[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Sep 11 16:27:14 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
849f7f01 by Salvatore Bonaccorso at 2024-09-11T17:26:45+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,97 @@
+CVE-2024-46672 [wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion]
+	- linux 6.10.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/2ad4e1ada8eebafa2d75a4b75eeeca882de6ada1 (6.11-rc4)
+CVE-2024-45030 [igb: cope with large MAX_SKB_FRAGS]
+	- linux 6.10.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/8aba27c4a5020abdf60149239198297f88338a8d (6.11-rc5)
+CVE-2024-45029 [i2c: tegra: Do not mark ACPI devices as irq safe]
+	- linux 6.10.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/14d069d92951a3e150c0a81f2ca3b93e54da913b (6.11-rc4)
+CVE-2024-45028 [mmc: mmc_test: Fix NULL dereference on allocation failure]
+	- linux 6.10.7-1
+	NOTE: https://git.kernel.org/linus/a1e627af32ed60713941cbfc8075d44cad07f6dd (6.11-rc5)
+CVE-2024-45027 [usb: xhci: Check for xhci->interrupters being allocated in xhci_mem_clearup()]
+	- linux 6.10.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/dcdb52d948f3a17ccd3fce757d9bd981d7c32039 (6.11-rc4)
+CVE-2024-45026 [s390/dasd: fix error recovery leading to data corruption on ESE devices]
+	- linux 6.10.7-1
+	NOTE: https://git.kernel.org/linus/7db4042336580dfd75cb5faa82c12cd51098c90b (6.11-rc4)
+CVE-2024-45025 [fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE]
+	- linux 6.10.7-1
+	NOTE: https://git.kernel.org/linus/9a2fa1472083580b6c66bdaf291f591e1170123a (6.11-rc4)
+CVE-2024-45024 [mm/hugetlb: fix hugetlb vs. core-mm PT locking]
+	- linux 6.10.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5f75cfbd6bb02295ddaed48adf667b6c828ce07b (6.11-rc4)
+CVE-2024-45023 [md/raid1: Fix data corruption for degraded array with slow disk]
+	- linux 6.10.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/c916ca35308d3187c9928664f9be249b22a3a701 (6.11-rc4)
+CVE-2024-45022 [mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0]
+	- linux 6.10.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/61ebe5a747da649057c37be1c37eb934b4af79ca (6.11-rc4)
+CVE-2024-45021 [memcg_write_event_control(): fix a user-triggerable oops]
+	- linux 6.10.7-1
+	NOTE: https://git.kernel.org/linus/046667c4d3196938e992fba0dfcde570aa85cd0e (6.11-rc4)
+CVE-2024-45020 [bpf: Fix a kernel verifier crash in stacksafe()]
+	- linux 6.10.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/bed2eb964c70b780fb55925892a74f26cb590b25 (6.11-rc4)
+CVE-2024-45019 [net/mlx5e: Take state lock during tx timeout reporter]
+	- linux 6.10.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/e6b5afd30b99b43682a7764e1a74a42fe4d5f4b3 (6.11-rc4)
+CVE-2024-45018 [netfilter: flowtable: initialise extack before use]
+	- linux 6.10.7-1
+	NOTE: https://git.kernel.org/linus/e9767137308daf906496613fd879808a07f006a2 (6.11-rc4)
+CVE-2024-45017 [net/mlx5: Fix IPsec RoCE MPV trace call]
+	- linux 6.10.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/607e1df7bd47fe91cab85a97f57870a26d066137 (6.11-rc5)
+CVE-2024-45016 [netem: fix return value if duplicate enqueue fails]
+	- linux 6.10.7-1
+	NOTE: https://git.kernel.org/linus/c07ff8592d57ed258afee5a5e04991a48dbaf382 (6.11-rc5)
+CVE-2024-45015 [drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable()]
+	- linux 6.10.7-1
+	NOTE: https://git.kernel.org/linus/aedf02e46eb549dac8db4821a6b9f0c6bf6e3990 (6.11-rc5)
+CVE-2024-45014 [s390/boot: Avoid possible physmem_info segment corruption]
+	- linux 6.10.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/d7fd2941ae9a67423d1c7bee985f240e4686634f (6.11-rc5)
+CVE-2024-45013 [nvme: move stopping keep-alive into nvme_uninit_ctrl()]
+	- linux 6.10.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/a54a93d0e3599b05856971734e15418ac551a14c (6.11-rc5)
+CVE-2024-45012 [nouveau/firmware: use dma non-coherent allocator]
+	- linux 6.10.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/9b340aeb26d50e9a9ec99599e2a39b035fac978e (6.11-rc5)
+CVE-2024-45011 [char: xillybus: Check USB endpoints when probing device]
+	- linux 6.10.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/2374bf7558de915edc6ec8cb10ec3291dfab9594 (6.11-rc4)
+CVE-2024-45010 [mptcp: pm: only mark 'subflow' endp as available]
+	- linux 6.10.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/322ea3778965da72862cca2a0c50253aacf65fe6 (6.11-rc5)
+CVE-2024-45009 [mptcp: pm: only decrement add_addr_accepted for MPJ req]
+	- linux 6.10.7-1
+	NOTE: https://git.kernel.org/linus/1c1f721375989579e46741f59523e39ec9b2a9bd (6.11-rc5)
 CVE-2024-8441 (An uncontrolled search path in the agent of Ivanti EPM before 2022 SU6 ...)
 	NOT-FOR-US: Ivanti
 CVE-2024-8440 (The Essential Addons for Elementor \u2013 Best Elementor Templates, Wi ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/849f7f0159ff731dec6d7c2c95fb6bbcfff60d43

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/849f7f0159ff731dec6d7c2c95fb6bbcfff60d43
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240911/1ea073d1/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list