summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2024-03-27 15:57:25 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2024-03-27 15:57:25 +0100
commit05e8c04a698e9d913079ed97ef48f18f42fc5abc (patch)
treea79edece7069df0b43fe97c911791d456040a22f
parent616e89147dd49c8f9bf965de065631576d080d2d (diff)
Track fixes in 6.7.11, 6.1.83, 5.10.214 and 4.19.311
-rw-r--r--active/CVE-2023-524472
-rw-r--r--active/CVE-2023-62706
-rw-r--r--active/CVE-2023-70429
-rw-r--r--active/CVE-2024-2209915
4 files changed, 17 insertions, 15 deletions
diff --git a/active/CVE-2023-52447 b/active/CVE-2023-52447
index 5fc00e93..67d51f49 100644
--- a/active/CVE-2023-52447
+++ b/active/CVE-2023-52447
@@ -9,7 +9,7 @@ upstream: released (6.8-rc1) [876673364161da50eed6b472d746ef88242b2368]
6.7-upstream-stable: released (6.7.2) [bfd9b20c4862f41d4590fde11d70a5eeae53dcc5]
6.6-upstream-stable: released (6.6.14) [f91cd728b10c51f6d4a39957ccd56d1e802fc8ee]
6.1-upstream-stable: released (6.1.75) [62fca83303d608ad4fec3f7428c8685680bb01b0]
-5.10-upstream-stable: needed
+5.10-upstream-stable: released (5.10.214) [90c445799fd1dc214d7c6279c144e33a35e29ef2]
4.19-upstream-stable: N/A "Vulnerable code not present"
sid: released (6.6.15-1)
6.1-bookworm-security: released (6.1.76-1)
diff --git a/active/CVE-2023-6270 b/active/CVE-2023-6270
index dbe9ff48..ec7f1f11 100644
--- a/active/CVE-2023-6270
+++ b/active/CVE-2023-6270
@@ -7,9 +7,9 @@ Notes:
carnil> list_head (v3)")
Bugs:
upstream: released (6.9-rc1) [f98364e926626c678fb4b9004b75cacf92ff0662]
-6.1-upstream-stable: needed
-5.10-upstream-stable: needed
-4.19-upstream-stable: needed
+6.1-upstream-stable: released (6.1.83) [74ca3ef68d2f449bc848c0a814cefc487bf755fa]
+5.10-upstream-stable: released (5.10.214) [faf0b4c5e00bb680e8e43ac936df24d3f48c8e65]
+4.19-upstream-stable: released (4.19.311) [ad80c34944d7175fa1f5c7a55066020002921a99]
sid: needed
6.1-bookworm-security: needed
5.10-bullseye-security: needed
diff --git a/active/CVE-2023-7042 b/active/CVE-2023-7042
index 07bcf6f8..105ea935 100644
--- a/active/CVE-2023-7042
+++ b/active/CVE-2023-7042
@@ -6,11 +6,12 @@ References:
Notes:
carnil> Commit fixes dc405152bb64 ("ath10k: handle mgmt tx completion
carnil> event") in 4.19-rc1.
+ carnil> Fixed as well in 6.7.11 and 6.8.2.
Bugs:
-upstream: needed
-6.1-upstream-stable: needed
-5.10-upstream-stable: needed
-4.19-upstream-stable: needed
+upstream: released (6.9-rc1) [ad25ee36f00172f7d53242dc77c69fff7ced0755]
+6.1-upstream-stable: released (6.1.83) [90f089d77e38db1c48629f111f3c8c336be1bc38]
+5.10-upstream-stable: released (5.10.214) [e1dc7aa814a95aeeb1b2c05be2b62af8423b15cc]
+4.19-upstream-stable: released (4.19.311) [0cd3b0a1dc987697cba1fe93c784365aa1f8a230]
sid: needed
6.1-bookworm-security: needed
5.10-bullseye-security: needed
diff --git a/active/CVE-2024-22099 b/active/CVE-2024-22099
index 2f933436..0e277163 100644
--- a/active/CVE-2024-22099
+++ b/active/CVE-2024-22099
@@ -10,12 +10,13 @@ Notes:
carnil> v2.6.12-rc2." and gives an indication on affected ranges from
carnil> v2.6.12-rc2 before v6.8-rc1. The OpenAnolis issue is to date
carnil> (2024-01-25) still restricted.
+ carnil> Fixed in 6.7.11 as well.
Bugs:
upstream: released (6.8-rc7) [2535b848fa0f42ddff3e5255cf5e742c9b77bb26]
-6.1-upstream-stable:
-5.10-upstream-stable:
-4.19-upstream-stable:
-sid:
-6.1-bookworm-security:
-5.10-bullseye-security:
-4.19-buster-security:
+6.1-upstream-stable: released (6.1.83) [567c0411dc3b424fc7bd1e6109726d7ba32d4f73]
+5.10-upstream-stable: released (5.10.214) [81d7d920a22fd58ef9aedb1bd0a68ee32bd23e96]
+4.19-upstream-stable: released (4.19.311) [369f419c097e82407dd429a202cde9a73d3ae29b]
+sid: needed
+6.1-bookworm-security: needed
+5.10-bullseye-security: needed
+4.19-buster-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy