Elena Reshetova
Elena Reshetova
I don't know how much effort this is worth, since I guess we can just wipe out the old db from the builders, but wanted to report it here since...
I was actually talking about very simple cases, not even these special ones. Currently I don't see a way to make cve-check-tool report me _any_ CVEs on kernel. What package...
Hm.. I haven't used it indeed. Maybe you should adverstize it with the cve-check-tool for all other users also :) I will try on Monday and see how it goes.
Still not sure what I am doing wrongly: I now supply as input "linux_kernel", but get this kind of output: linux_kernel,4.1.15,,,0
@ikeydoherty, could you please suggest what I am doing wrongly?
So, did you find the issue? Can I try with latest cve-check-tool release or where did you merge the commit fixes?
Likely related one: [hcat] udhcpc: sending discover general protection fault, probably for non-canonical address 0xf8b09de000479014: 0000 [#1] PREEMPT DEBUG_PAGEALLOC KASAN KASAN: maybe wild-memory-access in range [0xc5850f00023c80a0-0xc5850f00023c80a7] CPU: 0 PID: 23...
And another trace: [hcat] udhcpc: sending discover general protection fault, probably for non-canonical address 0xdfffff400000000e: 0000 [#1] PREEMPT DEBUG_PAGEALLOC KASAN KASAN: probably user-memory-access in range [0x00001a0000000070-0x00001a0000000077] CPU: 0 PID: 23...
And one more: [hcat] udhcpc: sending discover general protection fault, probably for non-canonical address 0xdffffc0000000014: 0000 [#1] PREEMPT DEBUG_PAGEALLOC KASAN KASAN: null-ptr-deref in range [0x00000000000000a0-0x00000000000000a7] CPU: 0 PID: 23 Comm:...
The threat model is here: https://elixir.bootlin.com/linux/latest/source/Documentation/security/snp-tdx-threat-model.rst If smth is missing in your opinion, please shout, we can add/update it. When it comes to alternatives, you are implying that a CoCo...