[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sat Jan 11 20:12:35 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
fd1e4336 by security tracker role at 2025-01-11T20:12:30+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,293 +1,307 @@
-CVE-2024-57881 [mm/page_alloc: don't call pfn_to_page() on possibly non-existent PFN in split_large_buddy()]
+CVE-2025-23128
+ REJECTED
+CVE-2025-23127
+ REJECTED
+CVE-2025-23126
+ REJECTED
+CVE-2025-23125
+ REJECTED
+CVE-2025-23124
+ REJECTED
+CVE-2025-0392 (A vulnerability, which was classified as critical, was found in Guangz ...)
+ TODO: check
+CVE-2025-0391 (A vulnerability, which was classified as critical, has been found in G ...)
+ TODO: check
+CVE-2024-57881 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/faeec8e23c10bd30e8aa759a2eb3018dae00f924 (6.13-rc4)
-CVE-2024-57880 [ASoC: Intel: sof_sdw: Add space for a terminator into DAIs array]
+CVE-2024-57880 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- linux 6.12.6-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/255cc582e6e16191a20d54bcdbca6c91d3e90c5e (6.13-rc3)
-CVE-2024-57879 [Bluetooth: iso: Always release hdev at the end of iso_listen_bis]
+CVE-2024-57879 (In the Linux kernel, the following vulnerability has been resolved: B ...)
- linux 6.12.6-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/9c76fff747a73ba01d1d87ed53dd9c00cb40ba05 (6.13-rc3)
-CVE-2024-57878 [arm64: ptrace: fix partial SETREGSET for NT_ARM_FPMR]
+CVE-2024-57878 (In the Linux kernel, the following vulnerability has been resolved: a ...)
- linux 6.12.5-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/f5d71291841aecfe5d8435da2dfa7f58ccd18bc8 (6.13-rc2)
-CVE-2024-57877 [arm64: ptrace: fix partial SETREGSET for NT_ARM_POE]
+CVE-2024-57877 (In the Linux kernel, the following vulnerability has been resolved: a ...)
- linux 6.12.5-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/594bfc4947c4fcabba1318d8384c61a29a6b89fb (6.13-rc2)
-CVE-2024-57876 [drm/dp_mst: Fix resetting msg rx state after topology removal]
+CVE-2024-57876 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.12.5-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/a6fa67d26de385c3c7a23c1e109a0e23bfda4ec7 (6.13-rc2)
-CVE-2024-57875 [block: RCU protect disk->conv_zones_bitmap]
+CVE-2024-57875 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.12.5-1
NOTE: https://git.kernel.org/linus/d7cb6d7414ea1b33536fa6d11805cb8dceec1f97 (6.13-rc1)
-CVE-2024-57874 [arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL]
+CVE-2024-57874 (In the Linux kernel, the following vulnerability has been resolved: a ...)
- linux 6.12.5-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/ca62d90085f4af36de745883faab9f8a7cbb45d3 (6.13-rc2)
-CVE-2024-57872 [scsi: ufs: pltfrm: Dellocate HBA during ufshcd_pltfrm_remove()]
+CVE-2024-57872 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.12.5-1
NOTE: https://git.kernel.org/linus/897df60c16d54ad515a3d0887edab5c63da06d1f (6.13-rc2)
-CVE-2024-57850 [jffs2: Prevent rtime decompress memory corruption]
+CVE-2024-57850 (In the Linux kernel, the following vulnerability has been resolved: j ...)
- linux 6.12.5-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/fe051552f5078fa02d593847529a3884305a6ffe (6.13-rc1)
-CVE-2024-57849 [s390/cpum_sf: Handle CPU hotplug remove during sampling]
+CVE-2024-57849 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.12.5-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/a0bd7dacbd51c632b8e2c0500b479af564afadf3 (6.13-rc1)
-CVE-2024-57843 [virtio-net: fix overflow inside virtnet_rq_alloc]
+CVE-2024-57843 (In the Linux kernel, the following vulnerability has been resolved: v ...)
- linux 6.12.5-1
NOTE: https://git.kernel.org/linus/6aacd1484468361d1d04badfe75f264fa5314864 (6.13-rc1)
-CVE-2024-57839 [Revert "readahead: properly shorten readahead when falling back to do_page_cache_ra()"]
+CVE-2024-57839 (In the Linux kernel, the following vulnerability has been resolved: R ...)
- linux 6.12.5-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/a220d6b95b1ae12c7626283d7609f0a1438e6437 (6.13-rc2)
-CVE-2024-57838 [s390/entry: Mark IRQ entries to fix stack depot warnings]
+CVE-2024-57838 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.12.5-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/45c9f2b856a075a34873d00788d2e8a250c1effd (6.13-rc1)
-CVE-2024-57809 [PCI: imx6: Fix suspend/resume support on i.MX6QDL]
+CVE-2024-57809 (In the Linux kernel, the following vulnerability has been resolved: P ...)
- linux 6.12.5-1
NOTE: https://git.kernel.org/linus/0a726f542d7c8cc0f9c5ed7df5a4bd4b59ac21b3 (6.13-rc1)
-CVE-2024-57807 [scsi: megaraid_sas: Fix for a potential deadlock]
+CVE-2024-57807 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.12.8-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/50740f4dc78b41dec7c8e39772619d5ba841ddd7 (6.13-rc2)
-CVE-2024-57806 [btrfs: fix transaction atomicity bug when enabling simple quotas]
+CVE-2024-57806 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/f2363e6fcc7938c5f0f6ac066fad0dd247598b51 (6.13-rc5)
-CVE-2024-57805 [ASoC: SOF: Intel: hda-dai: Do not release the link DMA on STOP]
+CVE-2024-57805 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/e8d0ba147d901022bcb69da8d8fd817f84e9f3ca (6.13-rc5)
-CVE-2024-57804 [scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs]
+CVE-2024-57804 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.12.8-1
NOTE: https://git.kernel.org/linus/711201a8b8334a397440ac0b859df0054e174bc9 (6.13-rc2)
-CVE-2024-57800 [ALSA: memalloc: prefer dma_mapping_error() over explicit address checking]
+CVE-2024-57800 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/fa0308134d26dbbeb209a1581eea46df663866b6 (6.13-rc5)
-CVE-2024-57799 [phy: rockchip: samsung-hdptx: Set drvdata before enabling runtime PM]
+CVE-2024-57799 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/9d23e48654620fdccfcc74cc2cef04eaf7353d07 (6.13-rc5)
-CVE-2024-57798 [drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()]
+CVE-2024-57798 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.12.8-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/e54b00086f7473dbda1a7d6fc47720ced157c6a8 (6.13-rc2)
-CVE-2024-57793 [virt: tdx-guest: Just leak decrypted memory on unrecoverable errors]
+CVE-2024-57793 (In the Linux kernel, the following vulnerability has been resolved: v ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/27834971f616c5e154423c578fa95e0444444ce1 (6.13-rc5)
-CVE-2024-57792 [power: supply: gpio-charger: Fix set charge current limits]
+CVE-2024-57792 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux 6.12.8-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/afc6e39e824ad0e44b2af50a97885caec8d213d1 (6.13-rc5)
-CVE-2024-57791 [net/smc: check return value of sock_recvmsg when draining clc data]
+CVE-2024-57791 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.12.8-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/c5b8ee5022a19464783058dc6042e8eefa34e8cd (6.13-rc4)
-CVE-2024-56788 [net: ethernet: oa_tc6: fix tx skb race condition between reference pointers]
+CVE-2024-56788 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/e592b5110b3e9393881b0a019d86832bbf71a47f (6.13-rc4)
-CVE-2024-56372 [net: tun: fix tun_napi_alloc_frags()]
+CVE-2024-56372 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/429fde2d81bcef0ebab002215358955704586457 (6.13-rc4)
-CVE-2024-56369 [drm/modes: Avoid divide by zero harder in drm_mode_vrefresh()]
+CVE-2024-56369 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.12.8-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/9398332f23fab10c5ec57c168b44e72997d6318e (6.13-rc4)
-CVE-2024-56368 [ring-buffer: Fix overflow in __rb_map_vma]
+CVE-2024-56368 (In the Linux kernel, the following vulnerability has been resolved: r ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/c58a812c8e49ad688f94f4b050ad5c5b388fc5d2 (6.13-rc4)
-CVE-2024-55916 [Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet]
+CVE-2024-55916 (In the Linux kernel, the following vulnerability has been resolved: D ...)
- linux 6.12.8-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/07a756a49f4b4290b49ea46e089cbe6f79ff8d26 (6.13-rc4)
-CVE-2024-55881 [KVM: x86: Play nice with protected guests in complete_hypercall_exit()]
+CVE-2024-55881 (In the Linux kernel, the following vulnerability has been resolved: K ...)
- linux 6.12.8-1
[bookworm] - linux 6.1.123-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/9b42d1e8e4fe9dc631162c04caa69b0d1860b0f0 (6.13-rc4)
-CVE-2024-55642 [block: Prevent potential deadlocks in zone write plug error recovery]
+CVE-2024-55642 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.12.6-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/fe0418eb9bd69a19a948b297c8de815e05f3cde1 (6.13-rc3)
-CVE-2024-55641 [xfs: unlock inodes when erroring out of xfs_trans_alloc_dir]
+CVE-2024-55641 (In the Linux kernel, the following vulnerability has been resolved: x ...)
- linux 6.12.6-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/53b001a21c9dff73b64e8c909c41991f01d5d00f (6.13-rc3)
-CVE-2024-55639 [net: renesas: rswitch: avoid use-after-put for a device tree node]
+CVE-2024-55639 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.12.6-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/66b7e9f85b8459c823b11e9af69dbf4be5eb6be8 (6.13-rc3)
-CVE-2024-54683 [netfilter: IDLETIMER: Fix for possible ABBA deadlock]
+CVE-2024-54683 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.12.6-1
NOTE: https://git.kernel.org/linus/f36b01994d68ffc253c8296e2228dfe6e6431c03 (6.13-rc3)
-CVE-2024-54680 [smb: client: fix TCP timers deadlock after rmmod]
+CVE-2024-54680 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/e9f2517a3e18a54a3943c098d2226b245d488801 (6.13-rc4)
-CVE-2024-54460 [Bluetooth: iso: Fix circular lock in iso_listen_bis]
+CVE-2024-54460 (In the Linux kernel, the following vulnerability has been resolved: B ...)
- linux 6.12.6-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/168e28305b871d8ec604a8f51f35467b8d7ba05b (6.13-rc3)
-CVE-2024-54455 [accel/ivpu: Fix general protection fault in ivpu_bo_list()]
+CVE-2024-54455 (In the Linux kernel, the following vulnerability has been resolved: a ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/4b2efb9db0c22a130bbd1275e489b42c02d08050 (6.13-rc4)
-CVE-2024-54193 [accel/ivpu: Fix WARN in ivpu_ipc_send_receive_internal()]
+CVE-2024-54193 (In the Linux kernel, the following vulnerability has been resolved: a ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/0f6482caa6acdfdfc744db7430771fe7e6c4e787 (6.13-rc4)
-CVE-2024-54191 [Bluetooth: iso: Fix circular lock in iso_conn_big_sync]
+CVE-2024-54191 (In the Linux kernel, the following vulnerability has been resolved: B ...)
- linux 6.12.6-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/7a17308c17880d259105f6e591eb1bc77b9612f0 (6.13-rc3)
-CVE-2024-53690 [nilfs2: prevent use of deleted inode]
+CVE-2024-53690 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.12.8-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/901ce9705fbb9f330ff1f19600e5daf9770b0175 (6.13-rc4)
-CVE-2024-53689 [block: Fix potential deadlock while freezing queue and acquiring sysfs_lock]
+CVE-2024-53689 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/be26ba96421ab0a8fa2055ccf7db7832a13c44d2 (6.13-rc3)
-CVE-2024-53687 [riscv: Fix IPIs usage in kfence_protect_page()]
+CVE-2024-53687 (In the Linux kernel, the following vulnerability has been resolved: r ...)
- linux 6.12.6-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/b3431a8bb336cece8adc452437befa7d4534b2fd (6.13-rc3)
-CVE-2024-53685 [ceph: give up on paths longer than PATH_MAX]
+CVE-2024-53685 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.12.8-1
NOTE: https://git.kernel.org/linus/550f7ca98ee028a606aa75705a7e77b1bd11720f (6.13-rc4)
-CVE-2024-53682 [regulator: axp20x: AXP717: set ramp_delay]
+CVE-2024-53682 (In the Linux kernel, the following vulnerability has been resolved: r ...)
- linux 6.12.6-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/f07ae52f5cf6a5584fdf7c8c652f027d90bc8b74 (6.13-rc3)
-CVE-2024-53680 [ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init()]
+CVE-2024-53680 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux 6.12.5-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/146b6f1112eb30a19776d6c323c994e9d67790db (6.13-rc2)
-CVE-2024-52332 [igb: Fix potential invalid memory access in igb_init_module()]
+CVE-2024-52332 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux 6.12.5-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/0566f83d206c7a864abcd741fe39d6e0ae5eef29 (6.13-rc2)
-CVE-2024-52319 [mm: use aligned address in clear_gigantic_page()]
+CVE-2024-52319 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/8aca2bc96c833ba695ede7a45ad7784c836a262e (6.13-rc4)
-CVE-2024-51729 [mm: use aligned address in copy_user_gigantic_page()]
+CVE-2024-51729 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/f5d09de9f1bf9674c6418ff10d0a40cfe29268e1 (6.13-rc4)
-CVE-2024-50051 [spi: mpc52xx: Add cancel_work_sync before module remove]
+CVE-2024-50051 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.12.5-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/984836621aad98802d92c4a3047114cf518074c8 (6.13-rc2)
-CVE-2024-49573 [sched/fair: Fix NEXT_BUDDY]
+CVE-2024-49573 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/493afbd187c4c9cc1642792c0d9ba400c3d6d90d (6.13-rc3)
-CVE-2024-49571 [net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg]
+CVE-2024-49571 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/a29e220d3c8edbf0e1beb0f028878a4a85966556 (6.13-rc4)
-CVE-2024-49569 [nvme-rdma: unquiesce admin_q before destroy it]
+CVE-2024-49569 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.12.5-1
NOTE: https://git.kernel.org/linus/5858b687559809f05393af745cbadf06dee61295 (6.13-rc2)
-CVE-2024-49568 [net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg]
+CVE-2024-49568 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.12.8-1
NOTE: https://git.kernel.org/linus/7863c9f3d24ba49dbead7e03dfbe40deb5888fdf (6.13-rc4)
-CVE-2024-48881 [bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again]
+CVE-2024-48881 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.12.5-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/b2e382ae12a63560fca35050498e19e760adf8c0 (6.13-rc2)
-CVE-2024-48876 [stackdepot: fix stack_depot_save_flags() in NMI context]
+CVE-2024-48876 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.12.5-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/031e04bdc834cda3b054ef6b698503b2b97e8186 (6.13-rc2)
-CVE-2024-48875 [btrfs: don't take dev_replace rwsem on task already holding it]
+CVE-2024-48875 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.12.5-1
NOTE: https://git.kernel.org/linus/8cca35cb29f81eba3e96ec44dad8696c8a2f9138 (6.13-rc1)
-CVE-2024-48873 [wifi: rtw89: check return value of ieee80211_probereq_get() for RNR]
+CVE-2024-48873 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux 6.12.5-1
NOTE: https://git.kernel.org/linus/630d5d8f2bf6b340202b6bc2c05d794bbd8e4c1c (6.13-rc1)
-CVE-2024-47809 [dlm: fix possible lkb_resource null dereference]
+CVE-2024-47809 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.12.5-1
NOTE: https://git.kernel.org/linus/b98333c67daf887c724cd692e88e2db9418c0861 (6.13-rc1)
-CVE-2024-47794 [bpf: Prevent tailcall infinite loop caused by freplace]
+CVE-2024-47794 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.12.5-1
NOTE: https://git.kernel.org/linus/d6083f040d5d8f8d748462c77e90547097df936e (6.13-rc1)
-CVE-2024-47408 [net/smc: check smcd_v2_ext_offset when receiving proposal msg]
+CVE-2024-47408 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.12.8-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/9ab332deb671d8f7e66d82a2ff2b3f715bc3a4ad (6.13-rc4)
-CVE-2024-47143 [dma-debug: fix a possible deadlock on radix_lock]
+CVE-2024-47143 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.12.5-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/7543c3e3b9b88212fcd0aaf5cab5588797bdc7de (6.13-rc1)
-CVE-2024-47141 [pinmux: Use sequential access to access desc->pinmux data]
+CVE-2024-47141 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux 6.12.5-1
NOTE: https://git.kernel.org/linus/5a3e85c3c397c781393ea5fb2f45b1f60f8a4e6e (6.13-rc1)
-CVE-2024-46896 [drm/amdgpu: don't access invalid sched]
+CVE-2024-46896 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.12.8-1
[bookworm] - linux 6.1.123-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/a93b1020eb9386d7da11608477121b10079c076a (6.13-rc4)
-CVE-2024-45828 [i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request]
+CVE-2024-45828 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux 6.12.5-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/6ca2738174e4ee44edb2ab2d86ce74f015a0cc32 (6.13-rc1)
-CVE-2024-43098 [i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock]
+CVE-2024-43098 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux 6.12.5-1
[bookworm] - linux 6.1.123-1
NOTE: https://git.kernel.org/linus/6cf7b65f7029914dc0cd7db86fac9ee5159008c6 (6.13-rc1)
-CVE-2024-41935 [f2fs: fix to shrink read extent node in batches]
+CVE-2024-41935 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- linux 6.12.5-1
NOTE: https://git.kernel.org/linus/3fc5d5a182f6a1f8bd4dc775feb54c369dd2c343 (6.13-rc1)
-CVE-2024-41932 [sched: fix warning in sched_setaffinity]
+CVE-2024-41932 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.12.5-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/70ee7947a29029736a1a06c73a48ff37674a851b (6.13-rc3)
-CVE-2024-41149 [block: avoid to reuse `hctx` not removed from cpuhp callback list]
+CVE-2024-41149 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.12.8-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -1805,7 +1819,7 @@ CVE-2025-0247 (Memory safety bugs present in Firefox 133 and Thunderbird 133. So
- firefox 134.0-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-01/#CVE-2025-0247
CVE-2025-0243 (Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ES ...)
- {DSA-5841-1 DSA-5839-1}
+ {DSA-5841-1 DSA-5839-1 DLA-4012-1 DLA-4011-1}
- firefox 134.0-1
- firefox-esr 128.6.0esr-1
- thunderbird 1:128.6.0esr-1
@@ -1813,7 +1827,7 @@ CVE-2025-0243 (Memory safety bugs present in Firefox 133, Thunderbird 133, Firef
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/#CVE-2025-0243
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-05/#CVE-2025-0243
CVE-2025-0242 (Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ES ...)
- {DSA-5841-1 DSA-5839-1}
+ {DSA-5841-1 DSA-5839-1 DLA-4012-1 DLA-4011-1}
- firefox 134.0-1
- firefox-esr 128.6.0esr-1
- thunderbird 1:128.6.0esr-1
@@ -1821,7 +1835,7 @@ CVE-2025-0242 (Memory safety bugs present in Firefox 133, Thunderbird 133, Firef
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/#CVE-2025-0242
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-05/#CVE-2025-0242
CVE-2025-0241 (When segmenting specially crafted text, segmentation would corrupt mem ...)
- {DSA-5841-1 DSA-5839-1}
+ {DSA-5841-1 DSA-5839-1 DLA-4012-1 DLA-4011-1}
- firefox 134.0-1
- firefox-esr 128.6.0esr-1
- thunderbird 1:128.6.0esr-1
@@ -1829,7 +1843,7 @@ CVE-2025-0241 (When segmenting specially crafted text, segmentation would corrup
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/#CVE-2025-0241
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-05/#CVE-2025-0241
CVE-2025-0240 (Parsing a JavaScript module as JSON could, under some circumstances, c ...)
- {DSA-5841-1 DSA-5839-1}
+ {DSA-5841-1 DSA-5839-1 DLA-4012-1 DLA-4011-1}
- firefox 134.0-1
- firefox-esr 128.6.0esr-1
- thunderbird 1:128.6.0esr-1
@@ -1837,7 +1851,7 @@ CVE-2025-0240 (Parsing a JavaScript module as JSON could, under some circumstanc
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/#CVE-2025-0240
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-05/#CVE-2025-0240
CVE-2025-0239 (When using Alt-Svc, ALPN did not properly validate certificates when t ...)
- {DSA-5841-1 DSA-5839-1}
+ {DSA-5841-1 DSA-5839-1 DLA-4012-1 DLA-4011-1}
- firefox 134.0-1
- firefox-esr 128.6.0esr-1
- thunderbird 1:128.6.0esr-1
@@ -1845,7 +1859,7 @@ CVE-2025-0239 (When using Alt-Svc, ALPN did not properly validate certificates w
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/#CVE-2025-0239
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-05/#CVE-2025-0239
CVE-2025-0238 (Assuming a controlled failed memory allocation, an attacker could have ...)
- {DSA-5841-1 DSA-5839-1}
+ {DSA-5841-1 DSA-5839-1 DLA-4012-1 DLA-4011-1}
- firefox 134.0-1
- firefox-esr 128.6.0esr-1
- thunderbird 1:128.6.0esr-1
@@ -1853,7 +1867,7 @@ CVE-2025-0238 (Assuming a controlled failed memory allocation, an attacker could
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/#CVE-2025-0238
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-05/#CVE-2025-0238
CVE-2025-0237 (The WebChannel API, which is used to transport various information acr ...)
- {DSA-5841-1 DSA-5839-1}
+ {DSA-5841-1 DSA-5839-1 DLA-4012-1 DLA-4011-1}
- firefox 134.0-1
- firefox-esr 128.6.0esr-1
- thunderbird 1:128.6.0esr-1
@@ -9485,7 +9499,7 @@ CVE-2024-55566 (ColPack 1.0.10 through 9a7293a has a predictable temporary file
NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1225617
NOTE: Negligible security impact with fs.protected_symlinks=1 being the standard in Debian
CVE-2024-55565 (nanoid (aka Nano ID) before 5.0.9 mishandles non-integer values. 3.3.8 ...)
- {DLA-4003-1}
+ {DLA-4013-1 DLA-4003-1}
- node-postcss 8.4.49+~cs9.2.32-1
[bookworm] - node-postcss <no-dsa> (Minor issue)
- node-mocha 9.1.4+ds1+~cs28.2.8-1
@@ -16534,6 +16548,7 @@ CVE-2023-4458 (A flaw was found within the parsing of extended attributes in the
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/17d5b135bb720832364e8f55f6a887a3c7ec8fdb (6.6-rc1)
CVE-2024-10397 (A malicious server can crash the OpenAFS cache manager and other clien ...)
+ {DSA-5842-1}
- openafs 1.8.13-1 (bug #1087406; bug #1087407)
NOTE: http://openafs.org/pages/security/OPENAFS-SA-2024-003.txt
NOTE: https://lists.openafs.org/pipermail/openafs-devel/2024-November/020961.html
@@ -16548,6 +16563,7 @@ CVE-2024-10397 (A malicious server can crash the OpenAFS cache manager and other
NOTE: http://git.openafs.org/?p=openafs.git;a=commit;h=4871f8ad2775e97bb85ff7efc33a4ad8d3f6d9d1 (openafs-stable-1_8_13)
NOTE: http://git.openafs.org/?p=openafs.git;a=commit;h=37e585f0841803cdf3a1f99770034890ba162d7c (openafs-stable-1_8_13)
CVE-2024-10396 (An authenticated user can provide a malformed ACL to the fileserver's ...)
+ {DSA-5842-1}
- openafs 1.8.13-1 (bug #1087406; bug #1087407)
NOTE: http://openafs.org/pages/security/OPENAFS-SA-2024-002.txt
NOTE: https://lists.openafs.org/pipermail/openafs-devel/2024-November/020961.html
@@ -16564,6 +16580,7 @@ CVE-2024-10396 (An authenticated user can provide a malformed ACL to the fileser
NOTE: http://git.openafs.org/?p=openafs.git;a=commit;h=a9ede52673b8c8abbfc2577ac6987a8a5686206f (openafs-stable-1_8_13)
NOTE: http://git.openafs.org/?p=openafs.git;a=commit;h=21941c0ab2d28fa3a074f46e4d448d518a7c1b8a (openafs-stable-1_8_13)
CVE-2024-10394 (A local user can bypass the OpenAFS PAG (Process Authentication Group) ...)
+ {DSA-5842-1}
- openafs 1.8.13-1 (bug #1087406; bug #1087407)
NOTE: http://openafs.org/pages/security/OPENAFS-SA-2024-001.txt
NOTE: https://lists.openafs.org/pipermail/openafs-devel/2024-November/020961.html
@@ -16645,7 +16662,7 @@ CVE-2024-50557 (A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G)
CVE-2024-50386 (Account users in Apache CloudStack by default are allowed to register ...)
NOT-FOR-US: Apache CloudStack
CVE-2024-50336 (matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for Jav ...)
- {DSA-5841-1}
+ {DSA-5841-1 DLA-4012-1}
- node-matrix-js-sdk <removed>
- thunderbird 1:128.5.2esr-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-69/#CVE-2024-50336
@@ -311357,7 +311374,7 @@ CVE-2021-23567 (The package colors after 1.4.0 are vulnerable to Denial of Servi
NOTE: https://github.com/Marak/colors.js/issues/285
NOTE: Introduced with: https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6
CVE-2021-23566 (The package nanoid from 3.0.0 and before 3.1.31 are vulnerable to Info ...)
- {DLA-4003-1}
+ {DLA-4013-1 DLA-4003-1}
- node-postcss 8.4.5+~cs7.1.51-1
- node-mocha 9.1.4+ds1+~cs28.2.8-1
NOTE: https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575 (3.1.31)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fd1e43364286f47bfefab9802bae0a58c0ac9004
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fd1e43364286f47bfefab9802bae0a58c0ac9004
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250111/3d448f94/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list