[Git][security-tracker-team/security-tracker][master] add forthcoming bullseye fixes for unimportant kernel issues

Moritz Muehlenhoff (@jmm) jmm at debian.org
Thu Aug 17 15:43:49 BST 2023



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
8455c9d3 by Moritz Muehlenhoff at 2023-08-17T16:43:11+02:00
add forthcoming bullseye fixes for unimportant kernel issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -7743,6 +7743,7 @@ CVE-2023-35839 (Solon before 2.3.3 allows Deserialization of Untrusted Data.)
 CVE-2023-35829 (An issue was discovered in the Linux kernel before 6.3.2. A use-after- ...)
 	- linux 6.3.7-1 (unimportant)
 	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3228cec23b8b29215e18090c6ba635840190993d (6.4-rc1)
 	NOTE: Only "exploitable" by removing the module which needs root privileges
@@ -7778,6 +7779,7 @@ CVE-2023-35828 (An issue was discovered in the Linux kernel before 6.3.2. A use-
 	{DLA-3508-1}
 	- linux 6.3.7-1 (unimportant)
 	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
 	NOTE: https://git.kernel.org/linus/2b947f8769be8b8181dc795fd292d3e7120f5204 (6.4-rc1)
 	NOTE: USB_RENESAS_USB3 not enabled in Debian
 	NOTE: Only "exploitable" by removing the module which needs root privileges
@@ -7797,12 +7799,14 @@ CVE-2023-35824 (An issue was discovered in the Linux kernel before 6.3.2. A use-
 	{DLA-3508-1}
 	- linux 6.3.7-1 (unimportant)
 	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
 	NOTE: https://git.kernel.org/linus/5abda7a16698d4d1f47af1168d8fa2c640116b4a (6.4-rc1)
 	NOTE: Only "exploitable" by removing the module which needs root privileges
 CVE-2023-35823 (An issue was discovered in the Linux kernel before 6.3.2. A use-after- ...)
 	{DLA-3508-1}
 	- linux 6.3.7-1 (unimportant)
 	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
 	NOTE: https://git.kernel.org/linus/30cf57da176cca80f11df0d9b7f71581fe601389 (6.4-rc1)
 	NOTE: Only "exploitable" by removing the module which needs root privileges
 CVE-2023-35005 (In Apache Airflow, some potentially sensitive values were being shown  ...)
@@ -9756,6 +9760,7 @@ CVE-2023-34256 (An issue was discovered in the Linux kernel before 6.3.3. There
 	{DLA-3508-1}
 	- linux 6.3.7-1 (unimportant)
 	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
 	NOTE: https://git.kernel.org/linus/4f04351888a83e595571de672e0a4a8b74f4fb31 (6.4-rc2)
 	NOTE: Exploitable only when modifying block device while beeing mounted.
 CVE-2023-34255



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8455c9d371835ab0290236cb6bf84db3d07536cb

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8455c9d371835ab0290236cb6bf84db3d07536cb
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230817/90ccffdb/attachment.htm>


More information about the debian-security-tracker-commits mailing list