diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2024-03-01 22:44:17 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2024-03-01 22:44:53 +0100 |
commit | 47b8f95b2c6a287f933ae7baac7b4c6be0d5951c (patch) | |
tree | a05d623ccfc194b9eb6ca82ed6b0986c2b310b46 | |
parent | 3a986a63a8120ce5be3821cd1cfacd8d3ea9f503 (diff) |
Add new assigned CVEs
Key issue remaining is yet to find the correct version in unstable due
to branching for a release. Up to now the script will otherwise mark
5.10.40-1 as fixed in the bullseye branch, which is not correct as this
was before the branching point and at same point mark an experimental
version for the fix in sid.
The rest seems to work reasonable now but will need a review later.
-rw-r--r-- | active/CVE-2021-47069 | 18 | ||||
-rw-r--r-- | active/CVE-2021-47070 | 16 | ||||
-rw-r--r-- | active/CVE-2021-47071 | 16 | ||||
-rw-r--r-- | active/CVE-2021-47072 | 16 | ||||
-rw-r--r-- | active/CVE-2021-47073 | 16 | ||||
-rw-r--r-- | active/CVE-2021-47074 | 16 | ||||
-rw-r--r-- | active/CVE-2021-47075 | 16 | ||||
-rw-r--r-- | active/CVE-2021-47076 | 15 | ||||
-rw-r--r-- | active/CVE-2021-47077 | 16 | ||||
-rw-r--r-- | active/CVE-2021-47078 | 15 | ||||
-rw-r--r-- | active/CVE-2021-47079 | 16 | ||||
-rw-r--r-- | active/CVE-2021-47080 | 16 | ||||
-rw-r--r-- | active/CVE-2021-47081 | 16 |
13 files changed, 208 insertions, 0 deletions
diff --git a/active/CVE-2021-47069 b/active/CVE-2021-47069 new file mode 100644 index 00000000..5e20cf08 --- /dev/null +++ b/active/CVE-2021-47069 @@ -0,0 +1,18 @@ +Description: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry +References: +Notes: + carnil> Introduced in c5b2cbdbdac563 ("ipc/mqueue.c: update/document memory barriers") + carnil> 8116b54e7e23ef ("ipc/sem.c: document and update memory barriers") + carnil> 0d97a82ba830d8 ("ipc/msg.c: update and document memory barriers"). Vulnerable + carnil> versions: 5.6-rc1. +Bugs: +upstream: released (5.13-rc3) [a11ddb37bf367e6b5239b95ca759e5389bb46048] +6.7-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.40) [4528c0c323085e645b8765913b4a7fd42cf49b65] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (5.10.40-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Fixed before branching point" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2021-47070 b/active/CVE-2021-47070 new file mode 100644 index 00000000..f981d4f8 --- /dev/null +++ b/active/CVE-2021-47070 @@ -0,0 +1,16 @@ +Description: uio_hv_generic: Fix another memory leak in error handling paths +References: +Notes: + carnil> Introduced in cdfa835c6e5e ("uio_hv_generic: defer opening vmbus until first + carnil> use"). Vulnerable versions: 4.20-rc1. +Bugs: +upstream: released (5.13-rc3) [0b0226be3a52dadd965644bc52a807961c2c26df] +6.7-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: needed +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (5.14.6-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: needed +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2021-47071 b/active/CVE-2021-47071 new file mode 100644 index 00000000..ff3dbfe7 --- /dev/null +++ b/active/CVE-2021-47071 @@ -0,0 +1,16 @@ +Description: uio_hv_generic: Fix a memory leak in error handling paths +References: +Notes: + carnil> Introduced in cdfa835c6e5e ("uio_hv_generic: defer opening vmbus until first + carnil> use"). Vulnerable versions: 4.20-rc1. +Bugs: +upstream: released (5.13-rc3) [3ee098f96b8b6c1a98f7f97915f8873164e6af9d] +6.7-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.40) [d84b5e912212b05f6b5bde9f682046accfbe0354] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (5.10.40-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Fixed before branching point" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2021-47072 b/active/CVE-2021-47072 new file mode 100644 index 00000000..b05ec7a6 --- /dev/null +++ b/active/CVE-2021-47072 @@ -0,0 +1,16 @@ +Description: btrfs: fix removed dentries still existing after log is synced +References: +Notes: + carnil> Introduced in 64d6b281ba4db0 ("btrfs: remove unnecessary + carnil> check_parent_dirs_for_sync()"). Vulnerable versions: 5.12-rc1. +Bugs: +upstream: released (5.13-rc3) [54a40fc3a1da21b52dbf19f72fdc27a2ec740760] +6.7-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: N/A "Vulnerable code not present" +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2021-47073 b/active/CVE-2021-47073 new file mode 100644 index 00000000..82b98448 --- /dev/null +++ b/active/CVE-2021-47073 @@ -0,0 +1,16 @@ +Description: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios +References: +Notes: + carnil> Introduced in 1a258e670434 ("platform/x86: dell-smbios-wmi: Add new WMI + carnil> dispatcher driver"). Vulnerable versions: 4.15-rc1. +Bugs: +upstream: released (5.13-rc3) [3a53587423d25c87af4b4126a806a0575104b45e] +6.7-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.40) [0cf036a0d325200e6c27b90908e51195bbc557b1] +4.19-upstream-stable: released (4.19.192) [75cfc833da4a2111106d4c134e93e0c7f41e35e7] +sid: released (5.10.40-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Fixed before branching point" +4.19-buster-security: released (4.19.194-1) diff --git a/active/CVE-2021-47074 b/active/CVE-2021-47074 new file mode 100644 index 00000000..1d27421f --- /dev/null +++ b/active/CVE-2021-47074 @@ -0,0 +1,16 @@ +Description: nvme-loop: fix memory leak in nvme_loop_create_ctrl() +References: +Notes: + carnil> Introduced in 3a85a5de29ea ("nvme-loop: add a NVMe loopback host driver"). + carnil> Vulnerable versions: 4.8-rc1. +Bugs: +upstream: released (5.13-rc3) [03504e3b54cc8118cc26c064e60a0b00c2308708] +6.7-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.40) [9c980795ccd77e8abec33dd6fe28dfe1c4083e65] +4.19-upstream-stable: needed +sid: released (5.10.40-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Fixed before branching point" +4.19-buster-security: needed diff --git a/active/CVE-2021-47075 b/active/CVE-2021-47075 new file mode 100644 index 00000000..2d31abef --- /dev/null +++ b/active/CVE-2021-47075 @@ -0,0 +1,16 @@ +Description: nvmet: fix memory leak in nvmet_alloc_ctrl() +References: +Notes: + carnil> Introduced in 94a39d61f80f ("nvmet: make ctrl-id configurable"). Vulnerable + carnil> versions: 5.7-rc1. +Bugs: +upstream: released (5.13-rc3) [fec356a61aa3d3a66416b4321f1279e09e0f256f] +6.7-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.40) [4720f29acb3fe67aa8aa71e6b675b079d193aaeb] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (5.10.40-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Fixed before branching point" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2021-47076 b/active/CVE-2021-47076 new file mode 100644 index 00000000..e499ec49 --- /dev/null +++ b/active/CVE-2021-47076 @@ -0,0 +1,15 @@ +Description: RDMA/rxe: Return CQE error if invalid lkey was supplied +References: +Notes: + carnil> Introduced in 8700e3e7c485 ("Soft RoCE driver"). Vulnerable versions: 4.8-rc1. +Bugs: +upstream: released (5.13-rc3) [dc07628bd2bbc1da768e265192c28ebd301f509d] +6.7-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: needed +4.19-upstream-stable: needed +sid: released (5.14.6-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: needed +4.19-buster-security: needed diff --git a/active/CVE-2021-47077 b/active/CVE-2021-47077 new file mode 100644 index 00000000..b09f72e6 --- /dev/null +++ b/active/CVE-2021-47077 @@ -0,0 +1,16 @@ +Description: scsi: qedf: Add pointer checks in qedf_update_link_speed() +References: +Notes: + carnil> Introduced in 61d8658b4a43 ("scsi: qedf: Add QLogic FastLinQ offload FCoE + carnil> driver framework."). Vulnerable versions: 4.11-rc1. +Bugs: +upstream: released (5.13-rc3) [73578af92a0fae6609b955fcc9113e50e413c80f] +6.7-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.40) [a6362a737572f66051deb7637f3f77ddf7a4402f] +4.19-upstream-stable: needed +sid: released (5.10.40-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Fixed before branching point" +4.19-buster-security: needed diff --git a/active/CVE-2021-47078 b/active/CVE-2021-47078 new file mode 100644 index 00000000..f66a2904 --- /dev/null +++ b/active/CVE-2021-47078 @@ -0,0 +1,15 @@ +Description: RDMA/rxe: Clear all QP fields if creation failed +References: +Notes: + carnil> Introduced in 8700e3e7c485 ("Soft RoCE driver"). Vulnerable versions: 4.8-rc1. +Bugs: +upstream: released (5.13-rc3) [67f29896fdc83298eed5a6576ff8f9873f709228] +6.7-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.40) [2ee4d79c364914989c80de382c0b1a7259a7e4b3] +4.19-upstream-stable: released (4.19.192) [f3783c415bf6d2ead3d7aa2c38802bbe10723646] +sid: released (5.10.40-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Fixed before branching point" +4.19-buster-security: released (4.19.194-1) diff --git a/active/CVE-2021-47079 b/active/CVE-2021-47079 new file mode 100644 index 00000000..51978990 --- /dev/null +++ b/active/CVE-2021-47079 @@ -0,0 +1,16 @@ +Description: platform/x86: ideapad-laptop: fix a NULL pointer dereference +References: +Notes: + carnil> Introduced in ff36b0d953dc4 ("platform/x86: ideapad-laptop: rework and create + carnil> new ACPI helpers"). Vulnerable versions: 5.12-rc1. +Bugs: +upstream: released (5.13-rc3) [ff67dbd554b2aaa22be933eced32610ff90209dd] +6.7-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: N/A "Vulnerable code not present" +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2021-47080 b/active/CVE-2021-47080 new file mode 100644 index 00000000..ea9ce187 --- /dev/null +++ b/active/CVE-2021-47080 @@ -0,0 +1,16 @@ +Description: RDMA/core: Prevent divide-by-zero error triggered by the user +References: +Notes: + carnil> Introduced in 9f85cbe50aa0 ("RDMA/uverbs: Expose the new GID query API to user + carnil> space"). Vulnerable versions: 5.10-rc1. +Bugs: +upstream: released (5.13-rc3) [54d87913f147a983589923c7f651f97de9af5be1] +6.7-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.40) [66ab7fcdac34b890017f04f391507ef5b2b89a13] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (5.10.40-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Fixed before branching point" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2021-47081 b/active/CVE-2021-47081 new file mode 100644 index 00000000..ee49ee5b --- /dev/null +++ b/active/CVE-2021-47081 @@ -0,0 +1,16 @@ +Description: habanalabs/gaudi: Fix a potential use after free in gaudi_memset_device_memory +References: +Notes: + carnil> Introduced in 423815bf02e25 ("habanalabs/gaudi: remove PCI access to SM + carnil> block"). Vulnerable versions: 5.12-rc1. +Bugs: +upstream: released (5.13-rc3) [115726c5d312b462c9d9931ea42becdfa838a076] +6.7-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: N/A "Vulnerable code not present" +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" |