All of lore.kernel.org
 help / color / mirror / Atom feed
* [cip-dev] [Git][cip-project/cip-kernel/cip-kernel-sec][master] 2 commits: Fill in and correct commit lists for various issues
@ 2018-12-08 18:32 Ben Hutchings
  0 siblings, 0 replies; 2+ messages in thread
From: Ben Hutchings @ 2018-12-08 18:32 UTC (permalink / raw)
  To: cip-dev

Ben Hutchings pushed to branch master at cip-project / cip-kernel / cip-kernel-sec


Commits:
ce17def7 by Ben Hutchings at 2018-12-08T18:30:21Z
Fill in and correct commit lists for various issues

- - - - -
d809002c by Ben Hutchings at 2018-12-08T18:32:07Z
Import data from stable

Record the fixes I backported for 4.9.144.

- - - - -


24 changed files:

- issues/CVE-2017-13166.yml
- issues/CVE-2017-18241.yml
- issues/CVE-2017-18249.yml
- issues/CVE-2018-1108.yml
- issues/CVE-2018-1120.yml
- issues/CVE-2018-1128.yml
- issues/CVE-2018-1129.yml
- issues/CVE-2018-13096.yml
- issues/CVE-2018-13097.yml
- issues/CVE-2018-13098.yml
- issues/CVE-2018-13100.yml
- issues/CVE-2018-14610.yml
- issues/CVE-2018-14611.yml
- issues/CVE-2018-14612.yml
- issues/CVE-2018-14613.yml
- issues/CVE-2018-14614.yml
- issues/CVE-2018-14615.yml
- issues/CVE-2018-18281.yml
- issues/CVE-2018-18690.yml
- issues/CVE-2018-18955.yml
- issues/CVE-2018-3620.yml
- issues/CVE-2018-3639.yml
- issues/CVE-2018-5848.yml
- issues/CVE-2018-7740.yml


Changes:

=====================================
issues/CVE-2017-13166.yml
=====================================
@@ -37,6 +37,12 @@ fixed-by:
     2b14d31a951e1af276077d40e000638fa469185e, 1cc643ab48ee22b71679db6453475de299c0ac83,
     11fe1040030e703340a7c6c91330314e1129cdc1, 76db969a3bbf598bdfaa1c957a54586c2bb61fb8,
     d971cb5f5fbd4af3b35a4addb850fb4b2aa8d720]
+  linux-4.4.y: [15e3780a8add9d5cd6bdc9df9cdc4e0d9b8e55dd, 4a85bbbcb5d5d3afb66b6c9a9ba54d02e30f8b4f,
+    04d632236ad250f527ff9d7e3b2696783e82409c, 56a4fbdf5092d64f1f29a1e45508f18f3072f316,
+    57f0817a6dd82cf0b3188f36df191abd629555c8, c6cbc2c3539fd68d37dff300870f56869d21bb82,
+    d64d203f201975604578f71982ba13fe71bd86d6, 4c8ba4d5ad2fc0d2c11ade4997571f654a573f87,
+    edbc67ef654b4abf14e7de391ce286a722bfda13, af41ce9e1304db4008356d36236d4f85199ecf87,
+    e87f9596660622f01ed8f90b7088615933dca320, 8fbc22b34365bfeb72b1e3a63ba9239d327137dc]
   linux-4.9.y: [e78d9fdf5ecce2830d76d54017c3d8531bf9b119, f294548da6455cae64456a9dfeff1e96390171c0,
     02129c9bc23582a48194e89cbbeb15169115b8b9, 81e0acf07015dbd3e0b45e8f8a053d64b804bb46,
     daff4d009f4f7fb3b1f041b76c0782cb96d99d56, eec955463de3259c0db5b38952f79c3e39e03f65,


=====================================
issues/CVE-2017-18241.yml
=====================================
@@ -5,4 +5,5 @@ references:
 - https://github.com/torvalds/linux/commit/d4fdf8ba0e5808ba9ad6b44337783bd9935e0982
 fixed-by:
   linux-3.16.y: [1f0db424c8770c7b31296d5c66a52fffdec1d24c]
+  linux-4.9.y: [3b19f961d260d1ae12b497e5eb77e5ecc1039fac]
   mainline: [d4fdf8ba0e5808ba9ad6b44337783bd9935e0982]


=====================================
issues/CVE-2017-18249.yml
=====================================
@@ -6,4 +6,5 @@ references:
 comments:
   Debian-bwh: So far I've failed to backport this even to 4.9.
 fixed-by:
+  linux-4.9.y: [cb9b1d4ec206702a4df1cb42ba8142f39acfdd91]
   mainline: [30a61ddf8117c26ac5b295e1233eaa9629a94ca3]


=====================================
issues/CVE-2018-1108.yml
=====================================
@@ -18,6 +18,8 @@ comments:
       it's unlikely user space will receive backports to support it.
 reporters:
 - Jann Horn
+introduced-by:
+  mainline: [e192be9d9a30555aae2ca1dc3aad37cba484cd4a]
 fixed-by:
   linux-4.14.y: [6e513bc20ca63f594632eca4e1968791240b8f18]
   linux-4.16.y: [cd8d7a5778a4abf76ee8fe8f1bfcf78976029f8d]


=====================================
issues/CVE-2018-1120.yml
=====================================
@@ -13,5 +13,9 @@ fixed-by:
   linux-4.16.y: [b7458b534b56b9b4d9297ba7a6708aa8071ac8ba]
   linux-4.9.y: [6f1abf8628b750905606996fd5ff5ea22d149238]
   mainline: [7f7ccc2ccc2e70c6054685f5e3522efa81556830]
+fix-depends-on:
+  6347e8d5bcce33fc36e651901efefbe2c93a43ef: |-
+    Convert access_remote_vm to take flags.  This in turn depends on
+    several preceding commits.
 ignore:
   linux-3.2.y: EOL


=====================================
issues/CVE-2018-1128.yml
=====================================
@@ -12,6 +12,9 @@ fixed-by:
   linux-4.14.y: [2fd0d0f9bb59ec5b628622e30f22158cb564c4ea, 66abd96062b627f0ee20a684ebba48cec80233d7,
     0858417b5c2e7bcc0b9e52c4b76e2af3d69e138b, a55056e1523990e1ef9d70531ffaf27fd1ddff55,
     3fd73c8a71f299e30359a63add1f33e3fd834831]
+  linux-4.9.y: [08115452f865b39c9ecbd468201f606ff5434619, 2617cd5743c6d6207de26e51b95c3fcb171ff70e,
+    9da9bb4a0ff67af49c1ca96a313c2cf8e079b46a, 2e901ea8b448a7f5899104a3917ecca2a5e8ab7f,
+    06e925920d4de3da2114876bc607447e929604af]
   mainline: [262614c4294d33b1f19e0d18c0091d9c329b544a, c0f56b483aa09c99bfe97409a43ad786f33b8a5a,
     c571fe24d243bfe7017f0e67fe800b3cc2a1d1f7, 149cac4a50b0b4081b38b2f38de6ef71c27eaa85,
     6daca13d2e72bedaaacfc08f873114c9307d5aea]


=====================================
issues/CVE-2018-1129.yml
=====================================
@@ -3,4 +3,5 @@ references:
 - http://tracker.ceph.com/issues/24837
 fixed-by:
   linux-4.14.y: [b16d0c5d32468a0624505a7b6b211e20488295e9]
+  linux-4.9.y: [18a23fb2632030888fc56a7df73a80f57445718f]
   mainline: [cc255c76c70f7a87d97939621eae04b600d9f4a1]


=====================================
issues/CVE-2018-13096.yml
=====================================
@@ -4,4 +4,5 @@ references:
 - https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=8c9c95d5f4e68d22f22091546ce554ac9222689c
 fixed-by:
   linux-4.14.y: [b8321ccd045710ee04fd5322c34cadd13a5e58af]
+  linux-4.9.y: [1c87980591a1dc8c5eafdcc5f9953fca4e518465]
   mainline: [e34438c903b653daca2b2a7de95aed46226f8ed3]


=====================================
issues/CVE-2018-13097.yml
=====================================
@@ -4,4 +4,5 @@ references:
 - https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=d5c28acdb832800fbbcf831f20f75080cba54f04
 fixed-by:
   linux-4.14.y: [f9cf5462b51d98026275cc51437fc531e808b64a]
+  linux-4.9.y: [06e606acedaf8bb00c83c4cee43acdd264287a92]
   mainline: [9dc956b2c8523aed39d1e6508438be9fea28c8fc]


=====================================
issues/CVE-2018-13098.yml
=====================================
@@ -2,6 +2,8 @@ description: Out-of-bound access in f2fs_iget() when mounting a corrupted f2fs i
 references:
 - https://bugzilla.kernel.org/show_bug.cgi?id=200173
 - https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=190286a242344d42aad83c8e70169d6d72a63d05
+introduced-by:
+  mainline: [7a2af766af15887754f7f7a0869b4603b390876a]
 fixed-by:
   linux-4.14.y: [0081c90ebacebb3a82d0d24bf0f42273ce2d902e]
   linux-4.18.y: [b6f493453c78311598fdd204f7815e683818512a]


=====================================
issues/CVE-2018-13100.yml
=====================================
@@ -5,4 +5,5 @@ references:
 fixed-by:
   linux-4.14.y: [f3d6361a96a455c8ba12226a04efa67a0ada4966]
   linux-4.18.y: [0342426f2bf7298a91efee659ddc033082f6918b]
+  linux-4.9.y: [a3dccfacd3a574365ab6c5118f8a944a4ba691fa]
   mainline: [42bf546c1fe3f3654bdf914e977acbc2b80a5be5]


=====================================
issues/CVE-2018-14610.yml
=====================================
@@ -9,4 +9,5 @@ comments:
     "btrfs: tree-checker: Verify block_group_item".
 fixed-by:
   linux-4.14.y: [34407a175a59b668a1a2bbf0d0e495d87a7777d8]
+  linux-4.9.y: [7a72f918825ddece7a4ed79583836f6f1e06e478]
   mainline: [514c7dca85a0bf40be984dab0b477403a6db901f]


=====================================
issues/CVE-2018-14611.yml
=====================================
@@ -9,4 +9,5 @@ comments:
     "Btrfs: add validadtion checks for chunk loading".
 fixed-by:
   linux-4.14.y: [f7eef132ccc95c9af50b647c5da0511d2b8492f8]
+  linux-4.9.y: [3c77b07dc365a7ed2644ca0dd38e6e40a9652d57]
   mainline: [315409b0098fb2651d86553f0436b70502b29bb2]


=====================================
issues/CVE-2018-14612.yml
=====================================
@@ -11,4 +11,5 @@ comments:
     that applies.
 fixed-by:
   linux-4.14.y: [c0dfb99847851fb830d1e8ea7d5e0571f50c325a, 895586ecb7a4528336d41f81d0ce3985e8abbed6]
+  linux-4.9.y: [6f33d3d8dca8683a4df94e9944296a1a1a2a6f10, 23eb2f435a07e1e09d48ea10c4a22bc96e16fde6]
   mainline: [ba480dd4db9f1798541eb2d1c423fc95feee8d36, 7ef49515fa6727cb4b6f2f5b0ffbc5fc20a9f8c6]


=====================================
issues/CVE-2018-14613.yml
=====================================
@@ -5,4 +5,5 @@ references:
 - https://patchwork.kernel.org/patch/10503147/
 fixed-by:
   linux-4.14.y: [9f268b5cf2d6a716779dfe11f4bc02d6461db693]
+  linux-4.9.y: [058e388e42c8dc5b6ce6248990c75a0459e20197]
   mainline: [fce466eab7ac6baa9d2dcd88abcf945be3d4a089]


=====================================
issues/CVE-2018-14614.yml
=====================================
@@ -5,4 +5,5 @@ references:
 - https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=bf2d987b270ed14fb205c83c6dcfbfa6dfcd9f8c
 fixed-by:
   linux-4.14.y: [30130700acfad8a705c109325379f5bbe21b3ccc]
+  linux-4.9.y: [91fe514bedf4c72ae8046fe4cfa98c5e201f6b84]
   mainline: [e494c2f995d6181d6e29c4927d68e0f295ecf75b]


=====================================
issues/CVE-2018-14615.yml
=====================================
@@ -3,6 +3,8 @@ description: Buffer overrun in f2fs_truncate_inline_inode() when umounting an f2
 references:
 - https://bugzilla.kernel.org/show_bug.cgi?id=200421
 - https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=a80a2ff8e0a1265a4e92f4b8ae7caacc83a19503
+introduced-by:
+  mainline: [7a2af766af15887754f7f7a0869b4603b390876a]
 fixed-by:
   linux-4.14.y: [d7d9d29a837358636e12fe09c90a7882b53b2220]
   mainline: [18dd6470c2d14d10f5a2dd926925dc80dbd3abfd]


=====================================
issues/CVE-2018-18281.yml
=====================================
@@ -5,5 +5,6 @@ references:
 fixed-by:
   linux-4.14.y: [541500abfe9eb30a89ff0a6eb42a21521996d68d]
   linux-4.18.y: [d80183541e6006563334eaec9e8d1dc6e40efeb7]
+  linux-4.4.y: [2e3ae534fb98c7a6a5cf3e80a190181154328f80]
   linux-4.9.y: [e34bd9a96704f7089ccad61b6e01ea985fa54dd6]
   mainline: [eb66ae030829605d61fbef1909ce310e29f78821]


=====================================
issues/CVE-2018-18690.yml
=====================================
@@ -5,4 +5,5 @@ references:
 - https://bugzilla.suse.com/show_bug.cgi?id=1105025
 fixed-by:
   linux-4.14.y: [cb7ccb9924bb3596f211badf0d2becf131a979cd]
+  linux-4.9.y: [4ec44e98ab08c704d0ff1a35a21a0682a5562a27]
   mainline: [7b38460dc8e4eafba06c78f8e37099d3b34d473c]


=====================================
issues/CVE-2018-18955.yml
=====================================
@@ -1,7 +1,7 @@
 description: 'userns: also map extents in the reverse map to kernel IDs'
+introduced-by:
+  mainline: [6397fac4915ab3002dc15aae751455da1a852f25]
 fixed-by:
   linux-4.18.y: [bbfed258eb08070e051a1c086282623cc562ff24]
   linux-4.19.y: [9a7a80fb02cc7515b273dbb4249374d6e6a35b70]
   mainline: [d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd]
-introduced-by:
-  mainline: [6397fac4915ab3002dc15aae751455da1a852f25]


=====================================
issues/CVE-2018-3620.yml
=====================================
@@ -43,6 +43,20 @@ fixed-by:
     43b0b90df51125979137b4ca9debb5c479b8e7de, 9fc384dd5354b46ef967f7187764a485935b0dc6,
     862b9e18a0a33b79635122857ee9c20733542271, 0ea75fa0f6bd8bb79bbccdeb77b313bb9463bde3,
     2ff13cec042e5793bbcee126729c49d1a4869583, 22b734b0c850139bb0cd31dcaa37cde7f00ccbd6]
+  linux-4.4.y: [90a231c63cc28d896ab353b027011a949e9884d3, 614f5e84640e382b9916b6f606328191ed0264b3,
+    9bbdab847fc9a0b8cf23fa7354e1210f0b492821, 9ee2d2da676c48a459a99f10f45c71ffca8761a8,
+    52dc5c9f8eee1c569974308f0bb7be64ec63565c, bf0cca01b8736a5e146a980434ba36eb036e37ac,
+    d71af2dbacb5611c1dcdc16fd1d343821d61bd5e, 685b44483f077c949bd5016fdfe734b662b74aba,
+    fa86c208d22d8179ef3d295f6084fc87390c8366, df7fd6ccb358bd4aa3abc8a6ff995b1f3da1b0fb,
+    b55b06bd3b3c977da2c938d1a73d38674cb88086, e3dea38fc8528c9d04acd9a28bcdd7dab3b461fa,
+    09049f022a9b96b0d09d90023d4f0a097a61a767, 8f2adf3d2118cc0822b83a7bb43475f9149a1d26,
+    0aae5fe8413dfcd949d0df1c7d6b835efecd5b3b, 9feecdb6cb73feaa55b0135aee8777eaac848c78,
+    02ff2769edbce2261e981effbc3c4b98fae4faf0, 6b06f36f07e2c91ad0126f17d0fc8f933c827da8,
+    4b90ff885c6cc88795b678414aaf5d7b0153a5dc, fa86c208d22d8179ef3d295f6084fc87390c8366,
+    6a56bd7f2ea31d4c86849b8f67d4e2dc1cb5b788, 7b69cd6fa088e473869512672969e6c490cac1b6,
+    4cdedeefa38f45299b18ae692426d5baaff6b785, 9feecdb6cb73feaa55b0135aee8777eaac848c78,
+    02ff2769edbce2261e981effbc3c4b98fae4faf0, 6b06f36f07e2c91ad0126f17d0fc8f933c827da8,
+    72f6531162bd2f1b57e8114c8358fca507090f41, f46d2b99a6acd87d56822c600fd2587a37e4d56c]
   linux-4.9.y: [bbd07cbb1076de03d896c9c3787081b1080e8c99, 2c9b57e4474d93222bcb6e7f901fd1e71ded699c,
     60712274887fcd4ad5eb8e01796022b6b202143c, 33182fe97add6e83c195e9d0f7297a6499563b52,
     5b2ec92f70f6d4084d23bf42391fd27fa03e8c4c, 432e99b34066099db62f87b2704654b1b23fd6be,


=====================================
issues/CVE-2018-3639.yml
=====================================
@@ -33,9 +33,8 @@ comments:
     (and respective stable releases).
     Basically: 3b78ce4a34b761c7fe13520de822984019ff1a8f^2 ^1aa7a5735a41418d8e01fa7c9565eb2657e2ea3f~1
   Ubuntu-tyhicks: '"Variant 4"'
-  bwh: |-
-    linux-4.4.y, linux-4.9.y, linux-4.14.y are missing a backport of commit
-    af86ca4e3088.  linux-4.4.y is also missing KVM support for SSBD.
+  bwh: linux-4.4.y is missing a backport of commit af86ca4e3088 and KVM support for
+    SSBD.
 reporters:
 - Jann Horn
 - Ken Johnson
@@ -114,6 +113,31 @@ fixed-by:
     bd4b410bc5ea560107126a3df18e9233baaec9f3, 95271aeb93d4681c65e2f94969b23ef6070367a6,
     7445962ff2d652bb957722ca1a08a92d09f3e5d7, 677af592349708498671b0d9290912acb2f203e4,
     75e3417f898fe1d2451e7ceffe93db5c66772b0a]
+  linux-4.9.y: [741c026d1a0c594f7ad509f44488ef29582fed74, 88659d5fd9bea7f6afb227c6d404de750b368b45,
+    3effee64a9993dc5587fb39f0da4455769e53d26, 0f5dd651397b264903e8becc511af6cf384c273e,
+    cf21f58ae6f264e0a10d9736be97342627cf9837, 24e4dd97af40afa4d45e85a32d9c2cc81425a62e,
+    a80714172abca6413d2d6505be64723ae73a903b, 6f70a553666dd8c4fa370eaaa41380eec593229c,
+    19e3a2bec95e966921689ae39117f9dbbaffd99b, 99b13116965f16b2e608e7796cd59198eee5bf06,
+    f854434b37bbf8953900226acd6139081f60d3da, 99318eca2c7ab3250b9614043b9ac6077ff2cb46,
+    7a2d2358ba9b6de29be0a98c8290479df32604b6, 4812ffbbfcac35270b82292e84e8e7187088c8b8,
+    89c6e9b599c573802de1b2fff6a9ccd99c3c4e57, a078e3e81964c31079627dd32c3ea714d5b1531e,
+    4272f528da381673a8e7845c93daa88b8aa4f4e9, 51ef9af2a35bbc21334c801fd15cbfe01210760f,
+    0a112f104548667f5618477ff0f2a54ee626addd, ea055f7d43fb3a9d56e80d0116104555d6dde3f7,
+    036608d62a838aeb63cae0adaf8ac773cb53148c, c71def81cd07e1bd74da468ae6abe1ce62e3157b,
+    ab677c2addbb128f334c4906f27a0285a67d2180, 094c2767c4f02c36eabc27309d78b04f4a216e88,
+    05a85a396f3989e9ac953785d9dccfc7cd0110f2, bf3da841edae882de545d2d19b1fae205cab8d98,
+    f8cd89f5e05d49422315e60ec2db9fcb66d25aca, f79f0efe8e1816063f83926c946026d83b9b287f,
+    eb7b5624be3e6249a880310be486245db15a5f5c, dbb264a253c8b07259d55fb3373b783fcb641b04,
+    6fdd277a9326c5ef3fe94999c9c319ad64333fdd, 3a684641619ff0e06b8d4cb8c2ffbef304c9bdb1,
+    69e9b0b1e04001a743927489bb8b9a10344810d8, 4a58908fa1476c600548f82effc75bcfa890454a,
+    a7c343228e5c32802431e6cc5b855ae61eb4db72, f69e91f2c4ce59deb66bd30150e5153c08873ae9,
+    53c434e735fffbf8715a1778ce44387131e0b080, d0cb78f5e4214db86b12a9448d8ccaa005f43cb9,
+    1189cbf52ad35cfd04a715016200ea81dd4c708f, 7c0b2dc44956533c5aac95f07575feef7b63344c,
+    b7b84401576d3858e9573d69d8287e182444f8e9, ea99935b633bd4766a679e51b173197c750fb00b,
+    599288ec9e20d9772e6e8a27aeae021f018c7336, ec90464d96c50f90bfe1bde6dea748a6c962313c,
+    0ec827f974e198c609c2f258a5a1f11f9af48bb2, b0ef8c72b3d70505ba7fd72af6b1e3fc9b3ae9bc,
+    b965592a07a248ef254d9d421bd34a6b548db21f, 3394ef1a7efc08e3c185ac2446f06284847ccb37,
+    def8c1d045a0fb457a1136f7edcc5ed8b2d81af6]
   mainline: [1aa7a5735a41418d8e01fa7c9565eb2657e2ea3f, 4a28bfe3267b68e22c663ac26185aa16c9b879ef,
     d1059518b4789cabe34bb4b714d07e6089c82ca1, 1b86883ccb8d5d9506529d42dbe1a5257cb30b18,
     5cf687548705412da47c9cec342fd952d71ed3d5, c456442cd3a59eeb1d60293c26cbe2ff2c4e42cf,


=====================================
issues/CVE-2018-5848.yml
=====================================
@@ -6,4 +6,5 @@ references:
 - https://marc.info/?l=linux-wireless&m=151066597529493&w=2
 fixed-by:
   linux-4.14.y: [107b02c81a8761f1f7efc1e8b54d435324ccd13e]
+  linux-4.9.y: [35db4d1ed8a344899a87887fa7bf11be5b057bec]
   mainline: [b5a8ffcae4103a9d823ea3aa3a761f65779fbe2a]


=====================================
issues/CVE-2018-7740.yml
=====================================
@@ -18,10 +18,13 @@ comments:
     ff8c0c53c475 and 045c7a3f may also be needed for older
       releases
 introduced-by:
+  linux-4.9.y: [e5deaa544138b5b01531d06cfee05a969375a5f6]
   mainline: [ff8c0c53c47530ffea82c22a0a6df6332b56c957]
 fixed-by:
-  linux-3.16.y: [363ed2044f82d8997e9ea8231dc1abeab4993755, 8cca49ea37415645203520bff04309c8a87f7677]
+  linux-3.16.y: [363ed2044f82d8997e9ea8231dc1abeab4993755, 8cca49ea37415645203520bff04309c8a87f7677,
+    b9beff69cd84917c7881c176c241db933a3f7f7d]
   linux-3.2.y: [4cba2554682469496ff48536d50c399110d20043, 131802b8292d35e8a407469c485565b199ed79cf]
-  linux-4.14.y: [1e8628443ede418464b0ab101b24fbb7030949b2]
-  linux-4.15.y: [e0fdb5385c4bf26b4be60c0042344c315c039aeb]
-  mainline: [63489f8e821144000e0bdca7e65a8d1cc23a7ee7]
+  linux-4.14.y: [1e8628443ede418464b0ab101b24fbb7030949b2, 61534984904eaf3604626170dc718556210642a2]
+  linux-4.15.y: [e0fdb5385c4bf26b4be60c0042344c315c039aeb, f6b213293ed95d8482769d3c496dfa8692a155b1]
+  linux-4.9.y: [447effd30f9d12f7925595ba9a6ffb01969d6cce, 0c82bca7cd1ae580dc34069d42edfd5102603e7e]
+  mainline: [63489f8e821144000e0bdca7e65a8d1cc23a7ee7, 5df63c2a149ae65a9ec239e7c2af44efa6f79beb]



View it on GitLab: https://gitlab.com/cip-project/cip-kernel/cip-kernel-sec/compare/efeeb55f65f8bb4e27558d190d89c91515285abb...d809002c1c357902a2ed7bf38c1fa2efde5e1f74

-- 
View it on GitLab: https://gitlab.com/cip-project/cip-kernel/cip-kernel-sec/compare/efeeb55f65f8bb4e27558d190d89c91515285abb...d809002c1c357902a2ed7bf38c1fa2efde5e1f74
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cip-project.org/pipermail/cip-dev/attachments/20181208/68419adc/attachment-0001.html>

^ permalink raw reply	[flat|nested] 2+ messages in thread

* [cip-dev] [Git][cip-project/cip-kernel/cip-kernel-sec][master] 2 commits: Fill in and correct commit lists for various issues
@ 2018-12-06 14:22 Ben Hutchings
  0 siblings, 0 replies; 2+ messages in thread
From: Ben Hutchings @ 2018-12-06 14:22 UTC (permalink / raw)
  To: cip-dev

Ben Hutchings pushed to branch master at cip-project / cip-kernel / cip-kernel-sec


Commits:
6a687350 by Ben Hutchings at 2018-12-06T13:39:35Z
Fill in and correct commit lists for various issues

- - - - -
efeeb55f by Ben Hutchings at 2018-12-06T14:21:45Z
Import data from stable

Record the fixes I backported for 4.14.85.

- - - - -


24 changed files:

- issues/CVE-2017-13166.yml
- issues/CVE-2017-13216.yml
- issues/CVE-2017-18174.yml
- issues/CVE-2017-18232.yml
- issues/CVE-2017-18257.yml
- issues/CVE-2018-1128.yml
- issues/CVE-2018-1129.yml
- issues/CVE-2018-12232.yml
- issues/CVE-2018-13096.yml
- issues/CVE-2018-13097.yml
- issues/CVE-2018-13098.yml
- issues/CVE-2018-13100.yml
- issues/CVE-2018-14610.yml
- issues/CVE-2018-14611.yml
- issues/CVE-2018-14612.yml
- issues/CVE-2018-14613.yml
- issues/CVE-2018-14614.yml
- issues/CVE-2018-14615.yml
- issues/CVE-2018-18445.yml
- issues/CVE-2018-18690.yml
- issues/CVE-2018-3639.yml
- issues/CVE-2018-5703.yml
- issues/CVE-2018-5848.yml
- issues/CVE-2018-7740.yml


Changes:

=====================================
issues/CVE-2017-13166.yml
=====================================
@@ -8,6 +8,8 @@ comments:
     by commit 7e6a68210784 "[media] videodev2.h: add initial support for
     compound controls".  Hans Verkuil is working on stable backports.
   Debian-carnil: 'Patch series backported to: 4.15.4'
+introduced-by:
+  mainline: [fdf82dc2e2d43cf135b5fd352dea523642bb553a]
 fixed-by:
   linux-3.16.y: [5e5747642716c7a5ee61b8eb42f6b5d32136b150, 182f3143bcbc783ee18c1b8af52734929813541e,
     846e214562b1fd6d49ec2dd334bc5fe1ab1707f3, f64f7bd54eca5210397b060ca0a9aab8e633c772,


=====================================
issues/CVE-2017-13216.yml
=====================================
@@ -10,6 +10,8 @@ comments:
     ashmem driver source-wise introduced in 3.3-rc1 with
     11980c2ac4ccfad21a5f8ee9e12059f1e687bb40
   Debian-jmm: Only present in drivers/staging/android/ashmem.c
+introduced-by:
+  mainline: [11980c2ac4ccfad21a5f8ee9e12059f1e687bb40]
 fixed-by:
   linux-3.16.y: [63aa20e4f4760249339c7771bd7e4a01d82a95ad]
   linux-3.18.y: [6dc42f889217a0a077bc75c6fa5239ade762fff4]


=====================================
issues/CVE-2017-18174.yml
=====================================
@@ -13,5 +13,7 @@ comments:
     Issue fixed in 251e22abde21833b3d29577e4d8c7aaccd650eee (4.7-rc1).
     Was shortly introduced in a rc version with 3bfd44306c65d073008b9ca8f062249f35576b61
     in 4.11-rc1 and fixed in same rc version with 8dca4a41f1ad65043a78c2338d9725f859c8d2c3
+introduced-by:
+  mainline: [3bfd44306c65d073008b9ca8f062249f35576b61]
 fixed-by:
-  mainline: [251e22abde21833b3d29577e4d8c7aaccd650eee]
+  mainline: [8dca4a41f1ad65043a78c2338d9725f859c8d2c3]


=====================================
issues/CVE-2017-18232.yml
=====================================
@@ -6,5 +6,7 @@ comments:
   Debian-bwh: |-
     Commit message says this was introduced by commit 87c8331fcf72
     (Linux 3.4).  For stretch, this requires an ABI bump.
+introduced-by:
+  mainline: [87c8331fcf72e501c3a3c0cdc5c9391ec72f7cf2]
 fixed-by:
   mainline: [0558f33c06bb910e2879e355192227a8e8f0219d]


=====================================
issues/CVE-2017-18257.yml
=====================================
@@ -11,6 +11,8 @@ comments:
   Debian-bwh: |-
     Appears to be a regression introduced in Linux 4.2 by commit
     003a3e1d60b0 "f2fs: add f2fs_map_blocks".
+introduced-by:
+  mainline: [003a3e1d60b0bb5cfb4feffb05a2083db2346364]
 fixed-by:
   linux-4.4.y: [0678adf8f8a99c66c48c608ea9a79588743bc615]
   linux-4.9.y: [b8bf4b886b82585202ab4ee169718656661cb89e]


=====================================
issues/CVE-2018-1128.yml
=====================================
@@ -9,13 +9,15 @@ comments:
     I don't think this is practical for 3.16 as the protocol change
     seems to depend on message signatures which were added in 3.19.
 fixed-by:
+  linux-4.14.y: [2fd0d0f9bb59ec5b628622e30f22158cb564c4ea, 66abd96062b627f0ee20a684ebba48cec80233d7,
+    0858417b5c2e7bcc0b9e52c4b76e2af3d69e138b, a55056e1523990e1ef9d70531ffaf27fd1ddff55,
+    3fd73c8a71f299e30359a63add1f33e3fd834831]
   mainline: [262614c4294d33b1f19e0d18c0091d9c329b544a, c0f56b483aa09c99bfe97409a43ad786f33b8a5a,
     c571fe24d243bfe7017f0e67fe800b3cc2a1d1f7, 149cac4a50b0b4081b38b2f38de6ef71c27eaa85,
     6daca13d2e72bedaaacfc08f873114c9307d5aea]
+fix-depends-on:
+  0dde584882ade13dc9708d611fbf69b0ae8a9e48: Avoids textual conflicts when picking
+    6daca13d2e72.
+  b3bbd3f2ab19c8ca319003b4b51ce4c4ca74da06: Simplifies backporting of 262614c4294d.
 ignore:
   linux-3.16.y: Protocol change is too difficult
-fix-depends-on:
-  0dde584882ade13dc9708d611fbf69b0ae8a9e48: |-
-    Avoids textual conflicts when picking 6daca13d2e72.
-  b3bbd3f2ab19c8ca319003b4b51ce4c4ca74da06: |-
-    Simplifies backporting of 262614c4294d.


=====================================
issues/CVE-2018-1129.yml
=====================================
@@ -2,4 +2,5 @@ description: 'libceph: implement CEPHX_V2 calculation mode'
 references:
 - http://tracker.ceph.com/issues/24837
 fixed-by:
+  linux-4.14.y: [b16d0c5d32468a0624505a7b6b211e20488295e9]
   mainline: [cc255c76c70f7a87d97939621eae04b600d9f4a1]


=====================================
issues/CVE-2018-12232.yml
=====================================
@@ -15,6 +15,8 @@ comments:
   Debian-bwh: |-
     Introduced in 4.10 by commit 86741ec25462 "net: core: Add a UID
     field to struct sock."
+introduced-by:
+  mainline: [86741ec25462e4c8cdce6df2f41ead05568c7d5e]
 fixed-by:
   linux-4.14.y: [91717ffc9057f38a0203a40ef36ae2e482fd7cbe]
   linux-4.16.y: [abaa1bb5e3652593a22a51e289bf9dfd4d4a8542]


=====================================
issues/CVE-2018-13096.yml
=====================================
@@ -3,4 +3,5 @@ references:
 - https://bugzilla.kernel.org/show_bug.cgi?id=200167
 - https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=8c9c95d5f4e68d22f22091546ce554ac9222689c
 fixed-by:
+  linux-4.14.y: [b8321ccd045710ee04fd5322c34cadd13a5e58af]
   mainline: [e34438c903b653daca2b2a7de95aed46226f8ed3]


=====================================
issues/CVE-2018-13097.yml
=====================================
@@ -3,4 +3,5 @@ references:
 - https://bugzilla.kernel.org/show_bug.cgi?id=200171
 - https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=d5c28acdb832800fbbcf831f20f75080cba54f04
 fixed-by:
+  linux-4.14.y: [f9cf5462b51d98026275cc51437fc531e808b64a]
   mainline: [9dc956b2c8523aed39d1e6508438be9fea28c8fc]


=====================================
issues/CVE-2018-13098.yml
=====================================
@@ -3,5 +3,6 @@ references:
 - https://bugzilla.kernel.org/show_bug.cgi?id=200173
 - https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=190286a242344d42aad83c8e70169d6d72a63d05
 fixed-by:
+  linux-4.14.y: [0081c90ebacebb3a82d0d24bf0f42273ce2d902e]
   linux-4.18.y: [b6f493453c78311598fdd204f7815e683818512a]
   mainline: [76d56d4ab4f2a9e4f085c7d77172194ddaccf7d2]


=====================================
issues/CVE-2018-13100.yml
=====================================
@@ -3,5 +3,6 @@ references:
 - https://bugzilla.kernel.org/show_bug.cgi?id=200183
 - https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=e72ba39212abc9e77f367cd95d7d3c8689aba14a
 fixed-by:
+  linux-4.14.y: [f3d6361a96a455c8ba12226a04efa67a0ada4966]
   linux-4.18.y: [0342426f2bf7298a91efee659ddc033082f6918b]
   mainline: [42bf546c1fe3f3654bdf914e977acbc2b80a5be5]


=====================================
issues/CVE-2018-14610.yml
=====================================
@@ -8,4 +8,5 @@ comments:
     Upstream fix depends on (at least) commit fce466eab7ac
     "btrfs: tree-checker: Verify block_group_item".
 fixed-by:
+  linux-4.14.y: [34407a175a59b668a1a2bbf0d0e495d87a7777d8]
   mainline: [514c7dca85a0bf40be984dab0b477403a6db901f]


=====================================
issues/CVE-2018-14611.yml
=====================================
@@ -8,4 +8,5 @@ comments:
     Upstream fix depends on (at least) commit e06cd3dd7cea
     "Btrfs: add validadtion checks for chunk loading".
 fixed-by:
+  linux-4.14.y: [f7eef132ccc95c9af50b647c5da0511d2b8492f8]
   mainline: [315409b0098fb2651d86553f0436b70502b29bb2]


=====================================
issues/CVE-2018-14612.yml
=====================================
@@ -10,4 +10,5 @@ comments:
     what happened for the second one, resp. not yet checked if
     that applies.
 fixed-by:
+  linux-4.14.y: [c0dfb99847851fb830d1e8ea7d5e0571f50c325a, 895586ecb7a4528336d41f81d0ce3985e8abbed6]
   mainline: [ba480dd4db9f1798541eb2d1c423fc95feee8d36, 7ef49515fa6727cb4b6f2f5b0ffbc5fc20a9f8c6]


=====================================
issues/CVE-2018-14613.yml
=====================================
@@ -4,4 +4,5 @@ references:
 - https://bugzilla.kernel.org/show_bug.cgi?id=199849
 - https://patchwork.kernel.org/patch/10503147/
 fixed-by:
+  linux-4.14.y: [9f268b5cf2d6a716779dfe11f4bc02d6461db693]
   mainline: [fce466eab7ac6baa9d2dcd88abcf945be3d4a089]


=====================================
issues/CVE-2018-14614.yml
=====================================
@@ -4,4 +4,5 @@ references:
 - https://bugzilla.kernel.org/show_bug.cgi?id=200419
 - https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=bf2d987b270ed14fb205c83c6dcfbfa6dfcd9f8c
 fixed-by:
+  linux-4.14.y: [30130700acfad8a705c109325379f5bbe21b3ccc]
   mainline: [e494c2f995d6181d6e29c4927d68e0f295ecf75b]


=====================================
issues/CVE-2018-14615.yml
=====================================
@@ -4,4 +4,5 @@ references:
 - https://bugzilla.kernel.org/show_bug.cgi?id=200421
 - https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=f2fs-dev&id=a80a2ff8e0a1265a4e92f4b8ae7caacc83a19503
 fixed-by:
+  linux-4.14.y: [d7d9d29a837358636e12fe09c90a7882b53b2220]
   mainline: [18dd6470c2d14d10f5a2dd926925dc80dbd3abfd]


=====================================
issues/CVE-2018-18445.yml
=====================================
@@ -2,6 +2,8 @@ description: BPF verifier bug leads to out-of-bounds access
 references:
 - https://www.openwall.com/lists/oss-security/2018/10/17/9
 - https://bugs.chromium.org/p/project-zero/issues/detail?id=1686
+introduced-by:
+  mainline: [468f6eafa6c44cb2c5d8aad35e12f06c240a812a]
 fixed-by:
   linux-4.14.y: [10fdfea70d4667abf3724c31443e5d5922fecebd]
   linux-4.18.y: [11b165210c7214645c183dc7f74aca8d51381691]


=====================================
issues/CVE-2018-18690.yml
=====================================
@@ -4,4 +4,5 @@ references:
 - https://bugzilla.kernel.org/show_bug.cgi?id=199119
 - https://bugzilla.suse.com/show_bug.cgi?id=1105025
 fixed-by:
+  linux-4.14.y: [cb7ccb9924bb3596f211badf0d2becf131a979cd]
   mainline: [7b38460dc8e4eafba06c78f8e37099d3b34d473c]


=====================================
issues/CVE-2018-3639.yml
=====================================
@@ -64,6 +64,31 @@ fixed-by:
     4e99bb051d3e60dbb323c5562375c96f56d56ec4, fbb7b98887d4fe5e556b2146857b9c43b6c469f3,
     8963b10319ec195059f8a65c049303f84cb02d38, dde241727d8213c0f29102642a6be2629df4c596,
     5a9cbccff42fdecd30daaf8e88d4779cce055ac7]
+  linux-4.14.y: [8410540f5aaf06ab01197443371be89822971e58, 69dc73805969ea919786c56d18e5a51fb8c128f2,
+    3ce1634f6165ba638546bf83123f1e5c51b1afcd, 7c9b4959cda48f22ecd6ceb88bda7f939f2016b3,
+    94ae9d26284369da199dfb2581fe0b7ea66f7733, c6dc89dd04e3adfb713c40c20817a8791a8deda6,
+    832b579e1e83f17e14a8c054ccc768eaf5e80269, 65f747a6b1089f13e80b0b2e0c4128e72d135a70,
+    128e69909f7c245765f75d7f350dd67eb8fe8a7b, fa2f1c65246d956106fa964cf0ed953162af88e5,
+    716bfae3b3f40de8c0a6ae83f199d96fd152b3cc, 97224b3da69810155b44f173cc8959eea565a98d,
+    81c3c2b5917af382a90d116a5ccd034fe5d32c2a, 33f6a06810cb3f3f0ba20914db334c7c4855ba80,
+    704609d396801c86bca6dcdb14676489dd623da5, d8553911627ab1d9789d08c9902f5e43194f99f7,
+    7d1254a1489c4ecc23a6afdfd1a17bdbb4cd186d, dd88d569eeff59a03b897ba0168547a465091aca,
+    87895ae1e9b22a04441992921b79b6d32e22142a, c024722ffecd484fcb35ad61e822c214b6913196,
+    20d036a2e223a5c4327bcf432ef995f59f51d1d1, d829fcceb8f532966bfb07fb67cb968374fcbbd2,
+    9939db75cd5b686ca43c4aa26e24d6b73ffa66e0, 61dfdc12ff35cd6f196a543271174ae611e36fb1,
+    0f18f44ce076e48d25c1b03e15f3b588ba0f9df1, 89ba80e61a395afc40a865d008931c576d20724d,
+    43c47eb2a274fa12029ac5485ae4360048a398af, 8dc742f930ccbb6b41d538bb35b81693cd8bad43,
+    4fbc01632e779977bbdcbb14877dcc80d7beeb0b, f69c4dd36766666077b96e30e7d0d1122642c00a,
+    5a53a5fefb73c150d754907916188d0cf3fb36d8, bd2059282934fc009d755d24527187df5fe448de,
+    b1a6028c23748afc3b970bf2a740a3ebc7424e12, b1d1984f389865e655076ae18d4626b1a65ba82c,
+    8e0836d1413b86ef6e85142c3902990815cf1cba, bbc0d1c335664660acc2c6e68901d350805a1ff1,
+    7f1efb5e74e3e1a01b73d3364d223f71044f5049, b213ab46cde40368b793daac516be9218beaa750,
+    72f46c229ac286c0a734888f50a3af274036290f, 8e1c285a050ca8bcbe30c47f102497e44319f12c,
+    3e6ab4ca1345b8b7ff09ea00e0abffa276c6919c, 6befd3a735e0228b8128f2916309ed218d9c49dd,
+    987f49474b0680db37f9bfcecc8e563803c55f52, d13f068b94a18b8d9fafaf2519fd1f43d4965f36,
+    71179d5dcbb96afc70c3344fd4b35db0c33d6008, 3f44c1a3c29379aa976be27df1da0fc4b9e7c364,
+    e8837f0a000f79e1e629ad8a00eceb3c452bf3bc, 92a3c944d6d5d3e08335cd3b6a75df907a43a960,
+    83b570c004da47b51d7417ac18d8491d9fc91420]
   linux-4.16.y: [2cd883a4cc87871db17dbc52398a58321af209b1, d1ee580200e9937cc4e3f0ff1d45c3cfb2532f9e,
     0e303bbda22ac4a655f0a2bfdd51cda209562ddb, 4fa760f200941e88187c0241ce5df72e8ec9cd97,
     2460962b14b78b47ebfeb744bd9e09d813c8236d, 569e3b16770b6d3c8ea08bb41678473f786868a3,


=====================================
issues/CVE-2018-5703.yml
=====================================
@@ -9,5 +9,6 @@ comments:
 introduced-by:
   mainline: [3c4d7559159bfe1e3b94df3a657b2cda3a34e218]
 fixed-by:
+  linux-4.14.y: [2a0f5919e1e6a1c0423d895ab75eb15f94a67c69]
   linux-4.15.y: [c5f3a16c047dfa7f309a2e1ca7d43e7db92ec35b]
   mainline: [c113187d38ff85dc302a1bb55864b203ebb2ba10]


=====================================
issues/CVE-2018-5848.yml
=====================================
@@ -5,4 +5,5 @@ references:
 - https://www.codeaurora.org/security-bulletin/2018/05/11/may-2018-code-aurora-security-bulletin-2#_CVE-2018-5848
 - https://marc.info/?l=linux-wireless&m=151066597529493&w=2
 fixed-by:
+  linux-4.14.y: [107b02c81a8761f1f7efc1e8b54d435324ccd13e]
   mainline: [b5a8ffcae4103a9d823ea3aa3a761f65779fbe2a]


=====================================
issues/CVE-2018-7740.yml
=====================================
@@ -17,6 +17,8 @@ comments:
     045c7a3f tried to catch issues like this, but missed this case.
     ff8c0c53c475 and 045c7a3f may also be needed for older
       releases
+introduced-by:
+  mainline: [ff8c0c53c47530ffea82c22a0a6df6332b56c957]
 fixed-by:
   linux-3.16.y: [363ed2044f82d8997e9ea8231dc1abeab4993755, 8cca49ea37415645203520bff04309c8a87f7677]
   linux-3.2.y: [4cba2554682469496ff48536d50c399110d20043, 131802b8292d35e8a407469c485565b199ed79cf]



View it on GitLab: https://gitlab.com/cip-project/cip-kernel/cip-kernel-sec/compare/cfd826db2fb01bbdc297234e20a6e0add27bffca...efeeb55f65f8bb4e27558d190d89c91515285abb

-- 
View it on GitLab: https://gitlab.com/cip-project/cip-kernel/cip-kernel-sec/compare/cfd826db2fb01bbdc297234e20a6e0add27bffca...efeeb55f65f8bb4e27558d190d89c91515285abb
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cip-project.org/pipermail/cip-dev/attachments/20181206/1fcf4fe3/attachment-0001.html>

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2018-12-08 18:32 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-12-08 18:32 [cip-dev] [Git][cip-project/cip-kernel/cip-kernel-sec][master] 2 commits: Fill in and correct commit lists for various issues Ben Hutchings
  -- strict thread matches above, loose matches on Subject: below --
2018-12-06 14:22 Ben Hutchings

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.