Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1e0c4100 by Salvatore Bonaccorso at 2024-02-22T22:31:08+01:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,82 @@
+CVE-2024-26588 [LoongArch: BPF: Prevent out-of-bounds memory access]
+       - linux 6.6.15-1
+       [bookworm] - linux 6.1.76-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/36a87385e31c9343af9a4756598e704741250a67 (6.8-rc1)
+CVE-2024-26587 [net: netdevsim: don't try to destroy PHC on VFs]
+       - linux 6.6.15-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/ea937f77208323d35ffe2f8d8fc81b00118bfcda (6.8-rc1)
+CVE-2024-26586 [mlxsw: spectrum_acl_tcam: Fix stack corruption]
+       - linux 6.6.15-1
+       [bullseye] - linux 5.10.209-1
+       NOTE: 
https://git.kernel.org/linus/483ae90d8f976f8339cf81066312e1329f2d3706 (6.8-rc1)
+CVE-2024-26591 [bpf: Fix re-attachment branch in bpf_tracing_prog_attach]
+       - linux 6.6.15-1
+       [bookworm] - linux 6.1.76-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/715d82ba636cb3629a6e18a33bb9dbe53f9936ee (6.8-rc1)
+CVE-2023-52451 [powerpc/pseries/memhp: Fix access beyond end of drmem array]
+       - linux 6.6.15-1
+       [bookworm] - linux 6.1.76-1
+       [bullseye] - linux 5.10.209-1
+       NOTE: 
https://git.kernel.org/linus/bd68ffce69f6cf8ddd3a3c32549d1d2275e49fc5 (6.8-rc1)
+CVE-2023-52452 [bpf: Fix accesses to uninit stack slots]
+       - linux 6.6.15-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/6b4a64bafd107e521c01eec3453ce94a3fb38529 (6.8-rc1)
+CVE-2023-52450 [perf/x86/intel/uncore: Fix NULL pointer dereference issue in 
upi_fill_topology()]
+       - linux 6.6.15-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/1692cf434ba13ee212495b5af795b6a07e986ce4 (6.8-rc1)
+CVE-2023-52448 [gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump]
+       - linux 6.6.15-1
+       [bookworm] - linux 6.1.76-1
+       [bullseye] - linux 5.10.209-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/8877243beafa7c6bfc42022cbfdf9e39b25bd4fa (6.8-rc1)
+CVE-2023-52449 [mtd: Fix gluebi NULL pointer dereference caused by ftl 
notifier]
+       - linux 6.6.15-1
+       [bookworm] - linux 6.1.76-1
+       [bullseye] - linux 5.10.209-1
+       NOTE: 
https://git.kernel.org/linus/a43bdc376deab5fff1ceb93dca55bcab8dbdc1d6 (6.8-rc1)
+CVE-2023-52447 [bpf: Defer the free of inner map when necessary]
+       - linux 6.6.15-1
+       [bookworm] - linux 6.1.76-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/876673364161da50eed6b472d746ef88242b2368 (6.8-rc1)
+CVE-2023-52445 [media: pvrusb2: fix use after free on context disconnection]
+       - linux 6.6.15-1
+       [bookworm] - linux 6.1.76-1
+       [bullseye] - linux 5.10.209-1
+       NOTE: 
https://git.kernel.org/linus/ded85b0c0edd8f45fec88783d7555a5b982449c1 (6.8-rc1)
+CVE-2023-52444 [f2fs: fix to avoid dirent corruption]
+       - linux 6.6.15-1
+       [bookworm] - linux 6.1.76-1
+       [bullseye] - linux 5.10.209-1
+       NOTE: 
https://git.kernel.org/linus/53edb549565f55ccd0bdf43be3d66ce4c2d48b28 (6.8-rc1)
+CVE-2024-26590 [erofs: fix inconsistent per-file compression format]
+       - linux 6.6.15-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/118a8cf504d7dfa519562d000f423ee3ca75d2c4 (6.8-rc1)
+CVE-2024-26589 [bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS]
+       - linux 6.6.15-1
+       [bookworm] - linux 6.1.76-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/22c7fa171a02d310e3a3f6ed46a698ca8a0060ed (6.8-rc1)
+CVE-2023-52443 [apparmor: avoid crash when parsed profile name is empty]
+       - linux 6.6.15-1
+       [bookworm] - linux 6.1.76-1
+       [bullseye] - linux 5.10.209-1
+       NOTE: 
https://git.kernel.org/linus/55a8210c9e7d21ff2644809699765796d4bfb200 (6.8-rc1)
 CVE-2024-26578
        NOT-FOR-US: Apache Answer
 CVE-2024-23349



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1e0c41009b4993fb3b4bb44bcbb68090cae777aa

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1e0c41009b4993fb3b4bb44bcbb68090cae777aa
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to