aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-04-04 20:03:07 +0200
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-04-04 20:03:07 +0200
commit3ba74932771580d76e92446ae04dfea3692ebe17 (patch)
treef41c7dc8a6bf3ae94a8ce4005225fe1187eafd3f
parentd6ac1e685cca769c12038d3b929442658c52fbf1 (diff)
downloadvulns-3ba74932771580d76e92446ae04dfea3692ebe17.tar.gz
cve: update json files with some updated git ids
Now that bippy can handle json data a bit better, as per the last commit, update all relevent cve records for the json information and push out new updates to cve.org Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--cve/published/2019/CVE-2019-25160.json18
-rw-r--r--cve/published/2020/CVE-2020-36787.json12
-rw-r--r--cve/published/2021/CVE-2021-46905.json20
-rw-r--r--cve/published/2021/CVE-2021-46915.json14
-rw-r--r--cve/published/2021/CVE-2021-46922.json8
-rw-r--r--cve/published/2021/CVE-2021-46959.json12
-rw-r--r--cve/published/2021/CVE-2021-46961.json12
-rw-r--r--cve/published/2021/CVE-2021-46974.json6
-rw-r--r--cve/published/2021/CVE-2021-47004.json10
-rw-r--r--cve/published/2021/CVE-2021-47014.json6
-rw-r--r--cve/published/2021/CVE-2021-47016.json12
-rw-r--r--cve/published/2021/CVE-2021-47028.json8
-rw-r--r--cve/published/2021/CVE-2021-47036.json6
-rw-r--r--cve/published/2021/CVE-2021-47058.json8
-rw-r--r--cve/published/2021/CVE-2021-47094.json6
-rw-r--r--cve/published/2021/CVE-2021-47108.json6
-rw-r--r--cve/published/2021/CVE-2021-47126.json10
-rw-r--r--cve/published/2021/CVE-2021-47136.json8
-rw-r--r--cve/published/2021/CVE-2021-47178.json8
-rw-r--r--cve/published/2021/CVE-2021-47179.json8
-rw-r--r--cve/published/2023/CVE-2023-52433.json26
-rw-r--r--cve/published/2023/CVE-2023-52447.json14
-rw-r--r--cve/published/2023/CVE-2023-52497.json14
-rw-r--r--cve/published/2023/CVE-2023-52525.json22
-rw-r--r--cve/published/2023/CVE-2023-52563.json4
-rw-r--r--cve/published/2023/CVE-2023-52575.json8
-rw-r--r--cve/published/2023/CVE-2023-52577.json8
-rw-r--r--cve/published/2023/CVE-2023-52581.json26
-rw-r--r--cve/published/2023/CVE-2023-52628.json12
-rw-r--r--cve/published/2024/CVE-2024-26584.json10
-rw-r--r--cve/published/2024/CVE-2024-26590.json10
-rw-r--r--cve/published/2024/CVE-2024-26602.json18
-rw-r--r--cve/published/2024/CVE-2024-26626.json8
-rw-r--r--cve/published/2024/CVE-2024-26639.json8
-rw-r--r--cve/published/2024/CVE-2024-26643.json4
-rw-r--r--cve/published/2024/CVE-2024-26678.json8
-rw-r--r--cve/published/2024/CVE-2024-26708.json8
-rw-r--r--cve/published/2024/CVE-2024-26710.json8
-rw-r--r--cve/published/2024/CVE-2024-26718.json10
-rw-r--r--cve/published/2024/CVE-2024-26729.json6
-rw-r--r--cve/published/2024/CVE-2024-26750.json26
-rw-r--r--cve/published/2024/CVE-2024-26753.json4
-rw-r--r--cve/published/2024/CVE-2024-26756.json6
-rw-r--r--cve/published/2024/CVE-2024-26757.json6
-rw-r--r--cve/published/2024/CVE-2024-26758.json6
-rw-r--r--cve/published/2024/CVE-2024-26780.json14
-rw-r--r--cve/published/2024/CVE-2024-26781.json8
-rw-r--r--cve/published/2024/CVE-2024-26792.json8
-rw-r--r--cve/published/2024/CVE-2024-26794.json8
-rw-r--r--cve/published/2024/CVE-2024-26800.json14
50 files changed, 358 insertions, 172 deletions
diff --git a/cve/published/2019/CVE-2019-25160.json b/cve/published/2019/CVE-2019-25160.json
index a2954847..18afcf92 100644
--- a/cve/published/2019/CVE-2019-25160.json
+++ b/cve/published/2019/CVE-2019-25160.json
@@ -18,49 +18,49 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "3faa8f982f95",
+ "version": "446fda4f2682",
"lessThan": "97bc3683c249",
"status": "affected",
"versionType": "git"
},
{
- "version": "3faa8f982f95",
+ "version": "446fda4f2682",
"lessThan": "c61d01faa555",
"status": "affected",
"versionType": "git"
},
{
- "version": "3faa8f982f95",
+ "version": "446fda4f2682",
"lessThan": "dc18101f95fa",
"status": "affected",
"versionType": "git"
},
{
- "version": "3faa8f982f95",
+ "version": "446fda4f2682",
"lessThan": "1c973f9c7cc2",
"status": "affected",
"versionType": "git"
},
{
- "version": "3faa8f982f95",
+ "version": "446fda4f2682",
"lessThan": "fcfe700acdc1",
"status": "affected",
"versionType": "git"
},
{
- "version": "3faa8f982f95",
+ "version": "446fda4f2682",
"lessThan": "e3713abc4248",
"status": "affected",
"versionType": "git"
},
{
- "version": "3faa8f982f95",
+ "version": "446fda4f2682",
"lessThan": "fbf9578919d6",
"status": "affected",
"versionType": "git"
},
{
- "version": "3faa8f982f95",
+ "version": "446fda4f2682",
"lessThan": "5578de4834fe",
"status": "affected",
"versionType": "git"
@@ -162,7 +162,7 @@
],
"title": "netlabel: fix out-of-bounds memory accesses",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2020/CVE-2020-36787.json b/cve/published/2020/CVE-2020-36787.json
index 0d685c20..3016fc08 100644
--- a/cve/published/2020/CVE-2020-36787.json
+++ b/cve/published/2020/CVE-2020-36787.json
@@ -18,31 +18,31 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "d3d04f6c330a",
+ "version": "d2b4387f3bdf",
"lessThan": "1dc1d30ac101",
"status": "affected",
"versionType": "git"
},
{
- "version": "d3d04f6c330a",
+ "version": "d2b4387f3bdf",
"lessThan": "a59d01384c80",
"status": "affected",
"versionType": "git"
},
{
- "version": "d3d04f6c330a",
+ "version": "d2b4387f3bdf",
"lessThan": "2964c37563e8",
"status": "affected",
"versionType": "git"
},
{
- "version": "d3d04f6c330a",
+ "version": "d2b4387f3bdf",
"lessThan": "75321dc8aebe",
"status": "affected",
"versionType": "git"
},
{
- "version": "d3d04f6c330a",
+ "version": "d2b4387f3bdf",
"lessThan": "3536169f8531",
"status": "affected",
"versionType": "git"
@@ -117,7 +117,7 @@
],
"title": "media: aspeed: fix clock handling logic",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46905.json b/cve/published/2021/CVE-2021-46905.json
index 84815f31..5f2927a0 100644
--- a/cve/published/2021/CVE-2021-46905.json
+++ b/cve/published/2021/CVE-2021-46905.json
@@ -18,6 +18,24 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "a462067d7c8e",
+ "lessThan": "5871761c5f0f",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "145c89c441d2",
+ "lessThan": "0c71d4c89559",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "caf5ac93b3b5",
+ "lessThan": "24b699bea755",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
"version": "92028d7a31e5",
"lessThan": "5c17cfe155d2",
"status": "affected",
@@ -141,7 +159,7 @@
],
"title": "net: hso: fix NULL-deref on disconnect regression",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46915.json b/cve/published/2021/CVE-2021-46915.json
index a1bd7057..68c4e7c0 100644
--- a/cve/published/2021/CVE-2021-46915.json
+++ b/cve/published/2021/CVE-2021-46915.json
@@ -18,37 +18,37 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "3e0f64b7dd31",
+ "version": "c26844eda9d4",
"lessThan": "9065ccb9ec92",
"status": "affected",
"versionType": "git"
},
{
- "version": "3e0f64b7dd31",
+ "version": "c26844eda9d4",
"lessThan": "fadd3c4afdf3",
"status": "affected",
"versionType": "git"
},
{
- "version": "3e0f64b7dd31",
+ "version": "c26844eda9d4",
"lessThan": "01fb1626b620",
"status": "affected",
"versionType": "git"
},
{
- "version": "3e0f64b7dd31",
+ "version": "c26844eda9d4",
"lessThan": "dc1732baa9da",
"status": "affected",
"versionType": "git"
},
{
- "version": "3e0f64b7dd31",
+ "version": "c26844eda9d4",
"lessThan": "1bb3ee425993",
"status": "affected",
"versionType": "git"
},
{
- "version": "3e0f64b7dd31",
+ "version": "c26844eda9d4",
"lessThan": "b895bdf5d643",
"status": "affected",
"versionType": "git"
@@ -132,7 +132,7 @@
],
"title": "netfilter: nft_limit: avoid possible divide error in nft_limit_init",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46922.json b/cve/published/2021/CVE-2021-46922.json
index d3c96cc0..eb3a0db2 100644
--- a/cve/published/2021/CVE-2021-46922.json
+++ b/cve/published/2021/CVE-2021-46922.json
@@ -28,6 +28,12 @@
"lessThan": "39c8d760d44c",
"status": "affected",
"versionType": "git"
+ },
+ {
+ "version": "8c657a0590de",
+ "lessThan": "9d5171eab462",
+ "status": "affected",
+ "versionType": "git"
}
]
},
@@ -65,7 +71,7 @@
],
"title": "KEYS: trusted: Fix TPM reservation for seal/unseal",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46959.json b/cve/published/2021/CVE-2021-46959.json
index 17e06ac8..4f83f52d 100644
--- a/cve/published/2021/CVE-2021-46959.json
+++ b/cve/published/2021/CVE-2021-46959.json
@@ -18,31 +18,31 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "0713aa02f20d",
+ "version": "a4add022c155",
"lessThan": "62bb2c7f2411",
"status": "affected",
"versionType": "git"
},
{
- "version": "2be1837b1737",
+ "version": "0870525cf94b",
"lessThan": "8bf96425c90f",
"status": "affected",
"versionType": "git"
},
{
- "version": "e620a73d7ca7",
+ "version": "8c45a1c6c951",
"lessThan": "8e029707f50a",
"status": "affected",
"versionType": "git"
},
{
- "version": "c886774bf583",
+ "version": "234b432c7b61",
"lessThan": "28a5529068c5",
"status": "affected",
"versionType": "git"
},
{
- "version": "2737549129ec",
+ "version": "3e04a4976add",
"lessThan": "001c8e83646a",
"status": "affected",
"versionType": "git"
@@ -177,7 +177,7 @@
],
"title": "spi: Fix use-after-free with devm_spi_alloc_*",
"x_generator": {
- "engine": "bippy-851b3ed3d212"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46961.json b/cve/published/2021/CVE-2021-46961.json
index 5170531e..d43d45da 100644
--- a/cve/published/2021/CVE-2021-46961.json
+++ b/cve/published/2021/CVE-2021-46961.json
@@ -18,31 +18,31 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "",
+ "version": "3f1f3234bc2d",
"lessThan": "e7ea8e46e3b7",
"status": "affected",
"versionType": "git"
},
{
- "version": "",
+ "version": "3f1f3234bc2d",
"lessThan": "7be4db5c2b59",
"status": "affected",
"versionType": "git"
},
{
- "version": "",
+ "version": "3f1f3234bc2d",
"lessThan": "ea817ac1014c",
"status": "affected",
"versionType": "git"
},
{
- "version": "",
+ "version": "3f1f3234bc2d",
"lessThan": "3f72d3709f53",
"status": "affected",
"versionType": "git"
},
{
- "version": "",
+ "version": "3f1f3234bc2d",
"lessThan": "a97709f563a0",
"status": "affected",
"versionType": "git"
@@ -117,7 +117,7 @@
],
"title": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups",
"x_generator": {
- "engine": "bippy-1e70cc10feda"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46974.json b/cve/published/2021/CVE-2021-46974.json
index d2e7c5fe..0f377f5d 100644
--- a/cve/published/2021/CVE-2021-46974.json
+++ b/cve/published/2021/CVE-2021-46974.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "12462c88e6e2",
+ "version": "ae03b6b1c880",
"lessThan": "4d542ddb88fb",
"status": "affected",
"versionType": "git"
},
{
- "version": "eed84f94ff8d",
+ "version": "f92a819b4cbe",
"lessThan": "0e2dfdc74a7f",
"status": "affected",
"versionType": "git"
@@ -147,7 +147,7 @@
],
"title": "bpf: Fix masking negation logic upon negative dst register",
"x_generator": {
- "engine": "bippy-851b3ed3d212"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47004.json b/cve/published/2021/CVE-2021-47004.json
index 25579160..8a9965d2 100644
--- a/cve/published/2021/CVE-2021-47004.json
+++ b/cve/published/2021/CVE-2021-47004.json
@@ -18,25 +18,25 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "093749e296e2",
+ "version": "4354994f097d",
"lessThan": "105155a8146d",
"status": "affected",
"versionType": "git"
},
{
- "version": "093749e296e2",
+ "version": "4354994f097d",
"lessThan": "1e116f87825f",
"status": "affected",
"versionType": "git"
},
{
- "version": "093749e296e2",
+ "version": "4354994f097d",
"lessThan": "211372b25715",
"status": "affected",
"versionType": "git"
},
{
- "version": "093749e296e2",
+ "version": "4354994f097d",
"lessThan": "61461fc921b7",
"status": "affected",
"versionType": "git"
@@ -102,7 +102,7 @@
],
"title": "f2fs: fix to avoid touching checkpointed data in get_victim()",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47014.json b/cve/published/2021/CVE-2021-47014.json
index 5ff78289..9856552b 100644
--- a/cve/published/2021/CVE-2021-47014.json
+++ b/cve/published/2021/CVE-2021-47014.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "7baf2429a1a9",
+ "version": "ae372cb1750f",
"lessThan": "0648941f4c8b",
"status": "affected",
"versionType": "git"
},
{
- "version": "7baf2429a1a9",
+ "version": "ae372cb1750f",
"lessThan": "f77bd544a6bb",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "net/sched: act_ct: fix wild memory access when clearing fragments",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47016.json b/cve/published/2021/CVE-2021-47016.json
index 2a6dc708..071e6976 100644
--- a/cve/published/2021/CVE-2021-47016.json
+++ b/cve/published/2021/CVE-2021-47016.json
@@ -18,31 +18,31 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "19999a8b8782",
+ "version": "7529b90d051e",
"lessThan": "f6a90818a320",
"status": "affected",
"versionType": "git"
},
{
- "version": "19999a8b8782",
+ "version": "7529b90d051e",
"lessThan": "1dfb26df15fc",
"status": "affected",
"versionType": "git"
},
{
- "version": "19999a8b8782",
+ "version": "7529b90d051e",
"lessThan": "73fdeb612d25",
"status": "affected",
"versionType": "git"
},
{
- "version": "19999a8b8782",
+ "version": "7529b90d051e",
"lessThan": "5d3422516934",
"status": "affected",
"versionType": "git"
},
{
- "version": "19999a8b8782",
+ "version": "7529b90d051e",
"lessThan": "43262178c043",
"status": "affected",
"versionType": "git"
@@ -117,7 +117,7 @@
],
"title": "m68k: mvme147,mvme16x: Don't wipe PCC timer config bits",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47028.json b/cve/published/2021/CVE-2021-47028.json
index 91a808dc..c1ba29ff 100644
--- a/cve/published/2021/CVE-2021-47028.json
+++ b/cve/published/2021/CVE-2021-47028.json
@@ -18,19 +18,19 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "e4c5ead632ff",
+ "version": "e57b7901469f",
"lessThan": "dfc8a71448c7",
"status": "affected",
"versionType": "git"
},
{
- "version": "e4c5ead632ff",
+ "version": "e57b7901469f",
"lessThan": "4bd926e5ca88",
"status": "affected",
"versionType": "git"
},
{
- "version": "e4c5ead632ff",
+ "version": "e57b7901469f",
"lessThan": "f43b941fd610",
"status": "affected",
"versionType": "git"
@@ -87,7 +87,7 @@
],
"title": "mt76: mt7915: fix txrate reporting",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47036.json b/cve/published/2021/CVE-2021-47036.json
index ad5734a5..16c0d45c 100644
--- a/cve/published/2021/CVE-2021-47036.json
+++ b/cve/published/2021/CVE-2021-47036.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "36707061d6ba",
+ "version": "9fd1ff5d2ac7",
"lessThan": "450687386cd1",
"status": "affected",
"versionType": "git"
},
{
- "version": "36707061d6ba",
+ "version": "9fd1ff5d2ac7",
"lessThan": "18f25dc39990",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "udp: skip L4 aggregation for UDP tunnel packets",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47058.json b/cve/published/2021/CVE-2021-47058.json
index 2d01097f..f8b85fba 100644
--- a/cve/published/2021/CVE-2021-47058.json
+++ b/cve/published/2021/CVE-2021-47058.json
@@ -18,19 +18,19 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "1b8dd2d64ea9",
+ "version": "5b654b030079",
"lessThan": "2dc1554d5f0f",
"status": "affected",
"versionType": "git"
},
{
- "version": "6f484096196b",
+ "version": "480c5e9c7e4c",
"lessThan": "d8897f7b2283",
"status": "affected",
"versionType": "git"
},
{
- "version": "75e5e51acf59",
+ "version": "c9698380b01a",
"lessThan": "eb949f891226",
"status": "affected",
"versionType": "git"
@@ -132,7 +132,7 @@
],
"title": "regmap: set debugfs_name to NULL after it is freed",
"x_generator": {
- "engine": "bippy-851b3ed3d212"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47094.json b/cve/published/2021/CVE-2021-47094.json
index 02d4b5e3..04c98586 100644
--- a/cve/published/2021/CVE-2021-47094.json
+++ b/cve/published/2021/CVE-2021-47094.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "1af4a96025b3",
+ "version": "faaf05b00aec",
"lessThan": "d884eefd75cc",
"status": "affected",
"versionType": "git"
},
{
- "version": "1af4a96025b3",
+ "version": "faaf05b00aec",
"lessThan": "3a0f64de479c",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "KVM: x86/mmu: Don't advance iterator after restart due to yielding",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47108.json b/cve/published/2021/CVE-2021-47108.json
index a49dfdd2..07a74f4c 100644
--- a/cve/published/2021/CVE-2021-47108.json
+++ b/cve/published/2021/CVE-2021-47108.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "c91026a938c2",
+ "version": "41ca9caaae0b",
"lessThan": "71d07ebc5000",
"status": "affected",
"versionType": "git"
},
{
- "version": "c91026a938c2",
+ "version": "41ca9caaae0b",
"lessThan": "3b8e19a0aa39",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47126.json b/cve/published/2021/CVE-2021-47126.json
index 545260c2..e56e1eb5 100644
--- a/cve/published/2021/CVE-2021-47126.json
+++ b/cve/published/2021/CVE-2021-47126.json
@@ -18,25 +18,25 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "706ec9191646",
+ "version": "f88d8ea67fbd",
"lessThan": "7ba7fa78a92d",
"status": "affected",
"versionType": "git"
},
{
- "version": "706ec9191646",
+ "version": "f88d8ea67fbd",
"lessThan": "098702358274",
"status": "affected",
"versionType": "git"
},
{
- "version": "706ec9191646",
+ "version": "f88d8ea67fbd",
"lessThan": "0a462e25ef0f",
"status": "affected",
"versionType": "git"
},
{
- "version": "706ec9191646",
+ "version": "f88d8ea67fbd",
"lessThan": "821bbf79fe46",
"status": "affected",
"versionType": "git"
@@ -102,7 +102,7 @@
],
"title": "ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions",
"x_generator": {
- "engine": "bippy-1e70cc10feda"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47136.json b/cve/published/2021/CVE-2021-47136.json
index 5a122e82..543d4ff2 100644
--- a/cve/published/2021/CVE-2021-47136.json
+++ b/cve/published/2021/CVE-2021-47136.json
@@ -18,19 +18,19 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "d29334c15d33",
+ "version": "038ebb1a713d",
"lessThan": "ac493452e937",
"status": "affected",
"versionType": "git"
},
{
- "version": "d29334c15d33",
+ "version": "038ebb1a713d",
"lessThan": "86ab133b695e",
"status": "affected",
"versionType": "git"
},
{
- "version": "d29334c15d33",
+ "version": "038ebb1a713d",
"lessThan": "9453d45ecb6c",
"status": "affected",
"versionType": "git"
@@ -87,7 +87,7 @@
],
"title": "net: zero-initialize tc skb extension on allocation",
"x_generator": {
- "engine": "bippy-b4257b672505"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47178.json b/cve/published/2021/CVE-2021-47178.json
index fa5b046f..f8d4bd2f 100644
--- a/cve/published/2021/CVE-2021-47178.json
+++ b/cve/published/2021/CVE-2021-47178.json
@@ -18,6 +18,12 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "008b936bbde3",
+ "lessThan": "a222d2794c53",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
"version": "1526d9f10c61",
"lessThan": "a20b6eaf4f35",
"status": "affected",
@@ -75,7 +81,7 @@
],
"title": "scsi: target: core: Avoid smp_processor_id() in preemptible code",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47179.json b/cve/published/2021/CVE-2021-47179.json
index 57aee332..4d333f00 100644
--- a/cve/published/2021/CVE-2021-47179.json
+++ b/cve/published/2021/CVE-2021-47179.json
@@ -52,6 +52,12 @@
"lessThan": "b090d110e666",
"status": "affected",
"versionType": "git"
+ },
+ {
+ "version": "de144ff4234f",
+ "lessThan": "a421d218603f",
+ "status": "affected",
+ "versionType": "git"
}
]
},
@@ -125,7 +131,7 @@
],
"title": "NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52433.json b/cve/published/2023/CVE-2023-52433.json
index 9f8b507a..3fb47b6c 100644
--- a/cve/published/2023/CVE-2023-52433.json
+++ b/cve/published/2023/CVE-2023-52433.json
@@ -18,6 +18,30 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "c357648929c8",
+ "lessThan": "03caf75da105",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "146c76866795",
+ "lessThan": "c323ed65f66e",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "479a2cf52593",
+ "lessThan": "9af7dfb3c9d7",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "df650d6a4bf4",
+ "lessThan": "9a8c544158f6",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
"version": "f6c383b8c31a",
"lessThan": "e3213ff99a35",
"status": "affected",
@@ -84,7 +108,7 @@
],
"title": "netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52447.json b/cve/published/2023/CVE-2023-52447.json
index e4ea4348..157c841a 100644
--- a/cve/published/2023/CVE-2023-52447.json
+++ b/cve/published/2023/CVE-2023-52447.json
@@ -18,37 +18,37 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "638e4b825d52",
+ "version": "bba1dc0b55ac",
"lessThan": "90c445799fd1",
"status": "affected",
"versionType": "git"
},
{
- "version": "638e4b825d52",
+ "version": "bba1dc0b55ac",
"lessThan": "37d98fb9c314",
"status": "affected",
"versionType": "git"
},
{
- "version": "638e4b825d52",
+ "version": "bba1dc0b55ac",
"lessThan": "62fca83303d6",
"status": "affected",
"versionType": "git"
},
{
- "version": "638e4b825d52",
+ "version": "bba1dc0b55ac",
"lessThan": "f91cd728b10c",
"status": "affected",
"versionType": "git"
},
{
- "version": "638e4b825d52",
+ "version": "bba1dc0b55ac",
"lessThan": "bfd9b20c4862",
"status": "affected",
"versionType": "git"
},
{
- "version": "638e4b825d52",
+ "version": "bba1dc0b55ac",
"lessThan": "876673364161",
"status": "affected",
"versionType": "git"
@@ -132,7 +132,7 @@
],
"title": "bpf: Defer the free of inner map when necessary",
"x_generator": {
- "engine": "bippy-b4257b672505"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52497.json b/cve/published/2023/CVE-2023-52497.json
index 85017651..5d1c460e 100644
--- a/cve/published/2023/CVE-2023-52497.json
+++ b/cve/published/2023/CVE-2023-52497.json
@@ -18,37 +18,37 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "598162d05080",
+ "version": "0ffd71bcc3a0",
"lessThan": "a0180e940cf1",
"status": "affected",
"versionType": "git"
},
{
- "version": "598162d05080",
+ "version": "0ffd71bcc3a0",
"lessThan": "77cbc04a1a86",
"status": "affected",
"versionType": "git"
},
{
- "version": "598162d05080",
+ "version": "0ffd71bcc3a0",
"lessThan": "33bf23c9940d",
"status": "affected",
"versionType": "git"
},
{
- "version": "598162d05080",
+ "version": "0ffd71bcc3a0",
"lessThan": "f36d200a80a3",
"status": "affected",
"versionType": "git"
},
{
- "version": "598162d05080",
+ "version": "0ffd71bcc3a0",
"lessThan": "bffc4cc334c5",
"status": "affected",
"versionType": "git"
},
{
- "version": "598162d05080",
+ "version": "0ffd71bcc3a0",
"lessThan": "3c12466b6b7b",
"status": "affected",
"versionType": "git"
@@ -132,7 +132,7 @@
],
"title": "erofs: fix lz4 inplace decompression",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52525.json b/cve/published/2023/CVE-2023-52525.json
index 9ce6452b..5b728651 100644
--- a/cve/published/2023/CVE-2023-52525.json
+++ b/cve/published/2023/CVE-2023-52525.json
@@ -18,46 +18,52 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "a7a35f35b7a4",
+ "version": "f517c97fc129",
"lessThan": "71b1d2b57f14",
"status": "affected",
"versionType": "git"
},
{
- "version": "68a1716869af",
+ "version": "8824aa4ab62c",
"lessThan": "16cc18b90808",
"status": "affected",
"versionType": "git"
},
{
- "version": "df1753eae74b",
+ "version": "29eca8b7863d",
"lessThan": "b8e260654a29",
"status": "affected",
"versionType": "git"
},
{
- "version": "08a6e99a334d",
+ "version": "3fe3923d092e",
"lessThan": "10a18c8bac7f",
"status": "affected",
"versionType": "git"
},
{
- "version": "89f19a9a055d",
+ "version": "7c54b6fc39eb",
"lessThan": "5afb996349cb",
"status": "affected",
"versionType": "git"
},
{
- "version": "cde525d61178",
+ "version": "3975e21d4d01",
"lessThan": "6b706286473d",
"status": "affected",
"versionType": "git"
},
{
- "version": "7be3bf0bb299",
+ "version": "650d1bc02fba",
"lessThan": "be2ff39b1504",
"status": "affected",
"versionType": "git"
+ },
+ {
+ "version": "119585281617",
+ "lessThan": "aef7a0300047",
+ "status": "affected",
+ "versionType": "git"
}
]
},
@@ -140,7 +146,7 @@
],
"title": "wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52563.json b/cve/published/2023/CVE-2023-52563.json
index 459a7032..3447b345 100644
--- a/cve/published/2023/CVE-2023-52563.json
+++ b/cve/published/2023/CVE-2023-52563.json
@@ -18,7 +18,7 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "50446ac34545",
+ "version": "e098989a9219",
"lessThan": "66cb6d74f5a1",
"status": "affected",
"versionType": "git"
@@ -102,7 +102,7 @@
],
"title": "drm/meson: fix memory leak on ->hpd_notify callback",
"x_generator": {
- "engine": "bippy-851b3ed3d212"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52575.json b/cve/published/2023/CVE-2023-52575.json
index 0e071252..0cb24883 100644
--- a/cve/published/2023/CVE-2023-52575.json
+++ b/cve/published/2023/CVE-2023-52575.json
@@ -18,19 +18,19 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "8457fb5740b1",
+ "version": "3f9b7101bea1",
"lessThan": "ae806c74c063",
"status": "affected",
"versionType": "git"
},
{
- "version": "153f9a7b02d4",
+ "version": "b35087763a44",
"lessThan": "13ea4b92e875",
"status": "affected",
"versionType": "git"
},
{
- "version": "4f25355540ad",
+ "version": "ac41e90d8daa",
"lessThan": "adbcec23c842",
"status": "affected",
"versionType": "git"
@@ -117,7 +117,7 @@
],
"title": "x86/srso: Fix SBPB enablement for spec_rstack_overflow=off",
"x_generator": {
- "engine": "bippy-851b3ed3d212"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52577.json b/cve/published/2023/CVE-2023-52577.json
index c4c99447..9b64a87c 100644
--- a/cve/published/2023/CVE-2023-52577.json
+++ b/cve/published/2023/CVE-2023-52577.json
@@ -58,6 +58,12 @@
"lessThan": "1512d8f45d3c",
"status": "affected",
"versionType": "git"
+ },
+ {
+ "version": "977ad86c2a1b",
+ "lessThan": "6af289746a63",
+ "status": "affected",
+ "versionType": "git"
}
]
},
@@ -140,7 +146,7 @@
],
"title": "dccp: fix dccp_v4_err()/dccp_v6_err() again",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52581.json b/cve/published/2023/CVE-2023-52581.json
index 4f0ba9e2..3f82fb14 100644
--- a/cve/published/2023/CVE-2023-52581.json
+++ b/cve/published/2023/CVE-2023-52581.json
@@ -18,6 +18,30 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "bbdb3b65aa91",
+ "lessThan": "a995a68e8a3b",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "448be0774882",
+ "lessThan": "09c85f2d21ab",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "d19e8bf3ea41",
+ "lessThan": "ef99506eaf1d",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "ea3eb9f2192e",
+ "lessThan": "7e5d732e6902",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
"version": "5f68718b34a5",
"lessThan": "4aea243b6853",
"status": "affected",
@@ -84,7 +108,7 @@
],
"title": "netfilter: nf_tables: fix memleak when more than 255 elements expired",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52628.json b/cve/published/2023/CVE-2023-52628.json
index 49aeb517..feaafaf4 100644
--- a/cve/published/2023/CVE-2023-52628.json
+++ b/cve/published/2023/CVE-2023-52628.json
@@ -18,31 +18,31 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "dbb5281a1f84",
+ "version": "49499c3e6e18",
"lessThan": "a7d86a77c33b",
"status": "affected",
"versionType": "git"
},
{
- "version": "dbb5281a1f84",
+ "version": "49499c3e6e18",
"lessThan": "1ad7b189cc14",
"status": "affected",
"versionType": "git"
},
{
- "version": "dbb5281a1f84",
+ "version": "49499c3e6e18",
"lessThan": "d9ebfc0f2137",
"status": "affected",
"versionType": "git"
},
{
- "version": "dbb5281a1f84",
+ "version": "49499c3e6e18",
"lessThan": "c8f292322ff1",
"status": "affected",
"versionType": "git"
},
{
- "version": "dbb5281a1f84",
+ "version": "49499c3e6e18",
"lessThan": "fd94d9dadee5",
"status": "affected",
"versionType": "git"
@@ -117,7 +117,7 @@
],
"title": "netfilter: nftables: exthdr: fix 4-byte stack OOB write",
"x_generator": {
- "engine": "bippy-b4257b672505"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26584.json b/cve/published/2024/CVE-2024-26584.json
index 59aa6ef0..5aff0060 100644
--- a/cve/published/2024/CVE-2024-26584.json
+++ b/cve/published/2024/CVE-2024-26584.json
@@ -18,25 +18,25 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "94524d8fc965",
+ "version": "a54667f6728c",
"lessThan": "cd1bbca03f3c",
"status": "affected",
"versionType": "git"
},
{
- "version": "94524d8fc965",
+ "version": "a54667f6728c",
"lessThan": "13eca403876b",
"status": "affected",
"versionType": "git"
},
{
- "version": "94524d8fc965",
+ "version": "a54667f6728c",
"lessThan": "ab6397f072e5",
"status": "affected",
"versionType": "git"
},
{
- "version": "94524d8fc965",
+ "version": "a54667f6728c",
"lessThan": "859054147318",
"status": "affected",
"versionType": "git"
@@ -102,7 +102,7 @@
],
"title": "net: tls: handle backlogging of crypto requests",
"x_generator": {
- "engine": "bippy-d3b290d2becc"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26590.json b/cve/published/2024/CVE-2024-26590.json
index edd583c6..fccf0e5f 100644
--- a/cve/published/2024/CVE-2024-26590.json
+++ b/cve/published/2024/CVE-2024-26590.json
@@ -18,25 +18,25 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "622ceaddb764",
+ "version": "8f89926290c4",
"lessThan": "47467e04816c",
"status": "affected",
"versionType": "git"
},
{
- "version": "622ceaddb764",
+ "version": "8f89926290c4",
"lessThan": "823ba1d21060",
"status": "affected",
"versionType": "git"
},
{
- "version": "622ceaddb764",
+ "version": "8f89926290c4",
"lessThan": "eed24b816e50",
"status": "affected",
"versionType": "git"
},
{
- "version": "622ceaddb764",
+ "version": "8f89926290c4",
"lessThan": "118a8cf504d7",
"status": "affected",
"versionType": "git"
@@ -102,7 +102,7 @@
],
"title": "erofs: fix inconsistent per-file compression format",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26602.json b/cve/published/2024/CVE-2024-26602.json
index f8737315..adb046fa 100644
--- a/cve/published/2024/CVE-2024-26602.json
+++ b/cve/published/2024/CVE-2024-26602.json
@@ -18,49 +18,49 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "c5f58bd58f43",
+ "version": "22e4ebb97582",
"lessThan": "3cd139875e9a",
"status": "affected",
"versionType": "git"
},
{
- "version": "c5f58bd58f43",
+ "version": "22e4ebb97582",
"lessThan": "2441a64070b8",
"status": "affected",
"versionType": "git"
},
{
- "version": "c5f58bd58f43",
+ "version": "22e4ebb97582",
"lessThan": "db896bbe4a9c",
"status": "affected",
"versionType": "git"
},
{
- "version": "c5f58bd58f43",
+ "version": "22e4ebb97582",
"lessThan": "50fb4e17df31",
"status": "affected",
"versionType": "git"
},
{
- "version": "c5f58bd58f43",
+ "version": "22e4ebb97582",
"lessThan": "24ec7504a08a",
"status": "affected",
"versionType": "git"
},
{
- "version": "c5f58bd58f43",
+ "version": "22e4ebb97582",
"lessThan": "b6a2a9cbb675",
"status": "affected",
"versionType": "git"
},
{
- "version": "c5f58bd58f43",
+ "version": "22e4ebb97582",
"lessThan": "c5b2063c65d0",
"status": "affected",
"versionType": "git"
},
{
- "version": "c5f58bd58f43",
+ "version": "22e4ebb97582",
"lessThan": "944d5fe50f3f",
"status": "affected",
"versionType": "git"
@@ -162,7 +162,7 @@
],
"title": "sched/membarrier: reduce the ability to hammer on sys_membarrier",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26626.json b/cve/published/2024/CVE-2024-26626.json
index e4e4da2b..6daa373d 100644
--- a/cve/published/2024/CVE-2024-26626.json
+++ b/cve/published/2024/CVE-2024-26626.json
@@ -34,6 +34,12 @@
"lessThan": "2e8c9ae40add",
"status": "affected",
"versionType": "git"
+ },
+ {
+ "version": "bb7403655b3c",
+ "lessThan": "e622502c310f",
+ "status": "affected",
+ "versionType": "git"
}
]
},
@@ -80,7 +86,7 @@
],
"title": "ipmr: fix kernel panic when forwarding mcast packets",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26639.json b/cve/published/2024/CVE-2024-26639.json
index 81e9bf41..0c594893 100644
--- a/cve/published/2024/CVE-2024-26639.json
+++ b/cve/published/2024/CVE-2024-26639.json
@@ -34,6 +34,12 @@
"lessThan": "5a33420599fa",
"status": "affected",
"versionType": "git"
+ },
+ {
+ "version": "5ec8e8ea8b77",
+ "lessThan": "f6564fce256a",
+ "status": "affected",
+ "versionType": "git"
}
]
},
@@ -80,7 +86,7 @@
],
"title": "mm, kmsan: fix infinite recursion due to RCU critical section",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26643.json b/cve/published/2024/CVE-2024-26643.json
index f5670217..25e043d3 100644
--- a/cve/published/2024/CVE-2024-26643.json
+++ b/cve/published/2024/CVE-2024-26643.json
@@ -18,7 +18,7 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "1e4c03d530d8",
+ "version": "ea3eb9f2192e",
"lessThan": "406b0241d0eb",
"status": "affected",
"versionType": "git"
@@ -102,7 +102,7 @@
],
"title": "netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout",
"x_generator": {
- "engine": "bippy-851b3ed3d212"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26678.json b/cve/published/2024/CVE-2024-26678.json
index 38c4c21a..07366a12 100644
--- a/cve/published/2024/CVE-2024-26678.json
+++ b/cve/published/2024/CVE-2024-26678.json
@@ -18,6 +18,12 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "686b58ce5052",
+ "lessThan": "0a962f2fbaa9",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
"version": "3e3eabe26dc8",
"lessThan": "4adeeff8c123",
"status": "affected",
@@ -75,7 +81,7 @@
],
"title": "x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26708.json b/cve/published/2024/CVE-2024-26708.json
index 49db0bcd..654bc985 100644
--- a/cve/published/2024/CVE-2024-26708.json
+++ b/cve/published/2024/CVE-2024-26708.json
@@ -18,19 +18,19 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "4fd19a307016",
+ "version": "1e777f39b4d7",
"lessThan": "4bfe217e075d",
"status": "affected",
"versionType": "git"
},
{
- "version": "4fd19a307016",
+ "version": "1e777f39b4d7",
"lessThan": "e158fb9679d1",
"status": "affected",
"versionType": "git"
},
{
- "version": "4fd19a307016",
+ "version": "1e777f39b4d7",
"lessThan": "337cebbd850f",
"status": "affected",
"versionType": "git"
@@ -87,7 +87,7 @@
],
"title": "mptcp: really cope with fastopen race",
"x_generator": {
- "engine": "bippy-d3b290d2becc"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26710.json b/cve/published/2024/CVE-2024-26710.json
index cb8a8e13..2349f390 100644
--- a/cve/published/2024/CVE-2024-26710.json
+++ b/cve/published/2024/CVE-2024-26710.json
@@ -34,6 +34,12 @@
"lessThan": "b29b16bd836a",
"status": "affected",
"versionType": "git"
+ },
+ {
+ "version": "18f14afe2816",
+ "lessThan": "f1acb109505d",
+ "status": "affected",
+ "versionType": "git"
}
]
},
@@ -80,7 +86,7 @@
],
"title": "powerpc/kasan: Limit KASAN thread size increase to 32KB",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26718.json b/cve/published/2024/CVE-2024-26718.json
index 204dd6e5..cf3abc66 100644
--- a/cve/published/2024/CVE-2024-26718.json
+++ b/cve/published/2024/CVE-2024-26718.json
@@ -18,25 +18,25 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "5721d4e5a9cd",
+ "version": "39d42fa96ba1",
"lessThan": "30884a44e0ce",
"status": "affected",
"versionType": "git"
},
{
- "version": "5721d4e5a9cd",
+ "version": "39d42fa96ba1",
"lessThan": "5735a2671ffb",
"status": "affected",
"versionType": "git"
},
{
- "version": "5721d4e5a9cd",
+ "version": "39d42fa96ba1",
"lessThan": "0c45a20cbe68",
"status": "affected",
"versionType": "git"
},
{
- "version": "5721d4e5a9cd",
+ "version": "39d42fa96ba1",
"lessThan": "0a9bab391e33",
"status": "affected",
"versionType": "git"
@@ -102,7 +102,7 @@
],
"title": "dm-crypt, dm-verity: disable tasklets",
"x_generator": {
- "engine": "bippy-d3b290d2becc"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26729.json b/cve/published/2024/CVE-2024-26729.json
index e9c3f89d..819a621b 100644
--- a/cve/published/2024/CVE-2024-26729.json
+++ b/cve/published/2024/CVE-2024-26729.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "65138eb72e1f",
+ "version": "028bac583449",
"lessThan": "351080ba3414",
"status": "affected",
"versionType": "git"
},
{
- "version": "65138eb72e1f",
+ "version": "028bac583449",
"lessThan": "d2b48f340d9e",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "drm/amd/display: Fix potential null pointer dereference in dc_dmub_srv",
"x_generator": {
- "engine": "bippy-d3b290d2becc"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26750.json b/cve/published/2024/CVE-2024-26750.json
index 5add09b4..e9f23a27 100644
--- a/cve/published/2024/CVE-2024-26750.json
+++ b/cve/published/2024/CVE-2024-26750.json
@@ -22,6 +22,30 @@
"lessThan": "6c480d0f1318",
"status": "affected",
"versionType": "git"
+ },
+ {
+ "version": "2a3d40b4025f",
+ "lessThan": "c4c795b21dd2",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "69e0f04460f4",
+ "lessThan": "e9eac260369d",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "cb8890318dde",
+ "lessThan": "43ba9e331559",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "25236c91b5ab",
+ "lessThan": "aa82ac51d633",
+ "status": "affected",
+ "versionType": "git"
}
]
},
@@ -59,7 +83,7 @@
],
"title": "af_unix: Drop oob_skb ref before purging queue in GC.",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26753.json b/cve/published/2024/CVE-2024-26753.json
index 1729c0e5..ef63adeb 100644
--- a/cve/published/2024/CVE-2024-26753.json
+++ b/cve/published/2024/CVE-2024-26753.json
@@ -18,7 +18,7 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "dfdb686d1b43",
+ "version": "1ff57428894f",
"lessThan": "37077ed16c77",
"status": "affected",
"versionType": "git"
@@ -117,7 +117,7 @@
],
"title": "crypto: virtio/akcipher - Fix stack overflow on memcpy",
"x_generator": {
- "engine": "bippy-851b3ed3d212"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26756.json b/cve/published/2024/CVE-2024-26756.json
index 6d98d4ce..ede53fa4 100644
--- a/cve/published/2024/CVE-2024-26756.json
+++ b/cve/published/2024/CVE-2024-26756.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "f52f5c71f3d4",
+ "version": "f67055780caa",
"lessThan": "13b520fb62b7",
"status": "affected",
"versionType": "git"
},
{
- "version": "f52f5c71f3d4",
+ "version": "f67055780caa",
"lessThan": "ad39c08186f8",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "md: Don't register sync_thread for reshape directly",
"x_generator": {
- "engine": "bippy-d3b290d2becc"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26757.json b/cve/published/2024/CVE-2024-26757.json
index 4b221962..a76aa206 100644
--- a/cve/published/2024/CVE-2024-26757.json
+++ b/cve/published/2024/CVE-2024-26757.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "f52f5c71f3d4",
+ "version": "ecbfb9f118bc",
"lessThan": "2ea169c5a0b1",
"status": "affected",
"versionType": "git"
},
{
- "version": "f52f5c71f3d4",
+ "version": "ecbfb9f118bc",
"lessThan": "55a48ad2db64",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "md: Don't ignore read-only array in md_check_recovery()",
"x_generator": {
- "engine": "bippy-d3b290d2becc"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26758.json b/cve/published/2024/CVE-2024-26758.json
index 0ebee9f2..2146e1ee 100644
--- a/cve/published/2024/CVE-2024-26758.json
+++ b/cve/published/2024/CVE-2024-26758.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "f52f5c71f3d4",
+ "version": "68866e425be2",
"lessThan": "a55f0d6179a1",
"status": "affected",
"versionType": "git"
},
{
- "version": "f52f5c71f3d4",
+ "version": "68866e425be2",
"lessThan": "1baae052cccd",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "md: Don't ignore suspended array in md_check_recovery()",
"x_generator": {
- "engine": "bippy-d3b290d2becc"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26780.json b/cve/published/2024/CVE-2024-26780.json
index 7763af10..b76a954c 100644
--- a/cve/published/2024/CVE-2024-26780.json
+++ b/cve/published/2024/CVE-2024-26780.json
@@ -18,6 +18,12 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "4fe505c63aa3",
+ "lessThan": "36f7371de977",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
"version": "e0e09186d882",
"lessThan": "2a3d40b4025f",
"status": "affected",
@@ -34,6 +40,12 @@
"lessThan": "cb8890318dde",
"status": "affected",
"versionType": "git"
+ },
+ {
+ "version": "1279f9d9dec2",
+ "lessThan": "25236c91b5ab",
+ "status": "affected",
+ "versionType": "git"
}
]
},
@@ -83,7 +95,7 @@
],
"title": "af_unix: Fix task hung while purging oob_skb in GC.",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26781.json b/cve/published/2024/CVE-2024-26781.json
index 39962d34..8a6ee414 100644
--- a/cve/published/2024/CVE-2024-26781.json
+++ b/cve/published/2024/CVE-2024-26781.json
@@ -46,6 +46,12 @@
"lessThan": "d487e7ba1bc7",
"status": "affected",
"versionType": "git"
+ },
+ {
+ "version": "b8adb69a7d29",
+ "lessThan": "d6a9608af9a7",
+ "status": "affected",
+ "versionType": "git"
}
]
},
@@ -110,7 +116,7 @@
],
"title": "mptcp: fix possible deadlock in subflow diag",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26792.json b/cve/published/2024/CVE-2024-26792.json
index 046ef1ae..db5ddcee 100644
--- a/cve/published/2024/CVE-2024-26792.json
+++ b/cve/published/2024/CVE-2024-26792.json
@@ -34,6 +34,12 @@
"lessThan": "c8ab7521665b",
"status": "affected",
"versionType": "git"
+ },
+ {
+ "version": "e03ee2fe873e",
+ "lessThan": "e2b54eaf28df",
+ "status": "affected",
+ "versionType": "git"
}
]
},
@@ -80,7 +86,7 @@
],
"title": "btrfs: fix double free of anonymous device after snapshot creation failure",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26794.json b/cve/published/2024/CVE-2024-26794.json
index c5f70fb9..6c60a37e 100644
--- a/cve/published/2024/CVE-2024-26794.json
+++ b/cve/published/2024/CVE-2024-26794.json
@@ -28,6 +28,12 @@
"lessThan": "31d07a757c6d",
"status": "affected",
"versionType": "git"
+ },
+ {
+ "version": "b0ad381fa769",
+ "lessThan": "a1a4a9ca77f1",
+ "status": "affected",
+ "versionType": "git"
}
]
},
@@ -65,7 +71,7 @@
],
"title": "btrfs: fix race between ordered extent completion and fiemap",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26800.json b/cve/published/2024/CVE-2024-26800.json
index 8dcab7c5..d7e4e85a 100644
--- a/cve/published/2024/CVE-2024-26800.json
+++ b/cve/published/2024/CVE-2024-26800.json
@@ -18,6 +18,12 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "cd1bbca03f3c",
+ "lessThan": "f2b85a4cc763",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
"version": "13eca403876b",
"lessThan": "81be85353b0f",
"status": "affected",
@@ -28,6 +34,12 @@
"lessThan": "1ac9fb84bc7e",
"status": "affected",
"versionType": "git"
+ },
+ {
+ "version": "859054147318",
+ "lessThan": "13114dc55430",
+ "status": "affected",
+ "versionType": "git"
}
]
},
@@ -68,7 +80,7 @@
],
"title": "tls: fix use-after-free on failed backlog decryption",
"x_generator": {
- "engine": "bippy-7f0d2821bfb2"
+ "engine": "bippy-5f0117140d9a"
}
}
},