summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2024-03-01 00:05:12 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2024-03-01 00:06:46 +0100
commitcc6af1107bed628b4ba7ca6c9d9078ac0dfe86f6 (patch)
tree02fed9588deeba6d08a7ba450e6be001d8ee10f5
parent42ced1a9df7508bd7e456399101a3ce234a52c50 (diff)
Merge Linux CVEs from kernel-sec
-rw-r--r--data/CVE/list56
1 files changed, 56 insertions, 0 deletions
diff --git a/data/CVE/list b/data/CVE/list
index 32a701d956..1e95f441bc 100644
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -1,3 +1,59 @@
+CVE-2021-47068 [net/nfc: fix use-after-free llcp_sock_bind/connect]
+ - linux 5.10.38-1
+ [buster] - linux 4.19.194-1
+ NOTE: https://git.kernel.org/linus/c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6 (5.13-rc1)
+CVE-2021-47067 [soc/tegra: regulators: Fix locking up when voltage-spread is out of range]
+ - linux 5.10.38-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/ef85bb582c41524e9e68dfdbde48e519dac4ab3d (5.13-rc1)
+CVE-2021-47066 [async_xor: increase src_offs when dropping destination page]
+ - linux 5.10.38-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/ceaf2966ab082bbc4d26516f97b3ca8a676e2af8 (5.13-rc1)
+CVE-2021-47065 [rtw88: Fix array overrun in rtw_get_tx_power_params()]
+ - linux 5.10.38-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/2ff25985ea9ccc6c9af2c77b0b49045adcc62e0e (5.13-rc1)
+CVE-2021-47064 [mt76: fix potential DMA mapping leak]
+ - linux 5.10.38-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b4403cee6400c5f679e9c4a82b91d61aa961eccf (5.13-rc1)
+CVE-2021-47063 [drm: bridge/panel: Cleanup connector on bridge detach]
+ - linux 5.10.38-1
+ NOTE: https://git.kernel.org/linus/4d906839d321c2efbf3fed4bc31ffd9ff55b75c0 (5.13-rc1)
+CVE-2021-47062 [KVM: SVM: Use online_vcpus, not created_vcpus, to iterate over vCPUs]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/c36b16d29f3af5f32fc1b2a3401bf48f71cabee1 (5.13-rc1)
+CVE-2021-47061 [KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU]
+ - linux 5.10.38-1
+ NOTE: https://git.kernel.org/linus/2ee3757424be7c1cd1d0bbfa6db29a7edd82a250 (5.13-rc1)
+CVE-2021-47060 [KVM: Stop looking for coalesced MMIO zones if the bus is destroyed]
+ - linux 5.10.38-1
+ NOTE: https://git.kernel.org/linus/5d3c4c79384af06e3c8e25b7770b6247496b4417 (5.13-rc1)
+CVE-2021-47059 [crypto: sun8i-ss - fix result memory leak on error path]
+ - linux 5.10.38-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/1dbc6a1e25be8575d6c4114d1d2b841a796507f7 (5.13-rc1)
+CVE-2021-47058 [regmap: set debugfs_name to NULL after it is freed]
+ - linux 5.10.38-1
+ [buster] - linux 4.19.194-1
+ NOTE: https://git.kernel.org/linus/e41a962f82e7afb5b1ee644f48ad0b3aee656268 (5.13-rc1)
+CVE-2021-47057 [crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map]
+ - linux 5.10.38-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/98b5ef3e97b16eaeeedb936f8bda3594ff84a70e (5.13-rc1)
+CVE-2021-47056 [crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init]
+ - linux 5.10.38-1
+ [buster] - linux 4.19.194-1
+ NOTE: https://git.kernel.org/linus/8609f5cfdc872fc3a462efa6a3eca5cb1e2f6446 (5.13-rc1)
+CVE-2021-47055 [mtd: require write permissions for locking and badblock ioctls]
+ - linux 5.10.38-1
+ [buster] - linux 4.19.194-1
+ NOTE: https://git.kernel.org/linus/1e97743fd180981bef5f01402342bb54bf1c6366 (5.13-rc1)
+CVE-2021-47054 [bus: qcom: Put child node before return]
+ - linux 5.10.38-1
+ [buster] - linux 4.19.194-1
+ NOTE: https://git.kernel.org/linus/ac6ad7c2a862d682bb584a4bc904d89fa7721af8 (5.13-rc1)
CVE-2021-47020 [soundwire: stream: fix memory leak in stream config error path]
- linux 5.10.38-1
[buster] - linux 4.19.194-1

© 2014-2024 Faster IT GmbH | imprint | privacy policy