[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Nov 5 19:14:01 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
7904c19f by Salvatore Bonaccorso at 2024-11-05T20:13:32+01:00
Merge Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,224 @@
+CVE-2024-50138 [bpf: Use raw_spinlock_t in ringbuf]
+ - linux 6.11.6-1
+ [bookworm] - linux 6.1.115-1
+ NOTE: https://git.kernel.org/linus/8b62645b09f870d70c7910e7550289d444239a46 (6.12-rc4)
+CVE-2024-50137 [reset: starfive: jh71x0: Fix accessing the empty member on JH7110 SoC]
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/2cf59663660799ce16f4dfbed97cdceac7a7fa11 (6.12-rc4)
+CVE-2024-50136 [net/mlx5: Unregister notifier on eswitch init failure]
+ - linux 6.11.6-1
+ [bookworm] - linux 6.1.115-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/1da9cfd6c41c2e6bbe624d0568644e1521c33e12 (6.12-rc4)
+CVE-2024-50135 [nvme-pci: fix race condition between reset and nvme_dev_disable()]
+ - linux 6.11.6-1
+ NOTE: https://git.kernel.org/linus/26bc0a81f64ce00fc4342c38eeb2eddaad084dd2 (6.12-rc4)
+CVE-2024-50134 [drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA]
+ - linux 6.11.6-1
+ [bookworm] - linux 6.1.115-1
+ NOTE: https://git.kernel.org/linus/d92b90f9a54d9300a6e883258e79f36dab53bfae (6.12-rc2)
+CVE-2024-50133 [LoongArch: Don't crash in stack_top() for tasks without vDSO]
+ - linux 6.11.6-1
+ [bookworm] - linux 6.1.115-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/134475a9ab8487527238d270639a8cb74c10aab2 (6.12-rc5)
+CVE-2024-50132 [tracing/probes: Fix MAX_TRACE_ARGS limit handling]
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/73f35080477e893aa6f4c8d388352b871b288fbc (6.12-rc5)
+CVE-2024-50131 [tracing: Consider the NULL character when validating the event length]
+ - linux 6.11.6-1
+ [bookworm] - linux 6.1.115-1
+ NOTE: https://git.kernel.org/linus/0b6e2e22cb23105fcb171ab92f0f7516c69c8471 (6.12-rc5)
+CVE-2024-50130 [netfilter: bpf: must hold reference on net namespace]
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/1230fe7ad3974f7bf6c78901473e039b34d4fb1f (6.12-rc5)
+CVE-2024-50129 [net: pse-pd: Fix out of bound for loop]
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/f2767a41959e60763949c73ee180e40c686e807e (6.12-rc5)
+CVE-2024-50128 [net: wwan: fix global oob in wwan_rtnl_policy]
+ - linux 6.11.6-1
+ [bookworm] - linux 6.1.115-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/47dd5447cab8ce30a847a0337d5341ae4c7476a7 (6.12-rc5)
+CVE-2024-50127 [net: sched: fix use-after-free in taprio_change()]
+ - linux 6.11.6-1
+ [bookworm] - linux 6.1.115-1
+ NOTE: https://git.kernel.org/linus/f504465970aebb2467da548f7c1efbbf36d0f44b (6.12-rc5)
+CVE-2024-50126 [net: sched: use RCU read-side critical section in taprio_dump()]
+ - linux 6.11.6-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b22db8b8befe90b61c98626ca1a2fbb0505e9fe3 (6.12-rc5)
+CVE-2024-50125 [Bluetooth: SCO: Fix UAF on sco_sock_timeout]
+ - linux 6.11.6-1
+ [bookworm] - linux 6.1.115-1
+ NOTE: https://git.kernel.org/linus/1bf4470a3939c678fb822073e9ea77a0560bc6bb (6.12-rc5)
+CVE-2024-50124 [Bluetooth: ISO: Fix UAF on iso_sock_timeout]
+ - linux 6.11.6-1
+ [bookworm] - linux 6.1.115-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/246b435ad668596aa0e2bbb9d491b6413861211a (6.12-rc5)
+CVE-2024-50123 [bpf: Add the missing BPF_LINK_TYPE invocation for sockmap]
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/c2f803052bc7a7feb2e03befccc8e49b6ff1f5f5 (6.12-rc5)
+CVE-2024-50122 [PCI: Hold rescan lock while adding devices during host probe]
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/1d59d474e1cb7d4fdf87dfaf96f44647f13ea590 (6.12-rc5)
+CVE-2024-50121 [nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net]
+ - linux 6.11.6-1
+ NOTE: https://git.kernel.org/linus/d5ff2fb2e7167e9483846e34148e60c0c016a1f6 (6.12-rc5)
+CVE-2024-50120 [smb: client: Handle kstrdup failures for passwords]
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/9a5dd61151399ad5a5d69aad28ab164734c1e3bc (6.12-rc5)
+CVE-2024-50119 [cifs: fix warning when destroy 'cifs_io_request_pool']
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/2ce1007f42b8a6a0814386cb056feb28dc6d6091 (6.12-rc5)
+CVE-2024-50118 [btrfs: reject ro->rw reconfiguration if there are hard ro requirements]
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/3c36a72c1d27de6618c1c480c793d9924640f5bb (6.12-rc5)
+CVE-2024-50117 [drm/amd: Guard against bad data for ATIF ACPI method]
+ - linux 6.11.6-1
+ [bookworm] - linux 6.1.115-1
+ NOTE: https://git.kernel.org/linus/bf58f03931fdcf7b3c45cb76ac13244477a60f44 (6.12-rc5)
+CVE-2024-50116 [nilfs2: fix kernel bug due to missing clearing of buffer delay flag]
+ - linux 6.11.6-1
+ [bookworm] - linux 6.1.115-1
+ NOTE: https://git.kernel.org/linus/6ed469df0bfbef3e4b44fca954a781919db9f7ab (6.12-rc5)
+CVE-2024-50115 [KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory]
+ - linux 6.11.6-1
+ [bookworm] - linux 6.1.115-1
+ NOTE: https://git.kernel.org/linus/f559b2e9c5c5308850544ab59396b7d53cfc67bd (6.12-rc5)
+CVE-2024-50114 [KVM: arm64: Unregister redistributor for failed vCPU creation]
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/ae8f8b37610269009326f4318df161206c59843e (6.12-rc5)
+CVE-2024-50113 [firewire: core: fix invalid port index for parent device]
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/f6a6780e0b9bbcf311a727afed06fee533a5e957 (6.12-rc5)
+CVE-2024-50112 [x86/lam: Disable ADDRESS_MASKING in most cases]
+ - linux 6.11.6-1
+ NOTE: https://git.kernel.org/linus/3267cb6d3a174ff83d6287dcd5b0047bbd912452 (6.12-rc5)
+CVE-2024-50111 [LoongArch: Enable IRQ if do_ale() triggered in irq-enabled context]
+ - linux 6.11.6-1
+ NOTE: https://git.kernel.org/linus/69cc6fad5df4ce652d969be69acc60e269e5eea1 (6.12-rc5)
+CVE-2024-50110 [xfrm: fix one more kernel-infoleak in algo dumping]
+ - linux 6.11.6-1
+ [bookworm] - linux 6.1.115-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/6889cd2a93e1e3606b3f6e958aa0924e836de4d2 (6.12-rc5)
+CVE-2024-50109 [md/raid10: fix null ptr dereference in raid10_size()]
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/825711e00117fc686ab89ac36a9a7b252dc349c6 (6.12-rc5)
+CVE-2024-50108 [drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too]
+ - linux 6.11.6-1
+ [bookworm] - linux 6.1.115-1
+ NOTE: https://git.kernel.org/linus/ba1959f71117b27f3099ee789e0815360b4081dd (6.12-rc5)
+CVE-2024-50107 [platform/x86/intel/pmc: Fix pmc_core_iounmap to call iounmap for valid addresses]
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/48771da48072823956b271dddd568492c13d8170 (6.12-rc5)
+CVE-2024-50106 [nfsd: fix race between laundromat and free_stateid]
+ - linux 6.11.6-1
+ NOTE: https://git.kernel.org/linus/8dd91e8d31febf4d9cca3ae1bb4771d33ae7ee5a (6.12-rc5)
+CVE-2024-50105 [ASoC: qcom: sc7280: Fix missing Soundwire runtime stream alloc]
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/db7e59e6a39a4d3d54ca8197c796557e6d480b0d (6.12-rc5)
+CVE-2024-50104 [ASoC: qcom: sdm845: add missing soundwire runtime stream alloc]
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/d0e806b0cc6260b59c65e606034a63145169c04c (6.12-rc5)
+CVE-2024-50103 [ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()]
+ - linux 6.11.6-1
+ [bookworm] - linux 6.1.115-1
+ NOTE: https://git.kernel.org/linus/49da1463c9e3d2082276c3e0e2a8b65a88711cd2 (6.12-rc5)
+CVE-2024-50102 [x86: fix user address masking non-canonical speculation issue]
+ - linux 6.11.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/86e6b1547b3d013bc392adf775b89318441403c2 (6.12-rc5)
+CVE-2024-50101 [iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices]
+ - linux 6.11.5-1
+ [bookworm] - linux 6.1.115-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/6e02a277f1db24fa039e23783c8921c7b0e5b1b3 (6.12-rc4)
+CVE-2024-50100 [USB: gadget: dummy-hcd: Fix "task hung" problem]
+ - linux 6.11.5-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/5189df7b8088268012882c220d6aca4e64981348 (6.12-rc4)
+CVE-2024-50099 [arm64: probes: Remove broken LDR (literal) uprobe support]
+ - linux 6.11.5-1
+ [bookworm] - linux 6.1.115-1
+ NOTE: https://git.kernel.org/linus/acc450aa07099d071b18174c22a1119c57da8227 (6.12-rc4)
+CVE-2024-50098 [scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down]
+ - linux 6.11.5-1
+ [bookworm] - linux 6.1.115-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/19a198b67767d952c8f3d0cf24eb3100522a8223 (6.12-rc4)
+CVE-2024-50097 [net: fec: don't save PTP state if PTP is unsupported]
+ - linux 6.11.4-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/6be063071a457767ee229db13f019c2ec03bfe44 (6.12-rc3)
+CVE-2024-50096 [nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error]
+ - linux 6.11.4-1
+ [bookworm] - linux 6.1.115-1
+ NOTE: https://git.kernel.org/linus/835745a377a4519decd1a36d6b926e369b3033e2 (6.12-rc3)
+CVE-2024-50095 [RDMA/mad: Improve handling of timed out WRs of mad agent]
+ - linux 6.11.4-1
+ [bookworm] - linux 6.1.115-1
+ NOTE: https://git.kernel.org/linus/2a777679b8ccd09a9a65ea0716ef10365179caac (6.12-rc1)
+CVE-2024-50094 [sfc: Don't invoke xdp_do_flush() from netpoll.]
+ - linux 6.11.4-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/55e802468e1d38dec8e25a2fdb6078d45b647e8c (6.12-rc3)
+CVE-2024-50093 [thermal: intel: int340x: processor: Fix warning during module unload]
+ - linux 6.11.4-1
+ [bookworm] - linux 6.1.115-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/99ca0b57e49fb73624eede1c4396d9e3d10ccf14 (6.12-rc3)
+CVE-2024-50092 [net: netconsole: fix wrong warning]
+ - linux 6.11.4-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/d94785bb46b6167382b1de3290eccc91fa98df53 (6.12-rc3)
+CVE-2024-50091 [dm vdo: don't refer to dedupe_context after releasing it]
+ - linux 6.11.4-1
+ NOTE: https://git.kernel.org/linus/0808ebf2f80b962e75741a41ced372a7116f1e26 (6.12-rc1)
+CVE-2024-50090 [drm/xe/oa: Fix overflow in oa batch buffer]
+ - linux 6.11.4-1
+ NOTE: https://git.kernel.org/linus/6c10ba06bb1b48acce6d4d9c1e33beb9954f1788 (6.12-rc1)
+CVE-2024-50089 [unicode: Don't special case ignorable code points]
+ - linux 6.11.4-1
+ [bookworm] - linux 6.1.115-1
+ NOTE: https://git.kernel.org/linus/5c26d2f1d3f5e4be3e196526bead29ecb139cf91 (6.12-rc3)
CVE-2023-52920 [bpf: support non-r10 register spill/fill to/from stack in precision tracking]
- linux 6.8.9-1
NOTE: https://git.kernel.org/linus/41f6f64e6999a837048b1bd13a2f8742964eca6b (6.8-rc1)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7904c19f86fd7c24b92871c08c73f0a79ed7ca31
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7904c19f86fd7c24b92871c08c73f0a79ed7ca31
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241105/28bb8091/attachment.htm>
More information about the debian-security-tracker-commits
mailing list