[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Aug 17 10:38:20 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ecd9ade5 by Salvatore Bonaccorso at 2024-08-17T11:37:31+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,171 @@
+CVE-2024-42322 [ipvs: properly dereference pe in ip_vs_add_service]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/cbd070a4ae62f119058973f6d2c984e325bce6e7 (6.11-rc1)
+CVE-2024-42321 [net: flow_dissector: use DEBUG_NET_WARN_ON_ONCE]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/120f1c857a73e52132e473dee89b340440cb692b (6.11-rc1)
+CVE-2024-42320 [s390/dasd: fix error checks in dasd_copy_pair_store()]
+	- linux 6.10.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/8e64d2356cbc800b4cd0e3e614797f76bcf0cdb8 (6.11-rc1)
+CVE-2024-42319 [mailbox: mtk-cmdq: Move devm_mbox_controller_register() after devm_pm_runtime_enable()]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/a8bd68e4329f9a0ad1b878733e0f80be6a971649 (6.11-rc1)
+CVE-2024-42318 [landlock: Don't lose track of restrictions on cred_transfer]
+	- linux 6.10.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/39705a6c29f8a2b93cf5b99528a55366c50014d1 (6.11-rc1)
+CVE-2024-42317 [mm/huge_memory: avoid PMD-size page cache if needed]
+	- linux 6.10.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/d659b715e94ac039803d7601505d3473393fc0be (6.11-rc1)
+CVE-2024-42316 [mm/mglru: fix div-by-zero in vmpressure_calc_level()]
+	- linux 6.10.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/8b671fe1a879923ecfb72dda6caf01460dd885ef (6.11-rc1)
+CVE-2024-42315 [exfat: fix potential deadlock on __exfat_get_dentry_set]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/89fc548767a2155231128cb98726d6d2ea1256c9 (6.11-rc1)
+CVE-2024-42314 [btrfs: fix extent map use-after-free when adding pages to compressed bio]
+	- linux 6.10.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/8e7860543a94784d744c7ce34b78a2e11beefa5c (6.11-rc1)
+CVE-2024-42313 [media: venus: fix use after free in vdec_close]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/a0157b5aa34eb43ec4c5510f9c260bbb03be937e (6.11-rc1)
+CVE-2024-42312 [sysctl: always initialize i_uid/i_gid]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/98ca62ba9e2be5863c7d069f84f7166b45a5b2f4 (6.11-rc1)
+CVE-2024-42311 [hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/26a2ed107929a855155429b11e1293b83e6b2a8b (6.11-rc1)
+CVE-2024-42310 [drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/cb520c3f366c77e8d69e4e2e2781a8ce48d98e79 (6.11-rc1)
+CVE-2024-42309 [drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/2df7aac81070987b0f052985856aa325a38debf6 (6.11-rc1)
+CVE-2024-42308 [drm/amd/display: Check for NULL pointer]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/4ab68e168ae1695f7c04fae98930740aaf7c50fa (6.11-rc1)
+CVE-2024-42307 [cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path]
+	- linux 6.10.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/193cc89ea0ca1da311877d2b4bb5e9f03bcc82a2 (6.11-rc1)
+CVE-2024-42306 [udf: Avoid using corrupted block bitmap buffer]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/a90d4471146de21745980cba51ce88e7926bcc4f (6.11-rc1)
+CVE-2024-42305 [ext4: check dot and dotdot of dx_root before making dir indexed]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/50ea741def587a64e08879ce6c6a30131f7111e7 (6.11-rc1)
+CVE-2024-42304 [ext4: make sure the first directory block is not a hole]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/f9ca51596bbfd0f9c386dd1c613c394c78d9e5e6 (6.11-rc1)
+CVE-2024-42303 [media: imx-pxp: Fix ERR_PTR dereference in pxp_probe()]
+	- linux 6.10.3-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/57e9ce68ae98551da9c161aaab12b41fe8601856 (6.11-rc1)
+CVE-2024-42302 [PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/11a1f4bc47362700fcbde717292158873fb847ed (6.11-rc1)
+CVE-2024-42301 [dev/parport: fix the array out-of-bounds risk]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/ab11dac93d2d568d151b1918d7b84c2d02bacbd5 (6.11-rc1)
+CVE-2024-42300 [erofs: fix race in z_erofs_get_gbuf()]
+	- linux 6.10.3-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7dc5537c3f8be87e005f0844a7626c987914f8fd (6.11-rc1)
+CVE-2024-42299 [fs/ntfs3: Update log->page_{mask,bits} if log->page_size changed]
+	- linux 6.10.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/2fef55d8f78383c8e6d6d4c014b9597375132696 (6.11-rc1)
+CVE-2024-42298 [ASoC: fsl: fsl_qmc_audio: Check devm_kasprintf() returned value]
+	- linux 6.10.3-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/e62599902327d27687693f6e5253a5d56583db58 (6.11-rc1)
+CVE-2024-42297 [f2fs: fix to don't dirty inode for readonly filesystem]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/192b8fb8d1c8ca3c87366ebbef599fa80bb626b8 (6.11-rc1)
+CVE-2024-42296 [f2fs: fix return value of f2fs_convert_inline_inode()]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/a8eb3de28e7a365690c61161e7a07a4fc7c60bbf (6.11-rc1)
+CVE-2024-42295 [nilfs2: handle inconsistent state in nilfs_btnode_create_block()]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/4811f7af6090e8f5a398fbdd766f903ef6c0d787 (6.11-rc1)
+CVE-2024-42294 [block: fix deadlock between sd_remove Description: sd_release]
+	- linux 6.10.3-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7e04da2dc7013af50ed3a2beb698d5168d1e594b (6.11-rc1)
+CVE-2024-42293 [arm64: mm: Fix lockless walks with static and dynamic page-table folding]
+	- linux 6.10.3-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/36639013b3462c06ff8e3400a427f775b4fc97f5 (6.11-rc1)
+CVE-2024-42292 [kobject_uevent: Fix OOB access within zap_modalias_env()]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/dd6e9894b451e7c85cceb8e9dc5432679a70e7dc (6.11-rc1)
+CVE-2024-42291 [ice: Add a per-VF limit on number of FDIR filters]
+	- linux 6.10.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6ebbe97a488179f5dc85f2f1e0c89b486e99ee97 (6.11-rc1)
+CVE-2024-42290 [irqchip/imx-irqsteer: Handle runtime power management correctly]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/33b1c47d1fc0b5f06a393bb915db85baacba18ea (6.11-rc1)
+CVE-2024-42289 [scsi: qla2xxx: During vport delete send async logout explicitly]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/76f480d7c717368f29a3870f7d64471ce0ff8fb2 (6.11-rc1)
+CVE-2024-42288 [scsi: qla2xxx: Fix for possible memory corruption]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/c03d740152f78e86945a75b2ad541bf972fab92a (6.11-rc1)
+CVE-2024-42287 [scsi: qla2xxx: Complete command early within lock]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/4475afa2646d3fec176fc4d011d3879b26cb26e3 (6.11-rc1)
+CVE-2024-42286 [scsi: qla2xxx: validate nvme_local_port correctly]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/eb1d4ce2609584eeb7694866f34d4b213caa3af9 (6.11-rc1)
+CVE-2024-42285 [RDMA/iwcm: Fix a use-after-free related to destroying CM IDs]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/aee2424246f9f1dadc33faa78990c1e2eb7826e4 (6.11-rc1)
+CVE-2024-42284 [tipc: Return non-zero value from tipc_udp_addr2str() on error]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/fa96c6baef1b5385e2f0c0677b32b3839e716076 (6.11-rc1)
+CVE-2024-42283 [net: nexthop: Initialize all fields in dumped nexthops]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/6d745cd0e9720282cd291d36b9db528aea18add2 (6.11-rc1)
+CVE-2024-42282 [net: mediatek: Fix potential NULL pointer dereference in dummy net_device handling]
+	- linux 6.10.3-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/16f3a28cf5f876a7f3550d8f4c870a7b41bcfaef (6.11-rc1)
+CVE-2024-42281 [bpf: Fix a segment issue when downgrading gso_size]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/fa5ef655615a01533035c6139248c5b33aa27028 (6.11-rc1)
+CVE-2024-42280 [mISDN: Fix a use after free in hfcmulti_tx()]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/61ab751451f5ebd0b98e02276a44e23a10110402 (6.11-rc1)
+CVE-2024-42279 [spi: microchip-core: ensure TX and RX FIFOs are empty at start of a transfer]
+	- linux 6.10.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/9cf71eb0faef4bff01df4264841b8465382d7927 (6.11-rc1)
+CVE-2024-42278 [ASoC: TAS2781: Fix tasdev_load_calibrated_data()]
+	- linux 6.10.3-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/92c78222168e9035a9bfb8841c2e56ce23e51f73 (6.11-rc1)
+CVE-2024-42277 [iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en]
+	- linux 6.10.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/630482ee0653decf9e2482ac6181897eb6cde5b8 (6.11-rc1)
+CVE-2024-42276 [nvme-pci: add missing condition check for existence of mapped data]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/c31fad1470389666ac7169fe43aa65bf5b7e2cfd (6.11-rc1)
+CVE-2023-52889 [apparmor: Fix null pointer deref when receiving skb during sock creation]
+	- linux 6.10.3-1
+	NOTE: https://git.kernel.org/linus/fce09ea314505a52f2436397608fa0a5d0934fb1 (6.11-rc1)
 CVE-2024-42275 [drm/client: Fix error code in drm_client_buffer_vmap_local()]
 	- linux 6.10.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ecd9ade528358a9ec851cd374771457efb9e89a3

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ecd9ade528358a9ec851cd374771457efb9e89a3
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240817/a5e989bc/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list