[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sun Mar 3 07:14:28 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
0b4fc18e by Salvatore Bonaccorso at 2024-03-03T08:13:55+01:00
Merge Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,334 @@
+CVE-2024-26621 [mm: huge_memory: don't force huge page alignment on 32 bit]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/4ef9ad19e17676b9ef071309bc62020e2373705d (6.8-rc3)
+CVE-2023-52582 [netfs: Only call folio_start_fscache() one time for each folio]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/df1c357f25d808e30b216188330e708e09e1a412 (6.6-rc3)
+CVE-2023-52581 [netfilter: nf_tables: fix memleak when more than 255 elements expired]
+ - linux 6.5.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/cf5000a7787cbc10341091d37245a42c119d26c5 (6.6-rc3)
+CVE-2023-52580 [net/core: Fix ETH_P_1588 flow dissector]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/75ad80ed88a182ab2ad5513e448cf07b403af5c3 (6.6-rc3)
+CVE-2023-52579 [ipv4: fix null-deref in ipv4_link_failure]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux 4.19.304-1
+ NOTE: https://git.kernel.org/linus/0113d9c9d1ccc07f5a3710dac4aa24b6d711278c (6.6-rc3)
+CVE-2023-52578 [net: bridge: use DEV_STATS_INC()]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux 4.19.304-1
+ NOTE: https://git.kernel.org/linus/44bdb313da57322c9b3c108eb66981c6ec6509f4 (6.6-rc3)
+CVE-2023-52577 [dccp: fix dccp_v4_err()/dccp_v6_err() again]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux 4.19.304-1
+ NOTE: https://git.kernel.org/linus/6af289746a636f71f4c0535a9801774118486c7a (6.6-rc3)
+CVE-2023-52576 [x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/34cf99c250d5cd2530b93a57b0de31d3aaf8685b (6.6-rc3)
+CVE-2023-52575 [x86/srso: Fix SBPB enablement for spec_rstack_overflow=off]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/01b057b2f4cc2d905a0bd92195657dbd9a7005ab (6.6-rc3)
+CVE-2023-52574 [team: fix null-ptr-deref when team device type is changed]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux 4.19.304-1
+ NOTE: https://git.kernel.org/linus/492032760127251e5540a5716a70996bacf2a3fd (6.6-rc3)
+CVE-2023-52573 [net: rds: Fix possible NULL-pointer dereference]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/f1d95df0f31048f1c59092648997686e3f7d9478 (6.6-rc3)
+CVE-2023-52572 [cifs: Fix UAF in cifs_demultiplex_thread()]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ NOTE: https://git.kernel.org/linus/d527f51331cace562393a8038d870b3e9916686f (6.6-rc3)
+CVE-2023-52571 [power: supply: rk817: Fix node refcount leak]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/488ef44c068e79752dba8eda0b75f524f111a695 (6.6-rc4)
+CVE-2023-52570 [vfio/mdev: Fix a null-ptr-deref bug for mdev_unregister_parent()]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/c777b11d34e0f47dbbc4b018ef65ad030f2b283a (6.6-rc4)
+CVE-2023-52569 [btrfs: remove BUG() after failure to insert delayed dir index item]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ NOTE: https://git.kernel.org/linus/2c58c3931ede7cd08cbecf1f1a4acaf0a04a41a9 (6.6-rc2)
+CVE-2023-52568 [x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/c6c2adcba50c2622ed25ba5d5e7f05f584711358 (6.6-rc4)
+CVE-2023-52567 [serial: 8250_port: Check IRQ data before use]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux 4.19.304-1
+ NOTE: https://git.kernel.org/linus/cce7fc8b29961b64fadb1ce398dc5ff32a79643b (6.6-rc4)
+CVE-2023-52566 [nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux 4.19.304-1
+ NOTE: https://git.kernel.org/linus/7ee29facd8a9c5a26079148e36bcf07141b3a6bc (6.6-rc4)
+CVE-2023-52565 [media: uvcvideo: Fix OOB read]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/41ebaa5e0eebea4c3bac96b72f9f8ae0d77c0bdb (6.6-rc3)
+CVE-2023-52564 [Revert "tty: n_gsm: fix UAF in gsm_cleanup_mux"]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/29346e217b8ab8a52889b88f00b268278d6b7668 (6.6-rc4)
+CVE-2023-52563 [drm/meson: fix memory leak on ->hpd_notify callback]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/099f0af9d98231bb74956ce92508e87cbcb896be (6.6-rc3)
+CVE-2023-52562 [mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy()]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/46a9ea6681907a3be6b6b0d43776dccc62cad6cf (6.6-rc4)
+CVE-2023-52561 [arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ NOTE: https://git.kernel.org/linus/110e70fccce4f22b53986ae797d665ffb1950aa6 (6.6-rc1)
+CVE-2023-52560 [mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/45120b15743fa7c0aa53d5db6dfb4c8f87be4abd (6.6-rc4)
+CVE-2023-52559 [iommu/vt-d: Avoid memory allocation in iommu_suspend()]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/59df44bfb0ca4c3ee1f1c3c5d0ee8e314844799e (6.6-rc5)
+CVE-2023-52532 [net: mana: Fix TX CQE error handling]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b2b000069a4c307b09548dc2243f31f3ca0eac9c (6.6-rc5)
+CVE-2023-52531 [wifi: iwlwifi: mvm: Fix a memory corruption issue]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ NOTE: https://git.kernel.org/linus/8ba438ef3cacc4808a63ed0ce24d4f0942cfe55d (6.6-rc5)
+CVE-2023-52530 [wifi: mac80211: fix potential key use-after-free]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ NOTE: https://git.kernel.org/linus/31db78a4923ef5e2008f2eed321811ca79e7f71b (6.6-rc5)
+CVE-2023-52529 [HID: sony: Fix a potential memory leak in sony_probe()]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/e1cd4004cde7c9b694bbdd8def0e02288ee58c74 (6.6-rc5)
+CVE-2023-52528 [net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux 4.19.304-1
+ NOTE: https://git.kernel.org/linus/e9c65989920f7c28775ec4e0c11b483910fb67b8 (6.6-rc5)
+CVE-2023-52527 [ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux 4.19.304-1
+ NOTE: https://git.kernel.org/linus/9d4c75800f61e5d75c1659ba201b6c0c7ead3070 (6.6-rc5)
+CVE-2023-52526 [erofs: fix memory leak of LZMA global compressed deduplication]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/75a5221630fe5aa3fedba7a06be618db0f79ba1e (6.6-rc5)
+CVE-2023-52525 [wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux 4.19.304-1
+ NOTE: https://git.kernel.org/linus/aef7a0300047e7b4707ea0411dc9597cba108fc8 (6.6-rc5)
+CVE-2023-52524 [net: nfc: llcp: Add lock when modifying device list]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/dfc7f7a988dad34c3bf4c053124fb26aa6c5f916 (6.6-rc5)
+CVE-2023-52523 [bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b80e31baa43614e086a9d29dc1151932b1bd7fc5 (6.6-rc5)
+CVE-2023-52522 [net: fix possible store tearing in neigh_periodic_work()]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ NOTE: https://git.kernel.org/linus/25563b581ba3a1f263a00e8c9a97f5e7363be6fd (6.6-rc5)
+CVE-2023-52521 [bpf: Annotate bpf_long_memcpy with data_race]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ NOTE: https://git.kernel.org/linus/6a86b5b5cd76d2734304a0173f5f01aa8aa2025e (6.6-rc1)
+CVE-2023-52520 [platform/x86: think-lmi: Fix reference leak]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/528ab3e605cabf2f9c9bd5944d3bfe15f6e94f81 (6.6-rc5)
+CVE-2023-52519 [HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/8f02139ad9a7e6e5c05712f8c1501eebed8eacfd (6.6-rc5)
+CVE-2023-52518 [Bluetooth: hci_codec: Fix leaking content of local_codecs]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b938790e70540bf4f2e653dcd74b232494d06c8f (6.6-rc5)
+CVE-2023-52517 [spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ NOTE: https://git.kernel.org/linus/1f11f4202caf5710204d334fe63392052783876d (6.6-rc1)
+CVE-2023-52516 [dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ NOTE: https://git.kernel.org/linus/fb5a4315591dae307a65fc246ca80b5159d296e1 (6.6-rc1)
+CVE-2023-52515 [RDMA/srp: Do not call scsi_done() from srp_abort()]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ NOTE: https://git.kernel.org/linus/e193b7955dfad68035b983a0011f4ef3590c85eb (6.6-rc5)
+CVE-2023-52514 [x86/reboot: VMCLEAR active VMCSes before emergency reboot]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ NOTE: https://git.kernel.org/linus/b23c83ad2c638420ec0608a9de354507c41bec29 (6.6-rc1)
+CVE-2023-52513 [RDMA/siw: Fix connection failure handling]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/53a3f777049771496f791504e7dc8ef017cba590 (6.6-rc5)
+CVE-2023-52512 [pinctrl: nuvoton: wpcm450: fix out of bounds write]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/87d315a34133edcb29c4cadbf196ec6c30dfd47b (6.6-rc6)
+CVE-2023-52511 [spi: sun6i: reduce DMA RX transfer width to single byte]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ NOTE: https://git.kernel.org/linus/171f8a49f212e87a8b04087568e1b3d132e36a18 (6.6-rc1)
+CVE-2023-52510 [ieee802154: ca8210: Fix a potential UAF in ca8210_probe]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux 4.19.304-1
+ NOTE: https://git.kernel.org/linus/f990874b1c98fe8e57ee9385669f501822979258 (6.6-rc6)
+CVE-2023-52509 [ravb: Fix use-after-free issue in ravb_tx_timeout_work()]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ NOTE: https://git.kernel.org/linus/3971442870713de527684398416970cf025b4f89 (6.6-rc6)
+CVE-2023-52508 [nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ NOTE: https://git.kernel.org/linus/8ae5b3a685dc59a8cf7ccfe0e850999ba9727a3c (6.6-rc2)
+CVE-2023-52507 [nfc: nci: assert requested protocol is valid]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux 4.19.304-1
+ NOTE: https://git.kernel.org/linus/354a6e707e29cb0c007176ee5b8db8be7bd2dee0 (6.6-rc6)
+CVE-2023-52506 [LoongArch: Set all reserved memblocks on Node#0 at initialization]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ NOTE: https://git.kernel.org/linus/b795fb9f5861ee256070d59e33130980a01fadd7 (6.6-rc3)
+CVE-2023-52505 [phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/139ad1143151a07be93bf741d4ea7c89e59f89ce (6.6-rc6)
+CVE-2023-52504 [x86/alternatives: Disable KASAN in apply_alternatives()]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux 4.19.304-1
+ NOTE: https://git.kernel.org/linus/d35652a5fc9944784f6f50a5c979518ff8dacf61 (6.6-rc6)
+CVE-2023-52503 [tee: amdtee: fix use-after-free vulnerability in amdtee_close_session]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/f4384b3e54ea813868bb81a861bf5b2406e15d8f (6.6-rc6)
+CVE-2023-52502 [net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ [buster] - linux 4.19.304-1
+ NOTE: https://git.kernel.org/linus/31c07dffafce914c1d1543c135382a11ff058d93 (6.6-rc6)
+CVE-2023-52501 [ring-buffer: Do not attempt to read past "commit"]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ NOTE: https://git.kernel.org/linus/95a404bd60af6c4d9d8db01ad14fe8957ece31ca (6.6-rc2)
+CVE-2023-52500 [scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ NOTE: https://git.kernel.org/linus/c13e7331745852d0dd7c35eabbe181cbd5b01172 (6.6-rc2)
+CVE-2023-52499 [powerpc/47x: Fix 47x syscall return crash]
+ - linux 6.5.8-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ [buster] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/f0eee815babed70a749d2496a7678be5b45b4c14 (6.6-rc6)
+CVE-2022-48628 [ceph: drop messages from MDS when unmounting]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ NOTE: https://git.kernel.org/linus/e3dfcab2080dc1f9a4b09cc1327361bc2845bfcd (6.6-rc1)
+CVE-2022-48627 [vt: fix memory overlapping when deleting chars in the buffer]
+ - linux 5.18.14-1
+ [bullseye] - linux 5.10.136-1
+ NOTE: https://git.kernel.org/linus/39cdb68c64d84e71a4a717000b6e5de208ee60cc (5.19-rc7)
CVE-2024-1449 (The Master Slider \u2013 Responsive Touch Slider plugin for WordPress ...)
NOT-FOR-US: WordPress plugin
CVE-2024-1398 (The Ultimate Bootstrap Elements for Elementor plugin for WordPress is ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0b4fc18e64af4cf18168bf41444267f93704ed15
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0b4fc18e64af4cf18168bf41444267f93704ed15
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240303/68cd6bbc/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list