summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2019-10220
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2020-02-09 21:22:45 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2020-02-09 21:22:45 +0100
commit30e923c9029fa0f9ba1976670c8ee73cbf02169e (patch)
tree87b0fd686e9a24569aaaf32fc5792062600f7517 /retired/CVE-2019-10220
parent00d322afed3dc04e74ab0037716e96278c5b8ac6 (diff)
Retire some CVEs
Diffstat (limited to 'retired/CVE-2019-10220')
-rw-r--r--retired/CVE-2019-1022023
1 files changed, 23 insertions, 0 deletions
diff --git a/retired/CVE-2019-10220 b/retired/CVE-2019-10220
new file mode 100644
index 00000000..be260f16
--- /dev/null
+++ b/retired/CVE-2019-10220
@@ -0,0 +1,23 @@
+Description: CIFS: Relative paths injection in directory entry lists
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1741727
+ https://bugzilla.suse.com/show_bug.cgi?id=1144903
+ https://bugzilla.samba.org/show_bug.cgi?id=14072
+Notes:
+ carnil> Needed a followup c512c6918719 ("uaccess: implement a proper
+ carnil> unsafe_copy_to_user() and switch filldir over to it"), cf.
+ carnil> https://lore.kernel.org/linux-fsdevel/20191006222046.GA18027@roeck-us.net/
+ carnil> which landed in 5.4-rc3.
+ bwh> Although this was reported against CIFS, it seems to be a general
+ bwh> vulnerability for all filesystems dealing with untrusted servers or
+ bwh> storage. Thankfully the fix is also general.
+ bwh> The changes to uaccess in filldir are *not* required.
+Bugs:
+upstream: released (5.4-rc4) [8a23eb804ca4f2be909e372cf5a9e7b30ae476cd, b9959c7a347d6adbb558fba7e36e9fef3cba3b07]
+4.19-upstream-stable: released (4.19.93) [40696eb2bce798c4764886fbc576426bd5c4cc3c, 0643c3d694ad9f1e5cb0bc7a487bf9f86a5eaf75]
+4.9-upstream-stable: released (4.9.208) [89f58402e7088d38365f227a7943b1b3fed7489b, 1944687187713590a8722f3f1dfd1cd90e7cbde6]
+3.16-upstream-stable: released (3.16.81) [8b85eda7dac918a308e6e1d9137887930e80827a, 0ad70158f3c02e373e17377237b85e43f06d6752]
+sid: released (5.3.9-1)
+4.19-buster-security: released (4.19.98-1)
+4.9-stretch-security: released (4.9.210-1)
+3.16-jessie-security: released (3.16.81-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy