summaryrefslogtreecommitdiffstats
path: root/data/next-point-update.txt
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2024-04-01 09:45:47 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2024-04-01 09:45:47 +0200
commit8c5f9daffed324f576b71931626b8580eaec26e6 (patch)
treeb614902e988c9aad5337d4b99dc9981833f7734e /data/next-point-update.txt
parentaee107354db702823b596f0f597f260a4273a9ec (diff)
Track pending linux fixes via bookworm-pu
Diffstat (limited to 'data/next-point-update.txt')
-rw-r--r--data/next-point-update.txt120
1 files changed, 120 insertions, 0 deletions
diff --git a/data/next-point-update.txt b/data/next-point-update.txt
index 8c269e7df1..5c5202f1fd 100644
--- a/data/next-point-update.txt
+++ b/data/next-point-update.txt
@@ -94,3 +94,123 @@ CVE-2023-22655
[bookworm] - intel-microcode 3.20240312.1~deb12u1
CVE-2023-43490
[bookworm] - intel-microcode 3.20240312.1~deb12u1
+CVE-2023-2176
+ [bookworm] - linux 6.1.82-1
+CVE-2023-28746
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52429
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52434
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52435
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52583
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52584
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52587
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52588
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52589
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52593
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52594
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52595
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52597
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52598
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52599
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52600
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52601
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52602
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52603
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52604
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52606
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52607
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52616
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52617
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52618
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52619
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52620
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52621
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52622
+ [bookworm] - linux 6.1.82-1
+CVE-2023-52623
+ [bookworm] - linux 6.1.82-1
+CVE-2023-6270
+ [bookworm] - linux 6.1.82-1
+CVE-2023-7042
+ [bookworm] - linux 6.1.82-1
+CVE-2024-0340
+ [bookworm] - linux 6.1.82-1
+CVE-2024-0841
+ [bookworm] - linux 6.1.82-1
+CVE-2024-1151
+ [bookworm] - linux 6.1.82-1
+CVE-2024-22099
+ [bookworm] - linux 6.1.82-1
+CVE-2024-23850
+ [bookworm] - linux 6.1.82-1
+CVE-2024-23851
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26581
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26582
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26583
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26586
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26590
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26593
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26600
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26601
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26602
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26603
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26606
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26621
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26622
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26625
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26626
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26627
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26629
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26639
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26640
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26641
+ [bookworm] - linux 6.1.82-1
+CVE-2024-26651
+ [bookworm] - linux 6.1.82-1

© 2014-2024 Faster IT GmbH | imprint | privacy policy