[Git][security-tracker-team/security-tracker][master] Add upstream tag reference for CVE-2023-6040 (and use kernel-sec url)
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Fri Jan 12 20:39:20 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
2a9375f7 by Salvatore Bonaccorso at 2024-01-12T20:59:41+01:00
Add upstream tag reference for CVE-2023-6040 (and use kernel-sec url)
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -91,7 +91,7 @@ CVE-2023-6735 (Privilege escalation in mk_tsm agent plugin in Checkmk before 2.2
CVE-2023-6040 (An out-of-bounds access vulnerability involving netfilter was reported ...)
- linux 5.18.2-1
NOTE: https://www.openwall.com/lists/oss-security/2024/01/12/1
- NOTE: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f1082dd31fe461d482d69da2a8eccfeb7bf07ac2
+ NOTE: https://git.kernel.org/linus/f1082dd31fe461d482d69da2a8eccfeb7bf07ac2 (5.18-rc1)
CVE-2023-52339 (In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can ...)
- libebml 1.4.5-1
[bookworm] - libebml <no-dsa> (Minor issue)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2a9375f7012dbb58c2e497ffa6d6c2cf51a06f86
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2a9375f7012dbb58c2e497ffa6d6c2cf51a06f86
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240112/40a287fe/attachment.htm>
More information about the debian-security-tracker-commits
mailing list