[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Nov 19 07:10:54 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
0d715ef5 by Salvatore Bonaccorso at 2024-11-19T08:10:20+01:00
Merge Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,148 @@
+CVE-2024-50302 [HID: core: zero-initialize the report buffer]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/177f25d1292c7e16e1199b39c85480f7f8815552 (6.12-rc7)
+CVE-2024-50301 [security/keys: fix slab-out-of-bounds in key_task_permission]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/4a74da044ec9ec8679e6beccc4306b936b62873f (6.12-rc7)
+CVE-2024-50300 [regulator: rtq2208: Fix uninitialized use of regulator_config]
+ - linux 6.11.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/2feb023110843acce790e9089e72e9a9503d9fa5 (6.12-rc7)
+CVE-2024-50299 [sctp: properly validate chunk size in sctp_sf_ootb()]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/0ead60804b64f5bd6999eec88e503c6a1a242d41 (6.12-rc7)
+CVE-2024-50298 [net: enetc: allocate vf_state during PF probes]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/e15c5506dd39885cd047f811a64240e2e8ab401b (6.12-rc7)
+CVE-2024-50297 [net: xilinx: axienet: Enqueue Tx packets in dql before dmaengine starts]
+ - linux 6.11.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/5ccdcdf186aec6b9111845fd37e1757e9b413e2f (6.12-rc7)
+CVE-2024-50296 [net: hns3: fix kernel crash when uninstalling driver]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/df3dff8ab6d79edc942464999d06fbaedf8cdd18 (6.12-rc7)
+CVE-2024-50295 [net: arc: fix the device for dma_map_single/dma_unmap_single]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/71803c1dfa29e0d13b99e48fda11107cc8caebc7 (6.12-rc7)
+CVE-2024-50294 [rxrpc: Fix missing locking causing hanging calls]
+ - linux 6.11.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/fc9de52de38f656399d2ce40f7349a6b5f86e787 (6.12-rc7)
+CVE-2024-50293 [net/smc: do not leave a dangling sk pointer in __smc_create()]
+ - linux 6.11.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/d293958a8595ba566fb90b99da4d6263e14fee15 (6.12-rc7)
+CVE-2024-50292 [ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/9bb4af400c386374ab1047df44c508512c08c31f (6.12-rc7)
+CVE-2024-50291 [media: dvb-core: add missing buffer index check]
+ - linux 6.11.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/fa88dc7db176c79b50adb132a56120a1d4d9d18b (6.12-rc7)
+CVE-2024-50290 [media: cx24116: prevent overflows on SNR calculus]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/576a307a7650bd544fbb24df801b9b7863b85e2f (6.12-rc7)
+CVE-2024-50289 [media: av7110: fix a spectre vulnerability]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/458ea1c0be991573ec436aa0afa23baacfae101a (6.12-rc7)
+CVE-2024-50288 [media: vivid: fix buffer overwrite when using > 32 buffers]
+ - linux 6.11.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/96d8569563916fe2f8fe17317e20e43f54f9ba4b (6.12-rc7)
+CVE-2024-50287 [media: v4l2-tpg: prevent the risk of a division by zero]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/e6a3ea83fbe15d4818d01804e904cbb0e64e543b (6.12-rc7)
+CVE-2024-50286 [ksmbd: fix slab-use-after-free in ksmbd_smb2_session_create]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/0a77715db22611df50b178374c51e2ba0d58866e (6.12-rc7)
+CVE-2024-50285 [ksmbd: check outstanding simultaneous SMB operations]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/0a77d947f599b1f39065015bec99390d0c0022ee (6.12-rc7)
+CVE-2024-50284 [ksmbd: Fix the missing xa_store error check]
+ - linux 6.11.9-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/3abab905b14f4ba756d413f37f1fb02b708eee93 (6.12-rc7)
+CVE-2024-50283 [ksmbd: fix slab-use-after-free in smb3_preauth_hash_rsp]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/b8fc56fbca7482c1e5c0e3351c6ae78982e25ada (6.12-rc7)
+CVE-2024-50282 [drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/4d75b9468021c73108b4439794d69e892b1d24e3 (6.12-rc7)
+CVE-2024-50281 [KEYS: trusted: dcp: fix NULL dereference in AEAD crypto operation]
+ - linux 6.11.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/04de7589e0a95167d803ecadd115235ba2c14997 (6.12-rc7)
+CVE-2024-50280 [dm cache: fix flushing uninitialized delayed_work on cache_ctr error]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/135496c208ba26fd68cdef10b64ed7a91ac9a7ff (6.12-rc7)
+CVE-2024-50279 [dm cache: fix out-of-bounds access to the dirty bitset when resizing]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/792227719725497ce10a8039803bec13f89f8910 (6.12-rc7)
+CVE-2024-50278 [dm cache: fix potential out-of-bounds access on the first resume]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/c0ade5d98979585d4f5a93e4514c2e9a65afa08d (6.12-rc7)
+CVE-2024-50277 [dm: fix a crash if blk_alloc_disk fails]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/fed13a5478680614ba97fc87e71f16e2e197912e (6.12-rc7)
+CVE-2024-50276 [net: vertexcom: mse102x: Fix possible double free of TX skb]
+ - linux 6.11.9-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/1f26339b2ed63d1e8e18a18674fb73a392f3660e (6.12-rc7)
+CVE-2024-50275 [arm64/sve: Discard stale CPU state when handling SVE traps]
+ - linux 6.11.9-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/751ecf6afd6568adc98f2a6052315552c0483d18 (6.12-rc7)
+CVE-2024-50274 [idpf: avoid vport access in idpf_get_link_ksettings]
+ - linux 6.11.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/81d2fb4c7c18a3b36ba3e00b9d5b753107472d75 (6.12-rc7)
+CVE-2024-50273 [btrfs: reinitialize delayed ref list after deleting it from the list]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/c9a75ec45f1111ef530ab186c2a7684d0a0c9245 (6.12-rc7)
+CVE-2024-50272 [filemap: Fix bounds checking in filemap_read()]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/ace149e0830c380ddfce7e466fe860ca502fe4ee (6.12-rc7)
+CVE-2024-50271 [signal: restore the override_rlimit logic]
+ - linux 6.11.9-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/9e05e5c7ee8758141d2db7e8fea2cab34500c6ed (6.12-rc7)
+CVE-2024-50270 [mm/damon/core: avoid overflow in damon_feed_loop_next_input()]
+ - linux 6.11.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/4401e9d10ab0281a520b9f8c220f30f60b5c248f (6.12-rc7)
+CVE-2024-50269 [usb: musb: sunxi: Fix accessing an released usb phy]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/498dbd9aea205db9da674994b74c7bf8e18448bd (6.12-rc7)
+CVE-2024-50268 [usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/7dd08a0b4193087976db6b3ee7807de7e8316f96 (6.12-rc7)
+CVE-2024-50267 [USB: serial: io_edgeport: fix use after free in debug printk]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/37bb5628379295c1254c113a407cab03a0f4d0b4 (6.12-rc7)
+CVE-2024-50266 [clk: qcom: videocc-sm8350: use HW_CTRL_TRIGGER for vcodec GDSCs]
+ - linux 6.11.9-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/f903663a8dcd6e1656e52856afbf706cc14cbe6d (6.12-rc7)
+CVE-2024-50265 [ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove()]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/0b63c0e01fba40e3992bc627272ec7b618ccaef7 (6.12-rc7)
+CVE-2024-50264 [vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans]
+ - linux 6.11.9-1
+ NOTE: https://git.kernel.org/linus/6ca575374dd9a507cdd16dfa0e78c2e9e20bd05f (6.12)
+CVE-2023-52921 [drm/amdgpu: fix possible UAF in amdgpu_cs_pass1()]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ NOTE: https://git.kernel.org/linus/90e065677e0362a777b9db97ea21d43a39211399 (6.5-rc6)
CVE-2024-10524
- wget <unfixed>
NOTE: https://www.openwall.com/lists/oss-security/2024/11/18/6
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0d715ef5d659e7b81f4336d058ec9e653dc9ac4d
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0d715ef5d659e7b81f4336d058ec9e653dc9ac4d
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241119/ad37a62a/attachment.htm>
More information about the debian-security-tracker-commits
mailing list