* [ANNOUNCE] Release v4.19.325-cip118
@ 2025-03-11 13:18 Ulrich Hecht
0 siblings, 0 replies; only message in thread
From: Ulrich Hecht @ 2025-03-11 13:18 UTC (permalink / raw)
To: cip-dev@lists.cip-project.org, pavel@denx.de,
jan.kiszka@siemens.com, masami.ichikawa@cybertrust.co.jp,
chris.paterson2@renesas.com, nobuhiro1.iwamatsu@toshiba.co.jp
Hi,
the CIP kernel team has released Linux kernel v4.19.325-cip118. The linux-4.19.y-cip tree's base version has been updated to v4.19-st2. The trees are up-to-date with kernel 5.4.290.
You can get this release via the git tree or as a tarball from https://mirrors.edge.kernel.org/pub/linux/kernel/projects/cip/4.19/
v4.19.325-cip118:
repository:
https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git
branch:
linux-4.19.y-cip
commit hash:
897293ec51a382f6f3534a971e06a3440c7c92ca
Fixed CVEs:
CVE-2023-35827: net: ravb: Fix possible UAF bug in ravb_remove
CVE-2023-52509: ravb: Fix use-after-free issue in ravb_tx_timeout_work()
CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc
CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release()
CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
CVE-2024-57904: iio: adc: at91: call input_free_device() on allocated iio_dev
CVE-2024-57906: iio: adc: ti-ads8688: fix information leak in triggered buffer
CVE-2024-57908: iio: imu: kmx61: fix information leak in triggered buffer
CVE-2024-57911: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer
CVE-2024-57912: iio: pressure: zpa2326: fix information leak in triggered buffer
CVE-2024-57913: usb: gadget: f_fs: Remove WARN_ON in functionfs_bind
CVE-2024-57922: drm/amd/display: Add check for granularity in dml ceil/floor helpers
CVE-2024-57929: dm array: fix releasing a faulty array block twice in dm_array_cursor_end
CVE-2024-57948: mac802154: check local interfaces before deleting sdata list
CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy
CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy
CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy
CVE-2025-21664: dm thin: make get_first_thin use rcu-safe list first function
CVE-2025-21687: vfio/platform: check the bounds of read/write syscalls
CVE-2025-21689: USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
CVE-2025-21694: fs/proc: fix softlockup in __read_vmcore (part 2)
CVE-2025-21699: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag
CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash()
Best regards,
Ulrich Hecht
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2025-03-11 13:18 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-03-11 13:18 [ANNOUNCE] Release v4.19.325-cip118 Ulrich Hecht
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox