[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Dec 24 20:07:38 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
a378b9cf by Salvatore Bonaccorso at 2025-12-24T21:07:11+01:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,316 @@
+CVE-2023-54042 [powerpc/64s: Fix VAS mm use after free]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b4bda59b47879cce38a6ec5a01cd3cac702b5331 (6.5-rc1)
+CVE-2023-54041 [io_uring: fix memory leak when removing provided buffers]
+	- linux 6.1.25-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b4a72c0589fdea6259720375426179888969d6a2 (6.3-rc6)
+CVE-2023-54040 [ice: fix wrong fallback logic for FDIR]
+	- linux 6.1.25-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b4a01ace20f5c93c724abffc0a83ec84f514b98d (6.3-rc6)
+CVE-2023-54039 [can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access]
+	- linux 6.1.25-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/b45193cb4df556fe6251b285a5ce44046dd36b4a (6.3-rc6)
+CVE-2023-54038 [Bluetooth: hci_conn: return ERR_PTR instead of NULL when there is no link]
+	- linux 6.4.11-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b4066eb04bb67e7ff66e5aaab0db4a753f37eaad (6.5-rc3)
+CVE-2023-54037 [ice: prevent NULL pointer deref during reload]
+	- linux 6.4.11-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b3e7b3a6ee92ab927f750a6b19615ce88ece808f (6.5-rc3)
+CVE-2023-54036 [wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/b39f662ce1648db0b9de32e6a849b098480793cb (6.3-rc1)
+CVE-2023-54035 [netfilter: nf_tables: fix underflow in chain reference counter]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/b389139f12f287b8ed2e2628b72df89a081f0b59 (6.5-rc1)
+CVE-2023-54034 [iommufd: Make sure to zero vfio_iommu_type1_info before copying to user]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b3551ead616318ea155558cdbe7e91495b8d9b33 (6.3-rc1)
+CVE-2023-54033 [bpf: fix a memory leak in the LRU and LRU_PERCPU hash maps]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b34ffb0c6d23583830f9327864b9c1f486003305 (6.4-rc4)
+CVE-2023-54032 [btrfs: fix race when deleting quota root from the dirty cow roots list]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/b31cb5a6eb7a48b0a7bfdf06832b1fd5088d8c79 (6.5-rc1)
+CVE-2023-54031 [vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check]
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b3003e1b54e057f5f3124e437b80c3bef26ed3fe (6.5-rc7)
+CVE-2023-54030 [io_uring/net: don't overflow multishot recv]
+	- linux 6.5.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b2e74db55dd93d6db22a813c9a775b5dbf87c560 (6.6-rc1)
+CVE-2023-54029 [wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	NOTE: https://git.kernel.org/linus/b2bc600cced23762d4e97db8989b18772145604f (6.4-rc1)
+CVE-2023-54028 [RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	NOTE: https://git.kernel.org/linus/b2b1ddc457458fecd1c6f385baa9fbda5f0c63ad (6.4-rc1)
+CVE-2023-54027 [iio: core: Prevent invalid memory access when there is no parent]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b2a69969908fcaf68596dfc04369af0fe2e1d2f7 (6.5-rc6)
+CVE-2023-54026 [opp: Fix use-after-free in lazy_opp_tables after probe deferral]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b2a2ab039bd58f51355e33d7d3fc64605d7f870d (6.5-rc1)
+CVE-2023-54025 [wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/b241e260820b68c09586e8a0ae0fc23c0e3215bd (6.5-rc1)
+CVE-2023-54024 [KVM: Destroy target device if coalesced MMIO unregistration fails]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/b1cb1fac22abf102ffeb29dd3eeca208a3869d54 (6.3-rc1)
+CVE-2023-54023 [btrfs: fix race between balance and cancel/pause]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/b19c98f237cd76981aaded52c258ce93f7daa8cb (6.5-rc3)
+CVE-2023-54022 [ALSA: usb-audio: Fix potential memory leaks at error path for UMP open]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b1757fa30ef14f254f4719bf6f7d54a4c8207216 (6.6-rc1)
+CVE-2023-54021 [ext4: set goal start correctly in ext4_mb_normalize_request]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/b07ffe6927c75d99af534d685282ea188d9f71a6 (6.4-rc1)
+CVE-2023-54020 [dmaengine: sf-pdma: pdma_desc memory leak fix]
+	- linux 6.1.20-1
+	NOTE: https://git.kernel.org/linus/b02e07015a5ac7bbc029da931ae17914b8ae0339 (6.3-rc1)
+CVE-2023-54019 [sched/psi: use kernfs polling functions for PSI trigger polling]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/aff037078ecaecf34a7c2afab1341815f90fba5e (6.5-rc2)
+CVE-2023-54018 [drm/msm/hdmi: Add missing check for alloc_ordered_workqueue]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/afe4cb96153a0d8003e4e4ebd91b5c543e10df84 (6.3-rc1)
+CVE-2023-54017 [powerpc/pseries: fix possible memory leak in ibmebus_bus_init()]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/afda85b963c12947e298ad85d757e333aa40fd74 (6.6-rc1)
+CVE-2023-54016 [wifi: ath12k: Fix memory leak in rx_desc and tx_desc]
+	- linux 6.5.6-1
+	NOTE: https://git.kernel.org/linus/afb522b36e76acaa9f8fc06d0a9742d841c47c16 (6.6-rc1)
+CVE-2023-54015 [net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/af87194352cad882d787d06fb7efa714acd95427 (6.4-rc4)
+CVE-2023-54014 [scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport()]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/af73f23a27206ffb3c477cac75b5fcf03410556e (6.5-rc1)
+CVE-2023-54013 [interconnect: Fix locking for runpm vs reclaim]
+	- linux 6.5.6-1
+	NOTE: https://git.kernel.org/linus/af42269c3523492d71ebbe11fefae2653e9cdc78 (6.6-rc1)
+CVE-2023-54012 [net: fix stack overflow when LRO is disabled for virtual interfaces]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/ae9b15fbe63447bc1d3bba3769f409d17ca6fdf6 (6.4-rc4)
+CVE-2023-54011 [scsi: mpi3mr: Fix an issue found by KASAN]
+	- linux 6.1.20-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ae7d45f5283d30274039b95d3e6d53d33c66e991 (6.3-rc1)
+CVE-2023-54010 [ACPICA: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/ae5a0eccc85fc960834dd66e3befc2728284b86c (6.4-rc1)
+CVE-2023-54009 [i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/ae1664f04f504a998737f5bb563f16b44357bcca (6.4-rc1)
+CVE-2023-54008 [virtio_vdpa: build affinity masks conditionally]
+	- linux 6.5.3-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ae15aceaa98ad9499763923f7890e345d9f46b60 (6.6-rc1)
+CVE-2023-54007 [vmci_host: fix a race condition in vmci_host_poll() causing GPF]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/ae13381da5ff0e8e084c0323c3cc0a945e43e9c7 (6.4-rc1)
+CVE-2023-54006 [af_unix: Fix data-race around unix_tot_inflight.]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/ade32bd8a738d7497ffe9743c46728db26740f78 (6.6-rc1)
+CVE-2023-54005 [binder: fix memory leak in binder_init()]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/adb9743d6a08778b78d62d16b4230346d3508986 (6.5-rc6)
+CVE-2023-54004 [udplite: Fix NULL pointer dereference in __sk_mem_raise_allocated().]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/ad42a35bdfc6d3c0fc4cb4027d7b2757ce665665 (6.4-rc4)
+CVE-2023-54003 [RDMA/core: Fix GID entry ref leak when create_ah fails]
+	- linux 6.1.25-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/aca3b0fa3d04b40c96934d86cc224cccfa7ea8e0 (6.3-rc7)
+CVE-2023-54002 [btrfs: fix assertion of exclop condition when starting balance]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	NOTE: https://git.kernel.org/linus/ac868bc9d136cde6e3eb5de77019a63d57a540ff (6.4-rc2)
+CVE-2023-54001 [staging: r8712: Fix memory leak in _r8712_init_xmit_priv()]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/ac83631230f77dda94154ed0ebfd368fc81c70a3 (6.5-rc4)
+CVE-2023-54000 [net: hns3: fix deadlock issue when externel_lb and reset are executed together]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ac6257a3ae5db5193b1f19c268e4f72d274ddb88 (6.5-rc6)
+CVE-2023-53999 [net/mlx5e: TC, Fix internal port memory leak]
+	- linux 6.4.11-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ac5da544a3c2047cbfd715acd9cec8380d7fe5c6 (6.5-rc6)
+CVE-2023-53998 [hwrng: virtio - Fix race on data_avail and actual data]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/ac52578d6e8d300dd50f790f29a24169b1edd26c (6.5-rc1)
+CVE-2023-53997 [thermal: of: fix double-free on unregistration]
+	- linux 6.4.11-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ac4436a5b20e0ef1f608a9ef46c08d5d142f8da6 (6.5-rc4)
+CVE-2023-53996 [x86/sev: Make enc_dec_hypercall() accept a size instead of npages]
+	- linux 6.5.3-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ac3f9c9f1b37edaa7d1a9b908bc79d843955a1a2 (6.6-rc1)
+CVE-2023-53995 [net: ipv4: fix one memleak in __inet_del_ifa()]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/ac28b1ec6135649b5d78b028e47264cb3ebca5ea (6.6-rc2)
+CVE-2023-53994 [ionic: remove WARN_ON to prevent panic_on_warn]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/abfb2a58a5377ebab717d4362d6180f901b6e5c1 (6.5-rc2)
+CVE-2023-53993 [PCI/DOE: Fix memory leak with CONFIG_DEBUG_OBJECTS=y]
+	- linux 6.1.25-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/abf04be0e7071f2bcd39bf97ba407e7d4439785e (6.3-rc6)
+CVE-2023-53992 [wifi: cfg80211: ocb: don't leave if not joined]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	NOTE: https://git.kernel.org/linus/abc76cf552e13cfa88a204b362a86b0e08e95228 (6.6-rc1)
+CVE-2023-53991 [drm/msm/dpu: Disallow unallocated resources to be returned]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/abc40122d9a69f56c04efb5a7485795f5ac799d1 (6.3-rc1)
+CVE-2023-53990 [SMB3: Add missing locks to protect deferred close file list]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ab9ddc87a9055c4bebd6524d5d761d605d52e557 (6.4-rc1)
+CVE-2023-53989 [arm64: mm: fix VA-range sanity check]
+	- linux 6.4.11-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/ab9b4008092c86dc12497af155a0901cc1156999 (6.5-rc1)
+CVE-2023-53988 [fs/ntfs3: Fix slab-out-of-bounds read in hdr_delete_de()]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ab84eee4c7ab929996602eda7832854c35a6dda2 (6.4-rc1)
+CVE-2023-53987 [ping: Fix potentail NULL deref for /proc/net/icmp.]
+	- linux 6.1.25-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ab5fb73ffa01072b4d8031cc05801fa1cb653bee (6.3-rc6)
+CVE-2023-53986 [mips: bmips: BCM6358: disable RAC flush for TP1]
+	- linux 6.1.25-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/ab327f8acdf8d06601fbf058859a539a9422afff (6.3-rc5)
+CVE-2023-53867 [ceph: fix potential use-after-free bug when trimming caps]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	NOTE: https://git.kernel.org/linus/aaf67de78807c59c35bafb5003d4fb457c764800 (6.4-rc1)
+CVE-2022-50711 [net: ethernet: mtk_eth_soc: fix possible memory leak in mtk_probe()]
+	- linux 6.0.6-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b3d0d98179d62f9d55635a600679c4fa362baf8d (6.1-rc2)
+CVE-2022-50710 [ice: set tx_tstamps when creating new Tx rings via ethtool]
+	- linux 6.0.3-1
+	NOTE: https://git.kernel.org/linus/b3b173745c8cab1e24d6821488b60abed3acb24d (6.1-rc1)
+CVE-2022-50709 [wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/b383e8abed41cc6ff1a3b34de75df9397fa4878c (6.1-rc1)
+CVE-2022-50708 [HSI: ssi_protocol: fix potential resource leak in ssip_pn_open()]
+	- linux 6.0.3-1
+	NOTE: https://git.kernel.org/linus/b28dbcb379e6a7f80262c2732a57681b1ee548ca (6.1-rc1)
+CVE-2022-50707 [virtio-crypto: fix memory leak in virtio_crypto_alg_skcipher_close_session()]
+	- linux 6.1.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b1d65f717cd6305a396a8738e022c6f7c65cfbe8 (6.2-rc3)
+CVE-2022-50706 [net/ieee802154: don't warn zero-sized raw_sendmsg()]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/b12e924a2f5b960373459c8f8a514f887adf5cac (6.1-rc1)
+CVE-2022-50705 [io_uring/rw: defer fsnotify calls to task context]
+	- linux 6.0.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b000145e9907809406d8164c3b2b8861d95aecd1 (6.1-rc1)
+CVE-2022-50704 [USB: gadget: Fix use-after-free during usb config switch]
+	- linux 6.1.4-1
+	NOTE: https://git.kernel.org/linus/afdc12887f2b2ecf20d065a7d81ad29824155083 (6.2-rc1)
+CVE-2022-50703 [soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe()]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/af8f6f39b8afd772fda4f8e61823ef8c021bf382 (6.1-rc1)
+CVE-2022-50702 [vdpa_sim: fix possible memory leak in vdpasim_net_init() and vdpasim_blk_init()]
+	- linux 6.1.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/aeca7ff254843d49a8739f07f7dab1341450111d (6.2-rc3)
+CVE-2022-50701 [wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host]
+	- linux 6.1.20-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/aec4cf2ea0797e28f18f8dbe01943a56d987fe56 (6.3-rc1)
+CVE-2022-50700 [wifi: ath10k: Delay the unmapping of the buffer]
+	- linux 6.1.4-1
+	NOTE: https://git.kernel.org/linus/acd4324e5f1f11351630234297f95076f0ac9a2f (6.2-rc1)
+CVE-2022-50699 [selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context()]
+	- linux 6.0.6-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/abe3c631447dcd1ba7af972fe6f054bee6f136fa (6.1-rc2)
+CVE-2022-50698 [ASoC: da7219: Fix an error handling path in da7219_register_dai_clks()]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/abb4e4349afe7eecdb0499582f1c777031e3a7c8 (6.1-rc1)
+CVE-2022-50697 [mrp: introduce active flags to prevent UAF when applicant uninit]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/ab0377803dafc58f1e22296708c1c28e309414d6 (6.2-rc1)
 CVE-2025-68344 [ALSA: wavefront: Fix integer overflow in sample size validation]
 	- linux 6.17.13-1
 	NOTE: https://git.kernel.org/linus/0c4a13ba88594fd4a27292853e736c6b4349823d (6.19-rc1)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a378b9cf7797df0ef1fc19eccd98c4477c6680e5

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a378b9cf7797df0ef1fc19eccd98c4477c6680e5
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251224/3e9d167b/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list