summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2024-03-01 22:44:17 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2024-03-01 22:44:53 +0100
commit47b8f95b2c6a287f933ae7baac7b4c6be0d5951c (patch)
treea05d623ccfc194b9eb6ca82ed6b0986c2b310b46
parent3a986a63a8120ce5be3821cd1cfacd8d3ea9f503 (diff)
Add new assigned CVEs
Key issue remaining is yet to find the correct version in unstable due to branching for a release. Up to now the script will otherwise mark 5.10.40-1 as fixed in the bullseye branch, which is not correct as this was before the branching point and at same point mark an experimental version for the fix in sid. The rest seems to work reasonable now but will need a review later.
-rw-r--r--active/CVE-2021-4706918
-rw-r--r--active/CVE-2021-4707016
-rw-r--r--active/CVE-2021-4707116
-rw-r--r--active/CVE-2021-4707216
-rw-r--r--active/CVE-2021-4707316
-rw-r--r--active/CVE-2021-4707416
-rw-r--r--active/CVE-2021-4707516
-rw-r--r--active/CVE-2021-4707615
-rw-r--r--active/CVE-2021-4707716
-rw-r--r--active/CVE-2021-4707815
-rw-r--r--active/CVE-2021-4707916
-rw-r--r--active/CVE-2021-4708016
-rw-r--r--active/CVE-2021-4708116
13 files changed, 208 insertions, 0 deletions
diff --git a/active/CVE-2021-47069 b/active/CVE-2021-47069
new file mode 100644
index 00000000..5e20cf08
--- /dev/null
+++ b/active/CVE-2021-47069
@@ -0,0 +1,18 @@
+Description: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry
+References:
+Notes:
+ carnil> Introduced in c5b2cbdbdac563 ("ipc/mqueue.c: update/document memory barriers")
+ carnil> 8116b54e7e23ef ("ipc/sem.c: document and update memory barriers")
+ carnil> 0d97a82ba830d8 ("ipc/msg.c: update and document memory barriers"). Vulnerable
+ carnil> versions: 5.6-rc1.
+Bugs:
+upstream: released (5.13-rc3) [a11ddb37bf367e6b5239b95ca759e5389bb46048]
+6.7-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: released (5.10.40) [4528c0c323085e645b8765913b4a7fd42cf49b65]
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (5.10.40-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: N/A "Fixed before branching point"
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47070 b/active/CVE-2021-47070
new file mode 100644
index 00000000..f981d4f8
--- /dev/null
+++ b/active/CVE-2021-47070
@@ -0,0 +1,16 @@
+Description: uio_hv_generic: Fix another memory leak in error handling paths
+References:
+Notes:
+ carnil> Introduced in cdfa835c6e5e ("uio_hv_generic: defer opening vmbus until first
+ carnil> use"). Vulnerable versions: 4.20-rc1.
+Bugs:
+upstream: released (5.13-rc3) [0b0226be3a52dadd965644bc52a807961c2c26df]
+6.7-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: needed
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (5.14.6-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: needed
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47071 b/active/CVE-2021-47071
new file mode 100644
index 00000000..ff3dbfe7
--- /dev/null
+++ b/active/CVE-2021-47071
@@ -0,0 +1,16 @@
+Description: uio_hv_generic: Fix a memory leak in error handling paths
+References:
+Notes:
+ carnil> Introduced in cdfa835c6e5e ("uio_hv_generic: defer opening vmbus until first
+ carnil> use"). Vulnerable versions: 4.20-rc1.
+Bugs:
+upstream: released (5.13-rc3) [3ee098f96b8b6c1a98f7f97915f8873164e6af9d]
+6.7-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: released (5.10.40) [d84b5e912212b05f6b5bde9f682046accfbe0354]
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (5.10.40-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: N/A "Fixed before branching point"
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47072 b/active/CVE-2021-47072
new file mode 100644
index 00000000..b05ec7a6
--- /dev/null
+++ b/active/CVE-2021-47072
@@ -0,0 +1,16 @@
+Description: btrfs: fix removed dentries still existing after log is synced
+References:
+Notes:
+ carnil> Introduced in 64d6b281ba4db0 ("btrfs: remove unnecessary
+ carnil> check_parent_dirs_for_sync()"). Vulnerable versions: 5.12-rc1.
+Bugs:
+upstream: released (5.13-rc3) [54a40fc3a1da21b52dbf19f72fdc27a2ec740760]
+6.7-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: N/A "Vulnerable code not present"
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: N/A "Vulnerable code not present"
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47073 b/active/CVE-2021-47073
new file mode 100644
index 00000000..82b98448
--- /dev/null
+++ b/active/CVE-2021-47073
@@ -0,0 +1,16 @@
+Description: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios
+References:
+Notes:
+ carnil> Introduced in 1a258e670434 ("platform/x86: dell-smbios-wmi: Add new WMI
+ carnil> dispatcher driver"). Vulnerable versions: 4.15-rc1.
+Bugs:
+upstream: released (5.13-rc3) [3a53587423d25c87af4b4126a806a0575104b45e]
+6.7-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: released (5.10.40) [0cf036a0d325200e6c27b90908e51195bbc557b1]
+4.19-upstream-stable: released (4.19.192) [75cfc833da4a2111106d4c134e93e0c7f41e35e7]
+sid: released (5.10.40-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: N/A "Fixed before branching point"
+4.19-buster-security: released (4.19.194-1)
diff --git a/active/CVE-2021-47074 b/active/CVE-2021-47074
new file mode 100644
index 00000000..1d27421f
--- /dev/null
+++ b/active/CVE-2021-47074
@@ -0,0 +1,16 @@
+Description: nvme-loop: fix memory leak in nvme_loop_create_ctrl()
+References:
+Notes:
+ carnil> Introduced in 3a85a5de29ea ("nvme-loop: add a NVMe loopback host driver").
+ carnil> Vulnerable versions: 4.8-rc1.
+Bugs:
+upstream: released (5.13-rc3) [03504e3b54cc8118cc26c064e60a0b00c2308708]
+6.7-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: released (5.10.40) [9c980795ccd77e8abec33dd6fe28dfe1c4083e65]
+4.19-upstream-stable: needed
+sid: released (5.10.40-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: N/A "Fixed before branching point"
+4.19-buster-security: needed
diff --git a/active/CVE-2021-47075 b/active/CVE-2021-47075
new file mode 100644
index 00000000..2d31abef
--- /dev/null
+++ b/active/CVE-2021-47075
@@ -0,0 +1,16 @@
+Description: nvmet: fix memory leak in nvmet_alloc_ctrl()
+References:
+Notes:
+ carnil> Introduced in 94a39d61f80f ("nvmet: make ctrl-id configurable"). Vulnerable
+ carnil> versions: 5.7-rc1.
+Bugs:
+upstream: released (5.13-rc3) [fec356a61aa3d3a66416b4321f1279e09e0f256f]
+6.7-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: released (5.10.40) [4720f29acb3fe67aa8aa71e6b675b079d193aaeb]
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (5.10.40-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: N/A "Fixed before branching point"
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47076 b/active/CVE-2021-47076
new file mode 100644
index 00000000..e499ec49
--- /dev/null
+++ b/active/CVE-2021-47076
@@ -0,0 +1,15 @@
+Description: RDMA/rxe: Return CQE error if invalid lkey was supplied
+References:
+Notes:
+ carnil> Introduced in 8700e3e7c485 ("Soft RoCE driver"). Vulnerable versions: 4.8-rc1.
+Bugs:
+upstream: released (5.13-rc3) [dc07628bd2bbc1da768e265192c28ebd301f509d]
+6.7-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: needed
+4.19-upstream-stable: needed
+sid: released (5.14.6-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: needed
+4.19-buster-security: needed
diff --git a/active/CVE-2021-47077 b/active/CVE-2021-47077
new file mode 100644
index 00000000..b09f72e6
--- /dev/null
+++ b/active/CVE-2021-47077
@@ -0,0 +1,16 @@
+Description: scsi: qedf: Add pointer checks in qedf_update_link_speed()
+References:
+Notes:
+ carnil> Introduced in 61d8658b4a43 ("scsi: qedf: Add QLogic FastLinQ offload FCoE
+ carnil> driver framework."). Vulnerable versions: 4.11-rc1.
+Bugs:
+upstream: released (5.13-rc3) [73578af92a0fae6609b955fcc9113e50e413c80f]
+6.7-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: released (5.10.40) [a6362a737572f66051deb7637f3f77ddf7a4402f]
+4.19-upstream-stable: needed
+sid: released (5.10.40-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: N/A "Fixed before branching point"
+4.19-buster-security: needed
diff --git a/active/CVE-2021-47078 b/active/CVE-2021-47078
new file mode 100644
index 00000000..f66a2904
--- /dev/null
+++ b/active/CVE-2021-47078
@@ -0,0 +1,15 @@
+Description: RDMA/rxe: Clear all QP fields if creation failed
+References:
+Notes:
+ carnil> Introduced in 8700e3e7c485 ("Soft RoCE driver"). Vulnerable versions: 4.8-rc1.
+Bugs:
+upstream: released (5.13-rc3) [67f29896fdc83298eed5a6576ff8f9873f709228]
+6.7-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: released (5.10.40) [2ee4d79c364914989c80de382c0b1a7259a7e4b3]
+4.19-upstream-stable: released (4.19.192) [f3783c415bf6d2ead3d7aa2c38802bbe10723646]
+sid: released (5.10.40-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: N/A "Fixed before branching point"
+4.19-buster-security: released (4.19.194-1)
diff --git a/active/CVE-2021-47079 b/active/CVE-2021-47079
new file mode 100644
index 00000000..51978990
--- /dev/null
+++ b/active/CVE-2021-47079
@@ -0,0 +1,16 @@
+Description: platform/x86: ideapad-laptop: fix a NULL pointer dereference
+References:
+Notes:
+ carnil> Introduced in ff36b0d953dc4 ("platform/x86: ideapad-laptop: rework and create
+ carnil> new ACPI helpers"). Vulnerable versions: 5.12-rc1.
+Bugs:
+upstream: released (5.13-rc3) [ff67dbd554b2aaa22be933eced32610ff90209dd]
+6.7-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: N/A "Vulnerable code not present"
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: N/A "Vulnerable code not present"
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47080 b/active/CVE-2021-47080
new file mode 100644
index 00000000..ea9ce187
--- /dev/null
+++ b/active/CVE-2021-47080
@@ -0,0 +1,16 @@
+Description: RDMA/core: Prevent divide-by-zero error triggered by the user
+References:
+Notes:
+ carnil> Introduced in 9f85cbe50aa0 ("RDMA/uverbs: Expose the new GID query API to user
+ carnil> space"). Vulnerable versions: 5.10-rc1.
+Bugs:
+upstream: released (5.13-rc3) [54d87913f147a983589923c7f651f97de9af5be1]
+6.7-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: released (5.10.40) [66ab7fcdac34b890017f04f391507ef5b2b89a13]
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (5.10.40-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: N/A "Fixed before branching point"
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47081 b/active/CVE-2021-47081
new file mode 100644
index 00000000..ee49ee5b
--- /dev/null
+++ b/active/CVE-2021-47081
@@ -0,0 +1,16 @@
+Description: habanalabs/gaudi: Fix a potential use after free in gaudi_memset_device_memory
+References:
+Notes:
+ carnil> Introduced in 423815bf02e25 ("habanalabs/gaudi: remove PCI access to SM
+ carnil> block"). Vulnerable versions: 5.12-rc1.
+Bugs:
+upstream: released (5.13-rc3) [115726c5d312b462c9d9931ea42becdfa838a076]
+6.7-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: N/A "Vulnerable code not present"
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: N/A "Vulnerable code not present"
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy