diff options
author | Ben Hutchings <ben@decadent.org.uk> | 2019-12-01 18:19:44 +0000 |
---|---|---|
committer | Ben Hutchings <ben@decadent.org.uk> | 2019-12-01 18:19:44 +0000 |
commit | 65871d934372bf4ced32a60e8448ba78d7bccc19 (patch) | |
tree | b0b1d1f1f904bb03abe6183857a4b728e0e61cd9 /retired | |
parent | b196a9be5f587e6a8a25cc86782147a59ef49aa8 (diff) |
Retire inactive issues
Diffstat (limited to 'retired')
-rw-r--r-- | retired/CVE-2019-19060 | 15 | ||||
-rw-r--r-- | retired/CVE-2019-19061 | 15 | ||||
-rw-r--r-- | retired/CVE-2019-19067 | 13 | ||||
-rw-r--r-- | retired/CVE-2019-19069 | 14 | ||||
-rw-r--r-- | retired/CVE-2019-19075 | 13 | ||||
-rw-r--r-- | retired/CVE-2019-19076 | 14 | ||||
-rw-r--r-- | retired/CVE-2019-19083 | 13 |
7 files changed, 97 insertions, 0 deletions
diff --git a/retired/CVE-2019-19060 b/retired/CVE-2019-19060 new file mode 100644 index 000000000..d8d109313 --- /dev/null +++ b/retired/CVE-2019-19060 @@ -0,0 +1,15 @@ +Description: iio: imu: adis16400: release allocated memory on failure +References: +Notes: + bwh> The "leaked" memory will still be freed on the next call to + bwh> adis_update_scan_mode() or removal of the driver, so this is not + bwh> exploitable. +Bugs: +upstream: released (5.4-rc3) [ab612b1daf415b62c58e130cb3d0f30b255a14d0] +4.19-upstream-stable: released (4.19.82) [4a4206a83fc69782d4ef36d8f5eb28836d8b6814] +4.9-upstream-stable: ignored "Not a real issue" +3.16-upstream-stable: ignored "Not a real issue" +sid: released (5.3.9-1) +4.19-buster-security: ignored "Not a real issue" +4.9-stretch-security: ignored "Not a real issue" +3.16-jessie-security: ignored "Not a real issue" diff --git a/retired/CVE-2019-19061 b/retired/CVE-2019-19061 new file mode 100644 index 000000000..c69e1d5f8 --- /dev/null +++ b/retired/CVE-2019-19061 @@ -0,0 +1,15 @@ +Description: iio: imu: adis16400: fix memory leak +References: +Notes: + bwh> The "leaked" memory will still be freed on the next call to + bwh> adis_update_scan_mode() or removal of the driver, so this is not + bwh> exploitable. +Bugs: +upstream: released (5.4-rc3) [9c0530e898f384c5d279bfcebd8bb17af1105873] +4.19-upstream-stable: ignored "Not a real issue" +4.9-upstream-stable: ignored "Not a real issue" +3.16-upstream-stable: ignored "Not a real issue" +sid: released (5.3.9-1) +4.19-buster-security: ignored "Not a real issue" +4.9-stretch-security: ignored "Not a real issue" +3.16-jessie-security: ignored "Not a real issue" diff --git a/retired/CVE-2019-19067 b/retired/CVE-2019-19067 new file mode 100644 index 000000000..2b75e2c61 --- /dev/null +++ b/retired/CVE-2019-19067 @@ -0,0 +1,13 @@ +Description: drm/amdgpu: fix multiple memory leaks in acp_hw_init +References: +Notes: + bwh> This is a potential memory leak on probe, which is not a vulnerability. +Bugs: +upstream: released (5.4-rc2) [57be09c6e8747bf48704136d9e3f92bfb93f5725] +4.19-upstream-stable: ignored "Not a real issue" +4.9-upstream-stable: ignored "Not a real issue" +3.16-upstream-stable: ignored "Not a real issue" +sid: released (5.3.9-1) +4.19-buster-security: ignored "Not a real issue" +4.9-stretch-security: ignored "Not a real issue" +3.16-jessie-security: ignored "Not a real issue" diff --git a/retired/CVE-2019-19069 b/retired/CVE-2019-19069 new file mode 100644 index 000000000..496dacc04 --- /dev/null +++ b/retired/CVE-2019-19069 @@ -0,0 +1,14 @@ +Description: misc: fastrpc: prevent memory leak in fastrpc_dma_buf_attach +References: +Notes: + bwh> Introduced in 5.1 by commit 6cffd79504ce "misc: fastrpc: Add support + bwh> for dmabuf exporter". +Bugs: +upstream: released (5.4-rc3) [fc739a058d99c9297ef6bfd923b809d85855b9a9] +4.19-upstream-stable: N/A "Vulnerable code not present" +4.9-upstream-stable: N/A "Vulnerable code not present" +3.16-upstream-stable: N/A "Vulnerable code not present" +sid: released (5.3.9-1) +4.19-buster-security: N/A "Vulnerable code not present" +4.9-stretch-security: N/A "Vulnerable code not present" +3.16-jessie-security: N/A "Vulnerable code not present" diff --git a/retired/CVE-2019-19075 b/retired/CVE-2019-19075 new file mode 100644 index 000000000..86a4d0297 --- /dev/null +++ b/retired/CVE-2019-19075 @@ -0,0 +1,13 @@ +Description: ieee802154: ca8210: prevent memory leak +References: +Notes: + bwh: This is a potential memory leak on probe, which is not a vulnerability. +Bugs: +upstream: released (5.4-rc2) [6402939ec86eaf226c8b8ae00ed983936b164908] +4.19-upstream-stable: released (4.19.81) [960019214539ce75398eaf38d31c77b86aadd739] +4.9-upstream-stable: ignored "Not a real issue" +3.16-upstream-stable: ignored "Not a real issue" +sid: released (5.3.9-1) +4.19-buster-security: ignored "Not a real issue" +4.9-stretch-security: ignored "Not a real issue" +3.16-jessie-security: ignored "Not a real issue" diff --git a/retired/CVE-2019-19076 b/retired/CVE-2019-19076 new file mode 100644 index 000000000..1db880986 --- /dev/null +++ b/retired/CVE-2019-19076 @@ -0,0 +1,14 @@ +Description: nfp: abm: fix memory leak in nfp_abm_u32_knode_replace +References: +Notes: + bwh> Introduced in 5.0 by commit 174ab544e3bc "nfp: abm: add cls_u32 + bwh> offload for simple band classification". +Bugs: +upstream: released (5.4-rc1) [78beef629fd95be4ed853b2d37b832f766bd96ca] +4.19-upstream-stable: N/A "Vulnerable code not present" +4.9-upstream-stable: N/A "Vulnerable code not present" +3.16-upstream-stable: N/A "Vulnerable code not present" +sid: released (5.3.7-1) +4.19-buster-security: N/A "Vulnerable code not present" +4.9-stretch-security: N/A "Vulnerable code not present" +3.16-jessie-security: N/A "Vulnerable code not present" diff --git a/retired/CVE-2019-19083 b/retired/CVE-2019-19083 new file mode 100644 index 000000000..117614d33 --- /dev/null +++ b/retired/CVE-2019-19083 @@ -0,0 +1,13 @@ +Description: drm/amd/display: memory leak +References: +Notes: + bwh: This is a potential memory leak on probe, which is not a vulnerability. +Bugs: +upstream: released (5.4-rc2) [055e547478a11a6360c7ce05e2afc3e366968a12] +4.19-upstream-stable: ignored "Not a real isue" +4.9-upstream-stable: N/A "Affected code not present" +3.16-upstream-stable: N/A "Affected code not present" +sid: released (5.3.9-1) +4.19-buster-security: ignored "Not a real isue" +4.9-stretch-security: N/A "Affected code not present" +3.16-jessie-security: N/A "Affected code not present" |