[Git][security-tracker-team/security-tracker][master] Merge CVEs for Linux from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed May 1 07:01:22 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
9254f047 by Salvatore Bonaccorso at 2024-05-01T08:00:42+02:00
Merge CVEs for Linux from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,426 @@
+CVE-2024-27021 [r8169: fix LED-related deadlock on module removal]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/19fa4f2a85d777a8052e869c1b892a2f7556569d (6.9-rc4)
+CVE-2024-27020 [netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/f969eb84ce482331a991079ab7a5c4dc3b7f89bf (6.9-rc5)
+CVE-2024-27019 [netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/d78d867dcea69c328db30df665be5be7d0148484 (6.9-rc5)
+CVE-2024-27018 [netfilter: br_netfilter: skip conntrack input hook for promisc packets]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/751de2012eafa4d46d8081056761fa0e9cc8a178 (6.9-rc5)
+CVE-2024-27017 [netfilter: nft_set_pipapo: walk over current view on netlink dump]
+	- linux <unfixed>
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/29b359cf6d95fd60730533f7f10464e95bd17c73 (6.9-rc5)
+CVE-2024-27016 [netfilter: flowtable: validate pppoe header]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/87b3593bed1868b2d9fe096c01bcdf0ea86cbebf (6.9-rc5)
+CVE-2024-27015 [netfilter: flowtable: incorrect pppoe tuple]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6db5dc7b351b9569940cd1cf445e237c42cd6d27 (6.9-rc5)
+CVE-2024-27014 [net/mlx5e: Prevent deadlock while disabling aRFS]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/fef965764cf562f28afb997b626fc7c3cec99693 (6.9-rc5)
+CVE-2024-27013 [tun: limit printing rate when illegal packet received by tun dev]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/f8bbc07ac535593139c875ffa19af924b1084540 (6.9-rc5)
+CVE-2024-27012 [netfilter: nf_tables: restore set elements when delete set fails]
+	- linux <unfixed>
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/e79b47a8615d42c68aaeb68971593333667382ed (6.9-rc5)
+CVE-2024-27011 [netfilter: nf_tables: fix memleak in map from abort path]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/86a1471d7cde792941109b93b558b5dc078b9ee9 (6.9-rc5)
+CVE-2024-27010 [net/sched: Fix mirred deadlock on device recursion]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/0f022d32c3eca477fbf79a205243a6123ed0fe11 (6.9-rc5)
+CVE-2024-27009 [s390/cio: fix race condition during online processing]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/2d8527f2f911fab84aec04df4788c0c23af3df48 (6.9-rc5)
+CVE-2024-27008 [drm: nv04: Fix out of bounds access]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/cf92bb778eda7830e79452c6917efa8474a30c1e (6.9-rc5)
+CVE-2024-27007 [userfaultfd: change src_folio after ensuring it's unpinned in UFFDIO_MOVE]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/c0205eaf3af9f5db14d4b5ee4abacf4a583c3c50 (6.9-rc5)
+CVE-2024-27006 [thermal/debugfs: Add missing count increment to thermal_debug_tz_trip_up()]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b552f63cd43735048bbe9bfbb7a9dcfce166fbdd (6.9-rc5)
+CVE-2024-27005 [interconnect: Don't access req_list while it's being manipulated]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/de1bf25b6d771abdb52d43546cf57ad775fb68a1 (6.9-rc5)
+CVE-2024-27004 [clk: Get runtime PM before walking tree during disable_unused]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/e581cf5d216289ef292d1a4036d53ce90e122469 (6.9-rc5)
+CVE-2024-27003 [clk: Get runtime PM before walking tree for clk_summary]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/9d1e795f754db1ac3344528b7af0b17b8146f321 (6.9-rc5)
+CVE-2024-27002 [clk: mediatek: Do a runtime PM get on controllers during probe]
+	- linux <unfixed>
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/2f7b1d8b5505efb0057cd1ab85fca206063ea4c3 (6.9-rc5)
+CVE-2024-27001 [comedi: vmk80xx: fix incomplete endpoint checking]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/d1718530e3f640b7d5f0050e725216eab57a85d8 (6.9-rc5)
+CVE-2024-27000 [serial: mxs-auart: add spinlock around changing cts state]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/54c4ec5f8c471b7c1137a1f769648549c423c026 (6.9-rc5)
+CVE-2024-26999 [serial/pmac_zilog: Remove flawed mitigation for rx irq flood]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/1be3226445362bfbf461c92a5bcdb1723f2e4907 (6.9-rc5)
+CVE-2024-26998 [serial: core: Clearing the circular buffer before NULLifying it]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/9cf7ea2eeb745213dc2a04103e426b960e807940 (6.9-rc5)
+CVE-2024-26997 [usb: dwc2: host: Fix dereference issue in DDMA completion flow.]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/eed04fa96c48790c1cce73c8a248e9d460b088f8 (6.9-rc5)
+CVE-2024-26996 [usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/6334b8e4553cc69f51e383c9de545082213d785e (6.9-rc5)
+CVE-2024-26995 [usb: typec: tcpm: Correct the PDO counting in pd_set]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/c4128304c2169b4664ed6fb6200f228cead2ab70 (6.9-rc5)
+CVE-2024-26994 [speakup: Avoid crash on very long word]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/c8d2f34ea96ea3bce6ba2535f867f0d4ee3b22e1 (6.9-rc5)
+CVE-2024-26993 [fs: sysfs: Fix reference leak in sysfs_break_active_protection()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/a90bca2228c0646fc29a72689d308e5fe03e6d78 (6.9-rc5)
+CVE-2024-26992 [KVM: x86/pmu: Disable support for adaptive PEBS]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/9e985cbf2942a1bb8fcef9adc2a17d90fd7ca8ee (6.9-rc5)
+CVE-2024-26991 [KVM: x86/mmu: x86: Don't overflow lpage_info when checking attributes]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/992b54bd083c5bee24ff7cc35991388ab08598c4 (6.9-rc5)
+CVE-2024-26990 [KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/2673dfb591a359c75080dd5af3da484b89320d22 (6.9-rc5)
+CVE-2024-26989 [arm64: hibernate: Fix level3 translation fault in swsusp_save()]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/50449ca66cc5a8cbc64749cf4b9f3d3fc5f4b457 (6.9-rc5)
+CVE-2024-26988 [init/main.c: Fix potential static_command_line memory overflow]
+	- linux <unfixed>
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/46dad3c1e57897ab9228332f03e1c14798d2d3b9 (6.9-rc5)
+CVE-2024-26987 [mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/1983184c22dd84a4d95a71e5c6775c2638557dc7 (6.9-rc5)
+CVE-2024-26986 [drm/amdkfd: Fix memory leak in create_process failure]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/18921b205012568b45760753ad3146ddb9e2d4e2 (6.9-rc5)
+CVE-2024-26985 [drm/xe: Fix bo leak in intel_fb_bo_framebuffer_init]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/652ead9b746a63e4e79d7ad66d3edf0a8a5b0c2f (6.9-rc5)
+CVE-2024-26984 [nouveau: fix instmem race condition around ptr stores]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/fff1386cc889d8fb4089d285f883f8cba62d82ce (6.9-rc5)
+CVE-2024-26983 [bootconfig: use memblock_free_late to free xbc memory to buddy]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/89f9a1e876b5a7ad884918c03a46831af202c8a0 (6.9-rc5)
+CVE-2024-26982 [Squashfs: check the inode number is not the invalid value of zero]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/9253c54e01b6505d348afbc02abaa4d9f8a01395 (6.9-rc5)
+CVE-2024-26981 [nilfs2: fix OOB in nilfs_set_de_type]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/c4a7dc9523b59b3e73fd522c73e95e072f876b16 (6.9-rc5)
+CVE-2024-26980 [ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/c119f4ede3fa90a9463f50831761c28f989bfb20 (6.9-rc6)
+CVE-2024-26979 [drm/vmwgfx: Fix possible null pointer derefence with invalid contexts]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/517621b7060096e48e42f545fa6646fc00252eac (6.9-rc1)
+CVE-2024-26978 [serial: max310x: fix NULL pointer dereference in I2C instantiation]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0d27056c24efd3d63a03f3edfbcfc4827086b110 (6.9-rc1)
+CVE-2024-26977 [pci_iounmap(): Fix MMIO mapping leak]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7626913652cc786c238e2dd7d8740b17d41b2637 (6.9-rc1)
+CVE-2024-26976 [KVM: Always flush async #PF workqueue when vCPU is being destroyed]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/3d75b8aa5c29058a512db29da7cbee8052724157 (6.9-rc1)
+CVE-2024-26975 [powercap: intel_rapl: Fix a NULL pointer dereference]
+	- linux 6.7.12-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/2d1f5006ff95770da502f8cee2a224a1ff83866e (6.9-rc1)
+CVE-2024-26974 [crypto: qat - resolve race condition during AER recovery]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/7d42e097607c4d246d99225bf2b195b6167a210c (6.9-rc1)
+CVE-2024-26973 [fat: fix uninitialized field in nostale filehandles]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/fde2497d2bc3a063d8af88b258dbadc86bd7b57c (6.9-rc1)
+CVE-2024-26972 [ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path]
+	- linux <unfixed>
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6379b44cdcd67f5f5d986b73953e99700591edfa (6.9-rc1)
+CVE-2024-26971 [clk: qcom: gcc-ipq5018: fix terminating of frequency table arrays]
+	- linux 6.7.12-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/90ad946fff70f312b8d23226afc38c13ddd88c4b (6.9-rc1)
+CVE-2024-26970 [clk: qcom: gcc-ipq6018: fix terminating of frequency table arrays]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/cdbc6e2d8108bc47895e5a901cfcaf799b00ca8d (6.9-rc1)
+CVE-2024-26969 [clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/1040ef5ed95d6fd2628bad387d78a61633e09429 (6.9-rc1)
+CVE-2024-26968 [clk: qcom: gcc-ipq9574: fix terminating of frequency table arrays]
+	- linux 6.7.12-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/bd2b6395671d823caa38d8e4d752de2448ae61e1 (6.9-rc1)
+CVE-2024-26967 [clk: qcom: camcc-sc8280xp: fix terminating of frequency table arrays]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6a3d70f7802a98e6c28a74f997a264118b9f50cd (6.9-rc1)
+CVE-2024-26966 [clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/a903cfd38d8dee7e754fb89fd1bebed99e28003d (6.9-rc1)
+CVE-2024-26965 [clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/e2c02a85bf53ae86d79b5fccf0a75ac0b78e0c96 (6.9-rc1)
+CVE-2024-26964 [usb: xhci: Add error handling in xhci_map_urb_for_dma]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/be95cc6d71dfd0cba66e3621c65413321b398052 (6.9-rc1)
+CVE-2024-26963 [usb: dwc3-am62: fix module unload/reload behavior]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6661befe41009c210efa2c1bcd16a5cc4cff8a06 (6.9-rc1)
+CVE-2024-26962 [dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape]
+	- linux 6.7.12-1
+	NOTE: https://git.kernel.org/linus/41425f96d7aa59bc865f60f5dda3d7697b555677 (6.9-rc1)
+CVE-2024-26961 [mac802154: fix llsec key resources release in mac802154_llsec_key_del]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/e8a1e58345cf40b7b272e08ac7b32328b2543e40 (6.9-rc1)
+CVE-2024-26960 [mm: swap: fix race between free_swap_and_cache() and swapoff()]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/82b1c07a0af603e3c47b906c8e991dc96f01688e (6.9-rc1)
+CVE-2024-26959 [Bluetooth: btnxpuart: Fix btnxpuart_close]
+	- linux 6.7.12-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/664130c0b0309b360bc5bdd40a30604a9387bde8 (6.9-rc1)
+CVE-2024-26958 [nfs: fix UAF in direct writes]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/17f46b803d4f23c66cacce81db35fef3adb8f2af (6.9-rc1)
+CVE-2024-26957 [s390/zcrypt: fix reference counting on zcrypt card objects]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/50ed48c80fecbe17218afed4f8bed005c802976c (6.9-rc1)
+CVE-2024-26956 [nilfs2: fix failure to detect DAT corruption in btree and direct mappings]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/f2f26b4a84a0ef41791bd2d70861c8eac748f4ba (6.9-rc1)
+CVE-2024-26955 [nilfs2: prevent kernel bug at submit_bh_wbc()]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/269cdf353b5bdd15f1a079671b0f889113865f20 (6.9-rc1)
+CVE-2024-26954 [ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()]
+	- linux 6.7.12-1
+	NOTE: https://git.kernel.org/linus/a80a486d72e20bd12c335bcd38b6e6f19356b0aa (6.9-rc1)
+CVE-2024-26953 [net: esp: fix bad handling of pages from page_pool]
+	- linux 6.7.12-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/c3198822c6cb9fb588e446540485669cc81c5d34 (6.9-rc1)
+CVE-2024-26952 [ksmbd: fix potencial out-of-bounds when buffer offset is invalid]
+	- linux 6.7.12-1
+	NOTE: https://git.kernel.org/linus/c6cd2e8d2d9aa7ee35b1fa6a668e32a22a9753da (6.9-rc1)
+CVE-2024-26951 [wireguard: netlink: check for dangling peer via is_dead instead of empty list]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/55b6c738673871c9b0edae05d0c97995c1ff08c4 (6.9-rc1)
+CVE-2024-26950 [wireguard: netlink: access device through ctx instead of peer]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/71cbd32e3db82ea4a74e3ef9aeeaa6971969c86f (6.9-rc1)
+CVE-2024-26949 [drm/amdgpu/pm: Fix NULL pointer dereference when get power limit]
+	- linux 6.7.12-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/08ae9ef829b8055c2fdc8cfee37510c1f4721a07 (6.9-rc1)
+CVE-2024-26948 [drm/amd/display: Add a dc_state NULL check in dc_state_release]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/334b56cea5d9df5989be6cf1a5898114fa70ad98 (6.9-rc1)
+CVE-2024-26947 [ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses]
+	- linux 6.7.12-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0c66c6f4e21cb22220cbd8821c5c73fc157d20dc (6.9-rc1)
+CVE-2024-26946 [kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/4e51653d5d871f40f1bd5cf95cc7f2d8b33d063b (6.9-rc1)
+CVE-2024-26945 [crypto: iaa - Fix nr_cpus < nr_iaa case]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/5a7e89d3315d1be86aff8a8bf849023cda6547f7 (6.9-rc2)
+CVE-2024-26944 [btrfs: zoned: fix use-after-free in do_zone_finish()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/1ec17ef59168a1a6f1105f5dc517f783839a5302 (6.9-rc2)
+CVE-2024-26943 [nouveau/dmem: handle kcalloc() allocation failure]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/16e87fe23d4af6df920406494ced5c0f4354567b (6.9-rc2)
+CVE-2024-26942 [net: phy: qcom: at803x: fix kernel panic with at8031_probe]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6a4aee277740d04ac0fd54cfa17cc28261932ddc (6.9-rc2)
+CVE-2024-26941 [drm/dp: Fix divide-by-zero regression on DP MST unplug with nouveau]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/9cbd1dae842737bfafa4b10a87909fa209dde250 (6.9-rc2)
+CVE-2024-26940 [drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/4be9075fec0a639384ed19975634b662bfab938f (6.9-rc2)
+CVE-2024-26939 [drm/i915/vma: Fix UAF on destroy against retire race]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0e45882ca829b26b915162e8e86dbb1095768e9e (6.9-rc2)
+CVE-2024-26938 [drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode()]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/32e39bab59934bfd3f37097d4dd85ac5eb0fd549 (6.9-rc2)
+CVE-2024-26937 [drm/i915/gt: Reset queue_priority_hint on parking]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/4a3859ea5240365d21f6053ee219bb240d520895 (6.9-rc2)
+CVE-2024-26936 [ksmbd: validate request buffer size in smb2_allocate_rsp_buf()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/17cf0c2794bdb6f39671265aa18aea5c22ee8c4a (6.9-rc6)
+CVE-2024-26935 [scsi: core: Fix unremoved procfs host directory regression]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/f23a4d6e07570826fe95023ca1aa96a011fa9f84 (6.9-rc2)
+CVE-2024-26934 [USB: core: Fix deadlock in usb_deauthorize_interface()]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/80ba43e9f799cbdd83842fc27db667289b3150f5 (6.9-rc2)
+CVE-2024-26933 [USB: core: Fix deadlock in port "disable" sysfs attribute]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/f4d1960764d8a70318b02f15203a1be2b2554ca1 (6.9-rc2)
+CVE-2024-26932 [usb: typec: tcpm: fix double-free issue in tcpm_port_unregister_pd()]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b63f90487bdf93a4223ce7853d14717e9d452856 (6.9-rc2)
+CVE-2024-26931 [scsi: qla2xxx: Fix command flush on cable pull]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/a27d4d0e7de305def8a5098a614053be208d1aa1 (6.9-rc2)
+CVE-2024-26930 [scsi: qla2xxx: Fix double free of the ha->vp_map pointer]
+	- linux 6.7.12-1
+	NOTE: https://git.kernel.org/linus/e288285d47784fdcf7c81be56df7d65c6f10c58b (6.9-rc2)
+CVE-2024-26929 [scsi: qla2xxx: Fix double free of fcport]
+	- linux 6.7.12-1
+	[bookworm] - linux 6.1.85-1
+	NOTE: https://git.kernel.org/linus/82f522ae0d97119a43da53e0f729275691b9c525 (6.9-rc2)
+CVE-2023-52648 [drm/vmwgfx: Unmap the surface before resetting it on a plane state]
+	- linux 6.7.12-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/27571c64f1855881753e6f33c3186573afbab7ba (6.9-rc1)
+CVE-2023-52647 [media: nxp: imx8-isi: Check whether crossbar pad is non-NULL before access]
+	- linux 6.7.12-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/eb2f932100288dbb881eadfed02e1459c6b9504c (6.9-rc1)
 CVE-2024-4340 (Passing a heavily nested list to sqlparse.parse() leads to a Denial of ...)
 	- sqlparse <unfixed> (bug #1070148)
 	NOTE: Fixed by: https://github.com/andialbrecht/sqlparse/commit/b4a39d9850969b4e1d6940d32094ee0b42a2cf03 (0.5.0)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9254f047c5d7bfdc73a03121256c8d8aba107f15

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9254f047c5d7bfdc73a03121256c8d8aba107f15
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240501/5fbe1e80/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list