[kernel-sec-discuss] r5240 - active retired

Salvatore Bonaccorso carnil at moszumanska.debian.org
Fri Apr 28 04:22:10 UTC 2017


Author: carnil
Date: 2017-04-28 04:22:10 +0000 (Fri, 28 Apr 2017)
New Revision: 5240

Added:
   retired/CVE-2017-5970
   retired/CVE-2017-8106
Removed:
   active/CVE-2017-5970
   active/CVE-2017-8106
Log:
Retire two CVEs

Deleted: active/CVE-2017-5970
===================================================================
--- active/CVE-2017-5970	2017-04-28 02:05:28 UTC (rev 5239)
+++ active/CVE-2017-5970	2017-04-28 04:22:10 UTC (rev 5240)
@@ -1,15 +0,0 @@
-Description: ipv4: Invalid IP options could cause skb->dst drop
-References:
- http://seclists.org/oss-sec/2017/q1/414
- https://patchwork.ozlabs.org/patch/724136/
-Notes:
- bwh> This was actually introduced in 2.6.35 by commit f84af32cbca70
- bwh> ("net: ip_queue_rcv_skb() helper").
-Bugs:
-upstream: released (4.10-rc8) [34b2cef20f19c87999fff3da4071e66937db9644]
-4.9-upstream-stable: released (4.9.11) [f5b54446630a973e1f27b68599366bbd0ac53066]
-3.16-upstream-stable: released (3.16.41) [ipv4-keep-skb-dst-around-in-presence-of-ip-options.patch]
-3.2-upstream-stable: released (3.2.88) [ipv4-keep-skb-dst-around-in-presence-of-ip-options.patch]
-sid: released (4.9.10-1) [bugfix/all/ipv4-keep-skb-dst-around-in-presence-of-IP-options.patch]
-3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/ipv4-keep-skb-dst-around-in-presence-of-ip-options.patch]
-3.2-wheezy-security: released (3.2.88-1)

Deleted: active/CVE-2017-8106
===================================================================
--- active/CVE-2017-8106	2017-04-28 02:05:28 UTC (rev 5239)
+++ active/CVE-2017-8106	2017-04-28 04:22:10 UTC (rev 5240)
@@ -1,19 +0,0 @@
-Description: nVMX: Check current_vmcs12 before accessing in handle_invept()
-References:
-Notes:
- carnil> Introduced in bfd0a56b90005f8c8a004baf407ad90045c2b11e (3.12-rc1)
- carnil> for linux-3.2.y commit 02a988e6e4511b1f6d83525710a12db9c5a45149 (3.2.64)
- carnil> backports bfd0a56b90005f8c8a004baf407ad90045c2b11e but is quite
- carnil> reduced.
- bwh> The backport to 3.2 was a *non*-implementation of INVEPT that doesn't
- bwh> have this issue.
-Bugs:
- https://bugzilla.kernel.org/show_bug.cgi?id=195167
- https://launchpad.net/bugs/1678676
-upstream: released (3.16-rc4) [4b855078601fc422dbac3059f2215e776f49780f]
-4.9-upstream-stable: N/A "Fixed before branch point" 
-3.16-upstream-stable: N/A "Fixed before branch point"
-3.2-upstream-stable: N/A "Vulnerable code not present"
-sid: released (3.16.2-1)
-3.16-jessie-security: N/A "Vulnerable code not present"
-3.2-wheezy-security: N/A "Vulnerable code not present"

Copied: retired/CVE-2017-5970 (from rev 5239, active/CVE-2017-5970)
===================================================================
--- retired/CVE-2017-5970	                        (rev 0)
+++ retired/CVE-2017-5970	2017-04-28 04:22:10 UTC (rev 5240)
@@ -0,0 +1,15 @@
+Description: ipv4: Invalid IP options could cause skb->dst drop
+References:
+ http://seclists.org/oss-sec/2017/q1/414
+ https://patchwork.ozlabs.org/patch/724136/
+Notes:
+ bwh> This was actually introduced in 2.6.35 by commit f84af32cbca70
+ bwh> ("net: ip_queue_rcv_skb() helper").
+Bugs:
+upstream: released (4.10-rc8) [34b2cef20f19c87999fff3da4071e66937db9644]
+4.9-upstream-stable: released (4.9.11) [f5b54446630a973e1f27b68599366bbd0ac53066]
+3.16-upstream-stable: released (3.16.41) [ipv4-keep-skb-dst-around-in-presence-of-ip-options.patch]
+3.2-upstream-stable: released (3.2.88) [ipv4-keep-skb-dst-around-in-presence-of-ip-options.patch]
+sid: released (4.9.10-1) [bugfix/all/ipv4-keep-skb-dst-around-in-presence-of-IP-options.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/ipv4-keep-skb-dst-around-in-presence-of-ip-options.patch]
+3.2-wheezy-security: released (3.2.88-1)

Copied: retired/CVE-2017-8106 (from rev 5239, active/CVE-2017-8106)
===================================================================
--- retired/CVE-2017-8106	                        (rev 0)
+++ retired/CVE-2017-8106	2017-04-28 04:22:10 UTC (rev 5240)
@@ -0,0 +1,19 @@
+Description: nVMX: Check current_vmcs12 before accessing in handle_invept()
+References:
+Notes:
+ carnil> Introduced in bfd0a56b90005f8c8a004baf407ad90045c2b11e (3.12-rc1)
+ carnil> for linux-3.2.y commit 02a988e6e4511b1f6d83525710a12db9c5a45149 (3.2.64)
+ carnil> backports bfd0a56b90005f8c8a004baf407ad90045c2b11e but is quite
+ carnil> reduced.
+ bwh> The backport to 3.2 was a *non*-implementation of INVEPT that doesn't
+ bwh> have this issue.
+Bugs:
+ https://bugzilla.kernel.org/show_bug.cgi?id=195167
+ https://launchpad.net/bugs/1678676
+upstream: released (3.16-rc4) [4b855078601fc422dbac3059f2215e776f49780f]
+4.9-upstream-stable: N/A "Fixed before branch point" 
+3.16-upstream-stable: N/A "Fixed before branch point"
+3.2-upstream-stable: N/A "Vulnerable code not present"
+sid: released (3.16.2-1)
+3.16-jessie-security: N/A "Vulnerable code not present"
+3.2-wheezy-security: N/A "Vulnerable code not present"




More information about the kernel-sec-discuss mailing list