[Git][security-tracker-team/security-tracker][master] Update three CVEs for linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sat Dec 28 16:41:07 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
8255764a by Salvatore Bonaccorso at 2024-12-28T17:40:37+01:00
Update three CVEs for linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -7,9 +7,7 @@ CVE-2024-56707 [octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/f5b942e6c54b13246ee49d42dcfb71b7f29e3c64 (6.13-rc1)
CVE-2024-56706 [s390/cpum_sf: Fix and protect memory allocation of SDBs with mutex]
- - linux 6.12.3-1
- [bookworm] - linux <not-affected> (Vulnerable code not present)
- [bullseye] - linux <not-affected> (Vulnerable code not present)
+ - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/f55bd479d8663a4a4e403b3d308d3d1aa33d92df (6.13-rc1)
CVE-2024-56705 [media: atomisp: Add check for rgby_data memory allocation failure]
- linux 6.12.3-1
@@ -52,9 +50,7 @@ CVE-2024-56696 [ALSA: core: Fix possible NULL dereference caused by kunit_kzallo
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/9ad467a2b2716d4ed12f003b041aa6c776a13ff5 (6.13-rc1)
CVE-2024-56695 [drm/amdkfd: Use dynamic allocation for CU occupancy array in 'kfd_get_cu_occupancy()']
- - linux 6.12.3-1
- [bookworm] - linux <not-affected> (Vulnerable code not present)
- [bullseye] - linux <not-affected> (Vulnerable code not present)
+ - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/922f0e00017b09d9d47e3efac008c8b20ed546a0 (6.13-rc1)
CVE-2024-56694 [bpf: fix recursive lock when verdict program return SK_PASS]
- linux 6.12.3-1
@@ -127,9 +123,7 @@ CVE-2024-56677 [powerpc/fadump: Move fadump_cma_init to setup_arch() after initm
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/05b94cae1c47f94588c3e7096963c1007c4d9c1d (6.13-rc1)
CVE-2024-56676 [thermal: testing: Initialize some variables annoteded with _free()]
- - linux 6.12.3-1
- [bookworm] - linux <not-affected> (Vulnerable code not present)
- [bullseye] - linux <not-affected> (Vulnerable code not present)
+ - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/0104dcdaad3a7afd141e79a5fb817a92ada910ac (6.13-rc1)
CVE-2024-54775 (Dcat-Admin v2.2.0-beta and v2.2.2-beta contains a Cross-Site Scripting ...)
NOT-FOR-US: Dcat-Admin
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8255764a2fc64b14c99900d29725f4579bf0a9c9
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8255764a2fc64b14c99900d29725f4579bf0a9c9
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241228/7ddab372/attachment.htm>
More information about the debian-security-tracker-commits
mailing list