Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1b2d3975 by Salvatore Bonaccorso at 2024-05-20T16:04:33+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,332 @@
+CVE-2024-36009 [ax25: Fix netdev refcount issue]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       NOTE: 
https://git.kernel.org/linus/467324bcfe1a31ec65d0cf4aa59421d6b7a7d52b (6.9-rc6)
+CVE-2024-36008 [ipv4: check for NULL idev in ip_route_use_hint()]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/58a4c9b1e5a3e53c9148e80b90e1e43897ce77d1 (6.9-rc6)
+CVE-2024-36007 [mlxsw: spectrum_acl_tcam: Fix warning during rehash]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/743edc8547a92b6192aa1f1b6bb78233fa21dc9b (6.9-rc6)
+CVE-2024-36006 [mlxsw: spectrum_acl_tcam: Fix incorrect list API usage]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/b377add0f0117409c418ddd6504bd682ebe0bf79 (6.9-rc6)
+CVE-2024-36005 [netfilter: nf_tables: honor table dormant flag from netdev 
release event path]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/8e30abc9ace4f0add4cd761dfdbfaebae5632dd2 (6.9-rc6)
+CVE-2024-36004 [i40e: Do not use WQ_MEM_RECLAIM flag for workqueue]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       NOTE: 
https://git.kernel.org/linus/2cc7d150550cc981aceedf008f5459193282425c (6.9-rc6)
+CVE-2024-36003 [ice: fix LAG and VF lock dependency in ice_reset_vf()]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/96fdd1f6b4ed72a741fb0eb705c0e13049b8721f (6.9-rc6)
+CVE-2024-36002 [dpll: fix dpll_pin_on_pin_register() for multiple parent pins]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/38d7b94e81d068b8d8c8392f421cfd2c3bbfd1a6 (6.9-rc6)
+CVE-2024-36001 [netfs: Fix the pre-flush when appending to a file in 
writethrough mode]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/c97f59e276d4e93480f29a70accbd0d7273cf3f5 (6.9-rc6)
+CVE-2024-36000 [mm/hugetlb: fix missing hugetlb_lock for resv uncharge]
+       - linux 6.8.9-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/b76b46902c2d0395488c8412e1116c2486cdfcb2 (6.9-rc6)
+CVE-2024-35999 [smb3: missing lock when picking channel]
+       - linux 6.8.9-1
+       NOTE: 
https://git.kernel.org/linus/8094a600245e9b28eb36a13036f202ad67c1f887 (6.9-rc6)
+CVE-2024-35998 [smb3: fix lock ordering potential deadlock in 
cifs_sync_mid_result]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       NOTE: 
https://git.kernel.org/linus/8861fd5180476f45f9e8853db154600469a0284f (6.9-rc6)
+CVE-2024-35997 [HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent 
lock-up]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       NOTE: 
https://git.kernel.org/linus/9c0f59e47a90c54d0153f8ddc0f80d7a36207d0e (6.9-rc6)
+CVE-2024-35996 [cpu: Re-enable CPU mitigations by default for !X86 
architectures]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/fe42754b94a42d08cf9501790afc25c4f6a5f631 (6.9-rc6)
+CVE-2024-35995 [ACPI: CPPC: Use access_width over bit_width for system memory 
accesses]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       NOTE: 
https://git.kernel.org/linus/2f4a4d63a193be6fd530d180bb13c3592052904c (6.9-rc1)
+CVE-2024-35994 [firmware: qcom: uefisecapp: Fix memory related IO errors and 
crashes]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/ed09f81eeaa8f9265e1787282cb283f10285c259 (6.9-rc6)
+CVE-2024-35993 [mm: turn folio_test_hugetlb into a PageType]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/d99e3140a4d33e26066183ff727d8f02f56bec64 (6.9-rc6)
+CVE-2024-35992 [phy: marvell: a3700-comphy: Fix out of bounds read]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/e4308bc22b9d46cf33165c9dfaeebcf29cd56f04 (6.9-rc6)
+CVE-2024-35991 [dmaengine: idxd: Convert spinlock to mutex to lock evl 
workqueue]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/d5638de827cff0fce77007e426ec0ffdedf68a44 (6.9-rc6)
+CVE-2024-35990 [dma: xilinx_dpdma: Fix locking]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/244296cc3a155199a8b080d19e645d7d49081a38 (6.9-rc6)
+CVE-2024-35989 [dmaengine: idxd: Fix oops during rmmod on single-CPU platforms]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/f221033f5c24659dc6ad7e5cf18fb1b075f4a8be (6.9-rc6)
+CVE-2024-35988 [riscv: Fix TASK_SIZE on 64-bit NOMMU]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/6065e736f82c817c9a597a31ee67f0ce4628e948 (6.9-rc6)
+CVE-2024-35987 [riscv: Fix loading 64-bit NOMMU kernels past the start of RAM]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/aea702dde7e9876fb00571a2602f25130847bf0f (6.9-rc6)
+CVE-2024-35986 [phy: ti: tusb1210: Resolve charger-det crash if charger psy is 
unregistered]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/bf6e4ee5c43690e4c5a8a057bbcd4ff986bed052 (6.9-rc6)
+CVE-2024-35985 [sched/eevdf: Prevent vlag from going out of bounds in 
reweight_eevdf()]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/1560d1f6eb6b398bddd80c16676776c0325fe5fe (6.9-rc6)
+CVE-2024-35984 [i2c: smbus: fix NULL function pointer dereference]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       NOTE: 
https://git.kernel.org/linus/91811a31b68d3765b3065f4bb6d7d6d84a7cfc9f (6.9-rc6)
+CVE-2024-35983 [bounds: Use the right number of bits for power-of-two 
CONFIG_NR_CPUS]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/5af385f5f4cddf908f663974847a4083b2ff2c79 (6.9-rc7)
+CVE-2024-35982 [batman-adv: Avoid infinite loop trying to resize local TT]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       NOTE: 
https://git.kernel.org/linus/b1f532a3b1e6d2e5559c7ace49322922637a28aa (6.9-rc4)
+CVE-2024-35981 [virtio_net: Do not send RSS key if it is not supported]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/059a49aa2e25c58f90b50151f109dd3c4cdb3a47 (6.9-rc4)
+CVE-2024-35980 [arm64: tlb: Fix TLBI RANGE operand]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/e3ba51ab24fddef79fc212f9840de54db8fd1685 (6.9-rc4)
+CVE-2024-35979 [raid1: fix use-after-free for original bio in 
raid1_write_request()]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/fcf3f7e2fc8a53a6140beee46ec782a4c88e4744 (6.9-rc4)
+CVE-2024-35978 [Bluetooth: Fix memory leak in hci_req_sync_complete()]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       NOTE: 
https://git.kernel.org/linus/45d355a926ab40f3ae7bc0b0a00cb0e3e8a5a810 (6.9-rc4)
+CVE-2024-35977 [platform/chrome: cros_ec_uart: properly fix race condition]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/5e700b384ec13f5bcac9855cb28fcc674f1d3593 (6.9-rc4)
+CVE-2024-35976 [Description:]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       NOTE: 
https://git.kernel.org/linus/237f3cf13b20db183d3706d997eedc3c49eacd44 (6.9-rc4)
+CVE-2024-35975 [octeontx2-pf: Fix transmit scheduler resource leak]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/bccb798e07f8bb8b91212fe8ed1e421685449076 (6.9-rc4)
+CVE-2024-35974 [block: fix q->blkg_list corruption during disk rebind]
+       - linux 6.8.9-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/8b8ace080319a866f5dfe9da8e665ae51d971c54 (6.9-rc4)
+CVE-2024-35973 [geneve: fix header validation in geneve[6]_xmit_skb]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       NOTE: 
https://git.kernel.org/linus/d8a6213d70accb403b82924a1c229e733433a5ef (6.9-rc4)
+CVE-2024-35972 [bnxt_en: Fix possible memory leak in 
bnxt_rdma_aux_device_init()]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/7ac10c7d728d75bc9daaa8fade3c7a3273b9a9ff (6.9-rc4)
+CVE-2024-35971 [net: ks8851: Handle softirqs at the end of IRQ thread to fix 
hang]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/be0384bf599cf1eb8d337517feeb732d71f75a6f (6.9-rc4)
+CVE-2024-35970 [af_unix: Clear stale u->oob_skb.]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/b46f4eaa4f0ec38909fb0072eea3aeddb32f954e (6.9-rc4)
+CVE-2024-35969 [ipv6: fix race condition between ipv6_get_ifaddr and 
ipv6_del_addr]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       NOTE: 
https://git.kernel.org/linus/7633c4da919ad51164acbf1aa322cc1a3ead6129 (6.9-rc4)
+CVE-2024-35968 [pds_core: Fix pdsc_check_pci_health function to use work 
thread]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/81665adf25d28a00a986533f1d3a5df76b79cad9 (6.9-rc4)
+CVE-2024-35967 [Bluetooth: SCO: Fix not validating setsockopt user input]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       NOTE: 
https://git.kernel.org/linus/51eda36d33e43201e7a4fd35232e069b2c850b01 (6.9-rc4)
+CVE-2024-35966 [Bluetooth: RFCOMM: Fix not validating setsockopt user input]
+       - linux 6.8.9-1
+       NOTE: 
https://git.kernel.org/linus/a97de7bff13b1cc825c1b1344eaed8d6c2d3e695 (6.9-rc4)
+CVE-2024-35965 [Bluetooth: L2CAP: Fix not validating setsockopt user input]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       NOTE: 
https://git.kernel.org/linus/4f3951242ace5efc7131932e2e01e6ac6baed846 (6.9-rc4)
+CVE-2024-35964 [Bluetooth: ISO: Fix not validating setsockopt user input]
+       - linux 6.8.9-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/9e8742cdfc4b0e65266bb4a901a19462bda9285e (6.9-rc4)
+CVE-2024-35963 [Bluetooth: hci_sock: Fix not validating setsockopt user input]
+       - linux 6.8.9-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/b2186061d6043d6345a97100460363e990af0d46 (6.9-rc4)
+CVE-2024-35962 [netfilter: complete validation of user input]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/65acf6e0501ac8880a4f73980d01b5d27648b956 (6.9-rc4)
+CVE-2024-35961 [net/mlx5: Register devlink first under devlink lock]
+       - linux 6.8.9-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/c6e77aa9dd82bc18a89bf49418f8f7e961cfccc8 (6.9-rc4)
+CVE-2024-35960 [net/mlx5: Properly link new fs rules into the tree]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       NOTE: 
https://git.kernel.org/linus/7c6782ad4911cbee874e85630226ed389ff2e453 (6.9-rc4)
+CVE-2024-35959 [net/mlx5e: Fix mlx5e_priv_init() cleanup flow]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/ecb829459a841198e142f72fadab56424ae96519 (6.9-rc4)
+CVE-2024-35958 [net: ena: Fix incorrect descriptor free behavior]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/bf02d9fe00632d22fa91d34749c7aacf397b6cde (6.9-rc4)
+CVE-2024-35957 [iommu/vt-d: Fix WARN_ON in iommu probe path]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/89436f4f54125b1297aec1f466efd8acb4ec613d (6.9-rc4)
+CVE-2024-35956 [btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume 
operations]
+       - linux 6.8.9-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/74e97958121aa1f5854da6effba70143f051b0cd (6.9-rc4)
+CVE-2024-35955 [kprobes: Fix possible use-after-free issue on kprobe 
registration]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       NOTE: 
https://git.kernel.org/linus/325f3fb551f8cd672dbbfc4cf58b14f9ee3fc9e8 (6.9-rc4)
+CVE-2024-35954 [scsi: sg: Avoid sg device teardown race]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/27f58c04a8f438078583041468ec60597841284d (6.9-rc2)
+CVE-2024-35953 [accel/ivpu: Fix deadlock in context_xa]
+       - linux 6.8.9-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/fd7726e75968b27fe98534ccbf47ccd6fef686f3 (6.9-rc4)
+CVE-2024-35952 [drm/ast: Fix soft lockup]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/bc004f5038220b1891ef4107134ccae44be55109 (6.9-rc4)
+CVE-2024-35951 [drm/panfrost: Fix the error path in 
panfrost_mmu_map_fault_addr()]
+       - linux 6.8.9-1
+       [buster] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/1fc9af813b25e146d3607669247d0f970f5a87c3 (6.9-rc4)
+CVE-2024-35950 [drm/client: Fully protect modes[] with dev->mode_config.mutex]
+       - linux 6.8.9-1
+       [bookworm] - linux 6.1.90-1
+       [bullseye] - linux 5.10.216-1
+       NOTE: 
https://git.kernel.org/linus/3eadd887dbac1df8f25f701e5d404d1b90fd0fea (6.9-rc4)
+CVE-2024-35949 [btrfs: make sure that WRITTEN is set on all metadata blocks]
+       - linux <unfixed>
+       NOTE: 
https://git.kernel.org/linus/e03418abde871314e1a3a550f4c8afb7b89cb273 (6.9)
+CVE-2024-35948 [bcachefs: Check for journal entries overruning end of sb clean 
section]
+       - linux <unfixed>
+       NOTE: 
https://git.kernel.org/linus/fcdbc1d7a4b638e5d5668de461f320386f3002aa (6.9-rc6)
 CVE-2024-5134 (A vulnerability was found in SourceCodester Electricity 
Consumption Mo ...)
        NOT-FOR-US: SourceCodester Electricity Consumption Monitoring Tool
 CVE-2024-5123 (A vulnerability classified as problematic has been found in 
SourceCode ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1b2d3975d32b45d9a854635f5ec2772db9444029

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1b2d3975d32b45d9a854635f5ec2772db9444029
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to