Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 849f7f01 by Salvatore Bonaccorso at 2024-09-11T17:26:45+02:00 Merge Linux CVEs from kernel-sec - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,97 @@ +CVE-2024-46672 [wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion] + - linux 6.10.7-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/2ad4e1ada8eebafa2d75a4b75eeeca882de6ada1 (6.11-rc4) +CVE-2024-45030 [igb: cope with large MAX_SKB_FRAGS] + - linux 6.10.7-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/8aba27c4a5020abdf60149239198297f88338a8d (6.11-rc5) +CVE-2024-45029 [i2c: tegra: Do not mark ACPI devices as irq safe] + - linux 6.10.7-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/14d069d92951a3e150c0a81f2ca3b93e54da913b (6.11-rc4) +CVE-2024-45028 [mmc: mmc_test: Fix NULL dereference on allocation failure] + - linux 6.10.7-1 + NOTE: https://git.kernel.org/linus/a1e627af32ed60713941cbfc8075d44cad07f6dd (6.11-rc5) +CVE-2024-45027 [usb: xhci: Check for xhci->interrupters being allocated in xhci_mem_clearup()] + - linux 6.10.7-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/dcdb52d948f3a17ccd3fce757d9bd981d7c32039 (6.11-rc4) +CVE-2024-45026 [s390/dasd: fix error recovery leading to data corruption on ESE devices] + - linux 6.10.7-1 + NOTE: https://git.kernel.org/linus/7db4042336580dfd75cb5faa82c12cd51098c90b (6.11-rc4) +CVE-2024-45025 [fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE] + - linux 6.10.7-1 + NOTE: https://git.kernel.org/linus/9a2fa1472083580b6c66bdaf291f591e1170123a (6.11-rc4) +CVE-2024-45024 [mm/hugetlb: fix hugetlb vs. core-mm PT locking] + - linux 6.10.7-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/5f75cfbd6bb02295ddaed48adf667b6c828ce07b (6.11-rc4) +CVE-2024-45023 [md/raid1: Fix data corruption for degraded array with slow disk] + - linux 6.10.7-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/c916ca35308d3187c9928664f9be249b22a3a701 (6.11-rc4) +CVE-2024-45022 [mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0] + - linux 6.10.7-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/61ebe5a747da649057c37be1c37eb934b4af79ca (6.11-rc4) +CVE-2024-45021 [memcg_write_event_control(): fix a user-triggerable oops] + - linux 6.10.7-1 + NOTE: https://git.kernel.org/linus/046667c4d3196938e992fba0dfcde570aa85cd0e (6.11-rc4) +CVE-2024-45020 [bpf: Fix a kernel verifier crash in stacksafe()] + - linux 6.10.7-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/bed2eb964c70b780fb55925892a74f26cb590b25 (6.11-rc4) +CVE-2024-45019 [net/mlx5e: Take state lock during tx timeout reporter] + - linux 6.10.7-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/e6b5afd30b99b43682a7764e1a74a42fe4d5f4b3 (6.11-rc4) +CVE-2024-45018 [netfilter: flowtable: initialise extack before use] + - linux 6.10.7-1 + NOTE: https://git.kernel.org/linus/e9767137308daf906496613fd879808a07f006a2 (6.11-rc4) +CVE-2024-45017 [net/mlx5: Fix IPsec RoCE MPV trace call] + - linux 6.10.7-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/607e1df7bd47fe91cab85a97f57870a26d066137 (6.11-rc5) +CVE-2024-45016 [netem: fix return value if duplicate enqueue fails] + - linux 6.10.7-1 + NOTE: https://git.kernel.org/linus/c07ff8592d57ed258afee5a5e04991a48dbaf382 (6.11-rc5) +CVE-2024-45015 [drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable()] + - linux 6.10.7-1 + NOTE: https://git.kernel.org/linus/aedf02e46eb549dac8db4821a6b9f0c6bf6e3990 (6.11-rc5) +CVE-2024-45014 [s390/boot: Avoid possible physmem_info segment corruption] + - linux 6.10.7-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/d7fd2941ae9a67423d1c7bee985f240e4686634f (6.11-rc5) +CVE-2024-45013 [nvme: move stopping keep-alive into nvme_uninit_ctrl()] + - linux 6.10.7-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/a54a93d0e3599b05856971734e15418ac551a14c (6.11-rc5) +CVE-2024-45012 [nouveau/firmware: use dma non-coherent allocator] + - linux 6.10.7-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/9b340aeb26d50e9a9ec99599e2a39b035fac978e (6.11-rc5) +CVE-2024-45011 [char: xillybus: Check USB endpoints when probing device] + - linux 6.10.7-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/2374bf7558de915edc6ec8cb10ec3291dfab9594 (6.11-rc4) +CVE-2024-45010 [mptcp: pm: only mark 'subflow' endp as available] + - linux 6.10.7-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/322ea3778965da72862cca2a0c50253aacf65fe6 (6.11-rc5) +CVE-2024-45009 [mptcp: pm: only decrement add_addr_accepted for MPJ req] + - linux 6.10.7-1 + NOTE: https://git.kernel.org/linus/1c1f721375989579e46741f59523e39ec9b2a9bd (6.11-rc5) CVE-2024-8441 (An uncontrolled search path in the agent of Ivanti EPM before 2022 SU6 ...) NOT-FOR-US: Ivanti CVE-2024-8440 (The Essential Addons for Elementor \u2013 Best Elementor Templates, Wi ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/849f7f0159ff731dec6d7c2c95fb6bbcfff60d43 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/849f7f0159ff731dec6d7c2c95fb6bbcfff60d43 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
