[kernel-sec-discuss] r5774 - active
Ben Hutchings
benh at moszumanska.debian.org
Sat Dec 9 18:33:46 UTC 2017
Author: benh
Date: 2017-12-09 18:33:46 +0000 (Sat, 09 Dec 2017)
New Revision: 5774
Modified:
active/CVE-2017-0861
active/CVE-2017-1000407
active/CVE-2017-1000410
active/CVE-2017-15116
active/CVE-2017-15868
active/CVE-2017-16939
active/CVE-2017-16994
active/CVE-2017-17448
active/CVE-2017-17449
active/CVE-2017-17450
Log:
Fill in status for most issues
Modified: active/CVE-2017-0861
===================================================================
--- active/CVE-2017-0861 2017-12-09 15:41:14 UTC (rev 5773)
+++ active/CVE-2017-0861 2017-12-09 18:33:46 UTC (rev 5774)
@@ -1,12 +1,17 @@
Description: ALSA: pcm: prevent UAF in snd_pcm_info
References:
Notes:
+ bwh> Commit 362bca57f5d7 "ALSA: pcm: prevent UAF in snd_pcm_info" claims to
+ bwh> fix this, but the UAF was already removed in 4.13 by commit e11f0f90a626
+ bwh> "ALSA: pcm: remove SNDRV_PCM_IOCTL1_INFO internal command". Based on
+ bwh> the latter commit message it appears that the UAF is totally harmless
+ bwh> in practice.
Bugs:
-upstream: pending [362bca57f5d78220f8b5907b875961af9436e229]
-4.9-upstream-stable:
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid:
-4.9-stretch-security:
-3.16-jessie-security:
-3.2-wheezy-security:
+upstream: released (4.13-rc1) [e11f0f90a626f93899687b1cc909ee37dd6c5809]
+4.9-upstream-stable: ignored "Minor issue"
+3.16-upstream-stable: ignored "Minor issue"
+3.2-upstream-stable: ignored "Minor issue"
+sid: released (4.13~rc5-1~exp1)
+4.9-stretch-security: ignored "Minor issue"
+3.16-jessie-security: ignored "Minor issue"
+3.2-wheezy-security: ignored "Minor issue"
Modified: active/CVE-2017-1000407
===================================================================
--- active/CVE-2017-1000407 2017-12-09 15:41:14 UTC (rev 5773)
+++ active/CVE-2017-1000407 2017-12-09 18:33:46 UTC (rev 5774)
@@ -4,11 +4,11 @@
https://www.spinics.net/lists/kvm/msg159809.html
Notes:
Bugs:
-upstream:
-4.9-upstream-stable:
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid:
-4.9-stretch-security:
-3.16-jessie-security:
-3.2-wheezy-security:
+upstream: pending [d59d51f088014f25c2562de59b9abff4f42a7468]
+4.9-upstream-stable: needed
+3.16-upstream-stable: needed
+3.2-upstream-stable: needed
+sid: needed
+4.9-stretch-security: needed
+3.16-jessie-security: needed
+3.2-wheezy-security: needed
Modified: active/CVE-2017-1000410
===================================================================
--- active/CVE-2017-1000410 2017-12-09 15:41:14 UTC (rev 5773)
+++ active/CVE-2017-1000410 2017-12-09 18:33:46 UTC (rev 5774)
@@ -2,12 +2,14 @@
References:
http://www.openwall.com/lists/oss-security/2017/12/06/3
Notes:
+ bwh> Introduced in 3.3 by commits 42dceae2819b "Bluetooth: EFS: parse L2CAP config
+ bwh> request" and 66af7aaf9edf "Bluetooth: EFS: parse L2CAP config response".
Bugs:
-upstream:
-4.9-upstream-stable:
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid:
-4.9-stretch-security:
-3.16-jessie-security:
-3.2-wheezy-security:
+upstream: needed
+4.9-upstream-stable: needed
+3.16-upstream-stable: needed
+3.2-upstream-stable: N/A "Vulnerable code not present"
+sid: needed
+4.9-stretch-security: needed
+3.16-jessie-security: needed
+3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-15116
===================================================================
--- active/CVE-2017-15116 2017-12-09 15:41:14 UTC (rev 5773)
+++ active/CVE-2017-15116 2017-12-09 18:33:46 UTC (rev 5774)
@@ -3,6 +3,9 @@
https://bugzilla.redhat.com/show_bug.cgi?id=1485815 (not accessible)
https://bugzilla.redhat.com/show_bug.cgi?id=1514609
Notes:
+ bwh> Clearly we can't apply the upstream fix for this, but need to guard
+ bwh> against the null pointer somehow. I can't work out which pointer
+ bwh> can be null though.
Bugs:
upstream: released (4.2-rc1) [94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6]
4.9-upstream-stable: N/A "Fixed before branching point"
Modified: active/CVE-2017-15868
===================================================================
--- active/CVE-2017-15868 2017-12-09 15:41:14 UTC (rev 5773)
+++ active/CVE-2017-15868 2017-12-09 18:33:46 UTC (rev 5774)
@@ -2,12 +2,16 @@
References:
https://source.android.com/security/bulletin/pixel/2017-12-01
Notes:
+ bwh> Depends on commit b3916db32c4a "Bluetooth: hidp: verify l2cap sockets"
+ bwh> which is also an important security fix. Should also apply commit
+ bwh> 96c26653ce65 "Bluetooth: cmtp: cmtp_add_connection() should verify that
+ bwh> it's dealing with l2cap socket".
Bugs:
upstream: released (3.19-rc3) [71bb99a02b32b4cc4265118e85f6035ca72923f0]
4.9-upstream-stable: N/A "Fixed before branching point"
-3.16-upstream-stable:
-3.2-upstream-stable:
+3.16-upstream-stable: needed
+3.2-upstream-stable: needed
sid: released (4.0.2-1)
4.9-stretch-security: N/A "Fixed before branching point"
-3.16-jessie-security:
-3.2-wheezy-security:
+3.16-jessie-security: needed
+3.2-wheezy-security: needed
Modified: active/CVE-2017-16939
===================================================================
--- active/CVE-2017-16939 2017-12-09 15:41:14 UTC (rev 5773)
+++ active/CVE-2017-16939 2017-12-09 18:33:46 UTC (rev 5774)
@@ -6,9 +6,9 @@
Bugs:
upstream: released (4.14-rc7) [1137b5e2529a8f5ca8ee709288ecba3e68044df2]
4.9-upstream-stable: released (4.9.60) [543aabb7d14b2414f40b632e37b0921bd0af3a96]
-3.16-upstream-stable:
-3.2-upstream-stable:
+3.16-upstream-stable: needed
+3.2-upstream-stable: needed
sid: released (4.13.13-1)
4.9-stretch-security: released (4.9.65-1)
-3.16-jessie-security:
-3.2-wheezy-security:
+3.16-jessie-security: needed
+3.2-wheezy-security: needed
Modified: active/CVE-2017-16994
===================================================================
--- active/CVE-2017-16994 2017-12-09 15:41:14 UTC (rev 5773)
+++ active/CVE-2017-16994 2017-12-09 18:33:46 UTC (rev 5774)
@@ -2,12 +2,14 @@
References:
https://bugs.chromium.org/p/project-zero/issues/detail?id=1431
Notes:
+ bwh> Introduced in 4.0 by commit 1e25a271c8ac "mincore: apply page table walker
+ bwh> on do_mincore()".
Bugs:
upstream: released (4.15-rc1) [373c4557d2aa362702c4c2d41288fb1e54990b7c]
4.9-upstream-stable: released (4.9.65) [ceaec6e8cd98c8fd87701ddfb7468a13d989d79d]
-3.16-upstream-stable:
-3.2-upstream-stable:
+3.16-upstream-stable: N/A "Vulnerability introduced later"
+3.2-upstream-stable: N/A "Vulnerability introduced later"
sid: released (4.14.2-1)
4.9-stretch-security: released (4.9.65-1)
-3.16-jessie-security:
-3.2-wheezy-security:
+3.16-jessie-security: N/A "Vulnerability introduced later"
+3.2-wheezy-security: N/A "Vulnerability introduced later"
Modified: active/CVE-2017-17448
===================================================================
--- active/CVE-2017-17448 2017-12-09 15:41:14 UTC (rev 5773)
+++ active/CVE-2017-17448 2017-12-09 18:33:46 UTC (rev 5774)
@@ -2,12 +2,14 @@
References:
https://patchwork.kernel.org/patch/10089373/
Notes:
+ bwh> This is mitigated in Debian by unprivileged user namespaces being
+ bwh> default-disabled.
Bugs:
-upstream:
-4.9-upstream-stable:
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid:
-4.9-stretch-security:
-3.16-jessie-security:
-3.2-wheezy-security:
+upstream: pending [4b380c42f7d00a395feede754f0bc2292eebe6e5]
+4.9-upstream-stable: needed
+3.16-upstream-stable: needed
+3.2-upstream-stable: N/A "User namespaces not supported"
+sid: needed
+4.9-stretch-security: needed
+3.16-jessie-security: needed
+3.2-wheezy-security: N/A "User namespaces not supported"
Modified: active/CVE-2017-17449
===================================================================
--- active/CVE-2017-17449 2017-12-09 15:41:14 UTC (rev 5773)
+++ active/CVE-2017-17449 2017-12-09 18:33:46 UTC (rev 5774)
@@ -1,13 +1,16 @@
Description: netlink: Add netns check on taps
References:
https://lkml.org/lkml/2017/12/5/950
+ https://patchwork.ozlabs.org/patch/845319/
Notes:
+ bwh> The fix accepted upstream is the second version, which doesn't treat the
+ bwh> init namespace as special.
Bugs:
-upstream:
-4.9-upstream-stable:
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid:
-4.9-stretch-security:
-3.16-jessie-security:
-3.2-wheezy-security:
+upstream: needed
+4.9-upstream-stable: needed
+3.16-upstream-stable: needed
+3.2-upstream-stable: ignored "Minor issue as user namespaces not supported"
+sid: needed
+4.9-stretch-security: needed
+3.16-jessie-security: needed
+3.2-wheezy-security: ignored "Minor issue as user namespaces not supported"
Modified: active/CVE-2017-17450
===================================================================
--- active/CVE-2017-17450 2017-12-09 15:41:14 UTC (rev 5773)
+++ active/CVE-2017-17450 2017-12-09 18:33:46 UTC (rev 5774)
@@ -3,11 +3,11 @@
https://lkml.org/lkml/2017/12/5/982
Notes:
Bugs:
-upstream:
-4.9-upstream-stable:
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid:
-4.9-stretch-security:
-3.16-jessie-security:
-3.2-wheezy-security:
+upstream: pending [916a27901de01446bcf57ecca4783f6cff493309]
+4.9-upstream-stable: needed
+3.16-upstream-stable: needed
+3.2-upstream-stable: N/A "User namespaces not supported"
+sid: needed
+4.9-stretch-security: needed
+3.16-jessie-security: needed
+3.2-wheezy-security: N/A "User namespaces not supported"
More information about the kernel-sec-discuss
mailing list