[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Fri Jul 5 20:22:44 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
ddc3e9d4 by Salvatore Bonaccorso at 2024-07-05T21:22:01+02:00
Merge Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -7,33 +7,62 @@ CVE-2024-39936 (An issue was discovered in HTTP2 in Qt before 5.15.18, 6.x befor
CVE-2024-39935 (jc21 NGINX Proxy Manager before 2.11.3 allows backend/internal/certifi ...)
TODO: check
CVE-2024-39485 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- TODO: check
+ - linux 6.9.7-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/9537a8425a7a0222999d5839a0b394b1e8834b4a (6.10-rc1)
CVE-2024-39484 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- TODO: check
+ - linux 6.9.7-1
+ NOTE: https://git.kernel.org/linus/55c421b364482b61c4c45313a535e61ed5ae4ea3 (6.10-rc1)
CVE-2024-39483 (In the Linux kernel, the following vulnerability has been resolved: K ...)
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
TODO: check
+ NOTE: https://git.kernel.org/linus/b4bd556467477420ee3a91fbcba73c579669edc6 (6.10-rc3)
CVE-2024-39482 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- TODO: check
+ - linux 6.9.7-1
+ [bookworm] - linux 6.1.94-1
+ NOTE: https://git.kernel.org/linus/3a861560ccb35f2a4f0a4b8207fa7c2a35fc7f31 (6.10-rc1)
CVE-2024-39481 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- TODO: check
+ - linux 6.9.7-1
+ [bookworm] - linux 6.1.94-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/8a9d420149c477e7c97fbd6453704e4612bdd3fa (6.10-rc1)
CVE-2024-39480 (In the Linux kernel, the following vulnerability has been resolved: k ...)
- TODO: check
+ - linux 6.9.7-1
+ [bookworm] - linux 6.1.94-1
+ NOTE: https://git.kernel.org/linus/e9730744bf3af04cda23799029342aa3cddbc454 (6.10-rc1)
CVE-2024-39479 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- TODO: check
+ - linux 6.9.7-1
+ NOTE: https://git.kernel.org/linus/5bc9de065b8bb9b8dd8799ecb4592d0403b54281 (6.10-rc1)
CVE-2024-39478 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- TODO: check
+ - linux 6.9.7-1
+ NOTE: https://git.kernel.org/linus/d7f01649f4eaf1878472d3d3f480ae1e50d98f6c (6.10-rc1)
CVE-2024-39477 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- TODO: check
+ - linux 6.9.7-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/8daf9c702ee7f825f0de8600abff764acfedea13 (6.10-rc3)
CVE-2024-39476 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- TODO: check
+ - linux 6.9.7-1
+ [bookworm] - linux 6.1.94-1
+ NOTE: https://git.kernel.org/linus/151f66bb618d1fd0eeb84acb61b4a9fa5d8bb0fa (6.10-rc1)
CVE-2024-39475 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- TODO: check
+ - linux 6.9.7-1
+ [bookworm] - linux 6.1.94-1
+ NOTE: https://git.kernel.org/linus/6ad959b6703e2c4c5d7af03b4cfd5ff608036339 (6.10-rc1)
CVE-2024-39474 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- TODO: check
+ - linux 6.9.7-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/8e0545c83d672750632f46e3f9ad95c48c91a0fc (6.10-rc1)
CVE-2024-39473 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- TODO: check
+ - linux 6.9.7-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/ffa077b2f6ad124ec3d23fbddc5e4b0ff2647af8 (6.10-rc2)
CVE-2024-39472 (In the Linux kernel, the following vulnerability has been resolved: x ...)
- TODO: check
+ - linux <unfixed>
+ NOTE: https://git.kernel.org/linus/45cf976008ddef4a9c9a30310c9b4fb2a9a6602a (6.10-rc1)
CVE-2024-34481 (drupal-wiki.com Drupal Wiki before 8.31.1 allows XSS via comments, cap ...)
TODO: check
CVE-2024-6513
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ddc3e9d48a0e574751e866771d449e48ed1dc8a1
--
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ddc3e9d48a0e574751e866771d449e48ed1dc8a1
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240705/367da994/attachment.htm>
More information about the debian-security-tracker-commits
mailing list