diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2023-07-18 22:09:49 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2023-07-18 22:09:49 +0200 |
commit | 3d1daa1480d3edad7d8a7df8e0fec2d1ae263e4b (patch) | |
tree | 5ded74554e0afa3dcba24a1c3421e6512b9a7031 /retired | |
parent | 976e1f3fd9c3639b0ac6d2500e4792307d9d50c1 (diff) |
Retire some CVEs
Diffstat (limited to 'retired')
-rw-r--r-- | retired/CVE-2023-2156 | 23 | ||||
-rw-r--r-- | retired/CVE-2023-23006 | 14 | ||||
-rw-r--r-- | retired/CVE-2023-38409 | 14 | ||||
-rw-r--r-- | retired/CVE-2023-38426 | 12 | ||||
-rw-r--r-- | retired/CVE-2023-38427 | 12 | ||||
-rw-r--r-- | retired/CVE-2023-38428 | 12 | ||||
-rw-r--r-- | retired/CVE-2023-38429 | 12 | ||||
-rw-r--r-- | retired/CVE-2023-38430 | 12 | ||||
-rw-r--r-- | retired/CVE-2023-38431 | 12 | ||||
-rw-r--r-- | retired/CVE-2023-38432 | 12 |
10 files changed, 135 insertions, 0 deletions
diff --git a/retired/CVE-2023-2156 b/retired/CVE-2023-2156 new file mode 100644 index 00000000..5fce65f6 --- /dev/null +++ b/retired/CVE-2023-2156 @@ -0,0 +1,23 @@ +Description: Linux Kernel IPv6 RPL Protocol Reachable Assertion Denial-of-Service Vulnerability +References: + https://www.zerodayinitiative.com/advisories/ZDI-23-547/ + https://bugzilla.redhat.com/show_bug.cgi?id=2196292#c1 + https://www.interruptlabs.co.uk//articles/linux-ipv6-route-of-death +Notes: + carnil> From ZDI advisory: "Mitigation: Given the nature of the + carnil> vulnerability, the only salient mitigation strategy is to + carnil> restrict interaction with the application." Upstream related + carnil> commit is 4e006c7a6dac ("net: rpl: fix rpl header size + carnil> calculation"). + carnil> Exploitng the issue requires rpl_seg_enabled to be enabled + carnil> (net.ipv6.conf.*.rpl_seg_enabled=1) + carnil> Fixed as well in 6.3.8 for 6.3.y. +Bugs: +upstream: released (6.4-rc6) [a2f4c143d76b1a47c91ef9bc46907116b111da0b] +6.1-upstream-stable: released (6.1.34) [251b5d68ac4748f210577d84f1cd5a664c54785f] +5.10-upstream-stable: released (5.10.184) [86e3981ff1bc501071100036435683c45aa70958] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.3.11-1) +6.1-bookworm-security: released (6.1.37-1) +5.10-bullseye-security: released (5.10.179-2) [bugfix/all/ipv6-rpl-Fix-Route-of-Death.patch] +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/retired/CVE-2023-23006 b/retired/CVE-2023-23006 new file mode 100644 index 00000000..2a72f1e3 --- /dev/null +++ b/retired/CVE-2023-23006 @@ -0,0 +1,14 @@ +Description: net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources +References: +Notes: + bwh> Introduced in 5.4 by commit 4ec9e7b02697 "net/mlx5: DR, Expose + bwh> steering domain functionality". +Bugs: +upstream: released (5.16-rc8) [6b8b42585886c59a008015083282aae434349094] +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.90) [4cd1da02f0c39606e3378c9255f17d6f85d106c7] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (5.15.15-1) +6.1-bookworm-security: N/A "Fixed before branch point" +5.10-bullseye-security: released (5.10.92-1) +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/retired/CVE-2023-38409 b/retired/CVE-2023-38409 new file mode 100644 index 00000000..fa70aaf8 --- /dev/null +++ b/retired/CVE-2023-38409 @@ -0,0 +1,14 @@ +Description: fbcon: set_con2fb_map needs to set con2fb_map! +References: +Notes: + carnil> Commit fixes d443d9386472 ("fbcon: move more common code into + carnil> fb_open()") in 5.19-rc1. +Bugs: +upstream: released (6.3-rc7) [fffb0b52d5258554c645c966c6cbef7de50b851d] +6.1-upstream-stable: released (6.1.25) [b15df140fe092c3ac28dab32c6b3acdda1a93c63] +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.1.25-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/retired/CVE-2023-38426 b/retired/CVE-2023-38426 new file mode 100644 index 00000000..7e3778a5 --- /dev/null +++ b/retired/CVE-2023-38426 @@ -0,0 +1,12 @@ +Description: ksmbd: fix global-out-of-bounds in smb2_find_context_vals +References: +Notes: +Bugs: +upstream: released (6.4-rc3) [02f76c401d17e409ed45bf7887148fcc22c93c85] +6.1-upstream-stable: released (6.1.30) [75378b03a90d75b1349bb03577ac8465194c883e] +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.3.7-1) +6.1-bookworm-security: released (6.1.37-1) +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/retired/CVE-2023-38427 b/retired/CVE-2023-38427 new file mode 100644 index 00000000..98be5fb5 --- /dev/null +++ b/retired/CVE-2023-38427 @@ -0,0 +1,12 @@ +Description: ksmbd: fix out-of-bound read in deassemble_neg_contexts() +References: +Notes: +Bugs: +upstream: released (6.4-rc6) [f1a411873c85b642f13b01f21b534c2bab81fc1b] +6.1-upstream-stable: released (6.1.34) [bf12d7fb63b365fb766655cedcb5d5f292b0c35e] +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.3.11-1) +6.1-bookworm-security: released (6.1.37-1) +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/retired/CVE-2023-38428 b/retired/CVE-2023-38428 new file mode 100644 index 00000000..c7a537a9 --- /dev/null +++ b/retired/CVE-2023-38428 @@ -0,0 +1,12 @@ +Description: ksmbd: fix wrong UserName check in session_user +References: +Notes: +Bugs: +upstream: released (6.4-rc3) [f0a96d1aafd8964e1f9955c830a3e5cb3c60a90f] +6.1-upstream-stable: released (6.1.30) [40d90ee0275a1bfcd26fa7690adc4330b4227a69] +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.3.7-1) +6.1-bookworm-security: released (6.1.37-1) +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/retired/CVE-2023-38429 b/retired/CVE-2023-38429 new file mode 100644 index 00000000..c5b964ca --- /dev/null +++ b/retired/CVE-2023-38429 @@ -0,0 +1,12 @@ +Description: ksmbd: allocate one more byte for implied bcc[0] +References: +Notes: +Bugs: +upstream: released (6.4-rc3) [443d61d1fa9faa60ef925513d83742902390100f] +6.1-upstream-stable: released (6.1.30) [af7335a4b946f9f6f9d98398cbcea15cd9850409] +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.3.7-1) +6.1-bookworm-security: released (6.1.37-1) +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/retired/CVE-2023-38430 b/retired/CVE-2023-38430 new file mode 100644 index 00000000..1d7444e2 --- /dev/null +++ b/retired/CVE-2023-38430 @@ -0,0 +1,12 @@ +Description: ksmbd: validate smb request protocol id +References: +Notes: +Bugs: +upstream: released (6.4-rc6) [1c1bcf2d3ea061613119b534f57507c377df20f9] +6.1-upstream-stable: released (6.1.35) [e01fc7caac9ce9ad76df9f42f7f61ef4bf1d27c9] +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.3.11-1) +6.1-bookworm-security: released (6.1.37-1) +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/retired/CVE-2023-38431 b/retired/CVE-2023-38431 new file mode 100644 index 00000000..1b9df7e4 --- /dev/null +++ b/retired/CVE-2023-38431 @@ -0,0 +1,12 @@ +Description: ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop +References: +Notes: +Bugs: +upstream: released (6.4-rc6) [368ba06881c395f1c9a7ba22203cf8d78b4addc0] +6.1-upstream-stable: released (6.1.34) [543c12c2644e772caa6880662c2a852cfdc5a10c] +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.3.11-1) +6.1-bookworm-security: released (6.1.37-1) +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/retired/CVE-2023-38432 b/retired/CVE-2023-38432 new file mode 100644 index 00000000..9773c2a0 --- /dev/null +++ b/retired/CVE-2023-38432 @@ -0,0 +1,12 @@ +Description: ksmbd: validate command payload size +References: +Notes: +Bugs: +upstream: released (6.4) [2b9b8f3b68edb3d67d79962f02e26dbb5ae3808d] +6.1-upstream-stable: released (6.1.36) [9650cf70ec9d94ff34daa088b643229231723c26] +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.3.11-1) +6.1-bookworm-security: released (6.1.37-1) +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" |