Dear Debian Kernel/Security Team,
I hope you're doing well. My name is Subhash, and I'm from the Qualys Security Research Team. I am examining the Debian security tracker entries (https://security-tracker.debian.org/tracker/CVE-xxxx-xxxx),
which lists the Linux version as X.YY.ZZ-N as the fixed version. However, when reviewing the current source package listing at
https://packages.debian.org/source/trixie/linux, I see the latest version is
A.BB.CC-N, while various subpackages have mixed versions. For Example-
The Debian security tracker entry (https://security-tracker.debian.org/tracker/CVE-2024-57976),
which lists the Linux version as 6.12.37-1 as the fixed version. However, when reviewing the current source package listing at
https://packages.debian.org/source/trixie/linux, I see the latest version is
6.12.48-1, while various subpackages have mixed versions like ata-modules-6.12.31-armmp-di, ata-modules-6.12.41+deb13-armmp-di,
btrfs-modules-6.12.31-armmp-di, and xfs-modules-6.12.48-powerpc64le-di ..etc. I would like to request clarification on how fixed versions for Linux kernel CVEs map to binary subpackages in Debian. Specifically:
Thank you for your support.
Best regards,
Subhash
Qualys Security Research Team
|