[Git][security-tracker-team/security-tracker][master] Update three CVEs for linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Dec 28 16:41:07 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
8255764a by Salvatore Bonaccorso at 2024-12-28T17:40:37+01:00
Update three CVEs for linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -7,9 +7,7 @@ CVE-2024-56707 [octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f5b942e6c54b13246ee49d42dcfb71b7f29e3c64 (6.13-rc1)
 CVE-2024-56706 [s390/cpum_sf: Fix and protect memory allocation of SDBs with mutex]
-	- linux 6.12.3-1
-	[bookworm] - linux <not-affected> (Vulnerable code not present)
-	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f55bd479d8663a4a4e403b3d308d3d1aa33d92df (6.13-rc1)
 CVE-2024-56705 [media: atomisp: Add check for rgby_data memory allocation failure]
 	- linux 6.12.3-1
@@ -52,9 +50,7 @@ CVE-2024-56696 [ALSA: core: Fix possible NULL dereference caused by kunit_kzallo
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9ad467a2b2716d4ed12f003b041aa6c776a13ff5 (6.13-rc1)
 CVE-2024-56695 [drm/amdkfd: Use dynamic allocation for CU occupancy array in 'kfd_get_cu_occupancy()']
-	- linux 6.12.3-1
-	[bookworm] - linux <not-affected> (Vulnerable code not present)
-	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/922f0e00017b09d9d47e3efac008c8b20ed546a0 (6.13-rc1)
 CVE-2024-56694 [bpf: fix recursive lock when verdict program return SK_PASS]
 	- linux 6.12.3-1
@@ -127,9 +123,7 @@ CVE-2024-56677 [powerpc/fadump: Move fadump_cma_init to setup_arch() after initm
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/05b94cae1c47f94588c3e7096963c1007c4d9c1d (6.13-rc1)
 CVE-2024-56676 [thermal: testing: Initialize some variables annoteded with _free()]
-	- linux 6.12.3-1
-	[bookworm] - linux <not-affected> (Vulnerable code not present)
-	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0104dcdaad3a7afd141e79a5fb817a92ada910ac (6.13-rc1)
 CVE-2024-54775 (Dcat-Admin v2.2.0-beta and v2.2.2-beta contains a Cross-Site Scripting ...)
 	NOT-FOR-US: Dcat-Admin



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8255764a2fc64b14c99900d29725f4579bf0a9c9

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8255764a2fc64b14c99900d29725f4579bf0a9c9
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241228/7ddab372/attachment.htm>


More information about the debian-security-tracker-commits mailing list