summaryrefslogtreecommitdiffstats
path: root/active
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2024-04-29 20:53:28 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2024-04-29 20:53:28 +0200
commit58cfe4366ec42ead0e7051af35c4d339f0adaf62 (patch)
tree82c0b1a808430feb2752d4143106f8db9bcbb6e2 /active
parent4ec58ba3413a354da4f0d015a6b51e187abd98a7 (diff)
Retire many CVEs
Diffstat (limited to 'active')
-rw-r--r--active/CVE-2022-4863216
-rw-r--r--active/CVE-2022-4863516
-rw-r--r--active/CVE-2022-4863616
-rw-r--r--active/CVE-2022-4863716
-rw-r--r--active/CVE-2022-4863816
-rw-r--r--active/CVE-2022-4863916
-rw-r--r--active/CVE-2022-4864016
-rw-r--r--active/CVE-2022-4864117
-rw-r--r--active/CVE-2022-4864216
-rw-r--r--active/CVE-2022-4864316
-rw-r--r--active/CVE-2022-4864416
-rw-r--r--active/CVE-2022-4864717
-rw-r--r--active/CVE-2022-4864816
-rw-r--r--active/CVE-2022-4864917
-rw-r--r--active/CVE-2022-4865016
-rw-r--r--active/CVE-2022-4865116
-rw-r--r--active/CVE-2022-4865216
-rw-r--r--active/CVE-2022-4865316
-rw-r--r--active/CVE-2022-4865416
-rw-r--r--active/CVE-2022-4865616
-rw-r--r--active/CVE-2022-4865716
-rw-r--r--active/CVE-2022-4865816
-rw-r--r--active/CVE-2022-4865915
-rw-r--r--active/CVE-2022-4866016
-rw-r--r--active/CVE-2022-4866116
-rw-r--r--active/CVE-2022-4866216
-rw-r--r--active/CVE-2022-4866316
-rw-r--r--active/CVE-2022-4866516
-rw-r--r--active/CVE-2022-4866716
-rw-r--r--active/CVE-2022-4866816
-rw-r--r--active/CVE-2023-5264616
-rw-r--r--active/CVE-2024-2667816
-rw-r--r--active/CVE-2024-2692716
33 files changed, 0 insertions, 530 deletions
diff --git a/active/CVE-2022-48632 b/active/CVE-2022-48632
deleted file mode 100644
index cd0938e4..00000000
--- a/active/CVE-2022-48632
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()
-References:
-Notes:
- carnil> Introduced in b5b5b32081cd206b ("i2c: mlxbf: I2C SMBus driver for Mellanox
- carnil> BlueField SoC"). Vulnerable versions: 5.10-rc1.
-Bugs:
-upstream: released (6.0-rc7) [de24aceb07d426b6f1c59f33889d6a964770547b]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.146) [48ee0a864d1af02eea98fc825cc230d61517a71e]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.148-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48635 b/active/CVE-2022-48635
deleted file mode 100644
index ec8882e9..00000000
--- a/active/CVE-2022-48635
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: fsdax: Fix infinite loop in dax_iomap_rw()
-References:
-Notes:
- carnil> Introduced in ca289e0b95af ("fsdax: switch dax_iomap_rw to use iomap_iter").
- carnil> Vulnerable versions: 5.15-rc1.
-Bugs:
-upstream: released (6.0-rc7) [17d9c15c9b9e7fb285f7ac5367dfb5f00ff575e3]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48636 b/active/CVE-2022-48636
deleted file mode 100644
index 67a567a1..00000000
--- a/active/CVE-2022-48636
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup
-References:
-Notes:
- carnil> Introduced in 8e09f21574ea ("[S390] dasd: add hyper PAV support to DASD device
- carnil> driver, part 1"). Vulnerable versions: 2.6.25-rc1.
-Bugs:
-upstream: released (6.0-rc7) [db7ba07108a48c0f95b74fabbfd5d63e924f992d]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.146) [f5fcc9d6d71d9ff7fdbdd4b89074e6e24fffc20b]
-4.19-upstream-stable: released (4.19.260) [aaba5ff2742043705bc4c02fd0b2b246e2e16da1]
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.148-1)
-4.19-buster-security: released (4.19.260-1)
diff --git a/active/CVE-2022-48637 b/active/CVE-2022-48637
deleted file mode 100644
index 848d05fb..00000000
--- a/active/CVE-2022-48637
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: bnxt: prevent skb UAF after handing over to PTP worker
-References:
-Notes:
- carnil> Introduced in 83bb623c968e ("bnxt_en: Transmit and retrieve packet
- carnil> timestamps"). Vulnerable versions: 5.14-rc1.
-Bugs:
-upstream: released (6.0-rc7) [c31f26c8f69f776759cbbdfb38e40ea91aa0dd65]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48638 b/active/CVE-2022-48638
deleted file mode 100644
index 5e946ca2..00000000
--- a/active/CVE-2022-48638
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory
-References:
-Notes:
- carnil> Introduced in 6b658c4863c1 ("scsi: cgroup: Add cgroup_get_from_id()").
- carnil> Vulnerable versions: 5.14-rc1.
-Bugs:
-upstream: released (6.0-rc7) [df02452f3df069a59bc9e69c84435bf115cb6e37]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48639 b/active/CVE-2022-48639
deleted file mode 100644
index 6990910d..00000000
--- a/active/CVE-2022-48639
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: net: sched: fix possible refcount leak in tc_new_tfilter()
-References:
-Notes:
- carnil> Introduced in 7d5509fa0d3d ("net: sched: extend proto ops with 'put'
- carnil> callback"). Vulnerable versions: 5.1-rc1.
-Bugs:
-upstream: released (6.0-rc7) [c2e1cfefcac35e0eea229e148c8284088ce437b5]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.146) [8844c750eeb03452e2b3319c27a526f447b82596]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.148-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48640 b/active/CVE-2022-48640
deleted file mode 100644
index 5432ecd8..00000000
--- a/active/CVE-2022-48640
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: bonding: fix NULL deref in bond_rr_gen_slave_id
-References:
-Notes:
- carnil> Introduced in 848ca9182a7d ("net: bonding: Use per-cpu rr_tx_counter").
- carnil> Vulnerable versions: 5.14-rc1.
-Bugs:
-upstream: released (6.0-rc7) [0e400d602f46360752e4b32ce842dba3808e15e6]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48641 b/active/CVE-2022-48641
deleted file mode 100644
index 00876859..00000000
--- a/active/CVE-2022-48641
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: netfilter: ebtables: fix memory leak when blob is malformed
-References:
-Notes:
- carnil> Introduced in 7997eff82828 ("netfilter: ebtables: reject blobs that don't
- carnil> provide all entry points"). Vulnerable versions: 4.14.292 4.19.257 5.4.212
- carnil> 5.10.140 5.15.64 5.19.6 6.0-rc3.
-Bugs:
-upstream: released (6.0-rc7) [62ce44c4fff947eebdf10bb582267e686e6835c9]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.146) [ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee]
-4.19-upstream-stable: released (4.19.260) [1e98318af2f163eadaff815abcef38d27ca92c1e]
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.148-1)
-4.19-buster-security: released (4.19.260-1)
diff --git a/active/CVE-2022-48642 b/active/CVE-2022-48642
deleted file mode 100644
index 6a1e6ea4..00000000
--- a/active/CVE-2022-48642
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: netfilter: nf_tables: fix percpu memory leak at nf_tables_addchain()
-References:
-Notes:
- carnil> Introduced in 3bc158f8d0330f0a ("netfilter: nf_tables: map basechain priority
- carnil> to hardware priority"). Vulnerable versions: 5.3-rc6.
-Bugs:
-upstream: released (6.0-rc7) [9a4d6dd554b86e65581ef6b6638a39ae079b17ac]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.146) [b043a525a3f5520abb676a7cd8f6328fdf959e88]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.148-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48643 b/active/CVE-2022-48643
deleted file mode 100644
index 8a6f65c3..00000000
--- a/active/CVE-2022-48643
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: netfilter: nf_tables: fix nft_counters_enabled underflow at nf_tables_addchain()
-References:
-Notes:
- carnil> Introduced in 43eb8949cfdffa76 ("netfilter: nf_tables: do not leave chain stats
- carnil> enabled on error"). Vulnerable versions: 5.10.140 5.15.64 5.19.6 6.0-rc3.
-Bugs:
-upstream: released (6.0-rc7) [921ebde3c0d22c8cba74ce8eb3cc4626abff1ccd]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.146) [710e3f526bd23a0d33435dedc52c3144de284378]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.148-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48644 b/active/CVE-2022-48644
deleted file mode 100644
index baf1c5cc..00000000
--- a/active/CVE-2022-48644
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: net/sched: taprio: avoid disabling offload when it was never enabled
-References:
-Notes:
- carnil> Introduced in 9c66d1564676 ("taprio: Add support for hardware offloading").
- carnil> Vulnerable versions: 5.4-rc1.
-Bugs:
-upstream: released (6.0-rc7) [db46e3a88a09c5cf7e505664d01da7238cd56c92]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.146) [586def6ebed195f3594a4884f7c5334d0e1ad1bb]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.148-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48647 b/active/CVE-2022-48647
deleted file mode 100644
index b0d02ef8..00000000
--- a/active/CVE-2022-48647
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: sfc: fix TX channel offset when using legacy interrupts
-References:
-Notes:
- carnil> Introduced in c308dfd1b43e ("sfc: fix wrong tx channel offset with
- carnil> efx_separate_tx_channels"). Vulnerable versions: 5.10.122 5.15.47 5.17.15
- carnil> 5.18.4 5.19-rc1.
-Bugs:
-upstream: released (6.0-rc7) [f232af4295653afa4ade3230462b3be15ad16419]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.146) [b4afd3878f961d3517f27b3213730fceef77945c]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.148-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48648 b/active/CVE-2022-48648
deleted file mode 100644
index 9fd27857..00000000
--- a/active/CVE-2022-48648
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: sfc: fix null pointer dereference in efx_hard_start_xmit
-References:
-Notes:
- carnil> Introduced in 12804793b17c ("sfc: decouple TXQ type from label"). Vulnerable
- carnil> versions: 5.10-rc1.
-Bugs:
-upstream: released (6.0-rc7) [0a242eb2913a4aa3d6fbdb86559f27628e9466f3]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.146) [b3b41d4d95d3822b2e459ecbc80d030ea6aec5e7]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.148-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48649 b/active/CVE-2022-48649
deleted file mode 100644
index f041dd69..00000000
--- a/active/CVE-2022-48649
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: mm/slab_common: fix possible double free of kmem_cache
-References:
-Notes:
- carnil> Introduced in 0495e337b703 ("mm/slab_common: Deleting kobject in
- carnil> kmem_cache_destroy() without holding slab_mutex/cpu_hotplug_lock"). Vulnerable
- carnil> versions: 5.19.8 6.0-rc4.
-Bugs:
-upstream: released (6.0-rc7) [d71608a877362becdc94191f190902fac1e64d35]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48650 b/active/CVE-2022-48650
deleted file mode 100644
index c86054d6..00000000
--- a/active/CVE-2022-48650
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()
-References:
-Notes:
- carnil> Introduced in 8f394da36a36 ("scsi: qla2xxx: Drop
- carnil> TARGET_SCF_LOOKUP_LUN_FROM_TAG"). Vulnerable versions: 5.11-rc1.
-Bugs:
-upstream: released (6.0-rc7) [601be20fc6a1b762044d2398befffd6bf236cebf]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48651 b/active/CVE-2022-48651
deleted file mode 100644
index 4e2090c9..00000000
--- a/active/CVE-2022-48651
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header
-References:
-Notes:
- carnil> Introduced in 2ad7bf363841 ("ipvlan: Initial check-in of the IPVLAN driver.").
- carnil> Vulnerable versions: 3.19-rc1.
-Bugs:
-upstream: released (6.0-rc7) [81225b2ea161af48e093f58e8dfee6d705b16af4]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.146) [ab4a733874ead120691e8038272d22f8444d3638]
-4.19-upstream-stable: released (4.19.260) [bffcdade259c05ab3436b5fab711612093c275ef]
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.148-1)
-4.19-buster-security: released (4.19.260-1)
diff --git a/active/CVE-2022-48652 b/active/CVE-2022-48652
deleted file mode 100644
index ac8a790b..00000000
--- a/active/CVE-2022-48652
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: ice: Fix crash by keep old cfg when update TCs more than queues
-References:
-Notes:
- carnil> Introduced in a632b2a4c920 ("ice: ethtool: Prohibit improper channel config for
- carnil> DCB"). Vulnerable versions: 5.18.8 5.19-rc4.
-Bugs:
-upstream: released (6.0-rc7) [a509702cac95a8b450228a037c8542f57e538e5b]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48653 b/active/CVE-2022-48653
deleted file mode 100644
index e7cbe9d5..00000000
--- a/active/CVE-2022-48653
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: ice: Don't double unplug aux on peer initiated reset
-References:
-Notes:
- carnil> Introduced in f9f5301e7e2d4 ("ice: Register auxiliary device to provide RDMA").
- carnil> Vulnerable versions: 5.14-rc1.
-Bugs:
-upstream: released (6.0-rc7) [23c619190318376769ad7b61504c2ea0703fb783]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48654 b/active/CVE-2022-48654
deleted file mode 100644
index b2c07c44..00000000
--- a/active/CVE-2022-48654
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()
-References:
-Notes:
- carnil> Introduced in 22c7652cdaa8 ("netfilter: nft_osf: Add version option support").
- carnil> Vulnerable versions: 5.2-rc1.
-Bugs:
-upstream: released (6.0-rc7) [559c36c5a8d730c49ef805a72b213d3bba155cc8]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.146) [5d75fef3e61e797fab5c3fbba88caa74ab92ad47]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.148-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48656 b/active/CVE-2022-48656
deleted file mode 100644
index 08f24036..00000000
--- a/active/CVE-2022-48656
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get()
-References:
-Notes:
- carnil> Introduced in d70241913413 ("dmaengine: ti: k3-udma: Add glue layer for non
- carnil> DMAengine users"). Vulnerable versions: 5.6-rc1.
-Bugs:
-upstream: released (6.0-rc7) [f9fdb0b86f087c2b7f6c6168dd0985a3c1eda87e]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.146) [aa11dae059a439af82bae541b134f8f53ac177b5]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.148-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48657 b/active/CVE-2022-48657
deleted file mode 100644
index 2855b89b..00000000
--- a/active/CVE-2022-48657
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: arm64: topology: fix possible overflow in amu_fie_setup()
-References:
-Notes:
- carnil> Introduced in cd0ed03a8903 ("arm64: use activity monitors for frequency
- carnil> invariance"). Vulnerable versions: 5.7-rc1.
-Bugs:
-upstream: released (6.0-rc7) [d4955c0ad77dbc684fc716387070ac24801b8bca]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.150) [904f881b57360cf85de962d84d8614d94431f60e]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.158-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48658 b/active/CVE-2022-48658
deleted file mode 100644
index c03da401..00000000
--- a/active/CVE-2022-48658
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: mm: slub: fix flush_cpu_slab()/__free_slab() invocations in task context.
-References:
-Notes:
- carnil> Introduced in 5a836bf6b09f ("mm: slub: move flush_cpu_slab() invocations
- carnil> __free_slab() invocations out of IRQ context"). Vulnerable versions: 5.15-rc1.
-Bugs:
-upstream: released (6.0-rc7) [e45cc288724f0cfd497bb5920bcfa60caa335729]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48659 b/active/CVE-2022-48659
deleted file mode 100644
index a66e2df7..00000000
--- a/active/CVE-2022-48659
+++ /dev/null
@@ -1,15 +0,0 @@
-Description: mm/slub: fix to return errno if kmalloc() fails
-References:
-Notes:
- carnil> Introduced in 81819f0fc8285 ("SLUB core"). Vulnerable versions: 2.6.22-rc1.
-Bugs:
-upstream: released (6.0-rc7) [7e9c323c52b379d261a72dc7bd38120a761a93cd]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.146) [379ac7905ff3f0a6a4e507d3e9f710ec4fab9124]
-4.19-upstream-stable: released (4.19.260) [e996821717c5cf8aa1e1abdb6b3d900a231e3755]
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.148-1)
-4.19-buster-security: released (4.19.260-1)
diff --git a/active/CVE-2022-48660 b/active/CVE-2022-48660
deleted file mode 100644
index 67024b9c..00000000
--- a/active/CVE-2022-48660
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully
-References:
-Notes:
- carnil> Introduced in 468242724143 ("gpiolib: cdev: refactor lineevent cleanup into
- carnil> lineevent_free"). Vulnerable versions: 5.9-rc1.
-Bugs:
-upstream: released (6.0-rc7) [69bef19d6b9700e96285f4b4e28691cda3dcd0d1]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.146) [657803b918e097e47d99d1489da83a603c36bcdd]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.148-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48661 b/active/CVE-2022-48661
deleted file mode 100644
index 8efbff38..00000000
--- a/active/CVE-2022-48661
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: gpio: mockup: Fix potential resource leakage when register a chip
-References:
-Notes:
- carnil> Introduced in 6fda593f3082 ("gpio: mockup: Convert to use software nodes").
- carnil> Vulnerable versions: 5.15-rc6.
-Bugs:
-upstream: released (6.0-rc7) [02743c4091ccfb246f5cdbbe3f44b152d5d12933]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48662 b/active/CVE-2022-48662
deleted file mode 100644
index 343594ec..00000000
--- a/active/CVE-2022-48662
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: drm/i915/gem: Really move i915_gem_context.link under ref protection
-References:
-Notes:
- carnil> Introduced in f8246cf4d9a9 ("drm/i915/gem: Drop free_work for GEM contexts").
- carnil> Vulnerable versions: 5.12-rc1.
-Bugs:
-upstream: released (6.0-rc7) [d119888b09bd567e07c6b93a07f175df88857e02]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48663 b/active/CVE-2022-48663
deleted file mode 100644
index 9a679f89..00000000
--- a/active/CVE-2022-48663
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: gpio: mockup: fix NULL pointer dereference when removing debugfs
-References:
-Notes:
- carnil> Introduced in 303e6da99429 ("gpio: mockup: remove gpio debugfs when remove
- carnil> device"). Vulnerable versions: 5.10.144 5.15.69 5.19.10 6.0-rc4.
-Bugs:
-upstream: released (6.0-rc7) [b7df41a6f79dfb18ba2203f8c5f0e9c0b9b57f68]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.146) [bdea98b98f844bd8a983ca880893e509a8b4162f]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.148-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48665 b/active/CVE-2022-48665
deleted file mode 100644
index 12ebb813..00000000
--- a/active/CVE-2022-48665
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: exfat: fix overflow for large capacity partition
-References:
-Notes:
- carnil> Introduced in 1b6138385499 ("exfat: reduce block requests when zeroing a
- carnil> cluster"). Vulnerable versions: 5.19-rc1.
-Bugs:
-upstream: released (6.0-rc7) [2e9ceb6728f1dc2fa4b5d08f37d88cbc49a20a62]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48667 b/active/CVE-2022-48667
deleted file mode 100644
index 97a604bd..00000000
--- a/active/CVE-2022-48667
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: smb3: fix temporary data corruption in insert range
-References:
-Notes:
- carnil> Introduced in 7fe6fe95b936 ("cifs: add FALLOC_FL_INSERT_RANGE support").
- carnil> Vulnerable versions: 5.13-rc1.
-Bugs:
-upstream: released (6.0-rc4) [9c8b7a293f50253e694f19161c045817a938e551]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-48668 b/active/CVE-2022-48668
deleted file mode 100644
index 9c11cb23..00000000
--- a/active/CVE-2022-48668
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: smb3: fix temporary data corruption in collapse range
-References:
-Notes:
- carnil> Introduced in 5476b5dd82c8b ("cifs: add support for FALLOC_FL_COLLAPSE_RANGE").
- carnil> Vulnerable versions: 5.13-rc1.
-Bugs:
-upstream: released (6.0-rc4) [fa30a81f255a56cccd89552cd6ce7ea6e8d8acc4]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.0.2-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2023-52646 b/active/CVE-2023-52646
deleted file mode 100644
index 646710f9..00000000
--- a/active/CVE-2023-52646
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: aio: fix mremap after fork null-deref
-References:
-Notes:
- carnil> Introduced in e4a0d3e720e7 ("aio: Make it possible to remap aio ring").
- carnil> Vulnerable versions: 3.19-rc1.
-Bugs:
-upstream: released (6.2) [81e9d6f8647650a7bead74c5f926e29970e834d1]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: released (6.1.13) [af126acf01a12bdb04986fd26fc2eb3b40249e0d]
-5.10-upstream-stable: released (5.10.169) [c261f798f7baa8080cf0214081d43d5f86bb073f]
-4.19-upstream-stable: released (4.19.273) [d8dca1bfe9adcae38b35add64977818c0c13dd22]
-sid: released (6.1.15-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.178-1)
-4.19-buster-security: released (4.19.282-1)
diff --git a/active/CVE-2024-26678 b/active/CVE-2024-26678
deleted file mode 100644
index c01adbee..00000000
--- a/active/CVE-2024-26678
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section
-References:
-Notes:
- carnil> Introduced in 3e3eabe26dc8 ("x86/boot: Increase section and file alignment to
- carnil> 4k/512"). Vulnerable versions: 6.6.18 6.7-rc1.
-Bugs:
-upstream: released (6.8-rc4) [1ad55cecf22f05f1c884adf63cc09d3c3e609ebf]
-6.7-upstream-stable: released (6.7.5) [4adeeff8c12321cd453412a659c3c0eeb9bb2397]
-6.6-upstream-stable: N/A "Vulnerable code not present"
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26927 b/active/CVE-2024-26927
deleted file mode 100644
index 47cd8c18..00000000
--- a/active/CVE-2024-26927
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: ASoC: SOF: Add some bounds checking to firmware data
-References:
-Notes:
- carnil> Introduced in d2458baa799f ("ASoC: SOF: ipc3-loader: Implement firmware parsing
- carnil> and loading"). Vulnerable versions: 5.19-rc1.
-Bugs:
-upstream: released (6.9-rc1) [98f681b0f84cfc3a1d83287b77697679e0398306]
-6.8-upstream-stable: released (6.8.2) [9eeb8e1231f6450c574c1db979122e171a1813ab]
-6.6-upstream-stable: released (6.6.23) [ced7df8b3c5c4751244cad79011e86cf1f809153]
-6.1-upstream-stable: released (6.1.83) [d133d67e7e724102d1e53009c4f88afaaf3e167c]
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.12-1)
-6.1-bookworm-security: released (6.1.85-1)
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy