Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 8d83b874 by Salvatore Bonaccorso at 2025-12-08T06:36:34+01:00 Merge Linux CVEs from kernel-sec - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,69 @@ +CVE-2022-50630 [mm: hugetlb: fix UAF in hugetlb_handle_userfault] + - linux 6.0.3-1 + [bullseye] - linux 5.10.158-1 + NOTE: https://git.kernel.org/linus/958f32ce832ba781ac20e11bb2d12a9352ea28fc (6.1-rc1) +CVE-2022-50629 [wifi: rsi: Fix memory leak in rsi_coex_attach()] + - linux 6.1.20-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/956fb851a6e19da5ab491e19c1bc323bb2c2cf6f (6.3-rc1) +CVE-2022-50628 [drm/gud: Fix UBSAN warning] + - linux 6.1.20-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/951df98024f7272f85df5044eca7374f5b5b24ef (6.3-rc1) +CVE-2022-50627 [wifi: ath11k: fix monitor mode bringup crash] + - linux 6.1.20-1 + NOTE: https://git.kernel.org/linus/950b43f8bd8a4d476d2da6d2a083a89bcd3c90d7 (6.3-rc1) +CVE-2022-50626 [media: dvb-usb: fix memory leak in dvb_usb_adapter_init()] + - linux 6.1.4-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/94d90fb06b94a90c176270d38861bcba34ce377d (6.2-rc1) +CVE-2022-50625 [serial: amba-pl011: avoid SBSA UART accessing DMACR register] + - linux 6.1.4-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/94cdb9f33698478b0e7062586633c42c6158a786 (6.2-rc1) +CVE-2022-50624 [net: netsec: fix error handling in netsec_register_mdio()] + - linux 6.0.7-1 + [bullseye] - linux 5.10.158-1 + NOTE: https://git.kernel.org/linus/94423589689124e8cd145b38a1034be7f25835b2 (6.1-rc3) +CVE-2022-50623 [fpga: prevent integer overflow in dfl_feature_ioctl_set_irq()] + - linux 6.0.3-1 + [bullseye] - linux 5.10.158-1 + NOTE: https://git.kernel.org/linus/939bc5453b8cbdde9f1e5110ce8309aedb1b501a (6.1-rc1) +CVE-2022-50622 [ext4: fix potential memory leak in ext4_fc_record_modified_inode()] + - linux 6.0.3-1 + [bullseye] - linux 5.10.158-1 + NOTE: https://git.kernel.org/linus/9305721a309fa1bd7c194e0d4a2335bf3b29dca4 (6.1-rc1) +CVE-2022-50621 [dm: verity-loadpin: Only trust verity targets with enforcement] + - linux 6.0.3-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/916ef6232cc4b84db7082b4c3d3cf1753d9462ba (6.1-rc1) +CVE-2022-50620 [f2fs: fix to invalidate dcc->f2fs_issue_discard in error path] + - linux 6.1.4-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/91586ce0d39a05f88795aa8814fb99b1387236b3 (6.2-rc1) +CVE-2022-50619 [drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr()] + - linux 6.0.7-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/90bfee142af0f0e9d3bec80e7acd5f49b230acf7 (6.1-rc3) +CVE-2022-50618 [mmc: meson-gx: fix return value check of mmc_add_host()] + - linux 6.1.4-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/90935f16f2650ab7416fa2ffbe5c28cb39cf3f1e (6.2-rc1) +CVE-2022-50617 [drm/amdgpu/powerplay/psm: Fix memory leak in power state init] + - linux 6.1.4-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/8f8033d5663b18e6efb33feb61f2287a04605ab5 (6.2-rc1) +CVE-2022-50616 [regulator: core: Use different devices for resource allocation and DT lookup] + - linux 6.1.4-1 + NOTE: https://git.kernel.org/linus/8f3cbcd6b440032ebc7f7d48a1689dcc70a4eb98 (6.2-rc1) +CVE-2022-50615 [perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map()] + - linux 6.1.4-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/8ebd16c11c346751b3944d708e6c181ed4746c39 (6.2-rc1) +CVE-2022-50614 [misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic] + - linux 6.0.2-1 + [bullseye] - linux 5.10.148-1 + NOTE: https://git.kernel.org/linus/8e30538eca016de8e252bef174beadecd64239f0 (6.1-rc1) CVE-2022-50583 [md/raid0, raid10: Don't set discard sectors for request queue] - linux 6.1.4-1 NOTE: https://git.kernel.org/linus/8e1a2279ca2b0485cc379a153d02a9793f74a48f (6.2-rc1) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8d83b874bf320502bf6c5f0855222fe11d87d8e8 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8d83b874bf320502bf6c5f0855222fe11d87d8e8 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
