[Secure-testing-commits] r42605 - data/CVE
Ben Hutchings
benh at moszumanska.debian.org
Fri Jun 17 18:30:27 UTC 2016
Author: benh
Date: 2016-06-17 18:30:27 +0000 (Fri, 17 Jun 2016)
New Revision: 42605
Modified:
data/CVE/list
Log:
Mark various kernel issues fixed or not-affected
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-06-17 17:45:55 UTC (rev 42604)
+++ data/CVE/list 2016-06-17 18:30:27 UTC (rev 42605)
@@ -2531,6 +2531,7 @@
NOTE: PHP bug: https://bugs.php.net/bug.php?id=69793
CVE-2016-4805 (Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the ...)
- linux 4.5.2-1
+ [wheezy] - linux 3.2.81-1
NOTE: Fixed by: https://git.kernel.org/linus/1f461dcdd296eecedaffffc6bae2bfa90bd7eb89 (v4.6-rc1)
NOTE: Introduced by: https://git.kernel.org/linus/273ec51dd7ceaa76e038875d85061ec856d8905e (v2.6.30)
CVE-2016-4804 (The read_boot function in boot.c in dosfstools before 4.0 allows ...)
@@ -7843,7 +7844,7 @@
CVE-2016-2854 (The aufs module for the Linux kernel 3.x and 4.x does not properly ...)
- linux 3.18-1~exp1
[jessie] - linux <no-dsa> (Not exploitable in default configuration)
- [wheezy] - linux <no-dsa> (User namespaces are non-functional)
+ [wheezy] - linux <not-affected> (Vulnerable code is not present)
NOTE: http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/
NOTE: https://sourceforge.net/p/aufs/mailman/message/34864744/
NOTE: This depends on a user namespace creator being able to mount aufs.
@@ -7852,7 +7853,7 @@
CVE-2016-2853 (The aufs module for the Linux kernel 3.x and 4.x does not properly ...)
- linux 3.18-1~exp1
[jessie] - linux <no-dsa> (Not exploitable in default configuration)
- [wheezy] - linux <no-dsa> (User namespaces are non-functional)
+ [wheezy] - linux <not-affected> (Vulnerable code is not present)
NOTE: http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/
NOTE: https://sourceforge.net/p/aufs/mailman/message/34864744/
NOTE: This depends on a user namespace creator being able to mount aufs.
@@ -17929,7 +17930,7 @@
CVE-2015-8374 (fs/btrfs/inode.c in the Linux kernel before 4.3.3 mishandles ...)
- linux 4.2.6-2
[jessie] - linux 3.16.7-ckt20-1+deb8u1
- [wheezy] - linux <no-dsa> (Minor issue, BTRFS only tech-preview in wheezy; can be fixed in a point release)
+ [wheezy] - linux 3.2.78-1
- linux-2.6 <removed>
[squeeze] - linux-2.6 <no-dsa> (btrfs in 2.6.32 is just a tech preview and not usable for production)
NOTE: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0305cd5f7fca85dae392b9ba85b116896eb7c1c7 (v4.4-rc1)
@@ -20590,7 +20591,7 @@
CVE-2015-7515 (The aiptek_probe function in drivers/input/tablet/aiptek.c in the ...)
- linux 4.4.2-1
[jessie] - linux <no-dsa> (Minor issue)
- [wheezy] - linux <no-dsa> (Minor issue)
+ [wheezy] - linux 3.2.81-1
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1285326
NOTE: https://os-s.net/advisories/OSS-2016-05_aiptek.pdf
NOTE: Upstream commit: https://git.kernel.org/linus/8e20cf2bce122ce9262d6034ee5d5b76fbb92f96 (v4.4-rc6)
@@ -23838,8 +23839,7 @@
CVE-2015-6526 (The perf_callchain_user_64 function in arch/powerpc/perf/callchain.c ...)
- linux 4.1.3-1
[jessie] - linux 3.16.7-ckt11-1
- [jessie] - linux 3.2.73-2+deb7u1
- [wheezy] - linux <no-dsa> (Will be fixed in next point release)
+ [wheezy] - linux 3.2.71-1
- linux-2.6 <removed>
[squeeze] - linux-2.6 <not-affected> (powerpc not supported in Squeeze LTS)
NOTE: http://www.openwall.com/lists/oss-security/2015/08/18/4
@@ -37581,8 +37581,8 @@
NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/02/20/14
CVE-2015-XXXX [Linux ASLR mmap weakness: Reducing entropy by half]
- linux 4.0.2-1
- [wheezy] - linux <no-dsa> (Minor issue)
- [jessie] - linux <no-dsa> (Minor issue)
+ [wheezy] - linux 3.2.71-1
+ [jessie] - linux 3.16.7-ckt17-1
- linux-2.6 <removed>
[squeeze] - linux-2.6 <not-affected> (powerpc not supported in Squeeze LTS)
NOTE: http://hmarco.org/bugs/linux-ASLR-reducing-mmap-by-half.html
More information about the Secure-testing-commits
mailing list