aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-04-02 14:42:28 +0200
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-04-02 14:42:28 +0200
commit4521792cabecdd52edb9d0473743ab3141f4b954 (patch)
tree8b6e78ff0823d4888128f5814669b676eba769c6
parentd8a5c423c4481b0d31a58c10ea476193432a1037 (diff)
downloadvulns-4521792cabecdd52edb9d0473743ab3141f4b954.tar.gz
cve/*: update lots of entries to have unified git sha values
The sha length was not unified for anything found from a "Fixes:" line, so unify them at the standard 12 characters. Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--cve/published/2020/CVE-2020-36776.json10
-rw-r--r--cve/published/2020/CVE-2020-36776.mbox14
-rw-r--r--cve/published/2021/CVE-2021-46904.json18
-rw-r--r--cve/published/2021/CVE-2021-46904.mbox22
-rw-r--r--cve/published/2021/CVE-2021-46910.json6
-rw-r--r--cve/published/2021/CVE-2021-46910.mbox10
-rw-r--r--cve/published/2021/CVE-2021-46921.json12
-rw-r--r--cve/published/2021/CVE-2021-46921.mbox16
-rw-r--r--cve/published/2021/CVE-2021-46939.json20
-rw-r--r--cve/published/2021/CVE-2021-46939.mbox26
-rw-r--r--cve/published/2021/CVE-2021-46942.json6
-rw-r--r--cve/published/2021/CVE-2021-46942.mbox10
-rw-r--r--cve/published/2021/CVE-2021-46957.json6
-rw-r--r--cve/published/2021/CVE-2021-46957.mbox10
-rw-r--r--cve/published/2021/CVE-2021-46958.json10
-rw-r--r--cve/published/2021/CVE-2021-46958.mbox14
-rw-r--r--cve/published/2021/CVE-2021-46961.json12
-rw-r--r--cve/published/2021/CVE-2021-46961.mbox16
-rw-r--r--cve/published/2021/CVE-2021-46979.json8
-rw-r--r--cve/published/2021/CVE-2021-46979.mbox23
-rw-r--r--cve/published/2021/CVE-2021-46983.json10
-rw-r--r--cve/published/2021/CVE-2021-46983.mbox25
-rw-r--r--cve/published/2021/CVE-2021-46987.json8
-rw-r--r--cve/published/2021/CVE-2021-46987.mbox23
-rw-r--r--cve/published/2021/CVE-2021-46989.json14
-rw-r--r--cve/published/2021/CVE-2021-46989.mbox29
-rw-r--r--cve/published/2021/CVE-2021-46998.json14
-rw-r--r--cve/published/2021/CVE-2021-46998.mbox29
-rw-r--r--cve/published/2021/CVE-2021-47005.json10
-rw-r--r--cve/published/2021/CVE-2021-47005.mbox25
-rw-r--r--cve/published/2021/CVE-2021-47013.json18
-rw-r--r--cve/published/2021/CVE-2021-47013.mbox33
-rw-r--r--cve/published/2021/CVE-2021-47017.json10
-rw-r--r--cve/published/2021/CVE-2021-47017.mbox25
-rw-r--r--cve/published/2021/CVE-2021-47029.json6
-rw-r--r--cve/published/2021/CVE-2021-47029.mbox21
-rw-r--r--cve/published/2021/CVE-2021-47030.json6
-rw-r--r--cve/published/2021/CVE-2021-47030.mbox21
-rw-r--r--cve/published/2021/CVE-2021-47031.json6
-rw-r--r--cve/published/2021/CVE-2021-47031.mbox21
-rw-r--r--cve/published/2021/CVE-2021-47035.json12
-rw-r--r--cve/published/2021/CVE-2021-47035.mbox27
-rw-r--r--cve/published/2021/CVE-2021-47040.json10
-rw-r--r--cve/published/2021/CVE-2021-47040.mbox25
-rw-r--r--cve/published/2021/CVE-2021-47042.json6
-rw-r--r--cve/published/2021/CVE-2021-47042.mbox21
-rw-r--r--cve/published/2021/CVE-2021-47068.json6
-rw-r--r--cve/published/2021/CVE-2021-47068.mbox19
-rw-r--r--cve/published/2021/CVE-2021-47069.json8
-rw-r--r--cve/published/2021/CVE-2021-47069.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47072.json6
-rw-r--r--cve/published/2021/CVE-2021-47072.mbox11
-rw-r--r--cve/published/2021/CVE-2021-47079.json6
-rw-r--r--cve/published/2021/CVE-2021-47079.mbox11
-rw-r--r--cve/published/2021/CVE-2021-47081.json6
-rw-r--r--cve/published/2021/CVE-2021-47081.mbox11
-rw-r--r--cve/published/2021/CVE-2021-47118.json18
-rw-r--r--cve/published/2021/CVE-2021-47118.mbox31
-rw-r--r--cve/published/2021/CVE-2021-47123.json6
-rw-r--r--cve/published/2021/CVE-2021-47123.mbox19
-rw-r--r--cve/published/2021/CVE-2021-47124.json8
-rw-r--r--cve/published/2021/CVE-2021-47124.mbox21
-rw-r--r--cve/published/2021/CVE-2021-47126.json10
-rw-r--r--cve/published/2021/CVE-2021-47126.mbox23
-rw-r--r--cve/published/2021/CVE-2021-47134.json8
-rw-r--r--cve/published/2021/CVE-2021-47134.mbox21
-rw-r--r--cve/published/2021/CVE-2021-47135.json6
-rw-r--r--cve/published/2021/CVE-2021-47135.mbox19
-rw-r--r--cve/published/2021/CVE-2021-47172.json8
-rw-r--r--cve/published/2021/CVE-2021-47172.mbox19
-rw-r--r--cve/published/2021/CVE-2021-47177.json14
-rw-r--r--cve/published/2021/CVE-2021-47177.mbox25
-rw-r--r--cve/published/2023/CVE-2023-52452.json8
-rw-r--r--cve/published/2023/CVE-2023-52452.mbox10
-rw-r--r--cve/published/2023/CVE-2023-52461.json6
-rw-r--r--cve/published/2023/CVE-2023-52461.mbox8
-rw-r--r--cve/published/2024/CVE-2024-26588.json10
-rw-r--r--cve/published/2024/CVE-2024-26588.mbox12
-rw-r--r--cve/published/2024/CVE-2024-26591.json12
-rw-r--r--cve/published/2024/CVE-2024-26591.mbox14
80 files changed, 446 insertions, 711 deletions
diff --git a/cve/published/2020/CVE-2020-36776.json b/cve/published/2020/CVE-2020-36776.json
index 1cdefc57..da04eace 100644
--- a/cve/published/2020/CVE-2020-36776.json
+++ b/cve/published/2020/CVE-2020-36776.json
@@ -18,25 +18,25 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "371a3bc79c11b",
+ "version": "371a3bc79c11",
"lessThan": "c24a20912eef",
"status": "affected",
"versionType": "git"
},
{
- "version": "371a3bc79c11b",
+ "version": "371a3bc79c11",
"lessThan": "876a5f33e5d9",
"status": "affected",
"versionType": "git"
},
{
- "version": "371a3bc79c11b",
+ "version": "371a3bc79c11",
"lessThan": "6bf443acf6ca",
"status": "affected",
"versionType": "git"
},
{
- "version": "371a3bc79c11b",
+ "version": "371a3bc79c11",
"lessThan": "34ab17cc6c2c",
"status": "affected",
"versionType": "git"
@@ -102,7 +102,7 @@
],
"title": "thermal/drivers/cpufreq_cooling: Fix slab OOB issue",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2020/CVE-2020-36776.mbox b/cve/published/2020/CVE-2020-36776.mbox
index 972cc07b..9bd7c964 100644
--- a/cve/published/2020/CVE-2020-36776.mbox
+++ b/cve/published/2020/CVE-2020-36776.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2020-36776: thermal/drivers/cpufreq_cooling: Fix slab OOB issue
@@ -45,12 +45,12 @@ The Linux kernel CVE team has assigned CVE-2020-36776 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.8 with commit 371a3bc79c11b and fixed in 5.10.36 with commit c24a20912eef
- Issue introduced in 5.8 with commit 371a3bc79c11b and fixed in 5.11.20 with commit 876a5f33e5d9
- Issue introduced in 5.8 with commit 371a3bc79c11b and fixed in 5.12.3 with commit 6bf443acf6ca
- Issue introduced in 5.8 with commit 371a3bc79c11b and fixed in 5.13 with commit 34ab17cc6c2c
+ Issue introduced in 5.8 with commit 371a3bc79c11 and fixed in 5.10.36 with commit c24a20912eef
+ Issue introduced in 5.8 with commit 371a3bc79c11 and fixed in 5.11.20 with commit 876a5f33e5d9
+ Issue introduced in 5.8 with commit 371a3bc79c11 and fixed in 5.12.3 with commit 6bf443acf6ca
+ Issue introduced in 5.8 with commit 371a3bc79c11 and fixed in 5.13 with commit 34ab17cc6c2c
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46904.json b/cve/published/2021/CVE-2021-46904.json
index 2b11f90b..4637314f 100644
--- a/cve/published/2021/CVE-2021-46904.json
+++ b/cve/published/2021/CVE-2021-46904.json
@@ -18,49 +18,49 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "72dc1c096c705",
+ "version": "72dc1c096c70",
"lessThan": "a462067d7c8e",
"status": "affected",
"versionType": "git"
},
{
- "version": "72dc1c096c705",
+ "version": "72dc1c096c70",
"lessThan": "145c89c441d2",
"status": "affected",
"versionType": "git"
},
{
- "version": "72dc1c096c705",
+ "version": "72dc1c096c70",
"lessThan": "caf5ac93b3b5",
"status": "affected",
"versionType": "git"
},
{
- "version": "72dc1c096c705",
+ "version": "72dc1c096c70",
"lessThan": "92028d7a31e5",
"status": "affected",
"versionType": "git"
},
{
- "version": "72dc1c096c705",
+ "version": "72dc1c096c70",
"lessThan": "4a2933c88399",
"status": "affected",
"versionType": "git"
},
{
- "version": "72dc1c096c705",
+ "version": "72dc1c096c70",
"lessThan": "dc195928d7e4",
"status": "affected",
"versionType": "git"
},
{
- "version": "72dc1c096c705",
+ "version": "72dc1c096c70",
"lessThan": "388d05f70f1e",
"status": "affected",
"versionType": "git"
},
{
- "version": "72dc1c096c705",
+ "version": "72dc1c096c70",
"lessThan": "8a12f8836145",
"status": "affected",
"versionType": "git"
@@ -162,7 +162,7 @@
],
"title": "net: hso: fix null-ptr-deref during tty device unregistration",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46904.mbox b/cve/published/2021/CVE-2021-46904.mbox
index 5320f882..05036440 100644
--- a/cve/published/2021/CVE-2021-46904.mbox
+++ b/cve/published/2021/CVE-2021-46904.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46904: net: hso: fix null-ptr-deref during tty device unregistration
@@ -33,16 +33,16 @@ The Linux kernel CVE team has assigned CVE-2021-46904 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 2.6.27 with commit 72dc1c096c705 and fixed in 4.4.268 with commit a462067d7c8e
- Issue introduced in 2.6.27 with commit 72dc1c096c705 and fixed in 4.9.268 with commit 145c89c441d2
- Issue introduced in 2.6.27 with commit 72dc1c096c705 and fixed in 4.14.232 with commit caf5ac93b3b5
- Issue introduced in 2.6.27 with commit 72dc1c096c705 and fixed in 4.19.187 with commit 92028d7a31e5
- Issue introduced in 2.6.27 with commit 72dc1c096c705 and fixed in 5.4.112 with commit 4a2933c88399
- Issue introduced in 2.6.27 with commit 72dc1c096c705 and fixed in 5.10.30 with commit dc195928d7e4
- Issue introduced in 2.6.27 with commit 72dc1c096c705 and fixed in 5.11.14 with commit 388d05f70f1e
- Issue introduced in 2.6.27 with commit 72dc1c096c705 and fixed in 5.12 with commit 8a12f8836145
+ Issue introduced in 2.6.27 with commit 72dc1c096c70 and fixed in 4.4.268 with commit a462067d7c8e
+ Issue introduced in 2.6.27 with commit 72dc1c096c70 and fixed in 4.9.268 with commit 145c89c441d2
+ Issue introduced in 2.6.27 with commit 72dc1c096c70 and fixed in 4.14.232 with commit caf5ac93b3b5
+ Issue introduced in 2.6.27 with commit 72dc1c096c70 and fixed in 4.19.187 with commit 92028d7a31e5
+ Issue introduced in 2.6.27 with commit 72dc1c096c70 and fixed in 5.4.112 with commit 4a2933c88399
+ Issue introduced in 2.6.27 with commit 72dc1c096c70 and fixed in 5.10.30 with commit dc195928d7e4
+ Issue introduced in 2.6.27 with commit 72dc1c096c70 and fixed in 5.11.14 with commit 388d05f70f1e
+ Issue introduced in 2.6.27 with commit 72dc1c096c70 and fixed in 5.12 with commit 8a12f8836145
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46910.json b/cve/published/2021/CVE-2021-46910.json
index d56beac6..ed24c060 100644
--- a/cve/published/2021/CVE-2021-46910.json
+++ b/cve/published/2021/CVE-2021-46910.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "2a15ba82fa6ca3f3",
+ "version": "2a15ba82fa6c",
"lessThan": "5965ac11b1d5",
"status": "affected",
"versionType": "git"
},
{
- "version": "2a15ba82fa6ca3f3",
+ "version": "2a15ba82fa6c",
"lessThan": "d624833f5984",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "ARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46910.mbox b/cve/published/2021/CVE-2021-46910.mbox
index 8a67a1c5..f6ef3996 100644
--- a/cve/published/2021/CVE-2021-46910.mbox
+++ b/cve/published/2021/CVE-2021-46910.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46910: ARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled
@@ -56,10 +56,10 @@ The Linux kernel CVE team has assigned CVE-2021-46910 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.11 with commit 2a15ba82fa6ca3f3 and fixed in 5.11.16 with commit 5965ac11b1d5
- Issue introduced in 5.11 with commit 2a15ba82fa6ca3f3 and fixed in 5.12 with commit d624833f5984
+ Issue introduced in 5.11 with commit 2a15ba82fa6c and fixed in 5.11.16 with commit 5965ac11b1d5
+ Issue introduced in 5.11 with commit 2a15ba82fa6c and fixed in 5.12 with commit d624833f5984
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46921.json b/cve/published/2021/CVE-2021-46921.json
index a7097b45..d315029c 100644
--- a/cve/published/2021/CVE-2021-46921.json
+++ b/cve/published/2021/CVE-2021-46921.json
@@ -18,31 +18,31 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "b519b56e378ee",
+ "version": "b519b56e378e",
"lessThan": "5902f9453a31",
"status": "affected",
"versionType": "git"
},
{
- "version": "b519b56e378ee",
+ "version": "b519b56e378e",
"lessThan": "82808cc02681",
"status": "affected",
"versionType": "git"
},
{
- "version": "b519b56e378ee",
+ "version": "b519b56e378e",
"lessThan": "82fa9ced35d8",
"status": "affected",
"versionType": "git"
},
{
- "version": "b519b56e378ee",
+ "version": "b519b56e378e",
"lessThan": "d558fcdb1713",
"status": "affected",
"versionType": "git"
},
{
- "version": "b519b56e378ee",
+ "version": "b519b56e378e",
"lessThan": "84a24bf8c52e",
"status": "affected",
"versionType": "git"
@@ -117,7 +117,7 @@
],
"title": "locking/qrwlock: Fix ordering in queued_write_lock_slowpath()",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46921.mbox b/cve/published/2021/CVE-2021-46921.mbox
index 0534a9cd..74588b14 100644
--- a/cve/published/2021/CVE-2021-46921.mbox
+++ b/cve/published/2021/CVE-2021-46921.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46921: locking/qrwlock: Fix ordering in queued_write_lock_slowpath()
@@ -51,13 +51,13 @@ The Linux kernel CVE team has assigned CVE-2021-46921 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 4.15 with commit b519b56e378ee and fixed in 4.19.189 with commit 5902f9453a31
- Issue introduced in 4.15 with commit b519b56e378ee and fixed in 5.4.115 with commit 82808cc02681
- Issue introduced in 4.15 with commit b519b56e378ee and fixed in 5.10.33 with commit 82fa9ced35d8
- Issue introduced in 4.15 with commit b519b56e378ee and fixed in 5.11.17 with commit d558fcdb1713
- Issue introduced in 4.15 with commit b519b56e378ee and fixed in 5.12 with commit 84a24bf8c52e
+ Issue introduced in 4.15 with commit b519b56e378e and fixed in 4.19.189 with commit 5902f9453a31
+ Issue introduced in 4.15 with commit b519b56e378e and fixed in 5.4.115 with commit 82808cc02681
+ Issue introduced in 4.15 with commit b519b56e378e and fixed in 5.10.33 with commit 82fa9ced35d8
+ Issue introduced in 4.15 with commit b519b56e378e and fixed in 5.11.17 with commit d558fcdb1713
+ Issue introduced in 4.15 with commit b519b56e378e and fixed in 5.12 with commit 84a24bf8c52e
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46939.json b/cve/published/2021/CVE-2021-46939.json
index 3fa6c3b8..50b5b996 100644
--- a/cve/published/2021/CVE-2021-46939.json
+++ b/cve/published/2021/CVE-2021-46939.json
@@ -18,55 +18,55 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "14131f2f98ac3",
+ "version": "14131f2f98ac",
"lessThan": "91ca6f6a91f6",
"status": "affected",
"versionType": "git"
},
{
- "version": "14131f2f98ac3",
+ "version": "14131f2f98ac",
"lessThan": "859b47a43f5a",
"status": "affected",
"versionType": "git"
},
{
- "version": "14131f2f98ac3",
+ "version": "14131f2f98ac",
"lessThan": "1fca00920327",
"status": "affected",
"versionType": "git"
},
{
- "version": "14131f2f98ac3",
+ "version": "14131f2f98ac",
"lessThan": "d43d56dbf452",
"status": "affected",
"versionType": "git"
},
{
- "version": "14131f2f98ac3",
+ "version": "14131f2f98ac",
"lessThan": "c64da3294a7d",
"status": "affected",
"versionType": "git"
},
{
- "version": "14131f2f98ac3",
+ "version": "14131f2f98ac",
"lessThan": "a33614d52e97",
"status": "affected",
"versionType": "git"
},
{
- "version": "14131f2f98ac3",
+ "version": "14131f2f98ac",
"lessThan": "6e2418576228",
"status": "affected",
"versionType": "git"
},
{
- "version": "14131f2f98ac3",
+ "version": "14131f2f98ac",
"lessThan": "2a1bd74b8186",
"status": "affected",
"versionType": "git"
},
{
- "version": "14131f2f98ac3",
+ "version": "14131f2f98ac",
"lessThan": "aafe104aa909",
"status": "affected",
"versionType": "git"
@@ -177,7 +177,7 @@
],
"title": "tracing: Restructure trace_clock_global() to never block",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46939.mbox b/cve/published/2021/CVE-2021-46939.mbox
index 14d217ba..d73b70ca 100644
--- a/cve/published/2021/CVE-2021-46939.mbox
+++ b/cve/published/2021/CVE-2021-46939.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46939: tracing: Restructure trace_clock_global() to never block
@@ -79,17 +79,17 @@ The Linux kernel CVE team has assigned CVE-2021-46939 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 2.6.30 with commit 14131f2f98ac3 and fixed in 4.4.269 with commit 91ca6f6a91f6
- Issue introduced in 2.6.30 with commit 14131f2f98ac3 and fixed in 4.9.269 with commit 859b47a43f5a
- Issue introduced in 2.6.30 with commit 14131f2f98ac3 and fixed in 4.14.233 with commit 1fca00920327
- Issue introduced in 2.6.30 with commit 14131f2f98ac3 and fixed in 4.19.191 with commit d43d56dbf452
- Issue introduced in 2.6.30 with commit 14131f2f98ac3 and fixed in 5.4.118 with commit c64da3294a7d
- Issue introduced in 2.6.30 with commit 14131f2f98ac3 and fixed in 5.10.36 with commit a33614d52e97
- Issue introduced in 2.6.30 with commit 14131f2f98ac3 and fixed in 5.11.20 with commit 6e2418576228
- Issue introduced in 2.6.30 with commit 14131f2f98ac3 and fixed in 5.12.3 with commit 2a1bd74b8186
- Issue introduced in 2.6.30 with commit 14131f2f98ac3 and fixed in 5.13 with commit aafe104aa909
-
-Please see https://www.kernel.org or a full list of currently supported
+ Issue introduced in 2.6.30 with commit 14131f2f98ac and fixed in 4.4.269 with commit 91ca6f6a91f6
+ Issue introduced in 2.6.30 with commit 14131f2f98ac and fixed in 4.9.269 with commit 859b47a43f5a
+ Issue introduced in 2.6.30 with commit 14131f2f98ac and fixed in 4.14.233 with commit 1fca00920327
+ Issue introduced in 2.6.30 with commit 14131f2f98ac and fixed in 4.19.191 with commit d43d56dbf452
+ Issue introduced in 2.6.30 with commit 14131f2f98ac and fixed in 5.4.118 with commit c64da3294a7d
+ Issue introduced in 2.6.30 with commit 14131f2f98ac and fixed in 5.10.36 with commit a33614d52e97
+ Issue introduced in 2.6.30 with commit 14131f2f98ac and fixed in 5.11.20 with commit 6e2418576228
+ Issue introduced in 2.6.30 with commit 14131f2f98ac and fixed in 5.12.3 with commit 2a1bd74b8186
+ Issue introduced in 2.6.30 with commit 14131f2f98ac and fixed in 5.13 with commit aafe104aa909
+
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46942.json b/cve/published/2021/CVE-2021-46942.json
index 0a981c4b..ed59a7c7 100644
--- a/cve/published/2021/CVE-2021-46942.json
+++ b/cve/published/2021/CVE-2021-46942.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "37d1e2e3642e2",
+ "version": "37d1e2e3642e",
"lessThan": "cb5e0b3d0f99",
"status": "affected",
"versionType": "git"
},
{
- "version": "37d1e2e3642e2",
+ "version": "37d1e2e3642e",
"lessThan": "734551df6f9b",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "io_uring: fix shared sqpoll cancellation hangs",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46942.mbox b/cve/published/2021/CVE-2021-46942.mbox
index f5f7a898..28f4cc54 100644
--- a/cve/published/2021/CVE-2021-46942.mbox
+++ b/cve/published/2021/CVE-2021-46942.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46942: io_uring: fix shared sqpoll cancellation hangs
@@ -38,10 +38,10 @@ The Linux kernel CVE team has assigned CVE-2021-46942 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.12 with commit 37d1e2e3642e2 and fixed in 5.12.3 with commit cb5e0b3d0f99
- Issue introduced in 5.12 with commit 37d1e2e3642e2 and fixed in 5.13 with commit 734551df6f9b
+ Issue introduced in 5.12 with commit 37d1e2e3642e and fixed in 5.12.3 with commit cb5e0b3d0f99
+ Issue introduced in 5.12 with commit 37d1e2e3642e and fixed in 5.13 with commit 734551df6f9b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46957.json b/cve/published/2021/CVE-2021-46957.json
index 83257953..e4f87fd8 100644
--- a/cve/published/2021/CVE-2021-46957.json
+++ b/cve/published/2021/CVE-2021-46957.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "c22b0bcb1dd02",
+ "version": "c22b0bcb1dd0",
"lessThan": "fd0f06590d35",
"status": "affected",
"versionType": "git"
},
{
- "version": "c22b0bcb1dd02",
+ "version": "c22b0bcb1dd0",
"lessThan": "b1ebaa0e1318",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46957.mbox b/cve/published/2021/CVE-2021-46957.mbox
index d6af82ae..fb676868 100644
--- a/cve/published/2021/CVE-2021-46957.mbox
+++ b/cve/published/2021/CVE-2021-46957.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46957: riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe
@@ -98,10 +98,10 @@ The Linux kernel CVE team has assigned CVE-2021-46957 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.12 with commit c22b0bcb1dd02 and fixed in 5.12.3 with commit fd0f06590d35
- Issue introduced in 5.12 with commit c22b0bcb1dd02 and fixed in 5.13 with commit b1ebaa0e1318
+ Issue introduced in 5.12 with commit c22b0bcb1dd0 and fixed in 5.12.3 with commit fd0f06590d35
+ Issue introduced in 5.12 with commit c22b0bcb1dd0 and fixed in 5.13 with commit b1ebaa0e1318
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46958.json b/cve/published/2021/CVE-2021-46958.json
index 5d7a378c..431aaae8 100644
--- a/cve/published/2021/CVE-2021-46958.json
+++ b/cve/published/2021/CVE-2021-46958.json
@@ -18,25 +18,25 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "ef67963dac255b",
+ "version": "ef67963dac25",
"lessThan": "a4794be7b00b",
"status": "affected",
"versionType": "git"
},
{
- "version": "ef67963dac255b",
+ "version": "ef67963dac25",
"lessThan": "633f7f216663",
"status": "affected",
"versionType": "git"
},
{
- "version": "ef67963dac255b",
+ "version": "ef67963dac25",
"lessThan": "e2da98788369",
"status": "affected",
"versionType": "git"
},
{
- "version": "ef67963dac255b",
+ "version": "ef67963dac25",
"lessThan": "061dde824535",
"status": "affected",
"versionType": "git"
@@ -102,7 +102,7 @@
],
"title": "btrfs: fix race between transaction aborts and fsyncs leading to use-after-free",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46958.mbox b/cve/published/2021/CVE-2021-46958.mbox
index feeaa1e3..58dd6796 100644
--- a/cve/published/2021/CVE-2021-46958.mbox
+++ b/cve/published/2021/CVE-2021-46958.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46958: btrfs: fix race between transaction aborts and fsyncs leading to use-after-free
@@ -121,12 +121,12 @@ The Linux kernel CVE team has assigned CVE-2021-46958 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.7 with commit ef67963dac255b and fixed in 5.10.36 with commit a4794be7b00b
- Issue introduced in 5.7 with commit ef67963dac255b and fixed in 5.11.20 with commit 633f7f216663
- Issue introduced in 5.7 with commit ef67963dac255b and fixed in 5.12.3 with commit e2da98788369
- Issue introduced in 5.7 with commit ef67963dac255b and fixed in 5.13 with commit 061dde824535
+ Issue introduced in 5.7 with commit ef67963dac25 and fixed in 5.10.36 with commit a4794be7b00b
+ Issue introduced in 5.7 with commit ef67963dac25 and fixed in 5.11.20 with commit 633f7f216663
+ Issue introduced in 5.7 with commit ef67963dac25 and fixed in 5.12.3 with commit e2da98788369
+ Issue introduced in 5.7 with commit ef67963dac25 and fixed in 5.13 with commit 061dde824535
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46961.json b/cve/published/2021/CVE-2021-46961.json
index 14254a05..5170531e 100644
--- a/cve/published/2021/CVE-2021-46961.json
+++ b/cve/published/2021/CVE-2021-46961.json
@@ -18,31 +18,31 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "rewrote",
+ "version": "",
"lessThan": "e7ea8e46e3b7",
"status": "affected",
"versionType": "git"
},
{
- "version": "rewrote",
+ "version": "",
"lessThan": "7be4db5c2b59",
"status": "affected",
"versionType": "git"
},
{
- "version": "rewrote",
+ "version": "",
"lessThan": "ea817ac1014c",
"status": "affected",
"versionType": "git"
},
{
- "version": "rewrote",
+ "version": "",
"lessThan": "3f72d3709f53",
"status": "affected",
"versionType": "git"
},
{
- "version": "rewrote",
+ "version": "",
"lessThan": "a97709f563a0",
"status": "affected",
"versionType": "git"
@@ -117,7 +117,7 @@
],
"title": "irqchip/gic-v3: Do not enable irqs when handling spurious interrups",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46961.mbox b/cve/published/2021/CVE-2021-46961.mbox
index 971825b8..7b0852a8 100644
--- a/cve/published/2021/CVE-2021-46961.mbox
+++ b/cve/published/2021/CVE-2021-46961.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46961: irqchip/gic-v3: Do not enable irqs when handling spurious interrups
@@ -90,13 +90,13 @@ The Linux kernel CVE team has assigned CVE-2021-46961 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.1 with commit rewrote and fixed in 5.4.118 with commit e7ea8e46e3b7
- Issue introduced in 5.1 with commit rewrote and fixed in 5.10.36 with commit 7be4db5c2b59
- Issue introduced in 5.1 with commit rewrote and fixed in 5.11.20 with commit ea817ac1014c
- Issue introduced in 5.1 with commit rewrote and fixed in 5.12.3 with commit 3f72d3709f53
- Issue introduced in 5.1 with commit rewrote and fixed in 5.13 with commit a97709f563a0
+ Issue introduced in 5.1 with commit and fixed in 5.4.118 with commit e7ea8e46e3b7
+ Issue introduced in 5.1 with commit and fixed in 5.10.36 with commit 7be4db5c2b59
+ Issue introduced in 5.1 with commit and fixed in 5.11.20 with commit ea817ac1014c
+ Issue introduced in 5.1 with commit and fixed in 5.12.3 with commit 3f72d3709f53
+ Issue introduced in 5.1 with commit and fixed in 5.13 with commit a97709f563a0
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46979.json b/cve/published/2021/CVE-2021-46979.json
index 07d76f4c..d6abfa0a 100644
--- a/cve/published/2021/CVE-2021-46979.json
+++ b/cve/published/2021/CVE-2021-46979.json
@@ -18,19 +18,19 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "8dedcc3eee3ac",
+ "version": "8dedcc3eee3a",
"lessThan": "11e1cae5da40",
"status": "affected",
"versionType": "git"
},
{
- "version": "8dedcc3eee3ac",
+ "version": "8dedcc3eee3a",
"lessThan": "ab6c935ba3a0",
"status": "affected",
"versionType": "git"
},
{
- "version": "8dedcc3eee3ac",
+ "version": "8dedcc3eee3a",
"lessThan": "901f84de0e16",
"status": "affected",
"versionType": "git"
@@ -87,7 +87,7 @@
],
"title": "iio: core: fix ioctl handlers removal",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46979.mbox b/cve/published/2021/CVE-2021-46979.mbox
index c615cd46..ab1de714 100644
--- a/cve/published/2021/CVE-2021-46979.mbox
+++ b/cve/published/2021/CVE-2021-46979.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46979: iio: core: fix ioctl handlers removal
-Message-Id: <2024022823-CVE-2021-46979-de90@gregkh>
-Content-Length: 2136
-Lines: 56
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2193;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=x91Q+6TBdYbKs2UfaSQcRRFUFeyEzbv1X7ucriPLcFs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XsfL+1x/tDSB9w3/hfg7WecSa2fktFr8ZVVbrjK1u
- ynkWjpDRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExk60eG+TkvK4RV9q560n9Y
- 8NiV1ZVy6X6fZzLM4T+5KSBOvMn5R+CitNt5euVdk7/bAgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -37,11 +26,11 @@ The Linux kernel CVE team has assigned CVE-2021-46979 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.11 with commit 8dedcc3eee3ac and fixed in 5.11.22 with commit 11e1cae5da40
- Issue introduced in 5.11 with commit 8dedcc3eee3ac and fixed in 5.12.5 with commit ab6c935ba3a0
- Issue introduced in 5.11 with commit 8dedcc3eee3ac and fixed in 5.13 with commit 901f84de0e16
+ Issue introduced in 5.11 with commit 8dedcc3eee3a and fixed in 5.11.22 with commit 11e1cae5da40
+ Issue introduced in 5.11 with commit 8dedcc3eee3a and fixed in 5.12.5 with commit ab6c935ba3a0
+ Issue introduced in 5.11 with commit 8dedcc3eee3a and fixed in 5.13 with commit 901f84de0e16
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46983.json b/cve/published/2021/CVE-2021-46983.json
index 7be7656b..183984f9 100644
--- a/cve/published/2021/CVE-2021-46983.json
+++ b/cve/published/2021/CVE-2021-46983.json
@@ -18,25 +18,25 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "ca0f1a8055be2",
+ "version": "ca0f1a8055be",
"lessThan": "64f3410c7bfc",
"status": "affected",
"versionType": "git"
},
{
- "version": "ca0f1a8055be2",
+ "version": "ca0f1a8055be",
"lessThan": "17fb6dfa5162",
"status": "affected",
"versionType": "git"
},
{
- "version": "ca0f1a8055be2",
+ "version": "ca0f1a8055be",
"lessThan": "5bdb34466ad8",
"status": "affected",
"versionType": "git"
},
{
- "version": "ca0f1a8055be2",
+ "version": "ca0f1a8055be",
"lessThan": "8cc365f9559b",
"status": "affected",
"versionType": "git"
@@ -102,7 +102,7 @@
],
"title": "nvmet-rdma: Fix NULL deref when SEND is completed with error",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46983.mbox b/cve/published/2021/CVE-2021-46983.mbox
index b0aec1c5..26850442 100644
--- a/cve/published/2021/CVE-2021-46983.mbox
+++ b/cve/published/2021/CVE-2021-46983.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46983: nvmet-rdma: Fix NULL deref when SEND is completed with error
-Message-Id: <2024022824-CVE-2021-46983-f808@gregkh>
-Content-Length: 4390
-Lines: 87
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4478;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=mgUsAFnBu9HFFzK5MizTmwfv+R6Bl+X6FRvurNflkIw=;
- b=kA0DAAIRMUfUDdst+ykByyZiAGXe62CgftguP0ZBnlGmCP41isbjEDbeW6WmM38Usla1a+7Gn
- 4hdBAARAgAdFiEE9LYMxb94wiFKMT3LMUfUDdst+ykFAmXe62AACgkQMUfUDdst+ym/3ACgxXIi
- hoOeIia2NSkiZS0B6WS+gzgAoNlkVZvc3RGnMy2NlzWou0Erri5b
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -66,12 +55,12 @@ The Linux kernel CVE team has assigned CVE-2021-46983 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.9 with commit ca0f1a8055be2 and fixed in 5.10.38 with commit 64f3410c7bfc
- Issue introduced in 5.9 with commit ca0f1a8055be2 and fixed in 5.11.22 with commit 17fb6dfa5162
- Issue introduced in 5.9 with commit ca0f1a8055be2 and fixed in 5.12.5 with commit 5bdb34466ad8
- Issue introduced in 5.9 with commit ca0f1a8055be2 and fixed in 5.13 with commit 8cc365f9559b
+ Issue introduced in 5.9 with commit ca0f1a8055be and fixed in 5.10.38 with commit 64f3410c7bfc
+ Issue introduced in 5.9 with commit ca0f1a8055be and fixed in 5.11.22 with commit 17fb6dfa5162
+ Issue introduced in 5.9 with commit ca0f1a8055be and fixed in 5.12.5 with commit 5bdb34466ad8
+ Issue introduced in 5.9 with commit ca0f1a8055be and fixed in 5.13 with commit 8cc365f9559b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46987.json b/cve/published/2021/CVE-2021-46987.json
index fa331331..1ac69f53 100644
--- a/cve/published/2021/CVE-2021-46987.json
+++ b/cve/published/2021/CVE-2021-46987.json
@@ -18,19 +18,19 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "c53e9653605dbf",
+ "version": "c53e9653605d",
"lessThan": "d5347827d0b4",
"status": "affected",
"versionType": "git"
},
{
- "version": "c53e9653605dbf",
+ "version": "c53e9653605d",
"lessThan": "96157707c042",
"status": "affected",
"versionType": "git"
},
{
- "version": "c53e9653605dbf",
+ "version": "c53e9653605d",
"lessThan": "f9baa501b4fd",
"status": "affected",
"versionType": "git"
@@ -87,7 +87,7 @@
],
"title": "btrfs: fix deadlock when cloning inline extents and using qgroups",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46987.mbox b/cve/published/2021/CVE-2021-46987.mbox
index ed60cec4..c97e61a7 100644
--- a/cve/published/2021/CVE-2021-46987.mbox
+++ b/cve/published/2021/CVE-2021-46987.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46987: btrfs: fix deadlock when cloning inline extents and using qgroups
-Message-Id: <2024022825-CVE-2021-46987-f73f@gregkh>
-Content-Length: 8333
-Lines: 181
-X-Developer-Signature: v=1; a=openpgp-sha256; l=8515;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=e6IMZ+I8CbLXJZAhdjIbdYU8VTmETUVseUGAJCzXypU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xicet6mbGJkswdNWW2gj7xgcsWKioOLTHQcU6lsLl
- tx4kpbREcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABN5sIdhwYnIGJO5U03N+ab2
- pPF61RmX7C1YyDC/JPGn1ul91vVBrCd9thwqfC0hkHMBAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -158,11 +147,11 @@ The Linux kernel CVE team has assigned CVE-2021-46987 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.9 with commit c53e9653605dbf and fixed in 5.11.22 with commit d5347827d0b4
- Issue introduced in 5.9 with commit c53e9653605dbf and fixed in 5.12.5 with commit 96157707c042
- Issue introduced in 5.9 with commit c53e9653605dbf and fixed in 5.13 with commit f9baa501b4fd
+ Issue introduced in 5.9 with commit c53e9653605d and fixed in 5.11.22 with commit d5347827d0b4
+ Issue introduced in 5.9 with commit c53e9653605d and fixed in 5.12.5 with commit 96157707c042
+ Issue introduced in 5.9 with commit c53e9653605d and fixed in 5.13 with commit f9baa501b4fd
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46989.json b/cve/published/2021/CVE-2021-46989.json
index 59ad71e7..14973c36 100644
--- a/cve/published/2021/CVE-2021-46989.json
+++ b/cve/published/2021/CVE-2021-46989.json
@@ -18,37 +18,37 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "31651c607151f",
+ "version": "31651c607151",
"lessThan": "52dde855663e",
"status": "affected",
"versionType": "git"
},
{
- "version": "31651c607151f",
+ "version": "31651c607151",
"lessThan": "c451a6bafb5f",
"status": "affected",
"versionType": "git"
},
{
- "version": "31651c607151f",
+ "version": "31651c607151",
"lessThan": "adbd8a2a8cc0",
"status": "affected",
"versionType": "git"
},
{
- "version": "31651c607151f",
+ "version": "31651c607151",
"lessThan": "c477f62db1a0",
"status": "affected",
"versionType": "git"
},
{
- "version": "31651c607151f",
+ "version": "31651c607151",
"lessThan": "97314e45aa12",
"status": "affected",
"versionType": "git"
},
{
- "version": "31651c607151f",
+ "version": "31651c607151",
"lessThan": "c3187cf32216",
"status": "affected",
"versionType": "git"
@@ -132,7 +132,7 @@
],
"title": "hfsplus: prevent corruption in shrinking truncate",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46989.mbox b/cve/published/2021/CVE-2021-46989.mbox
index 2325da7f..26d012af 100644
--- a/cve/published/2021/CVE-2021-46989.mbox
+++ b/cve/published/2021/CVE-2021-46989.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46989: hfsplus: prevent corruption in shrinking truncate
-Message-Id: <2024022825-CVE-2021-46989-8377@gregkh>
-Content-Length: 4371
-Lines: 91
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4463;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=BlgBj4K4HHqhtiLCvNutUWEeYmYLFvvPnCKdiApwqEY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XieG1zZtWxao863vxwyfHAlL5/+txlE7WnfM/3Fwn
- sGe32I/O2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAi6W4M8109XD9Fmil8ffuq
- tDFijdzeVx/eajMsWPOhyivzz+Jr9/bl6E750yZeUKs6HQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -66,14 +55,14 @@ The Linux kernel CVE team has assigned CVE-2021-46989 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 4.19 with commit 31651c607151f and fixed in 4.19.191 with commit 52dde855663e
- Issue introduced in 4.19 with commit 31651c607151f and fixed in 5.4.120 with commit c451a6bafb5f
- Issue introduced in 4.19 with commit 31651c607151f and fixed in 5.10.38 with commit adbd8a2a8cc0
- Issue introduced in 4.19 with commit 31651c607151f and fixed in 5.11.22 with commit c477f62db1a0
- Issue introduced in 4.19 with commit 31651c607151f and fixed in 5.12.5 with commit 97314e45aa12
- Issue introduced in 4.19 with commit 31651c607151f and fixed in 5.13 with commit c3187cf32216
+ Issue introduced in 4.19 with commit 31651c607151 and fixed in 4.19.191 with commit 52dde855663e
+ Issue introduced in 4.19 with commit 31651c607151 and fixed in 5.4.120 with commit c451a6bafb5f
+ Issue introduced in 4.19 with commit 31651c607151 and fixed in 5.10.38 with commit adbd8a2a8cc0
+ Issue introduced in 4.19 with commit 31651c607151 and fixed in 5.11.22 with commit c477f62db1a0
+ Issue introduced in 4.19 with commit 31651c607151 and fixed in 5.12.5 with commit 97314e45aa12
+ Issue introduced in 4.19 with commit 31651c607151 and fixed in 5.13 with commit c3187cf32216
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46998.json b/cve/published/2021/CVE-2021-46998.json
index 4a9fcc0e..80409a09 100644
--- a/cve/published/2021/CVE-2021-46998.json
+++ b/cve/published/2021/CVE-2021-46998.json
@@ -18,37 +18,37 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "fb7516d42478e",
+ "version": "fb7516d42478",
"lessThan": "25a87b1f566b",
"status": "affected",
"versionType": "git"
},
{
- "version": "fb7516d42478e",
+ "version": "fb7516d42478",
"lessThan": "f7f6f0777409",
"status": "affected",
"versionType": "git"
},
{
- "version": "fb7516d42478e",
+ "version": "fb7516d42478",
"lessThan": "7afdd6aba95c",
"status": "affected",
"versionType": "git"
},
{
- "version": "fb7516d42478e",
+ "version": "fb7516d42478",
"lessThan": "6892396ebf04",
"status": "affected",
"versionType": "git"
},
{
- "version": "fb7516d42478e",
+ "version": "fb7516d42478",
"lessThan": "d90529392aaf",
"status": "affected",
"versionType": "git"
},
{
- "version": "fb7516d42478e",
+ "version": "fb7516d42478",
"lessThan": "643001b47adc",
"status": "affected",
"versionType": "git"
@@ -132,7 +132,7 @@
],
"title": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46998.mbox b/cve/published/2021/CVE-2021-46998.mbox
index 25cbbad9..0b8db56e 100644
--- a/cve/published/2021/CVE-2021-46998.mbox
+++ b/cve/published/2021/CVE-2021-46998.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46998: ethernet:enic: Fix a use after free bug in enic_hard_start_xmit
-Message-Id: <2024022827-CVE-2021-46998-eda2@gregkh>
-Content-Length: 2692
-Lines: 62
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2755;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Ub+4/VpmMIhLpEb8HS5l1log4UR3uGQOUCBlL1WcJJs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xifz1Le/ZG465MzLuOXc8v19Uq5paz0mZ9w9c4qlU
- rQw4/vNjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZiI0y+GWczv6o/a3J/FoR84
- f1uhg0DjnNzbLxjmCtn5vJMP+S3zXG3xDmEj5RfN2yImAgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -37,14 +26,14 @@ The Linux kernel CVE team has assigned CVE-2021-46998 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 4.16 with commit fb7516d42478e and fixed in 4.19.191 with commit 25a87b1f566b
- Issue introduced in 4.16 with commit fb7516d42478e and fixed in 5.4.120 with commit f7f6f0777409
- Issue introduced in 4.16 with commit fb7516d42478e and fixed in 5.10.38 with commit 7afdd6aba95c
- Issue introduced in 4.16 with commit fb7516d42478e and fixed in 5.11.22 with commit 6892396ebf04
- Issue introduced in 4.16 with commit fb7516d42478e and fixed in 5.12.5 with commit d90529392aaf
- Issue introduced in 4.16 with commit fb7516d42478e and fixed in 5.13 with commit 643001b47adc
+ Issue introduced in 4.16 with commit fb7516d42478 and fixed in 4.19.191 with commit 25a87b1f566b
+ Issue introduced in 4.16 with commit fb7516d42478 and fixed in 5.4.120 with commit f7f6f0777409
+ Issue introduced in 4.16 with commit fb7516d42478 and fixed in 5.10.38 with commit 7afdd6aba95c
+ Issue introduced in 4.16 with commit fb7516d42478 and fixed in 5.11.22 with commit 6892396ebf04
+ Issue introduced in 4.16 with commit fb7516d42478 and fixed in 5.12.5 with commit d90529392aaf
+ Issue introduced in 4.16 with commit fb7516d42478 and fixed in 5.13 with commit 643001b47adc
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47005.json b/cve/published/2021/CVE-2021-47005.json
index 9d8aa699..3ba04765 100644
--- a/cve/published/2021/CVE-2021-47005.json
+++ b/cve/published/2021/CVE-2021-47005.json
@@ -18,25 +18,25 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "2c04c5b8eef79",
+ "version": "2c04c5b8eef7",
"lessThan": "bbed83d7060e",
"status": "affected",
"versionType": "git"
},
{
- "version": "2c04c5b8eef79",
+ "version": "2c04c5b8eef7",
"lessThan": "679ebad058b8",
"status": "affected",
"versionType": "git"
},
{
- "version": "2c04c5b8eef79",
+ "version": "2c04c5b8eef7",
"lessThan": "0169d4f0bee4",
"status": "affected",
"versionType": "git"
},
{
- "version": "2c04c5b8eef79",
+ "version": "2c04c5b8eef7",
"lessThan": "6613bc2301ba",
"status": "affected",
"versionType": "git"
@@ -102,7 +102,7 @@
],
"title": "PCI: endpoint: Fix NULL pointer dereference for ->get_features()",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47005.mbox b/cve/published/2021/CVE-2021-47005.mbox
index 0e63b18c..ee976084 100644
--- a/cve/published/2021/CVE-2021-47005.mbox
+++ b/cve/published/2021/CVE-2021-47005.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47005: PCI: endpoint: Fix NULL pointer dereference for ->get_features()
-Message-Id: <2024022829-CVE-2021-47005-8f88@gregkh>
-Content-Length: 2822
-Lines: 73
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2896;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=bTDfRlhFrREOX9eIxA3h3yMaAG0a1peB+oR0K+Zwhas=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XqcuT9mzOlzIRF0zq//NY7uiDLYwjvUbVu514Ga81
- mGkd0SoI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACZi1cgwV5ox/FlniIYQy01m
- PfvFunZXL0xwY5jv9dVOU3Wx0a4QGc5ze8z/Ol5iYlkJAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -52,12 +41,12 @@ The Linux kernel CVE team has assigned CVE-2021-47005 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.1 with commit 2c04c5b8eef79 and fixed in 5.10.38 with commit bbed83d7060e
- Issue introduced in 5.1 with commit 2c04c5b8eef79 and fixed in 5.11.22 with commit 679ebad058b8
- Issue introduced in 5.1 with commit 2c04c5b8eef79 and fixed in 5.12.5 with commit 0169d4f0bee4
- Issue introduced in 5.1 with commit 2c04c5b8eef79 and fixed in 5.13 with commit 6613bc2301ba
+ Issue introduced in 5.1 with commit 2c04c5b8eef7 and fixed in 5.10.38 with commit bbed83d7060e
+ Issue introduced in 5.1 with commit 2c04c5b8eef7 and fixed in 5.11.22 with commit 679ebad058b8
+ Issue introduced in 5.1 with commit 2c04c5b8eef7 and fixed in 5.12.5 with commit 0169d4f0bee4
+ Issue introduced in 5.1 with commit 2c04c5b8eef7 and fixed in 5.13 with commit 6613bc2301ba
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47013.json b/cve/published/2021/CVE-2021-47013.json
index cc1cafdd..a73f6f3e 100644
--- a/cve/published/2021/CVE-2021-47013.json
+++ b/cve/published/2021/CVE-2021-47013.json
@@ -18,49 +18,49 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "b9b17debc69d2",
+ "version": "b9b17debc69d",
"lessThan": "c7f75d11fe72",
"status": "affected",
"versionType": "git"
},
{
- "version": "b9b17debc69d2",
+ "version": "b9b17debc69d",
"lessThan": "dc1b438a3577",
"status": "affected",
"versionType": "git"
},
{
- "version": "b9b17debc69d2",
+ "version": "b9b17debc69d",
"lessThan": "16d8c44be52e",
"status": "affected",
"versionType": "git"
},
{
- "version": "b9b17debc69d2",
+ "version": "b9b17debc69d",
"lessThan": "55fcdd1258fa",
"status": "affected",
"versionType": "git"
},
{
- "version": "b9b17debc69d2",
+ "version": "b9b17debc69d",
"lessThan": "9dc373f74097",
"status": "affected",
"versionType": "git"
},
{
- "version": "b9b17debc69d2",
+ "version": "b9b17debc69d",
"lessThan": "8c06f3478506",
"status": "affected",
"versionType": "git"
},
{
- "version": "b9b17debc69d2",
+ "version": "b9b17debc69d",
"lessThan": "e407495ba678",
"status": "affected",
"versionType": "git"
},
{
- "version": "b9b17debc69d2",
+ "version": "b9b17debc69d",
"lessThan": "6d72e7c767ac",
"status": "affected",
"versionType": "git"
@@ -162,7 +162,7 @@
],
"title": "net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47013.mbox b/cve/published/2021/CVE-2021-47013.mbox
index 3df97b67..f5043572 100644
--- a/cve/published/2021/CVE-2021-47013.mbox
+++ b/cve/published/2021/CVE-2021-47013.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47013: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send
-Message-Id: <2024022831-CVE-2021-47013-034a@gregkh>
-Content-Length: 3113
-Lines: 66
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3180;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=SXf4GSMepNOuhkvnUV4YxhDv5hdo9Fpt/DcnaLog23U=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xqcv8ylOV7v1i+O14/HLU76y/1g3vyLXPGrG+lmnz
- m1uPt8r2hHLwiDIxCArpsjyZRvP0f0VhxS9DG1Pw8xhZQIZwsDFKQATOarJsODUX9U5LWn+Up+r
- 3GMdJSsOzbJjfcAwP005JnTWXPmHzLpqzxN2l0ZyK29LAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -37,16 +26,16 @@ The Linux kernel CVE team has assigned CVE-2021-47013 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 4.9 with commit b9b17debc69d2 and fixed in 4.9.269 with commit c7f75d11fe72
- Issue introduced in 4.9 with commit b9b17debc69d2 and fixed in 4.14.233 with commit dc1b438a3577
- Issue introduced in 4.9 with commit b9b17debc69d2 and fixed in 4.19.191 with commit 16d8c44be52e
- Issue introduced in 4.9 with commit b9b17debc69d2 and fixed in 5.4.119 with commit 55fcdd1258fa
- Issue introduced in 4.9 with commit b9b17debc69d2 and fixed in 5.10.37 with commit 9dc373f74097
- Issue introduced in 4.9 with commit b9b17debc69d2 and fixed in 5.11.21 with commit 8c06f3478506
- Issue introduced in 4.9 with commit b9b17debc69d2 and fixed in 5.12.4 with commit e407495ba678
- Issue introduced in 4.9 with commit b9b17debc69d2 and fixed in 5.13 with commit 6d72e7c767ac
+ Issue introduced in 4.9 with commit b9b17debc69d and fixed in 4.9.269 with commit c7f75d11fe72
+ Issue introduced in 4.9 with commit b9b17debc69d and fixed in 4.14.233 with commit dc1b438a3577
+ Issue introduced in 4.9 with commit b9b17debc69d and fixed in 4.19.191 with commit 16d8c44be52e
+ Issue introduced in 4.9 with commit b9b17debc69d and fixed in 5.4.119 with commit 55fcdd1258fa
+ Issue introduced in 4.9 with commit b9b17debc69d and fixed in 5.10.37 with commit 9dc373f74097
+ Issue introduced in 4.9 with commit b9b17debc69d and fixed in 5.11.21 with commit 8c06f3478506
+ Issue introduced in 4.9 with commit b9b17debc69d and fixed in 5.12.4 with commit e407495ba678
+ Issue introduced in 4.9 with commit b9b17debc69d and fixed in 5.13 with commit 6d72e7c767ac
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47017.json b/cve/published/2021/CVE-2021-47017.json
index 533466ea..86bbb796 100644
--- a/cve/published/2021/CVE-2021-47017.json
+++ b/cve/published/2021/CVE-2021-47017.json
@@ -18,25 +18,25 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "c8334512f3dd1",
+ "version": "c8334512f3dd",
"lessThan": "8bb054fb336f",
"status": "affected",
"versionType": "git"
},
{
- "version": "c8334512f3dd1",
+ "version": "c8334512f3dd",
"lessThan": "3b1ac40c6012",
"status": "affected",
"versionType": "git"
},
{
- "version": "c8334512f3dd1",
+ "version": "c8334512f3dd",
"lessThan": "5e413c0831ff",
"status": "affected",
"versionType": "git"
},
{
- "version": "c8334512f3dd1",
+ "version": "c8334512f3dd",
"lessThan": "8392df5d7e0b",
"status": "affected",
"versionType": "git"
@@ -102,7 +102,7 @@
],
"title": "ath10k: Fix a use after free in ath10k_htc_send_bundle",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47017.mbox b/cve/published/2021/CVE-2021-47017.mbox
index 2a8ae464..1adeb850 100644
--- a/cve/published/2021/CVE-2021-47017.mbox
+++ b/cve/published/2021/CVE-2021-47017.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47017: ath10k: Fix a use after free in ath10k_htc_send_bundle
-Message-Id: <2024022832-CVE-2021-47017-c3e8@gregkh>
-Content-Length: 2207
-Lines: 56
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2264;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=qdLfhkeCxma8EUf9akoqa8JtxT+TgBWBYSRCBds1464=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XmfcXfxzgr5t2oX0jhQBG9M7jYKXa9Y9ehIdyKXx9
- 1BI8PUZHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjARodsM85QOM+tcW9b6qC9Y
- 3lh0T/JKx007JjPMz1K3mPqSd3FSyLPQWT+qv97xXrFhGgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -35,12 +24,12 @@ The Linux kernel CVE team has assigned CVE-2021-47017 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.8 with commit c8334512f3dd1 and fixed in 5.10.37 with commit 8bb054fb336f
- Issue introduced in 5.8 with commit c8334512f3dd1 and fixed in 5.11.21 with commit 3b1ac40c6012
- Issue introduced in 5.8 with commit c8334512f3dd1 and fixed in 5.12.4 with commit 5e413c0831ff
- Issue introduced in 5.8 with commit c8334512f3dd1 and fixed in 5.13 with commit 8392df5d7e0b
+ Issue introduced in 5.8 with commit c8334512f3dd and fixed in 5.10.37 with commit 8bb054fb336f
+ Issue introduced in 5.8 with commit c8334512f3dd and fixed in 5.11.21 with commit 3b1ac40c6012
+ Issue introduced in 5.8 with commit c8334512f3dd and fixed in 5.12.4 with commit 5e413c0831ff
+ Issue introduced in 5.8 with commit c8334512f3dd and fixed in 5.13 with commit 8392df5d7e0b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47029.json b/cve/published/2021/CVE-2021-47029.json
index d19dbf77..f6a951ed 100644
--- a/cve/published/2021/CVE-2021-47029.json
+++ b/cve/published/2021/CVE-2021-47029.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "d0e274af2f2e4",
+ "version": "d0e274af2f2e",
"lessThan": "2554b9cb4b5e",
"status": "affected",
"versionType": "git"
},
{
- "version": "d0e274af2f2e4",
+ "version": "d0e274af2f2e",
"lessThan": "c996f0346e40",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "mt76: connac: fix kernel warning adding monitor interface",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47029.mbox b/cve/published/2021/CVE-2021-47029.mbox
index a70bc3d6..26d5732e 100644
--- a/cve/published/2021/CVE-2021-47029.mbox
+++ b/cve/published/2021/CVE-2021-47029.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47029: mt76: connac: fix kernel warning adding monitor interface
-Message-Id: <2024022835-CVE-2021-47029-2c85@gregkh>
-Content-Length: 4168
-Lines: 94
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4263;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=W1thvbdFnlbhbHVjgIlL5cBetqf8nHgvvnnQIXvJSTc=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XmfPTxb+994h6F2u7NWTDdu+vVOb+81wrhe7z9etX
- GFVv3sXdsSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBExHwZFlxXPtugKMn6ouBS
- X8X/cLOKK67/9BnmWXKUfbdZdnze7ozSlrP7pLIO3o0vAgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -77,10 +66,10 @@ The Linux kernel CVE team has assigned CVE-2021-47029 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.12 with commit d0e274af2f2e4 and fixed in 5.12.4 with commit 2554b9cb4b5e
- Issue introduced in 5.12 with commit d0e274af2f2e4 and fixed in 5.13 with commit c996f0346e40
+ Issue introduced in 5.12 with commit d0e274af2f2e and fixed in 5.12.4 with commit 2554b9cb4b5e
+ Issue introduced in 5.12 with commit d0e274af2f2e and fixed in 5.13 with commit c996f0346e40
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47030.json b/cve/published/2021/CVE-2021-47030.json
index e0fe2fe5..3ed68140 100644
--- a/cve/published/2021/CVE-2021-47030.json
+++ b/cve/published/2021/CVE-2021-47030.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "d2bf7959d9c0f",
+ "version": "d2bf7959d9c0",
"lessThan": "54b989653c55",
"status": "affected",
"versionType": "git"
},
{
- "version": "d2bf7959d9c0f",
+ "version": "d2bf7959d9c0",
"lessThan": "49cc85059a2c",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "mt76: mt7615: fix memory leak in mt7615_coredump_work",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47030.mbox b/cve/published/2021/CVE-2021-47030.mbox
index e911eb14..ce3b9eae 100644
--- a/cve/published/2021/CVE-2021-47030.mbox
+++ b/cve/published/2021/CVE-2021-47030.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47030: mt76: mt7615: fix memory leak in mt7615_coredump_work
-Message-Id: <2024022835-CVE-2021-47030-d1f6@gregkh>
-Content-Length: 1736
-Lines: 48
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1785;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=X5Kq9GDvdQkhFTWtd3lbT8Ma2YxoR/z2ffNpOKjEpZc=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XmfPvfPQQuI469zXjcECEUI/bj1Y4JccFj7v2ZVk1
- aUJrVuPd8SyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEJB4wLOi+e0IsoFij9GiN
- YUXK8o2yXhoO7QwL1u2WX7gk+s6ppSuL9c4lvone2fK5CgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -31,10 +20,10 @@ The Linux kernel CVE team has assigned CVE-2021-47030 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.12 with commit d2bf7959d9c0f and fixed in 5.12.4 with commit 54b989653c55
- Issue introduced in 5.12 with commit d2bf7959d9c0f and fixed in 5.13 with commit 49cc85059a2c
+ Issue introduced in 5.12 with commit d2bf7959d9c0 and fixed in 5.12.4 with commit 54b989653c55
+ Issue introduced in 5.12 with commit d2bf7959d9c0 and fixed in 5.13 with commit 49cc85059a2c
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47031.json b/cve/published/2021/CVE-2021-47031.json
index b2e30705..7ab5b301 100644
--- a/cve/published/2021/CVE-2021-47031.json
+++ b/cve/published/2021/CVE-2021-47031.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "1c099ab44727c",
+ "version": "1c099ab44727",
"lessThan": "481122637445",
"status": "affected",
"versionType": "git"
},
{
- "version": "1c099ab44727c",
+ "version": "1c099ab44727",
"lessThan": "782b3e86ea97",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "mt76: mt7921: fix memory leak in mt7921_coredump_work",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47031.mbox b/cve/published/2021/CVE-2021-47031.mbox
index 85344c9c..f2e4691b 100644
--- a/cve/published/2021/CVE-2021-47031.mbox
+++ b/cve/published/2021/CVE-2021-47031.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47031: mt76: mt7921: fix memory leak in mt7921_coredump_work
-Message-Id: <2024022835-CVE-2021-47031-75a5@gregkh>
-Content-Length: 1674
-Lines: 47
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1722;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Byuf/NmpgHO+xH4evt2Im1w8VSY/R6I7OWsZKxd2Cpk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xme/WDHpppaapTzvm/jM7el57f58uffrlrn+/NW9M
- SLSIXpFRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExE6ijD/OCSM68mdjZULuJ5
- syWz9Lxqo83cIwyz2b/ccI7Meu0lOdVdvyO4wSS6cFopAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -30,10 +19,10 @@ The Linux kernel CVE team has assigned CVE-2021-47031 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.12 with commit 1c099ab44727c and fixed in 5.12.4 with commit 481122637445
- Issue introduced in 5.12 with commit 1c099ab44727c and fixed in 5.13 with commit 782b3e86ea97
+ Issue introduced in 5.12 with commit 1c099ab44727 and fixed in 5.12.4 with commit 481122637445
+ Issue introduced in 5.12 with commit 1c099ab44727 and fixed in 5.13 with commit 782b3e86ea97
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47035.json b/cve/published/2021/CVE-2021-47035.json
index ae4250f4..4cded572 100644
--- a/cve/published/2021/CVE-2021-47035.json
+++ b/cve/published/2021/CVE-2021-47035.json
@@ -18,31 +18,31 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "b802d070a52a1",
+ "version": "b802d070a52a",
"lessThan": "c848416cc05a",
"status": "affected",
"versionType": "git"
},
{
- "version": "b802d070a52a1",
+ "version": "b802d070a52a",
"lessThan": "89bd62079870",
"status": "affected",
"versionType": "git"
},
{
- "version": "b802d070a52a1",
+ "version": "b802d070a52a",
"lessThan": "25faff781389",
"status": "affected",
"versionType": "git"
},
{
- "version": "b802d070a52a1",
+ "version": "b802d070a52a",
"lessThan": "66c24699f266",
"status": "affected",
"versionType": "git"
},
{
- "version": "b802d070a52a1",
+ "version": "b802d070a52a",
"lessThan": "eea53c581688",
"status": "affected",
"versionType": "git"
@@ -117,7 +117,7 @@
],
"title": "iommu/vt-d: Remove WO permissions on second-level paging entries",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47035.mbox b/cve/published/2021/CVE-2021-47035.mbox
index ac62fbfb..4dff4a1e 100644
--- a/cve/published/2021/CVE-2021-47035.mbox
+++ b/cve/published/2021/CVE-2021-47035.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47035: iommu/vt-d: Remove WO permissions on second-level paging entries
-Message-Id: <2024022836-CVE-2021-47035-e152@gregkh>
-Content-Length: 2661
-Lines: 60
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2722;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=RMRWu/s6tS/VZBx4UDlFE6FSo/QPLFif+tzx82mB5Lw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xue8d5ny4Ow6Pq7YQ7Mme+y578y1Q9tzzvo5pxb0y
- +seffuJpSOWhUGQiUFWTJHlyzaeo/srDil6GdqehpnDygQyhIGLUwAm8kWXYX5ZqrB78MzZ6Rln
- Nsnu23fkeFPMuTqGBcvsL+54rBYwf8mSR4sWVTc2ym1KvwAA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -37,13 +26,13 @@ The Linux kernel CVE team has assigned CVE-2021-47035 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.6 with commit b802d070a52a1 and fixed in 5.10.37 with commit c848416cc05a
- Issue introduced in 5.6 with commit b802d070a52a1 and fixed in 5.10.38 with commit 89bd62079870
- Issue introduced in 5.6 with commit b802d070a52a1 and fixed in 5.11.21 with commit 25faff781389
- Issue introduced in 5.6 with commit b802d070a52a1 and fixed in 5.12.4 with commit 66c24699f266
- Issue introduced in 5.6 with commit b802d070a52a1 and fixed in 5.13 with commit eea53c581688
+ Issue introduced in 5.6 with commit b802d070a52a and fixed in 5.10.37 with commit c848416cc05a
+ Issue introduced in 5.6 with commit b802d070a52a and fixed in 5.10.38 with commit 89bd62079870
+ Issue introduced in 5.6 with commit b802d070a52a and fixed in 5.11.21 with commit 25faff781389
+ Issue introduced in 5.6 with commit b802d070a52a and fixed in 5.12.4 with commit 66c24699f266
+ Issue introduced in 5.6 with commit b802d070a52a and fixed in 5.13 with commit eea53c581688
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47040.json b/cve/published/2021/CVE-2021-47040.json
index bb3a0880..b53de650 100644
--- a/cve/published/2021/CVE-2021-47040.json
+++ b/cve/published/2021/CVE-2021-47040.json
@@ -18,25 +18,25 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "efe68c1ca8f49",
+ "version": "efe68c1ca8f4",
"lessThan": "cbbc13b115b8",
"status": "affected",
"versionType": "git"
},
{
- "version": "efe68c1ca8f49",
+ "version": "efe68c1ca8f4",
"lessThan": "51bf90901952",
"status": "affected",
"versionType": "git"
},
{
- "version": "efe68c1ca8f49",
+ "version": "efe68c1ca8f4",
"lessThan": "84b8c266c4bf",
"status": "affected",
"versionType": "git"
},
{
- "version": "efe68c1ca8f49",
+ "version": "efe68c1ca8f4",
"lessThan": "38134ada0cee",
"status": "affected",
"versionType": "git"
@@ -102,7 +102,7 @@
],
"title": "io_uring: fix overflows checks in provide buffers",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47040.mbox b/cve/published/2021/CVE-2021-47040.mbox
index f7fd036d..d8e907bb 100644
--- a/cve/published/2021/CVE-2021-47040.mbox
+++ b/cve/published/2021/CVE-2021-47040.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47040: io_uring: fix overflows checks in provide buffers
-Message-Id: <2024022838-CVE-2021-47040-8722@gregkh>
-Content-Length: 2291
-Lines: 57
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2349;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=A+KeG6NzS6hHAI0n1hMGmdRGQzlLOrPhticb3jGw2X8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xud1fb+4ylL1lvk5qdQF11ekXdZ5qljbdSTQJiH+e
- OSRSym7OmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAijj8YFhz/bKl2ZfPfOY8n
- sB2ujlnMbnbqnDvD/FQ51lBtvozQMv0PU55yd1sp66zdDQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -36,12 +25,12 @@ The Linux kernel CVE team has assigned CVE-2021-47040 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.8 with commit efe68c1ca8f49 and fixed in 5.10.37 with commit cbbc13b115b8
- Issue introduced in 5.8 with commit efe68c1ca8f49 and fixed in 5.11.21 with commit 51bf90901952
- Issue introduced in 5.8 with commit efe68c1ca8f49 and fixed in 5.12.4 with commit 84b8c266c4bf
- Issue introduced in 5.8 with commit efe68c1ca8f49 and fixed in 5.13 with commit 38134ada0cee
+ Issue introduced in 5.8 with commit efe68c1ca8f4 and fixed in 5.10.37 with commit cbbc13b115b8
+ Issue introduced in 5.8 with commit efe68c1ca8f4 and fixed in 5.11.21 with commit 51bf90901952
+ Issue introduced in 5.8 with commit efe68c1ca8f4 and fixed in 5.12.4 with commit 84b8c266c4bf
+ Issue introduced in 5.8 with commit efe68c1ca8f4 and fixed in 5.13 with commit 38134ada0cee
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47042.json b/cve/published/2021/CVE-2021-47042.json
index aa20dc59..54bb1e40 100644
--- a/cve/published/2021/CVE-2021-47042.json
+++ b/cve/published/2021/CVE-2021-47042.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "3a00c04212d1cf",
+ "version": "3a00c04212d1",
"lessThan": "296443139f89",
"status": "affected",
"versionType": "git"
},
{
- "version": "3a00c04212d1cf",
+ "version": "3a00c04212d1",
"lessThan": "616cf23b6cf4",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "drm/amd/display: Free local data after use",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47042.mbox b/cve/published/2021/CVE-2021-47042.mbox
index e4435678..dce063b4 100644
--- a/cve/published/2021/CVE-2021-47042.mbox
+++ b/cve/published/2021/CVE-2021-47042.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47042: drm/amd/display: Free local data after use
-Message-Id: <2024022838-CVE-2021-47042-142d@gregkh>
-Content-Length: 2800
-Lines: 70
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2871;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=wSbRHbdgDNR9qCfxp4LhIYceuOTWS8cjy3MMC2bGCvU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XufZKYpb9386+GbSt6in7qrPNzQYid8+cND8ocGOo
- J2TgmNnd8SyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEDq9nmCtnMWPe1jM85gvE
- p+2b3OZqOrfcQYVhfnrp86YlKwSeLn/WdPjFjqnWN+VPbwUA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -53,10 +42,10 @@ The Linux kernel CVE team has assigned CVE-2021-47042 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.12 with commit 3a00c04212d1cf and fixed in 5.12.4 with commit 296443139f89
- Issue introduced in 5.12 with commit 3a00c04212d1cf and fixed in 5.13 with commit 616cf23b6cf4
+ Issue introduced in 5.12 with commit 3a00c04212d1 and fixed in 5.12.4 with commit 296443139f89
+ Issue introduced in 5.12 with commit 3a00c04212d1 and fixed in 5.13 with commit 616cf23b6cf4
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47068.json b/cve/published/2021/CVE-2021-47068.json
index 2b3a723d..ad1af6c0 100644
--- a/cve/published/2021/CVE-2021-47068.json
+++ b/cve/published/2021/CVE-2021-47068.json
@@ -60,13 +60,13 @@
"versionType": "git"
},
{
- "version": "c33b1cc62",
+ "version": "c33b1cc62ac0",
"lessThan": "18175fe17ae0",
"status": "affected",
"versionType": "git"
},
{
- "version": "c33b1cc62",
+ "version": "c33b1cc62ac0",
"lessThan": "c61760e6940d",
"status": "affected",
"versionType": "git"
@@ -167,7 +167,7 @@
],
"title": "net/nfc: fix use-after-free llcp_sock_bind/connect",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47068.mbox b/cve/published/2021/CVE-2021-47068.mbox
index 6a165f55..86061fd1 100644
--- a/cve/published/2021/CVE-2021-47068.mbox
+++ b/cve/published/2021/CVE-2021-47068.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47068: net/nfc: fix use-after-free llcp_sock_bind/connect
-Message-Id: <2024022955-CVE-2021-47068-a416@gregkh>
-Content-Length: 3689
-Lines: 80
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3770;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=r4WoHRw2wB3kjDvwrk+LWjF2k2SGMd955MjbK4s7C6U=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkP2Z0vyAesinRQZ3xk0ddiszL10ae4Qz8NW4V+L5JhX
- nWp0CesI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACbSHscw37e1pPmJ8Y/QB0uu
- nV/sEnzir4ajNMOCtb93zWZ1TFJxmPlS+oeZKptyAv9WAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -56,10 +45,10 @@ Affected and fixed versions
Issue introduced in 5.4.112 with commit c89903c9eff2 and fixed in 5.4.119 with commit e32352070bca
Issue introduced in 5.10.30 with commit 6fb003e5ae18 and fixed in 5.10.37 with commit 6b7021ed36da
Issue introduced in 5.11.14 with commit 8c9e4971e142 and fixed in 5.11.21 with commit 374cdde4dcc9
- Issue introduced in 5.12 with commit c33b1cc62 and fixed in 5.12.4 with commit 18175fe17ae0
- Issue introduced in 5.12 with commit c33b1cc62 and fixed in 5.13 with commit c61760e6940d
+ Issue introduced in 5.12 with commit c33b1cc62ac0 and fixed in 5.12.4 with commit 18175fe17ae0
+ Issue introduced in 5.12 with commit c33b1cc62ac0 and fixed in 5.13 with commit c61760e6940d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47069.json b/cve/published/2021/CVE-2021-47069.json
index 3caf4d54..f180cf97 100644
--- a/cve/published/2021/CVE-2021-47069.json
+++ b/cve/published/2021/CVE-2021-47069.json
@@ -18,19 +18,19 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "0d97a82ba830d8",
+ "version": "0d97a82ba830",
"lessThan": "4528c0c32308",
"status": "affected",
"versionType": "git"
},
{
- "version": "0d97a82ba830d8",
+ "version": "0d97a82ba830",
"lessThan": "807fa14536b2",
"status": "affected",
"versionType": "git"
},
{
- "version": "0d97a82ba830d8",
+ "version": "0d97a82ba830",
"lessThan": "a11ddb37bf36",
"status": "affected",
"versionType": "git"
@@ -87,7 +87,7 @@
],
"title": "ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47069.mbox b/cve/published/2021/CVE-2021-47069.mbox
index b485ee9c..66b789ba 100644
--- a/cve/published/2021/CVE-2021-47069.mbox
+++ b/cve/published/2021/CVE-2021-47069.mbox
@@ -1,11 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47069: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry
-Message-Id: <2024030141-CVE-2021-47069-5797@gregkh>
-Content-Length: 4186
-Lines: 104
Description
===========
@@ -75,11 +72,11 @@ The Linux kernel CVE team has assigned CVE-2021-47069 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.6 with commit 0d97a82ba830d8 and fixed in 5.10.40 with commit 4528c0c32308
- Issue introduced in 5.6 with commit 0d97a82ba830d8 and fixed in 5.12.7 with commit 807fa14536b2
- Issue introduced in 5.6 with commit 0d97a82ba830d8 and fixed in 5.13 with commit a11ddb37bf36
+ Issue introduced in 5.6 with commit 0d97a82ba830 and fixed in 5.10.40 with commit 4528c0c32308
+ Issue introduced in 5.6 with commit 0d97a82ba830 and fixed in 5.12.7 with commit 807fa14536b2
+ Issue introduced in 5.6 with commit 0d97a82ba830 and fixed in 5.13 with commit a11ddb37bf36
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47072.json b/cve/published/2021/CVE-2021-47072.json
index c5dafe52..6047b6e9 100644
--- a/cve/published/2021/CVE-2021-47072.json
+++ b/cve/published/2021/CVE-2021-47072.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "64d6b281ba4db0",
+ "version": "64d6b281ba4d",
"lessThan": "6d0924c5b742",
"status": "affected",
"versionType": "git"
},
{
- "version": "64d6b281ba4db0",
+ "version": "64d6b281ba4d",
"lessThan": "54a40fc3a1da",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "btrfs: fix removed dentries still existing after log is synced",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47072.mbox b/cve/published/2021/CVE-2021-47072.mbox
index 2997e482..e69e67ec 100644
--- a/cve/published/2021/CVE-2021-47072.mbox
+++ b/cve/published/2021/CVE-2021-47072.mbox
@@ -1,11 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47072: btrfs: fix removed dentries still existing after log is synced
-Message-Id: <2024030141-CVE-2021-47072-52d4@gregkh>
-Content-Length: 13198
-Lines: 282
Description
===========
@@ -257,10 +254,10 @@ The Linux kernel CVE team has assigned CVE-2021-47072 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.12 with commit 64d6b281ba4db0 and fixed in 5.12.7 with commit 6d0924c5b742
- Issue introduced in 5.12 with commit 64d6b281ba4db0 and fixed in 5.13 with commit 54a40fc3a1da
+ Issue introduced in 5.12 with commit 64d6b281ba4d and fixed in 5.12.7 with commit 6d0924c5b742
+ Issue introduced in 5.12 with commit 64d6b281ba4d and fixed in 5.13 with commit 54a40fc3a1da
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47079.json b/cve/published/2021/CVE-2021-47079.json
index 27c36163..c15050e3 100644
--- a/cve/published/2021/CVE-2021-47079.json
+++ b/cve/published/2021/CVE-2021-47079.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "ff36b0d953dc4",
+ "version": "ff36b0d953dc",
"lessThan": "beab753fe3b4",
"status": "affected",
"versionType": "git"
},
{
- "version": "ff36b0d953dc4",
+ "version": "ff36b0d953dc",
"lessThan": "ff67dbd554b2",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "platform/x86: ideapad-laptop: fix a NULL pointer dereference",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47079.mbox b/cve/published/2021/CVE-2021-47079.mbox
index 6ed34582..903ecd00 100644
--- a/cve/published/2021/CVE-2021-47079.mbox
+++ b/cve/published/2021/CVE-2021-47079.mbox
@@ -1,11 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47079: platform/x86: ideapad-laptop: fix a NULL pointer dereference
-Message-Id: <2024030142-CVE-2021-47079-3934@gregkh>
-Content-Length: 1723
-Lines: 48
Description
===========
@@ -23,10 +20,10 @@ The Linux kernel CVE team has assigned CVE-2021-47079 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.12 with commit ff36b0d953dc4 and fixed in 5.12.7 with commit beab753fe3b4
- Issue introduced in 5.12 with commit ff36b0d953dc4 and fixed in 5.13 with commit ff67dbd554b2
+ Issue introduced in 5.12 with commit ff36b0d953dc and fixed in 5.12.7 with commit beab753fe3b4
+ Issue introduced in 5.12 with commit ff36b0d953dc and fixed in 5.13 with commit ff67dbd554b2
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47081.json b/cve/published/2021/CVE-2021-47081.json
index a9724609..103297c4 100644
--- a/cve/published/2021/CVE-2021-47081.json
+++ b/cve/published/2021/CVE-2021-47081.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "423815bf02e25",
+ "version": "423815bf02e2",
"lessThan": "b49f5af30b0e",
"status": "affected",
"versionType": "git"
},
{
- "version": "423815bf02e25",
+ "version": "423815bf02e2",
"lessThan": "115726c5d312",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "habanalabs/gaudi: Fix a potential use after free in gaudi_memset_device_memory",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47081.mbox b/cve/published/2021/CVE-2021-47081.mbox
index 715723d6..d4385eb7 100644
--- a/cve/published/2021/CVE-2021-47081.mbox
+++ b/cve/published/2021/CVE-2021-47081.mbox
@@ -1,11 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47081: habanalabs/gaudi: Fix a potential use after free in gaudi_memset_device_memory
-Message-Id: <2024030143-CVE-2021-47081-e590@gregkh>
-Content-Length: 2113
-Lines: 57
Description
===========
@@ -32,10 +29,10 @@ The Linux kernel CVE team has assigned CVE-2021-47081 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.12 with commit 423815bf02e25 and fixed in 5.12.7 with commit b49f5af30b0e
- Issue introduced in 5.12 with commit 423815bf02e25 and fixed in 5.13 with commit 115726c5d312
+ Issue introduced in 5.12 with commit 423815bf02e2 and fixed in 5.12.7 with commit b49f5af30b0e
+ Issue introduced in 5.12 with commit 423815bf02e2 and fixed in 5.13 with commit 115726c5d312
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47118.json b/cve/published/2021/CVE-2021-47118.json
index b70132d5..ee6e1da0 100644
--- a/cve/published/2021/CVE-2021-47118.json
+++ b/cve/published/2021/CVE-2021-47118.json
@@ -18,49 +18,49 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "9ec52099e4b8678a",
+ "version": "9ec52099e4b8",
"lessThan": "764c2e892d1f",
"status": "affected",
"versionType": "git"
},
{
- "version": "9ec52099e4b8678a",
+ "version": "9ec52099e4b8",
"lessThan": "f86c80515a8a",
"status": "affected",
"versionType": "git"
},
{
- "version": "9ec52099e4b8678a",
+ "version": "9ec52099e4b8",
"lessThan": "4dbd8808a591",
"status": "affected",
"versionType": "git"
},
{
- "version": "9ec52099e4b8678a",
+ "version": "9ec52099e4b8",
"lessThan": "d106f05432e6",
"status": "affected",
"versionType": "git"
},
{
- "version": "9ec52099e4b8678a",
+ "version": "9ec52099e4b8",
"lessThan": "2cd6eedfa634",
"status": "affected",
"versionType": "git"
},
{
- "version": "9ec52099e4b8678a",
+ "version": "9ec52099e4b8",
"lessThan": "7178be006d49",
"status": "affected",
"versionType": "git"
},
{
- "version": "9ec52099e4b8678a",
+ "version": "9ec52099e4b8",
"lessThan": "b8ff869f2015",
"status": "affected",
"versionType": "git"
},
{
- "version": "9ec52099e4b8678a",
+ "version": "9ec52099e4b8",
"lessThan": "0711f0d7050b",
"status": "affected",
"versionType": "git"
@@ -162,7 +162,7 @@
],
"title": "pid: take a reference when initializing `cad_pid`",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47118.mbox b/cve/published/2021/CVE-2021-47118.mbox
index 683b7743..ae45caf6 100644
--- a/cve/published/2021/CVE-2021-47118.mbox
+++ b/cve/published/2021/CVE-2021-47118.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47118: pid: take a reference when initializing `cad_pid`
-Message-Id: <2024031509-CVE-2021-47118-faf2@gregkh>
-Content-Length: 7473
-Lines: 157
-X-Developer-Signature: v=1; a=openpgp-sha256; l=7631;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=5mMeNno/TvMgQnD/15zYH+Lx7jDAt7JwBmsb3N7wL0k=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1vh6XH3s3XFa6sFiIetjXi/ZLb0DOlr5JpTXnGacZ
- eK85O7kjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZiI+UOGBdtMJ+4uXOW9e1Z+
- 1+8fJzmlt866ks8wh5spzvnx+nz9Z/UWGgerlqeHvdS7CAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -128,16 +117,16 @@ The Linux kernel CVE team has assigned CVE-2021-47118 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 2.6.19 with commit 9ec52099e4b8678a and fixed in 4.4.272 with commit 764c2e892d1f
- Issue introduced in 2.6.19 with commit 9ec52099e4b8678a and fixed in 4.9.272 with commit f86c80515a8a
- Issue introduced in 2.6.19 with commit 9ec52099e4b8678a and fixed in 4.14.236 with commit 4dbd8808a591
- Issue introduced in 2.6.19 with commit 9ec52099e4b8678a and fixed in 4.19.194 with commit d106f05432e6
- Issue introduced in 2.6.19 with commit 9ec52099e4b8678a and fixed in 5.4.125 with commit 2cd6eedfa634
- Issue introduced in 2.6.19 with commit 9ec52099e4b8678a and fixed in 5.10.43 with commit 7178be006d49
- Issue introduced in 2.6.19 with commit 9ec52099e4b8678a and fixed in 5.12.10 with commit b8ff869f2015
- Issue introduced in 2.6.19 with commit 9ec52099e4b8678a and fixed in 5.13 with commit 0711f0d7050b
+ Issue introduced in 2.6.19 with commit 9ec52099e4b8 and fixed in 4.4.272 with commit 764c2e892d1f
+ Issue introduced in 2.6.19 with commit 9ec52099e4b8 and fixed in 4.9.272 with commit f86c80515a8a
+ Issue introduced in 2.6.19 with commit 9ec52099e4b8 and fixed in 4.14.236 with commit 4dbd8808a591
+ Issue introduced in 2.6.19 with commit 9ec52099e4b8 and fixed in 4.19.194 with commit d106f05432e6
+ Issue introduced in 2.6.19 with commit 9ec52099e4b8 and fixed in 5.4.125 with commit 2cd6eedfa634
+ Issue introduced in 2.6.19 with commit 9ec52099e4b8 and fixed in 5.10.43 with commit 7178be006d49
+ Issue introduced in 2.6.19 with commit 9ec52099e4b8 and fixed in 5.12.10 with commit b8ff869f2015
+ Issue introduced in 2.6.19 with commit 9ec52099e4b8 and fixed in 5.13 with commit 0711f0d7050b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47123.json b/cve/published/2021/CVE-2021-47123.json
index 9098c34b..a7643387 100644
--- a/cve/published/2021/CVE-2021-47123.json
+++ b/cve/published/2021/CVE-2021-47123.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "90cd7e424969d",
+ "version": "90cd7e424969",
"lessThan": "1f64f5e903b9",
"status": "affected",
"versionType": "git"
},
{
- "version": "90cd7e424969d",
+ "version": "90cd7e424969",
"lessThan": "447c19f3b507",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "io_uring: fix ltout double free on completion race",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47123.mbox b/cve/published/2021/CVE-2021-47123.mbox
index 924536d1..19ed8df5 100644
--- a/cve/published/2021/CVE-2021-47123.mbox
+++ b/cve/published/2021/CVE-2021-47123.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47123: io_uring: fix ltout double free on completion race
-Message-Id: <2024031511-CVE-2021-47123-8318@gregkh>
-Content-Length: 1831
-Lines: 50
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1882;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=9MyT1/2g7ZtBGpI8AbS0W4vNubv5q1e2ooOWkO09JHs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1vi77KuNawwJel8pUyUQvGm25b5P06c9uNGjGGTqb
- xWQHKjeEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABM50cswVz6P3XLWBfcKt9+3
- 2BYcTxXzLPONZJjvtk7xqEetlFVuoqG7wBS/dTWHbWcAAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -33,10 +22,10 @@ The Linux kernel CVE team has assigned CVE-2021-47123 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.11 with commit 90cd7e424969d and fixed in 5.12.10 with commit 1f64f5e903b9
- Issue introduced in 5.11 with commit 90cd7e424969d and fixed in 5.13 with commit 447c19f3b507
+ Issue introduced in 5.11 with commit 90cd7e424969 and fixed in 5.12.10 with commit 1f64f5e903b9
+ Issue introduced in 5.11 with commit 90cd7e424969 and fixed in 5.13 with commit 447c19f3b507
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47124.json b/cve/published/2021/CVE-2021-47124.json
index 854e34b1..2804aa0d 100644
--- a/cve/published/2021/CVE-2021-47124.json
+++ b/cve/published/2021/CVE-2021-47124.json
@@ -30,19 +30,19 @@
"versionType": "git"
},
{
- "version": "9ae1f8dd372e0",
+ "version": "9ae1f8dd372e",
"lessThan": "876808dba2ff",
"status": "affected",
"versionType": "git"
},
{
- "version": "9ae1f8dd372e0",
+ "version": "9ae1f8dd372e",
"lessThan": "ff4a96ba5c8f",
"status": "affected",
"versionType": "git"
},
{
- "version": "9ae1f8dd372e0",
+ "version": "9ae1f8dd372e",
"lessThan": "a298232ee6b9",
"status": "affected",
"versionType": "git"
@@ -107,7 +107,7 @@
],
"title": "io_uring: fix link timeout refs",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47124.mbox b/cve/published/2021/CVE-2021-47124.mbox
index a7466100..e822af26 100644
--- a/cve/published/2021/CVE-2021-47124.mbox
+++ b/cve/published/2021/CVE-2021-47124.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47124: io_uring: fix link timeout refs
-Message-Id: <2024031511-CVE-2021-47124-42c9@gregkh>
-Content-Length: 3015
-Lines: 70
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3086;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=BlRLmxexxfz+En7YtOjJo8VA/WDAiMyutiFTjC+5EyE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1viHrXh7MfyC4Gf2rz5KccJFMxjr6lufJTcr/RU/t
- E9AYt6HjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZgI82GGeVqaW/R3bly2+urB
- U7dflK1/0prxaCLDguYww/CGwp3Fr3+n97Uypv0vCOkVBwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -49,11 +38,11 @@ Affected and fixed versions
Issue introduced in 5.10.26 with commit 1c20e9040f49 and fixed in 5.10.43 with commit 0b2a990e5d2f
Issue introduced in 5.10.26 with commit 1c20e9040f49 and fixed in 5.10.55 with commit 6f5d7a45f58d
- Issue introduced in 5.12 with commit 9ae1f8dd372e0 and fixed in 5.12.10 with commit 876808dba2ff
- Issue introduced in 5.12 with commit 9ae1f8dd372e0 and fixed in 5.12.19 with commit ff4a96ba5c8f
- Issue introduced in 5.12 with commit 9ae1f8dd372e0 and fixed in 5.13 with commit a298232ee6b9
+ Issue introduced in 5.12 with commit 9ae1f8dd372e and fixed in 5.12.10 with commit 876808dba2ff
+ Issue introduced in 5.12 with commit 9ae1f8dd372e and fixed in 5.12.19 with commit ff4a96ba5c8f
+ Issue introduced in 5.12 with commit 9ae1f8dd372e and fixed in 5.13 with commit a298232ee6b9
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47126.json b/cve/published/2021/CVE-2021-47126.json
index b9baad2c..545260c2 100644
--- a/cve/published/2021/CVE-2021-47126.json
+++ b/cve/published/2021/CVE-2021-47126.json
@@ -18,25 +18,25 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "706ec91916462",
+ "version": "706ec9191646",
"lessThan": "7ba7fa78a92d",
"status": "affected",
"versionType": "git"
},
{
- "version": "706ec91916462",
+ "version": "706ec9191646",
"lessThan": "098702358274",
"status": "affected",
"versionType": "git"
},
{
- "version": "706ec91916462",
+ "version": "706ec9191646",
"lessThan": "0a462e25ef0f",
"status": "affected",
"versionType": "git"
},
{
- "version": "706ec91916462",
+ "version": "706ec9191646",
"lessThan": "821bbf79fe46",
"status": "affected",
"versionType": "git"
@@ -102,7 +102,7 @@
],
"title": "ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47126.mbox b/cve/published/2021/CVE-2021-47126.mbox
index c5a55789..428aa178 100644
--- a/cve/published/2021/CVE-2021-47126.mbox
+++ b/cve/published/2021/CVE-2021-47126.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47126: ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions
-Message-Id: <2024031512-CVE-2021-47126-f717@gregkh>
-Content-Length: 11469
-Lines: 228
-X-Developer-Signature: v=1; a=openpgp-sha256; l=11698;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=HwEdqAdp+fVjhq/oyO7EBEfGGnzpbYEAgPfHdcFeKjo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1gQwy5lMnPoy6EHMb6VD7Srr26axbZ/tZDM9+feLU
- FeJE5+PdsSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBE0joYFpwMin/RazvnzjTv
- PnHPReXq2x5dn84wTzNumsSpT6kzrHP1t3FoiS5ZH6P9GQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -207,12 +196,12 @@ The Linux kernel CVE team has assigned CVE-2021-47126 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.3 with commit 706ec91916462 and fixed in 5.4.125 with commit 7ba7fa78a92d
- Issue introduced in 5.3 with commit 706ec91916462 and fixed in 5.10.43 with commit 098702358274
- Issue introduced in 5.3 with commit 706ec91916462 and fixed in 5.12.10 with commit 0a462e25ef0f
- Issue introduced in 5.3 with commit 706ec91916462 and fixed in 5.13 with commit 821bbf79fe46
+ Issue introduced in 5.3 with commit 706ec9191646 and fixed in 5.4.125 with commit 7ba7fa78a92d
+ Issue introduced in 5.3 with commit 706ec9191646 and fixed in 5.10.43 with commit 098702358274
+ Issue introduced in 5.3 with commit 706ec9191646 and fixed in 5.12.10 with commit 0a462e25ef0f
+ Issue introduced in 5.3 with commit 706ec9191646 and fixed in 5.13 with commit 821bbf79fe46
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47134.json b/cve/published/2021/CVE-2021-47134.json
index 55f6ecf1..6cdeb0d1 100644
--- a/cve/published/2021/CVE-2021-47134.json
+++ b/cve/published/2021/CVE-2021-47134.json
@@ -18,19 +18,19 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "b91540d52a08b",
+ "version": "b91540d52a08",
"lessThan": "5148066edbdc",
"status": "affected",
"versionType": "git"
},
{
- "version": "b91540d52a08b",
+ "version": "b91540d52a08",
"lessThan": "8a7e8b4e5631",
"status": "affected",
"versionType": "git"
},
{
- "version": "b91540d52a08b",
+ "version": "b91540d52a08",
"lessThan": "668a84c1bfb2",
"status": "affected",
"versionType": "git"
@@ -87,7 +87,7 @@
],
"title": "efi/fdt: fix panic when no valid fdt found",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47134.mbox b/cve/published/2021/CVE-2021-47134.mbox
index b9c8455e..202c1e06 100644
--- a/cve/published/2021/CVE-2021-47134.mbox
+++ b/cve/published/2021/CVE-2021-47134.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47134: efi/fdt: fix panic when no valid fdt found
-Message-Id: <2024031515-CVE-2021-47134-3348@gregkh>
-Content-Length: 1975
-Lines: 52
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2028;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=uLyMEd6an9VXkBzBwFwvqHDiEKQ31B3j2XhjcUmACH0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1gRf3/ly9jy/h4fOFrs9br36g7HbeuWy84aLTCpiT
- fXFe7o7OmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiS2cwzM+5MqMwc8bj3e99
- 5q5tvW9udfhR9XGG+SU94sG/HmicnZ6yKMT9iGjwxWrhNAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -33,11 +22,11 @@ The Linux kernel CVE team has assigned CVE-2021-47134 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.10 with commit b91540d52a08b and fixed in 5.10.43 with commit 5148066edbdc
- Issue introduced in 5.10 with commit b91540d52a08b and fixed in 5.12.10 with commit 8a7e8b4e5631
- Issue introduced in 5.10 with commit b91540d52a08b and fixed in 5.13 with commit 668a84c1bfb2
+ Issue introduced in 5.10 with commit b91540d52a08 and fixed in 5.10.43 with commit 5148066edbdc
+ Issue introduced in 5.10 with commit b91540d52a08 and fixed in 5.12.10 with commit 8a7e8b4e5631
+ Issue introduced in 5.10 with commit b91540d52a08 and fixed in 5.13 with commit 668a84c1bfb2
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47135.json b/cve/published/2021/CVE-2021-47135.json
index c7914643..2c5c1d03 100644
--- a/cve/published/2021/CVE-2021-47135.json
+++ b/cve/published/2021/CVE-2021-47135.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "1c099ab44727c",
+ "version": "1c099ab44727",
"lessThan": "6919e8a24e70",
"status": "affected",
"versionType": "git"
},
{
- "version": "1c099ab44727c",
+ "version": "1c099ab44727",
"lessThan": "d874e6c06952",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47135.mbox b/cve/published/2021/CVE-2021-47135.mbox
index 80d9bdc5..98ab89af 100644
--- a/cve/published/2021/CVE-2021-47135.mbox
+++ b/cve/published/2021/CVE-2021-47135.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47135: mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report
-Message-Id: <2024031515-CVE-2021-47135-2c50@gregkh>
-Content-Length: 1765
-Lines: 48
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1814;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=YF+AkUnwxtvdyCjw7+zoFcG9h2ggtVSgHePyQL2GA48=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1gRbatz9I9iyKT3Q8MLDnaYKaqprpwasX/j6EfNTd
- 9PdS2bwdMSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBETjxnWLCkUqMrg+94tdaf
- BcWttxq5Z2mlvWRY0Cn/N+iY1cL8t2/9At+6L3t/YFHcNwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -31,10 +20,10 @@ The Linux kernel CVE team has assigned CVE-2021-47135 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.12 with commit 1c099ab44727c and fixed in 5.12.10 with commit 6919e8a24e70
- Issue introduced in 5.12 with commit 1c099ab44727c and fixed in 5.13 with commit d874e6c06952
+ Issue introduced in 5.12 with commit 1c099ab44727 and fixed in 5.12.10 with commit 6919e8a24e70
+ Issue introduced in 5.12 with commit 1c099ab44727 and fixed in 5.13 with commit d874e6c06952
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47172.json b/cve/published/2021/CVE-2021-47172.json
index 0a2a3978..ed749a7e 100644
--- a/cve/published/2021/CVE-2021-47172.json
+++ b/cve/published/2021/CVE-2021-47172.json
@@ -24,19 +24,19 @@
"versionType": "git"
},
{
- "version": "d7857e4ee1ba6",
+ "version": "d7857e4ee1ba",
"lessThan": "f70122825076",
"status": "affected",
"versionType": "git"
},
{
- "version": "d7857e4ee1ba6",
+ "version": "d7857e4ee1ba",
"lessThan": "26da8040eccc",
"status": "affected",
"versionType": "git"
},
{
- "version": "d7857e4ee1ba6",
+ "version": "d7857e4ee1ba",
"lessThan": "f2a772c51206",
"status": "affected",
"versionType": "git"
@@ -92,7 +92,7 @@
],
"title": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers",
"x_generator": {
- "engine": "bippy-b4257b672505"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47172.mbox b/cve/published/2021/CVE-2021-47172.mbox
index 94f21245..5c9c17a9 100644
--- a/cve/published/2021/CVE-2021-47172.mbox
+++ b/cve/published/2021/CVE-2021-47172.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47172: iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers
-Message-Id: <2024032537-CVE-2021-47172-4990@gregkh>
-Content-Length: 2540
-Lines: 62
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2603;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=WDhhLayGXXzVzdYGj64LUAPIGjFLnIvTmi05mR64DvE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDl89pa/vODr7cv68hPjpNzNYpwVUMjVw7Pj/hmG23
- acZjopVHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjARx3SG+XE/Hzbseff60OW6
- Qz6Sq4T2r9nzYgLDgtlPpfOFTxerL96kIBy1MjzTS1LpBgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,9 +31,9 @@ Affected and fixed versions
===========================
Issue introduced in 5.4.14 with commit 5408cbc63373 and fixed in 5.4.124 with commit f49149964d24
- Issue introduced in 5.5 with commit d7857e4ee1ba6 and fixed in 5.10.42 with commit f70122825076
- Issue introduced in 5.5 with commit d7857e4ee1ba6 and fixed in 5.12.9 with commit 26da8040eccc
- Issue introduced in 5.5 with commit d7857e4ee1ba6 and fixed in 5.13 with commit f2a772c51206
+ Issue introduced in 5.5 with commit d7857e4ee1ba and fixed in 5.10.42 with commit f70122825076
+ Issue introduced in 5.5 with commit d7857e4ee1ba and fixed in 5.12.9 with commit 26da8040eccc
+ Issue introduced in 5.5 with commit d7857e4ee1ba and fixed in 5.13 with commit f2a772c51206
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2021/CVE-2021-47177.json b/cve/published/2021/CVE-2021-47177.json
index f3f29095..7deff678 100644
--- a/cve/published/2021/CVE-2021-47177.json
+++ b/cve/published/2021/CVE-2021-47177.json
@@ -18,37 +18,37 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "39ab9555c2411",
+ "version": "39ab9555c241",
"lessThan": "22da9f497838",
"status": "affected",
"versionType": "git"
},
{
- "version": "39ab9555c2411",
+ "version": "39ab9555c241",
"lessThan": "2ec5e9bb6b05",
"status": "affected",
"versionType": "git"
},
{
- "version": "39ab9555c2411",
+ "version": "39ab9555c241",
"lessThan": "044bbe8b92ab",
"status": "affected",
"versionType": "git"
},
{
- "version": "39ab9555c2411",
+ "version": "39ab9555c241",
"lessThan": "f01134321d04",
"status": "affected",
"versionType": "git"
},
{
- "version": "39ab9555c2411",
+ "version": "39ab9555c241",
"lessThan": "ca466561eef3",
"status": "affected",
"versionType": "git"
},
{
- "version": "39ab9555c2411",
+ "version": "39ab9555c241",
"lessThan": "0ee74d5a4863",
"status": "affected",
"versionType": "git"
@@ -132,7 +132,7 @@
],
"title": "iommu/vt-d: Fix sysfs leak in alloc_iommu()",
"x_generator": {
- "engine": "bippy-b4257b672505"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47177.mbox b/cve/published/2021/CVE-2021-47177.mbox
index 0fdacb24..48dafd16 100644
--- a/cve/published/2021/CVE-2021-47177.mbox
+++ b/cve/published/2021/CVE-2021-47177.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47177: iommu/vt-d: Fix sysfs leak in alloc_iommu()
-Message-Id: <2024032538-CVE-2021-47177-4d4a@gregkh>
-Content-Length: 2373
-Lines: 56
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2430;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=vZTRc1ZZN3fEokeChnJKTIATNPAUTWlbizXU851mnkU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDt90THZM+hPJsZpNxPz041tfXNmsGxt3W4iLv9u2x
- 2l6kXpURywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzkxwuG+W7vr2atvDR1+43j
- dq+XiLJNbGvZuohhwbY1pq6exkzJGQm7Mkxi+Iu8/WRjAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -31,12 +20,12 @@ The Linux kernel CVE team has assigned CVE-2021-47177 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 4.11 with commit 39ab9555c2411 and fixed in 4.14.235 with commit 22da9f497838
- Issue introduced in 4.11 with commit 39ab9555c2411 and fixed in 4.19.193 with commit 2ec5e9bb6b05
- Issue introduced in 4.11 with commit 39ab9555c2411 and fixed in 5.4.124 with commit 044bbe8b92ab
- Issue introduced in 4.11 with commit 39ab9555c2411 and fixed in 5.10.42 with commit f01134321d04
- Issue introduced in 4.11 with commit 39ab9555c2411 and fixed in 5.12.9 with commit ca466561eef3
- Issue introduced in 4.11 with commit 39ab9555c2411 and fixed in 5.13 with commit 0ee74d5a4863
+ Issue introduced in 4.11 with commit 39ab9555c241 and fixed in 4.14.235 with commit 22da9f497838
+ Issue introduced in 4.11 with commit 39ab9555c241 and fixed in 4.19.193 with commit 2ec5e9bb6b05
+ Issue introduced in 4.11 with commit 39ab9555c241 and fixed in 5.4.124 with commit 044bbe8b92ab
+ Issue introduced in 4.11 with commit 39ab9555c241 and fixed in 5.10.42 with commit f01134321d04
+ Issue introduced in 4.11 with commit 39ab9555c241 and fixed in 5.12.9 with commit ca466561eef3
+ Issue introduced in 4.11 with commit 39ab9555c241 and fixed in 5.13 with commit 0ee74d5a4863
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52452.json b/cve/published/2023/CVE-2023-52452.json
index c8613a49..cd6d2718 100644
--- a/cve/published/2023/CVE-2023-52452.json
+++ b/cve/published/2023/CVE-2023-52452.json
@@ -18,19 +18,19 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "01f810ace9ed3",
+ "version": "01f810ace9ed",
"lessThan": "0954982db828",
"status": "affected",
"versionType": "git"
},
{
- "version": "01f810ace9ed3",
+ "version": "01f810ace9ed",
"lessThan": "fbcf372c8eda",
"status": "affected",
"versionType": "git"
},
{
- "version": "01f810ace9ed3",
+ "version": "01f810ace9ed",
"lessThan": "6b4a64bafd10",
"status": "affected",
"versionType": "git"
@@ -87,7 +87,7 @@
],
"title": "bpf: Fix accesses to uninit stack slots",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52452.mbox b/cve/published/2023/CVE-2023-52452.mbox
index 4da92f68..53f553c2 100644
--- a/cve/published/2023/CVE-2023-52452.mbox
+++ b/cve/published/2023/CVE-2023-52452.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -59,11 +59,11 @@ The Linux kernel CVE team has assigned CVE-2023-52452 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.12 with commit 01f810ace9ed3 and fixed in 6.6.14 with commit 0954982db828
- Issue introduced in 5.12 with commit 01f810ace9ed3 and fixed in 6.7.2 with commit fbcf372c8eda
- Issue introduced in 5.12 with commit 01f810ace9ed3 and fixed in 6.8 with commit 6b4a64bafd10
+ Issue introduced in 5.12 with commit 01f810ace9ed and fixed in 6.6.14 with commit 0954982db828
+ Issue introduced in 5.12 with commit 01f810ace9ed and fixed in 6.7.2 with commit fbcf372c8eda
+ Issue introduced in 5.12 with commit 01f810ace9ed and fixed in 6.8 with commit 6b4a64bafd10
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52461.json b/cve/published/2023/CVE-2023-52461.json
index 86e0d985..7cca1548 100644
--- a/cve/published/2023/CVE-2023-52461.json
+++ b/cve/published/2023/CVE-2023-52461.json
@@ -18,13 +18,13 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "56e449603f0ac5",
+ "version": "56e449603f0a",
"lessThan": "1470d173925d",
"status": "affected",
"versionType": "git"
},
{
- "version": "56e449603f0ac5",
+ "version": "56e449603f0a",
"lessThan": "2bbe6ab2be53",
"status": "affected",
"versionType": "git"
@@ -72,7 +72,7 @@
],
"title": "drm/sched: Fix bounds limiting when given a malformed entity",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52461.mbox b/cve/published/2023/CVE-2023-52461.mbox
index e09e9433..0f484639 100644
--- a/cve/published/2023/CVE-2023-52461.mbox
+++ b/cve/published/2023/CVE-2023-52461.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -21,10 +21,10 @@ The Linux kernel CVE team has assigned CVE-2023-52461 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 6.7 with commit 56e449603f0ac5 and fixed in 6.7.2 with commit 1470d173925d
- Issue introduced in 6.7 with commit 56e449603f0ac5 and fixed in 6.8 with commit 2bbe6ab2be53
+ Issue introduced in 6.7 with commit 56e449603f0a and fixed in 6.7.2 with commit 1470d173925d
+ Issue introduced in 6.7 with commit 56e449603f0a and fixed in 6.8 with commit 2bbe6ab2be53
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26588.json b/cve/published/2024/CVE-2024-26588.json
index b155720e..247b61d9 100644
--- a/cve/published/2024/CVE-2024-26588.json
+++ b/cve/published/2024/CVE-2024-26588.json
@@ -18,25 +18,25 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "bbfddb904df6f82",
+ "version": "bbfddb904df6",
"lessThan": "4631c2dd69d9",
"status": "affected",
"versionType": "git"
},
{
- "version": "bbfddb904df6f82",
+ "version": "bbfddb904df6",
"lessThan": "9aeb09f4d85a",
"status": "affected",
"versionType": "git"
},
{
- "version": "bbfddb904df6f82",
+ "version": "bbfddb904df6",
"lessThan": "7924ade13a49",
"status": "affected",
"versionType": "git"
},
{
- "version": "bbfddb904df6f82",
+ "version": "bbfddb904df6",
"lessThan": "36a87385e31c",
"status": "affected",
"versionType": "git"
@@ -102,7 +102,7 @@
],
"title": "LoongArch: BPF: Prevent out-of-bounds memory access",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26588.mbox b/cve/published/2024/CVE-2024-26588.mbox
index 5db93485..185758c4 100644
--- a/cve/published/2024/CVE-2024-26588.mbox
+++ b/cve/published/2024/CVE-2024-26588.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -87,12 +87,12 @@ The Linux kernel CVE team has assigned CVE-2024-26588 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 6.1 with commit bbfddb904df6f82 and fixed in 6.1.75 with commit 4631c2dd69d9
- Issue introduced in 6.1 with commit bbfddb904df6f82 and fixed in 6.6.14 with commit 9aeb09f4d85a
- Issue introduced in 6.1 with commit bbfddb904df6f82 and fixed in 6.7.2 with commit 7924ade13a49
- Issue introduced in 6.1 with commit bbfddb904df6f82 and fixed in 6.8 with commit 36a87385e31c
+ Issue introduced in 6.1 with commit bbfddb904df6 and fixed in 6.1.75 with commit 4631c2dd69d9
+ Issue introduced in 6.1 with commit bbfddb904df6 and fixed in 6.6.14 with commit 9aeb09f4d85a
+ Issue introduced in 6.1 with commit bbfddb904df6 and fixed in 6.7.2 with commit 7924ade13a49
+ Issue introduced in 6.1 with commit bbfddb904df6 and fixed in 6.8 with commit 36a87385e31c
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26591.json b/cve/published/2024/CVE-2024-26591.json
index d931aa5c..42013a81 100644
--- a/cve/published/2024/CVE-2024-26591.json
+++ b/cve/published/2024/CVE-2024-26591.json
@@ -18,31 +18,31 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
- "version": "f3a95075549e0",
+ "version": "f3a95075549e",
"lessThan": "a7b98aa10f89",
"status": "affected",
"versionType": "git"
},
{
- "version": "f3a95075549e0",
+ "version": "f3a95075549e",
"lessThan": "6cc9c0af0aa0",
"status": "affected",
"versionType": "git"
},
{
- "version": "f3a95075549e0",
+ "version": "f3a95075549e",
"lessThan": "8c8bcd45e9b1",
"status": "affected",
"versionType": "git"
},
{
- "version": "f3a95075549e0",
+ "version": "f3a95075549e",
"lessThan": "50ae82f080cf",
"status": "affected",
"versionType": "git"
},
{
- "version": "f3a95075549e0",
+ "version": "f3a95075549e",
"lessThan": "715d82ba636c",
"status": "affected",
"versionType": "git"
@@ -117,7 +117,7 @@
],
"title": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-1e70cc10feda"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26591.mbox b/cve/published/2024/CVE-2024-26591.mbox
index fe72f7a9..c7bc396e 100644
--- a/cve/published/2024/CVE-2024-26591.mbox
+++ b/cve/published/2024/CVE-2024-26591.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-1e70cc10feda Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -49,13 +49,13 @@ The Linux kernel CVE team has assigned CVE-2024-26591 to this issue.
Affected and fixed versions
===========================
- Issue introduced in 5.13 with commit f3a95075549e0 and fixed in 5.15.148 with commit a7b98aa10f89
- Issue introduced in 5.13 with commit f3a95075549e0 and fixed in 6.1.75 with commit 6cc9c0af0aa0
- Issue introduced in 5.13 with commit f3a95075549e0 and fixed in 6.6.14 with commit 8c8bcd45e9b1
- Issue introduced in 5.13 with commit f3a95075549e0 and fixed in 6.7.2 with commit 50ae82f080cf
- Issue introduced in 5.13 with commit f3a95075549e0 and fixed in 6.8 with commit 715d82ba636c
+ Issue introduced in 5.13 with commit f3a95075549e and fixed in 5.15.148 with commit a7b98aa10f89
+ Issue introduced in 5.13 with commit f3a95075549e and fixed in 6.1.75 with commit 6cc9c0af0aa0
+ Issue introduced in 5.13 with commit f3a95075549e and fixed in 6.6.14 with commit 8c8bcd45e9b1
+ Issue introduced in 5.13 with commit f3a95075549e and fixed in 6.7.2 with commit 50ae82f080cf
+ Issue introduced in 5.13 with commit f3a95075549e and fixed in 6.8 with commit 715d82ba636c
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to