summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2024-03-26 20:34:06 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2024-03-26 20:34:06 +0100
commit7e1edb9178af8278e8c6dad575ef962f323c8fe8 (patch)
tree148233b1291ce36ff197ef60929bc837e485e66a
parentbb4eba63eb049b24b1271338f29ff40e146a9b76 (diff)
Add new batch of CVEs
-rw-r--r--active/CVE-2023-5262115
-rw-r--r--active/CVE-2023-5262215
-rw-r--r--active/CVE-2023-5262315
-rw-r--r--active/CVE-2023-5262415
-rw-r--r--active/CVE-2023-5262515
-rw-r--r--active/CVE-2023-5262616
-rw-r--r--active/CVE-2023-5262716
-rw-r--r--active/CVE-2024-2664415
-rw-r--r--active/CVE-2024-2664516
-rw-r--r--active/CVE-2024-2664615
-rw-r--r--active/CVE-2024-2664715
-rw-r--r--active/CVE-2024-2664815
-rw-r--r--active/CVE-2024-2664916
-rw-r--r--active/CVE-2024-2665016
14 files changed, 215 insertions, 0 deletions
diff --git a/active/CVE-2023-52621 b/active/CVE-2023-52621
new file mode 100644
index 00000000..1d40c898
--- /dev/null
+++ b/active/CVE-2023-52621
@@ -0,0 +1,15 @@
+Description: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers
+References:
+Notes:
+ carnil> First introducing commit could not be determined.
+Bugs:
+upstream: released (6.8-rc1) [169410eba271afc9f0fb476d996795aa26770c6d]
+6.7-upstream-stable: released (6.7.4) [c7f1b6146f4a46d727c0d046284c28b6882c6304]
+6.6-upstream-stable: released (6.6.16) [483cb92334cd7f1d5387dccc0ab5d595d27a669d]
+6.1-upstream-stable: released (6.1.77) [d6d6fe4bb105595118f12abeed4a7bdd450853f3]
+5.10-upstream-stable: needed
+4.19-upstream-stable: needed
+sid: released (6.7.7-1)
+6.1-bookworm-security: needed
+5.10-bullseye-security: needed
+4.19-buster-security: needed
diff --git a/active/CVE-2023-52622 b/active/CVE-2023-52622
new file mode 100644
index 00000000..d0c76782
--- /dev/null
+++ b/active/CVE-2023-52622
@@ -0,0 +1,15 @@
+Description: ext4: avoid online resizing failures due to oversized flex bg
+References:
+Notes:
+ carnil> First introducing commit could not be determined.
+Bugs:
+upstream: released (6.8-rc1) [5d1935ac02ca5aee364a449a35e2977ea84509b0]
+6.7-upstream-stable: released (6.7.4) [dc3e0f55bec4410f3d74352c4a7c79f518088ee2]
+6.6-upstream-stable: released (6.6.16) [8b1413dbfe49646eda2c00c0f1144ee9d3368e0c]
+6.1-upstream-stable: released (6.1.77) [6d2cbf517dcabc093159cf138ad5712c9c7fa954]
+5.10-upstream-stable: released (5.10.210) [cfbbb3199e71b63fc26cee0ebff327c47128a1e8]
+4.19-upstream-stable: released (4.19.307) [cd1f93ca97a9136989f3bd2bf90696732a2ed644]
+sid: released (6.7.7-1)
+6.1-bookworm-security: needed
+5.10-bullseye-security: needed
+4.19-buster-security: needed
diff --git a/active/CVE-2023-52623 b/active/CVE-2023-52623
new file mode 100644
index 00000000..e8c9bfed
--- /dev/null
+++ b/active/CVE-2023-52623
@@ -0,0 +1,15 @@
+Description: SUNRPC: Fix a suspicious RCU usage warning
+References:
+Notes:
+ carnil> First introducing commit could not be determined.
+Bugs:
+upstream: released (6.8-rc1) [31b62908693c90d4d07db597e685d9f25a120073]
+6.7-upstream-stable: released (6.7.4) [8f860c8407470baff2beb9982ad6b172c94f1d0a]
+6.6-upstream-stable: released (6.6.16) [69c7eeb4f622c2a28da965f970f982db171f3dc6]
+6.1-upstream-stable: released (6.1.77) [e8ca3e73301e23e8c0ac0ce2e6bac4545cd776e0]
+5.10-upstream-stable: released (5.10.210) [c430e6bb43955c6bf573665fcebf31694925b9f7]
+4.19-upstream-stable: released (4.19.307) [fece80a2a6718ed58487ce397285bb1b83a3e54e]
+sid: released (6.7.7-1)
+6.1-bookworm-security: needed
+5.10-bullseye-security: needed
+4.19-buster-security: needed
diff --git a/active/CVE-2023-52624 b/active/CVE-2023-52624
new file mode 100644
index 00000000..85664e8e
--- /dev/null
+++ b/active/CVE-2023-52624
@@ -0,0 +1,15 @@
+Description: drm/amd/display: Wake DMCUB before executing GPINT commands
+References:
+Notes:
+ carnil> First introducing commit could not be determined.
+Bugs:
+upstream: released (6.8-rc1) [e5ffd1263dd5b44929c676171802e7b6af483f21]
+6.7-upstream-stable: released (6.7.3) [2ef98c6d753a744e333b7e34b9cf687040fba57d]
+6.6-upstream-stable: needed
+6.1-upstream-stable: needed
+5.10-upstream-stable: needed
+4.19-upstream-stable: needed
+sid: released (6.7.7-1)
+6.1-bookworm-security: needed
+5.10-bullseye-security: needed
+4.19-buster-security: needed
diff --git a/active/CVE-2023-52625 b/active/CVE-2023-52625
new file mode 100644
index 00000000..06754870
--- /dev/null
+++ b/active/CVE-2023-52625
@@ -0,0 +1,15 @@
+Description: drm/amd/display: Refactor DMCUB enter/exit idle interface
+References:
+Notes:
+ carnil> First introducing commit could not be determined.
+Bugs:
+upstream: released (6.8-rc1) [8e57c06bf4b0f51a4d6958e15e1a99c9520d00fa]
+6.7-upstream-stable: released (6.7.3) [820c3870c491946a78950cdf961bf40e28c1025f]
+6.6-upstream-stable: needed
+6.1-upstream-stable: needed
+5.10-upstream-stable: needed
+4.19-upstream-stable: needed
+sid: released (6.7.7-1)
+6.1-bookworm-security: needed
+5.10-bullseye-security: needed
+4.19-buster-security: needed
diff --git a/active/CVE-2023-52626 b/active/CVE-2023-52626
new file mode 100644
index 00000000..df266106
--- /dev/null
+++ b/active/CVE-2023-52626
@@ -0,0 +1,16 @@
+Description: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context
+References:
+Notes:
+ carnil> Introduced in 92214be5979c ("net/mlx5e: Update doorbell for port timestamping
+ carnil> CQ before the software counter"). Vulnerable versions: 6.5.13 6.6.3 6.7-rc2.
+Bugs:
+upstream: released (6.8-rc2) [3876638b2c7ebb2c9d181de1191db0de8cac143a]
+6.7-upstream-stable: released (6.7.3) [33cdeae8c6fb58cc445f859b67c014dc9f60b4e0]
+6.6-upstream-stable: released (6.6.15) [40e0d0746390c5b0c31144f4f1688d72f3f8d790]
+6.1-upstream-stable: N/A "Vulnerable code not present"
+5.10-upstream-stable: N/A "Vulnerable code not present"
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (6.6.15-1)
+6.1-bookworm-security: N/A "Vulnerable code not present"
+5.10-bullseye-security: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2023-52627 b/active/CVE-2023-52627
new file mode 100644
index 00000000..4e03b9ce
--- /dev/null
+++ b/active/CVE-2023-52627
@@ -0,0 +1,16 @@
+Description: iio: adc: ad7091r: Allow users to configure device events
+References:
+Notes:
+ carnil> Introduced in ca69300173b6 ("iio: adc: Add support for AD7091R5 ADC").
+ carnil> Vulnerable versions: 5.6-rc1.
+Bugs:
+upstream: released (6.8-rc1) [020e71c7ffc25dfe29ed9be6c2d39af7bd7f661f]
+6.7-upstream-stable: released (6.7.3) [55aca2ce91a63740278502066beaddbd841af9c6]
+6.6-upstream-stable: released (6.6.15) [89c4e63324e208a23098f7fb15c00487cecbfed2]
+6.1-upstream-stable: released (6.1.76) [137568aa540a9f587c48ff7d4c51cdba08cfe9a4]
+5.10-upstream-stable: released (5.10.210) [1eba6f7ffa295a0eec098c107043074be7cc4ec5]
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (6.6.15-1)
+6.1-bookworm-security: released (6.1.76-1)
+5.10-bullseye-security: needed
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26644 b/active/CVE-2024-26644
new file mode 100644
index 00000000..cd5178bb
--- /dev/null
+++ b/active/CVE-2024-26644
@@ -0,0 +1,15 @@
+Description: btrfs: don't abort filesystem when attempting to snapshot deleted subvolume
+References:
+Notes:
+ carnil> First introducing commit could not be determined.
+Bugs:
+upstream: released (6.8-rc2) [7081929ab2572920e94d70be3d332e5c9f97095a]
+6.7-upstream-stable: released (6.7.3) [d8680b722f0ff6d7a01ddacc1844e0d52354d6ff]
+6.6-upstream-stable: released (6.6.15) [ec794a7528199e1be6d47bec03f4755aa75df256]
+6.1-upstream-stable: released (6.1.76) [6e6bca99e8d88d989a7cde4c064abea552d5219b]
+5.10-upstream-stable: released (5.10.210) [2bdf872bcfe629a6202ffd6641615a8ed00e8464]
+4.19-upstream-stable: needed
+sid: released (6.6.15-1)
+6.1-bookworm-security: released (6.1.76-1)
+5.10-bullseye-security: needed
+4.19-buster-security: needed
diff --git a/active/CVE-2024-26645 b/active/CVE-2024-26645
new file mode 100644
index 00000000..b8375d40
--- /dev/null
+++ b/active/CVE-2024-26645
@@ -0,0 +1,16 @@
+Description: tracing: Ensure visibility when inserting an element into tracing_map
+References:
+Notes:
+ carnil> Introduced in c193707dde77 ("tracing: Remove code which merges duplicates").
+ carnil> Vulnerable versions: 4.17-rc1.
+Bugs:
+upstream: released (6.8-rc2) [2b44760609e9eaafc9d234a6883d042fc21132a7]
+6.7-upstream-stable: released (6.7.3) [bf4aeff7da85c3becd39fb73bac94122331c30fb]
+6.6-upstream-stable: released (6.6.15) [a1eebe76e187dbe11ca299f8dbb6e45d5b1889e7]
+6.1-upstream-stable: released (6.1.76) [f4f7e696db0274ff560482cc52eddbf0551d4b7a]
+5.10-upstream-stable: released (5.10.210) [ef70dfa0b1e5084f32635156c9a5c795352ad860]
+4.19-upstream-stable: released (4.19.307) [5022b331c041e8c54b9a6a3251579bd1e8c0fc0b]
+sid: released (6.6.15-1)
+6.1-bookworm-security: released (6.1.76-1)
+5.10-bullseye-security: needed
+4.19-buster-security: needed
diff --git a/active/CVE-2024-26646 b/active/CVE-2024-26646
new file mode 100644
index 00000000..b8d8034a
--- /dev/null
+++ b/active/CVE-2024-26646
@@ -0,0 +1,15 @@
+Description: thermal: intel: hfi: Add syscore callbacks for system-wide PM
+References:
+Notes:
+ carnil> First introducing commit could not be determined.
+Bugs:
+upstream: released (6.8-rc1) [97566d09fd02d2ab329774bb89a2cdf2267e86d9]
+6.7-upstream-stable: released (6.7.3) [c9d6d63b6c03afaa6f185df249af693a7939577c]
+6.6-upstream-stable: released (6.6.15) [019ccc66d56a696a4dfee3bfa2f04d0a7c3d89ee]
+6.1-upstream-stable: released (6.1.76) [28f010dc50df0f7987c04112114fcfa7e0803566]
+5.10-upstream-stable: needed
+4.19-upstream-stable: needed
+sid: released (6.6.15-1)
+6.1-bookworm-security: released (6.1.76-1)
+5.10-bullseye-security: needed
+4.19-buster-security: needed
diff --git a/active/CVE-2024-26647 b/active/CVE-2024-26647
new file mode 100644
index 00000000..7f97d663
--- /dev/null
+++ b/active/CVE-2024-26647
@@ -0,0 +1,15 @@
+Description: drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'
+References:
+Notes:
+ carnil> First introducing commit could not be determined.
+Bugs:
+upstream: released (6.8-rc1) [3bb9b1f958c3d986ed90a3ff009f1e77e9553207]
+6.7-upstream-stable: released (6.7.3) [cf656fc7276e5b3709a81bc9d9639459be2b2647]
+6.6-upstream-stable: released (6.6.15) [6aa5ede6665122f4c8abce3c6eba06b49e54d25c]
+6.1-upstream-stable: needed
+5.10-upstream-stable: needed
+4.19-upstream-stable: needed
+sid: released (6.6.15-1)
+6.1-bookworm-security: needed
+5.10-bullseye-security: needed
+4.19-buster-security: needed
diff --git a/active/CVE-2024-26648 b/active/CVE-2024-26648
new file mode 100644
index 00000000..e383cf1b
--- /dev/null
+++ b/active/CVE-2024-26648
@@ -0,0 +1,15 @@
+Description: drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()
+References:
+Notes:
+ carnil> First introducing commit could not be determined.
+Bugs:
+upstream: released (6.8-rc1) [7073934f5d73f8b53308963cee36f0d389ea857c]
+6.7-upstream-stable: released (6.7.3) [c02d257c654191ecda1dc1af6875d527e85310e7]
+6.6-upstream-stable: released (6.6.15) [22ae604aea14756954e1c00ae653e34d2afd2935]
+6.1-upstream-stable: needed
+5.10-upstream-stable: needed
+4.19-upstream-stable: needed
+sid: released (6.6.15-1)
+6.1-bookworm-security: needed
+5.10-bullseye-security: needed
+4.19-buster-security: needed
diff --git a/active/CVE-2024-26649 b/active/CVE-2024-26649
new file mode 100644
index 00000000..d5f2f115
--- /dev/null
+++ b/active/CVE-2024-26649
@@ -0,0 +1,16 @@
+Description: drm/amdgpu: Fix the null pointer when load rlc firmware
+References:
+Notes:
+ carnil> Introduced in 3da9b71563cb ("drm/amd: Use `amdgpu_ucode_*` helpers for GFX10").
+ carnil> Vulnerable versions: 6.3-rc1.
+Bugs:
+upstream: released (6.8-rc1) [bc03c02cc1991a066b23e69bbcc0f66e8f1f7453]
+6.7-upstream-stable: released (6.7.3) [d3887448486caeef9687fb5dfebd4ff91e0f25aa]
+6.6-upstream-stable: released (6.6.15) [8b5bacce2d13dbe648f0bfd3f738ecce8db4978c]
+6.1-upstream-stable: N/A "Vulnerable code not present"
+5.10-upstream-stable: N/A "Vulnerable code not present"
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (6.6.15-1)
+6.1-bookworm-security: N/A "Vulnerable code not present"
+5.10-bullseye-security: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26650 b/active/CVE-2024-26650
new file mode 100644
index 00000000..403b2741
--- /dev/null
+++ b/active/CVE-2024-26650
@@ -0,0 +1,16 @@
+Description: platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe
+References:
+Notes:
+ carnil> Introduced in 9745fb07474f ("platform/x86/intel: Add Primary to Sideband (P2SB)
+ carnil> bridge support"). Vulnerable versions: 6.0-rc1.
+Bugs:
+upstream: released (6.8-rc2) [5913320eb0b3ec88158cfcb0fa5e996bf4ef681b]
+6.7-upstream-stable: released (6.7.3) [d281ac9a987c553d93211b90fd4fe97d8eca32cd]
+6.6-upstream-stable: released (6.6.15) [847e1eb30e269a094da046c08273abe3f3361cf2]
+6.1-upstream-stable: released (6.1.76) [2841631a03652f32b595c563695d0461072e0de4]
+5.10-upstream-stable: N/A "Vulnerable code not present"
+4.19-upstream-stable: N/A "Vulnerable code not present"
+sid: released (6.6.15-1)
+6.1-bookworm-security: released (6.1.76-1)
+5.10-bullseye-security: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy