[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Sep 18 09:11:52 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
aceb9fb3 by Salvatore Bonaccorso at 2024-09-18T10:11:21+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,309 @@
+CVE-2024-46801 [libfs: fix get_stashed_dentry()]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/4e32c25b58b945f976435bbe51f39b32d714052e (6.11-rc7)
+CVE-2024-46800 [sch/netem: fix use after free in netem_dequeue]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/3b3a2a9c6349e25a025d2330f479bc33a6ccb54a (6.11-rc7)
+CVE-2024-46799 [net: ethernet: ti: am65-cpsw: Fix NULL dereference on XDP_TX]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0a50c35277f96481a5a6ed5faf347f282040c57d (6.11-rc7)
+CVE-2024-46798 [ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/b4a90b543d9f62d3ac34ec1ab97fc5334b048565 (6.11-rc7)
+CVE-2024-46797 [powerpc/qspinlock: Fix deadlock in MCS queue]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/734ad0af3609464f8f93e00b6c0de1e112f44559 (6.11-rc7)
+CVE-2024-46796 [smb: client: fix double put of @cfile in smb2_set_path_size()]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/f9c169b51b6ce20394594ef674d6b10efba31220 (6.11-rc7)
+CVE-2024-46795 [ksmbd: unset the binding mark of a reused connection]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/78c5a6f1f630172b19af4912e755e1da93ef0ab5 (6.11-rc7)
+CVE-2024-46794 [x86/tdx: Fix data leak in mmio_read()]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b6fb565a2d15277896583d471b21bc14a0c99661 (6.11-rc7)
+CVE-2024-46793 [ASoC: Intel: Boards: Fix NULL pointer deref in BYT/CHT boards harder]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0cc65482f5b03ac2b1c240bc34665e43ea2d71bb (6.11-rc7)
+CVE-2024-46792 [riscv: misaligned: Restrict user access to kernel memory]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b686ecdeacf6658e1348c1a32a08e2e72f7c0f00 (6.11-rc7)
+CVE-2024-46791 [can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/7dd9c26bd6cf679bcfdef01a8659791aa6487a29 (6.11-rc7)
+CVE-2024-46790 [codetag: debug: mark codetags for poisoned page as empty]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5e9784e997620af7c1399029282f5d6964b41942 (6.11-rc7)
+CVE-2024-46789 [mm/slub: add check for s->flags in the alloc_tagging_slab_free_hook]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ab7ca09520e9c41c219a4427fe0dae24024bfe7f (6.11-rc7)
+CVE-2024-46788 [tracing/osnoise: Use a cpumask to know what threads are kthreads]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/177e1cc2f41235c145041eed03ef5bab18f32328 (6.11-rc7)
+CVE-2024-46787 [userfaultfd: fix checks for huge PMDs]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/71c186efc1b2cf1aeabfeff3b9bd5ac4c5ac14d8 (6.11-rc7)
+CVE-2024-46786 [fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/72a6e22c604c95ddb3b10b5d3bb85b6ff4dbc34f (6.11-rc7)
+CVE-2024-46785 [eventfs: Use list_del_rcu() for SRCU protected list variable]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/d2603279c7d645bf0d11fa253b23f1ab48fc8d3c (6.11-rc7)
+CVE-2024-46784 [net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b6ecc662037694488bfff7c9fd21c405df8411f2 (6.11-rc7)
+CVE-2024-46783 [tcp_bpf: fix return value of tcp_bpf_sendmsg()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/fe1910f9337bd46a9343967b547ccab26b4b2c6e (6.11-rc7)
+CVE-2024-46782 [ila: call nf_unregister_net_hooks() sooner]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/031ae72825cef43e4650140b800ad58bf7a6a466 (6.11-rc7)
+CVE-2024-46781 [nilfs2: fix missing cleanup on rollforward recovery error]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/5787fcaab9eb5930f5378d6a1dd03d916d146622 (6.11-rc7)
+CVE-2024-46780 [nilfs2: protect references to superblock parameters exposed in sysfs]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/683408258917541bdb294cd717c210a04381931e (6.11-rc7)
+CVE-2024-46779 [drm/imagination: Free pvr_vm_gpuva after unlink]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3f6b2f60b4631cd0c368da6a1587ab55a696164d (6.11-rc7)
+CVE-2024-46778 [drm/amd/display: Check UnboundedRequestEnabled's value]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/a7b38c7852093385d0605aa3c8a2efd6edd1edfd (6.11-rc1)
+CVE-2024-46777 [udf: Avoid excessive partition lengths]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/ebbe26fd54a9621994bc16b14f2ba8f84c089693 (6.11-rc1)
+CVE-2024-46776 [drm/amd/display: Run DC_LOG_DC after checking link->link_enc]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/3a82f62b0d9d7687eac47603bb6cd14a50fa718b (6.11-rc1)
+CVE-2024-46775 [drm/amd/display: Validate function returns]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/673f816b9e1e92d1f70e1bf5f21b531e0ff9ad6c (6.11-rc1)
+CVE-2024-46774 [powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/0974d03eb479384466d828d65637814bee6b26d7 (6.11-rc1)
+CVE-2024-46773 [drm/amd/display: Check denominator pbn_div before used]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/116a678f3a9abc24f5c9d2525b7393d18d9eb58e (6.11-rc1)
+CVE-2024-46772 [drm/amd/display: Check denominator crb_pipes before used]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/ea79068d4073bf303f8203f2625af7d9185a1bc6 (6.11-rc1)
+CVE-2024-46771 [can: bcm: Remove proc entry when dev is unregistered.]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/76fe372ccb81b0c89b6cd2fec26e2f38c958be85 (6.11-rc7)
+CVE-2024-46770 [ice: Add netif_device_attach/detach into PF reset flow]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/d11a67634227f9f9da51938af085fb41a733848f (6.11-rc7)
+CVE-2024-46769 [spi: intel: Add check devm_kasprintf() returned value]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/2920294686ec23211637998f3ec386dfd3d784a6 (6.11-rc7)
+CVE-2024-46768 [hwmon: (hp-wmi-sensors) Check if WMI event data exists]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/a54da9df75cd1b4b5028f6c60f9a211532680585 (6.11-rc7)
+CVE-2024-46767 [net: phy: Fix missing of_node_put() for leds]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/2560db6ede1aaf162a73b2df43e0b6c5ed8819f7 (6.11-rc7)
+CVE-2024-46766 [ice: move netif_queue_set_napi to rtnl-protected sections]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/2a5dc090b92cfa5270e20056074241c6db5c9cdd (6.11-rc7)
+CVE-2024-46765 [ice: protect XDP configuration with a mutex]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/2504b8405768a57a71e660dbfd5abd59f679a03f (6.11-rc7)
+CVE-2024-46764 [bpf: add check for invalid name in btf_name_valid_section()]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/bb6705c3f93bed2af03d43691743d4c43e3c8e6f (6.11-rc7)
+CVE-2024-46763 [fou: Fix null-ptr-deref in GRO.]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/7e4196935069947d8b70b09c1660b67b067e75cb (6.11-rc7)
+CVE-2024-46762 [xen: privcmd: Fix possible access to a freed kirqfd instance]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/611ff1b1ae989a7bcce3e2a8e132ee30e968c557 (6.11-rc1)
+CVE-2024-46761 [pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/335e35b748527f0c06ded9eebb65387f60647fda (6.11-rc1)
+CVE-2024-46760 [wifi: rtw88: usb: schedule rx work after everything is set up]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/adc539784c98a7cc602cbf557debfc2e7b9be8b3 (6.11-rc1)
+CVE-2024-46759 [hwmon: (adc128d818) Fix underflows seen when writing limit attributes]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/8cad724c8537fe3e0da8004646abc00290adae40 (6.11-rc1)
+CVE-2024-46758 [hwmon: (lm95234) Fix underflows seen when writing limit attributes]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/af64e3e1537896337405f880c1e9ac1f8c0c6198 (6.11-rc1)
+CVE-2024-46757 [hwmon: (nct6775-core) Fix underflows seen when writing limit attributes]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/0403e10bf0824bf0ec2bb135d4cf1c0cc3bf4bf0 (6.11-rc1)
+CVE-2024-46756 [hwmon: (w83627ehf) Fix underflows seen when writing limit attributes]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/5c1de37969b7bc0abcb20b86e91e70caebbd4f89 (6.11-rc1)
+CVE-2024-46755 [wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/c145eea2f75ff7949392aebecf7ef0a81c1f6c14 (6.11-rc1)
+CVE-2024-46754 [bpf: Remove tst_run from lwt_seg6local_prog_ops.]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/c13fda93aca118b8e5cd202e339046728ee7dddb (6.11-rc1)
+CVE-2024-46753 [btrfs: handle errors from btrfs_dec_ref() properly]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/5eb178f373b4f16f3b42d55ff88fc94dd95b93b1 (6.11-rc1)
+CVE-2024-46752 [btrfs: replace BUG_ON() with error handling at update_ref_for_cow()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/b56329a782314fde5b61058e2a25097af7ccb675 (6.11-rc1)
+CVE-2024-46751 [btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/28cb13f29faf6290597b24b728dc3100c019356f (6.11-rc1)
+CVE-2024-46750 [PCI: Add missing bridge lock to pci_bus_lock()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/a4e772898f8bf2e7e1cf661a12c60a5612c4afab (6.11-rc1)
+CVE-2024-46749 [Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/c68bbf5e334b35b36ac5b9f0419f1f93f796bad1 (6.11-rc1)
+CVE-2024-46748 [cachefiles: Set the max subreq size for cache writes to MAX_RW_COUNT]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/51d37982bbac3ea0ca21b2797a9cb0044272b3aa (6.11-rc1)
+CVE-2024-46747 [HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/a6e9c391d45b5865b61e569146304cff72821a5d (6.11-rc5)
+CVE-2024-46746 [HID: amd_sfh: free driver_data after destroying hid device]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/97155021ae17b86985121b33cf8098bcde00d497 (6.11-rc5)
+CVE-2024-46745 [Input: uinput - reject requests with unreasonable number of slots]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/206f533a0a7c683982af473079c4111f4a0f9f5e (6.11-rc5)
+CVE-2024-46744 [Squashfs: sanity check symbolic link size]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/810ee43d9cd245d138a2733d87a24858a23f577d (6.11-rc4)
+CVE-2024-46743 [of/irq: Prevent device address out-of-bounds read in interrupt map walk]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/b739dffa5d570b411d4bdf4bb9b8dfd6b7d72305 (6.11-rc4)
+CVE-2024-46742 [smb/server: fix potential null-ptr-deref of lease_ctx_info in smb2_open()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/4e8771a3666c8f216eefd6bd2fd50121c6c437db (6.11-rc5)
+CVE-2024-46741 [misc: fastrpc: Fix double free of 'buf' in error path]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/e8c276d4dc0e19ee48385f74426aebc855b49aaf (6.11-rc7)
+CVE-2024-46740 [binder: fix UAF caused by offsets overwrite]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/4df153652cc46545722879415937582028c18af5 (6.11-rc7)
+CVE-2024-46739 [uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/fb1adbd7e50f3d2de56d0a2bb0700e2e819a329e (6.11-rc7)
+CVE-2024-46738 [VMCI: Fix use-after-free when removing resource in vmci_resource_remove()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/48b9a8dabcc3cf5f961b2ebcd8933bf9204babb7 (6.11-rc7)
+CVE-2024-46737 [nvmet-tcp: fix kernel crash if commands allocation fails]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/5572a55a6f830ee3f3a994b6b962a5c327d28cb3 (6.11-rc7)
+CVE-2024-46736 [smb: client: fix double put of @cfile in smb2_rename_path()]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3523a3df03c6f04f7ea9c2e7050102657e331a4f (6.11-rc7)
+CVE-2024-46735 [ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery()]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/e58f5142f88320a5b1449f96a146f2f24615c5c7 (6.11-rc7)
+CVE-2024-46734 [btrfs: fix race between direct IO write and fsync when using same fd]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/cd9253c23aedd61eb5ff11f37a36247cd46faf86 (6.11-rc7)
+CVE-2024-46733 [btrfs: fix qgroup reserve leaks in cow_file_range]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/30479f31d44d47ed00ae0c7453d9b253537005b2 (6.11-rc3)
+CVE-2024-46732 [drm/amd/display: Assign linear_pitch_alignment even for VM]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/984debc133efa05e62f5aa1a7a1dd8ca0ef041f4 (6.11-rc1)
+CVE-2024-46731 [drm/amd/pm: fix the Out-of-bounds read warning]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/12c6967428a099bbba9dfd247bb4322a984fcc0b (6.11-rc1)
+CVE-2024-46730 [drm/amd/display: Ensure array index tg_inst won't be -1]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/687fe329f18ab0ab0496b20ed2cb003d4879d931 (6.11-rc1)
+CVE-2024-46729 [drm/amd/display: Fix incorrect size calculation for loop]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/3941a3aa4b653b69876d894d08f3fff1cc965267 (6.11-rc1)
+CVE-2024-46728 [drm/amd/display: Check index for aux_rd_interval before using]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/9ba2ea6337b4f159aecb177555a6a81da92d302e (6.11-rc1)
+CVE-2024-46727 [drm/amd/display: Add otg_master NULL check within resource_log_pipe_topology_update]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/871cd9d881fa791d3f82885000713de07041c0ae (6.11-rc1)
+CVE-2024-46726 [drm/amd/display: Ensure index calculation will not overflow]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/8e2734bf444767fed787305ccdcb36a2be5301a2 (6.11-rc1)
+CVE-2024-46725 [drm/amdgpu: Fix out-of-bounds write warning]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/be1684930f5262a622d40ce7a6f1423530d87f89 (6.11-rc1)
+CVE-2024-46724 [drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/d768394fa99467bcf2703bde74ddc96eeb0b71fa (6.11-rc1)
+CVE-2024-46723 [drm/amdgpu: fix ucode out-of-bounds read warning]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/8944acd0f9db33e17f387fdc75d33bb473d7936f (6.11-rc1)
+CVE-2024-46722 [drm/amdgpu: fix mc_data out-of-bounds read warning]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/51dfc0a4d609fe700750a62f41447f01b8c9ea50 (6.11-rc1)
+CVE-2024-46721 [apparmor: fix possible NULL pointer dereference]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/3dd384108d53834002be5630132ad5c3f32166ad (6.11-rc1)
+CVE-2024-46720 [drm/amdgpu: fix dereference after null check]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/b1f7810b05d1950350ac2e06992982974343e441 (6.11-rc1)
+CVE-2024-46719 [usb: typec: ucsi: Fix null pointer dereference in trace]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/99516f76db48e1a9d54cdfed63c1babcee4e71a5 (6.11-rc1)
+CVE-2024-46718 [drm/xe: Don't overmap identity VRAM mapping]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/6d3581edffea0b3a64b0d3094d3f09222e0024f7 (6.11-rc1)
+CVE-2024-46717 [net/mlx5e: SHAMPO, Fix incorrect page release]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/70bd03b89f20b9bbe51a7f73c4950565a17a45f7 (6.11-rc1)
+CVE-2024-46716 [dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/54e4ada1a4206f878e345ae01cf37347d803d1b1 (6.11-rc1)
+CVE-2024-46715 [driver: iio: add missing checks on iio_info's callback access]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/c4ec8dedca961db056ec85cb7ca8c9f7e2e92252 (6.11-rc1)
+CVE-2024-46714 [drm/amd/display: Skip wbscl_set_scaler_filter if filter is null]
+	- linux 6.10.9-1
+	NOTE: https://git.kernel.org/linus/c4d31653c03b90e51515b1380115d1aedad925dd (6.11-rc1)
 CVE-2024-46976
 	NOT-FOR-US: Backstage
 CVE-2024-45816



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aceb9fb3d80b7f9b0b4ed9ed7ca6f2a724b64d24

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aceb9fb3d80b7f9b0b4ed9ed7ca6f2a724b64d24
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240918/ee2aa7a9/attachment.htm>


More information about the debian-security-tracker-commits mailing list