[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Oct 21 19:51:12 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ebdef406 by Salvatore Bonaccorso at 2024-10-21T20:50:42+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,477 @@
+CVE-2024-50002 [static_call: Handle module init failure correctly in static_call_del_module()]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/4b30051c4864234ec57290c3d142db7c88f10d8a (6.12-rc1)
+CVE-2024-50001 [net/mlx5: Fix error path in multi-packet WQE transmit]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/2bcae12c795f32ddfbf8c80d1b5f1d3286341c32 (6.12-rc2)
+CVE-2024-50000 [net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()]
+	- linux 6.11.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/f25389e779500cf4a59ef9804534237841bce536 (6.12-rc2)
+CVE-2024-49999 [afs: Fix the setting of the server responding flag]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ff98751bae40faed1ba9c6a7287e84430f7dec64 (6.12-rc2)
+CVE-2024-49998 [net: dsa: improve shutdown sequence]
+	- linux 6.11.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6c24a03a61a245fe34d47582898331fa034b6ccd (6.12-rc2)
+CVE-2024-49997 [net: ethernet: lantiq_etop: fix memory disclosure]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/45c0de18ff2dc9af01236380404bbd6a46502c69 (6.12-rc2)
+CVE-2024-49996 [cifs: Fix buffer overflow when parsing NFS reparse points]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/e2a8910af01653c1c268984855629d71fb81f404 (6.12-rc2)
+CVE-2024-49995 [tipc: guard against string buffer overrun]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/6555a2a9212be6983d2319d65276484f7c5f431a (6.12-rc1)
+CVE-2024-49994 [block: fix integer overflow in BLKSECDISCARD]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/697ba0b6ec4ae04afb67d3911799b5e2043b4455 (6.12-rc1)
+CVE-2024-49993 [iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/3cf74230c139f208b7fb313ae0054386eee31a81 (6.12-rc1)
+CVE-2024-49992 [drm/stm: Avoid use-after-free issues with crtc and plane]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/19dd9780b7ac673be95bf6fd6892a184c9db611f (6.12-rc1)
+CVE-2024-49991 [drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/c86ad39140bbcb9dc75a10046c2221f657e8083b (6.12-rc1)
+CVE-2024-49990 [drm/xe/hdcp: Check GSC structure validity]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/b4224f6bae3801d589f815672ec62800a1501b0d (6.12-rc1)
+CVE-2024-49989 [drm/amd/display: fix double free issue during amdgpu module unload]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/20b5a8f9f4670a8503aa9fa95ca632e77c6bf55d (6.12-rc1)
+CVE-2024-49988 [ksmbd: add refcnt to ksmbd_conn struct]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/ee426bfb9d09b29987369b897fe9b6485ac2be27 (6.12-rc1)
+CVE-2024-49987 [bpftool: Fix undefined behavior in qsort(NULL, 0, ...)]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/f04e2ad394e2755d0bb2d858ecb5598718bf00d5 (6.12-rc1)
+CVE-2024-49986 [platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors]
+	- linux 6.11.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/2fae3129c0c08e72b1fe93e61fd8fd203252094a (6.12-rc2)
+CVE-2024-49985 [i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/048bbbdbf85e5e00258dfb12f5e368f908801d7b (6.12-rc2)
+CVE-2024-49984 [drm/v3d: Prevent out of bounds access in performance query extensions]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/f32b5128d2c440368b5bf3a7a356823e235caabb (6.12-rc1)
+CVE-2024-49983 [ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/5c0f4cc84d3a601c99bc5e6e6eb1cbda542cce95 (6.12-rc1)
+CVE-2024-49982 [aoe: fix the potential use-after-free problem in more places]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/6d6e54fc71ad1ab0a87047fd9c211e75d86084a3 (6.12-rc2)
+CVE-2024-49981 [media: venus: fix use after free bug in venus_remove due to race condition]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/c5a85ed88e043474161bbfe54002c89c1cb50ee2 (6.12-rc1)
+CVE-2024-49980 [vrf: revert "vrf: Remove unnecessary RCU-bh critical section"]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b04c4d9eb4f25b950b33218e33b04c94e7445e51 (6.12-rc2)
+CVE-2024-49979 [net: gso: fix tcp fraglist segmentation after pull from frag_list]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/17bd3bd82f9f79f3feba15476c2b2c95a9b11ff8 (6.12-rc2)
+CVE-2024-49978 [gso: fix udp gso fraglist segmentation after pull from frag_list]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/a1e40ac5b5e9077fe1f7ae0eb88034db0f9ae1ab (6.12-rc2)
+CVE-2024-49977 [net: stmmac: Fix zero-division error when disabling tc cbs]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/675faf5a14c14a2be0b870db30a70764df81e2df (6.12-rc1)
+CVE-2024-49976 [tracing/timerlat: Drop interface_lock in stop_kthread()]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b484a02c9cedf8703eff8f0756f94618004bd165 (6.12-rc2)
+CVE-2024-49975 [uprobes: fix kernel info leak via "[uprobes]" vma]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/34820304cc2cd1804ee1f8f3504ec77813d29c8e (6.12-rc2)
+CVE-2024-49974 [NFSD: Limit the number of concurrent async COPY operations]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/aadc3bbea163b6caaaebfdd2b6c4667fbc726752 (6.12-rc1)
+CVE-2024-49973 [r8169: add tally counter fields added with RTL8125]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/ced8e8b8f40accfcce4a2bbd8b150aa76d5eff9a (6.12-rc1)
+CVE-2024-49972 [drm/amd/display: Deallocate DML memory if allocation fails]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/892abca6877a96c9123bb1c010cafccdf8ca1b75 (6.12-rc1)
+CVE-2024-49971 [drm/amd/display: Increase array size of dummy_boolean]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/6d64d39486197083497a01b39e23f2f8474b35d3 (6.12-rc1)
+CVE-2024-49970 [drm/amd/display: Implement bounds check for stream encoder creation in DCN401]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/bdf606810210e8e07a0cdf1af3c467291363b295 (6.12-rc1)
+CVE-2024-49969 [drm/amd/display: Fix index out of bounds in DCN30 color transformation]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/d81873f9e715b72d4f8d391c8eb243946f784dfc (6.12-rc1)
+CVE-2024-49968 [ext4: filesystems without casefold feature cannot be mounted with siphash]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/985b67cd86392310d9e9326de941c22fc9340eec (6.12-rc1)
+CVE-2024-49967 [ext4: no need to continue when the number of entries is 1]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/1a00a393d6a7fb1e745a41edd09019bd6a0ad64c (6.12-rc1)
+CVE-2024-49966 [ocfs2: cancel dqi_sync_work before freeing oinfo]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/35fccce29feb3706f649726d410122dd81b92c18 (6.12-rc1)
+CVE-2024-49965 [ocfs2: remove unreasonable unlock in ocfs2_read_blocks]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/c03a82b4a0c935774afa01fd6d128b444fd930a1 (6.12-rc1)
+CVE-2024-49964 [mm/hugetlb: fix memfd_pin_folios free_huge_pages leak]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/c56b6f3d801d7ec8965993342bdd9e2972b6cb8e (6.12-rc1)
+CVE-2024-49963 [mailbox: bcm2835: Fix timeout during suspend mode]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/dc09f007caed3b2f6a3b6bd7e13777557ae22bfd (6.12-rc1)
+CVE-2024-49962 [ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package()]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/a5242874488eba2b9062985bf13743c029821330 (6.12-rc1)
+CVE-2024-49961 [media: i2c: ar0521: Use cansleep version of gpiod_set_value()]
+	- linux 6.11.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/bee1aed819a8cda47927436685d216906ed17f62 (6.12-rc1)
+CVE-2024-49960 [ext4: fix timer use-after-free on failed mount]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/0ce160c5bdb67081a62293028dc85758a8efb22a (6.12-rc1)
+CVE-2024-49959 [jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/f5cacdc6f2bb2a9bf214469dd7112b43dd2dd68a (6.12-rc1)
+CVE-2024-49958 [ocfs2: reserve space for inline xattr before attaching reflink tree]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/5ca60b86f57a4d9648f68418a725b3a7de2816b0 (6.12-rc1)
+CVE-2024-49957 [ocfs2: fix null-ptr-deref when journal load failed.]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/5784d9fcfd43bd853654bb80c87ef293b9e8e80a (6.12-rc1)
+CVE-2024-49956 [gfs2: fix double destroy_workqueue error]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6cb9df81a2c462b89d2f9611009ab43ae8717841 (6.12-rc1)
+CVE-2024-49955 [ACPI: battery: Fix possible crash when unregistering a battery hook]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/76959aff14a0012ad6b984ec7686d163deccdc16 (6.12-rc2)
+CVE-2024-49954 [static_call: Replace pointless WARN_ON() in static_call_module_notify()]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/fe513c2ef0a172a58f158e2e70465c4317f0a9a2 (6.12-rc1)
+CVE-2024-49953 [net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7b124695db40d5c9c5295a94ae928a8d67a01c3d (6.12-rc2)
+CVE-2024-49952 [netfilter: nf_tables: prevent nf_skb_duplicated corruption]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/92ceba94de6fb4cee2bf40b485979c342f44a492 (6.12-rc2)
+CVE-2024-49951 [Bluetooth: MGMT: Fix possible crash on mgmt_index_removed]
+	- linux 6.11.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/f53e1c9c726d83092167f2226f32bd3b73f26c21 (6.12-rc2)
+CVE-2024-49950 [Bluetooth: L2CAP: Fix uaf in l2cap_connect]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/333b4fd11e89b29c84c269123f871883a30be586 (6.12-rc2)
+CVE-2024-49949 [net: avoid potential underflow in qdisc_pkt_len_init() with UFO]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/c20029db28399ecc50e556964eaba75c43b1e2f1 (6.12-rc2)
+CVE-2024-49948 [net: add more sanity checks to qdisc_pkt_len_init()]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/ab9a9a9e9647392a19e7a885b08000e89c86b535 (6.12-rc2)
+CVE-2024-49947 [net: test for not too small csum_start in virtio_net_hdr_to_skb()]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/49d14b54a527289d09a9480f214b8c586322310a (6.12-rc2)
+CVE-2024-49946 [ppp: do not assume bh is held in ppp_channel_bridge_input()]
+	- linux 6.11.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/aec7291003df78cb71fd461d7b672912bde55807 (6.12-rc2)
+CVE-2024-49945 [net/ncsi: Disable the ncsi work before freeing the associated structure]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/a0ffa68c70b367358b2672cdab6fa5bc4c40de2c (6.12-rc2)
+CVE-2024-49944 [sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/8beee4d8dee76b67c75dc91fd8185d91e845c160 (6.12-rc2)
+CVE-2024-49943 [drm/xe/guc_submit: add missing locking in wedged_fini]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/790533e44bfc7af929842fccd9674c9f424d4627 (6.12-rc2)
+CVE-2024-49942 [drm/xe: Prevent null pointer access in xe_migrate_copy]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7257d9c9a3c6cfe26c428e9b7ae21d61f2f55a79 (6.12-rc2)
+CVE-2024-49941 [gpiolib: Fix potential NULL pointer dereference in gpiod_get_label()]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7b99b5ab885993bff010ebcd93be5e511c56e28a (6.12-rc2)
+CVE-2024-49940 [l2tp: prevent possible tunnel refcount underflow]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/24256415d18695b46da06c93135f5b51c548b950 (6.12-rc1)
+CVE-2024-49939 [wifi: rtw89: avoid to add interface to list twice when SER]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/7dd5d2514a8ea58f12096e888b0bd050d7eae20a (6.12-rc1)
+CVE-2024-49938 [wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/94745807f3ebd379f23865e6dab196f220664179 (6.12-rc1)
+CVE-2024-49937 [wifi: cfg80211: Set correct chandef when starting CAC]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/20361712880396e44ce80aaeec2d93d182035651 (6.12-rc1)
+CVE-2024-49936 [net/xen-netback: prevent UAF in xenvif_flush_hash()]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/0fa5e94a1811d68fbffa0725efe6d4ca62c03d12 (6.12-rc1)
+CVE-2024-49935 [ACPI: PAD: fix crash in exit_round_robin()]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/0a2ed70a549e61c5181bad5db418d223b68ae932 (6.12-rc1)
+CVE-2024-49934 [fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/7f7b850689ac06a62befe26e1fd1806799e7f152 (6.12-rc1)
+CVE-2024-49933 [blk_iocost: fix more out of bound shifts]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/9bce8005ec0dcb23a58300e8522fe4a31da606fa (6.12-rc1)
+CVE-2024-49932 [btrfs: don't readahead the relocation inode on RST]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/04915240e2c3a018e4c7f23418478d27226c8957 (6.12-rc1)
+CVE-2024-49931 [wifi: ath12k: fix array out-of-bound access in SoC stats]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/e106b7ad13c1d246adaa57df73edb8f8b8acb240 (6.12-rc1)
+CVE-2024-49930 [wifi: ath11k: fix array out-of-bound access in SoC stats]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/69f253e46af98af17e3efa3e5dfa72fcb7d1983d (6.12-rc1)
+CVE-2024-49929 [wifi: iwlwifi: mvm: avoid NULL pointer dereference]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/557a6cd847645e667f3b362560bd7e7c09aac284 (6.12-rc1)
+CVE-2024-49928 [wifi: rtw89: avoid reading out of bounds when loading TX power FW elements]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/ed2e4bb17a4884cf29c3347353d8aabb7265b46c (6.12-rc1)
+CVE-2024-49927 [x86/ioapic: Handle allocation failures gracefully]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/830802a0fea8fb39d3dc9fb7d6b5581e1343eb1f (6.12-rc1)
+CVE-2024-49926 [rcu-tasks: Fix access non-existent percpu rtpcp variable in rcu_tasks_need_gpcb()]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/fd70e9f1d85f5323096ad313ba73f5fe3d15ea41 (6.12-rc1)
+CVE-2024-49925 [fbdev: efifb: Register sysfs groups through driver core]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/95cdd538e0e5677efbdf8aade04ec098ab98f457 (6.12-rc1)
+CVE-2024-49924 [fbdev: pxafb: Fix possible use after free in pxafb_task()]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/4a6921095eb04a900e0000da83d9475eb958e61e (6.12-rc1)
+CVE-2024-49923 [drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/5559598742fb4538e4c51c48ef70563c49c2af23 (6.12-rc1)
+CVE-2024-49922 [drm/amd/display: Check null pointers before using them]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/1ff12bcd7deaeed25efb5120433c6a45dd5504a8 (6.12-rc1)
+CVE-2024-49921 [drm/amd/display: Check null pointers before used]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/be1fb44389ca3038ad2430dac4234669bc177ee3 (6.12-rc1)
+CVE-2024-49920 [drm/amd/display: Check null pointers before multiple uses]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/fdd5ecbbff751c3b9061d8ebb08e5c96119915b4 (6.12-rc1)
+CVE-2024-49919 [drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/f22f4754aaa47d8c59f166ba3042182859e5dff7 (6.12-rc1)
+CVE-2024-49918 [drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/ac2140449184a26eac99585b7f69814bd3ba8f2d (6.12-rc1)
+CVE-2024-49917 [drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/cba7fec864172dadd953daefdd26e01742b71a6a (6.12-rc1)
+CVE-2024-49916 [drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn401_init_hw]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/4b6377f0e96085cbec96eb7f0b282430ccdd3d75 (6.12-rc1)
+CVE-2024-49915 [drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/c395fd47d1565bd67671f45cca281b3acc2c31ef (6.12-rc1)
+CVE-2024-49914 [drm/amd/display: Add null check for pipe_ctx->plane_state in dcn20_program_pipe]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/8e4ed3cf1642df0c4456443d865cff61a9598aa8 (6.12-rc1)
+CVE-2024-49913 [drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/66d71a72539e173a9b00ca0b1852cbaa5f5bf1ad (6.12-rc1)
+CVE-2024-49912 [drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream']
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/8141f21b941710ecebe49220b69822cab3abd23d (6.12-rc1)
+CVE-2024-49911 [drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/62ed6f0f198da04e884062264df308277628004f (6.12-rc1)
+CVE-2024-49910 [drm/amd/display: Add NULL check for function pointer in dcn401_set_output_transfer_func]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/dd340acd42c24a3f28dd22fae6bf38662334264c (6.12-rc1)
+CVE-2024-49909 [drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/28574b08c70e56d34d6f6379326a860b96749051 (6.12-rc1)
+CVE-2024-49908 [drm/amd/display: Add null check for 'afb' in amdgpu_dm_update_cursor (v2)]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/0fe20258b4989b9112b5e9470df33a0939403fd4 (6.12-rc1)
+CVE-2024-49907 [drm/amd/display: Check null pointers before using dc->clk_mgr]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/95d9e0803e51d5a24276b7643b244c7477daf463 (6.12-rc1)
+CVE-2024-49906 [drm/amd/display: Check null pointer before try to access it]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/1b686053c06ffb9f4524b288110cf2a831ff7a25 (6.12-rc1)
+CVE-2024-49905 [drm/amd/display: Add null check for 'afb' in amdgpu_dm_plane_handle_cursor_update (v2)]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/cd9e9e0852d501f169aa3bb34e4b413d2eb48c37 (6.12-rc1)
+CVE-2024-49904 [drm/amdgpu: add list empty check to avoid null pointer issue]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/4416377ae1fdc41a90b665943152ccd7ff61d3c5 (6.12-rc1)
+CVE-2024-49903 [jfs: Fix uaf in dbFreeBits]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/d6c1b3599b2feb5c7291f5ac3a36e5fa7cedb234 (6.12-rc1)
+CVE-2024-49902 [jfs: check if leafidx greater than num leaves per dmap tree]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/d64ff0d2306713ff084d4b09f84ed1a8c75ecc32 (6.12-rc1)
+CVE-2024-49901 [drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/16007768551d5bfe53426645401435ca8d2ef54f (6.12-rc1)
+CVE-2024-49900 [jfs: Fix uninit-value access of new_ea in ea_buffer]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/2b59ffad47db1c46af25ccad157bb3b25147c35c (6.12-rc1)
+CVE-2024-49899 [drm/amd/display: Initialize denominators' default to 1]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/b995c0a6de6c74656a0c39cd57a0626351b13e3c (6.12-rc1)
+CVE-2024-49898 [drm/amd/display: Check null-initialized variables]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/367cd9ceba1933b63bc1d87d967baf6d9fd241d2 (6.12-rc1)
+CVE-2024-49897 [drm/amd/display: Check phantom_stream before it is used]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/3718a619a8c0a53152e76bb6769b6c414e1e83f4 (6.12-rc1)
+CVE-2024-49896 [drm/amd/display: Check stream before comparing them]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/35ff747c86767937ee1e0ca987545b7eed7a0810 (6.12-rc1)
+CVE-2024-49895 [drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/bc50b614d59990747dd5aeced9ec22f9258991ff (6.12-rc1)
+CVE-2024-49894 [drm/amd/display: Fix index out of bounds in degamma hardware format translation]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/b7e99058eb2e86aabd7a10761e76cae33d22b49f (6.12-rc1)
+CVE-2024-49893 [drm/amd/display: Check stream_status before it is used]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/58a8ee96f84d2c21abb85ad8c22d2bbdf59bd7a9 (6.12-rc1)
+CVE-2024-49892 [drm/amd/display: Initialize get_bytes_per_element's default to 1]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/4067f4fa0423a89fb19a30b57231b384d77d2610 (6.12-rc1)
+CVE-2024-49891 [scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/2be1d4f11944cd6283cb97268b3e17c4424945ca (6.12-rc1)
+CVE-2024-49890 [drm/amd/pm: ensure the fw_info is not null before using it]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/186fb12e7a7b038c2710ceb2fb74068f1b5d55a4 (6.12-rc1)
+CVE-2024-49889 [ext4: avoid use-after-free in ext4_ext_show_leaf()]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/4e2524ba2ca5f54bdbb9e5153bea00421ef653f5 (6.12-rc1)
+CVE-2024-49888 [bpf: Fix a sdiv overflow issue]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/7dd34d7b7dcf9309fc6224caf4dd5b35bedddcb7 (6.12-rc1)
+CVE-2024-49887 [f2fs: fix to don't panic system for no free segment fault injection]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/65a6ce4726c27b45600303f06496fef46d00b57f (6.12-rc1)
+CVE-2024-49886 [platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug]
+	- linux 6.11.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7d59ac07ccb58f8f604f8057db63b8efcebeb3de (6.12-rc2)
+CVE-2024-49885 [mm, slub: avoid zeroing kmalloc redzone]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/59090e479ac78ae18facd4c58eb332562a23020e (6.12-rc1)
+CVE-2024-49884 [ext4: fix slab-use-after-free in ext4_split_extent_at()]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/c26ab35702f8cd0cdc78f96aa5856bfb77be798f (6.12-rc1)
+CVE-2024-49883 [ext4: aovid use-after-free in ext4_ext_insert_extent()]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/a164f3a432aae62ca23d03e6d926b122ee5b860d (6.12-rc1)
+CVE-2024-49882 [ext4: fix double brelse() the buffer of the extents path]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/dcaa6c31134c0f515600111c38ed7750003e1b9c (6.12-rc1)
+CVE-2024-49881 [ext4: update orig_path in ext4_find_extent()]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/5b4b2dcace35f618fe361a87bae6f0d13af31bc1 (6.12-rc1)
+CVE-2024-49880 [ext4: fix off by one issue in alloc_flex_gd()]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6121258c2b33ceac3d21f6a221452692c465df88 (6.12-rc2)
+CVE-2024-49879 [drm: omapdrm: Add missing check for alloc_ordered_workqueue]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/e794b7b9b92977365c693760a259f8eef940c536 (6.12-rc1)
+CVE-2024-49878 [resource: fix region_intersects() vs add_memory_driver_managed()]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/b4afe4183ec77f230851ea139d91e5cf2644c68b (6.12-rc1)
+CVE-2024-49877 [ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/33b525cef4cff49e216e4133cc48452e11c0391e (6.12-rc1)
+CVE-2024-49876 [drm/xe: fix UAF around queue destruction]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/2d2be279f1ca9e7288282d4214f16eea8a727cdb (6.12-rc2)
+CVE-2024-49875 [nfsd: map the EBADMSG to nfserr_io to avoid warning]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/340e61e44c1d2a15c42ec72ade9195ad525fd048 (6.12-rc1)
+CVE-2024-49874 [i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/61850725779709369c7e907ae8c7c75dc7cec4f3 (6.12-rc1)
+CVE-2024-49873 [mm/filemap: fix filemap_get_folios_contig THP panic]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/c225c4f6056b46a8a5bf2ed35abf17a2d6887691 (6.12-rc1)
+CVE-2024-49872 [mm/gup: fix memfd_pin_folios alloc race panic]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ce645b9fdc78ec5d28067286e92871ddae6817d5 (6.12-rc1)
+CVE-2024-49871 [Input: adp5589-keys - fix NULL pointer dereference]
+	- linux 6.11.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/fb5cc65f973661241e4a2b7390b429aa7b330c69 (6.12-rc2)
+CVE-2024-49870 [cachefiles: fix dentry leak in cachefiles_open_file()]
+	- linux 6.11.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/da6ef2dffe6056aad3435e6cf7c6471c2a62187c (6.12-rc2)
+CVE-2024-49869 [btrfs: send: fix buffer overflow detection when copying path to cache entry]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/96c6ca71572a3556ed0c37237305657ff47174b7 (6.12-rc2)
+CVE-2024-49868 [btrfs: fix a NULL pointer dereference when failed to start a new trasacntion]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/c3b47f49e83197e8dffd023ec568403bcdbb774b (6.12-rc2)
+CVE-2024-49867 [btrfs: wait for fixup workers before stopping cleaner kthread during umount]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/41fd1e94066a815a7ab0a7025359e9b40e4b3576 (6.12-rc2)
+CVE-2024-49866 [tracing/timerlat: Fix a race during cpuhp processing]
+	- linux 6.11.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/829e0c9f0855f26b3ae830d17b24aec103f7e915 (6.12-rc2)
+CVE-2024-49865 [drm/xe/vm: move xa_alloc to prevent UAF]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/74231870cf4976f69e83aa24f48edb16619f652f (6.12-rc2)
+CVE-2024-49864 [rxrpc: Fix a race between socket set up and I/O thread creation]
+	- linux 6.11.4-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/bc212465326e8587325f520a052346f0b57360e6 (6.12-rc3)
+CVE-2024-49863 [vhost/scsi: null-ptr-dereference in vhost_scsi_get_req()]
+	- linux 6.11.4-1
+	NOTE: https://git.kernel.org/linus/221af82f606d928ccef19a16d35633c63026f1be (6.12-rc3)
 CVE-2024-49862 [powercap: intel_rapl: Fix off by one in get_rpi()]
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ebdef4062741e3a11c04f0a4972d1163d10c3a8c

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ebdef4062741e3a11c04f0a4972d1163d10c3a8c
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241021/ea12babc/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list