[Git][security-tracker-team/security-tracker][master] Sync some CVE stati with kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Jun 25 05:35:44 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
567faf93 by Salvatore Bonaccorso at 2024-06-25T06:34:43+02:00
Sync some CVE stati with kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1509,6 +1509,8 @@ CVE-2024-38614 (In the Linux kernel, the following vulnerability has been resolv
CVE-2024-38613 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 6.8.12-1
[bookworm] - linux 6.1.94-1
+ [bullseye] - linux <ignored> (m68k not a release architecture)
+ [buster] - linux <ignored> (m68k not a release architecture)
NOTE: https://git.kernel.org/linus/da89ce46f02470ef08f0f580755d14d547da59ed (6.10-rc1)
CVE-2024-38612 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux 6.8.12-1
@@ -1532,6 +1534,7 @@ CVE-2024-38608 (In the Linux kernel, the following vulnerability has been resolv
CVE-2024-38607 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 6.8.12-1
[bookworm] - linux 6.1.94-1
+ [buster] - linux <ignored> (m68k and powerpc not release architectures)
NOTE: https://git.kernel.org/linus/d301a71c76ee4c384b4e03cdc320a55f5cf1df05 (6.10-rc1)
CVE-2024-38606 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.8.12-1
@@ -13008,6 +13011,7 @@ CVE-2023-52686 (In the Linux kernel, the following vulnerability has been resolv
- linux 6.6.15-1
[bookworm] - linux 6.1.76-1
[bullseye] - linux 5.10.209-1
+ [buster] - linux <ignored> (ppc64el not supported in LTS)
NOTE: https://git.kernel.org/linus/8649829a1dd25199bbf557b2621cedb4bf9b3050 (6.8-rc1)
CVE-2023-52685
REJECTED
@@ -13061,6 +13065,7 @@ CVE-2023-52675 (In the Linux kernel, the following vulnerability has been resolv
- linux 6.6.15-1
[bookworm] - linux 6.1.76-1
[bullseye] - linux 5.10.209-1
+ [buster] - linux <ignored> (ppc64el not supported in LTS)
NOTE: https://git.kernel.org/linus/0a233867a39078ebb0f575e2948593bbff5826b3 (6.8-rc1)
CVE-2023-52674 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- linux 6.6.15-1
@@ -19813,10 +19818,12 @@ CVE-2024-27001 (In the Linux kernel, the following vulnerability has been resolv
CVE-2024-27000 (In the Linux kernel, the following vulnerability has been resolved: s ...)
{DSA-5681-1 DSA-5680-1}
- linux 6.8.9-1
+ [buster] - linux <ignored> (armel not supported in LTS)
NOTE: https://git.kernel.org/linus/54c4ec5f8c471b7c1137a1f769648549c423c026 (6.9-rc5)
CVE-2024-26999 (In the Linux kernel, the following vulnerability has been resolved: s ...)
{DSA-5681-1 DSA-5680-1}
- linux 6.8.9-1
+ [buster] - linux <ignored> (m68k and powerpc not release architectures)
NOTE: https://git.kernel.org/linus/1be3226445362bfbf461c92a5bcdb1723f2e4907 (6.9-rc5)
CVE-2024-26998 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.8.9-1
@@ -20032,6 +20039,7 @@ CVE-2024-26957 (In the Linux kernel, the following vulnerability has been resolv
{DSA-5681-1}
- linux 6.7.12-1
[bookworm] - linux 6.1.85-1
+ [buster] - linux <ignored> (s390x not supported in LTS)
NOTE: https://git.kernel.org/linus/50ed48c80fecbe17218afed4f8bed005c802976c (6.9-rc1)
CVE-2024-26956 (In the Linux kernel, the following vulnerability has been resolved: n ...)
{DSA-5681-1}
@@ -28453,6 +28461,7 @@ CVE-2024-26751 (In the Linux kernel, the following vulnerability has been resolv
{DSA-5681-1}
- linux 6.7.7-1
[bookworm] - linux 6.1.82-1
+ [buster] - linux <ignored> (armel not supported in LTS)
NOTE: https://git.kernel.org/linus/fdf87a0dc26d0550c60edc911cda42f9afec3557 (6.8-rc6)
CVE-2024-26749 (In the Linux kernel, the following vulnerability has been resolved: u ...)
{DSA-5681-1}
@@ -29550,6 +29559,7 @@ CVE-2024-26655 (In the Linux kernel, the following vulnerability has been resolv
CVE-2024-26654 (In the Linux kernel, the following vulnerability has been resolved: A ...)
{DSA-5681-1 DSA-5658-1}
- linux 6.7.12-1
+ [buster] - linux <ignored> (sh4 not a release architecture)
NOTE: https://git.kernel.org/linus/051e0840ffa8ab25554d6b14b62c9ab9e4901457 (6.9-rc2)
CVE-2024-26653 (In the Linux kernel, the following vulnerability has been resolved: u ...)
- linux 6.7.12-1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/567faf937049cf48041bdd56655f4f759a3bcbbf
--
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/567faf937049cf48041bdd56655f4f759a3bcbbf
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240625/7e68db09/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list