summaryrefslogtreecommitdiffstats
path: root/active
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2024-05-03 17:41:51 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2024-05-03 17:41:51 +0200
commitc3f9b126ea57a93df577a2b35548846d732b3eb7 (patch)
tree589e265ebd4973a806f2a2622a54e0e0e3530bfe /active
parent5173a538404e8a473a2400355779be47642f0903 (diff)
Some more CVEs allocated by kernel CNA
Diffstat (limited to 'active')
-rw-r--r--active/CVE-2022-4867015
-rw-r--r--active/CVE-2022-4867117
-rw-r--r--active/CVE-2022-4867216
-rw-r--r--active/CVE-2022-4867316
-rw-r--r--active/CVE-2022-4867417
-rw-r--r--active/CVE-2022-4867516
6 files changed, 97 insertions, 0 deletions
diff --git a/active/CVE-2022-48670 b/active/CVE-2022-48670
new file mode 100644
index 00000000..5f4ceec4
--- /dev/null
+++ b/active/CVE-2022-48670
@@ -0,0 +1,15 @@
+Description: peci: cpu: Fix use-after-free in adev_release()
+References:
+Notes:
+ carnil> First introducing commit could not be determined.
+Bugs:
+upstream: released (6.0-rc4) [1c11289b34ab67ed080bbe0f1855c4938362d9cf]
+6.8-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: needed
+4.19-upstream-stable: needed
+sid: released (5.19.11-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: needed
+4.19-buster-security: needed
diff --git a/active/CVE-2022-48671 b/active/CVE-2022-48671
new file mode 100644
index 00000000..30c54d11
--- /dev/null
+++ b/active/CVE-2022-48671
@@ -0,0 +1,17 @@
+Description: cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()
+References:
+Notes:
+ carnil> Introduced in 4f7e7236435ca0ab ("cgroup: Fix threadgroup_rwsem <->
+ carnil> cpus_read_lock() deadlock"). Vulnerable versions: 4.19.280 5.4.213 5.10.143
+ carnil> 5.15.68 5.19.9 6.0-rc3.
+Bugs:
+upstream: released (6.0-rc3) [43626dade36fa74d3329046f4ae2d7fdefe401c6]
+6.8-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: released (5.10.145) [9f267393b036f1470fb12fb892d59e7ff8aeb58d]
+4.19-upstream-stable: released (4.19.280) [321488cfac7d0eb6d97de467015ff754f85813ff]
+sid: released (5.19.11-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: released (5.10.148-1)
+4.19-buster-security: released (4.19.282-1)
diff --git a/active/CVE-2022-48672 b/active/CVE-2022-48672
new file mode 100644
index 00000000..e2308b03
--- /dev/null
+++ b/active/CVE-2022-48672
@@ -0,0 +1,16 @@
+Description: of: fdt: fix off-by-one error in unflatten_dt_nodes()
+References:
+Notes:
+ carnil> Introduced in 78c44d910d3e ("drivers/of: Fix depth when unflattening
+ carnil> devicetree"). Vulnerable versions: 4.7-rc1.
+Bugs:
+upstream: released (6.0-rc6) [2f945a792f67815abca26fa8a5e863ccf3fa1181]
+6.8-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: released (5.10.145) [ee4369260e77821602102dcc7d792de39a56365c]
+4.19-upstream-stable: released (4.19.260) [2566706ac6393386a4e7c4ce23fe17f4c98d9aa0]
+sid: released (5.19.11-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: released (5.10.148-1)
+4.19-buster-security: released (4.19.260-1)
diff --git a/active/CVE-2022-48673 b/active/CVE-2022-48673
new file mode 100644
index 00000000..2538fb7a
--- /dev/null
+++ b/active/CVE-2022-48673
@@ -0,0 +1,16 @@
+Description: net/smc: Fix possible access to freed memory in link clear
+References:
+Notes:
+ carnil> Introduced in bd4ad57718cc ("smc: initialize IB transport incl. PD, MR, QP, CQ,
+ carnil> event, WR"). Vulnerable versions: 4.11-rc1.
+Bugs:
+upstream: released (6.0-rc5) [e9b1a4f867ae9c1dbd1d71cd09cbdb3239fb4968]
+6.8-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: needed
+4.19-upstream-stable: needed
+sid: released (5.19.11-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: needed
+4.19-buster-security: needed
diff --git a/active/CVE-2022-48674 b/active/CVE-2022-48674
new file mode 100644
index 00000000..b30019d8
--- /dev/null
+++ b/active/CVE-2022-48674
@@ -0,0 +1,17 @@
+Description: erofs: fix pcluster use-after-free on UP platforms
+References:
+Notes:
+ carnil> Introduced in 73f5c66df3e2 ("staging: erofs: fix
+ carnil> `erofs_workgroup_{try_to_freeze, unfreeze}'"). Vulnerable versions: 4.19.26
+ carnil> 4.20.13 5.0-rc1.
+Bugs:
+upstream: released (6.0-rc5) [2f44013e39984c127c6efedf70e6b5f4e9dcf315]
+6.8-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: needed
+4.19-upstream-stable: needed
+sid: released (5.19.11-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: needed
+4.19-buster-security: needed
diff --git a/active/CVE-2022-48675 b/active/CVE-2022-48675
new file mode 100644
index 00000000..0ccec8ae
--- /dev/null
+++ b/active/CVE-2022-48675
@@ -0,0 +1,16 @@
+Description: IB/core: Fix a nested dead lock as part of ODP flow
+References:
+Notes:
+ carnil> Introduced in 36f30e486dce ("IB/core: Improve ODP to use hmm_range_fault()").
+ carnil> Vulnerable versions: 5.10-rc1.
+Bugs:
+upstream: released (6.0-rc5) [85eaeb5058f0f04dffb124c97c86b4f18db0b833]
+6.8-upstream-stable: N/A "Fixed before branching point"
+6.6-upstream-stable: N/A "Fixed before branching point"
+6.1-upstream-stable: N/A "Fixed before branching point"
+5.10-upstream-stable: released (5.10.143) [e8de6cb5755eae7b793d8c00c8696c8667d44a7f]
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (5.19.11-1)
+6.1-bookworm-security: N/A "Fixed before branching point"
+5.10-bullseye-security: released (5.10.148-1)
+4.19-buster-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy