[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Aug 26 15:01:14 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
76c92912 by Salvatore Bonaccorso at 2024-08-26T16:00:28+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,164 @@
+CVE-2024-44942 [f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/fc01008c92f40015aeeced94750855a7111b6929 (6.11-rc1)
+CVE-2024-44941 [f2fs: fix to cover read extent cache access with lock]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/d7409b05a64f212735f0d33f5f1602051a886eab (6.11-rc1)
+CVE-2024-44940 [fou: remove warn in gue_gro_receive on unsupported protocol]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/dd89a81d850fa9a65f67b4527c0e420d15bf836c (6.11-rc1)
+CVE-2024-44939 [jfs: fix null ptr deref in dtInsertEntry]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/ce6dede912f064a855acf6f04a04cbb2c25b8c8c (6.11-rc1)
+CVE-2024-44938 [jfs: Fix shift-out-of-bounds in dbDiscardAG]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/7063b80268e2593e58bee8a8d709c2f3ff93e2f2 (6.11-rc1)
+CVE-2024-44937 [platform/x86: intel-vbtn: Protect ACPI notify handler against recursion]
+	- linux 6.10.6-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/e075c3b13a0a142dcd3151b25d29a24f31b7b640 (6.11-rc3)
+CVE-2024-44936 [power: supply: rt5033: Bring back i2c_set_clientdata]
+	- linux 6.10.6-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/d3911f1639e67fc7b12aae0efa5a540976d7443b (6.11-rc3)
+CVE-2024-44935 [sctp: Fix null-ptr-deref in reuseport_add_sock().]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/9ab0faa7f9ffe31296dbb9bbe6f76c72c14eea18 (6.11-rc3)
+CVE-2024-44934 [net: bridge: mcast: wait for previous gc cycles when removing port]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/92c4ee25208d0f35dafc3213cdf355fbe449e078 (6.11-rc3)
+CVE-2024-44933 [bnxt_en : Fix memory out-of-bounds in bnxt_fill_hw_rss_tbl()]
+	- linux 6.10.6-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/da03f5d1b2c319a2b74fe76edeadcd8fa5f44376 (6.11-rc3)
+CVE-2024-44932 [idpf: fix UAFs when destroying the queues]
+	- linux 6.10.6-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/290f1c033281c1a502a3cd1c53c3a549259c491f (6.11-rc3)
+CVE-2024-44931 [gpio: prevent potential speculation leaks in gpio_device_get_desc()]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/d795848ecce24a75dfd46481aee066ae6fe39775 (6.11-rc1)
+CVE-2024-43914 [md/raid5: avoid BUG_ON() while continue reshape after reassembling]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/305a5170dc5cf3d395bb4c4e9239bca6d0b54b49 (6.11-rc1)
+CVE-2024-43913 [nvme: apple: fix device reference counting]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/b9ecbfa45516182cd062fecd286db7907ba84210 (6.11-rc1)
+CVE-2024-43912 [wifi: nl80211: disallow setting special AP channel widths]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/23daf1b4c91db9b26f8425cc7039cf96d22ccbfe (6.11-rc1)
+CVE-2024-43911 [wifi: mac80211: fix NULL dereference at band check in starting tx ba session]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/021d53a3d87eeb9dbba524ac515651242a2a7e3b (6.11-rc1)
+CVE-2024-43910 [bpf: add missing check_func_arg_reg_off() to prevent out-of-bounds memory accesses]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/ec2b9a5e11e51fea1bb04c1e7e471952e887e874 (6.11-rc1)
+CVE-2024-43909 [drm/amdgpu/pm: Fix the null pointer dereference for smu7]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/c02c1960c93eede587576625a1221205a68a904f (6.11-rc1)
+CVE-2024-43908 [drm/amdgpu: Fix the null pointer dereference to ras_manager]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/4c11d30c95576937c6c35e6f29884761f2dddb43 (6.11-rc1)
+CVE-2024-43907 [drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/d19fb10085a49b77578314f69fff21562f7cd054 (6.11-rc1)
+CVE-2024-43906 [drm/admgpu: fix dereferencing null pointer context]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/030ffd4d43b433bc6671d9ec34fc12c59220b95d (6.11-rc1)
+CVE-2024-43905 [drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/50151b7f1c79a09117837eb95b76c2de76841dab (6.11-rc1)
+CVE-2024-43904 [drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/15c2990e0f0108b9c3752d7072a97d45d4283aea (6.11-rc1)
+CVE-2024-43903 [drm/amd/display: Add NULL check for 'afb' before dereferencing in amdgpu_dm_plane_handle_cursor_update]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/38e6f715b02b572f74677eb2f29d3b4bc6f1ddff (6.11-rc1)
+CVE-2024-43902 [drm/amd/display: Add null checker before passing variables]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/8092aa3ab8f7b737a34b71f91492c676a843043a (6.11-rc1)
+CVE-2024-43901 [drm/amd/display: Fix NULL pointer dereference for DTN log in DCN401]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/5af757124792817f8eb1bd0c80ad60fab519586b (6.11-rc1)
+CVE-2024-43900 [media: xc2028: avoid use-after-free in load_firmware_cb()]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/68594cec291ff9523b9feb3f43fd853dcddd1f60 (6.11-rc1)
+CVE-2024-43899 [drm/amd/display: Fix null pointer deref in dcn20_resource.c]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/ecbf60782662f0a388493685b85a645a0ba1613c (6.11-rc1)
+CVE-2024-43898 [ext4: sanity check for NULL pointer after ext4_force_shutdown]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/83f4414b8f84249d538905825b088ff3ae555652 (6.11-rc1)
+CVE-2024-43897 [net: drop bad gso csum_start and offset in virtio_net_hdr]
+	- linux 6.10.6-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/89add40066f9ed9abe5f7f886fe5789ff7e0c50e (6.11-rc2)
+CVE-2024-43896 [ASoC: cs-amp-lib: Fix NULL pointer crash if efi.get_variable is NULL]
+	- linux 6.10.6-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/dc268085e499666b9f4f0fcb4c5a94e1c0b193b3 (6.11-rc3)
+CVE-2024-43895 [drm/amd/display: Skip Recompute DSC Params if no Stream on Link]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/50e376f1fe3bf571d0645ddf48ad37eb58323919 (6.11-rc3)
+CVE-2024-43894 [drm/client: fix null pointer dereference in drm_client_modeset_probe]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/113fd6372a5bb3689aba8ef5b8a265ed1529a78f (6.11-rc3)
+CVE-2024-43893 [serial: core: check uartclk for zero to avoid divide by zero]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/6eabce6608d6f3440f4c03aa3d3ef50a47a3d193 (6.11-rc3)
+CVE-2024-43892 [memcg: protect concurrent access to mem_cgroup_idr]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/9972605a238339b85bd16b084eed5f18414d22db (6.11-rc3)
+CVE-2024-43891 [tracing: Have format file honor EVENT_FILE_FL_FREED]
+	- linux 6.10.6-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b1560408692cd0ab0370cfbe9deb03ce97ab3f6d (6.11-rc3)
+CVE-2024-43890 [tracing: Fix overflow in get_free_elt()]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/bcf86c01ca4676316557dd482c8416ece8c2e143 (6.11-rc3)
+CVE-2024-43889 [padata: Fix possible divide-by-0 panic in padata_mt_helper()]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	NOTE: https://git.kernel.org/linus/6d45e1c948a8b7ed6ceddb14319af69424db730c (6.11-rc3)
+CVE-2024-43888 [mm: list_lru: fix UAF for memory cgroup]
+	- linux 6.10.6-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5161b48712dcd08ec427c450399d4d1483e21dea (6.11-rc3)
+CVE-2024-43887 [net/tcp: Disable TCP-AO static key after RCU grace period]
+	- linux 6.10.6-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/14ab4792ee120c022f276a7e4768f4dcb08f0cdd (6.11-rc3)
+CVE-2024-43886 [drm/amd/display: Add null check in resource_log_pipe_topology_update]
+	- linux 6.10.6-1
+	NOTE: https://git.kernel.org/linus/899d92fd26fe780aad711322aa671f68058207a6 (6.11-rc1)
+CVE-2024-43885 [btrfs: fix double inode unlock for direct IO sync writes]
+	- linux 6.10.6-1
+	[bookworm] - linux 6.1.106-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/e0391e92f9ab4fb3dbdeb139c967dcfa7ac4b115 (6.11-rc3)
 CVE-2024-43884 [Bluetooth: MGMT: Add error handling to pair_device()]
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/538fd3921afac97158d4177139a0ad39f056dbb2 (6.11-rc5)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/76c929127199ce8440d6cfc8450e4443718b18d0

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/76c929127199ce8440d6cfc8450e4443718b18d0
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240826/caf849e8/attachment.htm>


More information about the debian-security-tracker-commits mailing list