[Git][security-tracker-team/security-tracker][master] Merge changes from Linux CNA
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Jul 29 21:07:28 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
61416f31 by Salvatore Bonaccorso at 2024-07-29T22:06:21+02:00
Merge changes from Linux CNA
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,459 @@
+CVE-2024-42098 [crypto: ecdh - explicitly zeroize private_key]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ NOTE: https://git.kernel.org/linus/73e5984e540a76a2ee1868b91590c922da8c24c9 (6.10-rc1)
+CVE-2024-42097 [ALSA: emux: improve patch ioctl data validation]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/89b32ccb12ae67e630c6453d778ec30a592a212f (6.10-rc1)
+CVE-2024-42096 [x86: stop playing stack games in profile_pc()]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/093d9603b60093a9aaae942db56107f6432a5dca (6.10-rc6)
+CVE-2024-42095 [serial: 8250_omap: Implementation of Errata i2310]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/9d141c1e615795eeb93cd35501ad144ee997a826 (6.10-rc6)
+CVE-2024-42094 [net/iucv: Avoid explicit cpumask var allocation on stack]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/be4e1304419c99a164b4c0e101c7c2a756b635b9 (6.10-rc1)
+CVE-2024-42093 [net/dpaa2: Avoid explicit cpumask var allocation on stack]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/d33fe1714a44ff540629b149d8fab4ac6967585c (6.10-rc1)
+CVE-2024-42092 [gpio: davinci: Validate the obtained number of IRQs]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/7aa9b96e9a73e4ec1771492d0527bd5fc5ef9164 (6.10-rc6)
+CVE-2024-42091 [drm/xe: Check pat.ops before dumping PAT settings]
+ - linux 6.9.8-1
+ NOTE: https://git.kernel.org/linus/a918e771e6fbe1fa68932af5b0cdf473e23090cc (6.10-rc1)
+CVE-2024-42090 [pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/adec57ff8e66aee632f3dd1f93787c13d112b7a1 (6.10-rc6)
+CVE-2024-42089 [ASoC: fsl-asoc-card: set priv->pdev before using it]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/90f3feb24172185f1832636264943e8b5e289245 (6.10-rc6)
+CVE-2024-42088 [ASoC: mediatek: mt8195: Add platform entry for ETDM1_OUT_BE dai link]
+ - linux 6.9.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/282a4482e198e03781c152c88aac8aa382ef9a55 (6.10-rc6)
+CVE-2024-42087 [drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/ee7860cd8b5763017f8dc785c2851fecb7a0c565 (6.10-rc1)
+CVE-2024-42086 [iio: chemical: bme680: Fix overflows in compensate() functions]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/fdd478c3ae98c3f13628e110dce9b6cfb0d9b3c8 (6.10-rc6)
+CVE-2024-42085 [usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/7838de15bb700c2898a7d741db9b1f3cbc86c136 (6.10-rc6)
+CVE-2024-42084 [ftruncate: pass a signed offset]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/4b8e88e563b5f666446d002ad0dc1e6e8e7102b0 (6.10-rc6)
+CVE-2024-42083 [ionic: fix kernel panic due to multi-buffer handling]
+ - linux 6.9.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/e3f02f32a05009a688a87f5799e049ed6b55bab5 (6.10-rc6)
+CVE-2024-42082 [xdp: Remove WARN() from __xdp_reg_mem_model()]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/7e9f79428372c6eab92271390851be34ab26bfb4 (6.10-rc6)
+CVE-2024-42081 [drm/xe/xe_devcoredump: Check NULL before assignments]
+ - linux 6.9.8-1
+ NOTE: https://git.kernel.org/linus/b15e65349553b1689d15fbdebea874ca5ae2274a (6.10-rc1)
+CVE-2024-42080 [RDMA/restrack: Fix potential invalid address access]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ NOTE: https://git.kernel.org/linus/ca537a34775c103f7b14d7bbd976403f1d1525d8 (6.10-rc1)
+CVE-2024-42079 [gfs2: Fix NULL pointer dereference in gfs2_log_flush]
+ - linux 6.9.8-1
+ NOTE: https://git.kernel.org/linus/35264909e9d1973ab9aaa2a1b07cda70f12bb828 (6.10-rc1)
+CVE-2024-42078 [nfsd: initialise nfsd_info.mutex early.]
+ - linux 6.9.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/e0011bca603c101f2a3c007bdb77f7006fa78fb1 (6.10-rc6)
+CVE-2024-42077 [ocfs2: fix DIO failure due to insufficient transaction credits]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/be346c1a6eeb49d8fda827d2a9522124c2f72f36 (6.10-rc6)
+CVE-2024-42076 [net: can: j1939: Initialize unused data in j1939_send_one()]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/b7cdf1dd5d2a2d8200efd98d1893684db48fe134 (6.10-rc6)
+CVE-2024-42075 [bpf: Fix remap of arena.]
+ - linux 6.9.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b90d77e5fd784ada62ddd714d15ee2400c28e1cf (6.10-rc6)
+CVE-2024-42074 [ASoC: amd: acp: add a null check for chip_pdev structure]
+ - linux 6.9.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/98d919dfee1cc402ca29d45da642852d7c9a2301 (6.10-rc6)
+CVE-2024-42073 [mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/c28947de2bed40217cf256c5d0d16880054fcf13 (6.10-rc6)
+CVE-2024-42072 [bpf: Fix may_goto with negative offset.]
+ - linux 6.9.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/2b2efe1937ca9f8815884bd4dcd5b32733025103 (6.10-rc6)
+CVE-2024-42071 [ionic: use dev_consume_skb_any outside of napi]
+ - linux 6.9.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/84b767f9e34fdb143c09e66a2a20722fc2921821 (6.10-rc6)
+CVE-2024-42070 [netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/7931d32955e09d0a11b1fe0b6aac1bfa061c005c (6.10-rc6)
+CVE-2024-42069 [net: mana: Fix possible double free in error handling path]
+ - linux 6.9.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/1864b8224195d0e43ddb92a8151f54f6562090cc (6.10-rc6)
+CVE-2024-42068 [bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ NOTE: https://git.kernel.org/linus/7d2cc63eca0c993c99d18893214abf8f85d566d8 (6.10-rc1)
+CVE-2024-42067 [bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro()]
+ - linux 6.9.8-1
+ NOTE: https://git.kernel.org/linus/e60adf513275c3a38e5cb67f7fd12387e43a3ff5 (6.10-rc1)
+CVE-2024-42066 [drm/xe: Fix potential integer overflow in page size calculation]
+ - linux 6.9.8-1
+ NOTE: https://git.kernel.org/linus/4f4fcafde343a54465f85a2909fc684918507a4b (6.10-rc1)
+CVE-2024-42065 [drm/xe: Add a NULL check in xe_ttm_stolen_mgr_init]
+ - linux 6.9.8-1
+ NOTE: https://git.kernel.org/linus/a6eff8f9c7e844cb24ccb188ca24abcd59734e74 (6.10-rc1)
+CVE-2024-42064 [drm/amd/display: Skip pipe if the pipe idx not set properly]
+ - linux 6.9.8-1
+ NOTE: https://git.kernel.org/linus/af114efe8d24b5711cfbedf7180f2ac1a296c24b (6.10-rc1)
+CVE-2024-42063 [bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ NOTE: https://git.kernel.org/linus/e8742081db7d01f980c6161ae1e8a1dbc1e30979 (6.10-rc1)
+CVE-2024-41098 [ata: libata-core: Fix null pointer dereference on error]
+ - linux 6.9.8-1
+ NOTE: https://git.kernel.org/linus/5d92c7c566dc76d96e0e19e481d926bbe6631c1e (6.10-rc6)
+CVE-2024-41097 [usb: atm: cxacru: fix endpoint checking in cxacru_bind()]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/2eabb655a968b862bc0c31629a09f0fbf3c80d51 (6.10-rc6)
+CVE-2024-41096 [PCI/MSI: Fix UAF in msi_capability_init]
+ - linux 6.9.8-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/9eee5330656bf92f51cb1f09b2dc9f8cf975b3d1 (6.10-rc6)
+CVE-2024-41095 [drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/66edf3fb331b6c55439b10f9862987b0916b3726 (6.10-rc6)
+CVE-2024-41094 [drm/fbdev-dma: Only set smem_start is enable per module option]
+ - linux 6.9.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/d92a7580392ad4681b1d4f9275d00b95375ebe01 (6.10-rc6)
+CVE-2024-41093 [drm/amdgpu: avoid using null object of framebuffer]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ NOTE: https://git.kernel.org/linus/bcfa48ff785bd121316592b131ff6531e3e696bb (6.10-rc6)
+CVE-2024-41092 [drm/i915/gt: Fix potential UAF by revoke of fence registers]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/996c3412a06578e9d779a16b9e79ace18125ab50 (6.10-rc6)
+CVE-2024-41089 [drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/6d411c8ccc0137a612e0044489030a194ff5c843 (6.10-rc6)
+CVE-2024-41088 [can: mcp251xfd: fix infinite loop when xmit fails]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ NOTE: https://git.kernel.org/linus/d8fb63e46c884c898a38f061c2330f7729e75510 (6.10-rc6)
+CVE-2024-41087 [ata: libata-core: Fix double free on error]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/ab9e0c529eb7cafebdd31fe1644524e80a48b05d (6.10-rc6)
+CVE-2024-41086 [bcachefs: Fix sb_field_downgrade validation]
+ - linux 6.9.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/692aa7a54b2b28d59f24b3bf8250837805484b99 (6.10-rc1)
+CVE-2024-41085 [cxl/mem: Fix no cxl_nvd during pmem region auto-assembling]
+ - linux 6.9.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/84ec985944ef34a34a1605b93ce401aa8737af96 (6.10-rc7)
+CVE-2024-41084 [cxl/region: Avoid null pointer dereference in region lookup]
+ - linux 6.9.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/285f2a08841432fc3e498b1cd00cce5216cdf189 (6.10-rc7)
+CVE-2024-41083 [netfs: Fix netfs_page_mkwrite() to check folio->mapping is valid]
+ - linux 6.9.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a81c98bfa40c11f8ea79b5a9b3f5fda73bfbb4d2 (6.10-rc7)
+CVE-2024-41082 [nvme-fabrics: use reserved tag for reg read/write command]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/7dc3bfcb4c9cc58970fff6aaa48172cb224d85aa (6.10-rc3)
+CVE-2024-41081 [ila: block BH in ila_output()]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/cf28ff8e4c02e1ffa850755288ac954b6ff0db8c (6.10-rc3)
+CVE-2024-41080 [io_uring: fix possible deadlock in io_register_iowq_max_workers()]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/73254a297c2dd094abec7c9efee32455ae875bdf (6.10-rc3)
+CVE-2024-41079 [nvmet: always initialize cqe.result]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/cd0c1b8e045a8d2785342b385cb2684d9b48e426 (6.10-rc4)
+CVE-2024-41078 [btrfs: qgroup: fix quota root leak after quota disable failure]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/a7e4c6a3031c74078dba7fa36239d0f4fe476c53 (6.10-rc6)
+CVE-2024-41077 [null_blk: fix validation of block size]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 (6.10-rc3)
+CVE-2024-41076 [NFSv4: Fix memory leak in nfs4_set_security_label]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/aad11473f8f4be3df86461081ce35ec5b145ba68 (6.10-rc4)
+CVE-2024-41075 [cachefiles: add consistency check for copen/cread]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/a26dc49df37e996876f50a0210039b2d211fdd6f (6.10-rc4)
+CVE-2024-41074 [cachefiles: Set object to close if ondemand_id < 0 in copen]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/4f8703fb3482f92edcfd31661857b16fec89c2c0 (6.10-rc4)
+CVE-2024-41073 [nvme: avoid double free special payload]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/e5d574ab37f5f2e7937405613d9b1a724811e5ad (6.10-rc4)
+CVE-2024-41072 [wifi: cfg80211: wext: add extra SIOCSIWSCAN data check]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/6ef09cdc5ba0f93826c09d810c141a8d103a80fc (6.10-rc5)
+CVE-2024-41071 [wifi: mac80211: Avoid address calculations via out of bounds array indexing]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 (6.10-rc5)
+CVE-2024-41070 [KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/a986fa57fd81a1430e00b3c6cf8a325d6f894a63 (6.10-rc5)
+CVE-2024-41069 [ASoC: topology: Fix references to freed memory]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/97ab304ecd95c0b1703ff8c8c3956dc6e2afe8e1 (6.10-rc6)
+CVE-2024-41068 [s390/sclp: Fix sclp_init() cleanup on failure]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/6434b33faaa063df500af355ee6c3942e0f8d982 (6.10-rc6)
+CVE-2024-41067 [btrfs: scrub: handle RST lookup error correctly]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/2c49908634a2b97b1c3abe0589be2739ac5e7fd5 (6.10-rc6)
+CVE-2024-41066 [ibmvnic: Add tx check to prevent skb leak]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/0983d288caf984de0202c66641577b739caad561 (6.10-rc6)
+CVE-2024-41065 [powerpc/pseries: Whitelist dtl slub object for copying to userspace]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/1a14150e1656f7a332a943154fc486504db4d586 (6.10-rc7)
+CVE-2024-41064 [powerpc/eeh: avoid possible crash when edev->pdev changes]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/a1216e62d039bf63a539bbe718536ec789a853dd (6.10-rc7)
+CVE-2024-41063 [Bluetooth: hci_core: cancel all works upon hci_unregister_dev()]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/0d151a103775dd9645c78c97f77d6e2a5298d913 (6.10-rc7)
+CVE-2024-41062 [bluetooth/l2cap: sync sock recv cb and release]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/89e856e124f9ae548572c56b1b70c2255705f8fe (6.10-rc7)
+CVE-2024-41061 [drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/0ad4b4a2f6357c45fbe444ead1a929a0b4017d03 (6.10-rc7)
+CVE-2024-41060 [drm/radeon: check bo_va->bo is non-NULL before using it]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/6fb15dcbcf4f212930350eaee174bb60ed40a536 (6.10-rc7)
+CVE-2024-41059 [hfsplus: fix uninit-value in copy_name]
+ - linux 6.9.11-1
+ NOTE: https://git.kernel.org/linus/0570730c16307a72f8241df12363f76600baf57d (6.10)
+CVE-2024-41058 [cachefiles: fix slab-use-after-free in fscache_withdraw_volume()]
+ - linux 6.9.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/522018a0de6b6fcce60c04f86dfc5f0e4b6a1b36 (6.10)
+CVE-2024-41057 [cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()]
+ - linux 6.9.11-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/5d8f805789072ea7fd39504694b7bd17e5f751c4 (6.10)
+CVE-2024-41056 [firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files]
+ - linux 6.9.10-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/680e126ec0400f6daecf0510c5bb97a55779ff03 (6.10)
+CVE-2024-41055 [mm: prevent derefencing NULL ptr in pfn_section_valid()]
+ - linux 6.9.10-1
+ NOTE: https://git.kernel.org/linus/82f0b6f041fad768c28b4ad05a683065412c226e (6.10)
+CVE-2024-41054 [scsi: ufs: core: Fix ufshcd_clear_cmd racing issue]
+ - linux 6.9.10-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/9307a998cb9846a2557fdca286997430bee36a2a (6.10)
+CVE-2024-41053 [scsi: ufs: core: Fix ufshcd_abort_one racing issue]
+ - linux 6.9.10-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/74736103fb4123c71bf11fb7a6abe7c884c5269e (6.10)
+CVE-2024-41052 [vfio/pci: Init the count variable in collecting hot-reset devices]
+ - linux 6.9.10-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/5a88a3f67e37e39f933b38ebb4985ba5822e9eca (6.10)
+CVE-2024-41051 [cachefiles: wait for ondemand_object_worker to finish when dropping object]
+ - linux 6.9.10-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/12e009d60852f7bce0afc373ca0b320f14150418 (6.10)
+CVE-2024-41050 [cachefiles: cyclic allocation of msg_id to avoid reuse]
+ - linux 6.9.10-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/19f4f399091478c95947f6bd7ad61622300c30d9 (6.10)
+CVE-2024-41049 [filelock: fix potential use-after-free in posix_lock_inode]
+ - linux 6.9.10-1
+ NOTE: https://git.kernel.org/linus/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92 (6.10)
+CVE-2024-41048 [skmsg: Skip zero length skb in sk_msg_recvmsg]
+ - linux 6.9.10-1
+ NOTE: https://git.kernel.org/linus/f0c18025693707ec344a70b6887f7450bf4c826b (6.10)
+CVE-2024-41047 [i40e: Fix XDP program unloading while removing the driver]
+ - linux 6.9.10-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/01fc5142ae6b06b61ed51a624f2732d6525d8ea3 (6.10)
+CVE-2024-41046 [net: ethernet: lantiq_etop: fix double free in detach]
+ - linux 6.9.10-1
+ NOTE: https://git.kernel.org/linus/e1533b6319ab9c3a97dad314dd88b3783bc41b69 (6.10)
+CVE-2024-41045 [bpf: Defer work in bpf_timer_cancel_and_free]
+ - linux 6.9.10-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a6fcd19d7eac1335eb76bc16b6a66b7f574d1d69 (6.10)
+CVE-2024-41044 [ppp: reject claimed-as-LCP but actually malformed packets]
+ - linux 6.9.10-1
+ NOTE: https://git.kernel.org/linus/f2aeb7306a898e1cbd03963d376f4b6656ca2b55 (6.10)
+CVE-2024-41043 [netfilter: nfnetlink_queue: drop bogus WARN_ON]
+ - linux 6.9.10-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/631a4b3ddc7831b20442c59c28b0476d0704c9af (6.10)
+CVE-2024-41042 [netfilter: nf_tables: prefer nft_chain_validate]
+ - linux 6.9.10-1
+ NOTE: https://git.kernel.org/linus/cff3bd012a9512ac5ed858d38e6ed65f6391008c (6.10)
+CVE-2024-41041 [udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().]
+ - linux 6.9.10-1
+ NOTE: https://git.kernel.org/linus/5c0b485a8c6116516f33925b9ce5b6104a6eadfd (6.10)
+CVE-2024-41040 [net/sched: Fix UAF when resolving a clash]
+ - linux 6.9.10-1
+ NOTE: https://git.kernel.org/linus/26488172b0292bed837b95a006a3f3431d1898c3 (6.10)
+CVE-2024-41039 [firmware: cs_dsp: Fix overflow checking of wmfw header]
+ - linux 6.9.10-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/3019b86bce16fbb5bc1964f3544d0ce7d0137278 (6.10)
+CVE-2024-41038 [firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers]
+ - linux 6.9.10-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/2163aff6bebbb752edf73f79700f5e2095f3559e (6.10)
+CVE-2024-41037 [ASoC: SOF: Intel: hda: fix null deref on system suspend entry]
+ - linux 6.9.10-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/9065693dcc13f287b9e4991f43aee70cf5538fdd (6.10)
+CVE-2024-41036 [net: ks8851: Fix deadlock with the SPI chip variant]
+ - linux 6.9.10-1
+ NOTE: https://git.kernel.org/linus/0913ec336a6c0c4a2b296bd9f74f8e41c4c83c8c (6.10)
+CVE-2024-41035 [USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor]
+ - linux 6.9.10-1
+ NOTE: https://git.kernel.org/linus/a368ecde8a5055b627749b09c6218ef793043e47 (6.10)
+CVE-2024-41034 [nilfs2: fix kernel bug on rename operation of broken directory]
+ - linux 6.9.10-1
+ NOTE: https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 (6.10)
+CVE-2024-41033 [cachestat: do not flush stats in recency check]
+ - linux 6.9.10-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/5a4d8944d6b1e1aaaa83ea42c116b520b4ed0394 (6.10)
+CVE-2024-41032 [mm: vmalloc: check if a hash-index is in cpu_possible_mask]
+ - linux 6.9.10-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a34acf30b19bc4ee3ba2f1082756ea2604c19138 (6.10)
+CVE-2024-41031 [mm/filemap: skip to create PMD-sized page cache if needed]
+ - linux 6.9.10-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/3390916aca7af1893ed2ebcdfee1d6fdb65bb058 (6.10)
+CVE-2024-41030 [ksmbd: discard write access to the directory open]
+ - linux 6.9.10-1
+ NOTE: https://git.kernel.org/linus/e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd (6.10)
+CVE-2024-41029 [nvmem: core: limit cell sysfs permissions to main attribute ones]
+ - linux 6.9.10-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/6bef98bafd82903a8d461463f9594f19f1fd6a85 (6.10)
+CVE-2024-41028 [platform/x86: toshiba_acpi: Fix array out-of-bounds access]
+ - linux 6.9.10-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa (6.10)
+CVE-2024-41027 [Fix userfaultfd_api to return EINVAL as expected]
+ - linux 6.9.10-1
+ NOTE: https://git.kernel.org/linus/1723f04caacb32cadc4e063725d836a0c4450694 (6.10)
+CVE-2024-41026 [mmc: davinci_mmc: Prevent transmitted data size from exceeding sgm's length]
+ - linux 6.9.10-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/16198eef11c1929374381d7f6271b4bf6aa44615 (6.10)
+CVE-2024-41025 [misc: fastrpc: Fix memory leak in audio daemon attach operation]
+ - linux 6.9.10-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/ad0bd973a033003ca578c42a760d1dc77aeea15e (6.10)
+CVE-2024-41024 [misc: fastrpc: Restrict untrusted app to attach to privileged PD]
+ - linux 6.9.10-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/bab2f5e8fd5d2f759db26b78d9db57412888f187 (6.10)
+CVE-2024-41023 [sched/deadline: Fix task_struct reference leak]
+ - linux 6.9.10-1
+ NOTE: https://git.kernel.org/linus/b58652db66c910c2245f5bee7deca41c12d707b9 (6.10)
+CVE-2024-41022 [drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()]
+ - linux 6.9.12-1
+ NOTE: https://git.kernel.org/linus/6769a23697f17f9bf9365ca8ed62fe37e361a05a (6.11-rc1)
+CVE-2024-41021 [s390/mm: Fix VM_FAULT_HWPOISON handling in do_exception()]
+ - linux 6.9.12-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/df39038cd89525d465c2c8827eb64116873f141a (6.11-rc1)
+CVE-2024-41020 [filelock: Fix fcntl/close race recovery compat path]
+ - linux 6.9.12-1
+ NOTE: https://git.kernel.org/linus/f8138f2ad2f745b9a1c696a05b749eabe44337ea (6.11-rc1)
+CVE-2023-52887 [net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new]
+ - linux 6.9.8-1
+ [bookworm] - linux 6.1.98-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/d3e2904f71ea0fe7eaff1d68a2b0363c888ea0fb (6.10-rc6)
CVE-2024-7202 (The query functionality of WinMatrix3 Web package from Simopro Technol ...)
NOT-FOR-US: Simopro Technology
CVE-2024-7201 (The login functionality of WinMatrix3 Web package from Simopro Technol ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/61416f312cc84c8b0b6bf5caa417d21e3e6ab637
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/61416f312cc84c8b0b6bf5caa417d21e3e6ab637
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240729/e713d07d/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list