diff options
author | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-04-04 20:03:07 +0200 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-04-04 20:03:07 +0200 |
commit | 3ba74932771580d76e92446ae04dfea3692ebe17 (patch) | |
tree | f41c7dc8a6bf3ae94a8ce4005225fe1187eafd3f | |
parent | d6ac1e685cca769c12038d3b929442658c52fbf1 (diff) | |
download | vulns-3ba74932771580d76e92446ae04dfea3692ebe17.tar.gz |
cve: update json files with some updated git ids
Now that bippy can handle json data a bit better, as per the last
commit, update all relevent cve records for the json information and
push out new updates to cve.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
50 files changed, 358 insertions, 172 deletions
diff --git a/cve/published/2019/CVE-2019-25160.json b/cve/published/2019/CVE-2019-25160.json index a2954847..18afcf92 100644 --- a/cve/published/2019/CVE-2019-25160.json +++ b/cve/published/2019/CVE-2019-25160.json @@ -18,49 +18,49 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "3faa8f982f95", + "version": "446fda4f2682", "lessThan": "97bc3683c249", "status": "affected", "versionType": "git" }, { - "version": "3faa8f982f95", + "version": "446fda4f2682", "lessThan": "c61d01faa555", "status": "affected", "versionType": "git" }, { - "version": "3faa8f982f95", + "version": "446fda4f2682", "lessThan": "dc18101f95fa", "status": "affected", "versionType": "git" }, { - "version": "3faa8f982f95", + "version": "446fda4f2682", "lessThan": "1c973f9c7cc2", "status": "affected", "versionType": "git" }, { - "version": "3faa8f982f95", + "version": "446fda4f2682", "lessThan": "fcfe700acdc1", "status": "affected", "versionType": "git" }, { - "version": "3faa8f982f95", + "version": "446fda4f2682", "lessThan": "e3713abc4248", "status": "affected", "versionType": "git" }, { - "version": "3faa8f982f95", + "version": "446fda4f2682", "lessThan": "fbf9578919d6", "status": "affected", "versionType": "git" }, { - "version": "3faa8f982f95", + "version": "446fda4f2682", "lessThan": "5578de4834fe", "status": "affected", "versionType": "git" @@ -162,7 +162,7 @@ ], "title": "netlabel: fix out-of-bounds memory accesses", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2020/CVE-2020-36787.json b/cve/published/2020/CVE-2020-36787.json index 0d685c20..3016fc08 100644 --- a/cve/published/2020/CVE-2020-36787.json +++ b/cve/published/2020/CVE-2020-36787.json @@ -18,31 +18,31 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "d3d04f6c330a", + "version": "d2b4387f3bdf", "lessThan": "1dc1d30ac101", "status": "affected", "versionType": "git" }, { - "version": "d3d04f6c330a", + "version": "d2b4387f3bdf", "lessThan": "a59d01384c80", "status": "affected", "versionType": "git" }, { - "version": "d3d04f6c330a", + "version": "d2b4387f3bdf", "lessThan": "2964c37563e8", "status": "affected", "versionType": "git" }, { - "version": "d3d04f6c330a", + "version": "d2b4387f3bdf", "lessThan": "75321dc8aebe", "status": "affected", "versionType": "git" }, { - "version": "d3d04f6c330a", + "version": "d2b4387f3bdf", "lessThan": "3536169f8531", "status": "affected", "versionType": "git" @@ -117,7 +117,7 @@ ], "title": "media: aspeed: fix clock handling logic", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-46905.json b/cve/published/2021/CVE-2021-46905.json index 84815f31..5f2927a0 100644 --- a/cve/published/2021/CVE-2021-46905.json +++ b/cve/published/2021/CVE-2021-46905.json @@ -18,6 +18,24 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "a462067d7c8e", + "lessThan": "5871761c5f0f", + "status": "affected", + "versionType": "git" + }, + { + "version": "145c89c441d2", + "lessThan": "0c71d4c89559", + "status": "affected", + "versionType": "git" + }, + { + "version": "caf5ac93b3b5", + "lessThan": "24b699bea755", + "status": "affected", + "versionType": "git" + }, + { "version": "92028d7a31e5", "lessThan": "5c17cfe155d2", "status": "affected", @@ -141,7 +159,7 @@ ], "title": "net: hso: fix NULL-deref on disconnect regression", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-46915.json b/cve/published/2021/CVE-2021-46915.json index a1bd7057..68c4e7c0 100644 --- a/cve/published/2021/CVE-2021-46915.json +++ b/cve/published/2021/CVE-2021-46915.json @@ -18,37 +18,37 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "3e0f64b7dd31", + "version": "c26844eda9d4", "lessThan": "9065ccb9ec92", "status": "affected", "versionType": "git" }, { - "version": "3e0f64b7dd31", + "version": "c26844eda9d4", "lessThan": "fadd3c4afdf3", "status": "affected", "versionType": "git" }, { - "version": "3e0f64b7dd31", + "version": "c26844eda9d4", "lessThan": "01fb1626b620", "status": "affected", "versionType": "git" }, { - "version": "3e0f64b7dd31", + "version": "c26844eda9d4", "lessThan": "dc1732baa9da", "status": "affected", "versionType": "git" }, { - "version": "3e0f64b7dd31", + "version": "c26844eda9d4", "lessThan": "1bb3ee425993", "status": "affected", "versionType": "git" }, { - "version": "3e0f64b7dd31", + "version": "c26844eda9d4", "lessThan": "b895bdf5d643", "status": "affected", "versionType": "git" @@ -132,7 +132,7 @@ ], "title": "netfilter: nft_limit: avoid possible divide error in nft_limit_init", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-46922.json b/cve/published/2021/CVE-2021-46922.json index d3c96cc0..eb3a0db2 100644 --- a/cve/published/2021/CVE-2021-46922.json +++ b/cve/published/2021/CVE-2021-46922.json @@ -28,6 +28,12 @@ "lessThan": "39c8d760d44c", "status": "affected", "versionType": "git" + }, + { + "version": "8c657a0590de", + "lessThan": "9d5171eab462", + "status": "affected", + "versionType": "git" } ] }, @@ -65,7 +71,7 @@ ], "title": "KEYS: trusted: Fix TPM reservation for seal/unseal", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-46959.json b/cve/published/2021/CVE-2021-46959.json index 17e06ac8..4f83f52d 100644 --- a/cve/published/2021/CVE-2021-46959.json +++ b/cve/published/2021/CVE-2021-46959.json @@ -18,31 +18,31 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "0713aa02f20d", + "version": "a4add022c155", "lessThan": "62bb2c7f2411", "status": "affected", "versionType": "git" }, { - "version": "2be1837b1737", + "version": "0870525cf94b", "lessThan": "8bf96425c90f", "status": "affected", "versionType": "git" }, { - "version": "e620a73d7ca7", + "version": "8c45a1c6c951", "lessThan": "8e029707f50a", "status": "affected", "versionType": "git" }, { - "version": "c886774bf583", + "version": "234b432c7b61", "lessThan": "28a5529068c5", "status": "affected", "versionType": "git" }, { - "version": "2737549129ec", + "version": "3e04a4976add", "lessThan": "001c8e83646a", "status": "affected", "versionType": "git" @@ -177,7 +177,7 @@ ], "title": "spi: Fix use-after-free with devm_spi_alloc_*", "x_generator": { - "engine": "bippy-851b3ed3d212" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-46961.json b/cve/published/2021/CVE-2021-46961.json index 5170531e..d43d45da 100644 --- a/cve/published/2021/CVE-2021-46961.json +++ b/cve/published/2021/CVE-2021-46961.json @@ -18,31 +18,31 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "", + "version": "3f1f3234bc2d", "lessThan": "e7ea8e46e3b7", "status": "affected", "versionType": "git" }, { - "version": "", + "version": "3f1f3234bc2d", "lessThan": "7be4db5c2b59", "status": "affected", "versionType": "git" }, { - "version": "", + "version": "3f1f3234bc2d", "lessThan": "ea817ac1014c", "status": "affected", "versionType": "git" }, { - "version": "", + "version": "3f1f3234bc2d", "lessThan": "3f72d3709f53", "status": "affected", "versionType": "git" }, { - "version": "", + "version": "3f1f3234bc2d", "lessThan": "a97709f563a0", "status": "affected", "versionType": "git" @@ -117,7 +117,7 @@ ], "title": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups", "x_generator": { - "engine": "bippy-1e70cc10feda" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-46974.json b/cve/published/2021/CVE-2021-46974.json index d2e7c5fe..0f377f5d 100644 --- a/cve/published/2021/CVE-2021-46974.json +++ b/cve/published/2021/CVE-2021-46974.json @@ -18,13 +18,13 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "12462c88e6e2", + "version": "ae03b6b1c880", "lessThan": "4d542ddb88fb", "status": "affected", "versionType": "git" }, { - "version": "eed84f94ff8d", + "version": "f92a819b4cbe", "lessThan": "0e2dfdc74a7f", "status": "affected", "versionType": "git" @@ -147,7 +147,7 @@ ], "title": "bpf: Fix masking negation logic upon negative dst register", "x_generator": { - "engine": "bippy-851b3ed3d212" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-47004.json b/cve/published/2021/CVE-2021-47004.json index 25579160..8a9965d2 100644 --- a/cve/published/2021/CVE-2021-47004.json +++ b/cve/published/2021/CVE-2021-47004.json @@ -18,25 +18,25 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "093749e296e2", + "version": "4354994f097d", "lessThan": "105155a8146d", "status": "affected", "versionType": "git" }, { - "version": "093749e296e2", + "version": "4354994f097d", "lessThan": "1e116f87825f", "status": "affected", "versionType": "git" }, { - "version": "093749e296e2", + "version": "4354994f097d", "lessThan": "211372b25715", "status": "affected", "versionType": "git" }, { - "version": "093749e296e2", + "version": "4354994f097d", "lessThan": "61461fc921b7", "status": "affected", "versionType": "git" @@ -102,7 +102,7 @@ ], "title": "f2fs: fix to avoid touching checkpointed data in get_victim()", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-47014.json b/cve/published/2021/CVE-2021-47014.json index 5ff78289..9856552b 100644 --- a/cve/published/2021/CVE-2021-47014.json +++ b/cve/published/2021/CVE-2021-47014.json @@ -18,13 +18,13 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "7baf2429a1a9", + "version": "ae372cb1750f", "lessThan": "0648941f4c8b", "status": "affected", "versionType": "git" }, { - "version": "7baf2429a1a9", + "version": "ae372cb1750f", "lessThan": "f77bd544a6bb", "status": "affected", "versionType": "git" @@ -72,7 +72,7 @@ ], "title": "net/sched: act_ct: fix wild memory access when clearing fragments", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-47016.json b/cve/published/2021/CVE-2021-47016.json index 2a6dc708..071e6976 100644 --- a/cve/published/2021/CVE-2021-47016.json +++ b/cve/published/2021/CVE-2021-47016.json @@ -18,31 +18,31 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "19999a8b8782", + "version": "7529b90d051e", "lessThan": "f6a90818a320", "status": "affected", "versionType": "git" }, { - "version": "19999a8b8782", + "version": "7529b90d051e", "lessThan": "1dfb26df15fc", "status": "affected", "versionType": "git" }, { - "version": "19999a8b8782", + "version": "7529b90d051e", "lessThan": "73fdeb612d25", "status": "affected", "versionType": "git" }, { - "version": "19999a8b8782", + "version": "7529b90d051e", "lessThan": "5d3422516934", "status": "affected", "versionType": "git" }, { - "version": "19999a8b8782", + "version": "7529b90d051e", "lessThan": "43262178c043", "status": "affected", "versionType": "git" @@ -117,7 +117,7 @@ ], "title": "m68k: mvme147,mvme16x: Don't wipe PCC timer config bits", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-47028.json b/cve/published/2021/CVE-2021-47028.json index 91a808dc..c1ba29ff 100644 --- a/cve/published/2021/CVE-2021-47028.json +++ b/cve/published/2021/CVE-2021-47028.json @@ -18,19 +18,19 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "e4c5ead632ff", + "version": "e57b7901469f", "lessThan": "dfc8a71448c7", "status": "affected", "versionType": "git" }, { - "version": "e4c5ead632ff", + "version": "e57b7901469f", "lessThan": "4bd926e5ca88", "status": "affected", "versionType": "git" }, { - "version": "e4c5ead632ff", + "version": "e57b7901469f", "lessThan": "f43b941fd610", "status": "affected", "versionType": "git" @@ -87,7 +87,7 @@ ], "title": "mt76: mt7915: fix txrate reporting", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-47036.json b/cve/published/2021/CVE-2021-47036.json index ad5734a5..16c0d45c 100644 --- a/cve/published/2021/CVE-2021-47036.json +++ b/cve/published/2021/CVE-2021-47036.json @@ -18,13 +18,13 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "36707061d6ba", + "version": "9fd1ff5d2ac7", "lessThan": "450687386cd1", "status": "affected", "versionType": "git" }, { - "version": "36707061d6ba", + "version": "9fd1ff5d2ac7", "lessThan": "18f25dc39990", "status": "affected", "versionType": "git" @@ -72,7 +72,7 @@ ], "title": "udp: skip L4 aggregation for UDP tunnel packets", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-47058.json b/cve/published/2021/CVE-2021-47058.json index 2d01097f..f8b85fba 100644 --- a/cve/published/2021/CVE-2021-47058.json +++ b/cve/published/2021/CVE-2021-47058.json @@ -18,19 +18,19 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "1b8dd2d64ea9", + "version": "5b654b030079", "lessThan": "2dc1554d5f0f", "status": "affected", "versionType": "git" }, { - "version": "6f484096196b", + "version": "480c5e9c7e4c", "lessThan": "d8897f7b2283", "status": "affected", "versionType": "git" }, { - "version": "75e5e51acf59", + "version": "c9698380b01a", "lessThan": "eb949f891226", "status": "affected", "versionType": "git" @@ -132,7 +132,7 @@ ], "title": "regmap: set debugfs_name to NULL after it is freed", "x_generator": { - "engine": "bippy-851b3ed3d212" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-47094.json b/cve/published/2021/CVE-2021-47094.json index 02d4b5e3..04c98586 100644 --- a/cve/published/2021/CVE-2021-47094.json +++ b/cve/published/2021/CVE-2021-47094.json @@ -18,13 +18,13 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "1af4a96025b3", + "version": "faaf05b00aec", "lessThan": "d884eefd75cc", "status": "affected", "versionType": "git" }, { - "version": "1af4a96025b3", + "version": "faaf05b00aec", "lessThan": "3a0f64de479c", "status": "affected", "versionType": "git" @@ -72,7 +72,7 @@ ], "title": "KVM: x86/mmu: Don't advance iterator after restart due to yielding", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-47108.json b/cve/published/2021/CVE-2021-47108.json index a49dfdd2..07a74f4c 100644 --- a/cve/published/2021/CVE-2021-47108.json +++ b/cve/published/2021/CVE-2021-47108.json @@ -18,13 +18,13 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "c91026a938c2", + "version": "41ca9caaae0b", "lessThan": "71d07ebc5000", "status": "affected", "versionType": "git" }, { - "version": "c91026a938c2", + "version": "41ca9caaae0b", "lessThan": "3b8e19a0aa39", "status": "affected", "versionType": "git" @@ -72,7 +72,7 @@ ], "title": "drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-47126.json b/cve/published/2021/CVE-2021-47126.json index 545260c2..e56e1eb5 100644 --- a/cve/published/2021/CVE-2021-47126.json +++ b/cve/published/2021/CVE-2021-47126.json @@ -18,25 +18,25 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "706ec9191646", + "version": "f88d8ea67fbd", "lessThan": "7ba7fa78a92d", "status": "affected", "versionType": "git" }, { - "version": "706ec9191646", + "version": "f88d8ea67fbd", "lessThan": "098702358274", "status": "affected", "versionType": "git" }, { - "version": "706ec9191646", + "version": "f88d8ea67fbd", "lessThan": "0a462e25ef0f", "status": "affected", "versionType": "git" }, { - "version": "706ec9191646", + "version": "f88d8ea67fbd", "lessThan": "821bbf79fe46", "status": "affected", "versionType": "git" @@ -102,7 +102,7 @@ ], "title": "ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions", "x_generator": { - "engine": "bippy-1e70cc10feda" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-47136.json b/cve/published/2021/CVE-2021-47136.json index 5a122e82..543d4ff2 100644 --- a/cve/published/2021/CVE-2021-47136.json +++ b/cve/published/2021/CVE-2021-47136.json @@ -18,19 +18,19 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "d29334c15d33", + "version": "038ebb1a713d", "lessThan": "ac493452e937", "status": "affected", "versionType": "git" }, { - "version": "d29334c15d33", + "version": "038ebb1a713d", "lessThan": "86ab133b695e", "status": "affected", "versionType": "git" }, { - "version": "d29334c15d33", + "version": "038ebb1a713d", "lessThan": "9453d45ecb6c", "status": "affected", "versionType": "git" @@ -87,7 +87,7 @@ ], "title": "net: zero-initialize tc skb extension on allocation", "x_generator": { - "engine": "bippy-b4257b672505" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-47178.json b/cve/published/2021/CVE-2021-47178.json index fa5b046f..f8d4bd2f 100644 --- a/cve/published/2021/CVE-2021-47178.json +++ b/cve/published/2021/CVE-2021-47178.json @@ -18,6 +18,12 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "008b936bbde3", + "lessThan": "a222d2794c53", + "status": "affected", + "versionType": "git" + }, + { "version": "1526d9f10c61", "lessThan": "a20b6eaf4f35", "status": "affected", @@ -75,7 +81,7 @@ ], "title": "scsi: target: core: Avoid smp_processor_id() in preemptible code", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2021/CVE-2021-47179.json b/cve/published/2021/CVE-2021-47179.json index 57aee332..4d333f00 100644 --- a/cve/published/2021/CVE-2021-47179.json +++ b/cve/published/2021/CVE-2021-47179.json @@ -52,6 +52,12 @@ "lessThan": "b090d110e666", "status": "affected", "versionType": "git" + }, + { + "version": "de144ff4234f", + "lessThan": "a421d218603f", + "status": "affected", + "versionType": "git" } ] }, @@ -125,7 +131,7 @@ ], "title": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2023/CVE-2023-52433.json b/cve/published/2023/CVE-2023-52433.json index 9f8b507a..3fb47b6c 100644 --- a/cve/published/2023/CVE-2023-52433.json +++ b/cve/published/2023/CVE-2023-52433.json @@ -18,6 +18,30 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "c357648929c8", + "lessThan": "03caf75da105", + "status": "affected", + "versionType": "git" + }, + { + "version": "146c76866795", + "lessThan": "c323ed65f66e", + "status": "affected", + "versionType": "git" + }, + { + "version": "479a2cf52593", + "lessThan": "9af7dfb3c9d7", + "status": "affected", + "versionType": "git" + }, + { + "version": "df650d6a4bf4", + "lessThan": "9a8c544158f6", + "status": "affected", + "versionType": "git" + }, + { "version": "f6c383b8c31a", "lessThan": "e3213ff99a35", "status": "affected", @@ -84,7 +108,7 @@ ], "title": "netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2023/CVE-2023-52447.json b/cve/published/2023/CVE-2023-52447.json index e4ea4348..157c841a 100644 --- a/cve/published/2023/CVE-2023-52447.json +++ b/cve/published/2023/CVE-2023-52447.json @@ -18,37 +18,37 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "638e4b825d52", + "version": "bba1dc0b55ac", "lessThan": "90c445799fd1", "status": "affected", "versionType": "git" }, { - "version": "638e4b825d52", + "version": "bba1dc0b55ac", "lessThan": "37d98fb9c314", "status": "affected", "versionType": "git" }, { - "version": "638e4b825d52", + "version": "bba1dc0b55ac", "lessThan": "62fca83303d6", "status": "affected", "versionType": "git" }, { - "version": "638e4b825d52", + "version": "bba1dc0b55ac", "lessThan": "f91cd728b10c", "status": "affected", "versionType": "git" }, { - "version": "638e4b825d52", + "version": "bba1dc0b55ac", "lessThan": "bfd9b20c4862", "status": "affected", "versionType": "git" }, { - "version": "638e4b825d52", + "version": "bba1dc0b55ac", "lessThan": "876673364161", "status": "affected", "versionType": "git" @@ -132,7 +132,7 @@ ], "title": "bpf: Defer the free of inner map when necessary", "x_generator": { - "engine": "bippy-b4257b672505" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2023/CVE-2023-52497.json b/cve/published/2023/CVE-2023-52497.json index 85017651..5d1c460e 100644 --- a/cve/published/2023/CVE-2023-52497.json +++ b/cve/published/2023/CVE-2023-52497.json @@ -18,37 +18,37 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "598162d05080", + "version": "0ffd71bcc3a0", "lessThan": "a0180e940cf1", "status": "affected", "versionType": "git" }, { - "version": "598162d05080", + "version": "0ffd71bcc3a0", "lessThan": "77cbc04a1a86", "status": "affected", "versionType": "git" }, { - "version": "598162d05080", + "version": "0ffd71bcc3a0", "lessThan": "33bf23c9940d", "status": "affected", "versionType": "git" }, { - "version": "598162d05080", + "version": "0ffd71bcc3a0", "lessThan": "f36d200a80a3", "status": "affected", "versionType": "git" }, { - "version": "598162d05080", + "version": "0ffd71bcc3a0", "lessThan": "bffc4cc334c5", "status": "affected", "versionType": "git" }, { - "version": "598162d05080", + "version": "0ffd71bcc3a0", "lessThan": "3c12466b6b7b", "status": "affected", "versionType": "git" @@ -132,7 +132,7 @@ ], "title": "erofs: fix lz4 inplace decompression", "x_generator": { - "engine": "bippy-8df59b4913de" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2023/CVE-2023-52525.json b/cve/published/2023/CVE-2023-52525.json index 9ce6452b..5b728651 100644 --- a/cve/published/2023/CVE-2023-52525.json +++ b/cve/published/2023/CVE-2023-52525.json @@ -18,46 +18,52 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "a7a35f35b7a4", + "version": "f517c97fc129", "lessThan": "71b1d2b57f14", "status": "affected", "versionType": "git" }, { - "version": "68a1716869af", + "version": "8824aa4ab62c", "lessThan": "16cc18b90808", "status": "affected", "versionType": "git" }, { - "version": "df1753eae74b", + "version": "29eca8b7863d", "lessThan": "b8e260654a29", "status": "affected", "versionType": "git" }, { - "version": "08a6e99a334d", + "version": "3fe3923d092e", "lessThan": "10a18c8bac7f", "status": "affected", "versionType": "git" }, { - "version": "89f19a9a055d", + "version": "7c54b6fc39eb", "lessThan": "5afb996349cb", "status": "affected", "versionType": "git" }, { - "version": "cde525d61178", + "version": "3975e21d4d01", "lessThan": "6b706286473d", "status": "affected", "versionType": "git" }, { - "version": "7be3bf0bb299", + "version": "650d1bc02fba", "lessThan": "be2ff39b1504", "status": "affected", "versionType": "git" + }, + { + "version": "119585281617", + "lessThan": "aef7a0300047", + "status": "affected", + "versionType": "git" } ] }, @@ -140,7 +146,7 @@ ], "title": "wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2023/CVE-2023-52563.json b/cve/published/2023/CVE-2023-52563.json index 459a7032..3447b345 100644 --- a/cve/published/2023/CVE-2023-52563.json +++ b/cve/published/2023/CVE-2023-52563.json @@ -18,7 +18,7 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "50446ac34545", + "version": "e098989a9219", "lessThan": "66cb6d74f5a1", "status": "affected", "versionType": "git" @@ -102,7 +102,7 @@ ], "title": "drm/meson: fix memory leak on ->hpd_notify callback", "x_generator": { - "engine": "bippy-851b3ed3d212" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2023/CVE-2023-52575.json b/cve/published/2023/CVE-2023-52575.json index 0e071252..0cb24883 100644 --- a/cve/published/2023/CVE-2023-52575.json +++ b/cve/published/2023/CVE-2023-52575.json @@ -18,19 +18,19 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "8457fb5740b1", + "version": "3f9b7101bea1", "lessThan": "ae806c74c063", "status": "affected", "versionType": "git" }, { - "version": "153f9a7b02d4", + "version": "b35087763a44", "lessThan": "13ea4b92e875", "status": "affected", "versionType": "git" }, { - "version": "4f25355540ad", + "version": "ac41e90d8daa", "lessThan": "adbcec23c842", "status": "affected", "versionType": "git" @@ -117,7 +117,7 @@ ], "title": "x86/srso: Fix SBPB enablement for spec_rstack_overflow=off", "x_generator": { - "engine": "bippy-851b3ed3d212" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2023/CVE-2023-52577.json b/cve/published/2023/CVE-2023-52577.json index c4c99447..9b64a87c 100644 --- a/cve/published/2023/CVE-2023-52577.json +++ b/cve/published/2023/CVE-2023-52577.json @@ -58,6 +58,12 @@ "lessThan": "1512d8f45d3c", "status": "affected", "versionType": "git" + }, + { + "version": "977ad86c2a1b", + "lessThan": "6af289746a63", + "status": "affected", + "versionType": "git" } ] }, @@ -140,7 +146,7 @@ ], "title": "dccp: fix dccp_v4_err()/dccp_v6_err() again", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2023/CVE-2023-52581.json b/cve/published/2023/CVE-2023-52581.json index 4f0ba9e2..3f82fb14 100644 --- a/cve/published/2023/CVE-2023-52581.json +++ b/cve/published/2023/CVE-2023-52581.json @@ -18,6 +18,30 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "bbdb3b65aa91", + "lessThan": "a995a68e8a3b", + "status": "affected", + "versionType": "git" + }, + { + "version": "448be0774882", + "lessThan": "09c85f2d21ab", + "status": "affected", + "versionType": "git" + }, + { + "version": "d19e8bf3ea41", + "lessThan": "ef99506eaf1d", + "status": "affected", + "versionType": "git" + }, + { + "version": "ea3eb9f2192e", + "lessThan": "7e5d732e6902", + "status": "affected", + "versionType": "git" + }, + { "version": "5f68718b34a5", "lessThan": "4aea243b6853", "status": "affected", @@ -84,7 +108,7 @@ ], "title": "netfilter: nf_tables: fix memleak when more than 255 elements expired", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2023/CVE-2023-52628.json b/cve/published/2023/CVE-2023-52628.json index 49aeb517..feaafaf4 100644 --- a/cve/published/2023/CVE-2023-52628.json +++ b/cve/published/2023/CVE-2023-52628.json @@ -18,31 +18,31 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "dbb5281a1f84", + "version": "49499c3e6e18", "lessThan": "a7d86a77c33b", "status": "affected", "versionType": "git" }, { - "version": "dbb5281a1f84", + "version": "49499c3e6e18", "lessThan": "1ad7b189cc14", "status": "affected", "versionType": "git" }, { - "version": "dbb5281a1f84", + "version": "49499c3e6e18", "lessThan": "d9ebfc0f2137", "status": "affected", "versionType": "git" }, { - "version": "dbb5281a1f84", + "version": "49499c3e6e18", "lessThan": "c8f292322ff1", "status": "affected", "versionType": "git" }, { - "version": "dbb5281a1f84", + "version": "49499c3e6e18", "lessThan": "fd94d9dadee5", "status": "affected", "versionType": "git" @@ -117,7 +117,7 @@ ], "title": "netfilter: nftables: exthdr: fix 4-byte stack OOB write", "x_generator": { - "engine": "bippy-b4257b672505" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26584.json b/cve/published/2024/CVE-2024-26584.json index 59aa6ef0..5aff0060 100644 --- a/cve/published/2024/CVE-2024-26584.json +++ b/cve/published/2024/CVE-2024-26584.json @@ -18,25 +18,25 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "94524d8fc965", + "version": "a54667f6728c", "lessThan": "cd1bbca03f3c", "status": "affected", "versionType": "git" }, { - "version": "94524d8fc965", + "version": "a54667f6728c", "lessThan": "13eca403876b", "status": "affected", "versionType": "git" }, { - "version": "94524d8fc965", + "version": "a54667f6728c", "lessThan": "ab6397f072e5", "status": "affected", "versionType": "git" }, { - "version": "94524d8fc965", + "version": "a54667f6728c", "lessThan": "859054147318", "status": "affected", "versionType": "git" @@ -102,7 +102,7 @@ ], "title": "net: tls: handle backlogging of crypto requests", "x_generator": { - "engine": "bippy-d3b290d2becc" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26590.json b/cve/published/2024/CVE-2024-26590.json index edd583c6..fccf0e5f 100644 --- a/cve/published/2024/CVE-2024-26590.json +++ b/cve/published/2024/CVE-2024-26590.json @@ -18,25 +18,25 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "622ceaddb764", + "version": "8f89926290c4", "lessThan": "47467e04816c", "status": "affected", "versionType": "git" }, { - "version": "622ceaddb764", + "version": "8f89926290c4", "lessThan": "823ba1d21060", "status": "affected", "versionType": "git" }, { - "version": "622ceaddb764", + "version": "8f89926290c4", "lessThan": "eed24b816e50", "status": "affected", "versionType": "git" }, { - "version": "622ceaddb764", + "version": "8f89926290c4", "lessThan": "118a8cf504d7", "status": "affected", "versionType": "git" @@ -102,7 +102,7 @@ ], "title": "erofs: fix inconsistent per-file compression format", "x_generator": { - "engine": "bippy-8df59b4913de" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26602.json b/cve/published/2024/CVE-2024-26602.json index f8737315..adb046fa 100644 --- a/cve/published/2024/CVE-2024-26602.json +++ b/cve/published/2024/CVE-2024-26602.json @@ -18,49 +18,49 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "c5f58bd58f43", + "version": "22e4ebb97582", "lessThan": "3cd139875e9a", "status": "affected", "versionType": "git" }, { - "version": "c5f58bd58f43", + "version": "22e4ebb97582", "lessThan": "2441a64070b8", "status": "affected", "versionType": "git" }, { - "version": "c5f58bd58f43", + "version": "22e4ebb97582", "lessThan": "db896bbe4a9c", "status": "affected", "versionType": "git" }, { - "version": "c5f58bd58f43", + "version": "22e4ebb97582", "lessThan": "50fb4e17df31", "status": "affected", "versionType": "git" }, { - "version": "c5f58bd58f43", + "version": "22e4ebb97582", "lessThan": "24ec7504a08a", "status": "affected", "versionType": "git" }, { - "version": "c5f58bd58f43", + "version": "22e4ebb97582", "lessThan": "b6a2a9cbb675", "status": "affected", "versionType": "git" }, { - "version": "c5f58bd58f43", + "version": "22e4ebb97582", "lessThan": "c5b2063c65d0", "status": "affected", "versionType": "git" }, { - "version": "c5f58bd58f43", + "version": "22e4ebb97582", "lessThan": "944d5fe50f3f", "status": "affected", "versionType": "git" @@ -162,7 +162,7 @@ ], "title": "sched/membarrier: reduce the ability to hammer on sys_membarrier", "x_generator": { - "engine": "bippy-8df59b4913de" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26626.json b/cve/published/2024/CVE-2024-26626.json index e4e4da2b..6daa373d 100644 --- a/cve/published/2024/CVE-2024-26626.json +++ b/cve/published/2024/CVE-2024-26626.json @@ -34,6 +34,12 @@ "lessThan": "2e8c9ae40add", "status": "affected", "versionType": "git" + }, + { + "version": "bb7403655b3c", + "lessThan": "e622502c310f", + "status": "affected", + "versionType": "git" } ] }, @@ -80,7 +86,7 @@ ], "title": "ipmr: fix kernel panic when forwarding mcast packets", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26639.json b/cve/published/2024/CVE-2024-26639.json index 81e9bf41..0c594893 100644 --- a/cve/published/2024/CVE-2024-26639.json +++ b/cve/published/2024/CVE-2024-26639.json @@ -34,6 +34,12 @@ "lessThan": "5a33420599fa", "status": "affected", "versionType": "git" + }, + { + "version": "5ec8e8ea8b77", + "lessThan": "f6564fce256a", + "status": "affected", + "versionType": "git" } ] }, @@ -80,7 +86,7 @@ ], "title": "mm, kmsan: fix infinite recursion due to RCU critical section", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26643.json b/cve/published/2024/CVE-2024-26643.json index f5670217..25e043d3 100644 --- a/cve/published/2024/CVE-2024-26643.json +++ b/cve/published/2024/CVE-2024-26643.json @@ -18,7 +18,7 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "1e4c03d530d8", + "version": "ea3eb9f2192e", "lessThan": "406b0241d0eb", "status": "affected", "versionType": "git" @@ -102,7 +102,7 @@ ], "title": "netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout", "x_generator": { - "engine": "bippy-851b3ed3d212" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26678.json b/cve/published/2024/CVE-2024-26678.json index 38c4c21a..07366a12 100644 --- a/cve/published/2024/CVE-2024-26678.json +++ b/cve/published/2024/CVE-2024-26678.json @@ -18,6 +18,12 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "686b58ce5052", + "lessThan": "0a962f2fbaa9", + "status": "affected", + "versionType": "git" + }, + { "version": "3e3eabe26dc8", "lessThan": "4adeeff8c123", "status": "affected", @@ -75,7 +81,7 @@ ], "title": "x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26708.json b/cve/published/2024/CVE-2024-26708.json index 49db0bcd..654bc985 100644 --- a/cve/published/2024/CVE-2024-26708.json +++ b/cve/published/2024/CVE-2024-26708.json @@ -18,19 +18,19 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "4fd19a307016", + "version": "1e777f39b4d7", "lessThan": "4bfe217e075d", "status": "affected", "versionType": "git" }, { - "version": "4fd19a307016", + "version": "1e777f39b4d7", "lessThan": "e158fb9679d1", "status": "affected", "versionType": "git" }, { - "version": "4fd19a307016", + "version": "1e777f39b4d7", "lessThan": "337cebbd850f", "status": "affected", "versionType": "git" @@ -87,7 +87,7 @@ ], "title": "mptcp: really cope with fastopen race", "x_generator": { - "engine": "bippy-d3b290d2becc" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26710.json b/cve/published/2024/CVE-2024-26710.json index cb8a8e13..2349f390 100644 --- a/cve/published/2024/CVE-2024-26710.json +++ b/cve/published/2024/CVE-2024-26710.json @@ -34,6 +34,12 @@ "lessThan": "b29b16bd836a", "status": "affected", "versionType": "git" + }, + { + "version": "18f14afe2816", + "lessThan": "f1acb109505d", + "status": "affected", + "versionType": "git" } ] }, @@ -80,7 +86,7 @@ ], "title": "powerpc/kasan: Limit KASAN thread size increase to 32KB", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26718.json b/cve/published/2024/CVE-2024-26718.json index 204dd6e5..cf3abc66 100644 --- a/cve/published/2024/CVE-2024-26718.json +++ b/cve/published/2024/CVE-2024-26718.json @@ -18,25 +18,25 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "5721d4e5a9cd", + "version": "39d42fa96ba1", "lessThan": "30884a44e0ce", "status": "affected", "versionType": "git" }, { - "version": "5721d4e5a9cd", + "version": "39d42fa96ba1", "lessThan": "5735a2671ffb", "status": "affected", "versionType": "git" }, { - "version": "5721d4e5a9cd", + "version": "39d42fa96ba1", "lessThan": "0c45a20cbe68", "status": "affected", "versionType": "git" }, { - "version": "5721d4e5a9cd", + "version": "39d42fa96ba1", "lessThan": "0a9bab391e33", "status": "affected", "versionType": "git" @@ -102,7 +102,7 @@ ], "title": "dm-crypt, dm-verity: disable tasklets", "x_generator": { - "engine": "bippy-d3b290d2becc" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26729.json b/cve/published/2024/CVE-2024-26729.json index e9c3f89d..819a621b 100644 --- a/cve/published/2024/CVE-2024-26729.json +++ b/cve/published/2024/CVE-2024-26729.json @@ -18,13 +18,13 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "65138eb72e1f", + "version": "028bac583449", "lessThan": "351080ba3414", "status": "affected", "versionType": "git" }, { - "version": "65138eb72e1f", + "version": "028bac583449", "lessThan": "d2b48f340d9e", "status": "affected", "versionType": "git" @@ -72,7 +72,7 @@ ], "title": "drm/amd/display: Fix potential null pointer dereference in dc_dmub_srv", "x_generator": { - "engine": "bippy-d3b290d2becc" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26750.json b/cve/published/2024/CVE-2024-26750.json index 5add09b4..e9f23a27 100644 --- a/cve/published/2024/CVE-2024-26750.json +++ b/cve/published/2024/CVE-2024-26750.json @@ -22,6 +22,30 @@ "lessThan": "6c480d0f1318", "status": "affected", "versionType": "git" + }, + { + "version": "2a3d40b4025f", + "lessThan": "c4c795b21dd2", + "status": "affected", + "versionType": "git" + }, + { + "version": "69e0f04460f4", + "lessThan": "e9eac260369d", + "status": "affected", + "versionType": "git" + }, + { + "version": "cb8890318dde", + "lessThan": "43ba9e331559", + "status": "affected", + "versionType": "git" + }, + { + "version": "25236c91b5ab", + "lessThan": "aa82ac51d633", + "status": "affected", + "versionType": "git" } ] }, @@ -59,7 +83,7 @@ ], "title": "af_unix: Drop oob_skb ref before purging queue in GC.", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26753.json b/cve/published/2024/CVE-2024-26753.json index 1729c0e5..ef63adeb 100644 --- a/cve/published/2024/CVE-2024-26753.json +++ b/cve/published/2024/CVE-2024-26753.json @@ -18,7 +18,7 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "dfdb686d1b43", + "version": "1ff57428894f", "lessThan": "37077ed16c77", "status": "affected", "versionType": "git" @@ -117,7 +117,7 @@ ], "title": "crypto: virtio/akcipher - Fix stack overflow on memcpy", "x_generator": { - "engine": "bippy-851b3ed3d212" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26756.json b/cve/published/2024/CVE-2024-26756.json index 6d98d4ce..ede53fa4 100644 --- a/cve/published/2024/CVE-2024-26756.json +++ b/cve/published/2024/CVE-2024-26756.json @@ -18,13 +18,13 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "f52f5c71f3d4", + "version": "f67055780caa", "lessThan": "13b520fb62b7", "status": "affected", "versionType": "git" }, { - "version": "f52f5c71f3d4", + "version": "f67055780caa", "lessThan": "ad39c08186f8", "status": "affected", "versionType": "git" @@ -72,7 +72,7 @@ ], "title": "md: Don't register sync_thread for reshape directly", "x_generator": { - "engine": "bippy-d3b290d2becc" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26757.json b/cve/published/2024/CVE-2024-26757.json index 4b221962..a76aa206 100644 --- a/cve/published/2024/CVE-2024-26757.json +++ b/cve/published/2024/CVE-2024-26757.json @@ -18,13 +18,13 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "f52f5c71f3d4", + "version": "ecbfb9f118bc", "lessThan": "2ea169c5a0b1", "status": "affected", "versionType": "git" }, { - "version": "f52f5c71f3d4", + "version": "ecbfb9f118bc", "lessThan": "55a48ad2db64", "status": "affected", "versionType": "git" @@ -72,7 +72,7 @@ ], "title": "md: Don't ignore read-only array in md_check_recovery()", "x_generator": { - "engine": "bippy-d3b290d2becc" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26758.json b/cve/published/2024/CVE-2024-26758.json index 0ebee9f2..2146e1ee 100644 --- a/cve/published/2024/CVE-2024-26758.json +++ b/cve/published/2024/CVE-2024-26758.json @@ -18,13 +18,13 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { - "version": "f52f5c71f3d4", + "version": "68866e425be2", "lessThan": "a55f0d6179a1", "status": "affected", "versionType": "git" }, { - "version": "f52f5c71f3d4", + "version": "68866e425be2", "lessThan": "1baae052cccd", "status": "affected", "versionType": "git" @@ -72,7 +72,7 @@ ], "title": "md: Don't ignore suspended array in md_check_recovery()", "x_generator": { - "engine": "bippy-d3b290d2becc" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26780.json b/cve/published/2024/CVE-2024-26780.json index 7763af10..b76a954c 100644 --- a/cve/published/2024/CVE-2024-26780.json +++ b/cve/published/2024/CVE-2024-26780.json @@ -18,6 +18,12 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "4fe505c63aa3", + "lessThan": "36f7371de977", + "status": "affected", + "versionType": "git" + }, + { "version": "e0e09186d882", "lessThan": "2a3d40b4025f", "status": "affected", @@ -34,6 +40,12 @@ "lessThan": "cb8890318dde", "status": "affected", "versionType": "git" + }, + { + "version": "1279f9d9dec2", + "lessThan": "25236c91b5ab", + "status": "affected", + "versionType": "git" } ] }, @@ -83,7 +95,7 @@ ], "title": "af_unix: Fix task hung while purging oob_skb in GC.", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26781.json b/cve/published/2024/CVE-2024-26781.json index 39962d34..8a6ee414 100644 --- a/cve/published/2024/CVE-2024-26781.json +++ b/cve/published/2024/CVE-2024-26781.json @@ -46,6 +46,12 @@ "lessThan": "d487e7ba1bc7", "status": "affected", "versionType": "git" + }, + { + "version": "b8adb69a7d29", + "lessThan": "d6a9608af9a7", + "status": "affected", + "versionType": "git" } ] }, @@ -110,7 +116,7 @@ ], "title": "mptcp: fix possible deadlock in subflow diag", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26792.json b/cve/published/2024/CVE-2024-26792.json index 046ef1ae..db5ddcee 100644 --- a/cve/published/2024/CVE-2024-26792.json +++ b/cve/published/2024/CVE-2024-26792.json @@ -34,6 +34,12 @@ "lessThan": "c8ab7521665b", "status": "affected", "versionType": "git" + }, + { + "version": "e03ee2fe873e", + "lessThan": "e2b54eaf28df", + "status": "affected", + "versionType": "git" } ] }, @@ -80,7 +86,7 @@ ], "title": "btrfs: fix double free of anonymous device after snapshot creation failure", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26794.json b/cve/published/2024/CVE-2024-26794.json index c5f70fb9..6c60a37e 100644 --- a/cve/published/2024/CVE-2024-26794.json +++ b/cve/published/2024/CVE-2024-26794.json @@ -28,6 +28,12 @@ "lessThan": "31d07a757c6d", "status": "affected", "versionType": "git" + }, + { + "version": "b0ad381fa769", + "lessThan": "a1a4a9ca77f1", + "status": "affected", + "versionType": "git" } ] }, @@ -65,7 +71,7 @@ ], "title": "btrfs: fix race between ordered extent completion and fiemap", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, diff --git a/cve/published/2024/CVE-2024-26800.json b/cve/published/2024/CVE-2024-26800.json index 8dcab7c5..d7e4e85a 100644 --- a/cve/published/2024/CVE-2024-26800.json +++ b/cve/published/2024/CVE-2024-26800.json @@ -18,6 +18,12 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "cd1bbca03f3c", + "lessThan": "f2b85a4cc763", + "status": "affected", + "versionType": "git" + }, + { "version": "13eca403876b", "lessThan": "81be85353b0f", "status": "affected", @@ -28,6 +34,12 @@ "lessThan": "1ac9fb84bc7e", "status": "affected", "versionType": "git" + }, + { + "version": "859054147318", + "lessThan": "13114dc55430", + "status": "affected", + "versionType": "git" } ] }, @@ -68,7 +80,7 @@ ], "title": "tls: fix use-after-free on failed backlog decryption", "x_generator": { - "engine": "bippy-7f0d2821bfb2" + "engine": "bippy-5f0117140d9a" } } }, |