aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-02-13 10:34:16 +0100
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-02-13 10:34:16 +0100
commit7e744715acae0028ecb8644a39f48c2b60a622d2 (patch)
tree7375a25ca0cdfa1148e3bf0cf1c5e8eac9b33f86
parent8e0ac3eeb2f2f64b5e5b2c599aefd32548ae310e (diff)
downloadvulns-7e744715acae0028ecb8644a39f48c2b60a622d2.tar.gz
cve entries: update mbox files
based on latest output of bippy Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--cve/published/2021/CVE-2021-47181.mbox13
-rw-r--r--cve/published/2023/CVE-2023-1851.mbox13
-rw-r--r--cve/published/2023/CVE-2023-21657.mbox13
-rw-r--r--cve/published/2023/CVE-2023-21658.mbox13
-rw-r--r--cve/published/2023/CVE-2023-21659.mbox13
-rw-r--r--cve/published/2024/CVE-2024-0052.mbox13
-rw-r--r--cve/published/2024/CVE-2024-20607.mbox13
7 files changed, 77 insertions, 14 deletions
diff --git a/cve/published/2021/CVE-2021-47181.mbox b/cve/published/2021/CVE-2021-47181.mbox
index 20bd7adf..04daf32b 100644
--- a/cve/published/2021/CVE-2021-47181.mbox
+++ b/cve/published/2021/CVE-2021-47181.mbox
@@ -1,5 +1,5 @@
-From bippy-e2c21c5ac1c5 Mon Sep 17 00:00:00 2001
-From: Greg KH <gregkh@linuxfoundation.org>
+From bippy-051f05fb45b6 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>
Subject: CVE-2021-47181: USB: gadget: bRequestType is a bitfield, not a enum
@@ -31,6 +31,15 @@ Affected versions
Issue introduced in 5.10.85 and fixed in 5.10.88
Issue introduced in 5.15.8 and fixed in 5.15.11
+Please note that only supported kernel versions have fixes applied to
+them. For a full list of currently supported kernel versions, please
+see https://www.kernel.org/
+
+Unaffected versions might change over time as fixes are backported to
+older supported kernel versions. The official CVE entry at
+ https://cve.org/CVERecord/?id=CVE-2021-47181
+will be updated if fixes are backported, please check that for the most
+up to date information about this issue.
Mitigation
==========
diff --git a/cve/published/2023/CVE-2023-1851.mbox b/cve/published/2023/CVE-2023-1851.mbox
index 544af21d..a2d2d6de 100644
--- a/cve/published/2023/CVE-2023-1851.mbox
+++ b/cve/published/2023/CVE-2023-1851.mbox
@@ -1,5 +1,5 @@
-From bippy-e2c21c5ac1c5 Mon Sep 17 00:00:00 2001
-From: Greg KH <gregkh@linuxfoundation.org>
+From bippy-051f05fb45b6 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>
Subject: CVE-2023-1851: nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local
@@ -52,6 +52,15 @@ Affected versions
Issue introduced in 3.6 and fixed in 6.6.11
Issue introduced in 3.6 and fixed in 6.7
+Please note that only supported kernel versions have fixes applied to
+them. For a full list of currently supported kernel versions, please
+see https://www.kernel.org/
+
+Unaffected versions might change over time as fixes are backported to
+older supported kernel versions. The official CVE entry at
+ https://cve.org/CVERecord/?id=CVE-2023-1851
+will be updated if fixes are backported, please check that for the most
+up to date information about this issue.
Mitigation
==========
diff --git a/cve/published/2023/CVE-2023-21657.mbox b/cve/published/2023/CVE-2023-21657.mbox
index 875aab2f..40adf9a5 100644
--- a/cve/published/2023/CVE-2023-21657.mbox
+++ b/cve/published/2023/CVE-2023-21657.mbox
@@ -1,5 +1,5 @@
-From bippy-e2c21c5ac1c5 Mon Sep 17 00:00:00 2001
-From: Greg KH <gregkh@linuxfoundation.org>
+From bippy-051f05fb45b6 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>
Subject: CVE-2023-21657: kvm: initialize all of the kvm_debugregs structure before sending it to userspace
@@ -32,6 +32,15 @@ Affected versions
Fixed in 6.1.13
Fixed in 6.2
+Please note that only supported kernel versions have fixes applied to
+them. For a full list of currently supported kernel versions, please
+see https://www.kernel.org/
+
+Unaffected versions might change over time as fixes are backported to
+older supported kernel versions. The official CVE entry at
+ https://cve.org/CVERecord/?id=CVE-2023-21657
+will be updated if fixes are backported, please check that for the most
+up to date information about this issue.
Mitigation
==========
diff --git a/cve/published/2023/CVE-2023-21658.mbox b/cve/published/2023/CVE-2023-21658.mbox
index d7ef6c6b..05e2cf5c 100644
--- a/cve/published/2023/CVE-2023-21658.mbox
+++ b/cve/published/2023/CVE-2023-21658.mbox
@@ -1,5 +1,5 @@
-From bippy-e2c21c5ac1c5 Mon Sep 17 00:00:00 2001
-From: Greg KH <gregkh@linuxfoundation.org>
+From bippy-051f05fb45b6 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>
Subject: CVE-2023-21658: memstick: fix memory leak if card device is never registered
@@ -34,6 +34,15 @@ Affected versions
Issue introduced in 2.6.29 and fixed in 6.2.13
Issue introduced in 2.6.29 and fixed in 6.3
+Please note that only supported kernel versions have fixes applied to
+them. For a full list of currently supported kernel versions, please
+see https://www.kernel.org/
+
+Unaffected versions might change over time as fixes are backported to
+older supported kernel versions. The official CVE entry at
+ https://cve.org/CVERecord/?id=CVE-2023-21658
+will be updated if fixes are backported, please check that for the most
+up to date information about this issue.
Mitigation
==========
diff --git a/cve/published/2023/CVE-2023-21659.mbox b/cve/published/2023/CVE-2023-21659.mbox
index 1e978286..fb72e370 100644
--- a/cve/published/2023/CVE-2023-21659.mbox
+++ b/cve/published/2023/CVE-2023-21659.mbox
@@ -1,5 +1,5 @@
-From bippy-e2c21c5ac1c5 Mon Sep 17 00:00:00 2001
-From: Greg KH <gregkh@linuxfoundation.org>
+From bippy-051f05fb45b6 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>
Subject: CVE-2023-21659: fs: sysfs_emit_at: Remove PAGE_SIZE alignment check
@@ -48,6 +48,15 @@ Affected versions
Issue introduced in 4.19.179 and fixed in 4.19.279
+Please note that only supported kernel versions have fixes applied to
+them. For a full list of currently supported kernel versions, please
+see https://www.kernel.org/
+
+Unaffected versions might change over time as fixes are backported to
+older supported kernel versions. The official CVE entry at
+ https://cve.org/CVERecord/?id=CVE-2023-21659
+will be updated if fixes are backported, please check that for the most
+up to date information about this issue.
Mitigation
==========
diff --git a/cve/published/2024/CVE-2024-0052.mbox b/cve/published/2024/CVE-2024-0052.mbox
index 240ad6b0..5cdd0cb8 100644
--- a/cve/published/2024/CVE-2024-0052.mbox
+++ b/cve/published/2024/CVE-2024-0052.mbox
@@ -1,5 +1,5 @@
-From bippy-e2c21c5ac1c5 Mon Sep 17 00:00:00 2001
-From: Greg KH <gregkh@linuxfoundation.org>
+From bippy-051f05fb45b6 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>
Subject: CVE-2024-0052: mm/memory_hotplug: fix memmap_on_memory sysfs value retrieval
@@ -29,6 +29,15 @@ Affected versions
Issue introduced in 6.6 and fixed in 6.6.13
Issue introduced in 6.6 and fixed in 6.7.1
+Please note that only supported kernel versions have fixes applied to
+them. For a full list of currently supported kernel versions, please
+see https://www.kernel.org/
+
+Unaffected versions might change over time as fixes are backported to
+older supported kernel versions. The official CVE entry at
+ https://cve.org/CVERecord/?id=CVE-2024-0052
+will be updated if fixes are backported, please check that for the most
+up to date information about this issue.
Mitigation
==========
diff --git a/cve/published/2024/CVE-2024-20607.mbox b/cve/published/2024/CVE-2024-20607.mbox
index 7dbf8c99..8bb62e5c 100644
--- a/cve/published/2024/CVE-2024-20607.mbox
+++ b/cve/published/2024/CVE-2024-20607.mbox
@@ -1,5 +1,5 @@
-From bippy-e2c21c5ac1c5 Mon Sep 17 00:00:00 2001
-From: Greg KH <gregkh@linuxfoundation.org>
+From bippy-051f05fb45b6 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>
Subject: CVE-2024-20607: pds_core: Prevent health thread from running during reset/remove
@@ -25,6 +25,15 @@ Affected versions
Issue introduced in 6.7 and fixed in 6.7.4
+Please note that only supported kernel versions have fixes applied to
+them. For a full list of currently supported kernel versions, please
+see https://www.kernel.org/
+
+Unaffected versions might change over time as fixes are backported to
+older supported kernel versions. The official CVE entry at
+ https://cve.org/CVERecord/?id=CVE-2024-20607
+will be updated if fixes are backported, please check that for the most
+up to date information about this issue.
Mitigation
==========