11:09:04 UTC (rev 5210)
@@ -0,0 +1,11 @@
+Description: rtl8150: Use heap buffers for all register access
+References:
+Notes:
+Bugs:
+upstream: released (4.10-rc8) [7926aff5c57b577ab0f43364ff0c59d968f6a414]
+4.9-upstream-stable: released (4.9.11) [e898f6f008aa91c154c9c8fb7be3fb9ec4d333ec]
+3.16-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
+3.2-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
+sid: released (4.9.13-1)
+3.16-jessie-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
+3.2-wheezy-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"

Copied: retired/CVE-2017-8070 (from rev 5209, active/CVE-2017-8070)
===================================================================
--- retired/CVE-2017-8070	                        (rev 0)
+++ retired/CVE-2017-8070	2017-04-23 11:09:04 UTC (rev 5210)
@@ -0,0 +1,11 @@
+Description:  catc: Use heap buffer for memory size test
+References:
+Notes:
+Bugs:
+upstream: released (4.10-rc8) [2d6a0e9de03ee658a9adc3bfb2f0ca55dff1e478]
+4.9-upstream-stable: released (4.9.11) [970390fd5d53de0817b538350131edd2514a8321]
+3.16-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
+3.2-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
+sid: released (4.9.13-1)
+3.16-jessie-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
+3.2-wheezy-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"




More information about the kernel-sec-discuss mailing list