Description
In the Linux kernel, the following vulnerability has been resolved: tracing: Prevent bad count for tracing_cpumask_write If a large count is provided, it will trigger a warning in bitmap_parse_user. Also check zero for it.
Product status
9e01c1b74c9531e301c900edaa92a99fcb7738f2 (git) before 2558d753df0628d4187d8e1fd989339460f4f364
9e01c1b74c9531e301c900edaa92a99fcb7738f2 (git) before f60172b447317cb6c5e74b5601a151866269baf6
9e01c1b74c9531e301c900edaa92a99fcb7738f2 (git) before 3d15f4c2449558ffe83b4dba30614ef1cd6937c3
9e01c1b74c9531e301c900edaa92a99fcb7738f2 (git) before 03041e474a6a8f1bfd4b96b164bb3165c48fa1a3
9e01c1b74c9531e301c900edaa92a99fcb7738f2 (git) before 1cca920af19df5dd91254e5ff35e68e911683706
9e01c1b74c9531e301c900edaa92a99fcb7738f2 (git) before 98feccbf32cfdde8c722bc4587aaa60ee5ac33f0
2.6.29
Any version before 2.6.29
5.10.233 (semver)
5.15.176 (semver)
6.1.123 (semver)
6.6.69 (semver)
6.12.8 (semver)
6.13 (original_commit_for_fix)
References
lists.debian.org/debian-lts-announce/2025/03/msg00001.html
lists.debian.org/debian-lts-announce/2025/03/msg00002.html
git.kernel.org/...c/2558d753df0628d4187d8e1fd989339460f4f364
git.kernel.org/...c/f60172b447317cb6c5e74b5601a151866269baf6
git.kernel.org/...c/3d15f4c2449558ffe83b4dba30614ef1cd6937c3
git.kernel.org/...c/03041e474a6a8f1bfd4b96b164bb3165c48fa1a3
git.kernel.org/...c/1cca920af19df5dd91254e5ff35e68e911683706
git.kernel.org/...c/98feccbf32cfdde8c722bc4587aaa60ee5ac33f0