From 5ef56db6a211dce1c0374cc975c192ddc07ba10d Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Tue, 12 Mar 2024 16:35:03 +0100 Subject: Remove CVE-2024-26613 as it was rejected --- active/CVE-2024-23849 | 1 - active/CVE-2024-26613 | 17 ----------------- 2 files changed, 18 deletions(-) delete mode 100644 active/CVE-2024-26613 diff --git a/active/CVE-2024-23849 b/active/CVE-2024-23849 index e9323aa1..451ade01 100644 --- a/active/CVE-2024-23849 +++ b/active/CVE-2024-23849 @@ -6,7 +6,6 @@ Notes: carnil> For 6.7.y fixed as well in 6.7.3. carnil> Issue introduced with 3289025aedc0 ("RDS: add receive message carnil> trace used by application"). - bwh> Duplicate of CVE-2024-26613. Bugs: upstream: released (6.8-rc2) [13e788deb7348cc88df34bed736c3b3b9927ea52] 6.1-upstream-stable: released (6.1.76) [71024928b3f71ce4529426f8692943205c58d30b] diff --git a/active/CVE-2024-26613 b/active/CVE-2024-26613 deleted file mode 100644 index a3ca1e96..00000000 --- a/active/CVE-2024-26613 +++ /dev/null @@ -1,17 +0,0 @@ -Description: net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv -References: -Notes: - carnil> Introduced in 3289025aedc0 ("RDS: add receive message trace used by - carnil> application"). Vulnerable versions: 4.11-rc1. - bwh> Duplicate of CVE-2024-23849. -Bugs: -upstream: released (6.8-rc2) [13e788deb7348cc88df34bed736c3b3b9927ea52] -6.7-upstream-stable: released (6.7.3) [0b787c2dea15e7a2828fa3a74a5447df4ed57711] -6.6-upstream-stable: released (6.6.15) [7a73190ea557e7f26914b0fe04c1f57a96cb771f] -6.1-upstream-stable: released (6.1.76) [71024928b3f71ce4529426f8692943205c58d30b] -5.10-upstream-stable: released (5.10.210) [5ae8d50044633306ff160fcf7faa24994175efe1] -4.19-upstream-stable: released (4.19.307) [344350bfa3b4b37d7c3d5a00536e6fbf0e953fbf] -sid: released (6.6.15-1) -6.1-bookworm-security: released (6.1.76-1) -5.10-bullseye-security: needed -4.19-buster-security: pending (4.19.309-1) -- cgit v1.2.3