[Git][security-tracker-team/security-tracker][master] Ignore some eBPF related linux issues for stretch (sync with kernel-sec)

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon May 16 06:02:22 BST 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
0fdd84d7 by Salvatore Bonaccorso at 2022-05-16T07:01:44+02:00
Ignore some eBPF related linux issues for stretch (sync with kernel-sec)

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -27579,6 +27579,7 @@ CVE-2021-4160 (There is a carry propagation bug in the MIPS32 and MIPS64 squarin
 CVE-2021-4159 [bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()]
 	RESERVED
 	- linux 5.7.6-1
+	[stretch] - linux <ignored> (Too risky to backport, and mitigated by default)
 	NOTE: Fixed by: https://git.kernel.org/linus/294f2fc6da27620a506e6c050241655459ccd6bd (5.7-rc1)
 CVE-2021-45464 [hypervisor escape and host code execution]
 	RESERVED
@@ -57925,6 +57926,7 @@ CVE-2021-35477 (In the Linux kernel through 5.13.7, an unprivileged BPF program
 	{DLA-2785-1}
 	- linux 5.10.46-4
 	[buster] - linux 4.19.208-1
+	[stretch] - linux <ignored> (Too risky to backport, and mitigated by default)
 	NOTE: https://www.openwall.com/lists/oss-security/2021/08/01/3
 CVE-2021-35476
 	RESERVED
@@ -60064,6 +60066,7 @@ CVE-2021-34556 (In the Linux kernel through 5.13.7, an unprivileged BPF program
 	{DLA-2785-1}
 	- linux 5.10.46-4
 	[buster] - linux 4.19.208-1
+	[stretch] - linux <ignored> (Too risky to backport, and mitigated by default)
 	NOTE: https://www.openwall.com/lists/oss-security/2021/08/01/3
 CVE-2021-34555 (OpenDMARC 1.4.1 and 1.4.1.1 allows remote attackers to cause a denial  ...)
 	- opendmarc 1.4.0~beta1+dfsg-6 (bug #990001)
@@ -62259,6 +62262,7 @@ CVE-2021-33624 (In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a b
 	{DLA-2785-1}
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
+	[stretch] - linux <ignored> (Too risky to backport, and mitigated by default)
 	NOTE: https://www.openwall.com/lists/oss-security/2021/06/21/1
 CVE-2021-33623 (The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.j ...)
 	- node-trim-newlines 3.0.0+~3.0.0-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0fdd84d77592c53e3418bb06a703548a88bcde5c

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0fdd84d77592c53e3418bb06a703548a88bcde5c
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220516/e25a2066/attachment.htm>


More information about the debian-security-tracker-commits mailing list