From: Masami Ichikawa <masami.ichikawa@miraclelinux.com> To: cip-dev <cip-dev@lists.cip-project.org> Subject: New CVE entry this week Date: Thu, 30 Sep 2021 09:12:05 +0900 [thread overview] Message-ID: <CAODzB9qObzKXuh+WaSqh_KD=T2NfZw79d-NnXFX1vmNGj5wsqQ@mail.gmail.com> (raw) Hi ! It's this week's CVE report. This week reported one new CVE. * New CVEs CVE-2021-20317: lib/timerqueue: Rely on rbtree semantics for next timer This bug has been fixed in 5.4-rc1 so that before 5.4 kernels are affected. For 4.19, patch can be applied without any modification. For 4.4, it needs to modify patch to apply it. According to the description in cve.mitre.org(https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317), it describes "This flaw allows a local attacker with special user privileges to cause a denial of service" so I think this vulnerability severity may be low. CVSS v3 score is not provided. Fixed status mainline: [511885d7061eda3eb1faf3f57dcc936ff75863f1] stable/5.10: [511885d7061eda3eb1faf3f57dcc936ff75863f1] stable/5.14: [511885d7061eda3eb1faf3f57dcc936ff75863f1] stable/5.4: [511885d7061eda3eb1faf3f57dcc936ff75863f1] * Updated CVEs No updated CVEs this week. Currently tracking CVEs CVE-2021-31615: Unencrypted Bluetooth Low Energy baseband links in Bluetooth Core Specifications 4.0 through 5.2 There is no fix information. CVE-2021-3640: UAF in sco_send_frame function There is no fix information. CVE-2020-26555: BR/EDR pin code pairing broken No fix information CVE-2020-26556: kernel: malleable commitment Bluetooth Mesh Provisioning No fix information. CVE-2020-26557: kernel: predictable Authvalue in Bluetooth Mesh Provisioning Leads to MITM No fix information. CVE-2020-26559: kernel: Authvalue leak in Bluetooth Mesh Provisioning No fix information. CVE-2020-26560: kernel: impersonation attack in Bluetooth Mesh Provisioning No fix information. Regards, -- Masami Ichikawa Cybertrust Japan Co., Ltd. Email :masami.ichikawa@cybertrust.co.jp :masami.ichikawa@miraclelinux.com
WARNING: multiple messages have this Message-ID
From: "Masami Ichikawa" <masami.ichikawa@miraclelinux.com> To: cip-dev <cip-dev@lists.cip-project.org> Subject: [cip-dev] New CVE entry this week Date: Thu, 30 Sep 2021 09:12:05 +0900 [thread overview] Message-ID: <CAODzB9qObzKXuh+WaSqh_KD=T2NfZw79d-NnXFX1vmNGj5wsqQ@mail.gmail.com> (raw) Message-ID: <20210930001205._AGvrYg0tmVq0BPnIGEq8p7WKljlYRX_CAonPDXNwwM@z> (raw) [-- Attachment #1: Type: text/plain, Size: 1769 bytes --] Hi ! It's this week's CVE report. This week reported one new CVE. * New CVEs CVE-2021-20317: lib/timerqueue: Rely on rbtree semantics for next timer This bug has been fixed in 5.4-rc1 so that before 5.4 kernels are affected. For 4.19, patch can be applied without any modification. For 4.4, it needs to modify patch to apply it. According to the description in cve.mitre.org(https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317), it describes "This flaw allows a local attacker with special user privileges to cause a denial of service" so I think this vulnerability severity may be low. CVSS v3 score is not provided. Fixed status mainline: [511885d7061eda3eb1faf3f57dcc936ff75863f1] stable/5.10: [511885d7061eda3eb1faf3f57dcc936ff75863f1] stable/5.14: [511885d7061eda3eb1faf3f57dcc936ff75863f1] stable/5.4: [511885d7061eda3eb1faf3f57dcc936ff75863f1] * Updated CVEs No updated CVEs this week. Currently tracking CVEs CVE-2021-31615: Unencrypted Bluetooth Low Energy baseband links in Bluetooth Core Specifications 4.0 through 5.2 There is no fix information. CVE-2021-3640: UAF in sco_send_frame function There is no fix information. CVE-2020-26555: BR/EDR pin code pairing broken No fix information CVE-2020-26556: kernel: malleable commitment Bluetooth Mesh Provisioning No fix information. CVE-2020-26557: kernel: predictable Authvalue in Bluetooth Mesh Provisioning Leads to MITM No fix information. CVE-2020-26559: kernel: Authvalue leak in Bluetooth Mesh Provisioning No fix information. CVE-2020-26560: kernel: impersonation attack in Bluetooth Mesh Provisioning No fix information. Regards, -- Masami Ichikawa Cybertrust Japan Co., Ltd. Email :masami.ichikawa@cybertrust.co.jp :masami.ichikawa@miraclelinux.com [-- Attachment #2: Type: text/plain, Size: 429 bytes --] -=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#6762): https://lists.cip-project.org/g/cip-dev/message/6762 Mute This Topic: https://lists.cip-project.org/mt/85963258/4520388 Group Owner: cip-dev+owner@lists.cip-project.org Unsubscribe: https://lists.cip-project.org/g/cip-dev/leave/10495289/4520388/727948398/xyzzy [cip-dev@archiver.kernel.org] -=-=-=-=-=-=-=-=-=-=-=-
next reply other threads:[~2021-09-30 0:12 UTC|newest] Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top 2021-09-30 0:12 Masami Ichikawa [this message] 2021-09-30 0:12 ` [cip-dev] " Masami Ichikawa 2021-09-30 6:33 ` nobuhiro1.iwamatsu 2021-09-30 6:33 ` Nobuhiro Iwamatsu 2021-09-30 12:11 ` Masami Ichikawa 2021-09-30 12:11 ` Masami Ichikawa 2021-10-07 0:59 Masami Ichikawa 2021-10-13 23:54 Masami Ichikawa 2021-10-21 1:21 Masami Ichikawa
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to='CAODzB9qObzKXuh+WaSqh_KD=T2NfZw79d-NnXFX1vmNGj5wsqQ@mail.gmail.com' \ --to=masami.ichikawa@miraclelinux.com \ --cc=cip-dev@lists.cip-project.org \ --subject='Re: New CVE entry this week' \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.