[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Mar 27 19:40:51 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
2685d82e by Salvatore Bonaccorso at 2025-03-27T20:40:07+01:00
Merge Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,392 @@
+CVE-2023-53033 [netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits]
+ - linux 6.1.7-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/696e1a48b1a1b01edad542a1ef293665864a4dd0 (6.2-rc5)
+CVE-2023-53032 [netfilter: ipset: Fix overflow before widen in the bitmap_ip_create() function.]
+ - linux 6.1.7-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/9ea4b476cea1b7d461d16dda25ca3c7e616e2d15 (6.2-rc5)
+CVE-2023-53031 [powerpc/imc-pmu: Fix use of mutex in IRQs disabled section]
+ - linux 6.1.7-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/76d588dddc459fefa1da96e0a081a397c5c8e216 (6.2-rc4)
+CVE-2023-53030 [octeontx2-pf: Avoid use of GFP_KERNEL in atomic context]
+ - linux 6.1.8-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/87b93b678e95c7d93fe6a55b0e0fbda26d8c7760 (6.2-rc5)
+CVE-2023-53029 [octeontx2-pf: Fix the use of GFP_KERNEL in atomic context on rt]
+ - linux 6.1.8-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/55ba18dc62deff5910c0fa64486dea1ff20832ff (6.2-rc5)
+CVE-2023-53028 [Revert "wifi: mac80211: fix memory leak in ieee80211_if_add()"]
+ - linux 6.1.8-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/80f8a66dede0a4b4e9e846765a97809c6fe49ce5 (6.2-rc5)
+CVE-2023-53027 [erofs: fix kvcalloc() misuse with __GFP_NOFAIL]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/12724ba38992bd045e92a9a88a868a530f89d13e (6.2-rc5)
+CVE-2023-53026 [RDMA/core: Fix ib block iterator counter overflow]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/0afec5e9cea732cb47014655685a2a47fb180c31 (6.2-rc5)
+CVE-2023-53025 [NFSD: fix use-after-free in nfsd4_ssc_setup_dul()]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/e6cf91b7b47ff82b624bdfe2fdcde32bb52e71dd (6.2-rc5)
+CVE-2023-53024 [bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/e4f4db47794c9f474b184ee1418f42e6a07412b6 (6.2-rc5)
+CVE-2023-53023 [net: nfc: Fix use-after-free in local_cleanup()]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/4bb4db7f3187c6e3de6b229ffc87cdb30a2d22b6 (6.2-rc5)
+CVE-2023-53022 [net: enetc: avoid deadlock in enetc_tx_onestep_tstamp()]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/3c463721a73bdb57a913e0d3124677a3758886fc (6.2-rc5)
+CVE-2023-53021 [net/sched: sch_taprio: fix possible use-after-free]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/3a415d59c1dbec9d772dbfab2d2520d98360caae (6.2-rc5)
+CVE-2023-53020 [l2tp: close all race conditions in l2tp_tunnel_register()]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/0b2c59720e65885a394a017d0cf9cab118914682 (6.2-rc5)
+CVE-2023-53019 [net: mdio: validate parameter addr in mdiobus_get_phy()]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/867dbe784c5010a466f00a7d1467c1c5ea569c75 (6.2-rc5)
+CVE-2023-53018 [Bluetooth: hci_conn: Fix memory leaks]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/3aa21311f36d8a2730c7ccef37235e951f23927b (6.2-rc5)
+CVE-2023-53017 [Bluetooth: hci_sync: fix memory leak in hci_update_adv_data()]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/1ed8b37cbaf14574c779064ef1372af62e8ba6aa (6.2-rc5)
+CVE-2023-53016 [Bluetooth: Fix possible deadlock in rfcomm_sk_state_change]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/1d80d57ffcb55488f0ec0b77928d4f82d16b6a90 (6.2-rc5)
+CVE-2023-53015 [HID: betop: check shape of output reports]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/3782c0d6edf658b71354a64d60aa7a296188fc90 (6.2-rc5)
+CVE-2023-53014 [dmaengine: tegra: Fix memory leak in terminate_all()]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a7a7ee6f5a019ad72852c001abbce50d35e992f2 (6.2-rc5)
+CVE-2023-53013 [ptdma: pt_core_execute_cmd() should use spinlock]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/95e5fda3b5f9ed8239b145da3fa01e641cf5d53c (6.2-rc5)
+CVE-2023-53012 [thermal: core: call put_device() only after device_register() fails]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/6c54b7bc8a31ce0f7cc7f8deef05067df414f1d8 (6.2-rc5)
+CVE-2023-53011 [net: stmmac: enable all safety features by default]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/fdfc76a116b5e9d3e98e6c96fe83b42d011d21d4 (6.2-rc5)
+CVE-2023-53010 [bnxt: Do not read past the end of test names]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/d3e599c090fc6977331150c5f0a69ab8ce87da21 (6.2-rc5)
+CVE-2023-53009 [drm/amdkfd: Add sync after creating vram bo]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/ba029e9991d9be90a28b6a0ceb25e9a6fb348829 (6.2-rc4)
+CVE-2023-53008 [cifs: fix potential memory leaks in session setup]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/2fe58d977ee05da5bb89ef5dc4f5bf2dc15db46f (6.2-rc4)
+CVE-2023-53007 [tracing: Make sure trace_printk() can output as soon as it can be used]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/3bb06eb6e9acf7c4a3e1b5bc87aed398ff8e2253 (6.2-rc6)
+CVE-2023-53006 [cifs: Fix oops due to uncleared server->smbd_conn in reconnect]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/b7ab9161cf5ddc42a288edf9d1a61f3bdffe17c7 (6.2-rc6)
+CVE-2023-53005 [trace_events_hist: add check for return value of 'create_hist_field']
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/8b152e9150d07a885f95e1fd401fc81af202d9a4 (6.2-rc6)
+CVE-2023-53004 [ovl: fix tmpfile leak]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/baabaa505563362b71f2637aedd7b807d270656c (6.2-rc6)
+CVE-2023-53003 [EDAC/qcom: Do not pass llcc_driv_data as edac_device_ctl_info's pvt_info]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/977c6ba624f24ae20cf0faee871257a39348d4a9 (6.2-rc6)
+CVE-2023-53002 [drm/i915: Fix a memory leak with reused mmap_offset]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/0220e4fe178c3390eb0291cdb34912d66972db8a (6.2-rc6)
+CVE-2023-53001 [drm/drm_vma_manager: Add drm_vma_node_allow_once()]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/899d3a3c19ac0e5da013ce34833dccb97d19b5e4 (6.2-rc6)
+CVE-2023-53000 [netlink: prevent potential spectre v1 gadgets]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/f0950402e8c76e7dcb08563f1b4e8000fbc62455 (6.2-rc6)
+CVE-2023-52999 [net: fix UaF in netns ops registration error path]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/71ab9c3e2253619136c31c89dbb2c69305cc89b1 (6.2-rc6)
+CVE-2023-52998 [net: fec: Use page_pool_put_full_page when freeing rx buffers]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/e38553bdc377e3e7a6caa9dd9770d8b644d8dac3 (6.2-rc6)
+CVE-2023-52997 [ipv4: prevent potential spectre v1 gadget in ip_metrics_convert()]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/1d1d63b612801b3f0a39b7d4467cad0abd60e5c8 (6.2-rc6)
+CVE-2023-52996 [ipv4: prevent potential spectre v1 gadget in fib_metrics_match()]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/5e9398a26a92fc402d82ce1f97cc67d832527da0 (6.2-rc6)
+CVE-2023-52995 [riscv/kprobe: Fix instruction simulation of JALR]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/ca0254998be4d74cf6add70ccfab0d2dbd362a10 (6.2-rc6)
+CVE-2023-52994 [acpi: Fix suspend with Xen PV]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/fe0ba8c23f9a35b0307eb662f16dd3a75fcdae41 (6.2-rc6)
+CVE-2023-52993 [x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/5fa55950729d0762a787451dc52862c3f850f859 (6.2-rc6)
+CVE-2023-52992 [bpf: Skip task with pid=1 in send_signal_common()]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/a3d81bc1eaef48e34dd0b9b48eefed9e02a06451 (6.2-rc5)
+CVE-2023-52991 [net: fix NULL pointer in skb_segment_list]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/876e8ca8366735a604bac86ff7e2732fc9d85d2d (6.2-rc7)
+CVE-2023-52990 [s390: workaround invalid gcc-11 out of bounds read warning]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/41e1992665a2701fa025a8b76970c43b4148446f (6.2-rc5)
+CVE-2023-52989 [firewire: fix memory leak for payload of request subaction to IEC 61883-1 FCP region]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/531390a243ef47448f8bad01c186c2787666bf4d (6.2-rc7)
+CVE-2023-52988 [ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path()]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/b9cee506da2b7920b5ea02ccd8e78a907d0ee7aa (6.2-rc7)
+CVE-2023-52987 [ASoC: SOF: ipc4-mtrace: prevent underflow in sof_ipc4_priority_mask_dfs_write()]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/ea57680af47587397f5005d7758022441ed66d54 (6.2-rc7)
+CVE-2023-52986 [bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/ddce1e091757d0259107c6c0c7262df201de2b66 (6.2-rc7)
+CVE-2023-52985 [arm64: dts: imx8mm-verdin: Do not power down eth-phy]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/39c95d0c357d7ef76aea958c1bece6b24f9b2e7e (6.2-rc7)
+CVE-2023-52984 [net: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/422ae7d9c7221e8d4c8526d0f54106307d69d2dc (6.2-rc7)
+CVE-2023-52983 [block, bfq: fix uaf for bfqq in bic_set_bfqq()]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/b600de2d7d3a16f9007fad1bdae82a3951a26af2 (6.2-rc7)
+CVE-2023-52982 [fscache: Use wait_on_bit() to wait for the freeing of relinquished volume]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/8226e37d82f43657da34dd770e2b38f20242ada7 (6.2-rc7)
+CVE-2023-52981 [drm/i915: Fix request ref counting during error capture Description: debugfs dump]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/86d8ddc74124c3fdfc139f246ba6da15e45e86e3 (6.2-rc7)
+CVE-2023-52980 [block: ublk: extending queue_size to fix overflow]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/29baef789c838bd5c02f50c88adbbc6b955aaf61 (6.2-rc7)
+CVE-2023-52979 [squashfs: harden sanity check in squashfs_read_xattr_id_table]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/72e544b1b28325fe78a4687b980871a7e4101f76 (6.2-rc7)
+CVE-2023-52978 [riscv: kprobe: Fixup kernel panic when probing an illegal position]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/87f48c7ccc73afc78630530d9af51f458f58cab8 (6.2-rc7)
+CVE-2023-52977 [net: openvswitch: fix flow memory leak in ovs_flow_cmd_new]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/0c598aed445eb45b0ee7ba405f7ece99ee349c30 (6.2-rc7)
+CVE-2023-52976 [efi: fix potential NULL deref in efi_mem_reserve_persistent]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/966d47e1f27c45507c5df82b2a2157e5a4fd3909 (6.2-rc7)
+CVE-2023-52975 [scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/6f1d64b13097e85abda0f91b5638000afc5f9a06 (6.2-rc6)
+CVE-2023-52974 [scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3 (6.2-rc6)
+CVE-2023-52973 [vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/226fae124b2dac217ea5436060d623ff3385bc34 (6.2-rc7)
+CVE-2023-52942 [cgroup/cpuset: Fix wrong check in update_parent_subparts_cpumask()]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/e5ae8803847b80fe9d744a3174abe2b7bfed222a (6.2-rc7)
+CVE-2023-52941 [can: isotp: split tx timer into transmission and timeout]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/4f027cba8216f42a18b544842efab134f8b1f9f4 (6.2-rc7)
+CVE-2023-52940 [mm: multi-gen LRU: fix crash during cgroup migration]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/de08eaa6156405f2e9369f06ba5afae0e4ab3b62 (6.2-rc7)
+CVE-2023-52939 [mm: memcg: fix NULL pointer in mem_cgroup_track_foreign_dirty_slowpath()]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/ac86f547ca1002aec2ef66b9e64d03f45bbbfbb9 (6.2-rc7)
+CVE-2023-52938 [usb: typec: ucsi: Don't attempt to resume the ports before they exist]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/f82060da749c611ed427523b6d1605d87338aac1 (6.2-rc7)
+CVE-2023-52937 [HV: hv_balloon: fix memory leak with using debugfs_lookup()]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/6dfb0771429a63db8561d44147f2bb76f93e1c86 (6.2-rc7)
+CVE-2023-52936 [kernel/irq/irqdomain.c: fix memory leak with using debugfs_lookup()]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/d83d7ed260283560700d4034a80baad46620481b (6.2-rc7)
+CVE-2023-52935 [mm/khugepaged: fix ->anon_vma race]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/023f47a8250c6bdb4aebe744db4bf7f73414028b (6.2-rc7)
+CVE-2023-52934 [mm/MADV_COLLAPSE: catch !none !huge !bad pmd lookups]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/edb5d0cf5525357652aff6eacd9850b8ced07143 (6.2-rc7)
+CVE-2023-52933 [Squashfs: fix handling and sanity checking of xattr_ids count]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/f65c4bbbd682b0877b669828b4e033b8d5d0a2dc (6.2-rc7)
+CVE-2023-52932 [mm/swapfile: add cond_resched() in get_swap_pages()]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/7717fc1a12f88701573f9ed897cc4f6699c661e3 (6.2-rc7)
+CVE-2023-52931 [drm/i915: Avoid potential vm use-after-free]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/41d419382ec7e257e54b7b6ff0d3623aafb1316d (6.2-rc7)
+CVE-2023-52930 [drm/i915: Fix potential bit_17 double-free]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/7057a8f126f14f14b040faecfa220fd27c6c2f85 (6.2-rc7)
+CVE-2023-52929 [nvmem: core: fix cleanup after dev_set_name()]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/560181d3ace61825f4ca9dd3481d6c0ee6709fa8 (6.2-rc7)
+CVE-2023-52928 [bpf: Skip invalid kfunc call in backtrack_insn]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/d3178e8a434b58678d99257c0387810a24042fb6 (6.2-rc5)
+CVE-2022-49761 [btrfs: always report error in run_one_delayed_ref()]
+ - linux 6.1.8-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/39f501d68ec1ed5cd5c66ac6ec2a7131c517bb92 (6.2-rc3)
+CVE-2022-49760 [mm/hugetlb: fix PTE marker handling in hugetlb_change_protection()]
+ - linux 6.1.8-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0e678153f5be7e6c8d28835f5a678618da4b7a9c (6.2-rc5)
+CVE-2022-49759 [VMCI: Use threaded irqs instead of tasklets]
+ - linux 6.1.8-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/3daed6345d5880464f46adab871d208e1baa2f3a (6.2-rc5)
+CVE-2022-49758 [reset: uniphier-glue: Fix possible null-ptr-deref]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/3a2390c6777e3f6662980c6cfc25cafe9e4fef98 (6.2-rc5)
+CVE-2022-49757 [EDAC/highbank: Fix memory leak in highbank_mc_probe()]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/e7a293658c20a7945014570e1921bf7d25d68a36 (6.2-rc4)
+CVE-2022-49756 [phy: usb: sunplus: Fix potential null-ptr-deref in sp_usb_phy_probe()]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/17eee264ef386ef30a69dd70e36f29893b85c170 (6.2-rc5)
+CVE-2022-49755 [usb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/6a19da111057f69214b97c62fb0ac59023970850 (6.2-rc5)
+CVE-2022-49754 [Bluetooth: Fix a buffer overflow in mgmt_mesh_add()]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/2185e0fdbb2137f22a9dd9fcbf6481400d56299b (6.2-rc5)
+CVE-2022-49753 [dmaengine: Fix double increment of client_count in dma_chan_get()]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/f3dc1b3b4750851a94212dba249703dd0e50bb20 (6.2-rc5)
+CVE-2022-49752 [device property: fix of node refcount leak in fwnode_graph_get_next_endpoint()]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/39af728649b05e88a2b40e714feeee6451c3f18e (6.2-rc5)
+CVE-2022-49751 [w1: fix WARNING after calling w1_process()]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/36225a7c72e9e3e1ce4001b6ce72849f5c9a2d3b (6.2-rc5)
+CVE-2022-49750 [cpufreq: CPPC: Add u64 casts to avoid overflowing]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/f5f94b9c8b805d87ff185caf9779c3a4d07819e3 (6.2-rc4)
+CVE-2022-49749 [i2c: designware: use casting of u64 in clock multiplication to avoid overflow]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/c8c37bc514514999e62a17e95160ed9ebf75ca8d (6.2-rc6)
+CVE-2022-49748 [perf/x86/amd: fix potential integer overflow on shift of a int]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/08245672cdc6505550d1a5020603b0a8d4a6dcc7 (6.2-rc2)
+CVE-2022-49747 [erofs/zmap.c: Fix incorrect offset calculation]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/6acd87d50998ef0afafc441613aeaf5a8f5c9eff (6.2-rc5)
+CVE-2022-49746 [dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/1417f59ac0b02130ee56c0c50794b9b257be3d17 (6.2-rc5)
+CVE-2022-49745 [fpga: m10bmc-sec: Fix probe rollback]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/60ce26d10e5850f33cc76fce52f5377045e75a15 (6.2-rc7)
+CVE-2022-49744 [mm/uffd: fix pte marker when fork() without fork event]
+ - linux 6.1.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/49d6d7fb631345b0f2957a7c4be24ad63903150f (6.2-rc7)
+CVE-2022-49743 [ovl: Use "buf" flexible array for memcpy() destination]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/cf8aa9bf97cadf85745506c6a3e244b22c268d63 (6.2-rc1)
+CVE-2022-49742 [f2fs: initialize locks earlier in f2fs_fill_super()]
+ - linux 6.1.11-1
+ NOTE: https://git.kernel.org/linus/92b4cf5b48955a4bdd15fe4e2067db8ebd87f04c (6.2-rc1)
+CVE-2022-49741 [fbdev: smscufx: fix error handling code in ufx_usb_probe]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/b76449ee75e21acfe9fa4c653d8598f191ed7d68 (6.2-rc1)
+CVE-2022-49740 [wifi: brcmfmac: Check the count value of channel spec to prevent out-of-bounds reads]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/4920ab131b2dbae7464b72bdcac465d070254209 (6.2-rc1)
+CVE-2022-49739 [gfs2: Always check inode size of inline inodes]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/70376c7ff31221f1d21db5611d8209e677781d3a (6.2-rc1)
+CVE-2022-49738 [f2fs: fix to do sanity check on i_extra_isize in is_alive()]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/d3b7b4afd6b2c344eabf9cc26b8bfa903c164c7c (6.2-rc1)
+CVE-2021-4454 [can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate]
+ - linux 6.1.11-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/d0553680f94c49bbe0e39eb50d033ba563b4212d (6.2-rc7)
CVE-2025-21892 [RDMA/mlx5: Fix the recovery flow of the UMR QP]
- linux 6.12.19-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2685d82e84276568b033d7f0b1e50e6af0e05436
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2685d82e84276568b033d7f0b1e50e6af0e05436
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250327/4417a913/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list