[Git][security-tracker-team/security-tracker][master] Merge Linux CVE changes from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sat Jan 11 12:58:41 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
96ee90ef by Salvatore Bonaccorso at 2025-01-11T13:58:16+01:00
Merge Linux CVE changes from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,235 @@
+CVE-2024-57807 [scsi: megaraid_sas: Fix for a potential deadlock]
+ - linux 6.12.8-1
+ [bookworm] - linux 6.1.123-1
+ NOTE: https://git.kernel.org/linus/50740f4dc78b41dec7c8e39772619d5ba841ddd7 (6.13-rc2)
+CVE-2024-57806 [btrfs: fix transaction atomicity bug when enabling simple quotas]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/f2363e6fcc7938c5f0f6ac066fad0dd247598b51 (6.13-rc5)
+CVE-2024-57805 [ASoC: SOF: Intel: hda-dai: Do not release the link DMA on STOP]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/e8d0ba147d901022bcb69da8d8fd817f84e9f3ca (6.13-rc5)
+CVE-2024-57804 [scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs]
+ - linux 6.12.8-1
+ NOTE: https://git.kernel.org/linus/711201a8b8334a397440ac0b859df0054e174bc9 (6.13-rc2)
+CVE-2024-57800 [ALSA: memalloc: prefer dma_mapping_error() over explicit address checking]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/fa0308134d26dbbeb209a1581eea46df663866b6 (6.13-rc5)
+CVE-2024-57799 [phy: rockchip: samsung-hdptx: Set drvdata before enabling runtime PM]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/9d23e48654620fdccfcc74cc2cef04eaf7353d07 (6.13-rc5)
+CVE-2024-57798 [drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()]
+ - linux 6.12.8-1
+ [bookworm] - linux 6.1.123-1
+ NOTE: https://git.kernel.org/linus/e54b00086f7473dbda1a7d6fc47720ced157c6a8 (6.13-rc2)
+CVE-2024-57793 [virt: tdx-guest: Just leak decrypted memory on unrecoverable errors]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/27834971f616c5e154423c578fa95e0444444ce1 (6.13-rc5)
+CVE-2024-57792 [power: supply: gpio-charger: Fix set charge current limits]
+ - linux 6.12.8-1
+ [bookworm] - linux 6.1.123-1
+ NOTE: https://git.kernel.org/linus/afc6e39e824ad0e44b2af50a97885caec8d213d1 (6.13-rc5)
+CVE-2024-57791 [net/smc: check return value of sock_recvmsg when draining clc data]
+ - linux 6.12.8-1
+ [bookworm] - linux 6.1.123-1
+ NOTE: https://git.kernel.org/linus/c5b8ee5022a19464783058dc6042e8eefa34e8cd (6.13-rc4)
+CVE-2024-56788 [net: ethernet: oa_tc6: fix tx skb race condition between reference pointers]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/e592b5110b3e9393881b0a019d86832bbf71a47f (6.13-rc4)
+CVE-2024-56372 [net: tun: fix tun_napi_alloc_frags()]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/429fde2d81bcef0ebab002215358955704586457 (6.13-rc4)
+CVE-2024-56369 [drm/modes: Avoid divide by zero harder in drm_mode_vrefresh()]
+ - linux 6.12.8-1
+ [bookworm] - linux 6.1.123-1
+ NOTE: https://git.kernel.org/linus/9398332f23fab10c5ec57c168b44e72997d6318e (6.13-rc4)
+CVE-2024-56368 [ring-buffer: Fix overflow in __rb_map_vma]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/c58a812c8e49ad688f94f4b050ad5c5b388fc5d2 (6.13-rc4)
+CVE-2024-55916 [Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet]
+ - linux 6.12.8-1
+ [bookworm] - linux 6.1.123-1
+ NOTE: https://git.kernel.org/linus/07a756a49f4b4290b49ea46e089cbe6f79ff8d26 (6.13-rc4)
+CVE-2024-55881 [KVM: x86: Play nice with protected guests in complete_hypercall_exit()]
+ - linux 6.12.8-1
+ [bookworm] - linux 6.1.123-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/9b42d1e8e4fe9dc631162c04caa69b0d1860b0f0 (6.13-rc4)
+CVE-2024-55642 [block: Prevent potential deadlocks in zone write plug error recovery]
+ - linux 6.12.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/fe0418eb9bd69a19a948b297c8de815e05f3cde1 (6.13-rc3)
+CVE-2024-55641 [xfs: unlock inodes when erroring out of xfs_trans_alloc_dir]
+ - linux 6.12.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/53b001a21c9dff73b64e8c909c41991f01d5d00f (6.13-rc3)
+CVE-2024-55639 [net: renesas: rswitch: avoid use-after-put for a device tree node]
+ - linux 6.12.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/66b7e9f85b8459c823b11e9af69dbf4be5eb6be8 (6.13-rc3)
+CVE-2024-54683 [netfilter: IDLETIMER: Fix for possible ABBA deadlock]
+ - linux 6.12.6-1
+ NOTE: https://git.kernel.org/linus/f36b01994d68ffc253c8296e2228dfe6e6431c03 (6.13-rc3)
+CVE-2024-54680 [smb: client: fix TCP timers deadlock after rmmod]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/e9f2517a3e18a54a3943c098d2226b245d488801 (6.13-rc4)
+CVE-2024-54460 [Bluetooth: iso: Fix circular lock in iso_listen_bis]
+ - linux 6.12.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/168e28305b871d8ec604a8f51f35467b8d7ba05b (6.13-rc3)
+CVE-2024-54455 [accel/ivpu: Fix general protection fault in ivpu_bo_list()]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/4b2efb9db0c22a130bbd1275e489b42c02d08050 (6.13-rc4)
+CVE-2024-54193 [accel/ivpu: Fix WARN in ivpu_ipc_send_receive_internal()]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0f6482caa6acdfdfc744db7430771fe7e6c4e787 (6.13-rc4)
+CVE-2024-54191 [Bluetooth: iso: Fix circular lock in iso_conn_big_sync]
+ - linux 6.12.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/7a17308c17880d259105f6e591eb1bc77b9612f0 (6.13-rc3)
+CVE-2024-53690 [nilfs2: prevent use of deleted inode]
+ - linux 6.12.8-1
+ [bookworm] - linux 6.1.123-1
+ NOTE: https://git.kernel.org/linus/901ce9705fbb9f330ff1f19600e5daf9770b0175 (6.13-rc4)
+CVE-2024-53689 [block: Fix potential deadlock while freezing queue and acquiring sysfs_lock]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/be26ba96421ab0a8fa2055ccf7db7832a13c44d2 (6.13-rc3)
+CVE-2024-53687 [riscv: Fix IPIs usage in kfence_protect_page()]
+ - linux 6.12.6-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b3431a8bb336cece8adc452437befa7d4534b2fd (6.13-rc3)
+CVE-2024-53685 [ceph: give up on paths longer than PATH_MAX]
+ - linux 6.12.8-1
+ NOTE: https://git.kernel.org/linus/550f7ca98ee028a606aa75705a7e77b1bd11720f (6.13-rc4)
+CVE-2024-53682 [regulator: axp20x: AXP717: set ramp_delay]
+ - linux 6.12.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/f07ae52f5cf6a5584fdf7c8c652f027d90bc8b74 (6.13-rc3)
+CVE-2024-53680 [ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init()]
+ - linux 6.12.5-1
+ [bookworm] - linux 6.1.123-1
+ NOTE: https://git.kernel.org/linus/146b6f1112eb30a19776d6c323c994e9d67790db (6.13-rc2)
+CVE-2024-52332 [igb: Fix potential invalid memory access in igb_init_module()]
+ - linux 6.12.5-1
+ [bookworm] - linux 6.1.123-1
+ NOTE: https://git.kernel.org/linus/0566f83d206c7a864abcd741fe39d6e0ae5eef29 (6.13-rc2)
+CVE-2024-52319 [mm: use aligned address in clear_gigantic_page()]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/8aca2bc96c833ba695ede7a45ad7784c836a262e (6.13-rc4)
+CVE-2024-51729 [mm: use aligned address in copy_user_gigantic_page()]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/f5d09de9f1bf9674c6418ff10d0a40cfe29268e1 (6.13-rc4)
+CVE-2024-50051 [spi: mpc52xx: Add cancel_work_sync before module remove]
+ - linux 6.12.5-1
+ [bookworm] - linux 6.1.123-1
+ NOTE: https://git.kernel.org/linus/984836621aad98802d92c4a3047114cf518074c8 (6.13-rc2)
+CVE-2024-49573 [sched/fair: Fix NEXT_BUDDY]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/493afbd187c4c9cc1642792c0d9ba400c3d6d90d (6.13-rc3)
+CVE-2024-49571 [net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a29e220d3c8edbf0e1beb0f028878a4a85966556 (6.13-rc4)
+CVE-2024-49569 [nvme-rdma: unquiesce admin_q before destroy it]
+ - linux 6.12.5-1
+ NOTE: https://git.kernel.org/linus/5858b687559809f05393af745cbadf06dee61295 (6.13-rc2)
+CVE-2024-49568 [net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg]
+ - linux 6.12.8-1
+ NOTE: https://git.kernel.org/linus/7863c9f3d24ba49dbead7e03dfbe40deb5888fdf (6.13-rc4)
+CVE-2024-48881 [bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again]
+ - linux 6.12.5-1
+ [bookworm] - linux 6.1.123-1
+ NOTE: https://git.kernel.org/linus/b2e382ae12a63560fca35050498e19e760adf8c0 (6.13-rc2)
+CVE-2024-48876 [stackdepot: fix stack_depot_save_flags() in NMI context]
+ - linux 6.12.5-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/031e04bdc834cda3b054ef6b698503b2b97e8186 (6.13-rc2)
+CVE-2024-48875 [btrfs: don't take dev_replace rwsem on task already holding it]
+ - linux 6.12.5-1
+ NOTE: https://git.kernel.org/linus/8cca35cb29f81eba3e96ec44dad8696c8a2f9138 (6.13-rc1)
+CVE-2024-48873 [wifi: rtw89: check return value of ieee80211_probereq_get() for RNR]
+ - linux 6.12.5-1
+ NOTE: https://git.kernel.org/linus/630d5d8f2bf6b340202b6bc2c05d794bbd8e4c1c (6.13-rc1)
+CVE-2024-47809 [dlm: fix possible lkb_resource null dereference]
+ - linux 6.12.5-1
+ NOTE: https://git.kernel.org/linus/b98333c67daf887c724cd692e88e2db9418c0861 (6.13-rc1)
+CVE-2024-47794 [bpf: Prevent tailcall infinite loop caused by freplace]
+ - linux 6.12.5-1
+ NOTE: https://git.kernel.org/linus/d6083f040d5d8f8d748462c77e90547097df936e (6.13-rc1)
+CVE-2024-47408 [net/smc: check smcd_v2_ext_offset when receiving proposal msg]
+ - linux 6.12.8-1
+ [bookworm] - linux 6.1.123-1
+ NOTE: https://git.kernel.org/linus/9ab332deb671d8f7e66d82a2ff2b3f715bc3a4ad (6.13-rc4)
+CVE-2024-47143 [dma-debug: fix a possible deadlock on radix_lock]
+ - linux 6.12.5-1
+ [bookworm] - linux 6.1.123-1
+ NOTE: https://git.kernel.org/linus/7543c3e3b9b88212fcd0aaf5cab5588797bdc7de (6.13-rc1)
+CVE-2024-47141 [pinmux: Use sequential access to access desc->pinmux data]
+ - linux 6.12.5-1
+ NOTE: https://git.kernel.org/linus/5a3e85c3c397c781393ea5fb2f45b1f60f8a4e6e (6.13-rc1)
+CVE-2024-46896 [drm/amdgpu: don't access invalid sched]
+ - linux 6.12.8-1
+ [bookworm] - linux 6.1.123-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a93b1020eb9386d7da11608477121b10079c076a (6.13-rc4)
+CVE-2024-45828 [i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request]
+ - linux 6.12.5-1
+ [bookworm] - linux 6.1.123-1
+ NOTE: https://git.kernel.org/linus/6ca2738174e4ee44edb2ab2d86ce74f015a0cc32 (6.13-rc1)
+CVE-2024-43098 [i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock]
+ - linux 6.12.5-1
+ [bookworm] - linux 6.1.123-1
+ NOTE: https://git.kernel.org/linus/6cf7b65f7029914dc0cd7db86fac9ee5159008c6 (6.13-rc1)
+CVE-2024-41935 [f2fs: fix to shrink read extent node in batches]
+ - linux 6.12.5-1
+ NOTE: https://git.kernel.org/linus/3fc5d5a182f6a1f8bd4dc775feb54c369dd2c343 (6.13-rc1)
+CVE-2024-41932 [sched: fix warning in sched_setaffinity]
+ - linux 6.12.5-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/70ee7947a29029736a1a06c73a48ff37674a851b (6.13-rc3)
+CVE-2024-41149 [block: avoid to reuse `hctx` not removed from cpuhp callback list]
+ - linux 6.12.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/85672ca9ceeaa1dcf2777a7048af5f4aee3fd02b (6.13-rc4)
CVE-2025-23113 (An issue was discovered in REDCap 14.9.6. It has an action=myprojects& ...)
NOT-FOR-US: REDCap
CVE-2025-23112 (An issue was discovered in REDCap 14.9.6. A stored cross-site scriptin ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/96ee90efb3722b22b06cc77ca7125aade741fee4
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/96ee90efb3722b22b06cc77ca7125aade741fee4
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250111/528e8a6a/attachment.htm>
More information about the debian-security-tracker-commits
mailing list