summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2024-03-12 16:35:03 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2024-03-12 16:35:55 +0100
commit5ef56db6a211dce1c0374cc975c192ddc07ba10d (patch)
tree249d15e8be84a9dd645ffb7efdff1842031b06a0
parentb9197d70fcc83bdbdde0e8d6399f34daeafb7ca5 (diff)
Remove CVE-2024-26613 as it was rejected
-rw-r--r--active/CVE-2024-238491
-rw-r--r--active/CVE-2024-2661317
2 files changed, 0 insertions, 18 deletions
diff --git a/active/CVE-2024-23849 b/active/CVE-2024-23849
index e9323aa1..451ade01 100644
--- a/active/CVE-2024-23849
+++ b/active/CVE-2024-23849
@@ -6,7 +6,6 @@ Notes:
carnil> For 6.7.y fixed as well in 6.7.3.
carnil> Issue introduced with 3289025aedc0 ("RDS: add receive message
carnil> trace used by application").
- bwh> Duplicate of CVE-2024-26613.
Bugs:
upstream: released (6.8-rc2) [13e788deb7348cc88df34bed736c3b3b9927ea52]
6.1-upstream-stable: released (6.1.76) [71024928b3f71ce4529426f8692943205c58d30b]
diff --git a/active/CVE-2024-26613 b/active/CVE-2024-26613
deleted file mode 100644
index a3ca1e96..00000000
--- a/active/CVE-2024-26613
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv
-References:
-Notes:
- carnil> Introduced in 3289025aedc0 ("RDS: add receive message trace used by
- carnil> application"). Vulnerable versions: 4.11-rc1.
- bwh> Duplicate of CVE-2024-23849.
-Bugs:
-upstream: released (6.8-rc2) [13e788deb7348cc88df34bed736c3b3b9927ea52]
-6.7-upstream-stable: released (6.7.3) [0b787c2dea15e7a2828fa3a74a5447df4ed57711]
-6.6-upstream-stable: released (6.6.15) [7a73190ea557e7f26914b0fe04c1f57a96cb771f]
-6.1-upstream-stable: released (6.1.76) [71024928b3f71ce4529426f8692943205c58d30b]
-5.10-upstream-stable: released (5.10.210) [5ae8d50044633306ff160fcf7faa24994175efe1]
-4.19-upstream-stable: released (4.19.307) [344350bfa3b4b37d7c3d5a00536e6fbf0e953fbf]
-sid: released (6.6.15-1)
-6.1-bookworm-security: released (6.1.76-1)
-5.10-bullseye-security: needed
-4.19-buster-security: pending (4.19.309-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy