Re: Is CVE-2020-25284 backporting needed for 4.4-rt x86?
Nobuhiro Iwamatsu
Hi all,
toggle quoted messageShow quoted text
-----Original Message-----I removed CONFIG_BLK_DEV_RBD from 4.4.y-cip-rt/x86/siemens_i386-rt.config. Best regards, Nobuhiro
|
|
Re: CIP IRC weekly meeting today
Pavel Machek
Hi!
Kindly be reminded to attend the weekly meeting through IRC to discuss technical topics with CIP kernel today.I may be able to make it, but in case I will not: I reviewed 4.19.148 and 4.19.149. Best regards, Pavel -- (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html
|
|
Re: CIP IRC weekly meeting today
Chris Paterson
Hello Kudo-san,
Please accept my apologies for today's meeting.
From testing the only update I have is that lab-cip-renesas is back online now.
Kind regards, Chris
From: cip-dev@... <cip-dev@...> on behalf of masashi.kudo@... via lists.cip-project.org <masashi.kudo=cybertrust.co.jp@...>
Sent: Thursday, October 1, 2020 1:27:21 AM To: cip-dev@... <cip-dev@...> Subject: [cip-dev] CIP IRC weekly meeting today Hi all,
Kindly be reminded to attend the weekly meeting through IRC to discuss technical topics with CIP kernel today. *Please note that the IRC meeting was rescheduled to UTC (GMT) 09:00 starting from the first week of Apr. according to TSC meeting* https://www.timeanddate.com/worldclock/meetingdetails.html?year=2020&month=10&day=1&hour=9&min=0&sec=0&p1=224&p2=179&p3=136&p4=37&p5=241&p6=248 USWest USEast UK DE TW JP 02:00 05:00 10:00 11:00 17:00 18:00 Channel: * irc:chat.freenode.net:6667/cip Last meeting minutes: https://irclogs.baserock.org/meetings/cip/2020/09/cip.2020-09-24-09.00.log.html Agenda: * Action item 1. Combine root filesystem with kselftest binary - iwamatsu 2. Check whether CVE-2020-25284 needs to be backported to 4.4-rt -> Delete rbd ( Ceph block device ) from 4.4-rt x86 config - iwamatsu * Kernel maintenance updates * Kernel testing * Software update * CIP Security * AOB The meeting will take 30 min, although it can be extended to an hour if it makes sense and those involved in the topics can stay. Otherwise, the topic will be taken offline or in the next meeting. Best regards, -- M. Kudo Cybertrust Japan Co., Ltd.
|
|
Re: CIP IRC weekly meeting today
Chen-Yu Tsai (Moxa) <wens@...>
Hi, It's the Mid-Autumn Festival, and we have a long weekend here. So I will not be attending today's meeting. 3 new CVEs this week. Please check the merge request In cip-kernel-sec for details. ChenYu
Hi all,
|
|
Re: [isar-cip-core] image: export dpkg status file for debsecan
Daniel Sangorrin <daniel.sangorrin@...>
Hi Jan,
toggle quoted messageShow quoted text
Now it seems to work. I think it was some subtle issue with the use of quotes. Thanks, Daniel
-----Original Message-----
|
|
CIP IRC weekly meeting today
masashi.kudo@cybertrust.co.jp <masashi.kudo@...>
Hi all,
Kindly be reminded to attend the weekly meeting through IRC to discuss technical topics with CIP kernel today. *Please note that the IRC meeting was rescheduled to UTC (GMT) 09:00 starting from the first week of Apr. according to TSC meeting* https://www.timeanddate.com/worldclock/meetingdetails.html?year=2020&month=10&day=1&hour=9&min=0&sec=0&p1=224&p2=179&p3=136&p4=37&p5=241&p6=248 USWest USEast UK DE TW JP 02:00 05:00 10:00 11:00 17:00 18:00 Channel: * irc:chat.freenode.net:6667/cip Last meeting minutes: https://irclogs.baserock.org/meetings/cip/2020/09/cip.2020-09-24-09.00.log.html Agenda: * Action item 1. Combine root filesystem with kselftest binary - iwamatsu 2. Check whether CVE-2020-25284 needs to be backported to 4.4-rt -> Delete rbd ( Ceph block device ) from 4.4-rt x86 config - iwamatsu * Kernel maintenance updates * Kernel testing * Software update * CIP Security * AOB The meeting will take 30 min, although it can be extended to an hour if it makes sense and those involved in the topics can stay. Otherwise, the topic will be taken offline or in the next meeting. Best regards, -- M. Kudo Cybertrust Japan Co., Ltd.
|
|
Re: [isar-cip-core] image: export dpkg status file for debsecan
Daniel Sangorrin <daniel.sangorrin@...>
Hi Jan,
I forgot to reply one comment. This was based on the generate_manifest function.+# for cip-core-sec/debsecanThis is just a copy-out, I don't see the chroot need here. For some reason, copying without chroot didn't work for me. I will give it another try. Thanks, Daniel
|
|
Re: [isar-cip-core] image: export dpkg status file for debsecan
Daniel Sangorrin <daniel.sangorrin@...>
OK, I will send it to ISAR then.
toggle quoted messageShow quoted text
-----Original Message-----
|
|
Re: improve show-description results
Chen-Yu Tsai (Moxa) <wens@...>
Hi,
On Fri, Sep 25, 2020 at 12:00 PM Daniel Sangorrin <daniel.sangorrin@toshiba.co.jp> wrote: Thanks for submitting these. I'll take a look at them next week, after the long weekend here. ChenYu Thanks,
|
|
[isar-cip-core] export dpkg status for debsecan
Daniel Sangorrin <daniel.sangorrin@...>
Hi Jan,
This is a patch to isar-cip-core for exporting the dpkg status file which is needed by debsecan and its wrapper cip-core-sec. At the moment the code is duplicated for each image target. I could use the trick of putting the code in customizations.bb instead if you prefer, because currently it is imported from both image targets (cip-core-image.bb and cip-core-image-security.bb) [isar-cip-core] image: export dpkg status file for debsecan Thanks, Daniel
|
|
[isar-cip-core] image: export dpkg status file for debsecan
Daniel Sangorrin <daniel.sangorrin@...>
Although the currently exported manifest probably has
enough information, the tool debsecan and our wrapper cip-core-sec depend on the dpkg status format. Signed-off-by: Daniel Sangorrin <daniel.sangorrin@toshiba.co.jp> --- recipes-core/images/cip-core-image-security.bb | 8 ++++++++ recipes-core/images/cip-core-image.bb | 8 ++++++++ 2 files changed, 16 insertions(+) diff --git a/recipes-core/images/cip-core-image-security.bb b/recipes-core/images/cip-core-image-security.bb index 61ddc39..928774c 100644 --- a/recipes-core/images/cip-core-image-security.bb +++ b/recipes-core/images/cip-core-image-security.bb @@ -34,3 +34,11 @@ IMAGE_PREINSTALL += " \ uuid-runtime \ sudo \ " + +# for cip-core-sec/debsecan +ROOTFS_POSTPROCESS_COMMAND += "export_dpkg_status" +export_dpkg_status() { + sudo -E chroot --userspec=$(id -u):$(id -g) '${ROOTFSDIR}' \ + cat /var/lib/dpkg/status > \ + ${ROOTFS_MANIFEST_DEPLOY_DIR}/"${PF}".dpkg_status +} diff --git a/recipes-core/images/cip-core-image.bb b/recipes-core/images/cip-core-image.bb index 2cecde3..0139819 100644 --- a/recipes-core/images/cip-core-image.bb +++ b/recipes-core/images/cip-core-image.bb @@ -19,3 +19,11 @@ IMAGE_INSTALL += "customizations" # for swupdate SWU_DESCRIPTION ??= "swupdate" include ${SWU_DESCRIPTION}.inc + +# for cip-core-sec/debsecan +ROOTFS_POSTPROCESS_COMMAND += "export_dpkg_status" +export_dpkg_status() { + sudo -E chroot --userspec=$(id -u):$(id -g) '${ROOTFSDIR}' \ + cat /var/lib/dpkg/status > \ + ${ROOTFS_MANIFEST_DEPLOY_DIR}/"${PF}".dpkg_status +} -- 2.25.1
|
|
[ANNOUNCE] Release v4.19.147-cip35
Nobuhiro Iwamatsu
Hi,
CIP kernel team has released Linux kernel v4.19.147-cip35. The linux-4.19.y-cip tree has been updated base version from v4.19.144 to v4.19.147. You can get this release via the git tree at: v4.19.147-cip35: repository: https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git branch: linux-4.19.y-cip commit hash: b385381ef3d9aab661b8115b2c500e0db510914d added commits: CIP: Bump version suffix to -cip35 after merge from stable Best regards, Nobuhiro
|
|
[cip-kernel-sec] reports: add script to convert reports to csv format
Daniel Sangorrin <daniel.sangorrin@...>
The text version is probably enough for developers but
customers usually prefer to have a CSV that you can open with a spreadsheet program and contains additional information. CVEs are sorted in rows according to their criticality. ) Example usage: $ ./scripts/report_affected.py stable/4.19 > security-report.txt $ ./scripts/report_to_csv.py \ --security-report security-report.txt \ --issues-dir issues Signed-off-by: nguyen van hieu <hieu2.nguyenvan@toshiba.co.jp> Signed-off-by: Daniel Sangorrin <daniel.sangorrin@toshiba.co.jp> --- scripts/report_to_csv.py | 262 +++++++++++++++++++++++++++++++++++++++ 1 file changed, 262 insertions(+) create mode 100755 scripts/report_to_csv.py diff --git a/scripts/report_to_csv.py b/scripts/report_to_csv.py new file mode 100755 index 0000000..a3a984f --- /dev/null +++ b/scripts/report_to_csv.py @@ -0,0 +1,262 @@ +#!/usr/bin/python3 + +""" +This script will parse the text output from report_affected.py +(without options) and generate a CSV file that contains +additional information extracted from the NVD database (json format) + +Example usage: + $ ./scripts/report_affected.py stable/4.19 > security-report.txt + $ ./scripts/report_to_csv.py \ + --security-report security-report.txt \ + --issues-dir issues +""" + +import re +import wget +import os +import sys +import gzip +import json +import csv +import filecmp + +DATABASE_DIR = os.getcwd() + "/nvd-data/" + +def parse_cmd(): + """Parse command options. + """ + import argparse + + CURRENT_DIR = os.getcwd() + parser = argparse.ArgumentParser() + parser.add_argument('--security-report', dest='security_report', metavar='FILE', + default=CURRENT_DIR + '/security-report.txt', + help='Output from report_affected.py (without options)') + parser.add_argument('--issues-dir', dest='issues_dir', metavar='DIRECTORY', + default=CURRENT_DIR + '/issues', + help='directory containing the issues in YAML format') + + args = parser.parse_args() + return args + +def download_file(src, file, bar=""): + """Re-download file when an error occurred due to network connection problem. + """ + for i in range(3): + try: + wget.download(src, file, bar) + break + except: + pass + + if not os.path.exists(file): + print("ERROR: Can't download %s" % src) + exit(1) + +def get_cves_database(years): + """Get NVD data (json format) from NVD Data Feeds + """ + DATABASE_URL = "https://nvd.nist.gov/feeds/json/cve/1.1" + + for year in years: + if not os.path.exists(DATABASE_DIR + year): + os.makedirs(DATABASE_DIR + year) + + json_data = '/nvdcve-1.1-' + year + '.json.gz' + meta_data = '/nvdcve-1.1-' + year + '.meta' + # Download meta and database files if they don't exist + if not os.path.exists(DATABASE_DIR + year + meta_data): + download_file(DATABASE_URL + meta_data, DATABASE_DIR + year + meta_data) + else: + download_file(DATABASE_URL + meta_data, DATABASE_DIR + year + meta_data + '.new') + if filecmp.cmp(DATABASE_DIR + year + meta_data, DATABASE_DIR + year + meta_data + '.new'): + os.remove(DATABASE_DIR + year + meta_data + '.new') + + # Update meta and database files if they have any modified + else: + os.rename(DATABASE_DIR + year + meta_data + '.new', DATABASE_DIR + year + meta_data) + if os.path.exists(DATABASE_DIR + year + json_data): + os.remove(DATABASE_DIR + year + json_data) + + if not os.path.exists(DATABASE_DIR + year + json_data): + download_file(DATABASE_URL + json_data, DATABASE_DIR + year + json_data) + +def get_severity(cve_id, cve_items): + """Parse NVD database to get the `severity` of each CVE + """ + severity = '' + for cve_item in cve_items['CVE_Items']: + if cve_id == cve_item['cve']['CVE_data_meta']['ID']: + if 'baseMetricV3' in cve_item['impact']: + severity = cve_item['impact']['baseMetricV3']['cvssV3']['baseSeverity'] + elif 'baseMetricV2' in cve_item['impact']: + severity = cve_item['impact']['baseMetricV2']['severity'] + break + if not severity: + severity = "N/A" + return severity + +def get_description(cve_id, cve_items): + """Parse NVD database to get the `description` of each CVE + """ + DEBIAN_TRACKER = "https://security-tracker.debian.org/tracker/" + description = '' + for cve_item in cve_items['CVE_Items']: + if cve_id == cve_item['cve']['CVE_data_meta']['ID']: + description = cve_item['cve']['description']['description_data'][0]['value'] + break + + # Get CVE's description from debian tracker if that CVE is RESERVED in NVD + if not description: + if os.path.exists(cve_id): + os.remove(cve_id) + + download_file(DEBIAN_TRACKER + cve_id, cve_id) + try: + file = open(cve_id,'r') + except: + print("ERROR: Can't open CVE tracker file: %s" % cve_id) + exit(1) + content = file.read() + try: + description = re.search('Description.*?<td>(.*?)</td>',content).group(1) + except: + description = "N/A" + file.close() + os.remove(cve_id) + return description + +def parse_kernel_log(security_report): + """Parsing the security report text file to get list CVEs of each branch|tag + """ + if not os.path.exists(security_report): + print("ERROR: the security report text file doesn't exist") + exit(1) + if os.stat(security_report).st_size == 0: + print("LOG: the security report text file is empty") + exit(1) + + CVE_IDS = {} + with open(security_report, 'r') as file: + for line in file.read().splitlines(): + if not line: + continue + try: + branch = line.split(':')[-2].replace("/", "_") + cve_list = line.split(':')[-1] + + cves_by_year = {} + for cve in cve_list.split(): + year = cve.split('-')[1] + if year not in cves_by_year.keys(): + cves_by_year[year] = [] + cves_by_year[year].append(cve) + + if not branch or not cves_by_year: + print("LOG: Don't have any CVEs in branch|tag: '%s'" % branch) + break + if branch in CVE_IDS.keys(): + print("LOG: The branch|tag '%s' is duplicated in the security report text file" % branch) + + CVE_IDS[branch] = cves_by_year + except: + print("ERROR: The format of the security report text file is incorrect") + exit(1) + return CVE_IDS + +def get_cve_info(issues_dir, cves_by_year): + """Get the list of CVE-ids from the output of report_affected.py, + and parse the information from the CVE*.yml issues. + """ + import yaml + import subprocess + + CVES = [] + for year in cves_by_year.keys(): + json_data = '/nvdcve-1.1-' + year + '.json.gz' + # Parse json data file to get the severity/description of CVE + try: + file = gzip.open(DATABASE_DIR + year + json_data, 'r').read() + except: + print("ERROR: Can't open json data file: %s" % json_data) + exit(1) + cve_items = json.loads(file) + + for cve_id in cves_by_year[year]: + if not os.path.exists(issues_dir + "/" + cve_id + '.yml'): + print("ERROR: Issues directory or %s.yml doesn't exist" % cve_id) + exit(1) + + with open(issues_dir + "/" + cve_id + '.yml', encoding='utf-8') as f: + description = '' + references = '' + comments = '' + introduced_by = '' + fixed_by = '' + + cve_info = yaml.load(f, Loader=yaml.Loader) + if "description" in cve_info: + description = cve_info["description"] + # get the description in NVD database or Debian tracker if it doesn't exist in .yml file + if not description or description.isspace(): + description = get_description(cve_id, cve_items) + + severity = get_severity(cve_id, cve_items) + + if "references" in cve_info: + for str in cve_info["references"]: + references += str + "\n" + else: + references = "N/A" + + if "comments" in cve_info: + for key in cve_info["comments"]: + comments += key + ": " + cve_info["comments"][key] + "\n" + else: + comments = "N/A" + + if "introduced-by" in cve_info: + for key in cve_info["introduced-by"]: + introduced_by += key + ": " + " ".join(cve_info["introduced-by"][key]).replace(',', '+') + "\n" + else: + introduced_by = "N/A" + if "fixed-by" in cve_info: + for key in cve_info["fixed-by"]: + fixed_by += key + ": " + ", ".join(cve_info["fixed-by"][key]) + "\n" + else: + fixed_by = "N/A" + + CVES.append({'CVE-id': cve_id, 'Description': description, + 'Severity': severity, 'References': references, + 'Comments': comments, 'Introduced-by': introduced_by, + 'Fixed-by': fixed_by}) + return CVES + +def generate_csv_report(CVES, file_name): + with open(file_name, mode='w') as csv_file: + # writing the header fields + headers = CVES[0].keys() + csvwriter = csv.DictWriter(csv_file, fieldnames=headers) + csvwriter.writeheader() + + weight_severity = {"CRITICAL": 0, "HIGH" : 1, "MEDIUM" : 2, "LOW" : 3, "N/A": 4, "": 5} + sorted_CVES = sorted(CVES, key=lambda x: weight_severity[x['Severity'].upper()]) + # Writing the contents + for data in sorted_CVES: + csvwriter.writerow(data) + +if __name__ == "__main__": + args = parse_cmd() + + CVE_IDS = parse_kernel_log(args.security_report) + + # Getting CVEs database from NVD + YEARS = {} + for branch in CVE_IDS.keys(): + YEARS |= CVE_IDS[branch].keys() + get_cves_database(YEARS) + + for branch, cves_by_year in CVE_IDS.items(): + CVES = get_cve_info(args.issues_dir, cves_by_year) + generate_csv_report(CVES, "security-report-%s.csv" % branch) -- 2.25.1
|
|
[cip-kernel-sec] support csv format
Daniel Sangorrin <daniel.sangorrin@...>
This patch adds a script that converts the raw text reports
that you get from report_affected.py into CSV files with additional information obtained from the NVD database. [1/1] reports: add script to convert reports to csv format Thanks, Daniel
|
|
Fw: [cip-dev] improve show-description results
Daniel Sangorrin <daniel.sangorrin@...>
Sorry Ben, it seems that I misspelled your e-mail address.
I sent 3 patches for cip-kernel-sec to cip-dev. Kind regards, Daniel ________________________________________ From: cip-dev@lists.cip-project.org <cip-dev@lists.cip-project.org> on behalf of Daniel Sangorrin <daniel.sangorrin@toshiba.co.jp> Sent: Friday, September 25, 2020 12:59 PM To: sz.lin@moxa.com; ben.hutchings@codethink.co.u; wens@csie.org Cc: cip-dev@lists.cip-project.org Subject: [cip-dev] improve show-description results I had this in the backlog for a long time. These patches, improve the way CVEs' descriptions are displayed when calling scripts/report_affected.py with the option --show-description` enabled. [1/3] report_affected: word-wrap for the 'description' [2/3] report_affected: Delete extra blank lines [3/3] issues: fill in the description field of Thanks, Daniel
|
|
[cip-kernel-sec 3/3] issues: fill in the description field of remaining CVEs
Daniel Sangorrin <daniel.sangorrin@...>
From: nguyen van hieu <hieu2.nguyenvan@toshiba.co.jp>
I noticed that some issues have the description field empty when using the --show-description option. Signed-off-by: nguyen van hieu <hieu2.nguyenvan@toshiba.co.jp> Signed-off-by: Daniel Sangorrin <daniel.sangorrin@toshiba.co.jp> --- issues/CVE-2016-6213.yml | 5 ++++- issues/CVE-2017-1000364.yml | 5 ++++- issues/CVE-2017-1000365.yml | 6 +++++- issues/CVE-2017-1000379.yml | 5 ++++- issues/CVE-2017-16538.yml | 5 ++++- issues/CVE-2019-15214.yml | 6 +++++- issues/CVE-2019-20794.yml | 6 +++++- issues/CVE-2020-11725.yml | 8 +++++++- 8 files changed, 38 insertions(+), 8 deletions(-) diff --git a/issues/CVE-2016-6213.yml b/issues/CVE-2016-6213.yml index 31762df..58bf472 100644 --- a/issues/CVE-2016-6213.yml +++ b/issues/CVE-2016-6213.yml @@ -1,4 +1,7 @@ -description: '' +description: |- + fs/namespace.c in the Linux kernel before 4.9 does not restrict how many mounts may exist in a mount namespace, + which allows local users to cause a denial of service (memory consumption and deadlock) via MS_BIND mount system calls, + as demonstrated by a loop that triggers exponential growth in the number of mounts. references: - http://www.openwall.com/lists/oss-security/2016/07/13/6 - https://lkml.org/lkml/2016/8/28/269 diff --git a/issues/CVE-2017-1000364.yml b/issues/CVE-2017-1000364.yml index 8841754..c566c5b 100644 --- a/issues/CVE-2017-1000364.yml +++ b/issues/CVE-2017-1000364.yml @@ -1,4 +1,7 @@ -description: '' +description: |- + An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard + page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), + this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010). references: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364 - http://www.ubuntu.com/usn/usn-3324-1 diff --git a/issues/CVE-2017-1000365.yml b/issues/CVE-2017-1000365.yml index 6cbae0b..f87ca53 100644 --- a/issues/CVE-2017-1000365.yml +++ b/issues/CVE-2017-1000365.yml @@ -1,4 +1,8 @@ -description: '' +description: |- + The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through + RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers + into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. + It appears that this feature was introduced in the Linux Kernel version 2.6.23. references: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365 - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt diff --git a/issues/CVE-2017-1000379.yml b/issues/CVE-2017-1000379.yml index 93258d8..2ae11b1 100644 --- a/issues/CVE-2017-1000379.yml +++ b/issues/CVE-2017-1000379.yml @@ -1,4 +1,7 @@ -description: '' +description: |- + The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, + the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. + Linux Kernel version 4.11.5 is affected. references: - https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000379 diff --git a/issues/CVE-2017-16538.yml b/issues/CVE-2017-16538.yml index 793db3f..c466041 100644 --- a/issues/CVE-2017-16538.yml +++ b/issues/CVE-2017-16538.yml @@ -1,4 +1,7 @@ -description: '' +description: |- + drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service + (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, + related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner). references: - https://patchwork.linuxtv.org/patch/44566/ - https://patchwork.linuxtv.org/patch/44567/ diff --git a/issues/CVE-2019-15214.yml b/issues/CVE-2019-15214.yml index c92091b..cb6006d 100644 --- a/issues/CVE-2019-15214.yml +++ b/issues/CVE-2019-15214.yml @@ -1,4 +1,8 @@ -description: '' +description: |- + An issue was discovered in the Linux kernel before 5.0.10. + There is a use-after-free in the sound subsystem because + card disconnection causes certain data structures to be deleted too early. + This is related to sound/core/init.c and sound/core/info.c. references: - https://syzkaller.appspot.com/bug?id=75903e0021cef79bc434d068b5169b599b2a46a9 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15214 diff --git a/issues/CVE-2019-20794.yml b/issues/CVE-2019-20794.yml index 43e3ccf..8f30e12 100644 --- a/issues/CVE-2019-20794.yml +++ b/issues/CVE-2019-20794.yml @@ -1,4 +1,8 @@ -description: '' +description: |- + An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. + A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, + if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, + and resources being permanently locked up until system reboot. This can result in resource exhaustion. references: - https://github.com/sargun/fuse-example - https://sourceforge.net/p/fuse/mailman/message/36598753/ diff --git a/issues/CVE-2020-11725.yml b/issues/CVE-2020-11725.yml index ca2b80d..3cae05d 100644 --- a/issues/CVE-2020-11725.yml +++ b/issues/CVE-2020-11725.yml @@ -1,4 +1,10 @@ -description: '' +description: |- + ** DISPUTED ** snd_ctl_elem_add in sound/core/control.c in the Linux kernel through 5.6.3 has a count=info->owner line, + which later affects a private_size*count multiplication for unspecified "interesting side effects." + NOTE: kernel engineers dispute this finding, because it could be relevant only if new callers were added + that were unfamiliar with the misuse of the info->owner field to represent data unrelated to the "owner" concept. + The existing callers, SNDRV_CTL_IOCTL_ELEM_ADD and SNDRV_CTL_IOCTL_ELEM_REPLACE, + have been designed to misuse the info->owner field in a safe way. references: - https://twitter.com/yabbadabbadrew/status/1248632267028582400 - https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/ -- 2.25.1
|
|
[cip-kernel-sec 1/3] report_affected: word-wrap for the 'description'
Daniel Sangorrin <daniel.sangorrin@...>
From: Nguyen Van Hieu <hieu2.nguyenvan@toshiba.co.jp>
Currently some descriptions are quite long, and it is hard to read. Add line-breaks so every line is at most 80 characters long. Signed-off-by: Nguyen Van Hieu <hieu2.nguyenvan@toshiba.co.jp> Signed-off-by: Daniel Sangorrin <daniel.sangorrin@toshiba.co.jp> --- scripts/report_affected.py | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/scripts/report_affected.py b/scripts/report_affected.py index a97b700..a181d97 100755 --- a/scripts/report_affected.py +++ b/scripts/report_affected.py @@ -19,6 +19,7 @@ import kernel_sec.branch import kernel_sec.issue import kernel_sec.version +import textwrap def main(git_repo, remotes, only_fixed_upstream, include_ignored, show_description, *branch_names): @@ -136,8 +137,11 @@ def main(git_repo, remotes, only_fixed_upstream, if show_description: print('%s:' % branch['full_name']) for cve_id in sorted_cve_ids: - print(cve_id, '=>', - kernel_sec.issue.load(cve_id).get('description', 'None')) + description=kernel_sec.issue.load(cve_id).get('description', 'None') + wrap_description = '' + for line in textwrap.wrap(description, 80, break_long_words=False): + wrap_description += line + '\n ' + print(cve_id, '=>',wrap_description) else: print('%s:' % branch['full_name'], *sorted_cve_ids) -- 2.25.1
|
|
[cip-kernel-sec 2/3] report_affected: Delete extra blank lines between CVEs
Daniel Sangorrin <daniel.sangorrin@...>
From: nguyen van hieu <hieu2.nguyenvan@toshiba.co.jp>
When using the --show-description option CVEs had blank lines between them. Remove them to make it more compact. Signed-off-by: nguyen van hieu <hieu2.nguyenvan@toshiba.co.jp> Signed-off-by: Daniel Sangorrin <daniel.sangorrin@toshiba.co.jp> --- scripts/report_affected.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scripts/report_affected.py b/scripts/report_affected.py index a181d97..9894602 100755 --- a/scripts/report_affected.py +++ b/scripts/report_affected.py @@ -141,7 +141,7 @@ def main(git_repo, remotes, only_fixed_upstream, wrap_description = '' for line in textwrap.wrap(description, 80, break_long_words=False): wrap_description += line + '\n ' - print(cve_id, '=>',wrap_description) + print(cve_id, '=>',wrap_description.strip()) else: print('%s:' % branch['full_name'], *sorted_cve_ids) -- 2.25.1
|
|
improve show-description results
Daniel Sangorrin <daniel.sangorrin@...>
I had this in the backlog for a long time. These
patches, improve the way CVEs' descriptions are displayed when calling scripts/report_affected.py with the option --show-description` enabled. [1/3] report_affected: word-wrap for the 'description' [2/3] report_affected: Delete extra blank lines [3/3] issues: fill in the description field of Thanks, Daniel
|
|
Re: CVE-2020-0427 / pinctrl: devicetree: Avoid taking direct reference to device name string
Nobuhiro Iwamatsu
Hi Pavel,
2020年9月24日(木) 19:17 Pavel Machek <pavel@ucw.cz>: Thanks for your work. It looks like there is no issue. Best regards, Nobuhiro -- -- Nobuhiro Iwamatsu iwamatsu at {nigauri.org / debian.org} GPG ID: 40AD1FA6
|
|