Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8455c9d3 by Moritz Muehlenhoff at 2023-08-17T16:43:11+02:00
add forthcoming bullseye fixes for unimportant kernel issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -7743,6 +7743,7 @@ CVE-2023-35839 (Solon before 2.3.3 allows Deserialization 
of Untrusted Data.)
 CVE-2023-35829 (An issue was discovered in the Linux kernel before 6.3.2. A 
use-after- ...)
        - linux 6.3.7-1 (unimportant)
        [bookworm] - linux 6.1.37-1
+       [bullseye] - linux 5.10.191-1
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/3228cec23b8b29215e18090c6ba635840190993d (6.4-rc1)
        NOTE: Only "exploitable" by removing the module which needs root 
privileges
@@ -7778,6 +7779,7 @@ CVE-2023-35828 (An issue was discovered in the Linux 
kernel before 6.3.2. A use-
        {DLA-3508-1}
        - linux 6.3.7-1 (unimportant)
        [bookworm] - linux 6.1.37-1
+       [bullseye] - linux 5.10.191-1
        NOTE: 
https://git.kernel.org/linus/2b947f8769be8b8181dc795fd292d3e7120f5204 (6.4-rc1)
        NOTE: USB_RENESAS_USB3 not enabled in Debian
        NOTE: Only "exploitable" by removing the module which needs root 
privileges
@@ -7797,12 +7799,14 @@ CVE-2023-35824 (An issue was discovered in the Linux 
kernel before 6.3.2. A use-
        {DLA-3508-1}
        - linux 6.3.7-1 (unimportant)
        [bookworm] - linux 6.1.37-1
+       [bullseye] - linux 5.10.191-1
        NOTE: 
https://git.kernel.org/linus/5abda7a16698d4d1f47af1168d8fa2c640116b4a (6.4-rc1)
        NOTE: Only "exploitable" by removing the module which needs root 
privileges
 CVE-2023-35823 (An issue was discovered in the Linux kernel before 6.3.2. A 
use-after- ...)
        {DLA-3508-1}
        - linux 6.3.7-1 (unimportant)
        [bookworm] - linux 6.1.37-1
+       [bullseye] - linux 5.10.191-1
        NOTE: 
https://git.kernel.org/linus/30cf57da176cca80f11df0d9b7f71581fe601389 (6.4-rc1)
        NOTE: Only "exploitable" by removing the module which needs root 
privileges
 CVE-2023-35005 (In Apache Airflow, some potentially sensitive values were 
being shown  ...)
@@ -9756,6 +9760,7 @@ CVE-2023-34256 (An issue was discovered in the Linux 
kernel before 6.3.3. There
        {DLA-3508-1}
        - linux 6.3.7-1 (unimportant)
        [bookworm] - linux 6.1.37-1
+       [bullseye] - linux 5.10.191-1
        NOTE: 
https://git.kernel.org/linus/4f04351888a83e595571de672e0a4a8b74f4fb31 (6.4-rc2)
        NOTE: Exploitable only when modifying block device while beeing mounted.
 CVE-2023-34255



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8455c9d371835ab0290236cb6bf84db3d07536cb

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8455c9d371835ab0290236cb6bf84db3d07536cb
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to