[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu May 1 17:32:29 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
f0b76061 by Salvatore Bonaccorso at 2025-05-01T18:31:52+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,670 @@
+CVE-2022-49931 [IB/hfi1: Correctly move list in sc_disable()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/1afac08b39d85437187bb2a92d89a741b1078f55 (6.1-rc4)
+CVE-2022-49930 [RDMA/hns: Fix NULL pointer problem in free_mr_init()]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/12bcaf87d8b66d8cd812479c8a6349dcb245375c (6.1-rc4)
+CVE-2022-49929 [RDMA/rxe: Fix mr leak in RESPST_ERR_RNR]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b5f9a01fae42684648c2ee3cd9985f80c67ab9f7 (6.1-rc4)
+CVE-2022-49928 [SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/cbdeaee94a415800c65a8c3fa04d9664a8b8fb3a (6.1-rc4)
+CVE-2022-49927 [nfs4: Fix kmemleak when allocate slot failed]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/7e8436728e22181c3f12a5dbabd35ed3a8b8c593 (6.1-rc4)
+CVE-2022-49926 [net: dsa: Fix possible memory leaks in dsa_loop_init()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/633efc8b3dc96f56f5a57f2a49764853a2fa3f50 (6.1-rc4)
+CVE-2022-49925 [RDMA/core: Fix null-ptr-deref in ib_core_cleanup()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/07c0d131cc0fe1f3981a42958fc52d573d303d89 (6.1-rc4)
+CVE-2022-49924 [nfc: fdp: Fix potential memory leak in fdp_nci_send()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/8e4aae6b8ca76afb1fb64dcb24be44ba814e7f8a (6.1-rc4)
+CVE-2022-49923 [nfc: nxp-nci: Fix potential memory leak in nxp_nci_send()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/7bf1ed6aff0f70434bd0cdd45495e83f1dffb551 (6.1-rc4)
+CVE-2022-49922 [nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/93d904a734a74c54d945a9884b4962977f1176cd (6.1-rc4)
+CVE-2022-49921 [net: sched: Fix use after free in red_enqueue()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/8bdc2acd420c6f3dd1f1c78750ec989f02a1e2b9 (6.1-rc4)
+CVE-2022-49920 [netfilter: nf_tables: netlink notifier might race to release objects]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/d4bc8271db21ea9f1c86a1ca4d64999f184d4aae (6.1-rc4)
+CVE-2022-49919 [netfilter: nf_tables: release flow rule object from commit path]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/26b5934ff4194e13196bedcba373cd4915071d0e (6.1-rc4)
+CVE-2022-49918 [ipvs: fix WARNING in __ip_vs_cleanup_batch()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/3d00c6a0da8ddcf75213e004765e4a42acc71d5d (6.1-rc4)
+CVE-2022-49917 [ipvs: fix WARNING in ip_vs_app_net_cleanup()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/5663ed63adb9619c98ab7479aa4606fa9b7a548c (6.1-rc4)
+CVE-2022-49916 [rose: Fix NULL pointer dereference in rose_send_frame()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/e97c089d7a49f67027395ddf70bf327eeac2611e (6.1-rc4)
+CVE-2022-49915 [mISDN: fix possible memory leak in mISDN_register_device()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/e7d1d4d9ac0dfa40be4c2c8abd0731659869b297 (6.1-rc4)
+CVE-2022-49914 [btrfs: fix inode list leak during backref walking at resolve_indirect_refs()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/5614dc3a47e3310fbc77ea3b67eaadd1c6417bf1 (6.1-rc4)
+CVE-2022-49913 [btrfs: fix inode list leak during backref walking at find_parent_nodes()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/92876eec382a0f19f33d09d2c939e9ca49038ae5 (6.1-rc4)
+CVE-2022-49912 [btrfs: fix ulist leaks in error paths of qgroup self tests]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/d37de92b38932d40e4a251e876cc388f9aee5f42 (6.1-rc4)
+CVE-2022-49911 [netfilter: ipset: enforce documented limit to prevent allocating huge memory]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/510841da1fcc16f702440ab58ef0b4d82a9056b7 (6.1-rc4)
+CVE-2022-49910 [Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/3aff8aaca4e36dc8b17eaa011684881a80238966 (6.1-rc4)
+CVE-2022-49909 [Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/0d0e2d032811280b927650ff3c15fe5020e82533 (6.1-rc4)
+CVE-2022-49908 [Bluetooth: L2CAP: Fix memory leak in vhci_write]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7c9524d929648935bac2bbb4c20437df8f9c3f42 (6.1-rc4)
+CVE-2022-49907 [net: mdio: fix undefined behavior in bit shift for __mdiobus_register]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/40e4eb324c59e11fcb927aa46742d28aba6ecb8a (6.1-rc4)
+CVE-2022-49906 [ibmvnic: Free rwi on reset success]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/d6dd2fe71153f0ff748bf188bd4af076fe09a0a6 (6.1-rc4)
+CVE-2022-49905 [net/smc: Fix possible leaked pernet namespace in smc_init()]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/62ff373da2534534c55debe6c724c7fe14adb97f (6.1-rc4)
+CVE-2022-49904 [net, neigh: Fix null-ptr-deref in neigh_table_clear()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/f8017317cb0b279b8ab98b0f3901a2e0ac880dad (6.1-rc4)
+CVE-2022-49903 [ipv6: fix WARNING in ip6_route_net_exit_late()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/768b3c745fe5789f2430bdab02f35a9ad1148d97 (6.1-rc4)
+CVE-2022-49902 [block: Fix possible memory leak for rq_wb on add_disk failure]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/fa81cbafbf5764ad5053512152345fab37a1fe18 (6.1-rc4)
+CVE-2022-49901 [blk-mq: Fix kmemleak in blk_mq_init_allocated_queue]
+	- linux 6.0.8-1
+	NOTE: https://git.kernel.org/linus/943f45b9399ed8b2b5190cbc797995edaa97f58f (6.1-rc4)
+CVE-2022-49900 [i2c: piix4: Fix adapter not be removed in piix4_remove()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/569bea74c94d37785682b11bab76f557520477cd (6.1-rc4)
+CVE-2022-49899 [fscrypt: stop using keyrings subsystem for fscrypt_master_key]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/d7e7b9af104c7b389a0c21eb26532511bce4b510 (6.1-rc1)
+CVE-2022-49898 [btrfs: fix tree mod log mishandling of reallocated nodes]
+	- linux 6.0.8-1
+	NOTE: https://git.kernel.org/linus/968b71583130b6104c9f33ba60446d598e327a8b (6.1-rc4)
+CVE-2022-49897 [fscrypt: fix keyring memory leak on mount failure]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/ccd30a476f8e864732de220bd50e6f372f5ebcab (6.1-rc3)
+CVE-2022-49896 [cxl/pmem: Fix cxl_pmem_region and cxl_memdev leak]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/4d07ae22e79ebc2d7528bbc69daa53b86981cb3a (6.1-rc4)
+CVE-2022-49895 [cxl/region: Fix decoder allocation crash]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/71ee71d7adcba648077997a29a91158d20c40b09 (6.1-rc4)
+CVE-2022-49894 [cxl/region: Fix region HPA ordering validation]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/a90accb358ae33ea982a35595573f7a045993f8b (6.1-rc4)
+CVE-2022-49893 [cxl/region: Fix cxl_region leak, cleanup targets at region delete]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0d9e734018d70cecf79e2e4c6082167160a0f13f (6.1-rc4)
+CVE-2022-49892 [ftrace: Fix use-after-free for dynamic ftrace_ops]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/0e792b89e6800cd9cb4757a76a96f7ef3e8b6294 (6.1-rc4)
+CVE-2022-49891 [tracing: kprobe: Fix memory leak in test_gen_kprobe/kretprobe_cmd()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/66f0919c953ef7b55e5ab94389a013da2ce80a2c (6.1-rc4)
+CVE-2022-49890 [capabilities: fix potential memleak on error path from vfs_getxattr_alloc()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/8cf0a1bc12870d148ae830a4ba88cfdf0e879cee (6.1-rc4)
+CVE-2022-49889 [ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters()]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7433632c9ff68a991bd0bc38cabf354e9d2de410 (6.1-rc4)
+CVE-2022-49888 [arm64: entry: avoid kprobe recursion]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/024f4b2e1f874934943eb2d3d288ebc52c79f55c (6.1-rc4)
+CVE-2022-49887 [media: meson: vdec: fix possible refcount leak in vdec_probe()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/7718999356234d9cc6a11b4641bb773928f1390f (6.1-rc2)
+CVE-2022-49886 [x86/tdx: Panic on bad configs that #VE on "private" memory access]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/373e715e31bf4e0f129befe87613a278fac228d3 (6.1-rc4)
+CVE-2022-49885 [ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init()]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/43d2748394c3feb86c0c771466f5847e274fc043 (6.1-rc2)
+CVE-2022-49884 [KVM: Initialize gfn_to_pfn_cache locks in dedicated helper]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/52491a38b2c2411f3f0229dc6ad610349c704a41 (6.1-rc4)
+CVE-2022-49883 [KVM: x86: smm: number of GPRs in the SMRAM image depends on the image format]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/696db303e54f7352623d9f640e6c51d8fa9d5588 (6.1-rc4)
+CVE-2022-49882 [KVM: Reject attempts to consume or refresh inactive gfn_to_pfn_cache]
+	- linux 6.0.8-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ecbcf030b45666ad11bc98565e71dfbcb7be4393 (6.1-rc4)
+CVE-2022-49881 [wifi: cfg80211: fix memory leak in query_regdb_file()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/57b962e627ec0ae53d4d16d7bd1033e27e67677a (6.1-rc5)
+CVE-2022-49880 [ext4: fix warning in 'ext4_da_release_space']
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/1b8f787ef547230a3249bcf897221ef0cc78481b (6.1-rc4)
+CVE-2022-49879 [ext4: fix BUG_ON() when directory entry has invalid rec_len]
+	- linux 6.0.8-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/17a0bc9bd697f75cfdf9b378d5eb2d7409c91340 (6.1-rc4)
+CVE-2022-49878 [bpf, verifier: Fix memory leak in array reallocation for stack state]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/42378a9ca55347102bbf86708776061d8fe3ece2 (6.1-rc5)
+CVE-2022-49877 [bpf, sockmap: Fix the sk->sk_forward_alloc warning of sk_stream_kill_queues]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/8ec95b94716a1e4d126edc3fb2bc426a717e2dba (6.1-rc5)
+CVE-2022-49876 [wifi: mac80211: fix general-protection-fault in ieee80211_subif_start_xmit()]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/780854186946e0de2be192ee7fa5125666533b3a (6.1-rc5)
+CVE-2022-49875 [bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/34de8e6e0e1f66e431abf4123934a2581cb5f133 (6.1-rc5)
+CVE-2022-49874 [HID: hyperv: fix possible memory leak in mousevsc_probe()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/b5bcb94b0954a026bbd671741fdb00e7141f9c91 (6.1-rc5)
+CVE-2022-49873 [bpf: Fix wrong reg type conversion in release_reference()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/f1db20814af532f85e091231223e5e4818e8464b (6.1-rc5)
+CVE-2022-49872 [net: gso: fix panic on frag_list with mixed head alloc types]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/9e4b7a99a03aefd37ba7bb1f022c8efab5019165 (6.1-rc5)
+CVE-2022-49871 [net: tun: Fix memory leaks of napi_get_frags]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/1118b2049d77ca0b505775fc1a8d1909cf19a7ec (6.1-rc5)
+CVE-2022-49870 [capabilities: fix undefined behavior in bit shift for CAP_TO_MASK]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/46653972e3ea64f79e7f8ae3aa41a4d3fdb70a13 (6.1-rc5)
+CVE-2022-49869 [bnxt_en: Fix possible crash in bnxt_hwrm_set_coal()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/6d81ea3765dfa6c8a20822613c81edad1c4a16a0 (6.1-rc5)
+CVE-2022-49868 [phy: ralink: mt7621-pci: add sentinel to quirks table]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/819b885cd886c193782891c4f51bbcab3de119a4 (6.1-rc5)
+CVE-2022-49867 [net: wwan: iosm: fix memory leak in ipc_wwan_dellink]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/f25caaca424703d5a0607310f0452f978f1f78d9 (6.1-rc5)
+CVE-2022-49866 [net: wwan: mhi: fix memory leak in mhi_mbim_dellink]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/668205b9c9f94d5ed6ab00cce9a46a654c2b5d16 (6.1-rc5)
+CVE-2022-49865 [ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to network]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/c23fb2c82267638f9d206cb96bb93e1f93ad7828 (6.1-rc5)
+CVE-2022-49864 [drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram()]
+	- linux 6.0.10-1
+	NOTE: https://git.kernel.org/linus/5b994354af3cab770bf13386469c5725713679af (6.1-rc4)
+CVE-2022-49863 [can: af_can: fix NULL pointer dereference in can_rx_register()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/8aa59e355949442c408408c2d836e561794c40a1 (6.1-rc5)
+CVE-2022-49862 [tipc: fix the msg->req tlv len check in tipc_nl_compat_name_table_dump_header]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/1c075b192fe41030457cd4a5f7dea730412bca40 (6.1-rc5)
+CVE-2022-49861 [dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/081195d17a0c4c636da2b869bd5809d42e8cbb13 (6.1-rc5)
+CVE-2022-49860 [dmaengine: ti: k3-udma-glue: fix memory leak when register device fail]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ac2b9f34f02052709aea7b34bb2a165e1853eb41 (6.1-rc5)
+CVE-2022-49859 [net: lapbether: fix issue of invalid opcode in lapbeth_open()]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3faf7e14ec0c3462c2d747fa6793b8645d1391df (6.1-rc5)
+CVE-2022-49858 [octeontx2-pf: Fix SQE threshold checking]
+	- linux 6.0.10-1
+	NOTE: https://git.kernel.org/linus/f0dfc4c88ef39be0ba736aa0ce6119263fc19aeb (6.1-rc5)
+CVE-2022-49857 [net: marvell: prestera: fix memory leak in prestera_rxtx_switch_init()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/519b58bbfa825f042fcf80261cc18e1e35f85ffd (6.1-rc5)
+CVE-2022-49856 [net: tun: call napi_schedule_prep() to ensure we own a napi]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/07d120aa33cc9d9115753d159f64d20c94458781 (6.1-rc5)
+CVE-2022-49855 [net: wwan: iosm: fix memory leak in ipc_pcie_read_bios_cfg]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/d38a648d2d6cc7bee11c6f533ff9426a00c2a74c (6.1-rc5)
+CVE-2022-49854 [mctp: Fix an error handling path in mctp_init()]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/d4072058af4fd8fb4658e7452289042a406a9398 (6.1-rc5)
+CVE-2022-49853 [net: macvlan: fix memory leaks of macvlan_common_newlink]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/23569b5652ee8e8e55a12f7835f59af6f3cefc30 (6.1-rc5)
+CVE-2022-49852 [riscv: process: fix kernel info leakage]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/6510c78490c490a6636e48b61eeaa6fb65981f4b (6.1-rc5)
+CVE-2022-49851 [riscv: fix reserved memory setup]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/50e63dd8ed92045eb70a72d7ec725488320fb68b (6.1-rc5)
+CVE-2022-49850 [nilfs2: fix deadlock in nilfs_count_free_blocks()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/8ac932a4921a96ca52f61935dbba64ea87bbd5dc (6.1-rc5)
+CVE-2022-49849 [btrfs: fix match incorrectly in dev_args_match_device]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0fca385d6ebc3cabb20f67bcf8a71f1448bdc001 (6.1-rc5)
+CVE-2022-49848 [phy: qcom-qmp-combo: fix NULL-deref on runtime resume]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/04948e757148f870a31f4887ea2239403f516c3c (6.1-rc5)
+CVE-2022-49847 [net: ethernet: ti: am65-cpsw: Fix segmentation fault at module unload]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/1a0c016a4831ea29be09bbc8162d4a2a0690b4b8 (6.1-rc5)
+CVE-2022-49846 [udf: Fix a slab-out-of-bounds write bug in udf_find_entry()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/c8af247de385ce49afabc3bf1cf4fd455c94bfe8 (6.1-rc5)
+CVE-2022-49845 [can: j1939: j1939_send_one(): fix missing CAN header initialization]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/3eb3d283e8579a22b81dd2ac3987b77465b2a22f (6.1-rc5)
+CVE-2022-49844 [can: dev: fix skb drop check]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ae64438be1923e3c1102d90fd41db7afcfaf54cc (6.1-rc5)
+CVE-2022-49843 [drm/amdkfd: Migrate in CPU page fault use current mm]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3a876060892ba52dd67d197c78b955e62657d906 (6.1-rc1)
+CVE-2022-49842 [ASoC: core: Fix use-after-free in snd_soc_exit()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/6ec27c53886c8963729885bcf2dd996eba2767a7 (6.1-rc6)
+CVE-2022-49841 [serial: imx: Add missing .thaw_noirq hook]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/4561d8008a467cb05ac632a215391d6b787f40aa (6.1-rc6)
+CVE-2022-49840 [bpf, test_run: Fix alignment problem in bpf_prog_test_run_skb()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/d3fd203f36d46aa29600a72d57a1b61af80e4a25 (6.1-rc6)
+CVE-2022-49839 [scsi: scsi_transport_sas: Fix error handling in sas_phy_add()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/5d7bebf2dfb0dc97aac1fbace0910e557ecdb16f (6.1-rc5)
+CVE-2022-49838 [sctp: clear out_curr if all frag chunks of current msg are pruned]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/2f201ae14ae0f91dbf1cffea7bb1e29e81d4d108 (6.1-rc5)
+CVE-2022-49837 [bpf: Fix memory leaks in __check_func_call]
+	- linux 6.0.10-1
+	NOTE: https://git.kernel.org/linus/eb86559a691cea5fa63e57a03ec3dc9c31e97955 (6.1-rc6)
+CVE-2022-49836 [siox: fix possible memory leak in siox_device_add()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/6e63153db50059fb78b8a8447b132664887d24e3 (6.1-rc6)
+CVE-2022-49835 [ALSA: hda: fix potential memleak in 'add_widget_node']
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/9a5523f72bd2b0d66eef3d58810c6eb7b5ffc143 (6.1-rc5)
+CVE-2022-49834 [nilfs2: fix use-after-free bug of ns_writer on remount]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/8cccf05fe857a18ee26e20d11a8455a73ffd4efd (6.1-rc5)
+CVE-2022-49833 [btrfs: zoned: clone zoned device info when cloning a device]
+	- linux 6.0.10-1
+	NOTE: https://git.kernel.org/linus/21e61ec6d0bb786818490e926aa9aeb4de95ad0d (6.1-rc5)
+CVE-2022-49832 [pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/91d5c5060ee24fe8da88cd585bb43b843d2f0dce (6.1-rc6)
+CVE-2022-49831 [btrfs: zoned: initialize device's zone info for seeding]
+	- linux 6.0.10-1
+	NOTE: https://git.kernel.org/linus/a8d1b1647bf8244a5f270538e9e636e2657fffa3 (6.1-rc5)
+CVE-2022-49830 [drm/drv: Fix potential memory leak in drm_dev_init()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/ff963634f7b2e0dc011349abb3fb81a0d074f443 (6.1-rc6)
+CVE-2022-49829 [drm/scheduler: fix fence ref counting]
+	- linux 6.0.10-1
+	NOTE: https://git.kernel.org/linus/b3af84383e7abdc5e63435817bb73a268e7c3637 (6.1-rc3)
+CVE-2022-49828 [hugetlbfs: don't delete error page from pagecache]
+	- linux 6.0.10-1
+	NOTE: https://git.kernel.org/linus/8625147cafaa9ba74713d682f5185eb62cb2aedb (6.1-rc5)
+CVE-2022-49827 [drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/4979524f5a2a8210e87fde2f642b0dc060860821 (6.1-rc6)
+CVE-2022-49826 [ata: libata-transport: fix double ata_host_put() in ata_tport_add()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/8c76310740807ade5ecdab5888f70ecb6d35732e (6.1-rc5)
+CVE-2022-49825 [ata: libata-transport: fix error handling in ata_tport_add()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/3613dbe3909dcc637fe6be00e4dc43b4aa0470ee (6.1-rc5)
+CVE-2022-49824 [ata: libata-transport: fix error handling in ata_tlink_add()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/cf0816f6322c5c37ee52655f928e91ecf32da103 (6.1-rc5)
+CVE-2022-49823 [ata: libata-transport: fix error handling in ata_tdev_add()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/1ff36351309e3eadcff297480baf4785e726de9b (6.1-rc5)
+CVE-2022-49822 [cifs: Fix connections leak when tlink setup failed]
+	- linux 6.0.10-1
+	NOTE: https://git.kernel.org/linus/1dcdf5f5b2137185cbdd5385f29949ab3da4f00c (6.1-rc6)
+CVE-2022-49821 [mISDN: fix possible memory leak in mISDN_dsp_element_register()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/98a2ac1ca8fd6eca6867726fe238d06e75eb1acd (6.1-rc6)
+CVE-2022-49820 [mctp i2c: don't count unused / invalid keys for flow release]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/9cbd48d5fa14e4c65f8580de16686077f7cea02b (6.1-rc6)
+CVE-2022-49819 [octeon_ep: fix potential memory leak in octep_device_setup()]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/e4041be97b15302ebfffda8bbd45f3b2d096048f (6.1-rc6)
+CVE-2022-49818 [mISDN: fix misuse of put_device() in mISDN_register_device()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/2d25107e111a85c56f601a5470f1780ec054e6ac (6.1-rc6)
+CVE-2022-49817 [net: mhi: Fix memory leak in mhi_net_dellink()]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/f7c125bd79f50ec6094761090be81d02726ec6f4 (6.1-rc6)
+CVE-2022-49816 [xen/pcpu: fix possible memory leak in register_pcpu()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/da36a2a76b01b210ffaa55cdc2c99bc8783697c5 (6.1-rc6)
+CVE-2022-49815 [erofs: fix missing xas_retry() in fscache mode]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/37020bbb71d911431e16c2c940b97cf86ae4f2f6 (6.1-rc6)
+CVE-2022-49814 [kcm: close race conditions on sk_receive_queue]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/5121197ecc5db58c07da95eb1ff82b98b121a221 (6.1-rc6)
+CVE-2022-49813 [net: ena: Fix error handling in ena_init()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/d349e9be5a2c2d7588a2c4e4bfa0bb3dc1226769 (6.1-rc6)
+CVE-2022-49812 [bridge: switchdev: Fix memory leaks when changing VLAN protocol]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/9d45921ee4cb364910097e7d1b7558559c2f9fd2 (6.1-rc6)
+CVE-2022-49811 [drbd: use after free in drbd_create_device()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/a7a1598189228b5007369a9622ccdf587be0730f (6.1-rc6)
+CVE-2022-49810 [netfs: Fix missing xas_retry() calls in xarray iteration]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7e043a80b5dae5c2d2cf84031501de7827fd6c00 (6.1-rc6)
+CVE-2022-49809 [net/x25: Fix skb leak in x25_lapb_receive_frame()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/2929cceb2fcf0ded7182562e4888afafece82cce (6.1-rc6)
+CVE-2022-49808 [net: dsa: don't leak tagger-owned storage on switch driver unbind]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/4e0c19fcb8b5323716140fa82b79aa9f60e60407 (6.1-rc6)
+CVE-2022-49807 [nvmet: fix a memory leak in nvmet_auth_set_key]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0a52566279b4ee65ecd2503d7b7342851f84755c (6.1-rc6)
+CVE-2022-49806 [net: microchip: sparx5: Fix potential null-ptr-deref in sparx_stats_init() and sparx5_start()]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/639f5d006e36bb303f525d9479448c412b720c39 (6.1-rc6)
+CVE-2022-49805 [net: lan966x: Fix potential null-ptr-deref in lan966x_stats_init()]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ba86af3733aece88dbcee0dfebf7e2dcfefb2be4 (6.1-rc6)
+CVE-2022-49804 [s390: avoid using global register for current_stack_pointer]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/e3c11025bcd2142a61abe5806b2f86a0e78118df (6.1-rc6)
+CVE-2022-49803 [netdevsim: Fix memory leak of nsim_dev->fa_cookie]
+	- linux 6.0.10-1
+	NOTE: https://git.kernel.org/linus/064bc7312bd09a48798418663090be0c776183db (6.1-rc6)
+CVE-2022-49802 [ftrace: Fix null pointer dereference in ftrace_add_mod()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/19ba6c8af9382c4c05dc6a0a79af3013b9a35cd0 (6.1-rc6)
+CVE-2022-49801 [tracing: Fix memory leak in tracing_read_pipe()]
+	- linux 6.0.10-1
+	NOTE: https://git.kernel.org/linus/649e72070cbbb8600eb823833e4748f5a0815116 (6.1-rc6)
+CVE-2022-49800 [tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/a4527fef9afe5c903c718d0cd24609fe9c754250 (6.1-rc6)
+CVE-2022-49799 [tracing: Fix wild-memory-access in register_synth_event()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/1b5f1c34d3f5a664a57a5a7557a50e4e3cc2505c (6.1-rc6)
+CVE-2022-49798 [tracing: Fix race where eprobes can be called before the event]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/94eedf3dded5fb472ce97bfaf3ac1c6c29c35d26 (6.1-rc6)
+CVE-2022-49797 [tracing: kprobe: Fix potential null-ptr-deref on trace_event_file in kprobe_event_gen_test_exit()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/e0d75267f59d7084e0468bd68beeb1bf9c71d7c0 (6.1-rc6)
+CVE-2022-49796 [tracing: kprobe: Fix potential null-ptr-deref on trace_array in kprobe_event_gen_test_exit()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/22ea4ca9631eb137e64e5ab899e9c89cb6670959 (6.1-rc6)
+CVE-2022-49795 [rethook: fix a potential memleak in rethook_alloc()]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0a1ebe35cb3b7aa1f4b26b37e2a0b9ae68dc4ffb (6.1-rc6)
+CVE-2022-49794 [iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/65f20301607d07ee279b0804d11a05a62a6c1a1c (6.1-rc6)
+CVE-2022-49793 [iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/efa17e90e1711bdb084e3954fa44afb6647331c0 (6.1-rc6)
+CVE-2022-49792 [iio: adc: mp2629: fix potential array out of bound access]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/ca1547ab15f48dc81624183ae17a2fd1bad06dfc (6.1-rc6)
+CVE-2022-49791 [io_uring: fix multishot accept request leaks]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/91482864768a874c4290ef93b84a78f4f1dac51b (6.1-rc6)
+CVE-2022-49790 [Input: iforce - invert valid length check when fetching device IDs]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/b8ebf250997c5fb253582f42bfe98673801ebebd (6.1-rc6)
+CVE-2022-49789 [scsi: zfcp: Fix double free of FSF request when qdio send fails]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/0954256e970ecf371b03a6c9af2cf91b9c4085ff (6.1-rc6)
+CVE-2022-49788 [misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/e5b0d06d9b10f5f43101bd6598b076c347f9295f (6.1-rc6)
+CVE-2022-49787 [mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/222cfa0118aa68687ace74aab8fdf77ce8fbd7e6 (6.1-rc6)
+CVE-2022-49786 [blk-cgroup: properly pin the parent in blkcg_css_online]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/d7dbd43f4a828fa1d9a8614d5b0ac40aee6375fe (6.1-rc6)
+CVE-2022-49785 [x86/sgx: Add overflow check in sgx_validate_offset_length()]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/f0861f49bd946ff94fce4f82509c45e167f63690 (6.1-rc6)
+CVE-2022-49784 [perf/x86/amd/uncore: Fix memory leak for events array]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/bdfe34597139cfcecd47a2eb97fea44d77157491 (6.1-rc6)
+CVE-2022-49783 [x86/fpu: Drop fpregs lock before inheriting FPU permissions]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/36b038791e1e2baea892e9276588815fd14894b4 (6.1-rc6)
+CVE-2022-49782 [perf: Improve missing SIGTRAP checking]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/bb88f9695460bec25aa30ba9072595025cf6c8af (6.1-rc6)
+CVE-2022-49781 [perf/x86/amd: Fix crash due to race between amd_pmu_enable_all, perf NMI and throttling]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/baa014b9543c8e5e94f5d15b66abfe60750b8284 (6.1-rc6)
+CVE-2022-49780 [scsi: target: tcm_loop: Fix possible name leak in tcm_loop_setup_hba_bus()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/bc68e428d4963af0201e92159629ab96948f0893 (6.1-rc6)
+CVE-2022-49779 [kprobes: Skip clearing aggrprobe's post_handler in kprobe-on-ftrace case]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/5dd7caf0bdc5d0bae7cf9776b4d739fb09bd5ebb (6.1-rc6)
+CVE-2022-49778 [arm64/mm: fix incorrect file_map_count for non-leaf pmd/pud]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5b47348fc0b18a78c96f8474cc90b7525ad1bbfe (6.1-rc6)
+CVE-2022-49777 [Input: i8042 - fix leaking of platform device on module removal]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/81cd7e8489278d28794e7b272950c3e00c344e44 (6.1-rc6)
+CVE-2022-49776 [macvlan: enforce a consistent minimal mtu]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/b64085b00044bdf3cd1c9825e9ef5b2e0feae91a (6.1-rc1)
+CVE-2022-49775 [tcp: cdg: allow tcp_cdg_release() to be called multiple times]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/72e560cb8c6f80fc2b4afc5d3634a32465e13a51 (6.1-rc1)
+CVE-2022-49774 [KVM: x86/xen: Fix eventfd error handling in kvm_xen_eventfd_assign()]
+	- linux 6.0.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7353633814f6e5b4899fb9ee1483709d6bb0e1cd (6.1-rc4)
+CVE-2022-49773 [drm/amd/display: Fix optc2_configure warning on dcn314]
+	- linux 6.0.10-1
+	NOTE: https://git.kernel.org/linus/e7e4f77c991c9abf90924929a9d55f90b0bb78de (6.1-rc6)
+CVE-2022-49772 [ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/ad72c3c3f6eb81d2cb189ec71e888316adada5df (6.1-rc6)
+CVE-2022-49771 [dm ioctl: fix misbehavior if list_versions races with module loading]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/4fe1ec995483737f3d2a14c3fe1d8fe634972979 (6.1-rc6)
+CVE-2022-49770 [ceph: avoid putting the realm twice when decoding snaps fails]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/51884d153f7ec85e18d607b2467820a90e0f4359 (6.1-rc6)
+CVE-2022-49769 [gfs2: Check sb_bsize_shift after reading superblock]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/670f8ce56dd0632dc29a0322e188cc73ce3c6b92 (6.1-rc1)
+CVE-2022-49768 [9p: trans_fd/p9_conn_cancel: drop client lock earlier]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/52f1c45dde9136f964d63a77d19826c8a74e2c7f (6.1-rc1)
+CVE-2022-49767 [9p/trans_fd: always use O_NONBLOCK read/write]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/ef575281b21e9a34dfae544a187c6aac2ae424a9 (6.1-rc1)
+CVE-2022-49766 [netlink: Bounds-check struct nlmsgerr creation]
+	- linux 6.0.10-1
+	NOTE: https://git.kernel.org/linus/710d21fdff9a98d621cd4e64167f3ef8af4e2fd1 (6.1-rc1)
+CVE-2022-49765 [net/9p: use a dedicated spinlock for trans_fd]
+	- linux 6.0.10-1
+	NOTE: https://git.kernel.org/linus/296ab4a813841ba1d5f40b03190fd1bd8f25aab0 (6.1-rc1)
+CVE-2022-49764 [bpf: Prevent bpf program recursion for raw tracepoint probes]
+	- linux 6.0.10-1
+	NOTE: https://git.kernel.org/linus/05b24ff9b2cfabfcfd951daaa915a036ab53c9e1 (6.1-rc1)
+CVE-2022-49763 [ntfs: fix use-after-free in ntfs_attr_find()]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/d85a1bec8e8d552ab13163ca1874dcd82f3d1550 (6.1-rc1)
+CVE-2022-49762 [ntfs: check overflow when iterating ATTR_RECORDs]
+	- linux 6.0.10-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/63095f4f3af59322bea984a6ae44337439348fe0 (6.1-rc1)
+CVE-2020-36790 [nvmet: fix a memory leak]
+	- linux 5.8.7-1
+	NOTE: https://git.kernel.org/linus/382fee1a8b623e2546a3e15e80517389e0e0673e (5.9-rc3)
 CVE-2025-37796 [wifi: at76c50x: fix use after free access in at76_disconnect]
 	- linux 6.12.25-1
 	[bookworm] - linux 6.1.135-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f0b7606183e09a6f190bf72f2c57cd9acd61a132

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f0b7606183e09a6f190bf72f2c57cd9acd61a132
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250501/20dbb151/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list