[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Feb 29 18:22:44 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
211bfe4d by Salvatore Bonaccorso at 2024-02-29T19:22:09+01:00
Merge Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,138 @@
+CVE-2024-26620 [s390/vfio-ap: always filter entire AP matrix]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/850fb7fa8c684a4c6bf0e4b6978f4ddcc5d43d11 (6.8-rc1)
+CVE-2024-26619 [riscv: Fix module loading free order]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/78996eee79ebdfe8b6f0e54cb6dcc792d5129291 (6.8-rc1)
+CVE-2024-26618 [arm64/sme: Always exit sme_alloc() early with existing storage]
+ - linux 6.6.15-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/dc7eb8755797ed41a0d1b5c0c39df3c8f401b3d9 (6.8-rc1)
+CVE-2024-26617 [fs/proc/task_mmu: move mmu notification mechanism inside mm lock]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/4cccb6221cae6d020270606b9e52b1678fc8b71a (6.8-rc1)
+CVE-2024-26616 [btrfs: scrub: avoid use-after-free when chunk length is not 64K aligned]
+ - linux 6.6.15-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/f546c4282673497a06ecb6190b50ae7f6c85b02f (6.8-rc2)
+CVE-2024-26615 [net/smc: fix illegal rmb_desc access in SMC-D connection dump]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ NOTE: https://git.kernel.org/linus/dbc153fd3c142909e564bb256da087e13fbf239c (6.8-rc2)
+CVE-2024-26614 [tcp: make sure init the accept_queue's spinlocks once]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ NOTE: https://git.kernel.org/linus/198bc90e0e734e5f98c3d2833e8390cac3df61b2 (6.8-rc2)
+CVE-2024-26613 [net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ NOTE: https://git.kernel.org/linus/13e788deb7348cc88df34bed736c3b3b9927ea52 (6.8-rc2)
+CVE-2024-26612 [netfs, fscache: Prevent Oops in fscache_put_cache()]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/3be0b3ed1d76c6703b9ee482b55f7e01c369cc68 (6.8-rc2)
+CVE-2024-26611 [xsk: fix usage of multi-buffer BPF helpers for ZC XDP]
+ - linux 6.6.15-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/c5114710c8ce86b8317e9b448f4fd15c711c2a82 (6.8-rc2)
+CVE-2024-26610 [wifi: iwlwifi: fix a memory corruption]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/cf4a0d840ecc72fcf16198d5e9c505ab7d5a5e4d (6.8-rc2)
+CVE-2024-26609 [netfilter: nf_tables: reject QUEUE/DROP verdict parameters]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ NOTE: https://git.kernel.org/linus/f342de4e2f33e0e39165d8639387aa6c19dff660 (6.8-rc2)
+CVE-2024-26608 [ksmbd: fix global oob in ksmbd_nl_policy]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/ebeae8adf89d9a82359f6659b1663d09beec2faa (6.8-rc2)
+CVE-2024-26607 [drm/bridge: sii902x: Fix probing race issue]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/08ac6f132dd77e40f786d8af51140c96c6d739c9 (6.8-rc2)
+CVE-2023-52498 [PM: sleep: Fix possible deadlocks in core system-wide PM code]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ NOTE: https://git.kernel.org/linus/7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557 (6.8-rc1)
+CVE-2023-52497 [erofs: fix lz4 inplace decompression]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/3c12466b6b7bf1e56f9b32c366a3d83d87afb4de (6.8-rc1)
+CVE-2023-52496 [mtd: maps: vmu-flash: Fix the (mtd core) switch to ref counters]
+ - linux 6.6.15-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a7d84a2e7663bbe12394cc771107e04668ea313a (6.8-rc1)
+CVE-2023-52495 [soc: qcom: pmic_glink_altmode: fix port sanity check]
+ - linux 6.6.15-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/c4fb7d2eac9ff9bfc35a2e4d40c7169a332416e0 (6.8-rc1)
+CVE-2023-52494 [bus: mhi: host: Add alignment check for event ring read pointer]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/eff9704f5332a13b08fbdbe0f84059c9e7051d5f (6.8-rc1)
+CVE-2023-52493 [bus: mhi: host: Drop chan lock before queuing buffers]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/01bd694ac2f682fb8017e16148b928482bc8fa4b (6.8-rc1)
+CVE-2023-52492 [dmaengine: fix NULL pointer in channel unregistration function]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/f5c24d94512f1b288262beda4d3dcb9629222fc7 (6.8-rc1)
+CVE-2023-52491 [media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ NOTE: https://git.kernel.org/linus/206c857dd17d4d026de85866f1b5f0969f2a109e (6.8-rc1)
+CVE-2023-52490 [mm: migrate: fix getting incorrect page mapping during page migration]
+ - linux 6.6.15-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/d1adb25df7111de83b64655a80b5a135adbded61 (6.8-rc1)
+CVE-2023-52489 [mm/sparsemem: fix race in accessing memory_section->usage]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/5ec8e8ea8b7783fab150cf86404fc38cb4db8800 (6.8-rc1)
+CVE-2023-52488 [serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ NOTE: https://git.kernel.org/linus/dbf4ab821804df071c8b566d9813083125e6d97b (6.8-rc1)
+CVE-2023-52487 [net/mlx5e: Fix peer flow lists handling]
+ - linux 6.6.15-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/d76fdd31f953ac5046555171620f2562715e9b71 (6.8-rc2)
+CVE-2023-52486 [drm: Don't unref the same fb many times by mistake due to deadlock handling]
+ - linux 6.6.15-1
+ [bookworm] - linux 6.1.76-1
+ NOTE: https://git.kernel.org/linus/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c (6.8-rc1)
+CVE-2023-52485 [drm/amd/display: Wake DMCUB before sending a command]
+ - linux <unfixed>
+ NOTE: https://git.kernel.org/linus/8892780834ae294bc3697c7d0e056d7743900b39 (6.8-rc1)
CVE-2024-0074
- nvidia-graphics-drivers <unfixed> (bug #1064983)
[bookworm] - nvidia-graphics-drivers <no-dsa> (Non-free not supported)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/211bfe4df30c4ff38c2eac203f14117da88eb48e
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/211bfe4df30c4ff38c2eac203f14117da88eb48e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240229/0ef19c14/attachment.htm>
More information about the debian-security-tracker-commits
mailing list