* [cip-dev] [Git][cip-project/cip-kernel/cip-kernel-sec][master] 2 commits: Fill in and correct commit lists for various issues
@ 2018-12-08 18:32 Ben Hutchings
0 siblings, 0 replies; 2+ messages in thread
From: Ben Hutchings @ 2018-12-08 18:32 UTC (permalink / raw)
To: cip-dev
Ben Hutchings pushed to branch master at cip-project / cip-kernel / cip-kernel-sec
Commits:
ce17def7 by Ben Hutchings at 2018-12-08T18:30:21Z
Fill in and correct commit lists for various issues
- - - - -
d809002c by Ben Hutchings at 2018-12-08T18:32:07Z
Import data from stable
Record the fixes I backported for 4.9.144.
- - - - -
24 changed files:
- issues/CVE-2017-13166.yml
- issues/CVE-2017-18241.yml
- issues/CVE-2017-18249.yml
- issues/CVE-2018-1108.yml
- issues/CVE-2018-1120.yml
- issues/CVE-2018-1128.yml
- issues/CVE-2018-1129.yml
- issues/CVE-2018-13096.yml
- issues/CVE-2018-13097.yml
- issues/CVE-2018-13098.yml
- issues/CVE-2018-13100.yml
- issues/CVE-2018-14610.yml
- issues/CVE-2018-14611.yml
- issues/CVE-2018-14612.yml
- issues/CVE-2018-14613.yml
- issues/CVE-2018-14614.yml
- issues/CVE-2018-14615.yml
- issues/CVE-2018-18281.yml
- issues/CVE-2018-18690.yml
- issues/CVE-2018-18955.yml
- issues/CVE-2018-3620.yml
- issues/CVE-2018-3639.yml
- issues/CVE-2018-5848.yml
- issues/CVE-2018-7740.yml
Changes:
=====================================
issues/CVE-2017-13166.yml
=====================================
@@ -37,6 +37,12 @@ fixed-by:
2b14d31a951e1af276077d40e000638fa469185e, 1cc643ab48ee22b71679db6453475de299c0ac83,
11fe1040030e703340a7c6c91330314e1129cdc1, 76db969a3bbf598bdfaa1c957a54586c2bb61fb8,
d971cb5f5fbd4af3b35a4addb850fb4b2aa8d720]
+ linux-4.4.y: [15e3780a8add9d5cd6bdc9df9cdc4e0d9b8e55dd, 4a85bbbcb5d5d3afb66b6c9a9ba54d02e30f8b4f,
+ 04d632236ad250f527ff9d7e3b2696783e82409c, 56a4fbdf5092d64f1f29a1e45508f18f3072f316,
+ 57f0817a6dd82cf0b3188f36df191abd629555c8, c6cbc2c3539fd68d37dff300870f56869d21bb82,
+ d64d203f201975604578f71982ba13fe71bd86d6, 4c8ba4d5ad2fc0d2c11ade4997571f654a573f87,
+ edbc67ef654b4abf14e7de391ce286a722bfda13, af41ce9e1304db4008356d36236d4f85199ecf87,
+ e87f9596660622f01ed8f90b7088615933dca320, 8fbc22b34365bfeb72b1e3a63ba9239d327137dc]
linux-4.9.y: [e78d9fdf5ecce2830d76d54017c3d8531bf9b119, f294548da6455cae64456a9dfeff1e96390171c0,
02129c9bc23582a48194e89cbbeb15169115b8b9, 81e0acf07015dbd3e0b45e8f8a053d64b804bb46,
daff4d009f4f7fb3b1f041b76c0782cb96d99d56, eec955463de3259c0db5b38952f79c3e39e03f65,
=====================================
issues/CVE-2017-18241.yml
=====================================
@@ -5,4 +5,5 @@ references:
- https://github.com/torvalds/linux/commit/d4fdf8ba0e5808ba9ad6b44337783bd9935e0982
fixed-by:
linux-3.16.y: [1f0db424c8770c7b31296d5c66a52fffdec1d24c]
+ linux-4.9.y: [3b19f961d260d1ae12b497e5eb77e5ecc1039fac]
mainline: [d4fdf8ba0e5808ba9ad6b44337783bd9935e0982]
=====================================
issues/CVE-2017-18249.yml
=====================================
@@ -6,4 +6,5 @@ references:
comments:
Debian-bwh: So far I've failed to backport this even to 4.9.
fixed-by:
+ linux-4.9.y: [cb9b1d4ec206702a4df1cb42ba8142f39acfdd91]
mainline: [30a61ddf8117c26ac5b295e1233eaa9629a94ca3]
=====================================
issues/CVE-2018-1108.yml
=====================================
@@ -18,6 +18,8 @@ comments:
it's unlikely user space will receive backports to support it.
reporters:
- Jann Horn
+introduced-by:
+ mainline: [e192be9d9a30555aae2ca1dc3aad37cba484cd4a]
fixed-by:
linux-4.14.y: [6e513bc20ca63f594632eca4e1968791240b8f18]
linux-4.16.y: [cd8d7a5778a4abf76ee8fe8f1bfcf78976029f8d]
=====================================
issues/CVE-2018-1120.yml
=====================================
@@ -13,5 +13,9 @@ fixed-by:
linux-4.16.y: [b7458b534b56b9b4d9297ba7a6708aa8071ac8ba]
linux-4.9.y: [6f1abf8628b750905606996fd5ff5ea22d149238]
mainline: [7f7ccc2ccc2e70c6054685f5e3522efa81556830]
+fix-depends-on:
+ 6347e8d5bcce33fc36e651901efefbe2c93a43ef: |-
+ Convert access_remote_vm to take flags. This in turn depends on
+ several preceding commits.
ignore:
linux-3.2.y: EOL
=====================================
issues/CVE-2018-1128.yml
=====================================
@@ -12,6 +12,9 @@ fixed-by:
linux-4.14.y: [2fd0d0f9bb59ec5b628622e30f22158cb564c4ea, 66abd96062b627f0ee20a684ebba48cec80233d7,
0858417b5c2e7bcc0b9e52c4b76e2af3d69e138b, a55056e1523990e1ef9d70531ffaf27fd1ddff55,
3fd73c8a71f299e30359a63add1f33e3fd834831]
+ linux-4.9.y: [08115452f865b39c9ecbd468201f606ff5434619, 2617cd5743c6d6207de26e51b95c3fcb171ff70e,
+ 9da9bb4a0ff67af49c1ca96a313c2cf8e079b46a, 2e901ea8b448a7f5899104a3917ecca2a5e8ab7f,
+ 06e925920d4de3da2114876bc607447e929604af]
mainline: [262614c4294d33b1f19e0d18c0091d9c329b544a, c0f56b483aa09c99bfe97409a43ad786f33b8a5a,
c571fe24d243bfe7017f0e67fe800b3cc2a1d1f7, 149cac4a50b0b4081b38b2f38de6ef71c27eaa85,
6daca13d2e72bedaaacfc08f873114c9307d5aea]
=====================================
issues/CVE-2018-1129.yml
=====================================
@@ -3,4 +3,5 @@ references:
- http://tracker.ceph.com/issues/24837
fixed-by:
linux-4.14.y: [b16d0c5d32468a0624505a7b6b211e20488295e9]
+ linux-4.9.y: [18a23fb2632030888fc56a7df73a80f57445718f]
mainline: [cc255c76c70f7a87d97939621eae04b600d9f4a1]
=====================================
issues/CVE-2018-13096.yml
=====================================
@@ -4,4 +4,5 @@ references:
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=8c9c95d5f4e68d22f22091546ce554ac9222689c
fixed-by:
linux-4.14.y: [b8321ccd045710ee04fd5322c34cadd13a5e58af]
+ linux-4.9.y: [1c87980591a1dc8c5eafdcc5f9953fca4e518465]
mainline: [e34438c903b653daca2b2a7de95aed46226f8ed3]
=====================================
issues/CVE-2018-13097.yml
=====================================
@@ -4,4 +4,5 @@ references:
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=d5c28acdb832800fbbcf831f20f75080cba54f04
fixed-by:
linux-4.14.y: [f9cf5462b51d98026275cc51437fc531e808b64a]
+ linux-4.9.y: [06e606acedaf8bb00c83c4cee43acdd264287a92]
mainline: [9dc956b2c8523aed39d1e6508438be9fea28c8fc]
=====================================
issues/CVE-2018-13098.yml
=====================================
@@ -2,6 +2,8 @@ description: Out-of-bound access in f2fs_iget() when mounting a corrupted f2fs i
references:
- https://bugzilla.kernel.org/show_bug.cgi?id=200173
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=190286a242344d42aad83c8e70169d6d72a63d05
+introduced-by:
+ mainline: [7a2af766af15887754f7f7a0869b4603b390876a]
fixed-by:
linux-4.14.y: [0081c90ebacebb3a82d0d24bf0f42273ce2d902e]
linux-4.18.y: [b6f493453c78311598fdd204f7815e683818512a]
=====================================
issues/CVE-2018-13100.yml
=====================================
@@ -5,4 +5,5 @@ references:
fixed-by:
linux-4.14.y: [f3d6361a96a455c8ba12226a04efa67a0ada4966]
linux-4.18.y: [0342426f2bf7298a91efee659ddc033082f6918b]
+ linux-4.9.y: [a3dccfacd3a574365ab6c5118f8a944a4ba691fa]
mainline: [42bf546c1fe3f3654bdf914e977acbc2b80a5be5]
=====================================
issues/CVE-2018-14610.yml
=====================================
@@ -9,4 +9,5 @@ comments:
"btrfs: tree-checker: Verify block_group_item".
fixed-by:
linux-4.14.y: [34407a175a59b668a1a2bbf0d0e495d87a7777d8]
+ linux-4.9.y: [7a72f918825ddece7a4ed79583836f6f1e06e478]
mainline: [514c7dca85a0bf40be984dab0b477403a6db901f]
=====================================
issues/CVE-2018-14611.yml
=====================================
@@ -9,4 +9,5 @@ comments:
"Btrfs: add validadtion checks for chunk loading".
fixed-by:
linux-4.14.y: [f7eef132ccc95c9af50b647c5da0511d2b8492f8]
+ linux-4.9.y: [3c77b07dc365a7ed2644ca0dd38e6e40a9652d57]
mainline: [315409b0098fb2651d86553f0436b70502b29bb2]
=====================================
issues/CVE-2018-14612.yml
=====================================
@@ -11,4 +11,5 @@ comments:
that applies.
fixed-by:
linux-4.14.y: [c0dfb99847851fb830d1e8ea7d5e0571f50c325a, 895586ecb7a4528336d41f81d0ce3985e8abbed6]
+ linux-4.9.y: [6f33d3d8dca8683a4df94e9944296a1a1a2a6f10, 23eb2f435a07e1e09d48ea10c4a22bc96e16fde6]
mainline: [ba480dd4db9f1798541eb2d1c423fc95feee8d36, 7ef49515fa6727cb4b6f2f5b0ffbc5fc20a9f8c6]
=====================================
issues/CVE-2018-14613.yml
=====================================
@@ -5,4 +5,5 @@ references:
- https://patchwork.kernel.org/patch/10503147/
fixed-by:
linux-4.14.y: [9f268b5cf2d6a716779dfe11f4bc02d6461db693]
+ linux-4.9.y: [058e388e42c8dc5b6ce6248990c75a0459e20197]
mainline: [fce466eab7ac6baa9d2dcd88abcf945be3d4a089]
=====================================
issues/CVE-2018-14614.yml
=====================================
@@ -5,4 +5,5 @@ references:
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=bf2d987b270ed14fb205c83c6dcfbfa6dfcd9f8c
fixed-by:
linux-4.14.y: [30130700acfad8a705c109325379f5bbe21b3ccc]
+ linux-4.9.y: [91fe514bedf4c72ae8046fe4cfa98c5e201f6b84]
mainline: [e494c2f995d6181d6e29c4927d68e0f295ecf75b]
=====================================
issues/CVE-2018-14615.yml
=====================================
@@ -3,6 +3,8 @@ description: Buffer overrun in f2fs_truncate_inline_inode() when umounting an f2
references:
- https://bugzilla.kernel.org/show_bug.cgi?id=200421
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=a80a2ff8e0a1265a4e92f4b8ae7caacc83a19503
+introduced-by:
+ mainline: [7a2af766af15887754f7f7a0869b4603b390876a]
fixed-by:
linux-4.14.y: [d7d9d29a837358636e12fe09c90a7882b53b2220]
mainline: [18dd6470c2d14d10f5a2dd926925dc80dbd3abfd]
=====================================
issues/CVE-2018-18281.yml
=====================================
@@ -5,5 +5,6 @@ references:
fixed-by:
linux-4.14.y: [541500abfe9eb30a89ff0a6eb42a21521996d68d]
linux-4.18.y: [d80183541e6006563334eaec9e8d1dc6e40efeb7]
+ linux-4.4.y: [2e3ae534fb98c7a6a5cf3e80a190181154328f80]
linux-4.9.y: [e34bd9a96704f7089ccad61b6e01ea985fa54dd6]
mainline: [eb66ae030829605d61fbef1909ce310e29f78821]
=====================================
issues/CVE-2018-18690.yml
=====================================
@@ -5,4 +5,5 @@ references:
- https://bugzilla.suse.com/show_bug.cgi?id=1105025
fixed-by:
linux-4.14.y: [cb7ccb9924bb3596f211badf0d2becf131a979cd]
+ linux-4.9.y: [4ec44e98ab08c704d0ff1a35a21a0682a5562a27]
mainline: [7b38460dc8e4eafba06c78f8e37099d3b34d473c]
=====================================
issues/CVE-2018-18955.yml
=====================================
@@ -1,7 +1,7 @@
description: 'userns: also map extents in the reverse map to kernel IDs'
+introduced-by:
+ mainline: [6397fac4915ab3002dc15aae751455da1a852f25]
fixed-by:
linux-4.18.y: [bbfed258eb08070e051a1c086282623cc562ff24]
linux-4.19.y: [9a7a80fb02cc7515b273dbb4249374d6e6a35b70]
mainline: [d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd]
-introduced-by:
- mainline: [6397fac4915ab3002dc15aae751455da1a852f25]
=====================================
issues/CVE-2018-3620.yml
=====================================
@@ -43,6 +43,20 @@ fixed-by:
43b0b90df51125979137b4ca9debb5c479b8e7de, 9fc384dd5354b46ef967f7187764a485935b0dc6,
862b9e18a0a33b79635122857ee9c20733542271, 0ea75fa0f6bd8bb79bbccdeb77b313bb9463bde3,
2ff13cec042e5793bbcee126729c49d1a4869583, 22b734b0c850139bb0cd31dcaa37cde7f00ccbd6]
+ linux-4.4.y: [90a231c63cc28d896ab353b027011a949e9884d3, 614f5e84640e382b9916b6f606328191ed0264b3,
+ 9bbdab847fc9a0b8cf23fa7354e1210f0b492821, 9ee2d2da676c48a459a99f10f45c71ffca8761a8,
+ 52dc5c9f8eee1c569974308f0bb7be64ec63565c, bf0cca01b8736a5e146a980434ba36eb036e37ac,
+ d71af2dbacb5611c1dcdc16fd1d343821d61bd5e, 685b44483f077c949bd5016fdfe734b662b74aba,
+ fa86c208d22d8179ef3d295f6084fc87390c8366, df7fd6ccb358bd4aa3abc8a6ff995b1f3da1b0fb,
+ b55b06bd3b3c977da2c938d1a73d38674cb88086, e3dea38fc8528c9d04acd9a28bcdd7dab3b461fa,
+ 09049f022a9b96b0d09d90023d4f0a097a61a767, 8f2adf3d2118cc0822b83a7bb43475f9149a1d26,
+ 0aae5fe8413dfcd949d0df1c7d6b835efecd5b3b, 9feecdb6cb73feaa55b0135aee8777eaac848c78,
+ 02ff2769edbce2261e981effbc3c4b98fae4faf0, 6b06f36f07e2c91ad0126f17d0fc8f933c827da8,
+ 4b90ff885c6cc88795b678414aaf5d7b0153a5dc, fa86c208d22d8179ef3d295f6084fc87390c8366,
+ 6a56bd7f2ea31d4c86849b8f67d4e2dc1cb5b788, 7b69cd6fa088e473869512672969e6c490cac1b6,
+ 4cdedeefa38f45299b18ae692426d5baaff6b785, 9feecdb6cb73feaa55b0135aee8777eaac848c78,
+ 02ff2769edbce2261e981effbc3c4b98fae4faf0, 6b06f36f07e2c91ad0126f17d0fc8f933c827da8,
+ 72f6531162bd2f1b57e8114c8358fca507090f41, f46d2b99a6acd87d56822c600fd2587a37e4d56c]
linux-4.9.y: [bbd07cbb1076de03d896c9c3787081b1080e8c99, 2c9b57e4474d93222bcb6e7f901fd1e71ded699c,
60712274887fcd4ad5eb8e01796022b6b202143c, 33182fe97add6e83c195e9d0f7297a6499563b52,
5b2ec92f70f6d4084d23bf42391fd27fa03e8c4c, 432e99b34066099db62f87b2704654b1b23fd6be,
=====================================
issues/CVE-2018-3639.yml
=====================================
@@ -33,9 +33,8 @@ comments:
(and respective stable releases).
Basically: 3b78ce4a34b761c7fe13520de822984019ff1a8f^2 ^1aa7a5735a41418d8e01fa7c9565eb2657e2ea3f~1
Ubuntu-tyhicks: '"Variant 4"'
- bwh: |-
- linux-4.4.y, linux-4.9.y, linux-4.14.y are missing a backport of commit
- af86ca4e3088. linux-4.4.y is also missing KVM support for SSBD.
+ bwh: linux-4.4.y is missing a backport of commit af86ca4e3088 and KVM support for
+ SSBD.
reporters:
- Jann Horn
- Ken Johnson
@@ -114,6 +113,31 @@ fixed-by:
bd4b410bc5ea560107126a3df18e9233baaec9f3, 95271aeb93d4681c65e2f94969b23ef6070367a6,
7445962ff2d652bb957722ca1a08a92d09f3e5d7, 677af592349708498671b0d9290912acb2f203e4,
75e3417f898fe1d2451e7ceffe93db5c66772b0a]
+ linux-4.9.y: [741c026d1a0c594f7ad509f44488ef29582fed74, 88659d5fd9bea7f6afb227c6d404de750b368b45,
+ 3effee64a9993dc5587fb39f0da4455769e53d26, 0f5dd651397b264903e8becc511af6cf384c273e,
+ cf21f58ae6f264e0a10d9736be97342627cf9837, 24e4dd97af40afa4d45e85a32d9c2cc81425a62e,
+ a80714172abca6413d2d6505be64723ae73a903b, 6f70a553666dd8c4fa370eaaa41380eec593229c,
+ 19e3a2bec95e966921689ae39117f9dbbaffd99b, 99b13116965f16b2e608e7796cd59198eee5bf06,
+ f854434b37bbf8953900226acd6139081f60d3da, 99318eca2c7ab3250b9614043b9ac6077ff2cb46,
+ 7a2d2358ba9b6de29be0a98c8290479df32604b6, 4812ffbbfcac35270b82292e84e8e7187088c8b8,
+ 89c6e9b599c573802de1b2fff6a9ccd99c3c4e57, a078e3e81964c31079627dd32c3ea714d5b1531e,
+ 4272f528da381673a8e7845c93daa88b8aa4f4e9, 51ef9af2a35bbc21334c801fd15cbfe01210760f,
+ 0a112f104548667f5618477ff0f2a54ee626addd, ea055f7d43fb3a9d56e80d0116104555d6dde3f7,
+ 036608d62a838aeb63cae0adaf8ac773cb53148c, c71def81cd07e1bd74da468ae6abe1ce62e3157b,
+ ab677c2addbb128f334c4906f27a0285a67d2180, 094c2767c4f02c36eabc27309d78b04f4a216e88,
+ 05a85a396f3989e9ac953785d9dccfc7cd0110f2, bf3da841edae882de545d2d19b1fae205cab8d98,
+ f8cd89f5e05d49422315e60ec2db9fcb66d25aca, f79f0efe8e1816063f83926c946026d83b9b287f,
+ eb7b5624be3e6249a880310be486245db15a5f5c, dbb264a253c8b07259d55fb3373b783fcb641b04,
+ 6fdd277a9326c5ef3fe94999c9c319ad64333fdd, 3a684641619ff0e06b8d4cb8c2ffbef304c9bdb1,
+ 69e9b0b1e04001a743927489bb8b9a10344810d8, 4a58908fa1476c600548f82effc75bcfa890454a,
+ a7c343228e5c32802431e6cc5b855ae61eb4db72, f69e91f2c4ce59deb66bd30150e5153c08873ae9,
+ 53c434e735fffbf8715a1778ce44387131e0b080, d0cb78f5e4214db86b12a9448d8ccaa005f43cb9,
+ 1189cbf52ad35cfd04a715016200ea81dd4c708f, 7c0b2dc44956533c5aac95f07575feef7b63344c,
+ b7b84401576d3858e9573d69d8287e182444f8e9, ea99935b633bd4766a679e51b173197c750fb00b,
+ 599288ec9e20d9772e6e8a27aeae021f018c7336, ec90464d96c50f90bfe1bde6dea748a6c962313c,
+ 0ec827f974e198c609c2f258a5a1f11f9af48bb2, b0ef8c72b3d70505ba7fd72af6b1e3fc9b3ae9bc,
+ b965592a07a248ef254d9d421bd34a6b548db21f, 3394ef1a7efc08e3c185ac2446f06284847ccb37,
+ def8c1d045a0fb457a1136f7edcc5ed8b2d81af6]
mainline: [1aa7a5735a41418d8e01fa7c9565eb2657e2ea3f, 4a28bfe3267b68e22c663ac26185aa16c9b879ef,
d1059518b4789cabe34bb4b714d07e6089c82ca1, 1b86883ccb8d5d9506529d42dbe1a5257cb30b18,
5cf687548705412da47c9cec342fd952d71ed3d5, c456442cd3a59eeb1d60293c26cbe2ff2c4e42cf,
=====================================
issues/CVE-2018-5848.yml
=====================================
@@ -6,4 +6,5 @@ references:
- https://marc.info/?l=linux-wireless&m=151066597529493&w=2
fixed-by:
linux-4.14.y: [107b02c81a8761f1f7efc1e8b54d435324ccd13e]
+ linux-4.9.y: [35db4d1ed8a344899a87887fa7bf11be5b057bec]
mainline: [b5a8ffcae4103a9d823ea3aa3a761f65779fbe2a]
=====================================
issues/CVE-2018-7740.yml
=====================================
@@ -18,10 +18,13 @@ comments:
ff8c0c53c475 and 045c7a3f may also be needed for older
releases
introduced-by:
+ linux-4.9.y: [e5deaa544138b5b01531d06cfee05a969375a5f6]
mainline: [ff8c0c53c47530ffea82c22a0a6df6332b56c957]
fixed-by:
- linux-3.16.y: [363ed2044f82d8997e9ea8231dc1abeab4993755, 8cca49ea37415645203520bff04309c8a87f7677]
+ linux-3.16.y: [363ed2044f82d8997e9ea8231dc1abeab4993755, 8cca49ea37415645203520bff04309c8a87f7677,
+ b9beff69cd84917c7881c176c241db933a3f7f7d]
linux-3.2.y: [4cba2554682469496ff48536d50c399110d20043, 131802b8292d35e8a407469c485565b199ed79cf]
- linux-4.14.y: [1e8628443ede418464b0ab101b24fbb7030949b2]
- linux-4.15.y: [e0fdb5385c4bf26b4be60c0042344c315c039aeb]
- mainline: [63489f8e821144000e0bdca7e65a8d1cc23a7ee7]
+ linux-4.14.y: [1e8628443ede418464b0ab101b24fbb7030949b2, 61534984904eaf3604626170dc718556210642a2]
+ linux-4.15.y: [e0fdb5385c4bf26b4be60c0042344c315c039aeb, f6b213293ed95d8482769d3c496dfa8692a155b1]
+ linux-4.9.y: [447effd30f9d12f7925595ba9a6ffb01969d6cce, 0c82bca7cd1ae580dc34069d42edfd5102603e7e]
+ mainline: [63489f8e821144000e0bdca7e65a8d1cc23a7ee7, 5df63c2a149ae65a9ec239e7c2af44efa6f79beb]
View it on GitLab: https://gitlab.com/cip-project/cip-kernel/cip-kernel-sec/compare/efeeb55f65f8bb4e27558d190d89c91515285abb...d809002c1c357902a2ed7bf38c1fa2efde5e1f74
--
View it on GitLab: https://gitlab.com/cip-project/cip-kernel/cip-kernel-sec/compare/efeeb55f65f8bb4e27558d190d89c91515285abb...d809002c1c357902a2ed7bf38c1fa2efde5e1f74
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cip-project.org/pipermail/cip-dev/attachments/20181208/68419adc/attachment-0001.html>
^ permalink raw reply [flat|nested] 2+ messages in thread
* [cip-dev] [Git][cip-project/cip-kernel/cip-kernel-sec][master] 2 commits: Fill in and correct commit lists for various issues
@ 2018-12-06 14:22 Ben Hutchings
0 siblings, 0 replies; 2+ messages in thread
From: Ben Hutchings @ 2018-12-06 14:22 UTC (permalink / raw)
To: cip-dev
Ben Hutchings pushed to branch master at cip-project / cip-kernel / cip-kernel-sec
Commits:
6a687350 by Ben Hutchings at 2018-12-06T13:39:35Z
Fill in and correct commit lists for various issues
- - - - -
efeeb55f by Ben Hutchings at 2018-12-06T14:21:45Z
Import data from stable
Record the fixes I backported for 4.14.85.
- - - - -
24 changed files:
- issues/CVE-2017-13166.yml
- issues/CVE-2017-13216.yml
- issues/CVE-2017-18174.yml
- issues/CVE-2017-18232.yml
- issues/CVE-2017-18257.yml
- issues/CVE-2018-1128.yml
- issues/CVE-2018-1129.yml
- issues/CVE-2018-12232.yml
- issues/CVE-2018-13096.yml
- issues/CVE-2018-13097.yml
- issues/CVE-2018-13098.yml
- issues/CVE-2018-13100.yml
- issues/CVE-2018-14610.yml
- issues/CVE-2018-14611.yml
- issues/CVE-2018-14612.yml
- issues/CVE-2018-14613.yml
- issues/CVE-2018-14614.yml
- issues/CVE-2018-14615.yml
- issues/CVE-2018-18445.yml
- issues/CVE-2018-18690.yml
- issues/CVE-2018-3639.yml
- issues/CVE-2018-5703.yml
- issues/CVE-2018-5848.yml
- issues/CVE-2018-7740.yml
Changes:
=====================================
issues/CVE-2017-13166.yml
=====================================
@@ -8,6 +8,8 @@ comments:
by commit 7e6a68210784 "[media] videodev2.h: add initial support for
compound controls". Hans Verkuil is working on stable backports.
Debian-carnil: 'Patch series backported to: 4.15.4'
+introduced-by:
+ mainline: [fdf82dc2e2d43cf135b5fd352dea523642bb553a]
fixed-by:
linux-3.16.y: [5e5747642716c7a5ee61b8eb42f6b5d32136b150, 182f3143bcbc783ee18c1b8af52734929813541e,
846e214562b1fd6d49ec2dd334bc5fe1ab1707f3, f64f7bd54eca5210397b060ca0a9aab8e633c772,
=====================================
issues/CVE-2017-13216.yml
=====================================
@@ -10,6 +10,8 @@ comments:
ashmem driver source-wise introduced in 3.3-rc1 with
11980c2ac4ccfad21a5f8ee9e12059f1e687bb40
Debian-jmm: Only present in drivers/staging/android/ashmem.c
+introduced-by:
+ mainline: [11980c2ac4ccfad21a5f8ee9e12059f1e687bb40]
fixed-by:
linux-3.16.y: [63aa20e4f4760249339c7771bd7e4a01d82a95ad]
linux-3.18.y: [6dc42f889217a0a077bc75c6fa5239ade762fff4]
=====================================
issues/CVE-2017-18174.yml
=====================================
@@ -13,5 +13,7 @@ comments:
Issue fixed in 251e22abde21833b3d29577e4d8c7aaccd650eee (4.7-rc1).
Was shortly introduced in a rc version with 3bfd44306c65d073008b9ca8f062249f35576b61
in 4.11-rc1 and fixed in same rc version with 8dca4a41f1ad65043a78c2338d9725f859c8d2c3
+introduced-by:
+ mainline: [3bfd44306c65d073008b9ca8f062249f35576b61]
fixed-by:
- mainline: [251e22abde21833b3d29577e4d8c7aaccd650eee]
+ mainline: [8dca4a41f1ad65043a78c2338d9725f859c8d2c3]
=====================================
issues/CVE-2017-18232.yml
=====================================
@@ -6,5 +6,7 @@ comments:
Debian-bwh: |-
Commit message says this was introduced by commit 87c8331fcf72
(Linux 3.4). For stretch, this requires an ABI bump.
+introduced-by:
+ mainline: [87c8331fcf72e501c3a3c0cdc5c9391ec72f7cf2]
fixed-by:
mainline: [0558f33c06bb910e2879e355192227a8e8f0219d]
=====================================
issues/CVE-2017-18257.yml
=====================================
@@ -11,6 +11,8 @@ comments:
Debian-bwh: |-
Appears to be a regression introduced in Linux 4.2 by commit
003a3e1d60b0 "f2fs: add f2fs_map_blocks".
+introduced-by:
+ mainline: [003a3e1d60b0bb5cfb4feffb05a2083db2346364]
fixed-by:
linux-4.4.y: [0678adf8f8a99c66c48c608ea9a79588743bc615]
linux-4.9.y: [b8bf4b886b82585202ab4ee169718656661cb89e]
=====================================
issues/CVE-2018-1128.yml
=====================================
@@ -9,13 +9,15 @@ comments:
I don't think this is practical for 3.16 as the protocol change
seems to depend on message signatures which were added in 3.19.
fixed-by:
+ linux-4.14.y: [2fd0d0f9bb59ec5b628622e30f22158cb564c4ea, 66abd96062b627f0ee20a684ebba48cec80233d7,
+ 0858417b5c2e7bcc0b9e52c4b76e2af3d69e138b, a55056e1523990e1ef9d70531ffaf27fd1ddff55,
+ 3fd73c8a71f299e30359a63add1f33e3fd834831]
mainline: [262614c4294d33b1f19e0d18c0091d9c329b544a, c0f56b483aa09c99bfe97409a43ad786f33b8a5a,
c571fe24d243bfe7017f0e67fe800b3cc2a1d1f7, 149cac4a50b0b4081b38b2f38de6ef71c27eaa85,
6daca13d2e72bedaaacfc08f873114c9307d5aea]
+fix-depends-on:
+ 0dde584882ade13dc9708d611fbf69b0ae8a9e48: Avoids textual conflicts when picking
+ 6daca13d2e72.
+ b3bbd3f2ab19c8ca319003b4b51ce4c4ca74da06: Simplifies backporting of 262614c4294d.
ignore:
linux-3.16.y: Protocol change is too difficult
-fix-depends-on:
- 0dde584882ade13dc9708d611fbf69b0ae8a9e48: |-
- Avoids textual conflicts when picking 6daca13d2e72.
- b3bbd3f2ab19c8ca319003b4b51ce4c4ca74da06: |-
- Simplifies backporting of 262614c4294d.
=====================================
issues/CVE-2018-1129.yml
=====================================
@@ -2,4 +2,5 @@ description: 'libceph: implement CEPHX_V2 calculation mode'
references:
- http://tracker.ceph.com/issues/24837
fixed-by:
+ linux-4.14.y: [b16d0c5d32468a0624505a7b6b211e20488295e9]
mainline: [cc255c76c70f7a87d97939621eae04b600d9f4a1]
=====================================
issues/CVE-2018-12232.yml
=====================================
@@ -15,6 +15,8 @@ comments:
Debian-bwh: |-
Introduced in 4.10 by commit 86741ec25462 "net: core: Add a UID
field to struct sock."
+introduced-by:
+ mainline: [86741ec25462e4c8cdce6df2f41ead05568c7d5e]
fixed-by:
linux-4.14.y: [91717ffc9057f38a0203a40ef36ae2e482fd7cbe]
linux-4.16.y: [abaa1bb5e3652593a22a51e289bf9dfd4d4a8542]
=====================================
issues/CVE-2018-13096.yml
=====================================
@@ -3,4 +3,5 @@ references:
- https://bugzilla.kernel.org/show_bug.cgi?id=200167
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=8c9c95d5f4e68d22f22091546ce554ac9222689c
fixed-by:
+ linux-4.14.y: [b8321ccd045710ee04fd5322c34cadd13a5e58af]
mainline: [e34438c903b653daca2b2a7de95aed46226f8ed3]
=====================================
issues/CVE-2018-13097.yml
=====================================
@@ -3,4 +3,5 @@ references:
- https://bugzilla.kernel.org/show_bug.cgi?id=200171
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=d5c28acdb832800fbbcf831f20f75080cba54f04
fixed-by:
+ linux-4.14.y: [f9cf5462b51d98026275cc51437fc531e808b64a]
mainline: [9dc956b2c8523aed39d1e6508438be9fea28c8fc]
=====================================
issues/CVE-2018-13098.yml
=====================================
@@ -3,5 +3,6 @@ references:
- https://bugzilla.kernel.org/show_bug.cgi?id=200173
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=190286a242344d42aad83c8e70169d6d72a63d05
fixed-by:
+ linux-4.14.y: [0081c90ebacebb3a82d0d24bf0f42273ce2d902e]
linux-4.18.y: [b6f493453c78311598fdd204f7815e683818512a]
mainline: [76d56d4ab4f2a9e4f085c7d77172194ddaccf7d2]
=====================================
issues/CVE-2018-13100.yml
=====================================
@@ -3,5 +3,6 @@ references:
- https://bugzilla.kernel.org/show_bug.cgi?id=200183
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=e72ba39212abc9e77f367cd95d7d3c8689aba14a
fixed-by:
+ linux-4.14.y: [f3d6361a96a455c8ba12226a04efa67a0ada4966]
linux-4.18.y: [0342426f2bf7298a91efee659ddc033082f6918b]
mainline: [42bf546c1fe3f3654bdf914e977acbc2b80a5be5]
=====================================
issues/CVE-2018-14610.yml
=====================================
@@ -8,4 +8,5 @@ comments:
Upstream fix depends on (at least) commit fce466eab7ac
"btrfs: tree-checker: Verify block_group_item".
fixed-by:
+ linux-4.14.y: [34407a175a59b668a1a2bbf0d0e495d87a7777d8]
mainline: [514c7dca85a0bf40be984dab0b477403a6db901f]
=====================================
issues/CVE-2018-14611.yml
=====================================
@@ -8,4 +8,5 @@ comments:
Upstream fix depends on (at least) commit e06cd3dd7cea
"Btrfs: add validadtion checks for chunk loading".
fixed-by:
+ linux-4.14.y: [f7eef132ccc95c9af50b647c5da0511d2b8492f8]
mainline: [315409b0098fb2651d86553f0436b70502b29bb2]
=====================================
issues/CVE-2018-14612.yml
=====================================
@@ -10,4 +10,5 @@ comments:
what happened for the second one, resp. not yet checked if
that applies.
fixed-by:
+ linux-4.14.y: [c0dfb99847851fb830d1e8ea7d5e0571f50c325a, 895586ecb7a4528336d41f81d0ce3985e8abbed6]
mainline: [ba480dd4db9f1798541eb2d1c423fc95feee8d36, 7ef49515fa6727cb4b6f2f5b0ffbc5fc20a9f8c6]
=====================================
issues/CVE-2018-14613.yml
=====================================
@@ -4,4 +4,5 @@ references:
- https://bugzilla.kernel.org/show_bug.cgi?id=199849
- https://patchwork.kernel.org/patch/10503147/
fixed-by:
+ linux-4.14.y: [9f268b5cf2d6a716779dfe11f4bc02d6461db693]
mainline: [fce466eab7ac6baa9d2dcd88abcf945be3d4a089]
=====================================
issues/CVE-2018-14614.yml
=====================================
@@ -4,4 +4,5 @@ references:
- https://bugzilla.kernel.org/show_bug.cgi?id=200419
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=bf2d987b270ed14fb205c83c6dcfbfa6dfcd9f8c
fixed-by:
+ linux-4.14.y: [30130700acfad8a705c109325379f5bbe21b3ccc]
mainline: [e494c2f995d6181d6e29c4927d68e0f295ecf75b]
=====================================
issues/CVE-2018-14615.yml
=====================================
@@ -4,4 +4,5 @@ references:
- https://bugzilla.kernel.org/show_bug.cgi?id=200421
- https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=a80a2ff8e0a1265a4e92f4b8ae7caacc83a19503
fixed-by:
+ linux-4.14.y: [d7d9d29a837358636e12fe09c90a7882b53b2220]
mainline: [18dd6470c2d14d10f5a2dd926925dc80dbd3abfd]
=====================================
issues/CVE-2018-18445.yml
=====================================
@@ -2,6 +2,8 @@ description: BPF verifier bug leads to out-of-bounds access
references:
- https://www.openwall.com/lists/oss-security/2018/10/17/9
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1686
+introduced-by:
+ mainline: [468f6eafa6c44cb2c5d8aad35e12f06c240a812a]
fixed-by:
linux-4.14.y: [10fdfea70d4667abf3724c31443e5d5922fecebd]
linux-4.18.y: [11b165210c7214645c183dc7f74aca8d51381691]
=====================================
issues/CVE-2018-18690.yml
=====================================
@@ -4,4 +4,5 @@ references:
- https://bugzilla.kernel.org/show_bug.cgi?id=199119
- https://bugzilla.suse.com/show_bug.cgi?id=1105025
fixed-by:
+ linux-4.14.y: [cb7ccb9924bb3596f211badf0d2becf131a979cd]
mainline: [7b38460dc8e4eafba06c78f8e37099d3b34d473c]
=====================================
issues/CVE-2018-3639.yml
=====================================
@@ -64,6 +64,31 @@ fixed-by:
4e99bb051d3e60dbb323c5562375c96f56d56ec4, fbb7b98887d4fe5e556b2146857b9c43b6c469f3,
8963b10319ec195059f8a65c049303f84cb02d38, dde241727d8213c0f29102642a6be2629df4c596,
5a9cbccff42fdecd30daaf8e88d4779cce055ac7]
+ linux-4.14.y: [8410540f5aaf06ab01197443371be89822971e58, 69dc73805969ea919786c56d18e5a51fb8c128f2,
+ 3ce1634f6165ba638546bf83123f1e5c51b1afcd, 7c9b4959cda48f22ecd6ceb88bda7f939f2016b3,
+ 94ae9d26284369da199dfb2581fe0b7ea66f7733, c6dc89dd04e3adfb713c40c20817a8791a8deda6,
+ 832b579e1e83f17e14a8c054ccc768eaf5e80269, 65f747a6b1089f13e80b0b2e0c4128e72d135a70,
+ 128e69909f7c245765f75d7f350dd67eb8fe8a7b, fa2f1c65246d956106fa964cf0ed953162af88e5,
+ 716bfae3b3f40de8c0a6ae83f199d96fd152b3cc, 97224b3da69810155b44f173cc8959eea565a98d,
+ 81c3c2b5917af382a90d116a5ccd034fe5d32c2a, 33f6a06810cb3f3f0ba20914db334c7c4855ba80,
+ 704609d396801c86bca6dcdb14676489dd623da5, d8553911627ab1d9789d08c9902f5e43194f99f7,
+ 7d1254a1489c4ecc23a6afdfd1a17bdbb4cd186d, dd88d569eeff59a03b897ba0168547a465091aca,
+ 87895ae1e9b22a04441992921b79b6d32e22142a, c024722ffecd484fcb35ad61e822c214b6913196,
+ 20d036a2e223a5c4327bcf432ef995f59f51d1d1, d829fcceb8f532966bfb07fb67cb968374fcbbd2,
+ 9939db75cd5b686ca43c4aa26e24d6b73ffa66e0, 61dfdc12ff35cd6f196a543271174ae611e36fb1,
+ 0f18f44ce076e48d25c1b03e15f3b588ba0f9df1, 89ba80e61a395afc40a865d008931c576d20724d,
+ 43c47eb2a274fa12029ac5485ae4360048a398af, 8dc742f930ccbb6b41d538bb35b81693cd8bad43,
+ 4fbc01632e779977bbdcbb14877dcc80d7beeb0b, f69c4dd36766666077b96e30e7d0d1122642c00a,
+ 5a53a5fefb73c150d754907916188d0cf3fb36d8, bd2059282934fc009d755d24527187df5fe448de,
+ b1a6028c23748afc3b970bf2a740a3ebc7424e12, b1d1984f389865e655076ae18d4626b1a65ba82c,
+ 8e0836d1413b86ef6e85142c3902990815cf1cba, bbc0d1c335664660acc2c6e68901d350805a1ff1,
+ 7f1efb5e74e3e1a01b73d3364d223f71044f5049, b213ab46cde40368b793daac516be9218beaa750,
+ 72f46c229ac286c0a734888f50a3af274036290f, 8e1c285a050ca8bcbe30c47f102497e44319f12c,
+ 3e6ab4ca1345b8b7ff09ea00e0abffa276c6919c, 6befd3a735e0228b8128f2916309ed218d9c49dd,
+ 987f49474b0680db37f9bfcecc8e563803c55f52, d13f068b94a18b8d9fafaf2519fd1f43d4965f36,
+ 71179d5dcbb96afc70c3344fd4b35db0c33d6008, 3f44c1a3c29379aa976be27df1da0fc4b9e7c364,
+ e8837f0a000f79e1e629ad8a00eceb3c452bf3bc, 92a3c944d6d5d3e08335cd3b6a75df907a43a960,
+ 83b570c004da47b51d7417ac18d8491d9fc91420]
linux-4.16.y: [2cd883a4cc87871db17dbc52398a58321af209b1, d1ee580200e9937cc4e3f0ff1d45c3cfb2532f9e,
0e303bbda22ac4a655f0a2bfdd51cda209562ddb, 4fa760f200941e88187c0241ce5df72e8ec9cd97,
2460962b14b78b47ebfeb744bd9e09d813c8236d, 569e3b16770b6d3c8ea08bb41678473f786868a3,
=====================================
issues/CVE-2018-5703.yml
=====================================
@@ -9,5 +9,6 @@ comments:
introduced-by:
mainline: [3c4d7559159bfe1e3b94df3a657b2cda3a34e218]
fixed-by:
+ linux-4.14.y: [2a0f5919e1e6a1c0423d895ab75eb15f94a67c69]
linux-4.15.y: [c5f3a16c047dfa7f309a2e1ca7d43e7db92ec35b]
mainline: [c113187d38ff85dc302a1bb55864b203ebb2ba10]
=====================================
issues/CVE-2018-5848.yml
=====================================
@@ -5,4 +5,5 @@ references:
- https://www.codeaurora.org/security-bulletin/2018/05/11/may-2018-code-aurora-security-bulletin-2#_CVE-2018-5848
- https://marc.info/?l=linux-wireless&m=151066597529493&w=2
fixed-by:
+ linux-4.14.y: [107b02c81a8761f1f7efc1e8b54d435324ccd13e]
mainline: [b5a8ffcae4103a9d823ea3aa3a761f65779fbe2a]
=====================================
issues/CVE-2018-7740.yml
=====================================
@@ -17,6 +17,8 @@ comments:
045c7a3f tried to catch issues like this, but missed this case.
ff8c0c53c475 and 045c7a3f may also be needed for older
releases
+introduced-by:
+ mainline: [ff8c0c53c47530ffea82c22a0a6df6332b56c957]
fixed-by:
linux-3.16.y: [363ed2044f82d8997e9ea8231dc1abeab4993755, 8cca49ea37415645203520bff04309c8a87f7677]
linux-3.2.y: [4cba2554682469496ff48536d50c399110d20043, 131802b8292d35e8a407469c485565b199ed79cf]
View it on GitLab: https://gitlab.com/cip-project/cip-kernel/cip-kernel-sec/compare/cfd826db2fb01bbdc297234e20a6e0add27bffca...efeeb55f65f8bb4e27558d190d89c91515285abb
--
View it on GitLab: https://gitlab.com/cip-project/cip-kernel/cip-kernel-sec/compare/cfd826db2fb01bbdc297234e20a6e0add27bffca...efeeb55f65f8bb4e27558d190d89c91515285abb
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cip-project.org/pipermail/cip-dev/attachments/20181206/1fcf4fe3/attachment-0001.html>
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2018-12-08 18:32 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-12-08 18:32 [cip-dev] [Git][cip-project/cip-kernel/cip-kernel-sec][master] 2 commits: Fill in and correct commit lists for various issues Ben Hutchings
-- strict thread matches above, loose matches on Subject: below --
2018-12-06 14:22 Ben Hutchings
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.