From 4ec58ba3413a354da4f0d015a6b51e187abd98a7 Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Sun, 28 Apr 2024 16:52:55 +0200 Subject: Add new CVEs assigned by Linux kernel CNA --- active/CVE-2022-48631 | 15 +++++++++++++++ active/CVE-2022-48632 | 16 ++++++++++++++++ active/CVE-2022-48633 | 15 +++++++++++++++ active/CVE-2022-48634 | 15 +++++++++++++++ active/CVE-2022-48635 | 16 ++++++++++++++++ active/CVE-2022-48636 | 16 ++++++++++++++++ active/CVE-2022-48637 | 16 ++++++++++++++++ active/CVE-2022-48638 | 16 ++++++++++++++++ active/CVE-2022-48639 | 16 ++++++++++++++++ active/CVE-2022-48640 | 16 ++++++++++++++++ active/CVE-2022-48641 | 17 +++++++++++++++++ active/CVE-2022-48642 | 16 ++++++++++++++++ active/CVE-2022-48643 | 16 ++++++++++++++++ active/CVE-2022-48644 | 16 ++++++++++++++++ active/CVE-2022-48645 | 16 ++++++++++++++++ active/CVE-2022-48646 | 16 ++++++++++++++++ active/CVE-2022-48647 | 17 +++++++++++++++++ active/CVE-2022-48648 | 16 ++++++++++++++++ active/CVE-2022-48649 | 17 +++++++++++++++++ active/CVE-2022-48650 | 16 ++++++++++++++++ active/CVE-2022-48651 | 16 ++++++++++++++++ active/CVE-2022-48652 | 16 ++++++++++++++++ active/CVE-2022-48653 | 16 ++++++++++++++++ active/CVE-2022-48654 | 16 ++++++++++++++++ active/CVE-2022-48655 | 15 +++++++++++++++ active/CVE-2022-48656 | 16 ++++++++++++++++ active/CVE-2022-48657 | 16 ++++++++++++++++ active/CVE-2022-48658 | 16 ++++++++++++++++ active/CVE-2022-48659 | 15 +++++++++++++++ active/CVE-2022-48660 | 16 ++++++++++++++++ active/CVE-2022-48661 | 16 ++++++++++++++++ active/CVE-2022-48662 | 16 ++++++++++++++++ active/CVE-2022-48663 | 16 ++++++++++++++++ active/CVE-2022-48664 | 16 ++++++++++++++++ active/CVE-2022-48665 | 16 ++++++++++++++++ active/CVE-2022-48666 | 16 ++++++++++++++++ active/CVE-2022-48667 | 16 ++++++++++++++++ active/CVE-2022-48668 | 16 ++++++++++++++++ active/CVE-2024-26927 | 16 ++++++++++++++++ active/CVE-2024-26928 | 15 +++++++++++++++ 40 files changed, 637 insertions(+) create mode 100644 active/CVE-2022-48631 create mode 100644 active/CVE-2022-48632 create mode 100644 active/CVE-2022-48633 create mode 100644 active/CVE-2022-48634 create mode 100644 active/CVE-2022-48635 create mode 100644 active/CVE-2022-48636 create mode 100644 active/CVE-2022-48637 create mode 100644 active/CVE-2022-48638 create mode 100644 active/CVE-2022-48639 create mode 100644 active/CVE-2022-48640 create mode 100644 active/CVE-2022-48641 create mode 100644 active/CVE-2022-48642 create mode 100644 active/CVE-2022-48643 create mode 100644 active/CVE-2022-48644 create mode 100644 active/CVE-2022-48645 create mode 100644 active/CVE-2022-48646 create mode 100644 active/CVE-2022-48647 create mode 100644 active/CVE-2022-48648 create mode 100644 active/CVE-2022-48649 create mode 100644 active/CVE-2022-48650 create mode 100644 active/CVE-2022-48651 create mode 100644 active/CVE-2022-48652 create mode 100644 active/CVE-2022-48653 create mode 100644 active/CVE-2022-48654 create mode 100644 active/CVE-2022-48655 create mode 100644 active/CVE-2022-48656 create mode 100644 active/CVE-2022-48657 create mode 100644 active/CVE-2022-48658 create mode 100644 active/CVE-2022-48659 create mode 100644 active/CVE-2022-48660 create mode 100644 active/CVE-2022-48661 create mode 100644 active/CVE-2022-48662 create mode 100644 active/CVE-2022-48663 create mode 100644 active/CVE-2022-48664 create mode 100644 active/CVE-2022-48665 create mode 100644 active/CVE-2022-48666 create mode 100644 active/CVE-2022-48667 create mode 100644 active/CVE-2022-48668 create mode 100644 active/CVE-2024-26927 create mode 100644 active/CVE-2024-26928 diff --git a/active/CVE-2022-48631 b/active/CVE-2022-48631 new file mode 100644 index 00000000..8f593249 --- /dev/null +++ b/active/CVE-2022-48631 @@ -0,0 +1,15 @@ +Description: ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth > 0 +References: +Notes: + carnil> First introducing commit could not be determined. +Bugs: +upstream: released (6.0-rc7) [29a5b8a137ac8eb410cc823653a29ac0e7b7e1b0] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [958b0ee23f5ac106e7cc11472b71aa2ea9a033bc] +4.19-upstream-stable: needed +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: needed diff --git a/active/CVE-2022-48632 b/active/CVE-2022-48632 new file mode 100644 index 00000000..cd0938e4 --- /dev/null +++ b/active/CVE-2022-48632 @@ -0,0 +1,16 @@ +Description: i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() +References: +Notes: + carnil> Introduced in b5b5b32081cd206b ("i2c: mlxbf: I2C SMBus driver for Mellanox + carnil> BlueField SoC"). Vulnerable versions: 5.10-rc1. +Bugs: +upstream: released (6.0-rc7) [de24aceb07d426b6f1c59f33889d6a964770547b] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [48ee0a864d1af02eea98fc825cc230d61517a71e] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48633 b/active/CVE-2022-48633 new file mode 100644 index 00000000..0ee2aa84 --- /dev/null +++ b/active/CVE-2022-48633 @@ -0,0 +1,15 @@ +Description: drm/gma500: Fix WARN_ON(lock->magic != lock) error +References: +Notes: + carnil> First introducing commit could not be determined. +Bugs: +upstream: released (6.0-rc6) [b6f25c3b94f2aadbf5cbef954db4073614943d74] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: needed +4.19-upstream-stable: needed +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: needed +4.19-buster-security: needed diff --git a/active/CVE-2022-48634 b/active/CVE-2022-48634 new file mode 100644 index 00000000..45410030 --- /dev/null +++ b/active/CVE-2022-48634 @@ -0,0 +1,15 @@ +Description: drm/gma500: Fix BUG: sleeping function called from invalid context errors +References: +Notes: + carnil> First introducing commit could not be determined. +Bugs: +upstream: released (6.0-rc6) [63e37a79f7bd939314997e29c2f5a9f0ef184281] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [c5812807e416618477d1bb0049727ce8bb8292fd] +4.19-upstream-stable: needed +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: needed diff --git a/active/CVE-2022-48635 b/active/CVE-2022-48635 new file mode 100644 index 00000000..ec8882e9 --- /dev/null +++ b/active/CVE-2022-48635 @@ -0,0 +1,16 @@ +Description: fsdax: Fix infinite loop in dax_iomap_rw() +References: +Notes: + carnil> Introduced in ca289e0b95af ("fsdax: switch dax_iomap_rw to use iomap_iter"). + carnil> Vulnerable versions: 5.15-rc1. +Bugs: +upstream: released (6.0-rc7) [17d9c15c9b9e7fb285f7ac5367dfb5f00ff575e3] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48636 b/active/CVE-2022-48636 new file mode 100644 index 00000000..67a567a1 --- /dev/null +++ b/active/CVE-2022-48636 @@ -0,0 +1,16 @@ +Description: s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup +References: +Notes: + carnil> Introduced in 8e09f21574ea ("[S390] dasd: add hyper PAV support to DASD device + carnil> driver, part 1"). Vulnerable versions: 2.6.25-rc1. +Bugs: +upstream: released (6.0-rc7) [db7ba07108a48c0f95b74fabbfd5d63e924f992d] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [f5fcc9d6d71d9ff7fdbdd4b89074e6e24fffc20b] +4.19-upstream-stable: released (4.19.260) [aaba5ff2742043705bc4c02fd0b2b246e2e16da1] +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: released (4.19.260-1) diff --git a/active/CVE-2022-48637 b/active/CVE-2022-48637 new file mode 100644 index 00000000..848d05fb --- /dev/null +++ b/active/CVE-2022-48637 @@ -0,0 +1,16 @@ +Description: bnxt: prevent skb UAF after handing over to PTP worker +References: +Notes: + carnil> Introduced in 83bb623c968e ("bnxt_en: Transmit and retrieve packet + carnil> timestamps"). Vulnerable versions: 5.14-rc1. +Bugs: +upstream: released (6.0-rc7) [c31f26c8f69f776759cbbdfb38e40ea91aa0dd65] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48638 b/active/CVE-2022-48638 new file mode 100644 index 00000000..5e946ca2 --- /dev/null +++ b/active/CVE-2022-48638 @@ -0,0 +1,16 @@ +Description: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory +References: +Notes: + carnil> Introduced in 6b658c4863c1 ("scsi: cgroup: Add cgroup_get_from_id()"). + carnil> Vulnerable versions: 5.14-rc1. +Bugs: +upstream: released (6.0-rc7) [df02452f3df069a59bc9e69c84435bf115cb6e37] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48639 b/active/CVE-2022-48639 new file mode 100644 index 00000000..6990910d --- /dev/null +++ b/active/CVE-2022-48639 @@ -0,0 +1,16 @@ +Description: net: sched: fix possible refcount leak in tc_new_tfilter() +References: +Notes: + carnil> Introduced in 7d5509fa0d3d ("net: sched: extend proto ops with 'put' + carnil> callback"). Vulnerable versions: 5.1-rc1. +Bugs: +upstream: released (6.0-rc7) [c2e1cfefcac35e0eea229e148c8284088ce437b5] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [8844c750eeb03452e2b3319c27a526f447b82596] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48640 b/active/CVE-2022-48640 new file mode 100644 index 00000000..5432ecd8 --- /dev/null +++ b/active/CVE-2022-48640 @@ -0,0 +1,16 @@ +Description: bonding: fix NULL deref in bond_rr_gen_slave_id +References: +Notes: + carnil> Introduced in 848ca9182a7d ("net: bonding: Use per-cpu rr_tx_counter"). + carnil> Vulnerable versions: 5.14-rc1. +Bugs: +upstream: released (6.0-rc7) [0e400d602f46360752e4b32ce842dba3808e15e6] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48641 b/active/CVE-2022-48641 new file mode 100644 index 00000000..00876859 --- /dev/null +++ b/active/CVE-2022-48641 @@ -0,0 +1,17 @@ +Description: netfilter: ebtables: fix memory leak when blob is malformed +References: +Notes: + carnil> Introduced in 7997eff82828 ("netfilter: ebtables: reject blobs that don't + carnil> provide all entry points"). Vulnerable versions: 4.14.292 4.19.257 5.4.212 + carnil> 5.10.140 5.15.64 5.19.6 6.0-rc3. +Bugs: +upstream: released (6.0-rc7) [62ce44c4fff947eebdf10bb582267e686e6835c9] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee] +4.19-upstream-stable: released (4.19.260) [1e98318af2f163eadaff815abcef38d27ca92c1e] +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: released (4.19.260-1) diff --git a/active/CVE-2022-48642 b/active/CVE-2022-48642 new file mode 100644 index 00000000..6a1e6ea4 --- /dev/null +++ b/active/CVE-2022-48642 @@ -0,0 +1,16 @@ +Description: netfilter: nf_tables: fix percpu memory leak at nf_tables_addchain() +References: +Notes: + carnil> Introduced in 3bc158f8d0330f0a ("netfilter: nf_tables: map basechain priority + carnil> to hardware priority"). Vulnerable versions: 5.3-rc6. +Bugs: +upstream: released (6.0-rc7) [9a4d6dd554b86e65581ef6b6638a39ae079b17ac] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [b043a525a3f5520abb676a7cd8f6328fdf959e88] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48643 b/active/CVE-2022-48643 new file mode 100644 index 00000000..8a6f65c3 --- /dev/null +++ b/active/CVE-2022-48643 @@ -0,0 +1,16 @@ +Description: netfilter: nf_tables: fix nft_counters_enabled underflow at nf_tables_addchain() +References: +Notes: + carnil> Introduced in 43eb8949cfdffa76 ("netfilter: nf_tables: do not leave chain stats + carnil> enabled on error"). Vulnerable versions: 5.10.140 5.15.64 5.19.6 6.0-rc3. +Bugs: +upstream: released (6.0-rc7) [921ebde3c0d22c8cba74ce8eb3cc4626abff1ccd] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [710e3f526bd23a0d33435dedc52c3144de284378] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48644 b/active/CVE-2022-48644 new file mode 100644 index 00000000..baf1c5cc --- /dev/null +++ b/active/CVE-2022-48644 @@ -0,0 +1,16 @@ +Description: net/sched: taprio: avoid disabling offload when it was never enabled +References: +Notes: + carnil> Introduced in 9c66d1564676 ("taprio: Add support for hardware offloading"). + carnil> Vulnerable versions: 5.4-rc1. +Bugs: +upstream: released (6.0-rc7) [db46e3a88a09c5cf7e505664d01da7238cd56c92] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [586def6ebed195f3594a4884f7c5334d0e1ad1bb] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48645 b/active/CVE-2022-48645 new file mode 100644 index 00000000..41c6fb87 --- /dev/null +++ b/active/CVE-2022-48645 @@ -0,0 +1,16 @@ +Description: net: enetc: deny offload of tc-based TSN features on VF interfaces +References: +Notes: + carnil> Introduced in 34c6adf1977b ("enetc: Configure the Time-Aware Scheduler via + carnil> tc-taprio offload"). Vulnerable versions: 5.5-rc1. +Bugs: +upstream: released (6.0-rc7) [5641c751fe2f92d3d9e8a8e03c1263ac8caa0b42] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: needed +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: needed +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48646 b/active/CVE-2022-48646 new file mode 100644 index 00000000..6db6b6a7 --- /dev/null +++ b/active/CVE-2022-48646 @@ -0,0 +1,16 @@ +Description: sfc/siena: fix null pointer dereference in efx_hard_start_xmit +References: +Notes: + carnil> Introduced in 12804793b17c ("sfc: decouple TXQ type from label"). Vulnerable + carnil> versions: 5.10-rc1. +Bugs: +upstream: released (6.0-rc7) [589c6eded10c77a12b7b2cf235b6b19a2bdb91fa] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: needed +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: needed +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48647 b/active/CVE-2022-48647 new file mode 100644 index 00000000..b0d02ef8 --- /dev/null +++ b/active/CVE-2022-48647 @@ -0,0 +1,17 @@ +Description: sfc: fix TX channel offset when using legacy interrupts +References: +Notes: + carnil> Introduced in c308dfd1b43e ("sfc: fix wrong tx channel offset with + carnil> efx_separate_tx_channels"). Vulnerable versions: 5.10.122 5.15.47 5.17.15 + carnil> 5.18.4 5.19-rc1. +Bugs: +upstream: released (6.0-rc7) [f232af4295653afa4ade3230462b3be15ad16419] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [b4afd3878f961d3517f27b3213730fceef77945c] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48648 b/active/CVE-2022-48648 new file mode 100644 index 00000000..9fd27857 --- /dev/null +++ b/active/CVE-2022-48648 @@ -0,0 +1,16 @@ +Description: sfc: fix null pointer dereference in efx_hard_start_xmit +References: +Notes: + carnil> Introduced in 12804793b17c ("sfc: decouple TXQ type from label"). Vulnerable + carnil> versions: 5.10-rc1. +Bugs: +upstream: released (6.0-rc7) [0a242eb2913a4aa3d6fbdb86559f27628e9466f3] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [b3b41d4d95d3822b2e459ecbc80d030ea6aec5e7] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48649 b/active/CVE-2022-48649 new file mode 100644 index 00000000..f041dd69 --- /dev/null +++ b/active/CVE-2022-48649 @@ -0,0 +1,17 @@ +Description: mm/slab_common: fix possible double free of kmem_cache +References: +Notes: + carnil> Introduced in 0495e337b703 ("mm/slab_common: Deleting kobject in + carnil> kmem_cache_destroy() without holding slab_mutex/cpu_hotplug_lock"). Vulnerable + carnil> versions: 5.19.8 6.0-rc4. +Bugs: +upstream: released (6.0-rc7) [d71608a877362becdc94191f190902fac1e64d35] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48650 b/active/CVE-2022-48650 new file mode 100644 index 00000000..c86054d6 --- /dev/null +++ b/active/CVE-2022-48650 @@ -0,0 +1,16 @@ +Description: scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts() +References: +Notes: + carnil> Introduced in 8f394da36a36 ("scsi: qla2xxx: Drop + carnil> TARGET_SCF_LOOKUP_LUN_FROM_TAG"). Vulnerable versions: 5.11-rc1. +Bugs: +upstream: released (6.0-rc7) [601be20fc6a1b762044d2398befffd6bf236cebf] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48651 b/active/CVE-2022-48651 new file mode 100644 index 00000000..4e2090c9 --- /dev/null +++ b/active/CVE-2022-48651 @@ -0,0 +1,16 @@ +Description: ipvlan: Fix out-of-bound bugs caused by unset skb->mac_header +References: +Notes: + carnil> Introduced in 2ad7bf363841 ("ipvlan: Initial check-in of the IPVLAN driver."). + carnil> Vulnerable versions: 3.19-rc1. +Bugs: +upstream: released (6.0-rc7) [81225b2ea161af48e093f58e8dfee6d705b16af4] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [ab4a733874ead120691e8038272d22f8444d3638] +4.19-upstream-stable: released (4.19.260) [bffcdade259c05ab3436b5fab711612093c275ef] +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: released (4.19.260-1) diff --git a/active/CVE-2022-48652 b/active/CVE-2022-48652 new file mode 100644 index 00000000..ac8a790b --- /dev/null +++ b/active/CVE-2022-48652 @@ -0,0 +1,16 @@ +Description: ice: Fix crash by keep old cfg when update TCs more than queues +References: +Notes: + carnil> Introduced in a632b2a4c920 ("ice: ethtool: Prohibit improper channel config for + carnil> DCB"). Vulnerable versions: 5.18.8 5.19-rc4. +Bugs: +upstream: released (6.0-rc7) [a509702cac95a8b450228a037c8542f57e538e5b] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48653 b/active/CVE-2022-48653 new file mode 100644 index 00000000..e7cbe9d5 --- /dev/null +++ b/active/CVE-2022-48653 @@ -0,0 +1,16 @@ +Description: ice: Don't double unplug aux on peer initiated reset +References: +Notes: + carnil> Introduced in f9f5301e7e2d4 ("ice: Register auxiliary device to provide RDMA"). + carnil> Vulnerable versions: 5.14-rc1. +Bugs: +upstream: released (6.0-rc7) [23c619190318376769ad7b61504c2ea0703fb783] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48654 b/active/CVE-2022-48654 new file mode 100644 index 00000000..b2c07c44 --- /dev/null +++ b/active/CVE-2022-48654 @@ -0,0 +1,16 @@ +Description: netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find() +References: +Notes: + carnil> Introduced in 22c7652cdaa8 ("netfilter: nft_osf: Add version option support"). + carnil> Vulnerable versions: 5.2-rc1. +Bugs: +upstream: released (6.0-rc7) [559c36c5a8d730c49ef805a72b213d3bba155cc8] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [5d75fef3e61e797fab5c3fbba88caa74ab92ad47] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48655 b/active/CVE-2022-48655 new file mode 100644 index 00000000..e0315b65 --- /dev/null +++ b/active/CVE-2022-48655 @@ -0,0 +1,15 @@ +Description: firmware: arm_scmi: Harden accesses to the reset domains +References: +Notes: + carnil> First introducing commit could not be determined. +Bugs: +upstream: released (6.0-rc7) [e9076ffbcaed5da6c182b144ef9f6e24554af268] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: needed +4.19-upstream-stable: needed +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: needed +4.19-buster-security: needed diff --git a/active/CVE-2022-48656 b/active/CVE-2022-48656 new file mode 100644 index 00000000..08f24036 --- /dev/null +++ b/active/CVE-2022-48656 @@ -0,0 +1,16 @@ +Description: dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get() +References: +Notes: + carnil> Introduced in d70241913413 ("dmaengine: ti: k3-udma: Add glue layer for non + carnil> DMAengine users"). Vulnerable versions: 5.6-rc1. +Bugs: +upstream: released (6.0-rc7) [f9fdb0b86f087c2b7f6c6168dd0985a3c1eda87e] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [aa11dae059a439af82bae541b134f8f53ac177b5] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48657 b/active/CVE-2022-48657 new file mode 100644 index 00000000..2855b89b --- /dev/null +++ b/active/CVE-2022-48657 @@ -0,0 +1,16 @@ +Description: arm64: topology: fix possible overflow in amu_fie_setup() +References: +Notes: + carnil> Introduced in cd0ed03a8903 ("arm64: use activity monitors for frequency + carnil> invariance"). Vulnerable versions: 5.7-rc1. +Bugs: +upstream: released (6.0-rc7) [d4955c0ad77dbc684fc716387070ac24801b8bca] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.150) [904f881b57360cf85de962d84d8614d94431f60e] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.158-1) +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48658 b/active/CVE-2022-48658 new file mode 100644 index 00000000..c03da401 --- /dev/null +++ b/active/CVE-2022-48658 @@ -0,0 +1,16 @@ +Description: mm: slub: fix flush_cpu_slab()/__free_slab() invocations in task context. +References: +Notes: + carnil> Introduced in 5a836bf6b09f ("mm: slub: move flush_cpu_slab() invocations + carnil> __free_slab() invocations out of IRQ context"). Vulnerable versions: 5.15-rc1. +Bugs: +upstream: released (6.0-rc7) [e45cc288724f0cfd497bb5920bcfa60caa335729] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48659 b/active/CVE-2022-48659 new file mode 100644 index 00000000..a66e2df7 --- /dev/null +++ b/active/CVE-2022-48659 @@ -0,0 +1,15 @@ +Description: mm/slub: fix to return errno if kmalloc() fails +References: +Notes: + carnil> Introduced in 81819f0fc8285 ("SLUB core"). Vulnerable versions: 2.6.22-rc1. +Bugs: +upstream: released (6.0-rc7) [7e9c323c52b379d261a72dc7bd38120a761a93cd] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [379ac7905ff3f0a6a4e507d3e9f710ec4fab9124] +4.19-upstream-stable: released (4.19.260) [e996821717c5cf8aa1e1abdb6b3d900a231e3755] +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: released (4.19.260-1) diff --git a/active/CVE-2022-48660 b/active/CVE-2022-48660 new file mode 100644 index 00000000..67024b9c --- /dev/null +++ b/active/CVE-2022-48660 @@ -0,0 +1,16 @@ +Description: gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully +References: +Notes: + carnil> Introduced in 468242724143 ("gpiolib: cdev: refactor lineevent cleanup into + carnil> lineevent_free"). Vulnerable versions: 5.9-rc1. +Bugs: +upstream: released (6.0-rc7) [69bef19d6b9700e96285f4b4e28691cda3dcd0d1] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [657803b918e097e47d99d1489da83a603c36bcdd] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48661 b/active/CVE-2022-48661 new file mode 100644 index 00000000..8efbff38 --- /dev/null +++ b/active/CVE-2022-48661 @@ -0,0 +1,16 @@ +Description: gpio: mockup: Fix potential resource leakage when register a chip +References: +Notes: + carnil> Introduced in 6fda593f3082 ("gpio: mockup: Convert to use software nodes"). + carnil> Vulnerable versions: 5.15-rc6. +Bugs: +upstream: released (6.0-rc7) [02743c4091ccfb246f5cdbbe3f44b152d5d12933] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48662 b/active/CVE-2022-48662 new file mode 100644 index 00000000..343594ec --- /dev/null +++ b/active/CVE-2022-48662 @@ -0,0 +1,16 @@ +Description: drm/i915/gem: Really move i915_gem_context.link under ref protection +References: +Notes: + carnil> Introduced in f8246cf4d9a9 ("drm/i915/gem: Drop free_work for GEM contexts"). + carnil> Vulnerable versions: 5.12-rc1. +Bugs: +upstream: released (6.0-rc7) [d119888b09bd567e07c6b93a07f175df88857e02] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48663 b/active/CVE-2022-48663 new file mode 100644 index 00000000..9a679f89 --- /dev/null +++ b/active/CVE-2022-48663 @@ -0,0 +1,16 @@ +Description: gpio: mockup: fix NULL pointer dereference when removing debugfs +References: +Notes: + carnil> Introduced in 303e6da99429 ("gpio: mockup: remove gpio debugfs when remove + carnil> device"). Vulnerable versions: 5.10.144 5.15.69 5.19.10 6.0-rc4. +Bugs: +upstream: released (6.0-rc7) [b7df41a6f79dfb18ba2203f8c5f0e9c0b9b57f68] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.146) [bdea98b98f844bd8a983ca880893e509a8b4162f] +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48664 b/active/CVE-2022-48664 new file mode 100644 index 00000000..d5825df7 --- /dev/null +++ b/active/CVE-2022-48664 @@ -0,0 +1,16 @@ +Description: btrfs: fix hang during unmount when stopping a space reclaim worker +References: +Notes: + carnil> Introduced in d6fd0ae25c6495 ("Btrfs: fix missing delayed iputs on unmount"). + carnil> Vulnerable versions: 4.14.120 4.19.12 4.20-rc2. +Bugs: +upstream: released (6.0-rc7) [a362bb864b8db4861977d00bd2c3222503ccc34b] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: released (5.10.147) [6ac5b52e3f352f9cb270c89e6e1d4dadb564ddb8] +4.19-upstream-stable: needed +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: needed diff --git a/active/CVE-2022-48665 b/active/CVE-2022-48665 new file mode 100644 index 00000000..12ebb813 --- /dev/null +++ b/active/CVE-2022-48665 @@ -0,0 +1,16 @@ +Description: exfat: fix overflow for large capacity partition +References: +Notes: + carnil> Introduced in 1b6138385499 ("exfat: reduce block requests when zeroing a + carnil> cluster"). Vulnerable versions: 5.19-rc1. +Bugs: +upstream: released (6.0-rc7) [2e9ceb6728f1dc2fa4b5d08f37d88cbc49a20a62] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48666 b/active/CVE-2022-48666 new file mode 100644 index 00000000..d1a5b8f3 --- /dev/null +++ b/active/CVE-2022-48666 @@ -0,0 +1,16 @@ +Description: scsi: core: Fix a use-after-free +References: +Notes: + carnil> Introduced in 65ca846a5314 ("scsi: core: Introduce {init,exit}_cmd_priv()"). + carnil> Vulnerable versions: 5.7-rc1. +Bugs: +upstream: released (6.0-rc5) [8fe4ce5836e932f5766317cb651c1ff2a4cd0506] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: needed +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: needed +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48667 b/active/CVE-2022-48667 new file mode 100644 index 00000000..97a604bd --- /dev/null +++ b/active/CVE-2022-48667 @@ -0,0 +1,16 @@ +Description: smb3: fix temporary data corruption in insert range +References: +Notes: + carnil> Introduced in 7fe6fe95b936 ("cifs: add FALLOC_FL_INSERT_RANGE support"). + carnil> Vulnerable versions: 5.13-rc1. +Bugs: +upstream: released (6.0-rc4) [9c8b7a293f50253e694f19161c045817a938e551] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2022-48668 b/active/CVE-2022-48668 new file mode 100644 index 00000000..9c11cb23 --- /dev/null +++ b/active/CVE-2022-48668 @@ -0,0 +1,16 @@ +Description: smb3: fix temporary data corruption in collapse range +References: +Notes: + carnil> Introduced in 5476b5dd82c8b ("cifs: add support for FALLOC_FL_COLLAPSE_RANGE"). + carnil> Vulnerable versions: 5.13-rc1. +Bugs: +upstream: released (6.0-rc4) [fa30a81f255a56cccd89552cd6ce7ea6e8d8acc4] +6.8-upstream-stable: N/A "Fixed before branching point" +6.6-upstream-stable: N/A "Fixed before branching point" +6.1-upstream-stable: N/A "Fixed before branching point" +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.0.2-1) +6.1-bookworm-security: N/A "Fixed before branching point" +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2024-26927 b/active/CVE-2024-26927 new file mode 100644 index 00000000..47cd8c18 --- /dev/null +++ b/active/CVE-2024-26927 @@ -0,0 +1,16 @@ +Description: ASoC: SOF: Add some bounds checking to firmware data +References: +Notes: + carnil> Introduced in d2458baa799f ("ASoC: SOF: ipc3-loader: Implement firmware parsing + carnil> and loading"). Vulnerable versions: 5.19-rc1. +Bugs: +upstream: released (6.9-rc1) [98f681b0f84cfc3a1d83287b77697679e0398306] +6.8-upstream-stable: released (6.8.2) [9eeb8e1231f6450c574c1db979122e171a1813ab] +6.6-upstream-stable: released (6.6.23) [ced7df8b3c5c4751244cad79011e86cf1f809153] +6.1-upstream-stable: released (6.1.83) [d133d67e7e724102d1e53009c4f88afaaf3e167c] +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +sid: released (6.7.12-1) +6.1-bookworm-security: released (6.1.85-1) +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2024-26928 b/active/CVE-2024-26928 new file mode 100644 index 00000000..6ce012ab --- /dev/null +++ b/active/CVE-2024-26928 @@ -0,0 +1,15 @@ +Description: smb: client: fix potential UAF in cifs_debug_files_proc_show() +References: +Notes: + carnil> First introducing commit could not be determined. +Bugs: +upstream: released (6.9-rc3) [ca545b7f0823f19db0f1148d59bc5e1a56634502] +6.8-upstream-stable: released (6.8.5) [3402faf78b2516b0af1259baff50cc8453ef0bd1] +6.6-upstream-stable: released (6.6.26) [a65f2b56334ba4dc30bd5ee9ce5b2691b973344d] +6.1-upstream-stable: released (6.1.85) [229042314602db62559ecacba127067c22ee7b88] +5.10-upstream-stable: needed +4.19-upstream-stable: needed +sid: needed +6.1-bookworm-security: released (6.1.85-1) +5.10-bullseye-security: needed +4.19-buster-security: needed -- cgit v1.2.3