[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Dec 8 05:37:00 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
8d83b874 by Salvatore Bonaccorso at 2025-12-08T06:36:34+01:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,69 @@
+CVE-2022-50630 [mm: hugetlb: fix UAF in hugetlb_handle_userfault]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/958f32ce832ba781ac20e11bb2d12a9352ea28fc (6.1-rc1)
+CVE-2022-50629 [wifi: rsi: Fix memory leak in rsi_coex_attach()]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/956fb851a6e19da5ab491e19c1bc323bb2c2cf6f (6.3-rc1)
+CVE-2022-50628 [drm/gud: Fix UBSAN warning]
+	- linux 6.1.20-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/951df98024f7272f85df5044eca7374f5b5b24ef (6.3-rc1)
+CVE-2022-50627 [wifi: ath11k: fix monitor mode bringup crash]
+	- linux 6.1.20-1
+	NOTE: https://git.kernel.org/linus/950b43f8bd8a4d476d2da6d2a083a89bcd3c90d7 (6.3-rc1)
+CVE-2022-50626 [media: dvb-usb: fix memory leak in dvb_usb_adapter_init()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/94d90fb06b94a90c176270d38861bcba34ce377d (6.2-rc1)
+CVE-2022-50625 [serial: amba-pl011: avoid SBSA UART accessing DMACR register]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/94cdb9f33698478b0e7062586633c42c6158a786 (6.2-rc1)
+CVE-2022-50624 [net: netsec: fix error handling in netsec_register_mdio()]
+	- linux 6.0.7-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/94423589689124e8cd145b38a1034be7f25835b2 (6.1-rc3)
+CVE-2022-50623 [fpga: prevent integer overflow in dfl_feature_ioctl_set_irq()]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/939bc5453b8cbdde9f1e5110ce8309aedb1b501a (6.1-rc1)
+CVE-2022-50622 [ext4: fix potential memory leak in ext4_fc_record_modified_inode()]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/9305721a309fa1bd7c194e0d4a2335bf3b29dca4 (6.1-rc1)
+CVE-2022-50621 [dm: verity-loadpin: Only trust verity targets with enforcement]
+	- linux 6.0.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/916ef6232cc4b84db7082b4c3d3cf1753d9462ba (6.1-rc1)
+CVE-2022-50620 [f2fs: fix to invalidate dcc->f2fs_issue_discard in error path]
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/91586ce0d39a05f88795aa8814fb99b1387236b3 (6.2-rc1)
+CVE-2022-50619 [drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr()]
+	- linux 6.0.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/90bfee142af0f0e9d3bec80e7acd5f49b230acf7 (6.1-rc3)
+CVE-2022-50618 [mmc: meson-gx: fix return value check of mmc_add_host()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/90935f16f2650ab7416fa2ffbe5c28cb39cf3f1e (6.2-rc1)
+CVE-2022-50617 [drm/amdgpu/powerplay/psm: Fix memory leak in power state init]
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/8f8033d5663b18e6efb33feb61f2287a04605ab5 (6.2-rc1)
+CVE-2022-50616 [regulator: core: Use different devices for resource allocation and DT lookup]
+	- linux 6.1.4-1
+	NOTE: https://git.kernel.org/linus/8f3cbcd6b440032ebc7f7d48a1689dcc70a4eb98 (6.2-rc1)
+CVE-2022-50615 [perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/8ebd16c11c346751b3944d708e6c181ed4746c39 (6.2-rc1)
+CVE-2022-50614 [misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic]
+	- linux 6.0.2-1
+	[bullseye] - linux 5.10.148-1
+	NOTE: https://git.kernel.org/linus/8e30538eca016de8e252bef174beadecd64239f0 (6.1-rc1)
 CVE-2022-50583 [md/raid0, raid10: Don't set discard sectors for request queue]
 	- linux 6.1.4-1
 	NOTE: https://git.kernel.org/linus/8e1a2279ca2b0485cc379a153d02a9793f74a48f (6.2-rc1)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8d83b874bf320502bf6c5f0855222fe11d87d8e8

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8d83b874bf320502bf6c5f0855222fe11d87d8e8
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251208/83ca7094/attachment.htm>


More information about the debian-security-tracker-commits mailing list