diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2024-05-02 15:59:27 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2024-05-02 15:59:27 +0200 |
commit | 0b5384104440e0fff45e3d7cfa6a341f3e842129 (patch) | |
tree | 88def66f1de4447519007366591f2f648fed81b1 /active | |
parent | bcce47f6eaa1770d877fcd92df311b9a5efee54f (diff) |
Update status for CVE-2023-7042 and CVE-2023-52651
CVE-2023-52651 is a duplicate of CVE-2023-7042.
Diffstat (limited to 'active')
-rw-r--r-- | active/CVE-2023-52651 | 16 | ||||
-rw-r--r-- | active/CVE-2023-7042 | 2 |
2 files changed, 1 insertions, 17 deletions
diff --git a/active/CVE-2023-52651 b/active/CVE-2023-52651 deleted file mode 100644 index 354453a6..00000000 --- a/active/CVE-2023-52651 +++ /dev/null @@ -1,16 +0,0 @@ -Description: wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() -References: -Notes: - carnil> Introduced in dc405152bb64 ("ath10k: handle mgmt tx completion event"). - carnil> Vulnerable versions: 4.19-rc1. -Bugs: -upstream: released (6.9-rc1) [ad25ee36f00172f7d53242dc77c69fff7ced0755] -6.8-upstream-stable: released (6.8.2) [835c5d37f4b0ba99e9ec285ffa645bc532714191] -6.6-upstream-stable: released (6.6.23) [10a342fa2fe4c4dd22f2c8fe917d3b1929582076] -6.1-upstream-stable: released (6.1.83) [90f089d77e38db1c48629f111f3c8c336be1bc38] -5.10-upstream-stable: released (5.10.214) [e1dc7aa814a95aeeb1b2c05be2b62af8423b15cc] -4.19-upstream-stable: released (4.19.311) [0cd3b0a1dc987697cba1fe93c784365aa1f8a230] -sid: released (6.7.12-1) -6.1-bookworm-security: released (6.1.85-1) -5.10-bullseye-security: needed -4.19-buster-security: needed diff --git a/active/CVE-2023-7042 b/active/CVE-2023-7042 index b42529e8..e21acee7 100644 --- a/active/CVE-2023-7042 +++ b/active/CVE-2023-7042 @@ -12,7 +12,7 @@ upstream: released (6.9-rc1) [ad25ee36f00172f7d53242dc77c69fff7ced0755] 6.1-upstream-stable: released (6.1.83) [90f089d77e38db1c48629f111f3c8c336be1bc38] 5.10-upstream-stable: released (5.10.214) [e1dc7aa814a95aeeb1b2c05be2b62af8423b15cc] 4.19-upstream-stable: released (4.19.311) [0cd3b0a1dc987697cba1fe93c784365aa1f8a230] -sid: needed +sid: released (6.7.12-1) 6.1-bookworm-security: released (6.1.82-1) [bugfix/all/wifi-ath10k-fix-NULL-pointer-dereference-in-ath10k_w.patch] 5.10-bullseye-security: needed 4.19-buster-security: needed |