[Git][security-tracker-team/security-tracker][master] Track fixed version for linux update via unstable

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sun May 26 08:06:38 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
10a958cd by Salvatore Bonaccorso at 2024-05-26T09:06:08+02:00
Track fixed version for linux update via unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -752,15 +752,15 @@ CVE-2023-46807 (An SQL Injection vulnerability in web component of EPMM before 1
 CVE-2023-46806 (An SQL Injection vulnerability in a web component of EPMM versions bef ...)
 	NOT-FOR-US: Ivanti
 CVE-2024-36013 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
-	- linux <unfixed>
+	- linux 6.8.11-1
 	NOTE: https://git.kernel.org/linus/4d7b41c0e43995b0e992b9f8903109275744b658 (6.9)
 CVE-2024-36012 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
-	- linux <unfixed>
+	- linux 6.8.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/10f9f426ac6e752c8d87bf4346930ba347aaabac (6.9)
 CVE-2024-36011 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
-	- linux <unfixed>
+	- linux 6.8.11-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
@@ -3669,7 +3669,7 @@ CVE-2024-35950 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux 5.10.216-1
 	NOTE: https://git.kernel.org/linus/3eadd887dbac1df8f25f701e5d404d1b90fd0fea (6.9-rc4)
 CVE-2024-35949 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
-	- linux <unfixed>
+	- linux 6.8.11-1
 	NOTE: https://git.kernel.org/linus/e03418abde871314e1a3a550f4c8afb7b89cb273 (6.9)
 CVE-2024-35948 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux <unfixed>
@@ -3739,7 +3739,7 @@ CVE-2024-36070 (tine before 2023.11.8, when an LDAP backend is used, allows anon
 CVE-2024-36053 (In the mintupload package through 4.2.0 for Linux Mint, service-name m ...)
 	NOT-FOR-US: mintupload
 CVE-2024-35947 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	- linux <unfixed>
+	- linux 6.8.11-1
 	NOTE: https://git.kernel.org/linus/00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c (6.9-rc7)
 CVE-2024-35946 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.8.9-1
@@ -5499,7 +5499,7 @@ CVE-2023-27504 (Improper conditions check in some Intel(R) BIOS Guard firmware m
 CVE-2023-22662 (Improper input validation of EpsdSrMgmtConfig in UEFI firmware for som ...)
 	NOT-FOR-US: Intel
 CVE-2024-21823 (Hardware logic with insecure de-synchronization in Intel(R) DSA and In ...)
-	- linux <unfixed>
+	- linux 6.8.11-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.html
 CVE-2023-47855 (Improper input validation in some Intel(R) TDX module software before  ...)
@@ -6999,18 +6999,18 @@ CVE-2023-46870 (extcap/nrf_sniffer_ble.py, extcap/nrf_sniffer_ble.sh, extcap/Sni
 CVE-2022-4967 (strongSwan versions 5.9.2 through 5.9.5 are affected by authorization  ...)
 	TODO: check
 CVE-2024-27401 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
-	- linux <unfixed>
+	- linux 6.8.11-1
 	NOTE: https://git.kernel.org/linus/38762a0763c10c24a4915feee722d7aa6e73eb98 (6.9-rc7)
 CVE-2024-27400 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	- linux <unfixed>
+	- linux 6.8.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d3a9331a6591e9df64791e076f6591f440af51c3 (6.9-rc7)
 CVE-2024-27399 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
-	- linux <unfixed>
+	- linux 6.8.11-1
 	NOTE: https://git.kernel.org/linus/adf0398cee86643b8eacde95f17d073d022f782c (6.9)
 CVE-2024-27398 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
-	- linux <unfixed>
+	- linux 6.8.11-1
 	NOTE: https://git.kernel.org/linus/483bc08181827fc475643272ffb69c533007e546 (6.9)
 CVE-2023-52656 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.7.12-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/10a958cdb9d222388bd2682639df16f27ac4dfec

-- 
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/10a958cdb9d222388bd2682639df16f27ac4dfec
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240526/cfba8673/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list