[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Jun 25 16:52:19 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
18e03b8b by Salvatore Bonaccorso at 2024-06-25T17:49:56+02:00
Merge Linux CVEs from kernel-sec
Signed-off-by: Salvatore Bonaccorso <carnil at debian.org>
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,121 @@
+CVE-2024-39471 [drm/amdgpu: add error handle to avoid out-of-bounds]
+ - linux <unfixed>
+ [bookworm] - linux 6.1.94-1
+ NOTE: https://git.kernel.org/linus/8b2faf1a4f3b6c748c0da36cda865a226534d520 (6.10-rc1)
+CVE-2024-39470 [eventfs: Fix a possible null pointer dereference in eventfs_find_events()]
+ - linux <unfixed>
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/d4e9a968738bf66d3bb852dd5588d4c7afd6d7f4 (6.10-rc1)
+CVE-2024-39469 [nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors]
+ - linux <unfixed>
+ NOTE: https://git.kernel.org/linus/7373a51e7998b508af7136530f3a997b286ce81c (6.10-rc3)
+CVE-2024-39468 [smb: client: fix deadlock in smb2_find_smb_tcon()]
+ - linux <unfixed>
+ [bookworm] - linux 6.1.94-1
+ NOTE: https://git.kernel.org/linus/02c418774f76a0a36a6195c9dbf8971eb4130a15 (6.10-rc3)
+CVE-2024-39467 [f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode()]
+ - linux <unfixed>
+ [bookworm] - linux 6.1.94-1
+ NOTE: https://git.kernel.org/linus/20faaf30e55522bba2b56d9c46689233205d7717 (6.10-rc1)
+CVE-2024-39466 [thermal/drivers/qcom/lmh: Check for SCM availability at probe]
+ - linux <unfixed>
+ [bookworm] - linux 6.1.94-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/d9d3490c48df572edefc0b64655259eefdcbb9be (6.10-rc1)
+CVE-2024-39465 [media: mgb4: Fix double debugfs remove]
+ - linux <unfixed>
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/825fc49497957310e421454fe3fb8b8d8d8e2dd2 (6.10-rc3)
+CVE-2024-39464 [media: v4l: async: Fix notifier list entry init]
+ - linux <unfixed>
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/6d8acd02c4c6a8f917eefac1de2e035521ca119d (6.10-rc1)
+CVE-2024-39463 [9p: add missing locking around taking dentry fid list]
+ - linux <unfixed>
+ [bookworm] - linux 6.1.94-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/c898afdc15645efb555acb6d85b484eb40a45409 (6.10-rc2)
+CVE-2024-39462 [clk: bcm: dvp: Assign ->num before accessing ->hws]
+ - linux <unfixed>
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/9368cdf90f52a68120d039887ccff74ff33b4444 (6.10-rc1)
+CVE-2024-39461 [clk: bcm: rpi: Assign ->num before accessing ->hws]
+ - linux <unfixed>
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/6dc445c1905096b2ed4db1a84570375b4e00cc0f (6.10-rc1)
+CVE-2024-39371 [io_uring: check for non-NULL file pointer in io_file_can_poll()]
+ - linux <unfixed>
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/5fc16fa5f13b3c06fdb959ef262050bd810416a2 (6.10-rc3)
+CVE-2024-39362 [i2c: acpi: Unbind mux adapters before delete]
+ - linux <unfixed>
+ NOTE: https://git.kernel.org/linus/3f858bbf04dbac934ac279aaee05d49eb9910051 (6.10-rc1)
+CVE-2024-39301 [net/9p: fix uninit-value in p9_client_rpc()]
+ - linux <unfixed>
+ [bookworm] - linux 6.1.94-1
+ NOTE: https://git.kernel.org/linus/25460d6f39024cc3b8241b14c7ccf0d6f11a736a (6.10-rc2)
+CVE-2024-39298 [mm/memory-failure: fix handling of dissolved but not taken off from buddy pages]
+ - linux <unfixed>
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/8cf360b9d6a840700e06864236a01a883b34bbad (6.10-rc1)
+CVE-2024-39296 [bonding: fix oops during rmmod]
+ - linux <unfixed>
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a45835a0bb6ef7d5ddbc0714dd760de979cb6ece (6.10-rc1)
+CVE-2024-39293 [Revert "xsk: Support redirect to any socket bound to the same umem"]
+ - linux <unfixed>
+ NOTE: https://git.kernel.org/linus/7fcf26b315bbb728036da0862de6b335da83dff2 (6.10-rc3)
+CVE-2024-39276 [ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()]
+ - linux <unfixed>
+ [bookworm] - linux 6.1.94-1
+ NOTE: https://git.kernel.org/linus/0c0b4a49d3e7f49690a6827a41faeffad5df7e21 (6.10-rc1)
+CVE-2024-38661 [s390/ap: Fix crash in AP internal function modify_bitmap()]
+ - linux <unfixed>
+ [bookworm] - linux 6.1.94-1
+ NOTE: https://git.kernel.org/linus/d4f9d5a99a3fd1b1c691b7a1a6f8f3f25f4116c9 (6.10-rc1)
+CVE-2024-38385 [genirq/irqdesc: Prevent use-after-free in irq_find_at_or_after()]
+ - linux <unfixed>
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b84a8aba806261d2f759ccedf4a2a6a80a5e55ba (6.10-rc1)
+CVE-2024-38306 [btrfs: protect folio::private when attaching extent buffer folios]
+ - linux <unfixed>
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/f3a5367c679d31473d3fbb391675055b4792c309 (6.10-rc3)
+CVE-2024-37354 [btrfs: fix crash on racing fsync and size-extending write into prealloc]
+ - linux <unfixed>
+ [bookworm] - linux 6.1.94-1
+ NOTE: https://git.kernel.org/linus/9d274c19a71b3a276949933859610721a453946b (6.10-rc3)
+CVE-2024-37078 [nilfs2: fix potential kernel bug due to lack of writeback flag waiting]
+ - linux <unfixed>
+ NOTE: https://git.kernel.org/linus/a4ca369ca221bb7e06c725792ac107f0e48e82e7 (6.10-rc3)
+CVE-2022-48772 [media: lgdt3306a: Add a check against null-pointer-def]
+ - linux <unfixed>
+ [bookworm] - linux 6.1.94-1
+ NOTE: https://git.kernel.org/linus/c1115ddbda9c930fba0fdd062e7a8873ebaf898d (6.10-rc1)
+CVE-2021-4440 [x86/xen: Drop USERGS_SYSRET64 paravirt call]
+ - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux 5.10.218-1
+ NOTE: 5.10.y specific vulnerability due to missing backported commit
CVE-2024-6297 (Several plugins for WordPress hosted on WordPress.org have been compro ...)
NOT-FOR-US: WordPress plugin
CVE-2024-6295 (udn News Android APP stores the unencrypted user session in the local ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/18e03b8bb9bc3a88cd9276109b69104a183470d1
--
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/18e03b8bb9bc3a88cd9276109b69104a183470d1
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240625/baf3e5d5/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list