[kernel-sec-discuss] r5795 - active
Ben Hutchings
benh at moszumanska.debian.org
Tue Dec 19 23:17:42 UTC 2017
Author: benh
Date: 2017-12-19 23:17:42 +0000 (Tue, 19 Dec 2017)
New Revision: 5795
Modified:
active/CVE-2017-1000405
active/CVE-2017-1000407
active/CVE-2017-15121
active/CVE-2017-15868
active/CVE-2017-16526
active/CVE-2017-16645
active/CVE-2017-16939
active/CVE-2017-17448
active/CVE-2017-17449
active/CVE-2017-17450
active/CVE-2017-17558
active/CVE-2017-8824
Log:
Mark issues pending in stable branches
Modified: active/CVE-2017-1000405
===================================================================
--- active/CVE-2017-1000405 2017-12-19 22:42:16 UTC (rev 5794)
+++ active/CVE-2017-1000405 2017-12-19 23:17:42 UTC (rev 5795)
@@ -11,7 +11,7 @@
Bugs:
upstream: released (4.15-rc2) [a8f97366452ed491d13cf1e44241bc0b5740b1f0]
4.9-upstream-stable: released (4.9.67) [7031ae2ab37d3df53c4a4e9903329a5d38c745ec]
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.52) [mm-thp-do-not-make-page-table-dirty-unconditionally-in-touch_pd.patch]
3.2-upstream-stable: N/A "Vulnerable code not present"
sid: released (4.14.2-1) [bugfix/all/mm-thp-Do-not-make-page-table-dirty-unconditionally-.patch]
4.9-stretch-security: released (4.9.65-1)
Modified: active/CVE-2017-1000407
===================================================================
--- active/CVE-2017-1000407 2017-12-19 22:42:16 UTC (rev 5794)
+++ active/CVE-2017-1000407 2017-12-19 23:17:42 UTC (rev 5795)
@@ -6,8 +6,8 @@
Bugs:
upstream: released (4.15-rc3) [d59d51f088014f25c2562de59b9abff4f42a7468]
4.9-upstream-stable: released (4.9.69) [6ead44d4b5b8b1ecfcbd2302f15028dab7774da3]
-3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.52) [kvm-vmx-remove-i-o-port-0x80-bypass-on-intel-hosts.patch]
+3.2-upstream-stable: pending (3.2.97) [kvm-vmx-remove-i-o-port-0x80-bypass-on-intel-hosts.patch]
sid: needed
4.9-stretch-security: needed
3.16-jessie-security: needed
Modified: active/CVE-2017-15121
===================================================================
--- active/CVE-2017-15121 2017-12-19 22:42:16 UTC (rev 5794)
+++ active/CVE-2017-15121 2017-12-19 23:17:42 UTC (rev 5795)
@@ -4,6 +4,8 @@
Notes:
bwh> Red Hat reports this as affecting RHEL 6 (2.6.32ish) and 7 (3.10ish),
bwh> so I assume that 3.2 is affected.
+ bwh> The upstream fix depends on commit d47992f86b30 "mm: change invalidatepage
+ bwh> prototype to accept length" etc. We'll need something simpler for 3.2.
Bugs:
upstream: released (3.11-rc1) [5a7203947a1d9b6f3a00a39fda08c2466489555f]
4.9-upstream-stable: N/A "Fixed before branching point"
Modified: active/CVE-2017-15868
===================================================================
--- active/CVE-2017-15868 2017-12-19 22:42:16 UTC (rev 5794)
+++ active/CVE-2017-15868 2017-12-19 23:17:42 UTC (rev 5795)
@@ -9,8 +9,8 @@
Bugs:
upstream: released (3.19-rc3) [71bb99a02b32b4cc4265118e85f6035ca72923f0]
4.9-upstream-stable: N/A "Fixed before branching point"
-3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.52) [bluetooth-bnep-bnep_add_connection-should-verify-tha.patch]
+3.2-upstream-stable: pending (3.2.97) [bluetooth-bnep-bnep_add_connection-should-verify-tha.patch]
sid: released (4.0.2-1)
4.9-stretch-security: N/A "Fixed before branching point"
3.16-jessie-security: needed
Modified: active/CVE-2017-16526
===================================================================
--- active/CVE-2017-16526 2017-12-19 22:42:16 UTC (rev 5794)
+++ active/CVE-2017-16526 2017-12-19 23:17:42 UTC (rev 5795)
@@ -8,8 +8,8 @@
Bugs:
upstream: released (4.14-rc4) [bbf26183b7a6236ba602f4d6a2f7cade35bba043]
4.9-upstream-stable: released (4.9.55) [8ff7adb930d4a62f43dfc76220a988a043c510ff]
-3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.52) [uwb-properly-check-kthread_run-return-value.patch]
+3.2-upstream-stable: pending (3.2.97) [uwb-properly-check-kthread_run-return-value.patch]
sid: released (4.13.10-1)
4.9-stretch-security: released (4.9.65-1)
3.16-jessie-security: needed
Modified: active/CVE-2017-16645
===================================================================
--- active/CVE-2017-16645 2017-12-19 22:42:16 UTC (rev 5794)
+++ active/CVE-2017-16645 2017-12-19 23:17:42 UTC (rev 5795)
@@ -6,7 +6,7 @@
Bugs:
upstream: released (4.14-rc6) [ea04efee7635c9120d015dcdeeeb6988130cb67a]
4.9-upstream-stable: released (4.9.63) [9d65d0ea55dcb813cea7df05602f233ad4843baf]
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.52) [input-ims-psu-check-if-cdc-union-descriptor-is-sane.patch]
3.2-upstream-stable: N/A "Vulnerable code not present"
sid: released (4.14.2-1)
4.9-stretch-security: released (4.9.65-1)
Modified: active/CVE-2017-16939
===================================================================
--- active/CVE-2017-16939 2017-12-19 22:42:16 UTC (rev 5794)
+++ active/CVE-2017-16939 2017-12-19 23:17:42 UTC (rev 5795)
@@ -6,8 +6,8 @@
Bugs:
upstream: released (4.14-rc7) [1137b5e2529a8f5ca8ee709288ecba3e68044df2]
4.9-upstream-stable: released (4.9.60) [543aabb7d14b2414f40b632e37b0921bd0af3a96]
-3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.52) [ipsec-fix-aborted-xfrm-policy-dump-crash.patch]
+3.2-upstream-stable: pending (3.2.97) [ipsec-fix-aborted-xfrm-policy-dump-crash.patch]
sid: released (4.13.13-1)
4.9-stretch-security: released (4.9.65-1)
3.16-jessie-security: needed
Modified: active/CVE-2017-17448
===================================================================
--- active/CVE-2017-17448 2017-12-19 22:42:16 UTC (rev 5794)
+++ active/CVE-2017-17448 2017-12-19 23:17:42 UTC (rev 5795)
@@ -7,7 +7,7 @@
Bugs:
upstream: released (4.15-rc4) [4b380c42f7d00a395feede754f0bc2292eebe6e5]
4.9-upstream-stable: needed
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.52) [netfilter-nfnetlink_cthelper-add-missing-permission-checks.patch]
3.2-upstream-stable: N/A "User namespaces not supported"
sid: needed
4.9-stretch-security: needed
Modified: active/CVE-2017-17449
===================================================================
--- active/CVE-2017-17449 2017-12-19 22:42:16 UTC (rev 5794)
+++ active/CVE-2017-17449 2017-12-19 23:17:42 UTC (rev 5795)
@@ -5,12 +5,14 @@
Notes:
bwh> The fix accepted upstream is the second version, which doesn't treat the
bwh> init namespace as special.
+ bwh> Introduced in 3.11 by commit bcbde0d449ed "net: netlink: virtual tap device
+ bwh> management".
Bugs:
upstream: released (4.15-rc4) [93c647643b48f0131f02e45da3bd367d80443291]
4.9-upstream-stable: needed
-3.16-upstream-stable: needed
-3.2-upstream-stable: ignored "Minor issue as user namespaces not supported"
+3.16-upstream-stable: pending (3.16.52) [netlink-add-netns-check-on-taps.patch]
+3.2-upstream-stable: N/A "Vulnerable code not present"
sid: needed
4.9-stretch-security: needed
3.16-jessie-security: needed
-3.2-wheezy-security: ignored "Minor issue as user namespaces not supported"
+3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-17450
===================================================================
--- active/CVE-2017-17450 2017-12-19 22:42:16 UTC (rev 5794)
+++ active/CVE-2017-17450 2017-12-19 23:17:42 UTC (rev 5795)
@@ -5,7 +5,7 @@
Bugs:
upstream: released (4.15-rc4) [916a27901de01446bcf57ecca4783f6cff493309]
4.9-upstream-stable: needed
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.52) [netfilter-xt_osf-add-missing-permission-checks.patch]
3.2-upstream-stable: N/A "User namespaces not supported"
sid: needed
4.9-stretch-security: needed
Modified: active/CVE-2017-17558
===================================================================
--- active/CVE-2017-17558 2017-12-19 22:42:16 UTC (rev 5794)
+++ active/CVE-2017-17558 2017-12-19 23:17:42 UTC (rev 5795)
@@ -6,9 +6,9 @@
bwh> This appears to pre-date git history.
Bugs:
upstream: released (4.15-rc4) [48a4ff1c7bb5a32d2e396b03132d20d552c0eca7]
-4.9-upstream-stable: needed
-3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+4.9-upstream-stable: pending (4.9.71) [usb-core-prevent-malicious-bnuminterfaces-overflow.patch]
+3.16-upstream-stable: pending (3.16.52) [usb-core-prevent-malicious-bnuminterfaces-overflow.patch]
+3.2-upstream-stable: pending (3.2.97) [usb-core-prevent-malicious-bnuminterfaces-overflow.patch]
sid: needed
4.9-stretch-security: needed
3.16-jessie-security: needed
Modified: active/CVE-2017-8824
===================================================================
--- active/CVE-2017-8824 2017-12-19 22:42:16 UTC (rev 5794)
+++ active/CVE-2017-8824 2017-12-19 23:17:42 UTC (rev 5795)
@@ -6,8 +6,8 @@
Bugs:
upstream: released (4.15-rc3) [69c64866ce072dea1d1e59a0d61e0f66c0dffb76]
4.9-upstream-stable: needed
-3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.52) [dccp-cve-2017-8824-use-after-free-in-dccp-code.patch]
+3.2-upstream-stable: pending (3.2.97) [dccp-cve-2017-8824-use-after-free-in-dccp-code.patch]
sid: needed
4.9-stretch-security: needed
3.16-jessie-security: needed
More information about the kernel-sec-discuss
mailing list