[Git][security-tracker-team/security-tracker][master] Track fixed version for linux update via unstable
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sun May 26 08:06:38 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
10a958cd by Salvatore Bonaccorso at 2024-05-26T09:06:08+02:00
Track fixed version for linux update via unstable
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -752,15 +752,15 @@ CVE-2023-46807 (An SQL Injection vulnerability in web component of EPMM before 1
CVE-2023-46806 (An SQL Injection vulnerability in a web component of EPMM versions bef ...)
NOT-FOR-US: Ivanti
CVE-2024-36013 (In the Linux kernel, the following vulnerability has been resolved: B ...)
- - linux <unfixed>
+ - linux 6.8.11-1
NOTE: https://git.kernel.org/linus/4d7b41c0e43995b0e992b9f8903109275744b658 (6.9)
CVE-2024-36012 (In the Linux kernel, the following vulnerability has been resolved: B ...)
- - linux <unfixed>
+ - linux 6.8.11-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/10f9f426ac6e752c8d87bf4346930ba347aaabac (6.9)
CVE-2024-36011 (In the Linux kernel, the following vulnerability has been resolved: B ...)
- - linux <unfixed>
+ - linux 6.8.11-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
[buster] - linux <not-affected> (Vulnerable code not present)
@@ -3669,7 +3669,7 @@ CVE-2024-35950 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux 5.10.216-1
NOTE: https://git.kernel.org/linus/3eadd887dbac1df8f25f701e5d404d1b90fd0fea (6.9-rc4)
CVE-2024-35949 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- - linux <unfixed>
+ - linux 6.8.11-1
NOTE: https://git.kernel.org/linus/e03418abde871314e1a3a550f4c8afb7b89cb273 (6.9)
CVE-2024-35948 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux <unfixed>
@@ -3739,7 +3739,7 @@ CVE-2024-36070 (tine before 2023.11.8, when an LDAP backend is used, allows anon
CVE-2024-36053 (In the mintupload package through 4.2.0 for Linux Mint, service-name m ...)
NOT-FOR-US: mintupload
CVE-2024-35947 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- - linux <unfixed>
+ - linux 6.8.11-1
NOTE: https://git.kernel.org/linus/00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c (6.9-rc7)
CVE-2024-35946 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux 6.8.9-1
@@ -5499,7 +5499,7 @@ CVE-2023-27504 (Improper conditions check in some Intel(R) BIOS Guard firmware m
CVE-2023-22662 (Improper input validation of EpsdSrMgmtConfig in UEFI firmware for som ...)
NOT-FOR-US: Intel
CVE-2024-21823 (Hardware logic with insecure de-synchronization in Intel(R) DSA and In ...)
- - linux <unfixed>
+ - linux 6.8.11-1
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.html
CVE-2023-47855 (Improper input validation in some Intel(R) TDX module software before ...)
@@ -6999,18 +6999,18 @@ CVE-2023-46870 (extcap/nrf_sniffer_ble.py, extcap/nrf_sniffer_ble.sh, extcap/Sni
CVE-2022-4967 (strongSwan versions 5.9.2 through 5.9.5 are affected by authorization ...)
TODO: check
CVE-2024-27401 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- - linux <unfixed>
+ - linux 6.8.11-1
NOTE: https://git.kernel.org/linus/38762a0763c10c24a4915feee722d7aa6e73eb98 (6.9-rc7)
CVE-2024-27400 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- - linux <unfixed>
+ - linux 6.8.11-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/d3a9331a6591e9df64791e076f6591f440af51c3 (6.9-rc7)
CVE-2024-27399 (In the Linux kernel, the following vulnerability has been resolved: B ...)
- - linux <unfixed>
+ - linux 6.8.11-1
NOTE: https://git.kernel.org/linus/adf0398cee86643b8eacde95f17d073d022f782c (6.9)
CVE-2024-27398 (In the Linux kernel, the following vulnerability has been resolved: B ...)
- - linux <unfixed>
+ - linux 6.8.11-1
NOTE: https://git.kernel.org/linus/483bc08181827fc475643272ffb69c533007e546 (6.9)
CVE-2023-52656 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux 6.7.12-1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/10a958cdb9d222388bd2682639df16f27ac4dfec
--
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/10a958cdb9d222388bd2682639df16f27ac4dfec
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240526/cfba8673/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list