[Git][security-tracker-team/security-tracker][master] Sync status for some linux CVEs with kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Feb 21 06:12:34 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
8fcce2c0 by Salvatore Bonaccorso at 2025-02-21T07:12:06+01:00
Sync status for some linux CVEs with kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -11672,6 +11672,7 @@ CVE-2024-57850 (In the Linux kernel, the following vulnerability has been resolv
 CVE-2024-57849 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.5-1
 	[bookworm] - linux 6.1.123-1
+	[bullseye] - linux <ignored> (s390x not supported in LTS)
 	NOTE: https://git.kernel.org/linus/a0bd7dacbd51c632b8e2c0500b479af564afadf3 (6.13-rc1)
 CVE-2024-57843 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 6.12.5-1
@@ -11844,6 +11845,7 @@ CVE-2024-51729 (In the Linux kernel, the following vulnerability has been resolv
 CVE-2024-50051 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.5-1
 	[bookworm] - linux 6.1.123-1
+	[bullseye] - linux <ignored> (powerpc not a release architecture)
 	NOTE: https://git.kernel.org/linus/984836621aad98802d92c4a3047114cf518074c8 (6.13-rc2)
 CVE-2024-49573 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.8-1
@@ -12798,6 +12800,7 @@ CVE-2024-56786 (In the Linux kernel, the following vulnerability has been resolv
 CVE-2024-56785 (In the Linux kernel, the following vulnerability has been resolved:  M ...)
 	- linux 6.12.5-1
 	[bookworm] - linux 6.1.123-1
+	[bullseye] - linux <ignored> (mips* not supported in LTS)
 	NOTE: https://git.kernel.org/linus/4fbd66d8254cedfd1218393f39d83b6c07a01917 (6.13-rc1)
 CVE-2024-56784 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.5-1
@@ -12813,6 +12816,7 @@ CVE-2024-56782 (In the Linux kernel, the following vulnerability has been resolv
 CVE-2024-56781 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.12.5-1
 	[bookworm] - linux 6.1.123-1
+	[bullseye] - linux <ignored> (ppc64el not supported in LTS)
 	NOTE: https://git.kernel.org/linus/cf89c9434af122f28a3552e6f9cc5158c33ce50a (6.13-rc1)
 CVE-2024-56780 (In the Linux kernel, the following vulnerability has been resolved:  q ...)
 	- linux 6.12.5-1
@@ -15350,6 +15354,7 @@ CVE-2024-56747 (In the Linux kernel, the following vulnerability has been resolv
 CVE-2024-56746 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.12.3-1
 	[bookworm] - linux 6.1.123-1
+	[bullseye] - linux <ignored> (sh4 not a release architecture)
 	NOTE: https://git.kernel.org/linus/f89d17ae2ac42931be2a0153fecbf8533280c927 (6.13-rc1)
 CVE-2024-56745 (In the Linux kernel, the following vulnerability has been resolved:  P ...)
 	- linux 6.12.3-1
@@ -16689,10 +16694,12 @@ CVE-2024-53166 (In the Linux kernel, the following vulnerability has been resolv
 CVE-2024-53165 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.3-1
 	[bookworm] - linux 6.1.123-1
+	[bullseye] - linux <ignored> (sh4 not a release architecture)
 	NOTE: https://git.kernel.org/linus/63e72e551942642c48456a4134975136cdcb9b3c (6.13-rc1)
 CVE-2022-49034 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.3-1
 	[bookworm] - linux 6.1.123-1
+	[bullseye] - linux <ignored> (sh4 not a release architecture)
 	NOTE: https://git.kernel.org/linus/3c891f7c6a4e90bb1199497552f24b26e46383bc (6.13-rc1)
 CVE-2024-53164 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.8-1
@@ -30341,6 +30348,7 @@ CVE-2024-50168 (In the Linux kernel, the following vulnerability has been resolv
 	{DLA-4008-1}
 	- linux 6.11.6-1
 	[bookworm] - linux 6.1.115-1
+	[bullseye] - linux <ignored> (m68k not a release architecture)
 	NOTE: https://git.kernel.org/linus/2cb3f56e827abb22c4168ad0c1bbbf401bb2f3b8 (6.12-rc5)
 CVE-2024-50167 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	{DLA-4008-1}



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8fcce2c026499a39522c40b87139a07d5f8a1ce5

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8fcce2c026499a39522c40b87139a07d5f8a1ce5
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250221/0fa35289/attachment.htm>


More information about the debian-security-tracker-commits mailing list