[Git][security-tracker-team/security-tracker][master] Pre-merge already linux changes for upcoming point releases

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Mar 26 08:59:57 GMT 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ba1ccccc by Salvatore Bonaccorso at 2022-03-26T09:59:23+01:00
Pre-merge already linux changes for upcoming point releases

- - - - -


3 changed files:

- data/CVE/list
- data/next-oldstable-point-update.txt
- data/next-point-update.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -1624,6 +1624,7 @@ CVE-2022-1012
 	RESERVED
 CVE-2022-1011 (A flaw use after free in the Linux kernel FUSE filesystem was found in ...)
 	- linux <unfixed>
+	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/0c4bcfdecb1ac0967619ee7ff44871d93c08c909 (5.17-rc8)
 CVE-2022-1010
 	RESERVED
@@ -1678,6 +1679,7 @@ CVE-2022-0996 (A vulnerability was found in the 389 Directory Server that allows
 	TODO: check details
 CVE-2022-0995 (An out-of-bounds (OOB) memory write flaw was found in the Linux kernel ...)
 	- linux <unfixed>
+	[bullseye] - linux 5.10.106-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	[stretch] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2063786
@@ -7913,6 +7915,8 @@ CVE-2022-24959 (An issue was discovered in the Linux kernel before 5.16.5. There
 	NOTE: https://git.kernel.org/linus/29eb31542787e1019208a2e1047bb7c76c069536 (5.17-rc2)
 CVE-2022-24958 (drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 m ...)
 	- linux 5.16.14-1
+	[bullseye] - linux 5.10.106-1
+	[buster] - linux 4.19.235-1
 	NOTE: Fixed by: https://git.kernel.org/linus/89f3594d0de58e8a57d92d497dea9fee3d4b9cda (5.17-rc1)
 	NOTE: Fixed by: https://git.kernel.org/linus/501e38a5531efbd77d5c73c0ba838a889bfc1d74 (5.17-rc1)
 CVE-2022-24957
@@ -11105,6 +11109,8 @@ CVE-2022-23961
 	RESERVED
 CVE-2022-23960 (Certain Arm Cortex and Neoverse processors through 2022-03-08 do not p ...)
 	- linux 5.16.14-1
+	[bullseye] - linux 5.10.106-1
+	[buster] - linux 4.19.235-1
 	NOTE: https://www.vusec.net/projects/bhi-spectre-bhb/
 	NOTE: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/spectre-bhb
 	NOTE: https://xenbits.xen.org/xsa/advisory-398.html
@@ -14474,24 +14480,37 @@ CVE-2022-23043 (Zenario CMS 9.2 allows an authenticated admin user to bypass the
 	NOT-FOR-US: Zenario CMS
 CVE-2022-23042 (Linux PV device frontends vulnerable to attacks by backends T[his CNA  ...)
 	- linux 5.16.14-1
+	[bullseye] - linux 5.10.106-1
+	[buster] - linux 4.19.235-1
 	NOTE: https://xenbits.xen.org/xsa/advisory-396.html
 CVE-2022-23041 (Linux PV device frontends vulnerable to attacks by backends T[his CNA  ...)
 	- linux 5.16.14-1
+	[bullseye] - linux 5.10.106-1
+	[buster] - linux 4.19.235-1
 	NOTE: https://xenbits.xen.org/xsa/advisory-396.html
 CVE-2022-23040 (Linux PV device frontends vulnerable to attacks by backends T[his CNA  ...)
 	- linux 5.16.14-1
+	[bullseye] - linux 5.10.106-1
+	[buster] - linux 4.19.235-1
 	NOTE: https://xenbits.xen.org/xsa/advisory-396.html
 CVE-2022-23039 (Linux PV device frontends vulnerable to attacks by backends T[his CNA  ...)
 	- linux 5.16.14-1
+	[bullseye] - linux 5.10.106-1
+	[buster] - linux 4.19.235-1
 	NOTE: https://xenbits.xen.org/xsa/advisory-396.html
 CVE-2022-23038 (Linux PV device frontends vulnerable to attacks by backends T[his CNA  ...)
 	- linux 5.16.14-1
+	[bullseye] - linux 5.10.106-1
 	NOTE: https://xenbits.xen.org/xsa/advisory-396.html
 CVE-2022-23037 (Linux PV device frontends vulnerable to attacks by backends T[his CNA  ...)
 	- linux 5.16.14-1
+	[bullseye] - linux 5.10.106-1
+	[buster] - linux 4.19.235-1
 	NOTE: https://xenbits.xen.org/xsa/advisory-396.html
 CVE-2022-23036 (Linux PV device frontends vulnerable to attacks by backends T[his CNA  ...)
 	- linux 5.16.14-1
+	[bullseye] - linux 5.10.106-1
+	[buster] - linux 4.19.235-1
 	NOTE: https://xenbits.xen.org/xsa/advisory-396.html
 CVE-2022-23035 (Insufficient cleanup of passed-through device IRQs The management of I ...)
 	- xen 4.16.0+51-g0941d6cb-1
@@ -19440,6 +19459,7 @@ CVE-2021-4150 (A use-after-free flaw was found in the add_partition in block/par
 	NOTE: https://git.kernel.org/linus/9fbfabfda25d8774c5a08634fdd2da000a924890 (5.15-rc7)
 CVE-2021-4149 (A vulnerability was found in btrfs_alloc_tree_b in fs/btrfs/extent-tre ...)
 	- linux 5.14.16-1
+	[buster] - linux 4.19.235-1
 	NOTE: https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)
 CVE-2021-4148 (A vulnerability was found in the Linux kernel's block_invalidatepage i ...)
 	- linux 5.14.16-1


=====================================
data/next-oldstable-point-update.txt
=====================================
@@ -216,24 +216,6 @@ CVE-2021-40985
 	[buster] - htmldoc 1.9.3-1+deb10u3
 CVE-2022-23308
 	[buster] - libxml2 2.9.4+dfsg1-7+deb10u3
-CVE-2021-4149
-	[buster] - linux 4.19.235-1
-CVE-2022-23036
-	[buster] - linux 4.19.235-1
-CVE-2022-23037
-	[buster] - linux 4.19.235-1
-CVE-2022-23039
-	[buster] - linux 4.19.235-1
-CVE-2022-23040
-	[buster] - linux 4.19.235-1
-CVE-2022-23041
-	[buster] - linux 4.19.235-1
-CVE-2022-23042
-	[buster] - linux 4.19.235-1
-CVE-2022-23960
-	[buster] - linux 4.19.235-1
-CVE-2022-24958
-	[buster] - linux 4.19.235-1
 CVE-2020-10001
 	[buster] - cups 2.2.10-6+deb10u5
 CVE-2021-46709


=====================================
data/next-point-update.txt
=====================================
@@ -134,28 +134,6 @@ CVE-2022-25640
 	[bullseye] - wolfssl 4.6.0+p1-0+deb11u1
 CVE-2022-23308
 	[bullseye] - libxml2 2.9.10+dfsg-6.7+deb11u1
-CVE-2022-0995
-	[bullseye] - linux 5.10.106-1
-CVE-2022-1011
-	[bullseye] - linux 5.10.106-1
-CVE-2022-23036
-	[bullseye] - linux 5.10.106-1
-CVE-2022-23037
-	[bullseye] - linux 5.10.106-1
-CVE-2022-23038
-	[bullseye] - linux 5.10.106-1
-CVE-2022-23039
-	[bullseye] - linux 5.10.106-1
-CVE-2022-23040
-	[bullseye] - linux 5.10.106-1
-CVE-2022-23041
-	[bullseye] - linux 5.10.106-1
-CVE-2022-23042
-	[bullseye] - linux 5.10.106-1
-CVE-2022-23960
-	[bullseye] - linux 5.10.106-1
-CVE-2022-24958
-	[bullseye] - linux 5.10.106-1
 CVE-2021-0561
 	[bullseye] - flac 1.3.3-2+deb11u1
 CVE-2021-45005



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ba1cccccc6ede50e6175c6777370b9e974600829

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ba1cccccc6ede50e6175c6777370b9e974600829
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220326/ba8cb448/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list