[Secure-testing-commits] r42588 - data/CVE
Ben Hutchings
benh at moszumanska.debian.org
Fri Jun 17 03:06:30 UTC 2016
Author: benh
Date: 2016-06-17 03:06:30 +0000 (Fri, 17 Jun 2016)
New Revision: 42588
Modified:
data/CVE/list
Log:
Triage some linux kernel issues
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-06-17 00:38:26 UTC (rev 42587)
+++ data/CVE/list 2016-06-17 03:06:30 UTC (rev 42588)
@@ -3081,6 +3081,8 @@
NOTE: http://www.openwall.com/lists/oss-security/2016/05/07/8
CVE-2016-4558 (The BPF subsystem in the Linux kernel before 4.5.5 mishandles ...)
- linux 4.5.3-1
+ [jessie] - linux <not-affected> (Issue introduced later)
+ [wheezy] - linux <not-affected> (Issue introduced later)
NOTE: Fixed by: https://git.kernel.org/linus/92117d8443bc5afacc8d5ba82e541946310f106e
NOTE: Introduced by: https://git.kernel.org/linus/1be7f75d1668d6296b80bf35dcf6762393530afc(v4.4-rc1)
NOTE: https://bugs.chromium.org/p/project-zero/issues/detail?id=809
@@ -7757,15 +7759,21 @@
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1296567
NOTE: http://www.openwall.com/lists/oss-security/2016/03/03/9
CVE-2016-2854 (The aufs module for the Linux kernel 3.x and 4.x does not properly ...)
- - linux <unfixed>
+ - linux <not-affected> (Vulnerable code is not present)
+ [jessie] - linux <no-dsa> (Not exploitable in default configuration)
NOTE: http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/
NOTE: https://sourceforge.net/p/aufs/mailman/message/34864744/
- TODO: doublecheck with Ben, aufs is available as udebs, but not as a standard kernel module (possibly only in use for live images)
+ NOTE: This depends on a user namespace creator being able to mount aufs.
+ NOTE: jessie: Unprivileged users are not allowed to create user namespaces by default; aufs is not allowed to be mounted from a new user namespace by default.
+ NOTE: wheezy: User namespaces are non-functional.
CVE-2016-2853 (The aufs module for the Linux kernel 3.x and 4.x does not properly ...)
- - linux <unfixed>
+ - linux <not-affected> (Vulnerable code is not present)
+ [jessie] - linux <no-dsa> (Not exploitable in default configuration)
NOTE: http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/
NOTE: https://sourceforge.net/p/aufs/mailman/message/34864744/
- TODO: doublecheck with Ben, aufs is available as udebs, but not as a standard kernel module (possibly only in use for live images)
+ NOTE: This depends on a user namespace creator being able to mount aufs.
+ NOTE: jessie: Unprivileged users are not allowed to create user namespaces by default; aufs is not allowed to be mounted from a new user namespace by default.
+ NOTE: wheezy: User namespaces are non-functional.
CVE-2016-2839
RESERVED
CVE-2016-2838
More information about the Secure-testing-commits
mailing list