[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Apr 10 20:53:35 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
81f80a42 by Salvatore Bonaccorso at 2024-04-10T21:52:59+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,169 @@
+CVE-2021-47219 [scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	NOTE: https://git.kernel.org/linus/f347c26836c270199de1599c3cd466bb7747caa9 (5.16-rc1)
+CVE-2021-47218 [selinux: fix NULL-pointer dereference when hashtab allocation fails]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/dc27f3c5d10c58069672215787a96b4fae01818b (5.16-rc3)
+CVE-2021-47217 [x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/daf972118c517b91f74ff1731417feb4270625a4 (5.16-rc2)
+CVE-2021-47216 [scsi: advansys: Fix kernel pointer leak]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/d4996c6eac4c81b8872043e9391563f67f13e406 (5.16-rc1)
+CVE-2021-47215 [net/mlx5e: kTLS, Fix crash in RX resync flow]
+	- linux 5.15.5-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/cc4a9cc03faa6d8db1a6954bb536f2c1e63bdff6 (5.16-rc2)
+CVE-2021-47214 [hugetlb, userfaultfd: fix reservation restore on userfaultfd error]
+	- linux 5.15.5-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/cc30042df6fcc82ea18acf0dace831503e60a0b7 (5.16-rc2)
+CVE-2021-47213 [NFSD: Fix exposure in nfsd4_decode_bitmap()]
+	- linux 5.15.5-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/c0019b7db1d7ac62c711cda6b357a659d46428fe (5.16-rc2)
+CVE-2021-47212 [net/mlx5: Update error handler for UCTX and UMEM]
+	- linux 5.15.5-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ba50cd9451f6c49cf0841c0a4a146ff6a2822699 (5.16-rc2)
+CVE-2021-47211 [ALSA: usb-audio: fix null pointer dereference on pointer cs_desc]
+	- linux 5.15.5-1
+	NOTE: https://git.kernel.org/linus/b97053df0f04747c3c1e021ecbe99db675342954 (5.16-rc1)
+CVE-2021-47210 [usb: typec: tipd: Remove WARN_ON in tps6598x_block_read]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/b7a0a63f3fed57d413bb857de164ea9c3984bc4e (5.16-rc1)
+CVE-2021-47209 [sched/fair: Prevent dead task groups from regaining cfs_rq's]
+	- linux 5.15.5-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b027789e5e50494c2325cc70c8642e7fd6059479 (5.16-rc1)
+CVE-2021-47207 [ALSA: gus: fix null pointer dereference on pointer block]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/a0d21bb3279476c777434c40d969ea88ca64f9aa (5.16-rc1)
+CVE-2021-47206 [usb: host: ohci-tmio: check return value after calling platform_get_resource()]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/9eff2b2e59fda25051ab36cd1cb5014661df657b (5.16-rc1)
+CVE-2021-47205 [clk: sunxi-ng: Unregister clocks/resets when unbinding]
+	- linux 5.15.5-1
+	NOTE: https://git.kernel.org/linus/9bec2b9c6134052994115d2d3374e96f2ccb9b9d (5.16-rc1)
+CVE-2021-47204 [net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	NOTE: https://git.kernel.org/linus/9b5a333272a48c2f8b30add7a874e46e8b26129c (5.16-rc2)
+CVE-2021-47203 [scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/99154581b05c8fb22607afb7c3d66c1bace6aa5d (5.16-rc1)
+CVE-2021-47202 [thermal: Fix NULL pointer dereferences in of_thermal_ functions]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	NOTE: https://git.kernel.org/linus/96cfe05051fd8543cdedd6807ec59a0e6c409195 (5.16-rc1)
+CVE-2021-47201 [iavf: free q_vectors before queues in iavf_disable_vf]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	NOTE: https://git.kernel.org/linus/89f22f129696ab53cfbc608e0a2184d0fea46ac1 (5.16-rc2)
+CVE-2021-47200 [drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap]
+	- linux 5.15.5-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/8244a3bc27b3efd057da154b8d7e414670d5044f (5.16-rc1)
+CVE-2021-47199 [net/mlx5e: CT, Fix multiple allocations and memleak of mod acts]
+	- linux 5.15.5-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/806401c20a0f9c51b6c8fd7035671e6ca841f6c2 (5.16-rc2)
+CVE-2021-47198 [scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine]
+	- linux 5.15.5-1
+	NOTE: https://git.kernel.org/linus/79b20beccea3a3938a8500acef4e6b9d7c66142f (5.16-rc1)
+CVE-2021-47197 [net/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove()]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/76ded29d3fcda4928da8849ffc446ea46871c1c2 (5.16-rc2)
+CVE-2021-47196 [RDMA/core: Set send and receive CQ before forwarding to the driver]
+	- linux 5.15.5-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6cd7397d01c4a3e09757840299e4f114f0aa5fa0 (5.16-rc2)
+CVE-2021-47195 [spi: fix use-after-free of the add_lock mutex]
+	- linux 5.15.5-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6c53b45c71b4920b5e62f0ea8079a1da382b9434 (5.16-rc2)
+CVE-2021-47194 [cfg80211: call cfg80211_stop_ap when switch from P2P_GO type]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/563fbefed46ae4c1f70cffb8eb54c02df480b2c2 (5.16-rc2)
+CVE-2021-47193 [scsi: pm80xx: Fix memory leak during rmmod]
+	- linux 5.15.5-1
+	NOTE: https://git.kernel.org/linus/51e6ed83bb4ade7c360551fa4ae55c4eacea354b (5.16-rc1)
+CVE-2021-47192 [scsi: core: sysfs: Fix hang when device state is set via sysfs]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/4edd8cd4e86dd3047e5294bbefcc0a08f66a430f (5.16-rc2)
+CVE-2021-47191 [scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	NOTE: https://git.kernel.org/linus/4e3ace0051e7e504b55d239daab8789dd89b863c (5.16-rc1)
+CVE-2021-47190 [perf bpf: Avoid memory leak from perf_env__insert_btf()]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f (5.16-rc1)
+CVE-2021-47189 [btrfs: fix memory ordering between normal and ordered work functions]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/45da9c1767ac31857df572f0a909fbe88fd5a7e9 (5.16-rc2)
+CVE-2021-47188 [scsi: ufs: core: Improve SCSI abort handling]
+	- linux 5.15.5-1
+	NOTE: https://git.kernel.org/linus/3ff1f6b6ba6f97f50862aa50e79959cc8ddc2566 (5.16-rc2)
+CVE-2021-47187 [arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	NOTE: https://git.kernel.org/linus/3f1dcaff642e75c1d2ad03f783fa8a3b1f56dd50 (5.16-rc1)
+CVE-2021-47186 [tipc: check for null after calling kmemdup]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	NOTE: https://git.kernel.org/linus/3e6db079751afd527bf3db32314ae938dc571916 (5.16-rc2)
+CVE-2021-47185 [tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/3968ddcf05fb4b9409cd1859feb06a5b0550a1c1 (5.16-rc1)
+CVE-2021-47184 [i40e: Fix NULL ptr dereference on VSI filter sync]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/37d9e304acd903a445df8208b8a13d707902dea6 (5.16-rc2)
+CVE-2021-47183 [scsi: lpfc: Fix link down processing to address NULL pointer dereference]
+	- linux 5.15.5-1
+	NOTE: https://git.kernel.org/linus/1854f53ccd88ad4e7568ddfafafffe71f1ceb0a6 (5.16-rc1)
+CVE-2021-47182 [scsi: core: Fix scsi_mode_sense() buffer length handling]
+	- linux 5.15.5-1
+	NOTE: https://git.kernel.org/linus/17b49bcbf8351d3dbe57204468ac34f033ed60bc (5.16-rc1)
+CVE-2021-47181 [usb: musb: tusb6010: check return value after calling platform_get_resource()]
+	- linux 5.15.5-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/14651496a3de6807a17c310f63c894ea0c5d858e (5.16-rc1)
 CVE-2024-26816 [x86, relocs: Ignore relocations in .notes section]
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/aaa8736370db1a78f0e8434344a484f9fd20be3b (6.9-rc1)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/81f80a42f741dcbc86e4ce3ebdbdd53e201df27e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/81f80a42f741dcbc86e4ce3ebdbdd53e201df27e
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240410/cae4fefa/attachment.htm>


More information about the debian-security-tracker-commits mailing list