[Secure-testing-commits] r58857 - data/CVE
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Sat Dec 23 07:33:22 UTC 2017
Author: carnil
Date: 2017-12-23 07:33:21 +0000 (Sat, 23 Dec 2017)
New Revision: 58857
Modified:
data/CVE/list
Log:
Add linux issues
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2017-12-23 07:01:28 UTC (rev 58856)
+++ data/CVE/list 2017-12-23 07:33:21 UTC (rev 58857)
@@ -1,3 +1,39 @@
+CVE-2017-17857 [bpf: fix missing error return in check_stack_boundary()]
+ - linux 4.14.7-1
+ [stretch] - linux <not-affected> (Vulnerable code introdued later)
+ [jessie] - linux <not-affected> (Vulnerable code introdued later)
+ [wheezy] - linux <not-affected> (Vulnerable code introdued later)
+ NOTE: Fixed by: https://git.kernel.org/linus/ea25f914dc164c8d56b36147ecc86bc65f83c469
+CVE-2017-17856 [bpf: force strict alignment checks for stack pointers]
+ - linux 4.14.7-1
+ [stretch] - linux <not-affected> (Vulnerable code introdued later)
+ [jessie] - linux <not-affected> (Vulnerable code introdued later)
+ [wheezy] - linux <not-affected> (Vulnerable code introdued later)
+ NOTE: Fixed by: https://git.kernel.org/linus/a5ec6ae161d72f01411169a938fa5f8baea16e8f
+CVE-2017-17855 [bpf: don't prune branches when a scalar is replaced with a pointer]
+ - linux 4.14.7-1
+ [stretch] - linux <not-affected> (Vulnerable code introdued later)
+ [jessie] - linux <not-affected> (Vulnerable code introdued later)
+ [wheezy] - linux <not-affected> (Vulnerable code introdued later)
+ NOTE: Fixed by: https://git.kernel.org/linus/179d1c5602997fef5a940c6ddcf31212cbfebd14
+CVE-2017-17854 [bpf: fix integer overflows]
+ - linux 4.14.7-1
+ [stretch] - linux <not-affected> (Vulnerable code introdued later)
+ [jessie] - linux <not-affected> (Vulnerable code introdued later)
+ [wheezy] - linux <not-affected> (Vulnerable code introdued later)
+ NOTE: Fixed by: https://git.kernel.org/linus/bb7f0f989ca7de1153bd128a40a71709e339fa03
+CVE-2017-17853 [bpf/verifier: fix bounds calculation on BPF_RSH]
+ - linux 4.14.7-1
+ [stretch] - linux <not-affected> (Vulnerable code introdued later)
+ [jessie] - linux <not-affected> (Vulnerable code introdued later)
+ [wheezy] - linux <not-affected> (Vulnerable code introdued later)
+ NOTE: Fixed by: https://git.kernel.org/linus/4374f256ce8182019353c0c639bb8d0695b4c941
+CVE-2017-17852 [bpf: fix 32-bit ALU op verification]
+ - linux 4.14.7-1
+ [stretch] - linux <not-affected> (Vulnerable code introdued later)
+ [jessie] - linux <not-affected> (Vulnerable code introdued later)
+ [wheezy] - linux <not-affected> (Vulnerable code introdued later)
+ NOTE: Fixed by: https://git.kernel.org/linus/468f6eafa6c44cb2c5d8aad35e12f06c240a812a
CVE-2017-17842
RESERVED
CVE-2017-17841
More information about the Secure-testing-commits
mailing list