summaryrefslogtreecommitdiffstats
path: root/active/CVE-2024-26581
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2024-03-02 09:04:09 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2024-03-02 09:04:09 +0100
commit1ed93094a2d7706459c3f262cf45830849253aba (patch)
tree56d70dee10ba57d9756baf8f61d0a24c33a131de /active/CVE-2024-26581
parentcfe5f650c4c0782672d2e5d39dfa399c9f46a610 (diff)
Track fixes in 6.7.7-1 upload to unstable
Diffstat (limited to 'active/CVE-2024-26581')
-rw-r--r--active/CVE-2024-2658113
1 files changed, 6 insertions, 7 deletions
diff --git a/active/CVE-2024-26581 b/active/CVE-2024-26581
index 118bafdc..ce373b3a 100644
--- a/active/CVE-2024-26581
+++ b/active/CVE-2024-26581
@@ -1,17 +1,16 @@
Description: netfilter: nft_set_rbtree: skip end interval element from gc
References:
- https://lore.kernel.org/linux-cve-announce/2024022024-uniquely-recluse-d893@gregkh/
Notes:
- carnil> Issue introduced with f718863aca46 ("netfilter: nft_set_rbtree:
- carnil> fix overlap expiration walk") in 6.5-rc4 (and backported to
- carnil> 6.4.8, 6.1.43, 5.10.190).
- carnil> For 6.6.y fixed in 6.6.17.
+ carnil> Introduced in f718863aca46 ("netfilter: nft_set_rbtree: fix overlap expiration
+ carnil> walk"). Vulnerable versions: 5.4.262 5.10.190 5.15.124 6.1.43 6.4.8 6.5-rc4.
Bugs:
upstream: released (6.8-rc4) [60c0c230c6f046da536d3df8b39a20b9a9fd6af0]
+6.7-upstream-stable: released (6.7.5) [6eb14441f10602fa1cf691da9d685718b68b78a9]
+6.6-upstream-stable: released (6.6.17) [b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7]
6.1-upstream-stable: released (6.1.78) [1296c110c5a0b45a8fcf58e7d18bc5da61a565cb]
-5.10-upstream-stable: released (5.10.210)
+5.10-upstream-stable: released (5.10.210) [4cee42fcf54fec46b344681e7cc4f234bb22f85a]
4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: needed
+sid: released (6.7.7-1)
6.1-bookworm-security: needed
5.10-bullseye-security: needed
4.19-buster-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy