[Git][cip-project/cip-kernel/cip-kernel-sec][master] Import more data
Agustin Benito Bethencourt
Ben Hutchings pushed to branch master at cip-project / cip-kernel / cip-kernel-sec
Commits:
-
dc96f854
by Ben Hutchings at 2019-06-24T14:58:04Z
11 changed files:
- issues/CVE-2018-12126.yml
- issues/CVE-2018-12127.yml
- issues/CVE-2018-12130.yml
- issues/CVE-2019-10126.yml
- issues/CVE-2019-11091.yml
- issues/CVE-2019-11599.yml
- issues/CVE-2019-12381.yml
- + issues/CVE-2019-12817.yml
- issues/CVE-2019-12818.yml
- issues/CVE-2019-12819.yml
- issues/CVE-2019-3896.yml
Changes:
... | ... | @@ -21,6 +21,7 @@ references: |
21 | 21 |
- https://usn.ubuntu.com/usn/usn-3985-2
|
22 | 22 |
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
|
23 | 23 |
- https://usn.ubuntu.com/usn/usn-3977-2
|
24 |
+- https://usn.ubuntu.com/usn/usn-3977-3
|
|
24 | 25 |
comments:
|
25 | 26 |
Debian-bwh: |-
|
26 | 27 |
Intel-specific hardware vulnerability similar to L1TF though more
|
... | ... | @@ -21,6 +21,7 @@ references: |
21 | 21 |
- https://usn.ubuntu.com/usn/usn-3985-2
|
22 | 22 |
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
|
23 | 23 |
- https://usn.ubuntu.com/usn/usn-3977-2
|
24 |
+- https://usn.ubuntu.com/usn/usn-3977-3
|
|
24 | 25 |
comments:
|
25 | 26 |
Debian-bwh: |-
|
26 | 27 |
Intel-specific hardware vulnerability similar to L1TF though more
|
... | ... | @@ -21,6 +21,7 @@ references: |
21 | 21 |
- https://usn.ubuntu.com/usn/usn-3985-2
|
22 | 22 |
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
|
23 | 23 |
- https://usn.ubuntu.com/usn/usn-3977-2
|
24 |
+- https://usn.ubuntu.com/usn/usn-3977-3
|
|
24 | 25 |
comments:
|
25 | 26 |
Debian-bwh: |-
|
26 | 27 |
Intel-specific hardware vulnerability similar to L1TF though more
|
... | ... | @@ -3,3 +3,5 @@ references: |
3 | 3 |
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126
|
4 | 4 |
- https://lore.kernel.org/linux-wireless/20190531131841.7552-1-tiwai@...
|
5 | 5 |
- https://marc.info/?l=oss-security&m=155965912410053&w=2
|
6 |
+fixed-by:
|
|
7 |
+ mainline: [69ae4f6aac1578575126319d3f55550e7e440449]
|
... | ... | @@ -21,6 +21,7 @@ references: |
21 | 21 |
- https://usn.ubuntu.com/usn/usn-3985-2
|
22 | 22 |
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
|
23 | 23 |
- https://usn.ubuntu.com/usn/usn-3977-2
|
24 |
+- https://usn.ubuntu.com/usn/usn-3977-3
|
|
24 | 25 |
reporters:
|
25 | 26 |
- Ke Sun
|
26 | 27 |
- Henrique Kawakami
|
... | ... | @@ -28,5 +28,6 @@ fixed-by: |
28 | 28 |
linux-4.14.y: [bb461ad8e6e0653fc6bd0f26d9173bab0aec235b]
|
29 | 29 |
linux-4.19.y: [6ff17bc5936e5fab33de8064dc0690f6c8c789ca]
|
30 | 30 |
linux-4.19.y-cip: [6ff17bc5936e5fab33de8064dc0690f6c8c789ca]
|
31 |
+ linux-4.4.y: [8f6345a11caae324ad36abca8723a5710d099a85]
|
|
31 | 32 |
linux-5.0.y: [1eb719f09f7e319e79f6abf2b9e8c0dcc1c477b5]
|
32 | 33 |
mainline: [04f5866e41fb70690e28397487d8bd8eea7d712a]
|
... | ... | @@ -11,5 +11,7 @@ comments: |
11 | 11 |
Debian-bwh: |-
|
12 | 12 |
There was already a null check before dereferencing the pointer.
|
13 | 13 |
No security impact.
|
14 |
+fixed-by:
|
|
15 |
+ mainline: [425aa0e1d01513437668fa3d4a971168bbaa8515]
|
|
14 | 16 |
ignore:
|
15 | 17 |
all: Invalid
|
1 |
+description: |-
|
|
2 |
+ It was discovered that the Linux kernel did not properly separate certain
|
|
3 |
+ memory mappings when creating new userspace processes on 64-bit Power
|
|
4 |
+ (ppc64el) systems. A local attacker could use this to access memory contents
|
|
5 |
+ or cause memory corruption of other processes on the system.
|
|
6 |
+references:
|
|
7 |
+- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817
|
|
8 |
+- https://usn.ubuntu.com/usn/usn-4031-1
|
|
9 |
+comments:
|
|
10 |
+ Ubuntu-tyhicks: |-
|
|
11 |
+ The vulnerability was introduced in upstream kernel version v4.17
|
|
12 |
+ This issue only affects ppc64el. The 32-bit powerpc architecture is
|
|
13 |
+ not affected.
|
|
14 |
+ Power8, Power7, Power6, Power5, and older 64-bit Power systems are
|
|
15 |
+ affected by default
|
|
16 |
+ Power9 LPARs running under PowerVM are affected by default. This
|
|
17 |
+ issue does not affect Power9 bare metal systems by default. Power9 bare metal
|
|
18 |
+ is only affected when "disable_radix" is specified as a kernel boot option.
|
|
19 |
+introduced-by:
|
|
20 |
+ mainline: [f384796c40dc55b3dba25e0ee9c1afd98c6d24d1]
|
... | ... | @@ -10,3 +10,12 @@ references: |
10 | 10 |
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=58bdd544e2933a21a51eecf17c3f5f94038261b5
|
11 | 11 |
- https://github.com/torvalds/linux/commit/58bdd544e2933a21a51eecf17c3f5f94038261b5
|
12 | 12 |
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.15
|
13 |
+fixed-by:
|
|
14 |
+ linux-3.16.y: [2c716db6f80cef6159972be0dab86892c39de277]
|
|
15 |
+ linux-4.14.y: [b275f8e6a0096cac11cf697c4e3ad226070264f5]
|
|
16 |
+ linux-4.19.y: [f132b3f5f1ad1cbe818474ab8d0b555ff39369d5]
|
|
17 |
+ linux-4.19.y-cip: [f132b3f5f1ad1cbe818474ab8d0b555ff39369d5]
|
|
18 |
+ linux-4.4.y: [6e7339d5ee302fcbfe8ef29c058cc85c360849b9]
|
|
19 |
+ linux-4.4.y-cip: [6e7339d5ee302fcbfe8ef29c058cc85c360849b9]
|
|
20 |
+ linux-4.9.y: [05d3d2d0b8574d0f61d12a64e2c6475a5c3d5ba6]
|
|
21 |
+ mainline: [58bdd544e2933a21a51eecf17c3f5f94038261b5]
|
... | ... | @@ -8,3 +8,14 @@ references: |
8 | 8 |
- https://git.kernel.org/linus/6ff7b060535e87c2ae14dd8548512abfdda528fb
|
9 | 9 |
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6ff7b060535e87c2ae14dd8548512abfdda528fb
|
10 | 10 |
- https://github.com/torvalds/linux/commit/6ff7b060535e87c2ae14dd8548512abfdda528fb
|
11 |
+introduced-by:
|
|
12 |
+ mainline: [0c692d07842a67d9aa6b8266a80e4ac460a5c1a2]
|
|
13 |
+fixed-by:
|
|
14 |
+ linux-3.16.y: [8a5e2f4be5d08d16964ce2adb8da6fc42052c6f1]
|
|
15 |
+ linux-4.14.y: [07c2216c3783daca34ea0d86affb9dfc5346f183]
|
|
16 |
+ linux-4.19.y: [96a3b14450afa83f4f3ffdeafaca19db8e05c2fd]
|
|
17 |
+ linux-4.19.y-cip: [96a3b14450afa83f4f3ffdeafaca19db8e05c2fd]
|
|
18 |
+ linux-4.4.y: [a1b4ace43842791d908a8837304031e439c2ea39]
|
|
19 |
+ linux-4.4.y-cip: [a1b4ace43842791d908a8837304031e439c2ea39]
|
|
20 |
+ linux-4.9.y: [c4bec922def2285707cd3be3a80be46467ad8cde]
|
|
21 |
+ mainline: [6ff7b060535e87c2ae14dd8548512abfdda528fb]
|
... | ... | @@ -5,3 +5,9 @@ description: |- |
5 | 5 |
references:
|
6 | 6 |
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3896
|
7 | 7 |
- https://bugzilla.redhat.com/show_bug.cgi?id=1694812
|
8 |
+- https://marc.info/?t=127366612300001&r=1&w=2
|
|
9 |
+- https://marc.info/?l=linux-kernel&m=127422151819010&w=2
|
|
10 |
+- https://lore.kernel.org/patchwork/patch/205534/
|
|
11 |
+- ttps://marc.info/?t=136035740900005&r=1&w=2
|
|
12 |
+fixed-by:
|
|
13 |
+ mainline: [2dcb22b346be7b7b7e630a8970d69cf3f1111ec1]
|