[kernel-sec-discuss] r5837 - active
Ben Hutchings
benh at moszumanska.debian.org
Sun Dec 24 15:04:55 UTC 2017
Author: benh
Date: 2017-12-24 15:04:55 +0000 (Sun, 24 Dec 2017)
New Revision: 5837
Modified:
active/CVE-2017-17863
active/CVE-2017-17864
Log:
Fill in status of BPF verifier issues in more branches
Modified: active/CVE-2017-17863
===================================================================
--- active/CVE-2017-17863 2017-12-24 12:33:32 UTC (rev 5836)
+++ active/CVE-2017-17863 2017-12-24 15:04:55 UTC (rev 5837)
@@ -8,11 +8,11 @@
carnil> for the v4.9 stable tree because the mainline code looks very
carnil> different at this point."
Bugs:
-upstream:
-4.9-upstream-stable: needed
+upstream: released (4.15-rc5) [bb7f0f989ca7de1153bd128a40a71709e339fa03]
+4.9-upstream-stable: pending (4.9.72) [bpf-reject-out-of-bounds-stack-pointer-calculation.patch]
3.16-upstream-stable: N/A "Vulnerable code introduced later"
3.2-upstream-stable: N/A "Vulnerable code introduced later"
-sid:
+sid: released (4.14.7-1) [bugfix/all/bpf-fix-integer-overflows.patch]
4.9-stretch-security: released (4.9.65-3+deb9u1) [bugfix/all/bpf-reject-out-of-bounds-stack-pointer-calculation.patch]
3.16-jessie-security: N/A "Vulnerable code introduced later"
3.2-wheezy-security: N/A "Vulnerable code introduced later"
Modified: active/CVE-2017-17864
===================================================================
--- active/CVE-2017-17864 2017-12-24 12:33:32 UTC (rev 5836)
+++ active/CVE-2017-17864 2017-12-24 15:04:55 UTC (rev 5837)
@@ -9,12 +9,15 @@
carnil> how was it fixed? Which upstream commit?
carnil> So needs to be checked if 179d1c5602997fef5a940c6ddcf31212cbfebd14
carnil> fixed that problem.
+ bwh> I know that the test case was fixed upstream and in sid by the recent
+ bwh> series of fixes, so have marked this as released even though I'm not
+ bwh> absolutely certain that this is the specific commit that fixed it.
Bugs:
-upstream:
+upstream: released (4.15-rc5) [179d1c5602997fef5a940c6ddcf31212cbfebd14]
4.9-upstream-stable: needed
3.16-upstream-stable: N/A "Vulnerable code introduced later"
3.2-upstream-stable: N/A "Vulnerable code introduced later"
-sid:
+sid: released (4.14.7-1) [bugfix/all/bpf-don-t-prune-branches-when-a-scalar-is-replaced-w.patch]
4.9-stretch-security: released (4.9.65-3+deb9u1) [bugfix/all/bpf-verifier-fix-states_equal-comparison-of-pointer-and-unknown.patch]
3.16-jessie-security: N/A "Vulnerable code introduced later"
3.2-wheezy-security: N/A "Vulnerable code introduced later"
More information about the kernel-sec-discuss
mailing list