Skip to content

Latest commit

 

History

History
52 lines (46 loc) · 2.98 KB

security-events.md

File metadata and controls

52 lines (46 loc) · 2.98 KB

LinuxKit Security Events

The incomplete list below is an assessment of some CVEs, and LinuxKit's resilience (or not) to them.

Bugs mitigated:

  • CVE-2017-9075: Requires CONFIG_IP_SCTP=y, which we do not set.
  • CVE-2017-9076: Requires CONFIG_IP_DCCP=y, which we do not set. (However, we were vulnerable to the ipv6 pieces that this patch fixes.)
  • CVE-2017-1000363: This CVE requires CONFIG_PRINTER=y, so we are not vulnerable.
  • CVE-2017-2636 (exploit post): This CVE requires CONFIG_N_HDLC={y|m}, which LinuxKit does not specify, and so is not vulnerable.
  • CVE-2016-10229 This CVE only applies to kernels <= 4.5, <= 4.4.21. By using recent kernels (specifically, kernels => 4.9, >= 4.4.21, LinuxKit mitigates this bug.
  • CVE-2017-9605: Requires CONFIG_DRM_VMWGFX=y, which we do not set.
  • CVE-2017-1000380: Requires CONFIG_SOUND=y, which we do not set.
  • CVE-2017-7518: Requires the KVM backend (CONFIG_KVM=y), and we only have CONFIG_KVM_GUEST=y.
  • CVE-2017-10810 Requires CONFIG_DRM_VIRTIO_GPU, which we do not set.
  • CVE-2017-10911 aka XSA-216: we only have the XEN frontend, and do not set CONFIG_XEN_BLKDEV_BACKEND.

Bugs fixed:

  • CVE-2017-8890 All users can do accept(), mitigated for kernels >= 4.9.31, >= 4.10.16, >= 4.11.2 now packaged by LinuxKit
  • CVE-2017-9077 Same as CVE-2017-8890, but for ipv6.
  • CVE-2017-9074: Users have access to ipv6 sockets, mitigated for kernels >= 4.9.31, >= 4.10.16, >= 4.11.2 now packaged by LinuxKit
  • CVE-2017-9242: Same as CVE-2017-9074.
  • CVE-2017-9076: Users have access to ipv6 sockets (note that part of this is mitigated as well, so listed above: we do not set CONFIG_IP_DCCP), mitigated for kernels >= 4.9.31, >= 4.10.16, >= 4.11.2 now packaged by LinuxKit
  • CVE-2017-1000364: Qualys writeup. Fixed in kernels >= 4.9.35, >= 4.11.8, now packaged by LinuxKit.

Bugs outstanding: