summaryrefslogtreecommitdiffstats
path: root/retired
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2023-07-18 22:09:49 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2023-07-18 22:09:49 +0200
commit3d1daa1480d3edad7d8a7df8e0fec2d1ae263e4b (patch)
tree5ded74554e0afa3dcba24a1c3421e6512b9a7031 /retired
parent976e1f3fd9c3639b0ac6d2500e4792307d9d50c1 (diff)
Retire some CVEs
Diffstat (limited to 'retired')
-rw-r--r--retired/CVE-2023-215623
-rw-r--r--retired/CVE-2023-2300614
-rw-r--r--retired/CVE-2023-3840914
-rw-r--r--retired/CVE-2023-3842612
-rw-r--r--retired/CVE-2023-3842712
-rw-r--r--retired/CVE-2023-3842812
-rw-r--r--retired/CVE-2023-3842912
-rw-r--r--retired/CVE-2023-3843012
-rw-r--r--retired/CVE-2023-3843112
-rw-r--r--retired/CVE-2023-3843212
10 files changed, 135 insertions, 0 deletions
diff --git a/retired/CVE-2023-2156 b/retired/CVE-2023-2156
new file mode 100644
index 00000000..5fce65f6
--- /dev/null
+++ b/retired/CVE-2023-2156
@@ -0,0 +1,23 @@
+Description: Linux Kernel IPv6 RPL Protocol Reachable Assertion Denial-of-Service Vulnerability
+References:
+ https://www.zerodayinitiative.com/advisories/ZDI-23-547/
+ https://bugzilla.redhat.com/show_bug.cgi?id=2196292#c1
+ https://www.interruptlabs.co.uk//articles/linux-ipv6-route-of-death
+Notes:
+ carnil> From ZDI advisory: "Mitigation: Given the nature of the
+ carnil> vulnerability, the only salient mitigation strategy is to
+ carnil> restrict interaction with the application." Upstream related
+ carnil> commit is 4e006c7a6dac ("net: rpl: fix rpl header size
+ carnil> calculation").
+ carnil> Exploitng the issue requires rpl_seg_enabled to be enabled
+ carnil> (net.ipv6.conf.*.rpl_seg_enabled=1)
+ carnil> Fixed as well in 6.3.8 for 6.3.y.
+Bugs:
+upstream: released (6.4-rc6) [a2f4c143d76b1a47c91ef9bc46907116b111da0b]
+6.1-upstream-stable: released (6.1.34) [251b5d68ac4748f210577d84f1cd5a664c54785f]
+5.10-upstream-stable: released (5.10.184) [86e3981ff1bc501071100036435683c45aa70958]
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (6.3.11-1)
+6.1-bookworm-security: released (6.1.37-1)
+5.10-bullseye-security: released (5.10.179-2) [bugfix/all/ipv6-rpl-Fix-Route-of-Death.patch]
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2023-23006 b/retired/CVE-2023-23006
new file mode 100644
index 00000000..2a72f1e3
--- /dev/null
+++ b/retired/CVE-2023-23006
@@ -0,0 +1,14 @@
+Description: net/mlx5: DR, Fix NULL vs IS_ERR checking in dr_domain_init_resources
+References:
+Notes:
+ bwh> Introduced in 5.4 by commit 4ec9e7b02697 "net/mlx5: DR, Expose
+ bwh> steering domain functionality".
+Bugs:
+upstream: released (5.16-rc8) [6b8b42585886c59a008015083282aae434349094]
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: released (5.10.90) [4cd1da02f0c39606e3378c9255f17d6f85d106c7]
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (5.15.15-1)
+6.1-bookworm-security: N/A "Fixed before branch point"
+5.10-bullseye-security: released (5.10.92-1)
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2023-38409 b/retired/CVE-2023-38409
new file mode 100644
index 00000000..fa70aaf8
--- /dev/null
+++ b/retired/CVE-2023-38409
@@ -0,0 +1,14 @@
+Description: fbcon: set_con2fb_map needs to set con2fb_map!
+References:
+Notes:
+ carnil> Commit fixes d443d9386472 ("fbcon: move more common code into
+ carnil> fb_open()") in 5.19-rc1.
+Bugs:
+upstream: released (6.3-rc7) [fffb0b52d5258554c645c966c6cbef7de50b851d]
+6.1-upstream-stable: released (6.1.25) [b15df140fe092c3ac28dab32c6b3acdda1a93c63]
+5.10-upstream-stable: N/A "Vulnerable code not present"
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (6.1.25-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2023-38426 b/retired/CVE-2023-38426
new file mode 100644
index 00000000..7e3778a5
--- /dev/null
+++ b/retired/CVE-2023-38426
@@ -0,0 +1,12 @@
+Description: ksmbd: fix global-out-of-bounds in smb2_find_context_vals
+References:
+Notes:
+Bugs:
+upstream: released (6.4-rc3) [02f76c401d17e409ed45bf7887148fcc22c93c85]
+6.1-upstream-stable: released (6.1.30) [75378b03a90d75b1349bb03577ac8465194c883e]
+5.10-upstream-stable: N/A "Vulnerable code not present"
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (6.3.7-1)
+6.1-bookworm-security: released (6.1.37-1)
+5.10-bullseye-security: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2023-38427 b/retired/CVE-2023-38427
new file mode 100644
index 00000000..98be5fb5
--- /dev/null
+++ b/retired/CVE-2023-38427
@@ -0,0 +1,12 @@
+Description: ksmbd: fix out-of-bound read in deassemble_neg_contexts()
+References:
+Notes:
+Bugs:
+upstream: released (6.4-rc6) [f1a411873c85b642f13b01f21b534c2bab81fc1b]
+6.1-upstream-stable: released (6.1.34) [bf12d7fb63b365fb766655cedcb5d5f292b0c35e]
+5.10-upstream-stable: N/A "Vulnerable code not present"
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (6.3.11-1)
+6.1-bookworm-security: released (6.1.37-1)
+5.10-bullseye-security: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2023-38428 b/retired/CVE-2023-38428
new file mode 100644
index 00000000..c7a537a9
--- /dev/null
+++ b/retired/CVE-2023-38428
@@ -0,0 +1,12 @@
+Description: ksmbd: fix wrong UserName check in session_user
+References:
+Notes:
+Bugs:
+upstream: released (6.4-rc3) [f0a96d1aafd8964e1f9955c830a3e5cb3c60a90f]
+6.1-upstream-stable: released (6.1.30) [40d90ee0275a1bfcd26fa7690adc4330b4227a69]
+5.10-upstream-stable: N/A "Vulnerable code not present"
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (6.3.7-1)
+6.1-bookworm-security: released (6.1.37-1)
+5.10-bullseye-security: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2023-38429 b/retired/CVE-2023-38429
new file mode 100644
index 00000000..c5b964ca
--- /dev/null
+++ b/retired/CVE-2023-38429
@@ -0,0 +1,12 @@
+Description: ksmbd: allocate one more byte for implied bcc[0]
+References:
+Notes:
+Bugs:
+upstream: released (6.4-rc3) [443d61d1fa9faa60ef925513d83742902390100f]
+6.1-upstream-stable: released (6.1.30) [af7335a4b946f9f6f9d98398cbcea15cd9850409]
+5.10-upstream-stable: N/A "Vulnerable code not present"
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (6.3.7-1)
+6.1-bookworm-security: released (6.1.37-1)
+5.10-bullseye-security: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2023-38430 b/retired/CVE-2023-38430
new file mode 100644
index 00000000..1d7444e2
--- /dev/null
+++ b/retired/CVE-2023-38430
@@ -0,0 +1,12 @@
+Description: ksmbd: validate smb request protocol id
+References:
+Notes:
+Bugs:
+upstream: released (6.4-rc6) [1c1bcf2d3ea061613119b534f57507c377df20f9]
+6.1-upstream-stable: released (6.1.35) [e01fc7caac9ce9ad76df9f42f7f61ef4bf1d27c9]
+5.10-upstream-stable: N/A "Vulnerable code not present"
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (6.3.11-1)
+6.1-bookworm-security: released (6.1.37-1)
+5.10-bullseye-security: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2023-38431 b/retired/CVE-2023-38431
new file mode 100644
index 00000000..1b9df7e4
--- /dev/null
+++ b/retired/CVE-2023-38431
@@ -0,0 +1,12 @@
+Description: ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop
+References:
+Notes:
+Bugs:
+upstream: released (6.4-rc6) [368ba06881c395f1c9a7ba22203cf8d78b4addc0]
+6.1-upstream-stable: released (6.1.34) [543c12c2644e772caa6880662c2a852cfdc5a10c]
+5.10-upstream-stable: N/A "Vulnerable code not present"
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (6.3.11-1)
+6.1-bookworm-security: released (6.1.37-1)
+5.10-bullseye-security: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/retired/CVE-2023-38432 b/retired/CVE-2023-38432
new file mode 100644
index 00000000..9773c2a0
--- /dev/null
+++ b/retired/CVE-2023-38432
@@ -0,0 +1,12 @@
+Description: ksmbd: validate command payload size
+References:
+Notes:
+Bugs:
+upstream: released (6.4) [2b9b8f3b68edb3d67d79962f02e26dbb5ae3808d]
+6.1-upstream-stable: released (6.1.36) [9650cf70ec9d94ff34daa088b643229231723c26]
+5.10-upstream-stable: N/A "Vulnerable code not present"
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (6.3.11-1)
+6.1-bookworm-security: released (6.1.37-1)
+5.10-bullseye-security: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy