[Git][security-tracker-team/security-tracker][master] Merge Linux updates from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Jan 8 19:17:29 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
629d494a by Salvatore Bonaccorso at 2025-01-08T20:17:20+01:00
Merge Linux updates from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,76 @@
+CVE-2024-56787 [soc: imx8m: Probe the SoC driver as platform driver]
+	- linux 6.12.5-1
+	[bookworm] - linux 6.1.123-1
+	NOTE: https://git.kernel.org/linus/9cc832d37799dbea950c4c8a34721b02b8b5a8ff (6.13-rc1)
+CVE-2024-56786 [bpf: put bpf_link's program when link is safe to be deallocated]
+	- linux 6.12.5-1
+	NOTE: https://git.kernel.org/linus/f44ec8733a8469143fde1984b5e6931b2e2f6f3f (6.13-rc1)
+CVE-2024-56785 [MIPS: Loongson64: DTS: Really fix PCIe port nodes for ls7a]
+	- linux 6.12.5-1
+	[bookworm] - linux 6.1.123-1
+	NOTE: https://git.kernel.org/linus/4fbd66d8254cedfd1218393f39d83b6c07a01917 (6.13-rc1)
+CVE-2024-56784 [drm/amd/display: Adding array index check to prevent memory corruption]
+	- linux 6.12.5-1
+	NOTE: https://git.kernel.org/linus/2c437d9a0b496168e1a1defd17b531f0a526dbe9 (6.13-rc1)
+CVE-2024-56783 [netfilter: nft_socket: remove WARN_ON_ONCE on maximum cgroup level]
+	- linux 6.12.5-1
+	[bookworm] - linux 6.1.123-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b7529880cb961d515642ce63f9d7570869bbbdc3 (6.13-rc2)
+CVE-2024-56782 [ACPI: x86: Add adev NULL check to acpi_quirk_skip_serdev_enumeration()]
+	- linux 6.12.5-1
+	NOTE: https://git.kernel.org/linus/4a49194f587a62d972b602e3e1a2c3cfe6567966 (6.13-rc1)
+CVE-2024-56781 [powerpc/prom_init: Fixup missing powermac #size-cells]
+	- linux 6.12.5-1
+	[bookworm] - linux 6.1.123-1
+	NOTE: https://git.kernel.org/linus/cf89c9434af122f28a3552e6f9cc5158c33ce50a (6.13-rc1)
+CVE-2024-56780 [quota: flush quota_release_work upon quota writeback]
+	- linux 6.12.5-1
+	[bookworm] - linux 6.1.123-1
+	NOTE: https://git.kernel.org/linus/ac6f420291b3fee1113f21d612fa88b628afab5b (6.13-rc2)
+CVE-2024-56779 [nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur]
+	- linux 6.12.5-1
+	[bookworm] - linux 6.1.123-1
+	NOTE: https://git.kernel.org/linus/98100e88dd8865999dc6379a3356cd799795fe7b (6.13-rc1)
+CVE-2024-56778 [drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check]
+	- linux 6.12.5-1
+	[bookworm] - linux 6.1.123-1
+	NOTE: https://git.kernel.org/linus/c1ab40a1fdfee732c7e6ff2fb8253760293e47e8 (6.13-rc1)
+CVE-2024-56777 [drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check]
+	- linux 6.12.5-1
+	[bookworm] - linux 6.1.123-1
+	NOTE: https://git.kernel.org/linus/e965e771b069421c233d674c3c8cd8c7f7245f42 (6.13-rc1)
+CVE-2024-56776 [drm/sti: avoid potential dereference of error pointers]
+	- linux 6.12.5-1
+	[bookworm] - linux 6.1.123-1
+	NOTE: https://git.kernel.org/linus/831214f77037de02afc287eae93ce97f218d8c04 (6.13-rc1)
+CVE-2024-56775 [drm/amd/display: Fix handling of plane refcount]
+	- linux 6.12.5-1
+	NOTE: https://git.kernel.org/linus/27227a234c1487cb7a684615f0749c455218833a (6.13-rc1)
+CVE-2024-56774 [btrfs: add a sanity check for btrfs root in btrfs_search_slot()]
+	- linux 6.12.5-1
+	[bookworm] - linux 6.1.123-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3ed51857a50f530ac7a1482e069dfbd1298558d4 (6.13-rc2)
+CVE-2024-56773 [kunit: Fix potential null dereference in kunit_device_driver_test()]
+	- linux 6.12.5-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/435c20eed572a95709b1536ff78832836b2f91b1 (6.13-rc1)
+CVE-2024-56772 [kunit: string-stream: Fix a UAF bug in kunit_init_suite()]
+	- linux 6.12.5-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/39e21403c978862846fa68b7f6d06f9cca235194 (6.13-rc1)
+CVE-2024-56771 [mtd: spinand: winbond: Fix 512GW, 01GW, 01JW and 02JW ECC information]
+	- linux 6.12.5-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/fee9b240916df82a8b07aef0fdfe96785417a164 (6.13-rc1)
+CVE-2024-56770 [net/sched: netem: account for backlog updates from child qdisc]
+	- linux 6.12.6-1
+	[bookworm] - linux 6.1.123-1
+	NOTE: https://git.kernel.org/linus/f8d4bc455047cf3903cd6f85f49978987dbb3027 (6.13-rc3)
 CVE-2024-54676
 	NOT-FOR-US: Apache OpenMeetings
 CVE-2025-22215 (VMware Aria Automation contains a server-side request forgery (SSRF) v ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/629d494a29aed4badf3aec0c57b3f91c9c1d51f3

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/629d494a29aed4badf3aec0c57b3f91c9c1d51f3
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250108/7ce0b819/attachment.htm>


More information about the debian-security-tracker-commits mailing list