summaryrefslogtreecommitdiffstats
path: root/retired
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2019-09-07 10:41:32 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2019-09-07 10:41:32 +0200
commitac6f2b169e6ca1c3b4da17b2f170ac8d6a1120c3 (patch)
treec7852d2053f3eed4a46bd751267294fe713a0a19 /retired
parent8f50cd785ed10c2531166ebdde4cdd4d1c434213 (diff)
Retire several CVEs
Diffstat (limited to 'retired')
-rw-r--r--retired/CVE-2019-1509014
-rw-r--r--retired/CVE-2019-1592515
-rw-r--r--retired/CVE-2019-390013
-rw-r--r--retired/CVE-2019-ctnl-addr-leak13
-rw-r--r--retired/XSA-30018
5 files changed, 73 insertions, 0 deletions
diff --git a/retired/CVE-2019-15090 b/retired/CVE-2019-15090
new file mode 100644
index 000000000..8ef368b81
--- /dev/null
+++ b/retired/CVE-2019-15090
@@ -0,0 +1,14 @@
+Description: scsi: qedi: remove memset/memcpy to nfunc and use func instead
+References:
+Notes:
+ carnil> Issue introduced in ace7f46ba5fd ("scsi: qedi: Add QLogic
+ carnil> FastLinQ offload iSCSI driver framework.") in 4.10-rc1.
+Bugs:
+upstream: released (5.2-rc2) [c09581a52765a85f19fc35340127396d5e3379cc]
+4.19-upstream-stable: released (4.19.53) [f3a7a1137ffc69e1f460eb9e1b5f4fd09d3c4ea9]
+4.9-upstream-stable: N/A "Vulnerable code introduced later"
+3.16-upstream-stable: N/A "Vulnerable code introduced later"
+sid: released (5.2.6-1)
+4.19-buster-security: released (4.19.67-1)
+4.9-stretch-security: N/A "Vulnerable code introduced later"
+3.16-jessie-security: N/A "Vulnerable code introduced later"
diff --git a/retired/CVE-2019-15925 b/retired/CVE-2019-15925
new file mode 100644
index 000000000..3671d8e09
--- /dev/null
+++ b/retired/CVE-2019-15925
@@ -0,0 +1,15 @@
+Description: net: hns3: add some error checking in hclge_tm module
+References:
+Notes:
+ carnil> Needs check when introduced but likely 848440544b41 ("net:
+ carnil> hns3: Add support of TX Scheduler & Shaper to HNS3 driver") in
+ carnil> 4.14-rc1.
+Bugs:
+upstream: released (5.3-rc1) [04f25edb48c441fc278ecc154c270f16966cbb90]
+4.19-upstream-stable: released (4.19.61) [26d86b29e806769adba91bd6fc1f077b94e9b64b]
+4.9-upstream-stable: N/A "Vulnerable code introduced later"
+3.16-upstream-stable: N/A "Vulnerable code introduced later"
+sid: released (5.2.6-1)
+4.19-buster-security: released (4.19.67-1)
+4.9-stretch-security: N/A "Vulnerable code introduced later"
+3.16-jessie-security: N/A "Vulnerable code introduced later"
diff --git a/retired/CVE-2019-3900 b/retired/CVE-2019-3900
new file mode 100644
index 000000000..38c3210f9
--- /dev/null
+++ b/retired/CVE-2019-3900
@@ -0,0 +1,13 @@
+Description: vhost_net: fix possible infinite loop
+References:
+ https://lore.kernel.org/lkml/1558067392-11740-1-git-send-email-jasowang@redhat.com/
+Notes:
+Bugs:
+upstream: released (5.2-rc4) [e2412c07f8f3040593dfb88207865a3cd58680c0, e79b431fb901ba1106670bcc80b9b617b25def7d, c1ea02f15ab5efb3e93fc3144d895410bf79fcf2]
+4.19-upstream-stable: released (4.19.64) [3af3b843aee41ed22343b011a4cf3812a80d2f38, 239910101c4ebf91a00e6f4a81ac3144b121f0c4, 02cdc166128cf9cb2be4786b997eebbc0b976bfa]
+4.9-upstream-stable: released (4.9.190) [66c8d9d53e657d5068d9f234bc4ec1d703107a48, 4b586288578a3a2aa4efb969feed86f2d760f082, 02b40edda9fd2e42abae40f5dd85122f13dbe7b8]
+3.16-upstream-stable: released (3.16.72) [f3a64b1071c414e59233b769110872a026f8d254, 6c74f68cf3ca570f39ff8a9e3b0ae357839c4560]
+sid: released (5.2.6-1)
+4.19-buster-security: released (4.19.67-1)
+4.9-stretch-security: released (4.9.168-1+deb9u5) [bugfix/all/vhost-introduce-vhost_exceeds_weight.patch, bugfix/all/vhost_net-fix-possible-infinite-loop.patch, bugfix/all/vhost-scsi-add-weight-support.patch]
+3.16-jessie-security: released (3.16.72-1)
diff --git a/retired/CVE-2019-ctnl-addr-leak b/retired/CVE-2019-ctnl-addr-leak
new file mode 100644
index 000000000..cb73cd089
--- /dev/null
+++ b/retired/CVE-2019-ctnl-addr-leak
@@ -0,0 +1,13 @@
+Description: ctnetlink uses kernel addresses as user-visible IDs
+References:
+Notes:
+ bwh> Fix depends on adding siphash
+Bugs:
+upstream: released (5.1-rc7) [3c79107631db1f7fd32cf3f7368e4672004a3010]
+4.19-upstream-stable: released (4.19.44) [7b115755fb9d3aff0ddcd18a5c4d83381362acce]
+4.9-upstream-stable: released (4.9.190) [1922476beeeea46bebbe577215078736dd4231dc]
+3.16-upstream-stable: released (3.16.72) [3d8b3d0384f709126beef6b917b7e97c23f18e74]
+sid: released (5.2.6-1)
+4.19-buster-security: released (4.19.67-1)
+4.9-stretch-security: released (4.9.168-1+deb9u5) [bugfix/all/netfilter-ctnetlink-don-t-use-conntrack-expect-objec.patch]
+3.16-jessie-security: released (3.16.72-1)
diff --git a/retired/XSA-300 b/retired/XSA-300
new file mode 100644
index 000000000..05fbd0c1c
--- /dev/null
+++ b/retired/XSA-300
@@ -0,0 +1,18 @@
+Description: No grant table and foreign mapping limits
+References:
+ https://xenbits.xen.org/xsa/advisory-300.html
+Notes:
+ carnil> Is a1078e821b60 ("xen: let alloc_xenballooned_pages() fail if
+ carnil> not enough memory free") enough or is more needed?
+ benh> The advisory says another patch will be needed for domU.
+ benh> For 3.16 we need d02bd27bd33d "mm/page_alloc.c: calculate
+ benh> 'available' memory in a separate function" first.
+Bugs:
+upstream: released (5.3-rc1) [a1078e821b605813b63bf6bca414a85f804d5c66]
+4.19-upstream-stable: released (4.19.61) [e73db096691e5f2720049502a3794a2a0c6d1b1f]
+4.9-upstream-stable: released (4.9.187) [259b0fc2caddc21a6b561b595747a8091102f7ff]
+3.16-upstream-stable: released (3.16.72) [2ed58e578b03269b23eb7119fb38478725ae6470]
+sid: released (5.2.6-1)
+4.19-buster-security: released (4.19.67-1)
+4.9-stretch-security: released (4.9.168-1+deb9u5) [bugfix/all/xen-let-alloc_xenballooned_pages-fail-if-not-enough-.patch]
+3.16-jessie-security: released (3.16.72-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy