[Git][security-tracker-team/security-tracker][master] Merge Linux kernel CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Apr 4 20:04:47 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
29549584 by Salvatore Bonaccorso at 2024-04-04T21:03:37+02:00
Merge Linux kernel CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,156 @@
+CVE-2024-26809 [netfilter: nft_set_pipapo: release elements in clone only from destroy path]
+ - linux <unfixed>
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b0e256f3dd2ba6532f37c5c22e07cb07a36031ee (6.9-rc1)
+CVE-2024-26808 [netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/01acb2e8666a6529697141a6017edbf206921913 (6.8-rc2)
+CVE-2024-26807 [spi: cadence-qspi: fix pointer reference in runtime PM hooks]
+ - linux 6.7.9-1
+ NOTE: https://git.kernel.org/linus/32ce3bb57b6b402de2aec1012511e7ac4e7449dc (6.8-rc7)
+CVE-2024-26806 [spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks]
+ - linux 6.7.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/959043afe53ae80633e810416cee6076da6e91c6 (6.8-rc7)
+CVE-2024-26805 [netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter]
+ - linux 6.7.9-1
+ NOTE: https://git.kernel.org/linus/661779e1fcafe1b74b3f3fe8e980c1e207fea1fd (6.8-rc7)
+CVE-2024-26804 [net: ip_tunnel: prevent perpetual headroom growth]
+ - linux 6.7.9-1
+ NOTE: https://git.kernel.org/linus/5ae1e9922bbdbaeb9cfbe91085ab75927488ac0f (6.8-rc7)
+CVE-2024-26803 [net: veth: clear GRO when clearing XDP even when down]
+ - linux 6.7.9-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/fe9f801355f0b47668419f30f1fac1cf4539e736 (6.8-rc7)
+CVE-2024-26802 [stmmac: Clear variable when destroying workqueue]
+ - linux 6.7.9-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/8af411bbba1f457c33734795f024d0ef26d0963f (6.8-rc7)
+CVE-2024-26801 [Bluetooth: Avoid potential use-after-free in hci_error_reset]
+ - linux 6.7.9-1
+ NOTE: https://git.kernel.org/linus/2449007d3f73b2842c9734f45f0aadb522daf592 (6.8-rc7)
+CVE-2024-26800 [tls: fix use-after-free on failed backlog decryption]
+ - linux 6.7.9-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/13114dc5543069f7b97991e3b79937b6da05f5b0 (6.8-rc7)
+CVE-2024-26799 [ASoC: qcom: Fix uninitialized pointer dmactl]
+ - linux 6.7.9-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/1382d8b55129875b2e07c4d2a7ebc790183769ee (6.8-rc7)
+CVE-2024-26798 [fbcon: always restore the old font data in fbcon_do_set_font()]
+ - linux 6.7.9-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/00d6a284fcf3fad1b7e1b5bc3cd87cbfb60ce03f (6.8-rc7)
+CVE-2024-26797 [drm/amd/display: Prevent potential buffer overflow in map_hw_resources]
+ - linux 6.7.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0f8ca019544a252d1afb468ce840c6dcbac73af4 (6.8-rc7)
+CVE-2024-26796 [drivers: perf: ctr_get_width function for legacy is not defined]
+ - linux 6.7.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/682dc133f83e0194796e6ea72eb642df1c03dfbe (6.8-rc7)
+CVE-2024-26795 [riscv: Sparse-Memory/vmemmap out-of-bounds fix]
+ - linux 6.7.9-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a11dd49dcb9376776193e15641f84fcc1e5980c9 (6.8-rc7)
+CVE-2024-26794 [btrfs: fix race between ordered extent completion and fiemap]
+ - linux 6.7.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a1a4a9ca77f143c00fce69c1239887ff8b813bec (6.8-rc7)
+CVE-2024-26793 [gtp: fix use-after-free and null-ptr-deref in gtp_newlink()]
+ - linux 6.7.9-1
+ NOTE: https://git.kernel.org/linus/616d82c3cfa2a2146dd7e3ae47bda7e877ee549e (6.8-rc7)
+CVE-2024-26792 [btrfs: fix double free of anonymous device after snapshot creation failure]
+ - linux 6.7.9-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/e2b54eaf28df0c978626c9736b94f003b523b451 (6.8-rc7)
+CVE-2024-26791 [btrfs: dev-replace: properly validate device names]
+ - linux 6.7.9-1
+ NOTE: https://git.kernel.org/linus/9845664b9ee47ce7ee7ea93caf47d39a9d4552c4 (6.8-rc7)
+CVE-2024-26790 [dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read]
+ - linux 6.7.9-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/9d739bccf261dd93ec1babf82f5c5d71dd4caa3e (6.8-rc7)
+CVE-2024-26789 [crypto: arm64/neonbs - fix out-of-bounds access on short input]
+ - linux 6.7.9-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/1c0cf6d19690141002889d72622b90fc01562ce4 (6.8-rc7)
+CVE-2024-26788 [dmaengine: fsl-qdma: init irq after reg initialization]
+ - linux 6.7.9-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/87a39071e0b639f45e05d296cc0538eef44ec0bd (6.8-rc7)
+CVE-2024-26787 [mmc: mmci: stm32: fix DMA API overlapping mappings warning]
+ - linux 6.7.9-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/6b1ba3f9040be5efc4396d86c9752cdc564730be (6.8-rc7)
+CVE-2024-26786 [iommufd: Fix iopt_access_list_id overwrite bug]
+ - linux 6.7.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/aeb004c0cd6958e910123a1607634401009c9539 (6.8-rc7)
+CVE-2024-26785 [iommufd: Fix protection fault in iommufd_test_syz_conv_iova]
+ - linux 6.7.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/cf7c2789822db8b5efa34f5ebcf1621bc0008d48 (6.8-rc7)
+CVE-2024-26784 [pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal]
+ - linux 6.7.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/eb5555d422d0fc325e1574a7353d3c616f82d8b5 (6.8-rc7)
+CVE-2024-26783 [mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index]
+ - linux 6.7.9-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/2774f256e7c0219e2b0a0894af1c76bdabc4f974 (6.8-rc7)
+CVE-2024-26782 [mptcp: fix double-free on socket dismantle]
+ - linux 6.7.9-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/10048689def7e40a4405acda16fdc6477d4ecc5c (6.8-rc7)
+CVE-2024-26781 [mptcp: fix possible deadlock in subflow diag]
+ - linux 6.7.9-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/d6a9608af9a75d13243d217f6ce1e30e57d56ffe (6.8-rc7)
+CVE-2024-26780 [af_unix: Fix task hung while purging oob_skb in GC.]
+ - linux 6.7.9-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/25236c91b5ab4a26a56ba2e79b8060cf4e047839 (6.8-rc5)
+CVE-2024-26750 [af_unix: Drop oob_skb ref before purging queue in GC.]
+ - linux 6.7.9-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/aa82ac51d63328714645c827775d64dbfd9941f3 (6.8-rc6)
+CVE-2024-26746 [dmaengine: idxd: Ensure safe user copy of completion record]
+ - linux 6.7.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/d3ea125df37dc37972d581b74a5d3785c3f283ab (6.8-rc7)
+CVE-2024-26745 [powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV]
+ - linux 6.7.9-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/09a3c1e46142199adcee372a420b024b4fc61051 (6.8-rc7)
CVE-2024-24795
- apache2 <unfixed> (bug #1068412)
NOTE: https://www.openwall.com/lists/oss-security/2024/04/04/5
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/295495842d4f68b731ff9f321d5aebd9fd7789f1
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/295495842d4f68b731ff9f321d5aebd9fd7789f1
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240404/60686195/attachment.htm>
More information about the debian-security-tracker-commits
mailing list