diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2024-03-12 16:35:03 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2024-03-12 16:35:55 +0100 |
commit | 5ef56db6a211dce1c0374cc975c192ddc07ba10d (patch) | |
tree | 249d15e8be84a9dd645ffb7efdff1842031b06a0 | |
parent | b9197d70fcc83bdbdde0e8d6399f34daeafb7ca5 (diff) |
Remove CVE-2024-26613 as it was rejected
-rw-r--r-- | active/CVE-2024-23849 | 1 | ||||
-rw-r--r-- | active/CVE-2024-26613 | 17 |
2 files changed, 0 insertions, 18 deletions
diff --git a/active/CVE-2024-23849 b/active/CVE-2024-23849 index e9323aa1..451ade01 100644 --- a/active/CVE-2024-23849 +++ b/active/CVE-2024-23849 @@ -6,7 +6,6 @@ Notes: carnil> For 6.7.y fixed as well in 6.7.3. carnil> Issue introduced with 3289025aedc0 ("RDS: add receive message carnil> trace used by application"). - bwh> Duplicate of CVE-2024-26613. Bugs: upstream: released (6.8-rc2) [13e788deb7348cc88df34bed736c3b3b9927ea52] 6.1-upstream-stable: released (6.1.76) [71024928b3f71ce4529426f8692943205c58d30b] diff --git a/active/CVE-2024-26613 b/active/CVE-2024-26613 deleted file mode 100644 index a3ca1e96..00000000 --- a/active/CVE-2024-26613 +++ /dev/null @@ -1,17 +0,0 @@ -Description: net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv -References: -Notes: - carnil> Introduced in 3289025aedc0 ("RDS: add receive message trace used by - carnil> application"). Vulnerable versions: 4.11-rc1. - bwh> Duplicate of CVE-2024-23849. -Bugs: -upstream: released (6.8-rc2) [13e788deb7348cc88df34bed736c3b3b9927ea52] -6.7-upstream-stable: released (6.7.3) [0b787c2dea15e7a2828fa3a74a5447df4ed57711] -6.6-upstream-stable: released (6.6.15) [7a73190ea557e7f26914b0fe04c1f57a96cb771f] -6.1-upstream-stable: released (6.1.76) [71024928b3f71ce4529426f8692943205c58d30b] -5.10-upstream-stable: released (5.10.210) [5ae8d50044633306ff160fcf7faa24994175efe1] -4.19-upstream-stable: released (4.19.307) [344350bfa3b4b37d7c3d5a00536e6fbf0e953fbf] -sid: released (6.6.15-1) -6.1-bookworm-security: released (6.1.76-1) -5.10-bullseye-security: needed -4.19-buster-security: pending (4.19.309-1) |