aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-03-11 18:36:42 +0100
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-03-11 18:36:56 +0100
commitfba1be28496464d81ed26ebabfa66e77d4ad81c2 (patch)
tree756ea92b4791b8974b34dcdc3f5fd3e5770c563d
parentf859cffc401601ff3363d28631f51070f43278ff (diff)
downloadvulns-fba1be28496464d81ed26ebabfa66e77d4ad81c2.tar.gz
Update for 6.8 release
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--cve/published/2023/CVE-2023-52436.json4
-rw-r--r--cve/published/2023/CVE-2023-52436.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52438.json4
-rw-r--r--cve/published/2023/CVE-2023-52438.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52439.json4
-rw-r--r--cve/published/2023/CVE-2023-52439.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52443.json4
-rw-r--r--cve/published/2023/CVE-2023-52443.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52444.json4
-rw-r--r--cve/published/2023/CVE-2023-52444.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52445.json4
-rw-r--r--cve/published/2023/CVE-2023-52445.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52446.json4
-rw-r--r--cve/published/2023/CVE-2023-52446.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52447.json4
-rw-r--r--cve/published/2023/CVE-2023-52447.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52448.json4
-rw-r--r--cve/published/2023/CVE-2023-52448.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52449.json4
-rw-r--r--cve/published/2023/CVE-2023-52449.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52450.json4
-rw-r--r--cve/published/2023/CVE-2023-52450.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52451.json4
-rw-r--r--cve/published/2023/CVE-2023-52451.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52452.json4
-rw-r--r--cve/published/2023/CVE-2023-52452.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52453.json4
-rw-r--r--cve/published/2023/CVE-2023-52453.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52454.json4
-rw-r--r--cve/published/2023/CVE-2023-52454.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52455.json4
-rw-r--r--cve/published/2023/CVE-2023-52455.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52456.json4
-rw-r--r--cve/published/2023/CVE-2023-52456.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52457.json4
-rw-r--r--cve/published/2023/CVE-2023-52457.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52458.json4
-rw-r--r--cve/published/2023/CVE-2023-52458.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52459.json4
-rw-r--r--cve/published/2023/CVE-2023-52459.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52460.json4
-rw-r--r--cve/published/2023/CVE-2023-52460.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52461.json4
-rw-r--r--cve/published/2023/CVE-2023-52461.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52462.json4
-rw-r--r--cve/published/2023/CVE-2023-52462.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52463.json4
-rw-r--r--cve/published/2023/CVE-2023-52463.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52464.json4
-rw-r--r--cve/published/2023/CVE-2023-52464.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52465.json4
-rw-r--r--cve/published/2023/CVE-2023-52465.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52467.json4
-rw-r--r--cve/published/2023/CVE-2023-52467.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52468.json4
-rw-r--r--cve/published/2023/CVE-2023-52468.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52469.json4
-rw-r--r--cve/published/2023/CVE-2023-52469.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52470.json4
-rw-r--r--cve/published/2023/CVE-2023-52470.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52471.json4
-rw-r--r--cve/published/2023/CVE-2023-52471.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52472.json4
-rw-r--r--cve/published/2023/CVE-2023-52472.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52473.json4
-rw-r--r--cve/published/2023/CVE-2023-52473.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52485.json6
-rw-r--r--cve/published/2023/CVE-2023-52485.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52486.json6
-rw-r--r--cve/published/2023/CVE-2023-52486.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52487.json6
-rw-r--r--cve/published/2023/CVE-2023-52487.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52488.json6
-rw-r--r--cve/published/2023/CVE-2023-52488.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52489.json6
-rw-r--r--cve/published/2023/CVE-2023-52489.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52490.json6
-rw-r--r--cve/published/2023/CVE-2023-52490.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52491.json6
-rw-r--r--cve/published/2023/CVE-2023-52491.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52492.json6
-rw-r--r--cve/published/2023/CVE-2023-52492.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52493.json6
-rw-r--r--cve/published/2023/CVE-2023-52493.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52494.json6
-rw-r--r--cve/published/2023/CVE-2023-52494.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52495.json6
-rw-r--r--cve/published/2023/CVE-2023-52495.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52497.json4
-rw-r--r--cve/published/2023/CVE-2023-52497.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52498.json6
-rw-r--r--cve/published/2023/CVE-2023-52498.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52583.json4
-rw-r--r--cve/published/2023/CVE-2023-52583.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52584.json4
-rw-r--r--cve/published/2023/CVE-2023-52584.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52585.json4
-rw-r--r--cve/published/2023/CVE-2023-52585.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52586.json4
-rw-r--r--cve/published/2023/CVE-2023-52586.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52587.json4
-rw-r--r--cve/published/2023/CVE-2023-52587.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52588.json4
-rw-r--r--cve/published/2023/CVE-2023-52588.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52589.json4
-rw-r--r--cve/published/2023/CVE-2023-52589.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52590.json4
-rw-r--r--cve/published/2023/CVE-2023-52590.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52591.json4
-rw-r--r--cve/published/2023/CVE-2023-52591.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52593.json4
-rw-r--r--cve/published/2023/CVE-2023-52593.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52594.json4
-rw-r--r--cve/published/2023/CVE-2023-52594.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52595.json4
-rw-r--r--cve/published/2023/CVE-2023-52595.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52596.json4
-rw-r--r--cve/published/2023/CVE-2023-52596.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52597.json4
-rw-r--r--cve/published/2023/CVE-2023-52597.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52598.json4
-rw-r--r--cve/published/2023/CVE-2023-52598.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52599.json4
-rw-r--r--cve/published/2023/CVE-2023-52599.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52600.json4
-rw-r--r--cve/published/2023/CVE-2023-52600.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52601.json4
-rw-r--r--cve/published/2023/CVE-2023-52601.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52602.json4
-rw-r--r--cve/published/2023/CVE-2023-52602.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52603.json4
-rw-r--r--cve/published/2023/CVE-2023-52603.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52604.json4
-rw-r--r--cve/published/2023/CVE-2023-52604.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52605.json4
-rw-r--r--cve/published/2023/CVE-2023-52605.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52606.json4
-rw-r--r--cve/published/2023/CVE-2023-52606.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52607.json4
-rw-r--r--cve/published/2023/CVE-2023-52607.mbox15
-rw-r--r--cve/published/2024/CVE-2024-26581.json4
-rw-r--r--cve/published/2024/CVE-2024-26581.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26582.json4
-rw-r--r--cve/published/2024/CVE-2024-26582.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26583.json4
-rw-r--r--cve/published/2024/CVE-2024-26583.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26584.json4
-rw-r--r--cve/published/2024/CVE-2024-26584.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26585.json4
-rw-r--r--cve/published/2024/CVE-2024-26585.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26586.json4
-rw-r--r--cve/published/2024/CVE-2024-26586.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26587.json4
-rw-r--r--cve/published/2024/CVE-2024-26587.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26588.json4
-rw-r--r--cve/published/2024/CVE-2024-26588.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26589.json4
-rw-r--r--cve/published/2024/CVE-2024-26589.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26590.json4
-rw-r--r--cve/published/2024/CVE-2024-26590.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26591.json4
-rw-r--r--cve/published/2024/CVE-2024-26591.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26592.json4
-rw-r--r--cve/published/2024/CVE-2024-26592.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26593.json4
-rw-r--r--cve/published/2024/CVE-2024-26593.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26594.json4
-rw-r--r--cve/published/2024/CVE-2024-26594.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26595.json4
-rw-r--r--cve/published/2024/CVE-2024-26595.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26596.json4
-rw-r--r--cve/published/2024/CVE-2024-26596.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26597.json4
-rw-r--r--cve/published/2024/CVE-2024-26597.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26598.json4
-rw-r--r--cve/published/2024/CVE-2024-26598.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26599.json4
-rw-r--r--cve/published/2024/CVE-2024-26599.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26600.json4
-rw-r--r--cve/published/2024/CVE-2024-26600.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26601.json4
-rw-r--r--cve/published/2024/CVE-2024-26601.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26602.json4
-rw-r--r--cve/published/2024/CVE-2024-26602.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26603.json4
-rw-r--r--cve/published/2024/CVE-2024-26603.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26604.json4
-rw-r--r--cve/published/2024/CVE-2024-26604.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26605.json4
-rw-r--r--cve/published/2024/CVE-2024-26605.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26606.json4
-rw-r--r--cve/published/2024/CVE-2024-26606.mbox6
-rw-r--r--cve/published/2024/CVE-2024-26607.json6
-rw-r--r--cve/published/2024/CVE-2024-26607.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26608.json6
-rw-r--r--cve/published/2024/CVE-2024-26608.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26609.json6
-rw-r--r--cve/published/2024/CVE-2024-26609.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26610.json6
-rw-r--r--cve/published/2024/CVE-2024-26610.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26611.json6
-rw-r--r--cve/published/2024/CVE-2024-26611.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26612.json6
-rw-r--r--cve/published/2024/CVE-2024-26612.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26613.json6
-rw-r--r--cve/published/2024/CVE-2024-26613.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26614.json6
-rw-r--r--cve/published/2024/CVE-2024-26614.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26615.json6
-rw-r--r--cve/published/2024/CVE-2024-26615.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26616.json6
-rw-r--r--cve/published/2024/CVE-2024-26616.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26617.json6
-rw-r--r--cve/published/2024/CVE-2024-26617.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26618.json6
-rw-r--r--cve/published/2024/CVE-2024-26618.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26619.json6
-rw-r--r--cve/published/2024/CVE-2024-26619.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26620.json6
-rw-r--r--cve/published/2024/CVE-2024-26620.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26621.json4
-rw-r--r--cve/published/2024/CVE-2024-26621.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26622.json4
-rw-r--r--cve/published/2024/CVE-2024-26622.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26623.json4
-rw-r--r--cve/published/2024/CVE-2024-26623.mbox15
-rw-r--r--cve/published/2024/CVE-2024-26624.json4
-rw-r--r--cve/published/2024/CVE-2024-26624.mbox15
-rw-r--r--cve/published/2024/CVE-2024-26625.json4
-rw-r--r--cve/published/2024/CVE-2024-26625.mbox15
-rw-r--r--cve/published/2024/CVE-2024-26627.json4
-rw-r--r--cve/published/2024/CVE-2024-26627.mbox15
-rw-r--r--cve/published/2024/CVE-2024-26628.json4
-rw-r--r--cve/published/2024/CVE-2024-26628.mbox15
234 files changed, 576 insertions, 1311 deletions
diff --git a/cve/published/2023/CVE-2023-52436.json b/cve/published/2023/CVE-2023-52436.json
index 0b8a1ad6..eb79bfb2 100644
--- a/cve/published/2023/CVE-2023-52436.json
+++ b/cve/published/2023/CVE-2023-52436.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,7 +152,7 @@
],
"title": "f2fs: explicitly null-terminate the xattr list",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52436.mbox b/cve/published/2023/CVE-2023-52436.mbox
index 1d79c595..9b9d9249 100644
--- a/cve/published/2023/CVE-2023-52436.mbox
+++ b/cve/published/2023/CVE-2023-52436.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52436: f2fs: explicitly null-terminate the xattr list
@@ -28,7 +28,7 @@ Affected and fixed versions
Fixed in 6.1.74 with commit 5de9e9dd1828
Fixed in 6.6.13 with commit 2525d1ba225b
Fixed in 6.7.1 with commit f6c30bfe5a49
- Fixed in 6.8-rc1 with commit e26b6d39270f
+ Fixed in 6.8 with commit e26b6d39270f
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52438.json b/cve/published/2023/CVE-2023-52438.json
index 0133d9a3..c5f02baa 100644
--- a/cve/published/2023/CVE-2023-52438.json
+++ b/cve/published/2023/CVE-2023-52438.json
@@ -114,7 +114,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -147,7 +147,7 @@
],
"title": "binder: fix use-after-free in shinker's callback",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52438.mbox b/cve/published/2023/CVE-2023-52438.mbox
index a1151a32..648cc033 100644
--- a/cve/published/2023/CVE-2023-52438.mbox
+++ b/cve/published/2023/CVE-2023-52438.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52438: binder: fix use-after-free in shinker's callback
@@ -82,7 +82,7 @@ Affected and fixed versions
Issue introduced in 4.20 with commit dd2283f2605e and fixed in 6.1.74 with commit 9fa04c93f241
Issue introduced in 4.20 with commit dd2283f2605e and fixed in 6.6.13 with commit a49087ab9350
Issue introduced in 4.20 with commit dd2283f2605e and fixed in 6.7.1 with commit e074686e993f
- Issue introduced in 4.20 with commit dd2283f2605e and fixed in 6.8-rc1 with commit 3f489c2067c5
+ Issue introduced in 4.20 with commit dd2283f2605e and fixed in 6.8 with commit 3f489c2067c5
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52439.json b/cve/published/2023/CVE-2023-52439.json
index da1b3cbf..70d515e4 100644
--- a/cve/published/2023/CVE-2023-52439.json
+++ b/cve/published/2023/CVE-2023-52439.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,7 +162,7 @@
],
"title": "uio: Fix use-after-free in uio_open",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52439.mbox b/cve/published/2023/CVE-2023-52439.mbox
index 942d9079..493510a2 100644
--- a/cve/published/2023/CVE-2023-52439.mbox
+++ b/cve/published/2023/CVE-2023-52439.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52439: uio: Fix use-after-free in uio_open
@@ -50,7 +50,7 @@ Affected and fixed versions
Issue introduced in 4.18 with commit 57c5f4df0a5a and fixed in 6.1.74 with commit 17a8519cb359
Issue introduced in 4.18 with commit 57c5f4df0a5a and fixed in 6.6.13 with commit 35f102607054
Issue introduced in 4.18 with commit 57c5f4df0a5a and fixed in 6.7.1 with commit 913205930da6
- Issue introduced in 4.18 with commit 57c5f4df0a5a and fixed in 6.8-rc1 with commit 0c9ae0b86050
+ Issue introduced in 4.18 with commit 57c5f4df0a5a and fixed in 6.8 with commit 0c9ae0b86050
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52443.json b/cve/published/2023/CVE-2023-52443.json
index cc415231..dc60ffa6 100644
--- a/cve/published/2023/CVE-2023-52443.json
+++ b/cve/published/2023/CVE-2023-52443.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,7 +162,7 @@
],
"title": "apparmor: avoid crash when parsed profile name is empty",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52443.mbox b/cve/published/2023/CVE-2023-52443.mbox
index f7317ead..c6beb66a 100644
--- a/cve/published/2023/CVE-2023-52443.mbox
+++ b/cve/published/2023/CVE-2023-52443.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52443: apparmor: avoid crash when parsed profile name is empty
@@ -71,7 +71,7 @@ Affected and fixed versions
Issue introduced in 4.11 with commit 04dc715e24d0 and fixed in 6.1.75 with commit 9d4fa5fe2b1d
Issue introduced in 4.11 with commit 04dc715e24d0 and fixed in 6.6.14 with commit 5c0392fdafb0
Issue introduced in 4.11 with commit 04dc715e24d0 and fixed in 6.7.2 with commit 77ab09b92f16
- Issue introduced in 4.11 with commit 04dc715e24d0 and fixed in 6.8-rc1 with commit 55a8210c9e7d
+ Issue introduced in 4.11 with commit 04dc715e24d0 and fixed in 6.8 with commit 55a8210c9e7d
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52444.json b/cve/published/2023/CVE-2023-52444.json
index 66e728e4..0b03eb7e 100644
--- a/cve/published/2023/CVE-2023-52444.json
+++ b/cve/published/2023/CVE-2023-52444.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,7 +162,7 @@
],
"title": "f2fs: fix to avoid dirent corruption",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52444.mbox b/cve/published/2023/CVE-2023-52444.mbox
index b499c1d0..4cf08c52 100644
--- a/cve/published/2023/CVE-2023-52444.mbox
+++ b/cve/published/2023/CVE-2023-52444.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52444: f2fs: fix to avoid dirent corruption
@@ -48,7 +48,7 @@ Affected and fixed versions
Issue introduced in 4.2 with commit 7e01e7ad746b and fixed in 6.1.75 with commit f0145860c20b
Issue introduced in 4.2 with commit 7e01e7ad746b and fixed in 6.6.14 with commit d3c0b49aaa12
Issue introduced in 4.2 with commit 7e01e7ad746b and fixed in 6.7.2 with commit 2fb4867f4405
- Issue introduced in 4.2 with commit 7e01e7ad746b and fixed in 6.8-rc1 with commit 53edb549565f
+ Issue introduced in 4.2 with commit 7e01e7ad746b and fixed in 6.8 with commit 53edb549565f
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52445.json b/cve/published/2023/CVE-2023-52445.json
index f4ee6832..bdcd448b 100644
--- a/cve/published/2023/CVE-2023-52445.json
+++ b/cve/published/2023/CVE-2023-52445.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,7 +162,7 @@
],
"title": "media: pvrusb2: fix use after free on context disconnection",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52445.mbox b/cve/published/2023/CVE-2023-52445.mbox
index 8eb17c77..6543cf94 100644
--- a/cve/published/2023/CVE-2023-52445.mbox
+++ b/cve/published/2023/CVE-2023-52445.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52445: media: pvrusb2: fix use after free on context disconnection
@@ -31,7 +31,7 @@ Affected and fixed versions
Issue introduced in 2.6.26 with commit e5be15c63804 and fixed in 6.1.75 with commit 30773ea47d41
Issue introduced in 2.6.26 with commit e5be15c63804 and fixed in 6.6.14 with commit 2cf0005d3155
Issue introduced in 2.6.26 with commit e5be15c63804 and fixed in 6.7.2 with commit 437b5f57732b
- Issue introduced in 2.6.26 with commit e5be15c63804 and fixed in 6.8-rc1 with commit ded85b0c0edd
+ Issue introduced in 2.6.26 with commit e5be15c63804 and fixed in 6.8 with commit ded85b0c0edd
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52446.json b/cve/published/2023/CVE-2023-52446.json
index 1759e7c8..165bd766 100644
--- a/cve/published/2023/CVE-2023-52446.json
+++ b/cve/published/2023/CVE-2023-52446.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "bpf: Fix a race condition between btf_put() and map_free()",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52446.mbox b/cve/published/2023/CVE-2023-52446.mbox
index b10b4e24..6ab3aee3 100644
--- a/cve/published/2023/CVE-2023-52446.mbox
+++ b/cve/published/2023/CVE-2023-52446.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52446: bpf: Fix a race condition between btf_put() and map_free()
@@ -177,7 +177,7 @@ Affected and fixed versions
Issue introduced in 6.2 with commit 958cf2e273f0 and fixed in 6.6.14 with commit d048dced8ea5
Issue introduced in 6.2 with commit 958cf2e273f0 and fixed in 6.7.2 with commit f9ff6ef1c73c
- Issue introduced in 6.2 with commit 958cf2e273f0 and fixed in 6.8-rc1 with commit 59e5791f59dd
+ Issue introduced in 6.2 with commit 958cf2e273f0 and fixed in 6.8 with commit 59e5791f59dd
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52447.json b/cve/published/2023/CVE-2023-52447.json
index 190ae6ba..128eb672 100644
--- a/cve/published/2023/CVE-2023-52447.json
+++ b/cve/published/2023/CVE-2023-52447.json
@@ -78,7 +78,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -102,7 +102,7 @@
],
"title": "bpf: Defer the free of inner map when necessary",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52447.mbox b/cve/published/2023/CVE-2023-52447.mbox
index 22ea7863..f06b2ae6 100644
--- a/cve/published/2023/CVE-2023-52447.mbox
+++ b/cve/published/2023/CVE-2023-52447.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52447: bpf: Defer the free of inner map when necessary
@@ -39,7 +39,7 @@ Affected and fixed versions
Issue introduced in 5.9 with commit 638e4b825d52 and fixed in 6.1.75 with commit 62fca83303d6
Issue introduced in 5.9 with commit 638e4b825d52 and fixed in 6.6.14 with commit f91cd728b10c
Issue introduced in 5.9 with commit 638e4b825d52 and fixed in 6.7.2 with commit bfd9b20c4862
- Issue introduced in 5.9 with commit 638e4b825d52 and fixed in 6.8-rc1 with commit 876673364161
+ Issue introduced in 5.9 with commit 638e4b825d52 and fixed in 6.8 with commit 876673364161
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52448.json b/cve/published/2023/CVE-2023-52448.json
index a0cba02b..e43ef25f 100644
--- a/cve/published/2023/CVE-2023-52448.json
+++ b/cve/published/2023/CVE-2023-52448.json
@@ -114,7 +114,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -147,7 +147,7 @@
],
"title": "gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52448.mbox b/cve/published/2023/CVE-2023-52448.mbox
index 0600b169..df95ff92 100644
--- a/cve/published/2023/CVE-2023-52448.mbox
+++ b/cve/published/2023/CVE-2023-52448.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52448: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump
@@ -28,7 +28,7 @@ Affected and fixed versions
Issue introduced in 4.20 with commit 72244b6bc752 and fixed in 6.1.75 with commit d69d7804cf9e
Issue introduced in 4.20 with commit 72244b6bc752 and fixed in 6.6.14 with commit 067a7c48c2c7
Issue introduced in 4.20 with commit 72244b6bc752 and fixed in 6.7.2 with commit c323efd620c7
- Issue introduced in 4.20 with commit 72244b6bc752 and fixed in 6.8-rc1 with commit 8877243beafa
+ Issue introduced in 4.20 with commit 72244b6bc752 and fixed in 6.8 with commit 8877243beafa
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52449.json b/cve/published/2023/CVE-2023-52449.json
index c932ce08..cfd864b7 100644
--- a/cve/published/2023/CVE-2023-52449.json
+++ b/cve/published/2023/CVE-2023-52449.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,7 +162,7 @@
],
"title": "mtd: Fix gluebi NULL pointer dereference caused by ftl notifier",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52449.mbox b/cve/published/2023/CVE-2023-52449.mbox
index a8d060ba..1f041bc9 100644
--- a/cve/published/2023/CVE-2023-52449.mbox
+++ b/cve/published/2023/CVE-2023-52449.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52449: mtd: Fix gluebi NULL pointer dereference caused by ftl notifier
@@ -59,7 +59,7 @@ Affected and fixed versions
Issue introduced in 2.6.31 with commit 2ba3d76a1e29 and fixed in 6.1.75 with commit 5389407bba1e
Issue introduced in 2.6.31 with commit 2ba3d76a1e29 and fixed in 6.6.14 with commit cfd7c9d260dc
Issue introduced in 2.6.31 with commit 2ba3d76a1e29 and fixed in 6.7.2 with commit b36aaa64d58a
- Issue introduced in 2.6.31 with commit 2ba3d76a1e29 and fixed in 6.8-rc1 with commit a43bdc376dea
+ Issue introduced in 2.6.31 with commit 2ba3d76a1e29 and fixed in 6.8 with commit a43bdc376dea
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52450.json b/cve/published/2023/CVE-2023-52450.json
index 31f3daa6..fe9866f1 100644
--- a/cve/published/2023/CVE-2023-52450.json
+++ b/cve/published/2023/CVE-2023-52450.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52450.mbox b/cve/published/2023/CVE-2023-52450.mbox
index 5c879291..bf336c54 100644
--- a/cve/published/2023/CVE-2023-52450.mbox
+++ b/cve/published/2023/CVE-2023-52450.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52450: perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()
@@ -23,7 +23,7 @@ Affected and fixed versions
Issue introduced in 6.2 with commit f680b6e6062e and fixed in 6.6.14 with commit bf1bf09e6b59
Issue introduced in 6.2 with commit f680b6e6062e and fixed in 6.7.2 with commit 3d6f4a78b104
- Issue introduced in 6.2 with commit f680b6e6062e and fixed in 6.8-rc1 with commit 1692cf434ba1
+ Issue introduced in 6.2 with commit f680b6e6062e and fixed in 6.8 with commit 1692cf434ba1
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52451.json b/cve/published/2023/CVE-2023-52451.json
index 7f955eba..9b9d868a 100644
--- a/cve/published/2023/CVE-2023-52451.json
+++ b/cve/published/2023/CVE-2023-52451.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,7 +162,7 @@
],
"title": "powerpc/pseries/memhp: Fix access beyond end of drmem array",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52451.mbox b/cve/published/2023/CVE-2023-52451.mbox
index 4e280bd6..a483035f 100644
--- a/cve/published/2023/CVE-2023-52451.mbox
+++ b/cve/published/2023/CVE-2023-52451.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52451: powerpc/pseries/memhp: Fix access beyond end of drmem array
@@ -80,7 +80,7 @@ Affected and fixed versions
Issue introduced in 4.1 with commit 51925fb3c5c9 and fixed in 6.1.75 with commit 026fd977dc50
Issue introduced in 4.1 with commit 51925fb3c5c9 and fixed in 6.6.14 with commit df16afba2378
Issue introduced in 4.1 with commit 51925fb3c5c9 and fixed in 6.7.2 with commit 708a4b59baad
- Issue introduced in 4.1 with commit 51925fb3c5c9 and fixed in 6.8-rc1 with commit bd68ffce69f6
+ Issue introduced in 4.1 with commit 51925fb3c5c9 and fixed in 6.8 with commit bd68ffce69f6
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52452.json b/cve/published/2023/CVE-2023-52452.json
index ec62beac..c8613a49 100644
--- a/cve/published/2023/CVE-2023-52452.json
+++ b/cve/published/2023/CVE-2023-52452.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "bpf: Fix accesses to uninit stack slots",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52452.mbox b/cve/published/2023/CVE-2023-52452.mbox
index f33c15f8..4da92f68 100644
--- a/cve/published/2023/CVE-2023-52452.mbox
+++ b/cve/published/2023/CVE-2023-52452.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52452: bpf: Fix accesses to uninit stack slots
@@ -61,7 +61,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit 01f810ace9ed3 and fixed in 6.6.14 with commit 0954982db828
Issue introduced in 5.12 with commit 01f810ace9ed3 and fixed in 6.7.2 with commit fbcf372c8eda
- Issue introduced in 5.12 with commit 01f810ace9ed3 and fixed in 6.8-rc1 with commit 6b4a64bafd10
+ Issue introduced in 5.12 with commit 01f810ace9ed3 and fixed in 6.8 with commit 6b4a64bafd10
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52453.json b/cve/published/2023/CVE-2023-52453.json
index 1873f590..c98e20d5 100644
--- a/cve/published/2023/CVE-2023-52453.json
+++ b/cve/published/2023/CVE-2023-52453.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52453.mbox b/cve/published/2023/CVE-2023-52453.mbox
index a7f7a2cf..626c0b8e 100644
--- a/cve/published/2023/CVE-2023-52453.mbox
+++ b/cve/published/2023/CVE-2023-52453.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52453: hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume
@@ -34,7 +34,7 @@ Affected and fixed versions
Issue introduced in 6.2 with commit d9a871e4a143 and fixed in 6.6.14 with commit 45f80b2f230d
Issue introduced in 6.2 with commit d9a871e4a143 and fixed in 6.7.2 with commit 6bda81e24a35
- Issue introduced in 6.2 with commit d9a871e4a143 and fixed in 6.8-rc1 with commit be12ad45e15b
+ Issue introduced in 6.2 with commit d9a871e4a143 and fixed in 6.8 with commit be12ad45e15b
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52454.json b/cve/published/2023/CVE-2023-52454.json
index 8538290c..8aa31d80 100644
--- a/cve/published/2023/CVE-2023-52454.json
+++ b/cve/published/2023/CVE-2023-52454.json
@@ -114,7 +114,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -147,7 +147,7 @@
],
"title": "nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52454.mbox b/cve/published/2023/CVE-2023-52454.mbox
index efc85ab5..6440baad 100644
--- a/cve/published/2023/CVE-2023-52454.mbox
+++ b/cve/published/2023/CVE-2023-52454.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52454: nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length
@@ -39,7 +39,7 @@ Affected and fixed versions
Issue introduced in 5.0 with commit 872d26a391da and fixed in 6.1.75 with commit 2871aa407007
Issue introduced in 5.0 with commit 872d26a391da and fixed in 6.6.14 with commit 24e05760186d
Issue introduced in 5.0 with commit 872d26a391da and fixed in 6.7.2 with commit 70154e8d015c
- Issue introduced in 5.0 with commit 872d26a391da and fixed in 6.8-rc1 with commit efa56305908b
+ Issue introduced in 5.0 with commit 872d26a391da and fixed in 6.8 with commit efa56305908b
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52455.json b/cve/published/2023/CVE-2023-52455.json
index 4e28e3c5..79b89bb5 100644
--- a/cve/published/2023/CVE-2023-52455.json
+++ b/cve/published/2023/CVE-2023-52455.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "iommu: Don't reserve 0-length IOVA region",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52455.mbox b/cve/published/2023/CVE-2023-52455.mbox
index cbde37ae..e8614ea0 100644
--- a/cve/published/2023/CVE-2023-52455.mbox
+++ b/cve/published/2023/CVE-2023-52455.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52455: iommu: Don't reserve 0-length IOVA region
@@ -32,7 +32,7 @@ Affected and fixed versions
Issue introduced in 6.3 with commit a5bf3cfce8cb and fixed in 6.6.14 with commit 98b8a550da83
Issue introduced in 6.3 with commit a5bf3cfce8cb and fixed in 6.7.2 with commit 5e23e283910c
- Issue introduced in 6.3 with commit a5bf3cfce8cb and fixed in 6.8-rc1 with commit bb57f6705960
+ Issue introduced in 6.3 with commit a5bf3cfce8cb and fixed in 6.8 with commit bb57f6705960
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52456.json b/cve/published/2023/CVE-2023-52456.json
index d2a997ab..00ed5621 100644
--- a/cve/published/2023/CVE-2023-52456.json
+++ b/cve/published/2023/CVE-2023-52456.json
@@ -102,7 +102,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -132,7 +132,7 @@
],
"title": "serial: imx: fix tx statemachine deadlock",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52456.mbox b/cve/published/2023/CVE-2023-52456.mbox
index eaeaeeb1..8260df7b 100644
--- a/cve/published/2023/CVE-2023-52456.mbox
+++ b/cve/published/2023/CVE-2023-52456.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52456: serial: imx: fix tx statemachine deadlock
@@ -37,7 +37,7 @@ Affected and fixed versions
Issue introduced in 5.9 with commit cb1a60923609 and fixed in 6.1.75 with commit 63ee7be01a3f
Issue introduced in 5.9 with commit cb1a60923609 and fixed in 6.6.14 with commit 763cd6874631
Issue introduced in 5.9 with commit cb1a60923609 and fixed in 6.7.2 with commit 9a662d06c22d
- Issue introduced in 5.9 with commit cb1a60923609 and fixed in 6.8-rc1 with commit 78d60dae9a0c
+ Issue introduced in 5.9 with commit cb1a60923609 and fixed in 6.8 with commit 78d60dae9a0c
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52457.json b/cve/published/2023/CVE-2023-52457.json
index b070a925..bc75cd9f 100644
--- a/cve/published/2023/CVE-2023-52457.json
+++ b/cve/published/2023/CVE-2023-52457.json
@@ -104,7 +104,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -137,7 +137,7 @@
],
"title": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52457.mbox b/cve/published/2023/CVE-2023-52457.mbox
index 46d09236..4c314b25 100644
--- a/cve/published/2023/CVE-2023-52457.mbox
+++ b/cve/published/2023/CVE-2023-52457.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52457: serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed
@@ -35,7 +35,7 @@ Affected and fixed versions
Issue introduced in 6.1 with commit e3f0c638f428 and fixed in 6.1.75 with commit d74173bda29a
Issue introduced in 6.1 with commit e3f0c638f428 and fixed in 6.6.14 with commit 887a558d0298
Issue introduced in 6.1 with commit e3f0c638f428 and fixed in 6.7.2 with commit 95e4e0031eff
- Issue introduced in 6.1 with commit e3f0c638f428 and fixed in 6.8-rc1 with commit ad90d0358bd3
+ Issue introduced in 6.1 with commit e3f0c638f428 and fixed in 6.8 with commit ad90d0358bd3
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52458.json b/cve/published/2023/CVE-2023-52458.json
index 40387c0a..026e5aa6 100644
--- a/cve/published/2023/CVE-2023-52458.json
+++ b/cve/published/2023/CVE-2023-52458.json
@@ -80,7 +80,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -107,7 +107,7 @@
],
"title": "block: add check that partition length needs to be aligned with block size",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52458.mbox b/cve/published/2023/CVE-2023-52458.mbox
index 6b11e3da..01c7f989 100644
--- a/cve/published/2023/CVE-2023-52458.mbox
+++ b/cve/published/2023/CVE-2023-52458.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52458: block: add check that partition length needs to be aligned with block size
@@ -30,7 +30,7 @@ Affected and fixed versions
Fixed in 6.1.75 with commit ef31cc877947
Fixed in 6.6.14 with commit cb16cc1abda1
Fixed in 6.7.2 with commit bcdc288e7bc0
- Fixed in 6.8-rc1 with commit 6f64f866aa1a
+ Fixed in 6.8 with commit 6f64f866aa1a
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52459.json b/cve/published/2023/CVE-2023-52459.json
index e9ceea53..7e998144 100644
--- a/cve/published/2023/CVE-2023-52459.json
+++ b/cve/published/2023/CVE-2023-52459.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "media: v4l: async: Fix duplicated list deletion",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52459.mbox b/cve/published/2023/CVE-2023-52459.mbox
index 58e7cc50..f8e023b9 100644
--- a/cve/published/2023/CVE-2023-52459.mbox
+++ b/cve/published/2023/CVE-2023-52459.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52459: media: v4l: async: Fix duplicated list deletion
@@ -28,7 +28,7 @@ Affected and fixed versions
Issue introduced in 6.6 with commit 28a1295795d8 and fixed in 6.6.14 with commit b7062628caea
Issue introduced in 6.6 with commit 28a1295795d8 and fixed in 6.7.2 with commit 49d828114284
- Issue introduced in 6.6 with commit 28a1295795d8 and fixed in 6.8-rc1 with commit 3de6ee94aae7
+ Issue introduced in 6.6 with commit 28a1295795d8 and fixed in 6.8 with commit 3de6ee94aae7
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52460.json b/cve/published/2023/CVE-2023-52460.json
index 99aae4b5..63266cb6 100644
--- a/cve/published/2023/CVE-2023-52460.json
+++ b/cve/published/2023/CVE-2023-52460.json
@@ -54,7 +54,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -72,7 +72,7 @@
],
"title": "drm/amd/display: Fix NULL pointer dereference at hibernate",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52460.mbox b/cve/published/2023/CVE-2023-52460.mbox
index f8816e2f..8d05c468 100644
--- a/cve/published/2023/CVE-2023-52460.mbox
+++ b/cve/published/2023/CVE-2023-52460.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52460: drm/amd/display: Fix NULL pointer dereference at hibernate
@@ -21,7 +21,7 @@ Affected and fixed versions
===========================
Issue introduced in 6.7 with commit 7966f319c66d and fixed in 6.7.2 with commit 6b80326efff0
- Issue introduced in 6.7 with commit 7966f319c66d and fixed in 6.8-rc1 with commit b719a9c15d52
+ Issue introduced in 6.7 with commit 7966f319c66d and fixed in 6.8 with commit b719a9c15d52
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52461.json b/cve/published/2023/CVE-2023-52461.json
index c870d838..86e0d985 100644
--- a/cve/published/2023/CVE-2023-52461.json
+++ b/cve/published/2023/CVE-2023-52461.json
@@ -54,7 +54,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -72,7 +72,7 @@
],
"title": "drm/sched: Fix bounds limiting when given a malformed entity",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52461.mbox b/cve/published/2023/CVE-2023-52461.mbox
index fafd2b38..e09e9433 100644
--- a/cve/published/2023/CVE-2023-52461.mbox
+++ b/cve/published/2023/CVE-2023-52461.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52461: drm/sched: Fix bounds limiting when given a malformed entity
@@ -22,7 +22,7 @@ Affected and fixed versions
===========================
Issue introduced in 6.7 with commit 56e449603f0ac5 and fixed in 6.7.2 with commit 1470d173925d
- Issue introduced in 6.7 with commit 56e449603f0ac5 and fixed in 6.8-rc1 with commit 2bbe6ab2be53
+ Issue introduced in 6.7 with commit 56e449603f0ac5 and fixed in 6.8 with commit 2bbe6ab2be53
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52462.json b/cve/published/2023/CVE-2023-52462.json
index b4b4a17a..954d258c 100644
--- a/cve/published/2023/CVE-2023-52462.json
+++ b/cve/published/2023/CVE-2023-52462.json
@@ -92,7 +92,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -122,7 +122,7 @@
],
"title": "bpf: fix check for attempt to corrupt spilled pointer",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52462.mbox b/cve/published/2023/CVE-2023-52462.mbox
index df373c2f..6c6701c8 100644
--- a/cve/published/2023/CVE-2023-52462.mbox
+++ b/cve/published/2023/CVE-2023-52462.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52462: bpf: fix check for attempt to corrupt spilled pointer
@@ -30,7 +30,7 @@ Affected and fixed versions
Issue introduced in 5.16 with commit 27113c59b6d0 and fixed in 6.1.75 with commit fc3e3c50a0a4
Issue introduced in 5.16 with commit 27113c59b6d0 and fixed in 6.6.14 with commit 8dc15b067059
Issue introduced in 5.16 with commit 27113c59b6d0 and fixed in 6.7.2 with commit 40617d45ea05
- Issue introduced in 5.16 with commit 27113c59b6d0 and fixed in 6.8-rc1 with commit ab125ed3ec1c
+ Issue introduced in 5.16 with commit 27113c59b6d0 and fixed in 6.8 with commit ab125ed3ec1c
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52463.json b/cve/published/2023/CVE-2023-52463.json
index ecda73c2..30b7b86a 100644
--- a/cve/published/2023/CVE-2023-52463.json
+++ b/cve/published/2023/CVE-2023-52463.json
@@ -102,7 +102,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -132,7 +132,7 @@
],
"title": "efivarfs: force RO when remounting if SetVariable is not supported",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52463.mbox b/cve/published/2023/CVE-2023-52463.mbox
index 78ec60a0..8fe7acd5 100644
--- a/cve/published/2023/CVE-2023-52463.mbox
+++ b/cve/published/2023/CVE-2023-52463.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52463: efivarfs: force RO when remounting if SetVariable is not supported
@@ -78,7 +78,7 @@ Affected and fixed versions
Issue introduced in 5.8 with commit f88814cc2578 and fixed in 6.1.75 with commit d4a9aa7db574
Issue introduced in 5.8 with commit f88814cc2578 and fixed in 6.6.14 with commit 0049fe7e4a85
Issue introduced in 5.8 with commit f88814cc2578 and fixed in 6.7.2 with commit d4a714873db0
- Issue introduced in 5.8 with commit f88814cc2578 and fixed in 6.8-rc1 with commit 0e8d2444168d
+ Issue introduced in 5.8 with commit f88814cc2578 and fixed in 6.8 with commit 0e8d2444168d
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52464.json b/cve/published/2023/CVE-2023-52464.json
index 0274b0e1..1807d7d1 100644
--- a/cve/published/2023/CVE-2023-52464.json
+++ b/cve/published/2023/CVE-2023-52464.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,7 +162,7 @@
],
"title": "EDAC/thunderx: Fix possible out-of-bounds string access",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52464.mbox b/cve/published/2023/CVE-2023-52464.mbox
index ecf5b8bd..64950375 100644
--- a/cve/published/2023/CVE-2023-52464.mbox
+++ b/cve/published/2023/CVE-2023-52464.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52464: EDAC/thunderx: Fix possible out-of-bounds string access
@@ -47,7 +47,7 @@ Affected and fixed versions
Issue introduced in 4.12 with commit 41003396f932 and fixed in 6.1.75 with commit 9dbac9fdae6e
Issue introduced in 4.12 with commit 41003396f932 and fixed in 6.6.14 with commit e1c865112415
Issue introduced in 4.12 with commit 41003396f932 and fixed in 6.7.2 with commit 426fae93c01d
- Issue introduced in 4.12 with commit 41003396f932 and fixed in 6.8-rc1 with commit 475c58e1a471
+ Issue introduced in 4.12 with commit 41003396f932 and fixed in 6.8 with commit 475c58e1a471
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52465.json b/cve/published/2023/CVE-2023-52465.json
index 59aa1a8d..2a099a40 100644
--- a/cve/published/2023/CVE-2023-52465.json
+++ b/cve/published/2023/CVE-2023-52465.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "power: supply: Fix null pointer dereference in smb2_probe",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52465.mbox b/cve/published/2023/CVE-2023-52465.mbox
index 523fd8d0..8ed36b7d 100644
--- a/cve/published/2023/CVE-2023-52465.mbox
+++ b/cve/published/2023/CVE-2023-52465.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52465: power: supply: Fix null pointer dereference in smb2_probe
@@ -22,7 +22,7 @@ Affected and fixed versions
Issue introduced in 6.5 with commit 8648aeb5d7b7 and fixed in 6.6.14 with commit e2717302fbc2
Issue introduced in 6.5 with commit 8648aeb5d7b7 and fixed in 6.7.2 with commit bd3d2ec447ed
- Issue introduced in 6.5 with commit 8648aeb5d7b7 and fixed in 6.8-rc1 with commit 88f04bc3e737
+ Issue introduced in 6.5 with commit 8648aeb5d7b7 and fixed in 6.8 with commit 88f04bc3e737
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52467.json b/cve/published/2023/CVE-2023-52467.json
index da218cc8..99cf5382 100644
--- a/cve/published/2023/CVE-2023-52467.json
+++ b/cve/published/2023/CVE-2023-52467.json
@@ -102,7 +102,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -132,7 +132,7 @@
],
"title": "mfd: syscon: Fix null pointer dereference in of_syscon_register()",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52467.mbox b/cve/published/2023/CVE-2023-52467.mbox
index 1de438ff..404dc6ec 100644
--- a/cve/published/2023/CVE-2023-52467.mbox
+++ b/cve/published/2023/CVE-2023-52467.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52467: mfd: syscon: Fix null pointer dereference in of_syscon_register()
@@ -25,7 +25,7 @@ Affected and fixed versions
Issue introduced in 5.9 with commit e15d7f2b81d2 and fixed in 6.1.75 with commit 527e8c5f3d00
Issue introduced in 5.9 with commit e15d7f2b81d2 and fixed in 6.6.14 with commit 3ef1130deee9
Issue introduced in 5.9 with commit e15d7f2b81d2 and fixed in 6.7.2 with commit 7f2c410ac470
- Issue introduced in 5.9 with commit e15d7f2b81d2 and fixed in 6.8-rc1 with commit 41673c66b3d0
+ Issue introduced in 5.9 with commit e15d7f2b81d2 and fixed in 6.8 with commit 41673c66b3d0
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52468.json b/cve/published/2023/CVE-2023-52468.json
index 8962256a..3a28f7bf 100644
--- a/cve/published/2023/CVE-2023-52468.json
+++ b/cve/published/2023/CVE-2023-52468.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "class: fix use-after-free in class_register()",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52468.mbox b/cve/published/2023/CVE-2023-52468.mbox
index 4595a31f..4b158569 100644
--- a/cve/published/2023/CVE-2023-52468.mbox
+++ b/cve/published/2023/CVE-2023-52468.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52468: class: fix use-after-free in class_register()
@@ -66,7 +66,7 @@ Affected and fixed versions
Issue introduced in 6.4 with commit dcfbb67e48a2 and fixed in 6.6.14 with commit b57196a5ec5e
Issue introduced in 6.4 with commit dcfbb67e48a2 and fixed in 6.7.2 with commit 0f1486dafca3
- Issue introduced in 6.4 with commit dcfbb67e48a2 and fixed in 6.8-rc1 with commit 93ec4a3b7640
+ Issue introduced in 6.4 with commit dcfbb67e48a2 and fixed in 6.8 with commit 93ec4a3b7640
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52469.json b/cve/published/2023/CVE-2023-52469.json
index 9ee0598e..98448211 100644
--- a/cve/published/2023/CVE-2023-52469.json
+++ b/cve/published/2023/CVE-2023-52469.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,7 +162,7 @@
],
"title": "drivers/amd/pm: fix a use-after-free in kv_parse_power_table",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52469.mbox b/cve/published/2023/CVE-2023-52469.mbox
index c119eca6..c7281cd5 100644
--- a/cve/published/2023/CVE-2023-52469.mbox
+++ b/cve/published/2023/CVE-2023-52469.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52469: drivers/amd/pm: fix a use-after-free in kv_parse_power_table
@@ -36,7 +36,7 @@ Affected and fixed versions
Issue introduced in 4.2 with commit a2e73f56fa62 and fixed in 6.1.75 with commit 35fa2394d26e
Issue introduced in 4.2 with commit a2e73f56fa62 and fixed in 6.6.14 with commit 95084632a65d
Issue introduced in 4.2 with commit a2e73f56fa62 and fixed in 6.7.2 with commit 3426f059eacc
- Issue introduced in 4.2 with commit a2e73f56fa62 and fixed in 6.8-rc1 with commit 28dd788382c4
+ Issue introduced in 4.2 with commit a2e73f56fa62 and fixed in 6.8 with commit 28dd788382c4
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52470.json b/cve/published/2023/CVE-2023-52470.json
index dc1a4a39..cea24fd8 100644
--- a/cve/published/2023/CVE-2023-52470.json
+++ b/cve/published/2023/CVE-2023-52470.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,7 +162,7 @@
],
"title": "drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52470.mbox b/cve/published/2023/CVE-2023-52470.mbox
index 30024330..642d5562 100644
--- a/cve/published/2023/CVE-2023-52470.mbox
+++ b/cve/published/2023/CVE-2023-52470.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52470: drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()
@@ -27,7 +27,7 @@ Affected and fixed versions
Issue introduced in 3.16 with commit fa7f517cb26e and fixed in 6.1.75 with commit c4ff55408187
Issue introduced in 3.16 with commit fa7f517cb26e and fixed in 6.6.14 with commit 0b813a6a0087
Issue introduced in 3.16 with commit fa7f517cb26e and fixed in 6.7.2 with commit fb2d8bc9b5e5
- Issue introduced in 3.16 with commit fa7f517cb26e and fixed in 6.8-rc1 with commit 7a2464fac80d
+ Issue introduced in 3.16 with commit fa7f517cb26e and fixed in 6.8 with commit 7a2464fac80d
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52471.json b/cve/published/2023/CVE-2023-52471.json
index 143aa4bf..4cad16d9 100644
--- a/cve/published/2023/CVE-2023-52471.json
+++ b/cve/published/2023/CVE-2023-52471.json
@@ -54,7 +54,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -72,7 +72,7 @@
],
"title": "ice: Fix some null pointer dereference issues in ice_ptp.c",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52471.mbox b/cve/published/2023/CVE-2023-52471.mbox
index d9ff6335..1868c2a9 100644
--- a/cve/published/2023/CVE-2023-52471.mbox
+++ b/cve/published/2023/CVE-2023-52471.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52471: ice: Fix some null pointer dereference issues in ice_ptp.c
@@ -21,7 +21,7 @@ Affected and fixed versions
===========================
Issue introduced in 6.7 with commit d938a8cca88a and fixed in 6.7.2 with commit 3cd9b9bee33f
- Issue introduced in 6.7 with commit d938a8cca88a and fixed in 6.8-rc1 with commit 3027e7b15b02
+ Issue introduced in 6.7 with commit d938a8cca88a and fixed in 6.8 with commit 3027e7b15b02
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52472.json b/cve/published/2023/CVE-2023-52472.json
index 7d63285f..5185dd92 100644
--- a/cve/published/2023/CVE-2023-52472.json
+++ b/cve/published/2023/CVE-2023-52472.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "crypto: rsa - add a check for allocation failure",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52472.mbox b/cve/published/2023/CVE-2023-52472.mbox
index 946ae1e6..647d72bd 100644
--- a/cve/published/2023/CVE-2023-52472.mbox
+++ b/cve/published/2023/CVE-2023-52472.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52472: crypto: rsa - add a check for allocation failure
@@ -24,7 +24,7 @@ Affected and fixed versions
Issue introduced in 6.5 with commit 6637e11e4ad2 and fixed in 6.6.14 with commit 2831f4d3bfa6
Issue introduced in 6.5 with commit 6637e11e4ad2 and fixed in 6.7.2 with commit 95ad8b6879e2
- Issue introduced in 6.5 with commit 6637e11e4ad2 and fixed in 6.8-rc1 with commit d872ca165cb6
+ Issue introduced in 6.5 with commit 6637e11e4ad2 and fixed in 6.8 with commit d872ca165cb6
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52473.json b/cve/published/2023/CVE-2023-52473.json
index 7bf7edb2..e738ed0c 100644
--- a/cve/published/2023/CVE-2023-52473.json
+++ b/cve/published/2023/CVE-2023-52473.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "thermal: core: Fix NULL pointer dereference in zone registration error path",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52473.mbox b/cve/published/2023/CVE-2023-52473.mbox
index dcb82813..54e654d8 100644
--- a/cve/published/2023/CVE-2023-52473.mbox
+++ b/cve/published/2023/CVE-2023-52473.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52473: thermal: core: Fix NULL pointer dereference in zone registration error path
@@ -33,7 +33,7 @@ Affected and fixed versions
Issue introduced in 6.4 with commit 3d439b1a2ad3 and fixed in 6.6.14 with commit 335176dd8eba
Issue introduced in 6.4 with commit 3d439b1a2ad3 and fixed in 6.7.2 with commit 02871710b930
- Issue introduced in 6.4 with commit 3d439b1a2ad3 and fixed in 6.8-rc1 with commit 04e6ccfc93c5
+ Issue introduced in 6.4 with commit 3d439b1a2ad3 and fixed in 6.8 with commit 04e6ccfc93c5
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52485.json b/cve/published/2023/CVE-2023-52485.json
index fac3608c..8d5ce5b5 100644
--- a/cve/published/2023/CVE-2023-52485.json
+++ b/cve/published/2023/CVE-2023-52485.json
@@ -44,7 +44,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -62,14 +62,14 @@
],
"title": "drm/amd/display: Wake DMCUB before sending a command",
"x_generator": {
- "engine": "bippy-a950984f39ee"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2023-52485",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2023/CVE-2023-52485.mbox b/cve/published/2023/CVE-2023-52485.mbox
index a2e5e269..3b51f0bb 100644
--- a/cve/published/2023/CVE-2023-52485.mbox
+++ b/cve/published/2023/CVE-2023-52485.mbox
@@ -1,24 +1,8 @@
-From bippy-a950984f39ee Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52485: drm/amd/display: Wake DMCUB before sending a command
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3443; i=lee@kernel.org;
- h=from:subject; bh=REMPmDBLhOdGPA5JP0kK2e1jckJ+7EJUFy4COiSmouk=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4Jv5NzfuRIYmazUapTPBkRZg86iueGGT06Nxd
- mr8a4qL5VWJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCb+QAKCRBRr4ovh/x3
- YWEZD/0ZzguuG0Rm6Jkz1r/WKXs5ZpuRHovMMPxwhZ0adNkceNXejYIYsTbm4RQpGLNSUGyZdhV
- cPa5mwitipphShqJ3CIUV/2YikmzyLRhhkMmXIEHZXd2nr+CnwaHW1Naj8DDmegue2Fe6cOwZzT
- 8dXfmRYGC9x2wqcde0FoD5J0l1rSFiyCLE5+c4bXjrbq+Vvv/Q40g5NVmIG05/3XkkO6rStQl5M
- yBQ5ERKVTIiQP+l3YuILWRhD0ZggriEvoZoFr7PP/BZtjtlKgRrFSZ+DEksllkLdt1vmO2Tcx5/
- WvNfPd236v4ikcczRRrjonzJg4Lga0GFc0YeFZMKdMI3suG+hNzpzcTl5Ta2Z04qOHcv986W8wN
- EtxMMeUd7k+sXacuLVbzQQWG+INRQ9RB6kwIrqb9dcJWtnW4MgKWieiays9a0i0rksSlDVOXGrM
- RJ4U4ZWJb+Iwr/23cYtl0O8vscU6/EnJNnNlehCoXq1rSVttRbRkTnr7YCsb8INaqnUTHDmR5AJ
- EVm30sEKCA9Fjy3AodtDqdoRKI2wDHkKBOZOL1uYwqZhMInyn4F78rwCt9x/grV8cjpACSLmeFz
- QIQ8jveP9ZULByMd3AD3/bMMpdl2shRKPun38XkXXe0CakYHdjyiitLbdvKaoYrPPDKHoWzEHYw
- 4bL5kQoCaVhNp1A==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -50,7 +34,7 @@ Affected and fixed versions
===========================
Fixed in 6.7.3 with commit 303197775a97
- Fixed in 6.8-rc1 with commit 8892780834ae
+ Fixed in 6.8 with commit 8892780834ae
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52486.json b/cve/published/2023/CVE-2023-52486.json
index 32523120..b73f1015 100644
--- a/cve/published/2023/CVE-2023-52486.json
+++ b/cve/published/2023/CVE-2023-52486.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,14 +152,14 @@
],
"title": "drm: Don't unref the same fb many times by mistake due to deadlock handling",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2023-52486",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2023/CVE-2023-52486.mbox b/cve/published/2023/CVE-2023-52486.mbox
index d8449fcf..d19b055a 100644
--- a/cve/published/2023/CVE-2023-52486.mbox
+++ b/cve/published/2023/CVE-2023-52486.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52486: drm: Don't unref the same fb many times by mistake due to deadlock handling
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3176; i=lee@kernel.org;
- h=from:subject; bh=Ekaplg3s5nyYPYOp2zoFs3oNb5TGT/hqZAtX3NU7Dh0=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhN/aYVokKz8tj/vwyH882X/nvcwSAwceJzO
- UHi5ue6mXqJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTQAKCRBRr4ovh/x3
- YXtCD/sEZ0L7/e+Fd1vlGSF+lnugDUB7/HmNbUDA6Hyq+231ACM2Y/tLQ5Iiktyi8cY4lZ/t4/F
- RsR71O8rJf4uk+6M7B+gQGxcCc2dZRwu9tz03rU1eFc3mp7h7bfeEd/WKqzhCkY8iaechim+U2F
- hOQe2q52OlpD85DU/JbJxlxjcTjzkBD+R1k9kusV3HwGMhdwA63dKpC87Db2tvD7AuZiLWTLDk2
- biQAvM3hgJCT9DizL088355iMLIMCU/xNy5ye/9WgQsXsDwKHJdSwF+fXZTkDkco86S5QnlOyRp
- 71kilWUnfku1Jg6kEHi5UDv+W0Up1YxiQUsvmVK2hGZ+1eE0SQXU5XCr5PSzYWwlamC19wJkxrg
- K63452b4MXt/ehUg2I1F0gkfUcCGKxRAqHJmUL8Nf0L6Azjzi/kdDJtg9lcQwbLcSv+Juw7ntZ2
- yDG7lJau3zRUnMqS4iiSeEECi+d5rIMZRyOJSsFyl52/aX4YdKOLd3KE+vYsRFDmmJzqB2M7WHU
- l6l4uqlwZ7IJjsP7Y7+VBb9oUIc8NtuZGkCuwNQlqU7vOMy6lhz5Y2EWr8xhHM4Fs9KNdJcugtK
- fHoTsXBm75u3xS4sjhbSpuSWmDgtlxRJtx+s6g5EbmgyfKFyYI5E4aJJeSRgU3g0TcvrCWJPknb
- nFuJ728gzCiYvQg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -57,7 +41,7 @@ Affected and fixed versions
Fixed in 6.1.76 with commit 62f2e79cf9f4
Fixed in 6.6.15 with commit d7afdf360f4a
Fixed in 6.7.3 with commit bfd0feb1b109
- Fixed in 6.8-rc1 with commit cb4daf271302
+ Fixed in 6.8 with commit cb4daf271302
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52487.json b/cve/published/2023/CVE-2023-52487.json
index ba868f42..08ea61b2 100644
--- a/cve/published/2023/CVE-2023-52487.json
+++ b/cve/published/2023/CVE-2023-52487.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc2",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,14 +87,14 @@
],
"title": "net/mlx5e: Fix peer flow lists handling",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2023-52487",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2023/CVE-2023-52487.mbox b/cve/published/2023/CVE-2023-52487.mbox
index c83c0bf0..bb8b32d9 100644
--- a/cve/published/2023/CVE-2023-52487.mbox
+++ b/cve/published/2023/CVE-2023-52487.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52487: net/mlx5e: Fix peer flow lists handling
-X-Developer-Signature: v=1; a=openpgp-sha256; l=7649; i=lee@kernel.org;
- h=from:subject; bh=rfMg+kCS0JEvsPW2dvFKd3PYACOWWDjMsgdKgjChkcA=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhNUxTBQvIdZ3CHx2cG18cs3rDyZ3aiFWSJg
- wvKevPpCXWJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTQAKCRBRr4ovh/x3
- Ya+LEACXnHPepVCyP8gmpMXC/tkE0DlNt+HfgkVJBAniKg+tNZv6kQrnhPa03bdcaGpLzReguFN
- 9r3BhZrRvL3dC0irKR+96RIMpUxYAPbKt58WQ3ClInR5I1Av3DWh2dZyupc/nSRllD1BUQuVsi6
- JIIZdgqUx+NlS09vkzwb+v8HZ76AHkRNPlKFIbA+9oSjopMqFDmvNg48Z843mfn4u51CCB1qQfu
- hAn3ln6RsyqADC0mlPqMsWuGhWWt1SPDRlLatTuwdkRy93JAklWz5cH59QuDsl8VecATW8vTh32
- 1JArOvlCYk0xPuIl6F1HCeCNI04YzGBKSmhTy57T4xrBZLoZ2f8w+zeZCr080lHsGdxN3JkRzjA
- jI7ZGAKyu5MEFSn90uoIRNwgEbmQI72a8LSmQnleKlaRDJA7XWjs6AIF4mlRGtiocd8l+HQnCeA
- lmVXhHs/PP0fxNR2kGWzlWupPpve1kxKNTO9HG1wuBU9eo3z3RAWlBvpkZbSmMYjChJAPP9Clzb
- vJ9TQMkiXi4b9DolkW8wg0eLZSeIWcYfirRo6xYJzUsHi7XA8znjEh7nPQcPUrKNKBFMVewhVQK
- ow/lqhCOEXGhJAxGPkxsEcgyK9jLul+uUaAm68Bf+KbS+mpNjJCYi7tKlJjSMb2qoLJXCyrHuEp
- 1XCZYSchiEkyaJg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -124,7 +108,7 @@ Affected and fixed versions
Issue introduced in 6.5 with commit 9be6c21fdcf8 and fixed in 6.6.15 with commit 74cec142f89b
Issue introduced in 6.5 with commit 9be6c21fdcf8 and fixed in 6.7.3 with commit e24d6f5a7f2d
- Issue introduced in 6.5 with commit 9be6c21fdcf8 and fixed in 6.8-rc2 with commit d76fdd31f953
+ Issue introduced in 6.5 with commit 9be6c21fdcf8 and fixed in 6.8 with commit d76fdd31f953
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52488.json b/cve/published/2023/CVE-2023-52488.json
index fb8ae768..595e72f5 100644
--- a/cve/published/2023/CVE-2023-52488.json
+++ b/cve/published/2023/CVE-2023-52488.json
@@ -78,7 +78,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -102,14 +102,14 @@
],
"title": "serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2023-52488",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2023/CVE-2023-52488.mbox b/cve/published/2023/CVE-2023-52488.mbox
index f29fb2aa..5b9786c2 100644
--- a/cve/published/2023/CVE-2023-52488.mbox
+++ b/cve/published/2023/CVE-2023-52488.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52488: serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3032; i=lee@kernel.org;
- h=from:subject; bh=yU3Ky//xlNQZigWybM1/O3e6szI4tSMGhq3o7WLa3eg=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhNMIoUq3MfPdxgufhl+q0KgzrFeKL3K0uGe
- QDnSc44BSaJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTQAKCRBRr4ovh/x3
- YXwpD/0bC4gkLsAERSR/no/ZF8UVqNjpmW8/k4SCVxZkP+zfSWXC3OZ/jL17DgLuC3mixo3DN6X
- Jm9nhK8nLglJz8t1+4dpEu6cL/+irb6BMnDsWUuy3UpjClwo/z6IOX761BIFyfmF7dEAZaCJMUB
- k8nj54tBHkGo+YENdvyn3WFiSRccwwwmmSXu5KEW4bT6J0/8rXnRen99Pe8ZeZ6MHg/wkmKiZh0
- XaI39bqtAusHVZzDu5xKefxoVWAmz55uK3Z1Xv2zH+Ef9lPhSZA454jvcMSklNRrnXP2S88IXG7
- TxKFQqXHEmM4UuN/zAAeoYNWbVRM8OGn/yvJYrybJ3VFKW5AVxV6DD5ls5ZE17qg55ldZsmw0I1
- mhSWKj5jP2KXofgYLE/LI2k1fMBXy3HF/hUAD3lrts1iQh3Ep/lFWtk7EWLYMUrsSHdqRLExF42
- oDjF55dbPXQNyXvlk26i8r7REBf+LI/iULjzj4N8EO0K9Ks5DBUJ14xtVG//mFSYcAHRJF8zenV
- GfUT4IiIcFB67bbOszDNi/C/Hb8PPAG7hxNA75OXl/xN/XUjFDfN+sRTvpDKawYjU8DejKOthnf
- /DIAbytRTp80J6MP3K2YOGCyDJSQ4vrfPsHBEd7KlYkexRkil2J3ADr0K6XO6tnrlCoV9h+bFQR
- hvFt5p6zMXTfPoA==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -54,7 +38,7 @@ Affected and fixed versions
Issue introduced in 3.16 with commit dfeae619d781 and fixed in 6.1.76 with commit 416b10d2817c
Issue introduced in 3.16 with commit dfeae619d781 and fixed in 6.6.15 with commit 084c24e788d9
Issue introduced in 3.16 with commit dfeae619d781 and fixed in 6.7.3 with commit aa7cb4787698
- Issue introduced in 3.16 with commit dfeae619d781 and fixed in 6.8-rc1 with commit dbf4ab821804
+ Issue introduced in 3.16 with commit dfeae619d781 and fixed in 6.8 with commit dbf4ab821804
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52489.json b/cve/published/2023/CVE-2023-52489.json
index 43c954b2..7c890082 100644
--- a/cve/published/2023/CVE-2023-52489.json
+++ b/cve/published/2023/CVE-2023-52489.json
@@ -102,7 +102,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -132,14 +132,14 @@
],
"title": "mm/sparsemem: fix race in accessing memory_section->usage",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2023-52489",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2023/CVE-2023-52489.mbox b/cve/published/2023/CVE-2023-52489.mbox
index 0d89b202..7a46cd5f 100644
--- a/cve/published/2023/CVE-2023-52489.mbox
+++ b/cve/published/2023/CVE-2023-52489.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52489: mm/sparsemem: fix race in accessing memory_section->usage
-X-Developer-Signature: v=1; a=openpgp-sha256; l=7029; i=lee@kernel.org;
- h=from:subject; bh=ahGAXOwHPQfrujxAksfIv5OhQN45hwNEdePTnF4s1YM=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhOafmnC9BtTdAE2gZvcJj6wGKZUuKJx533r
- Fc2U6+v0SOJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTgAKCRBRr4ovh/x3
- Yek9D/0ZJ6Jvp+2i3lmYgymdMTMHYMNLIZT71oy1nzbHm508VVlOS3tsZxYpeX0N5bQwQytHpxd
- 0e2JkzkyjsWRakyHQRS4TQ3V9hCBbxNts2sh8TKAWEqyPK9C9vDWSWF2gL0G16aM4PkpOx7ijoJ
- 60drUPdLQlSBiFQVgHfBoc1BV9XkiyA2y0PVUYuZ/8IRQDgRVoTQjiJwxXUm2ut5eznxf+Y34WN
- 5NpRv7199UOJQdd2HzE5uQbaUkBDqhWPlJNR4WIBkbXOmm5Du/udfxXWLa+adtFrxY7e4vpJAl3
- rc/Z1wTrFzAqzDQQYcdr+ay7g+xuRTqST2THQUuboShCf7UUITAppKfmyY/0gYeoZbVkJKwUqic
- +03G0IQTD62uB9P0MJqLhqoqoJbZ7/CvdN+DdhJGOyVNBYQVCYiqMksNJBKS25yJoSrIe5vcdb5
- BuB2jJv0lniyb9R2V3oypmfRJDr6Ee/plEvkzaZeoEl66+CnYNiMkB5Wpk+Z+acYCx8q9WkMAN5
- an6oFoA2mvCSbcZtwD5d8AowZvPVyyb4zRX28JxjxdN3DKO0ribi7GnueBzpGnx5sSzXawIUFPa
- n4njbJI7KKnKuvI1zMim1D+4jlI+08iO9BxyEyWsdfo4gczkNKGscKC9mqZz3LMhSeVbt5X25No
- wXdbjpZFiOwl/3A==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -135,7 +119,7 @@ Affected and fixed versions
Issue introduced in 5.3 with commit f46edbd1b151 and fixed in 6.1.76 with commit 68ed9e333240
Issue introduced in 5.3 with commit f46edbd1b151 and fixed in 6.6.15 with commit 70064241f222
Issue introduced in 5.3 with commit f46edbd1b151 and fixed in 6.7.3 with commit 3a01daace71b
- Issue introduced in 5.3 with commit f46edbd1b151 and fixed in 6.8-rc1 with commit 5ec8e8ea8b77
+ Issue introduced in 5.3 with commit f46edbd1b151 and fixed in 6.8 with commit 5ec8e8ea8b77
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52490.json b/cve/published/2023/CVE-2023-52490.json
index 94ca9284..ccf69a7c 100644
--- a/cve/published/2023/CVE-2023-52490.json
+++ b/cve/published/2023/CVE-2023-52490.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,14 +87,14 @@
],
"title": "mm: migrate: fix getting incorrect page mapping during page migration",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2023-52490",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2023/CVE-2023-52490.mbox b/cve/published/2023/CVE-2023-52490.mbox
index cfe9a180..de029ecb 100644
--- a/cve/published/2023/CVE-2023-52490.mbox
+++ b/cve/published/2023/CVE-2023-52490.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52490: mm: migrate: fix getting incorrect page mapping during page migration
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4186; i=lee@kernel.org;
- h=from:subject; bh=ZBVwCCKlBVdibLgpACGKWQea2cD/umY1ae/Nn0Q8Hto=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhO42Ovx9dA7GIA3sRzrAAKCIpJ7uo9xj5ZV
- OIoHAWYRRSJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTgAKCRBRr4ovh/x3
- Yck7D/9QFZQ9nrH8y5sBwu7rSTdxz11WKFSJ8E1Xr0ADpJ9lMbX6kwhFZ1GXCOdLPdhcGLXYATd
- fm6/MLghu2dk969938PT01N2IKu5VUUoeyZ7/AMaFXsSpgTPKT1KLHpu5zENvt0Q9oJew5avSXs
- h20b5ahQ7/Zx9lngQCsNuvuohcwwrcdzdnuCbkSywi51rsyt9M1xRHD4ffR7zUEf09HAPS8svKE
- BAqGp81B76FcwhQnD3yjGlVPRuDj3uMNVDfByLYgqPo7GD+UMOdqrolRMqILVQ9NWZULUdIhcrc
- 3Ih+w+2sIJpmecy3HK1YRdv0YOs2twGnSvlnMDM+HGmvrtJGSCn49govS4XP2/7dNLYR851d5bx
- 3FP185LMyTd20FDpac77t/F9O5o0CtAwMlpoH5HjHvIBy6zBRmxL8MtnwFQp3pebEtCiIJPCUXo
- 6kH0fnrEGwp8mktvBX+HNFOk8CRm0hOVqhPd4IVLDboZxO8J+4ElAKF4YVwaJNhqOtnAAS7WRn8
- Jn393lJ5R7dEPHLIEC3GN8Ad+/+fsqsuaJ3IfumCUNGjG69tvhLwJlKqEgfCfsMu+KF0+XXIIHv
- 9wiqIYQmBGG1lFkMN4stRtBi5l+VMS4cq1A0uqyTLjqY/e0ER32OBXmL7iCEwIOfvVQhcg7y6Al
- IY5/ZkXePkOZS+g==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -89,7 +73,7 @@ Affected and fixed versions
Issue introduced in 6.3 with commit 64c8902ed441 and fixed in 6.6.15 with commit 9128bfbc5c80
Issue introduced in 6.3 with commit 64c8902ed441 and fixed in 6.7.3 with commit 3889a418b6eb
- Issue introduced in 6.3 with commit 64c8902ed441 and fixed in 6.8-rc1 with commit d1adb25df711
+ Issue introduced in 6.3 with commit 64c8902ed441 and fixed in 6.8 with commit d1adb25df711
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52491.json b/cve/published/2023/CVE-2023-52491.json
index 02a0598c..3125d175 100644
--- a/cve/published/2023/CVE-2023-52491.json
+++ b/cve/published/2023/CVE-2023-52491.json
@@ -102,7 +102,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -132,14 +132,14 @@
],
"title": "media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2023-52491",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2023/CVE-2023-52491.mbox b/cve/published/2023/CVE-2023-52491.mbox
index 26b5f24f..4f2a90e7 100644
--- a/cve/published/2023/CVE-2023-52491.mbox
+++ b/cve/published/2023/CVE-2023-52491.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52491: media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3480; i=lee@kernel.org;
- h=from:subject; bh=LIOWkKuyoojmpK7TbIuB6Yb/ARauC1qmukZ5SeY0P00=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhOlMWAsjY/nu2I3+Bo8EYBFWkqhBS8RPO2S
- lPdg6zOZBWJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTgAKCRBRr4ovh/x3
- YbiYEAChjkMZl1QeCpCRGRNH0cUAv+INRupV2CSXqnGg66REVJsUiACUT4xyDY3S0/ZiiYG6qa6
- pT80Q101+zyFFoL8c3inl62UWZGxQdtuOzHXX92JFOuBL5VIsd1/nLFPewoqSgNhuViTn7g9XoK
- PP/JNV3I4u9fONsOpoCUFbv//YXYtdxHaxcdLDTpYkbiBCZ1eSsLQoNi2yb53ZjTgGxNxcD0ztT
- mx5EsB0qwrZGQF+P9MISu34GzZhVDYXBjaHHMcjsDEXBVDvX7OKeAQPU9d086oXi5hPXalbbmB7
- 8fmNgDQByiDuYSl3284KffOoYdSH4l+raxp2zeW2kOn9kQ+OD2E3DlRSf8y9sa9xjVXSQgfIV95
- 3N40tZt/2XEZ2jFsKjW27kUOa14kYwjz2SXiBgoP21kn+Ft2KH0yclRtrVCtvtq/DJLqeykJYWE
- WUvGr16l0SQYN1xeGVQ3A5xlEBSJ2GcYCM9VgJsjclG2YqDKmZLlixObBynkcEMTMpuAftzGnNP
- 0HYPdavQ1ZORY5ar1hk76XomC3UzcRcbt/4eberImK/7cJQ0uab97tuIJjWbdWb1JacZKbNL7FK
- 74o12glC9dzZwNqdBD8V/Jvs5ricVcOnXzqZKZ8Zk8uNpP+FvzCJbPBXNNiH1ewM6YA5al2XBju
- qZN6xXtIS9XoJ+g==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -68,7 +52,7 @@ Affected and fixed versions
Issue introduced in 4.12 with commit b2f0d2724ba4 and fixed in 6.1.76 with commit 9fec4db7fff5
Issue introduced in 4.12 with commit b2f0d2724ba4 and fixed in 6.6.15 with commit 8254d54d00eb
Issue introduced in 4.12 with commit b2f0d2724ba4 and fixed in 6.7.3 with commit 6e2f37022f0f
- Issue introduced in 4.12 with commit b2f0d2724ba4 and fixed in 6.8-rc1 with commit 206c857dd17d
+ Issue introduced in 4.12 with commit b2f0d2724ba4 and fixed in 6.8 with commit 206c857dd17d
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52492.json b/cve/published/2023/CVE-2023-52492.json
index 59930815..891be93e 100644
--- a/cve/published/2023/CVE-2023-52492.json
+++ b/cve/published/2023/CVE-2023-52492.json
@@ -102,7 +102,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -132,14 +132,14 @@
],
"title": "dmaengine: fix NULL pointer in channel unregistration function",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2023-52492",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2023/CVE-2023-52492.mbox b/cve/published/2023/CVE-2023-52492.mbox
index 5fcd9716..7e13db76 100644
--- a/cve/published/2023/CVE-2023-52492.mbox
+++ b/cve/published/2023/CVE-2023-52492.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52492: dmaengine: fix NULL pointer in channel unregistration function
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3268; i=lee@kernel.org;
- h=from:subject; bh=+5hFDFLdNcm+pw3c7Gm8sIfb+jKzB0OKc3stmYFxO0w=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhO3hw2qzpE6Js/L0vqSQHo0ElMXkpTpLMgd
- zB9MDE1/VCJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTgAKCRBRr4ovh/x3
- YRPUEACPniaqqODc+m7jWHUWy0ibpw1aDEq7fQNGNq7z/Es34YoJnvhRxc7gLPt8A4a+Hm8tSfQ
- M+vWsqp6m1qCDt9dwEST7SAnaLGqbX+WazIOSBbQDX4w3FqH/dI0hosnUV4T54AWe5YQoe6lvzZ
- Y37za5LNuShV5kgbTwDe7MRE67VbPJqIEVllV5A5wAtbKqaXiaqybBOZIXZtknOC7PgHZsLgboh
- P/DKnVcKcWwDtk1l5/wsaujF6dJsFyUXKFi8MZ+sedUAc7N8y5B/Q/cPpRc6+H9P7HwrGVeyl+P
- Di/SGNq6tHf90lOUaUDuEhtg3GbClYvDo9zH1p1cStu5ojCBfjJolmQfLyALVf7MXxgB7C7iRDm
- 2m39UW2aMXmML4Lw8oV/q3ELkd/oykOULId1kokVZ8Um0MhfgK94xLlI4MI/xQVuTCXTCFEBRhu
- 0AYlM8KPOrqoYrhrO0AuMzWos8Su8ZmUk3zb5kHRSguVbAtTDH1oVZg6qrUg5GF2rLGZpOCi0mR
- spJQynjEwjM0yi8FI7w7S3w1aPg/A6MtFzWb1juD2/McSgYaSG+sgbBJhIRzv/mz+gOPvfg7K7/
- wYp4/eB7Vd6OffaBIaas2acDeZKZ8PxYj1eD/lB5UoPUmQy1C7zNqF0Vptq04XyeNWpNoB/7KV5
- 8dB2lD2/67E15LQ==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -57,7 +41,7 @@ Affected and fixed versions
Issue introduced in 5.6 with commit d2fb0a043838 and fixed in 6.1.76 with commit 2ab32986a0b9
Issue introduced in 5.6 with commit d2fb0a043838 and fixed in 6.6.15 with commit 7f0ccfad2031
Issue introduced in 5.6 with commit d2fb0a043838 and fixed in 6.7.3 with commit 9263fd2a6348
- Issue introduced in 5.6 with commit d2fb0a043838 and fixed in 6.8-rc1 with commit f5c24d94512f
+ Issue introduced in 5.6 with commit d2fb0a043838 and fixed in 6.8 with commit f5c24d94512f
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52493.json b/cve/published/2023/CVE-2023-52493.json
index 33de1c6b..8f0071bd 100644
--- a/cve/published/2023/CVE-2023-52493.json
+++ b/cve/published/2023/CVE-2023-52493.json
@@ -102,7 +102,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -132,14 +132,14 @@
],
"title": "bus: mhi: host: Drop chan lock before queuing buffers",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2023-52493",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2023/CVE-2023-52493.mbox b/cve/published/2023/CVE-2023-52493.mbox
index 880d8ef2..c29fa157 100644
--- a/cve/published/2023/CVE-2023-52493.mbox
+++ b/cve/published/2023/CVE-2023-52493.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52493: bus: mhi: host: Drop chan lock before queuing buffers
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2747; i=lee@kernel.org;
- h=from:subject; bh=6UJH1uGg34usRQ5LYXA5a+sARxaN7verWEIGTz09xvY=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhOBF7G37oXhjktVHPWD6wDuayrQKSVEiSfR
- haLL3W7hAKJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTgAKCRBRr4ovh/x3
- YaLUD/41+NuuBtst3szwrmT/NHUf9qpbyv2s7AJ4alziXC9OF3XMHLSzoK0M+q8P7Zxnbp+KU+/
- AQqWn/A2/by+swq3581U1Po4kImLS7JGiWdralfboa9Hut0c0UC7640KCJN9V8jxOwvpADwvNAg
- dzn4MdBqIJVlLV6A8jWgAv8P/9PcK8KSMy1zBEMhCqACy2jzd3BmkPgjbl6pheqyGPi9JMRfT5X
- iaBDftUDGBzwJ7Jm3COtfOd9bKlqQrqjArKd6MwpL+YSA5I7kmJpn5fZ0TeS+ml3V2P02Mobgz7
- J3lCYB38/h5ymBXu5INAoLqdgIOIRFlnbteYkyh+KUkhsx4AEkP/b005Ww+9/A26ZXX26R7vs0J
- sp4wE7JThNpjkC/yxCoDea+cAErVitZI4GIxPajom2AfeKioVqHjJRQ1fD912PA1oHPLwxMNomP
- Ff7ol13P14/+/SUh8Mg4nn0nLk8drwRgDWIBKFTt7NgMj3MU2DcH86y8ItN5Gre4KmBnsxaVH9E
- NoHa2OM3AHT8g6T3AEtXNTOoBnzrCDk13YMAEBQHlVk8KexRfVOpdeLyRJyPxrPUif/uFaMvVuf
- SqqzgNDtfbtgkug4Hoykk5SxN+2fzVZtMU1DEbupsKKjK/tBLhMrOKhHKC1YUoALmoMnoPj7u0E
- MUGDfceYu8HuT0g==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -46,7 +30,7 @@ Affected and fixed versions
Issue introduced in 5.7 with commit 1d3173a3bae7 and fixed in 6.1.76 with commit 3c5ec66b4b3f
Issue introduced in 5.7 with commit 1d3173a3bae7 and fixed in 6.6.15 with commit eaefb9464031
Issue introduced in 5.7 with commit 1d3173a3bae7 and fixed in 6.7.3 with commit b8eff20d8709
- Issue introduced in 5.7 with commit 1d3173a3bae7 and fixed in 6.8-rc1 with commit 01bd694ac2f6
+ Issue introduced in 5.7 with commit 1d3173a3bae7 and fixed in 6.8 with commit 01bd694ac2f6
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52494.json b/cve/published/2023/CVE-2023-52494.json
index dd2b8ca2..50e1b831 100644
--- a/cve/published/2023/CVE-2023-52494.json
+++ b/cve/published/2023/CVE-2023-52494.json
@@ -90,7 +90,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -117,14 +117,14 @@
],
"title": "bus: mhi: host: Add alignment check for event ring read pointer",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2023-52494",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2023/CVE-2023-52494.mbox b/cve/published/2023/CVE-2023-52494.mbox
index 456ff40c..a9addbce 100644
--- a/cve/published/2023/CVE-2023-52494.mbox
+++ b/cve/published/2023/CVE-2023-52494.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52494: bus: mhi: host: Add alignment check for event ring read pointer
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2599; i=lee@kernel.org;
- h=from:subject; bh=YeIMD6yRAfj8X5fsFxu+qfcibVeg4Qqgb8biTuzSLhY=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhOIsIFS7rBE9CeirvGFsy0V5FVCl3b/p0tK
- WNjMyYz1XOJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTgAKCRBRr4ovh/x3
- YVguD/0SLfP7H5Sttt+KLmCiBOsZYvuYRWQCoWDzvxjsxIHrBt5H52li/7tfaj+KHG6z/4sXqCy
- PiJKLI5WHXLnJCjCMyCyKCWdQdlmru6ffRWhtmFLXhdt9MKX1OOOqM5BJn4/cVS3OQrG9y9Vkk3
- Xe6VYXz+MdifWMZuSfd2CEQITx7HntI2yKB0Rl0riFoAYw218uEocrGHXAO2sFe3S/zT+R+Gwof
- 9EcPbxQYWZOfR/afOfrxq/eqBJGlmN2XH0I8zjnnTJxiKneqGKPXWIfRyGu/mFNuqdNwd0LecV+
- X3rdKywoJhU7JDUOUV46Krb60QXXd7QgRQBS0aArnDEhGrgefwmSaa91M4Hth8xGFoBTT70GCQL
- jC90ulOf/npWmP6HR9yjBCrjihPsFm91AEZ/PQGhAJFebLeHFyttuyEwqGKbzW9vGKjFfWZ1nZX
- 8zX6yaoN2qXdtOUZriYrXELP11P1sBflfCz5FTjoxEQ53Ize99p2/Sy2h8isQFIwqPGrXR4Be+V
- HTCOQOl5NTLFP/N3sZPoZaJcF1eTpAzproZMS4TRZaPGmsIF0OAC6flitc0w2jQ7sSlf4Xl7Wxw
- ow0UuPEHSFvHo7fVidWOvS+E6g95uUljx1BbO3H5JiBAU6q4Jq44sc/VYMCMEJ9hCEY0LGCFkrX
- 6MgDaMgGb2j4CWg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -45,7 +29,7 @@ Affected and fixed versions
Issue introduced in 5.13 with commit ec32332df764 and fixed in 6.1.76 with commit 2df39ac8f813
Issue introduced in 5.13 with commit ec32332df764 and fixed in 6.6.15 with commit a9ebfc405fe1
Issue introduced in 5.13 with commit ec32332df764 and fixed in 6.7.3 with commit ecf832011182
- Issue introduced in 5.13 with commit ec32332df764 and fixed in 6.8-rc1 with commit eff9704f5332
+ Issue introduced in 5.13 with commit ec32332df764 and fixed in 6.8 with commit eff9704f5332
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52495.json b/cve/published/2023/CVE-2023-52495.json
index 95795833..29d1e214 100644
--- a/cve/published/2023/CVE-2023-52495.json
+++ b/cve/published/2023/CVE-2023-52495.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,14 +87,14 @@
],
"title": "soc: qcom: pmic_glink_altmode: fix port sanity check",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2023-52495",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2023/CVE-2023-52495.mbox b/cve/published/2023/CVE-2023-52495.mbox
index 5fe0f127..0ac020a4 100644
--- a/cve/published/2023/CVE-2023-52495.mbox
+++ b/cve/published/2023/CVE-2023-52495.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52495: soc: qcom: pmic_glink_altmode: fix port sanity check
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2075; i=lee@kernel.org;
- h=from:subject; bh=mV2ZgBjuVKDEOXc/r95EuVgTVvTvFr1S8fSouRmE8BE=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhOaWk/l6sSky2XfFTszcdW0tWSseXQJb4bB
- EjqiWI6b1+JAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTgAKCRBRr4ovh/x3
- YRzFD/9mt3BE7Ti6vqxi54SAilvRi+EL3g/b/o0iSis8eyILkXNEcp+5TagBDmc53+mfJ/xBF8v
- IUwsfZ+JyUb6JUOXEQi3EJMIQm25OsQk8hid1UUJ37BfWOUO0MKQjAmAF+VXlpiwdwLskX/eCFG
- 2kjZ7NkMsBoo67VSs3YrP7kLVTjgZw6g4JdIu6J6LQMQs6lr93dT4TJ1swIXtRA3V9mwQfc5bt2
- fn/ztyyO+/QmMqtO6zJj+4IzNyEytxZIhXt/uv5qAvOe2cPDRrfLWwQAoxkfp42JUPsIGj9tdhb
- m9ElzZZTcRuAF3X1Cidw701KlmKH54f3w5AnWKpU9eClKcVbF6efQUjONHI9NwGXT+GfneDcvcG
- xTtovxLXkm5zvoOuo3dsrWDQYlZIfaFwHUTyamykdXleBaAWvAJU0vBTdLCn/vQ89msUZx2bDlN
- SMi2mG4KGIusuOClQMtlJ9kQQElYBZD60Baj5C31+goLnkdt9kdrLvdOkJWOry1ypqgwml8PgE/
- 5++BbWGNw8mmwIIlllPASSm6+rCeXTUiKHERTXG5oWg+0tk80Vsp7/WXjZkW1mNO5pklxthCAqg
- RekCedF/MxFBilnGpGyR6KIqeyVTH7xiZNTCAU0lsv1quLbJhVKjOPZptGSGy574d/VgcTEYdPJ
- 5gOpOVUd3OZF0cw==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -41,7 +25,7 @@ Affected and fixed versions
Issue introduced in 6.3 with commit 080b4e24852b and fixed in 6.6.15 with commit 532a5557da68
Issue introduced in 6.3 with commit 080b4e24852b and fixed in 6.7.3 with commit d26edf4ee367
- Issue introduced in 6.3 with commit 080b4e24852b and fixed in 6.8-rc1 with commit c4fb7d2eac9f
+ Issue introduced in 6.3 with commit 080b4e24852b and fixed in 6.8 with commit c4fb7d2eac9f
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52497.json b/cve/published/2023/CVE-2023-52497.json
index f28e3d98..85017651 100644
--- a/cve/published/2023/CVE-2023-52497.json
+++ b/cve/published/2023/CVE-2023-52497.json
@@ -102,7 +102,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -132,7 +132,7 @@
],
"title": "erofs: fix lz4 inplace decompression",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52497.mbox b/cve/published/2023/CVE-2023-52497.mbox
index b539101f..9fdcc89d 100644
--- a/cve/published/2023/CVE-2023-52497.mbox
+++ b/cve/published/2023/CVE-2023-52497.mbox
@@ -1,4 +1,4 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -45,7 +45,7 @@ Affected and fixed versions
Issue introduced in 5.3 with commit 598162d05080 and fixed in 6.1.76 with commit 33bf23c9940d
Issue introduced in 5.3 with commit 598162d05080 and fixed in 6.6.15 with commit f36d200a80a3
Issue introduced in 5.3 with commit 598162d05080 and fixed in 6.7.3 with commit bffc4cc334c5
- Issue introduced in 5.3 with commit 598162d05080 and fixed in 6.8-rc1 with commit 3c12466b6b7b
+ Issue introduced in 5.3 with commit 598162d05080 and fixed in 6.8 with commit 3c12466b6b7b
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52498.json b/cve/published/2023/CVE-2023-52498.json
index d1107683..d9813217 100644
--- a/cve/published/2023/CVE-2023-52498.json
+++ b/cve/published/2023/CVE-2023-52498.json
@@ -92,7 +92,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -122,14 +122,14 @@
],
"title": "PM: sleep: Fix possible deadlocks in core system-wide PM code",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2023-52498",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2023/CVE-2023-52498.mbox b/cve/published/2023/CVE-2023-52498.mbox
index 48c9a18d..97dd7e9d 100644
--- a/cve/published/2023/CVE-2023-52498.mbox
+++ b/cve/published/2023/CVE-2023-52498.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52498: PM: sleep: Fix possible deadlocks in core system-wide PM code
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2813; i=lee@kernel.org;
- h=from:subject; bh=e6ZF1//ILyqCUeTL7/YRbo872nfWvRAlBcilCdmt3sA=;
- b=owEBbAKT/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhPuI4LMOLFtJEQWCXP/Mq4JWassp1OI3pq7
- htoiof9VCqJAjIEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTwAKCRBRr4ovh/x3
- YSeCD/UT93Bnlem39zwg/HRw8aWUs4rySFB0VeRyZnT9kda7rCwrq9GCRGhsUbeUnmbZY3WRVCr
- C+1+nhJNjDfm3aRVtVqf0HerJAn/SzwQFL/MSnGpRttui6Oi2ZFHCfxLN20AdfuZ1khU6Idpnut
- e/f5DECoViEPI8sgDNpTfQhfo3a0C8XfknggO+0dKg/QVKBqPNP38RRidcNYdIv5L20I5oqB0Oy
- JSzL+vESS3yeiBaK/a2BPcgHrrcOtMf+LIz9Cz0S0Vgw7AxvX1zQeTkcVe4VldEk/4AZMgV6nH/
- WpOq3cf0hOLPkWllapdEKAdIivfUejKfSlTx0OwQ9DH0VLhkINu0pfMlObnA2wofyfrdyfBVJyv
- FBEEk+R/B7oMHSN+EjGXqhbMzVKu+psCCDdSodA6kwzx9W00JghSGpEfPDfuk2tGZVeMVdkuWfU
- V1jwzjeaTPWRk+4viVM+RrFhsXxu1Xp87dCOAh61E1OML6xKZsi9uYRIFKAnQE6FkXtlO/Flrt9
- 4+oCdklG4/rFCqYSQWzPPSSGqLLRYInkd60xKBUnXL1zndd1zph5AKImLPhd0LnJLmL61a2aXRS
- f4fombj6SC0ibdpuCAOCk+xEFJF6DJHbYv2m+iPBytzP7O+dSwuKqctAnPnoWQC0jAZSTZhyg3w
- HRtswK6kn35a9
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -52,7 +36,7 @@ Affected and fixed versions
Fixed in 6.1.76 with commit e1c9d32c9830
Fixed in 6.6.15 with commit e681e29d1f59
Fixed in 6.7.3 with commit 9bd3dce27b01
- Fixed in 6.8-rc1 with commit 7839d0078e0d
+ Fixed in 6.8 with commit 7839d0078e0d
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52583.json b/cve/published/2023/CVE-2023-52583.json
index c1873ae2..9b8fe119 100644
--- a/cve/published/2023/CVE-2023-52583.json
+++ b/cve/published/2023/CVE-2023-52583.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,7 +152,7 @@
],
"title": "ceph: fix deadlock or deadcode of misusing dget()",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52583.mbox b/cve/published/2023/CVE-2023-52583.mbox
index 733f2c46..65f48275 100644
--- a/cve/published/2023/CVE-2023-52583.mbox
+++ b/cve/published/2023/CVE-2023-52583.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52583: ceph: fix deadlock or deadcode of misusing dget()
-Message-Id: <2024030641-CVE-2023-52583-fd38@gregkh>
-Content-Length: 2420
-Lines: 63
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2484;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=+Q1aFmcKZ+wX1d1xqlfA/MEkRkhhkDun+nHtIVHKYUw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBEXnnn1wm3FBnfJKS8cvkz21MjYpKwvIvg98uSXoY
- vrhz4sudsSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBENFIYFrQbatpISN3nPPNO
- 6VPP6WuPurRuZDHMr89fcPrZlpuCjgwr/nydtuDJ9XnVywA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -41,7 +30,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit 7f2649c94264
Fixed in 6.6.16 with commit 196b87e5c00c
Fixed in 6.7.4 with commit 76cb2aa3421f
- Fixed in 6.8-rc1 with commit b493ad718b1f
+ Fixed in 6.8 with commit b493ad718b1f
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52584.json b/cve/published/2023/CVE-2023-52584.json
index 04c90020..6674ea50 100644
--- a/cve/published/2023/CVE-2023-52584.json
+++ b/cve/published/2023/CVE-2023-52584.json
@@ -68,7 +68,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -92,7 +92,7 @@
],
"title": "spmi: mediatek: Fix UAF on device remove",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52584.mbox b/cve/published/2023/CVE-2023-52584.mbox
index 42f8cde9..0eaef1de 100644
--- a/cve/published/2023/CVE-2023-52584.mbox
+++ b/cve/published/2023/CVE-2023-52584.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52584: spmi: mediatek: Fix UAF on device remove
-Message-Id: <2024030643-CVE-2023-52584-fb9a@gregkh>
-Content-Length: 2264
-Lines: 62
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2327;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=1lGUnX2SPE1awzxI+JmvcyDUIHIRIzdwpb5cu6k8DgE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBMV/Pb0SordQy9X+9Kywwjg5t57lLopmCkqHBNxkZ
- H/Peza1I5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACainM4w310y/vSy3TVWK1Id
- b7k32mvkFtZwMCy4vvHjuwXTw57fmPykImzijfANF3T2AwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -44,7 +33,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit 521f28eedd6b
Fixed in 6.6.16 with commit f8dcafcb5463
Fixed in 6.7.4 with commit 9a3881b1f07d
- Fixed in 6.8-rc1 with commit e821d50ab5b9
+ Fixed in 6.8 with commit e821d50ab5b9
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52585.json b/cve/published/2023/CVE-2023-52585.json
index d83ff0b3..6be6f1d4 100644
--- a/cve/published/2023/CVE-2023-52585.json
+++ b/cve/published/2023/CVE-2023-52585.json
@@ -44,7 +44,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -62,7 +62,7 @@
],
"title": "drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52585.mbox b/cve/published/2023/CVE-2023-52585.mbox
index afc271e6..315f29b0 100644
--- a/cve/published/2023/CVE-2023-52585.mbox
+++ b/cve/published/2023/CVE-2023-52585.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52585: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()
-Message-Id: <2024030643-CVE-2023-52585-7dbc@gregkh>
-Content-Length: 1763
-Lines: 51
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1815;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=fa01ZOykihvzCemZSxcs9qp8j07YWK7JMWNOzObpkQk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBMU1X4UdiQoyznknfGmquN2X4thdZisKL8yLuB20z
- +SW237xjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZiIShfDLOaEb+dm8y+Qnr+X
- 17N0i92T/0kpxgwLjnuun9O6jPnAujXcN6NMuu+Kuh3eBgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -35,7 +24,7 @@ Affected and fixed versions
===========================
Fixed in 6.7.4 with commit 195a6289282e
- Fixed in 6.8-rc1 with commit b8d55a90fd55
+ Fixed in 6.8 with commit b8d55a90fd55
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52586.json b/cve/published/2023/CVE-2023-52586.json
index d1d33c69..380331fd 100644
--- a/cve/published/2023/CVE-2023-52586.json
+++ b/cve/published/2023/CVE-2023-52586.json
@@ -44,7 +44,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -62,7 +62,7 @@
],
"title": "drm/msm/dpu: Add mutex lock in control vblank irq",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52586.mbox b/cve/published/2023/CVE-2023-52586.mbox
index 698bff7c..1d036be8 100644
--- a/cve/published/2023/CVE-2023-52586.mbox
+++ b/cve/published/2023/CVE-2023-52586.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52586: drm/msm/dpu: Add mutex lock in control vblank irq
-Message-Id: <2024030644-CVE-2023-52586-3ecb@gregkh>
-Content-Length: 2239
-Lines: 61
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2301;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=2nWDfeIz4f5A8+E4lzN2dEV55DB+Tnu71DodMdKeK98=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBCUCgp6oG21P0drjxdRwgv/bbk+HFkXTxd6Nb8s+x
- /fESO/riGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIm0BzLMj7+/+sGihZonLhoy
- r3WXMLwzaZe/C8OCjlVrn3jK8U7r2rO4lmtlw+adsopNAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
===========================
Fixed in 6.7.4 with commit 14f109bf74dd
- Fixed in 6.8-rc1 with commit 45284ff733e4
+ Fixed in 6.8 with commit 45284ff733e4
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52587.json b/cve/published/2023/CVE-2023-52587.json
index 6493c264..f7da058e 100644
--- a/cve/published/2023/CVE-2023-52587.json
+++ b/cve/published/2023/CVE-2023-52587.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,7 +152,7 @@
],
"title": "IB/ipoib: Fix mcast list locking",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52587.mbox b/cve/published/2023/CVE-2023-52587.mbox
index b1344497..5f700190 100644
--- a/cve/published/2023/CVE-2023-52587.mbox
+++ b/cve/published/2023/CVE-2023-52587.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52587: IB/ipoib: Fix mcast list locking
-Message-Id: <2024030644-CVE-2023-52587-5479@gregkh>
-Content-Length: 6646
-Lines: 142
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6789;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=7e6rK7sFOZXj2iBM9bvKZ2NDuAbScSDNgsmnILxMoeA=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBCXKEjQr9T4XaX36wqfEedlEQUK1SHQNz4kVMUtZj
- 3QWznLoiGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIk82cywoL9mRXPEpFVNnXcV
- 7yyuE7o7PfTOP4a5ojv+yHbde2Bu7t+85dbPaXuW1kmwAAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -120,7 +109,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit 5108a2dc2db5
Fixed in 6.6.16 with commit 342258fb46d6
Fixed in 6.7.4 with commit 7c7bd4d561e9
- Fixed in 6.8-rc1 with commit 4f973e211b3b
+ Fixed in 6.8 with commit 4f973e211b3b
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52588.json b/cve/published/2023/CVE-2023-52588.json
index 05a9c41e..eea321ba 100644
--- a/cve/published/2023/CVE-2023-52588.json
+++ b/cve/published/2023/CVE-2023-52588.json
@@ -80,7 +80,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -107,7 +107,7 @@
],
"title": "f2fs: fix to tag gcing flag on page during block migration",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52588.mbox b/cve/published/2023/CVE-2023-52588.mbox
index ac453e14..81c560fa 100644
--- a/cve/published/2023/CVE-2023-52588.mbox
+++ b/cve/published/2023/CVE-2023-52588.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52588: f2fs: fix to tag gcing flag on page during block migration
-Message-Id: <2024030644-CVE-2023-52588-619a@gregkh>
-Content-Length: 2199
-Lines: 60
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2260;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=P2hBZCDF1W0kzD4IGoJChTd16nvdlsLCc/G081kQ+20=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBCVyDu/IXXPu5NFVyXdq9zc2Wpp8eexWzl7nUfQ6w
- ZHrm05cRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEyk6gzD/Lyo14wbssJc9y4r
- /7mc28H97QOhLob5JR13lyg4v9t5X2OKr3fs/ZPF7Z/zAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -40,7 +29,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit 7c972c894575
Fixed in 6.6.16 with commit 417b8a91f4e8
Fixed in 6.7.4 with commit b8094c0f1aae
- Fixed in 6.8-rc1 with commit 4961acdd65c9
+ Fixed in 6.8 with commit 4961acdd65c9
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52589.json b/cve/published/2023/CVE-2023-52589.json
index 1bea691a..d6588820 100644
--- a/cve/published/2023/CVE-2023-52589.json
+++ b/cve/published/2023/CVE-2023-52589.json
@@ -68,7 +68,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -92,7 +92,7 @@
],
"title": "media: rkisp1: Fix IRQ disable race issue",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52589.mbox b/cve/published/2023/CVE-2023-52589.mbox
index d3cbe748..ddd2db90 100644
--- a/cve/published/2023/CVE-2023-52589.mbox
+++ b/cve/published/2023/CVE-2023-52589.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52589: media: rkisp1: Fix IRQ disable race issue
-Message-Id: <2024030644-CVE-2023-52589-8f84@gregkh>
-Content-Length: 2575
-Lines: 66
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2642;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=m21Y2tbo1GGQecH0oPvCviHlnxfxmI8Rw8vcu6HQ/pE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBCXust1RXaD/ltcpqabtSNlV2RcBmac6zXe8OHVPX
- /zlhHnTOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAi56MZ5ucy3krVy+6x6Xhz
- 5JR9tuihqb84vjDMFV/a7Bd0/qziRGUpkZ7ottN3g5M+AgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -47,7 +36,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit bf808f58681c
Fixed in 6.6.16 with commit fab483438342
Fixed in 6.7.4 with commit 7bb1a2822aa2
- Fixed in 6.8-rc1 with commit 870565f063a5
+ Fixed in 6.8 with commit 870565f063a5
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52590.json b/cve/published/2023/CVE-2023-52590.json
index 1e2e2618..eede4518 100644
--- a/cve/published/2023/CVE-2023-52590.json
+++ b/cve/published/2023/CVE-2023-52590.json
@@ -44,7 +44,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -62,7 +62,7 @@
],
"title": "ocfs2: Avoid touching renamed directory if parent does not change",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52590.mbox b/cve/published/2023/CVE-2023-52590.mbox
index 29852aed..bbcaa00b 100644
--- a/cve/published/2023/CVE-2023-52590.mbox
+++ b/cve/published/2023/CVE-2023-52590.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52590: ocfs2: Avoid touching renamed directory if parent does not change
-Message-Id: <2024030644-CVE-2023-52590-fca9@gregkh>
-Content-Length: 1715
-Lines: 50
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1766;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=31WL7qwBRWEZQeWaQ7hz0ixz5Js/VLU537mc0xPJblU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBCVCk3vf+oeHbNONCZw+P4Xr24bY+dpXlLNZ2qp2v
- 708Ydm/jlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZhIXALDghsvFs9VX7HovEBe
- 5LzQVVvkFKu0NzHMj1Gt57dYulmvL53nwLOcaSKWa25HAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -34,7 +23,7 @@ Affected and fixed versions
===========================
Fixed in 6.7.4 with commit de940cede3c4
- Fixed in 6.8-rc1 with commit 9d618d19b29c
+ Fixed in 6.8 with commit 9d618d19b29c
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52591.json b/cve/published/2023/CVE-2023-52591.json
index a630eb62..7ac568f8 100644
--- a/cve/published/2023/CVE-2023-52591.json
+++ b/cve/published/2023/CVE-2023-52591.json
@@ -56,7 +56,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -77,7 +77,7 @@
],
"title": "reiserfs: Avoid touching renamed directory if parent does not change",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52591.mbox b/cve/published/2023/CVE-2023-52591.mbox
index a0518cb6..078c4b78 100644
--- a/cve/published/2023/CVE-2023-52591.mbox
+++ b/cve/published/2023/CVE-2023-52591.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52591: reiserfs: Avoid touching renamed directory if parent does not change
-Message-Id: <2024030644-CVE-2023-52591-46a0@gregkh>
-Content-Length: 1840
-Lines: 52
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1893;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=FD/a92s+2wckTXWshyLn1i44vJ/nca8gXV7TKyOBvu0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBCWdV6xvm/E3UcvvyJ/fDsezGg6mdZ09+XUqT6Kn5
- sTiWv/2jlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZiI+hOGBbtZbT6aHtmyiavw
- g9iP4++cL6owZjMsmJrKs2haDTdLae0v61NVlXbTpRZYAgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -35,7 +24,7 @@ Affected and fixed versions
Fixed in 6.6.16 with commit 17e1361cb91d
Fixed in 6.7.4 with commit c04c162f82ac
- Fixed in 6.8-rc1 with commit 49db9b1b86a8
+ Fixed in 6.8 with commit 49db9b1b86a8
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52593.json b/cve/published/2023/CVE-2023-52593.json
index 9b0a87df..e8280361 100644
--- a/cve/published/2023/CVE-2023-52593.json
+++ b/cve/published/2023/CVE-2023-52593.json
@@ -68,7 +68,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -92,7 +92,7 @@
],
"title": "wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52593.mbox b/cve/published/2023/CVE-2023-52593.mbox
index eb6deaa1..e9a8ff42 100644
--- a/cve/published/2023/CVE-2023-52593.mbox
+++ b/cve/published/2023/CVE-2023-52593.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52593: wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()
-Message-Id: <2024030645-CVE-2023-52593-14ef@gregkh>
-Content-Length: 2014
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2069;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=+TcCEOfFOjfwBcGAnwKODugmH5Sc/BI6olEB9+WPLuc=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBCXLf/93DSw7GNz0WsKtQubgQjb/ew5yl5nWf7Roz
- X2+Z2VpRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExEZg3DfAfR96Ernvk8KFR8
- aMvEurlGueHYJYb51bFz3A+K7Tn6e3PwYUd7lgvG57/uAQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -36,7 +25,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit 574dcd3126aa
Fixed in 6.6.16 with commit 9ab224744a47
Fixed in 6.7.4 with commit 3739121443f5
- Fixed in 6.8-rc1 with commit fe0a7776d4d1
+ Fixed in 6.8 with commit fe0a7776d4d1
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52594.json b/cve/published/2023/CVE-2023-52594.json
index 3c17c8ce..4c7f539f 100644
--- a/cve/published/2023/CVE-2023-52594.json
+++ b/cve/published/2023/CVE-2023-52594.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,7 +152,7 @@
],
"title": "wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52594.mbox b/cve/published/2023/CVE-2023-52594.mbox
index 51c5bead..c4bf66e1 100644
--- a/cve/published/2023/CVE-2023-52594.mbox
+++ b/cve/published/2023/CVE-2023-52594.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52594: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()
-Message-Id: <2024030645-CVE-2023-52594-9b84@gregkh>
-Content-Length: 2880
-Lines: 76
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2957;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=9NX6nlLUy3sqJRRSJJ72g6y870B56HqO9mXELY0Fcjw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBCVve22Zm9NruVw0KkDx2vu1Vbu2OJ1gmVHx+8TFR
- GWhhlUbO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiGR8ZFux/dOm19IEgsQlR
- Bh5REzkv3Hey02GYZ8hb7njDT+v5Cumz35P/v73VvqBREgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -54,7 +43,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit 25c6f49ef59b
Fixed in 6.6.16 with commit e4f4bac7d3b6
Fixed in 6.7.4 with commit be609c7002dd
- Fixed in 6.8-rc1 with commit 2adc886244df
+ Fixed in 6.8 with commit 2adc886244df
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52595.json b/cve/published/2023/CVE-2023-52595.json
index 6c9708de..d98e8f05 100644
--- a/cve/published/2023/CVE-2023-52595.json
+++ b/cve/published/2023/CVE-2023-52595.json
@@ -104,7 +104,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -137,7 +137,7 @@
],
"title": "wifi: rt2x00: restart beacon queue when hardware reset",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52595.mbox b/cve/published/2023/CVE-2023-52595.mbox
index dfa5d253..ee1bf880 100644
--- a/cve/published/2023/CVE-2023-52595.mbox
+++ b/cve/published/2023/CVE-2023-52595.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52595: wifi: rt2x00: restart beacon queue when hardware reset
-Message-Id: <2024030645-CVE-2023-52595-d018@gregkh>
-Content-Length: 2533
-Lines: 63
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2597;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=eZC+b+7AQqDyZh2pjhpMeG6zdkSdXUjPwjpqVg4HFdI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBCXnq+YeW+e82tSuYJnGhCuLPvw99yjOQS3o+PQ1F
- 7nbn/1n64hlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJNF1jmKc9xWPe75ld30RU
- lKS5s7cyKvz4dJZhfuTctOBLzWqr9l0t/8s+r5/P3ljfHAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -41,7 +30,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit 739b3ccd9486
Fixed in 6.6.16 with commit 04cfe4a5da57
Fixed in 6.7.4 with commit fdb580ed05df
- Fixed in 6.8-rc1 with commit a11d965a218f
+ Fixed in 6.8 with commit a11d965a218f
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52596.json b/cve/published/2023/CVE-2023-52596.json
index 75599b97..2e54dd80 100644
--- a/cve/published/2023/CVE-2023-52596.json
+++ b/cve/published/2023/CVE-2023-52596.json
@@ -56,7 +56,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -77,7 +77,7 @@
],
"title": "sysctl: Fix out of bounds access for empty sysctl registers",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52596.mbox b/cve/published/2023/CVE-2023-52596.mbox
index 69f1f31f..35ac7e06 100644
--- a/cve/published/2023/CVE-2023-52596.mbox
+++ b/cve/published/2023/CVE-2023-52596.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52596: sysctl: Fix out of bounds access for empty sysctl registers
-Message-Id: <2024030645-CVE-2023-52596-b98e@gregkh>
-Content-Length: 2147
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2207;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=g3ewfqgDetTVCJJXuqjrkZadxzFMffBxYaSdJXuaDxA=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBCXXF/sJHN/p88rhadwbz5P350Rb/bafs3RhrNUP9
- 0U9trdWdcSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEbI0Z5mcs657yX+zbmYiW
- TPu/Gr3awe1O0QwLdi0VtBSUb+Y5I/DxYOSX3/OP/dT9DwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
Fixed in 6.6.16 with commit 15893975e9e3
Fixed in 6.7.4 with commit 2ae7081bc101
- Fixed in 6.8-rc1 with commit 315552310c7d
+ Fixed in 6.8 with commit 315552310c7d
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52597.json b/cve/published/2023/CVE-2023-52597.json
index c817bfab..afb89178 100644
--- a/cve/published/2023/CVE-2023-52597.json
+++ b/cve/published/2023/CVE-2023-52597.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,7 +152,7 @@
],
"title": "KVM: s390: fix setting of fpc register",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52597.mbox b/cve/published/2023/CVE-2023-52597.mbox
index a53cb417..d618505d 100644
--- a/cve/published/2023/CVE-2023-52597.mbox
+++ b/cve/published/2023/CVE-2023-52597.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52597: KVM: s390: fix setting of fpc register
-Message-Id: <2024030646-CVE-2023-52597-2ed6@gregkh>
-Content-Length: 3529
-Lines: 83
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3613;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=EBkLyCxRDuQdHVcDP89DlqYGmHAksyIBKXrk09k8nqs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBKUSMt+ord+7M6+lzbj01o//zDJ/UiqKPmwVbA951
- 1z5845tRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEyEzZhhnuaZI8wsq+d8ud3a
- Nsl0krGpJ39SMcP8krjiXvvwqHpG7XL+uvwzH21t/u8AAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -61,7 +50,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit 0671f42a9c10
Fixed in 6.6.16 with commit c87d7d910775
Fixed in 6.7.4 with commit 2823db0010c4
- Fixed in 6.8-rc1 with commit b988b1bb0053
+ Fixed in 6.8 with commit b988b1bb0053
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52598.json b/cve/published/2023/CVE-2023-52598.json
index e2036fb7..3058558c 100644
--- a/cve/published/2023/CVE-2023-52598.json
+++ b/cve/published/2023/CVE-2023-52598.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,7 +152,7 @@
],
"title": "s390/ptrace: handle setting of fpc register correctly",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52598.mbox b/cve/published/2023/CVE-2023-52598.mbox
index c076f5f8..dcd9c3a7 100644
--- a/cve/published/2023/CVE-2023-52598.mbox
+++ b/cve/published/2023/CVE-2023-52598.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52598: s390/ptrace: handle setting of fpc register correctly
-Message-Id: <2024030646-CVE-2023-52598-d0a2@gregkh>
-Content-Length: 3139
-Lines: 77
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3217;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=bkbh4pyu0VlmiP9qwr1kkiEwyGGL1peXOccGfHT5Y6o=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBKVikz4W5c/lumy7b+W7H5qVQc4LJxupTVif9Ebi4
- o1nX89Yd8SyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEpnYxzOF80xB5atKU1Mdy
- lxNrnVpe/TQXf8Sw4Bz7wx2rtmidSlvVZWKWwa1dkzvJFAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -55,7 +44,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit 7a4d6481fbdd
Fixed in 6.6.16 with commit 02c6bbfb08ba
Fixed in 6.7.4 with commit bdce67df7f12
- Fixed in 6.8-rc1 with commit 8b13601d19c5
+ Fixed in 6.8 with commit 8b13601d19c5
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52599.json b/cve/published/2023/CVE-2023-52599.json
index 61735a27..fcc3e79d 100644
--- a/cve/published/2023/CVE-2023-52599.json
+++ b/cve/published/2023/CVE-2023-52599.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,7 +152,7 @@
],
"title": "jfs: fix array-index-out-of-bounds in diNewExt",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52599.mbox b/cve/published/2023/CVE-2023-52599.mbox
index 4a6ecdaa..63a502d9 100644
--- a/cve/published/2023/CVE-2023-52599.mbox
+++ b/cve/published/2023/CVE-2023-52599.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52599: jfs: fix array-index-out-of-bounds in diNewExt
-Message-Id: <2024030646-CVE-2023-52599-b318@gregkh>
-Content-Length: 4231
-Lines: 101
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4333;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Ur+UMjx5ACHKZ7FWrRfKaIyrdr5fKR/XUBblGa1HNbU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBKX27jW7/WHPvSmiEkdjPU5G1iZf4uFeY93P49Nhf
- 1Njf9rHjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZiI+x+GBedZOT+zTlW9IXjc
- 4NFnhTO8O7/UqTEsuPo7dr+tvkfGb6v+OG+TJWGlv3+6AAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -79,7 +68,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit 3537f92cd22c
Fixed in 6.6.16 with commit 6996d43b1448
Fixed in 6.7.4 with commit 5a6660139195
- Fixed in 6.8-rc1 with commit 49f9637aafa6
+ Fixed in 6.8 with commit 49f9637aafa6
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52600.json b/cve/published/2023/CVE-2023-52600.json
index 47f2a643..12e5bf31 100644
--- a/cve/published/2023/CVE-2023-52600.json
+++ b/cve/published/2023/CVE-2023-52600.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,7 +152,7 @@
],
"title": "jfs: fix uaf in jfs_evict_inode",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52600.mbox b/cve/published/2023/CVE-2023-52600.mbox
index 7fc94b1e..f69c5c98 100644
--- a/cve/published/2023/CVE-2023-52600.mbox
+++ b/cve/published/2023/CVE-2023-52600.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52600: jfs: fix uaf in jfs_evict_inode
-Message-Id: <2024030646-CVE-2023-52600-6ffe@gregkh>
-Content-Length: 2453
-Lines: 64
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2518;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=EcqWJo562WM+Tw5U8YYhJRx6spbedlYesjJqW7lgyT0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBKUmaEoe9F6Ttrf58gGO2v+vF/EmiRXEnLcz0JdfN
- Xfl5LKPHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCR6jyGBT1PekLn7fj6ht9s
- aeOZF9uKS/QctzDMLzouY5TYc0ylsV92dQf/jy9v4t2vAAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit 32e8f2d95528
Fixed in 6.6.16 with commit 1696d6d7d4a1
Fixed in 6.7.4 with commit bacdaa042513
- Fixed in 6.8-rc1 with commit e0e1958f4c36
+ Fixed in 6.8 with commit e0e1958f4c36
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52601.json b/cve/published/2023/CVE-2023-52601.json
index e136cd14..c620239d 100644
--- a/cve/published/2023/CVE-2023-52601.json
+++ b/cve/published/2023/CVE-2023-52601.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,7 +152,7 @@
],
"title": "jfs: fix array-index-out-of-bounds in dbAdjTree",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52601.mbox b/cve/published/2023/CVE-2023-52601.mbox
index 3a4adbb0..03300b15 100644
--- a/cve/published/2023/CVE-2023-52601.mbox
+++ b/cve/published/2023/CVE-2023-52601.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52601: jfs: fix array-index-out-of-bounds in dbAdjTree
-Message-Id: <2024030646-CVE-2023-52601-6c3d@gregkh>
-Content-Length: 2490
-Lines: 63
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2554;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=By7o9wyPvLuDAJjk2AwOiB9Rl2ByUoTks/c/BLdj/K4=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBKXepO+9H93w6+pexpm6pSsiXN9/m3jVaOp+pvjV3
- HUTgpTLOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAijesZFuy8/evlqqWTjm7T
- kEo4w7twc7zw8R8MC/ZaWZ71Epy53iXww5WKkyLfvffumAkA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -41,7 +30,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit 70780914cb57
Fixed in 6.6.16 with commit 2e16a1389b5a
Fixed in 6.7.4 with commit fc67a2e18f4c
- Fixed in 6.8-rc1 with commit 74ecdda68242
+ Fixed in 6.8 with commit 74ecdda68242
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52602.json b/cve/published/2023/CVE-2023-52602.json
index da3e583d..2781c0c8 100644
--- a/cve/published/2023/CVE-2023-52602.json
+++ b/cve/published/2023/CVE-2023-52602.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,7 +152,7 @@
],
"title": "jfs: fix slab-out-of-bounds Read in dtSearch",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52602.mbox b/cve/published/2023/CVE-2023-52602.mbox
index f329d3c1..eac41f6f 100644
--- a/cve/published/2023/CVE-2023-52602.mbox
+++ b/cve/published/2023/CVE-2023-52602.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52602: jfs: fix slab-out-of-bounds Read in dtSearch
-Message-Id: <2024030646-CVE-2023-52602-393a@gregkh>
-Content-Length: 2363
-Lines: 64
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2428;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=vYish+FFVpe4jgitpaHQRIGLfl97khpxvRngq62SnJc=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBKX5yj9uPW+XP/tnr5hofEYZX7nHhxfxciyRTQXvH
- +qz2e3oiGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIn8XsOwoHWlV52eRGKnj9MS
- vcdOLtu3vImuZpinb/zntcwC9jS+zG36t+v2vv2pvuImAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit cab0c265ba18
Fixed in 6.6.16 with commit 7110650b85dd
Fixed in 6.7.4 with commit bff9d4078a23
- Fixed in 6.8-rc1 with commit fa5492ee8946
+ Fixed in 6.8 with commit fa5492ee8946
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52603.json b/cve/published/2023/CVE-2023-52603.json
index 450de656..83043060 100644
--- a/cve/published/2023/CVE-2023-52603.json
+++ b/cve/published/2023/CVE-2023-52603.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,7 +152,7 @@
],
"title": "UBSAN: array-index-out-of-bounds in dtSplitRoot",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52603.mbox b/cve/published/2023/CVE-2023-52603.mbox
index e4748fb0..29dc02d9 100644
--- a/cve/published/2023/CVE-2023-52603.mbox
+++ b/cve/published/2023/CVE-2023-52603.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52603: UBSAN: array-index-out-of-bounds in dtSplitRoot
-Message-Id: <2024030647-CVE-2023-52603-e47b@gregkh>
-Content-Length: 4251
-Lines: 100
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4352;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Y+8USQ/gNUluiMG0EfFXN1iAm/PDOeTcfDYS7uCmIhA=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBKWPr/x9Y6KtT03Eu/qVtrUe99ZXKX6efi9T3+fp1
- b0GeatCOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiKx4zzJW1ZkuqmHe+cPIu
- me7+eXcsDNkEzjLML/I4e27Gu5aFHl3Vf3Q+BvnYtMy7CwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -78,7 +67,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit e4cbc857d75d
Fixed in 6.6.16 with commit edff092a5926
Fixed in 6.7.4 with commit 6e2902ecc77e
- Fixed in 6.8-rc1 with commit 27e56f59bab5
+ Fixed in 6.8 with commit 27e56f59bab5
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52604.json b/cve/published/2023/CVE-2023-52604.json
index 20696f74..d545ac4b 100644
--- a/cve/published/2023/CVE-2023-52604.json
+++ b/cve/published/2023/CVE-2023-52604.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,7 +152,7 @@
],
"title": "FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52604.mbox b/cve/published/2023/CVE-2023-52604.mbox
index f4b80a53..228f26bf 100644
--- a/cve/published/2023/CVE-2023-52604.mbox
+++ b/cve/published/2023/CVE-2023-52604.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52604: FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree
-Message-Id: <2024030647-CVE-2023-52604-41d9@gregkh>
-Content-Length: 4871
-Lines: 121
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4993;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=q8VMGeJv8fwsISXoMRVVGnA+asfV/TsfNhc6T+UoKps=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBKVL3LI5D4p4aWo1XmVMuXCr+eTxvxoFr45ftZmu4
- dHw++mWjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjIEn2GBQeFRDvv/hf4kTPt
- YM42cY/+yGSTHQwL1iRdk57bu3ZXVmGOT+KKx/cSPW8fBAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -99,7 +88,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit 42f433785f10
Fixed in 6.6.16 with commit 6a44065dd604
Fixed in 6.7.4 with commit 59342822276f
- Fixed in 6.8-rc1 with commit 9862ec7ac1cb
+ Fixed in 6.8 with commit 9862ec7ac1cb
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52605.json b/cve/published/2023/CVE-2023-52605.json
index 61b833f4..7cd75e1a 100644
--- a/cve/published/2023/CVE-2023-52605.json
+++ b/cve/published/2023/CVE-2023-52605.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,7 +152,7 @@
],
"title": "ACPI: extlog: fix NULL pointer dereference check",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52605.mbox b/cve/published/2023/CVE-2023-52605.mbox
index c590e5ef..6abbd6c0 100644
--- a/cve/published/2023/CVE-2023-52605.mbox
+++ b/cve/published/2023/CVE-2023-52605.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52605: ACPI: extlog: fix NULL pointer dereference check
-Message-Id: <2024030647-CVE-2023-52605-292a@gregkh>
-Content-Length: 3128
-Lines: 75
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3204;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=CnbBKD4iFwr4aLzu56PUygxnsTF+k61BzcyxAFiC/bg=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBKWP631m7Psp0eC2zCpmYVmcRZV/dfvFtq1LDM55e
- gkdOiDbEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABPZws+wYK3cdaWdiyQ1ItUS
- bY1X74udl3jamGF+XeZygcTNVhsi3SqEty17cd1+Xm0eAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -53,7 +42,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit 33650372e3ea
Fixed in 6.6.16 with commit f066171de33d
Fixed in 6.7.4 with commit 77846571b3ba
- Fixed in 6.8-rc1 with commit 72d9b9747e78
+ Fixed in 6.8 with commit 72d9b9747e78
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52606.json b/cve/published/2023/CVE-2023-52606.json
index 8c567edf..04ff8630 100644
--- a/cve/published/2023/CVE-2023-52606.json
+++ b/cve/published/2023/CVE-2023-52606.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,7 +152,7 @@
],
"title": "powerpc/lib: Validate size for vector operations",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52606.mbox b/cve/published/2023/CVE-2023-52606.mbox
index cc486acd..65c600f7 100644
--- a/cve/published/2023/CVE-2023-52606.mbox
+++ b/cve/published/2023/CVE-2023-52606.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52606: powerpc/lib: Validate size for vector operations
-Message-Id: <2024030647-CVE-2023-52606-fdcc@gregkh>
-Content-Length: 2511
-Lines: 64
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2576;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=BpPaqncWFy8vvq+z/FgXqUGfujW5vq4z9Ds60g9Rp3I=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBKUPFB2zErJ5+jR8y1KF7qun/z5QUp105HzvspnWA
- bEFYTsudsSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEhEIYZrP8vSG3Ua/8ovB2
- vV3XWL45pL9dwMAwP+K0mEG8WUFeu3fL5rCZAfGT7ZJLAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit abd26515d4b7
Fixed in 6.6.16 with commit 28b8ba8eebf2
Fixed in 6.7.4 with commit 848e1d7fd710
- Fixed in 6.8-rc1 with commit 8f9abaa6d7de
+ Fixed in 6.8 with commit 8f9abaa6d7de
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2023/CVE-2023-52607.json b/cve/published/2023/CVE-2023-52607.json
index 1f31fc1f..59e4c947 100644
--- a/cve/published/2023/CVE-2023-52607.json
+++ b/cve/published/2023/CVE-2023-52607.json
@@ -116,7 +116,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -152,7 +152,7 @@
],
"title": "powerpc/mm: Fix null-pointer dereference in pgtable_cache_add",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52607.mbox b/cve/published/2023/CVE-2023-52607.mbox
index 8be1bd18..e7555e88 100644
--- a/cve/published/2023/CVE-2023-52607.mbox
+++ b/cve/published/2023/CVE-2023-52607.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52607: powerpc/mm: Fix null-pointer dereference in pgtable_cache_add
-Message-Id: <2024030647-CVE-2023-52607-75d1@gregkh>
-Content-Length: 2374
-Lines: 61
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2436;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=PeHIp7OEJIo/nRZ4mTWnoqs+br/VN1lhXZ2CPBlbTeE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBKU/iSyxTube07Rkk2Lp0eSiyat3vRD8yeK80+rLh
- Okt65ZLdcSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBE/uQxLNgawd4z3Sn2sO62
- M7Maendoszok1zAsON4ya6nBVlml+jONd4MeHS5P2JbDDQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -39,7 +28,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit d482d61025e3
Fixed in 6.6.16 with commit 145febd85c3b
Fixed in 6.7.4 with commit ffd29dc45bc0
- Fixed in 6.8-rc1 with commit f46c8a75263f
+ Fixed in 6.8 with commit f46c8a75263f
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26581.json b/cve/published/2024/CVE-2024-26581.json
index b8dc5164..3051b003 100644
--- a/cve/published/2024/CVE-2024-26581.json
+++ b/cve/published/2024/CVE-2024-26581.json
@@ -104,7 +104,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc4",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -137,7 +137,7 @@
],
"title": "netfilter: nft_set_rbtree: skip end interval element from gc",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26581.mbox b/cve/published/2024/CVE-2024-26581.mbox
index c805c2d2..62810aa5 100644
--- a/cve/published/2024/CVE-2024-26581.mbox
+++ b/cve/published/2024/CVE-2024-26581.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26581: netfilter: nft_set_rbtree: skip end interval element from gc
@@ -27,7 +27,7 @@ Affected and fixed versions
Issue introduced in 6.1.43 with commit 89a4d1a89751 and fixed in 6.1.78 with commit 1296c110c5a0
Issue introduced in 6.5 with commit f718863aca46 and fixed in 6.6.17 with commit b734f7a47aeb
Issue introduced in 6.5 with commit f718863aca46 and fixed in 6.7.5 with commit 6eb14441f106
- Issue introduced in 6.5 with commit f718863aca46 and fixed in 6.8-rc4 with commit 60c0c230c6f0
+ Issue introduced in 6.5 with commit f718863aca46 and fixed in 6.8 with commit 60c0c230c6f0
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26582.json b/cve/published/2024/CVE-2024-26582.json
index f2a120f3..be41dce3 100644
--- a/cve/published/2024/CVE-2024-26582.json
+++ b/cve/published/2024/CVE-2024-26582.json
@@ -78,7 +78,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc5",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -102,7 +102,7 @@
],
"title": "net: tls: fix use-after-free with partial reads and async decrypt",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26582.mbox b/cve/published/2024/CVE-2024-26582.mbox
index d54d5c0d..ba82e710 100644
--- a/cve/published/2024/CVE-2024-26582.mbox
+++ b/cve/published/2024/CVE-2024-26582.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26582: net: tls: fix use-after-free with partial reads and async decrypt
@@ -25,7 +25,7 @@ Affected and fixed versions
Issue introduced in 6.0 with commit fd31f3996af2 and fixed in 6.1.79 with commit 20b4ed034872
Issue introduced in 6.0 with commit fd31f3996af2 and fixed in 6.6.18 with commit d684763534b9
Issue introduced in 6.0 with commit fd31f3996af2 and fixed in 6.7.6 with commit 754c9bab77a1
- Issue introduced in 6.0 with commit fd31f3996af2 and fixed in 6.8-rc5 with commit 32b55c5ff910
+ Issue introduced in 6.0 with commit fd31f3996af2 and fixed in 6.8 with commit 32b55c5ff910
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26583.json b/cve/published/2024/CVE-2024-26583.json
index 6b0deadd..f46fc0b6 100644
--- a/cve/published/2024/CVE-2024-26583.json
+++ b/cve/published/2024/CVE-2024-26583.json
@@ -78,7 +78,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc5",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -102,7 +102,7 @@
],
"title": "tls: fix race between async notify and socket close",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26583.mbox b/cve/published/2024/CVE-2024-26583.mbox
index ec85a7a5..6b826c7f 100644
--- a/cve/published/2024/CVE-2024-26583.mbox
+++ b/cve/published/2024/CVE-2024-26583.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26583: tls: fix race between async notify and socket close
@@ -32,7 +32,7 @@ Affected and fixed versions
Issue introduced in 5.7 with commit 0cada33241d9 and fixed in 6.1.79 with commit 7a3ca06d04d5
Issue introduced in 5.7 with commit 0cada33241d9 and fixed in 6.6.18 with commit 86dc27ee36f5
Issue introduced in 5.7 with commit 0cada33241d9 and fixed in 6.7.6 with commit 6209319b2efd
- Issue introduced in 5.7 with commit 0cada33241d9 and fixed in 6.8-rc5 with commit aec7961916f3
+ Issue introduced in 5.7 with commit 0cada33241d9 and fixed in 6.8 with commit aec7961916f3
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26584.json b/cve/published/2024/CVE-2024-26584.json
index a1ef38e8..406d4ab2 100644
--- a/cve/published/2024/CVE-2024-26584.json
+++ b/cve/published/2024/CVE-2024-26584.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc5",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "net: tls: handle backlogging of crypto requests",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26584.mbox b/cve/published/2024/CVE-2024-26584.mbox
index 2adc9a0f..ea7fedfb 100644
--- a/cve/published/2024/CVE-2024-26584.mbox
+++ b/cve/published/2024/CVE-2024-26584.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26584: net: tls: handle backlogging of crypto requests
@@ -33,7 +33,7 @@ Affected and fixed versions
Issue introduced in 4.16 with commit 94524d8fc965 and fixed in 6.6.18 with commit 13eca403876b
Issue introduced in 4.16 with commit 94524d8fc965 and fixed in 6.7.6 with commit ab6397f072e5
- Issue introduced in 4.16 with commit 94524d8fc965 and fixed in 6.8-rc5 with commit 859054147318
+ Issue introduced in 4.16 with commit 94524d8fc965 and fixed in 6.8 with commit 859054147318
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26585.json b/cve/published/2024/CVE-2024-26585.json
index be5a8885..723303d9 100644
--- a/cve/published/2024/CVE-2024-26585.json
+++ b/cve/published/2024/CVE-2024-26585.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc5",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "tls: fix race between tx work scheduling and socket close",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26585.mbox b/cve/published/2024/CVE-2024-26585.mbox
index e2179c99..0400054b 100644
--- a/cve/published/2024/CVE-2024-26585.mbox
+++ b/cve/published/2024/CVE-2024-26585.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26585: tls: fix race between tx work scheduling and socket close
@@ -25,7 +25,7 @@ Affected and fixed versions
Issue introduced in 4.20 with commit a42055e8d2c3 and fixed in 6.6.18 with commit 6db22d6c7a6d
Issue introduced in 4.20 with commit a42055e8d2c3 and fixed in 6.7.6 with commit e327ed60bff4
- Issue introduced in 4.20 with commit a42055e8d2c3 and fixed in 6.8-rc5 with commit e01e3934a1b2
+ Issue introduced in 4.20 with commit a42055e8d2c3 and fixed in 6.8 with commit e01e3934a1b2
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26586.json b/cve/published/2024/CVE-2024-26586.json
index 73af58aa..6363e875 100644
--- a/cve/published/2024/CVE-2024-26586.json
+++ b/cve/published/2024/CVE-2024-26586.json
@@ -102,7 +102,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -132,7 +132,7 @@
],
"title": "mlxsw: spectrum_acl_tcam: Fix stack corruption",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26586.mbox b/cve/published/2024/CVE-2024-26586.mbox
index e72e6370..1e75a531 100644
--- a/cve/published/2024/CVE-2024-26586.mbox
+++ b/cve/published/2024/CVE-2024-26586.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26586: mlxsw: spectrum_acl_tcam: Fix stack corruption
@@ -71,7 +71,7 @@ Affected and fixed versions
Issue introduced in 4.19 with commit c3ab435466d5 and fixed in 6.1.79 with commit 6fd24675188d
Issue introduced in 4.19 with commit c3ab435466d5 and fixed in 6.6.14 with commit 2f5e15657404
Issue introduced in 4.19 with commit c3ab435466d5 and fixed in 6.7.2 with commit a361c2c1da5d
- Issue introduced in 4.19 with commit c3ab435466d5 and fixed in 6.8-rc1 with commit 483ae90d8f97
+ Issue introduced in 4.19 with commit c3ab435466d5 and fixed in 6.8 with commit 483ae90d8f97
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26587.json b/cve/published/2024/CVE-2024-26587.json
index e444632e..e1c39c45 100644
--- a/cve/published/2024/CVE-2024-26587.json
+++ b/cve/published/2024/CVE-2024-26587.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "net: netdevsim: don't try to destroy PHC on VFs",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26587.mbox b/cve/published/2024/CVE-2024-26587.mbox
index a539b8d8..cf479639 100644
--- a/cve/published/2024/CVE-2024-26587.mbox
+++ b/cve/published/2024/CVE-2024-26587.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26587: net: netdevsim: don't try to destroy PHC on VFs
@@ -47,7 +47,7 @@ Affected and fixed versions
Issue introduced in 6.6 with commit b63e78fca889 and fixed in 6.6.14 with commit 08aca65997fb
Issue introduced in 6.6 with commit b63e78fca889 and fixed in 6.7.2 with commit c5068e442eed
- Issue introduced in 6.6 with commit b63e78fca889 and fixed in 6.8-rc1 with commit ea937f772083
+ Issue introduced in 6.6 with commit b63e78fca889 and fixed in 6.8 with commit ea937f772083
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26588.json b/cve/published/2024/CVE-2024-26588.json
index e5d94c5b..b155720e 100644
--- a/cve/published/2024/CVE-2024-26588.json
+++ b/cve/published/2024/CVE-2024-26588.json
@@ -78,7 +78,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -102,7 +102,7 @@
],
"title": "LoongArch: BPF: Prevent out-of-bounds memory access",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26588.mbox b/cve/published/2024/CVE-2024-26588.mbox
index 011ec5d1..5db93485 100644
--- a/cve/published/2024/CVE-2024-26588.mbox
+++ b/cve/published/2024/CVE-2024-26588.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26588: LoongArch: BPF: Prevent out-of-bounds memory access
@@ -90,7 +90,7 @@ Affected and fixed versions
Issue introduced in 6.1 with commit bbfddb904df6f82 and fixed in 6.1.75 with commit 4631c2dd69d9
Issue introduced in 6.1 with commit bbfddb904df6f82 and fixed in 6.6.14 with commit 9aeb09f4d85a
Issue introduced in 6.1 with commit bbfddb904df6f82 and fixed in 6.7.2 with commit 7924ade13a49
- Issue introduced in 6.1 with commit bbfddb904df6f82 and fixed in 6.8-rc1 with commit 36a87385e31c
+ Issue introduced in 6.1 with commit bbfddb904df6f82 and fixed in 6.8 with commit 36a87385e31c
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26589.json b/cve/published/2024/CVE-2024-26589.json
index e67f4728..61a76bee 100644
--- a/cve/published/2024/CVE-2024-26589.json
+++ b/cve/published/2024/CVE-2024-26589.json
@@ -90,7 +90,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -117,7 +117,7 @@
],
"title": "bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26589.mbox b/cve/published/2024/CVE-2024-26589.mbox
index cf68bc67..d43cd972 100644
--- a/cve/published/2024/CVE-2024-26589.mbox
+++ b/cve/published/2024/CVE-2024-26589.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26589: bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS
@@ -72,7 +72,7 @@ Affected and fixed versions
Issue introduced in 4.20 with commit d58e468b1112 and fixed in 6.1.75 with commit 4108b86e324d
Issue introduced in 4.20 with commit d58e468b1112 and fixed in 6.6.14 with commit e8d3872b617c
Issue introduced in 4.20 with commit d58e468b1112 and fixed in 6.7.2 with commit 1b500d5d6cec
- Issue introduced in 4.20 with commit d58e468b1112 and fixed in 6.8-rc1 with commit 22c7fa171a02
+ Issue introduced in 4.20 with commit d58e468b1112 and fixed in 6.8 with commit 22c7fa171a02
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26590.json b/cve/published/2024/CVE-2024-26590.json
index f9ecbd60..edd583c6 100644
--- a/cve/published/2024/CVE-2024-26590.json
+++ b/cve/published/2024/CVE-2024-26590.json
@@ -78,7 +78,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -102,7 +102,7 @@
],
"title": "erofs: fix inconsistent per-file compression format",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26590.mbox b/cve/published/2024/CVE-2024-26590.mbox
index a36d23fd..b959e87a 100644
--- a/cve/published/2024/CVE-2024-26590.mbox
+++ b/cve/published/2024/CVE-2024-26590.mbox
@@ -1,4 +1,4 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -34,7 +34,7 @@ Affected and fixed versions
Issue introduced in 5.16 with commit 622ceaddb764 and fixed in 6.1.80 with commit 47467e04816c
Issue introduced in 5.16 with commit 622ceaddb764 and fixed in 6.6.14 with commit 823ba1d21060
Issue introduced in 5.16 with commit 622ceaddb764 and fixed in 6.7.2 with commit eed24b816e50
- Issue introduced in 5.16 with commit 622ceaddb764 and fixed in 6.8-rc1 with commit 118a8cf504d7
+ Issue introduced in 5.16 with commit 622ceaddb764 and fixed in 6.8 with commit 118a8cf504d7
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26591.json b/cve/published/2024/CVE-2024-26591.json
index 9f1f9d13..d931aa5c 100644
--- a/cve/published/2024/CVE-2024-26591.json
+++ b/cve/published/2024/CVE-2024-26591.json
@@ -90,7 +90,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -117,7 +117,7 @@
],
"title": "bpf: Fix re-attachment branch in bpf_tracing_prog_attach",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26591.mbox b/cve/published/2024/CVE-2024-26591.mbox
index 3fecb57b..fe72f7a9 100644
--- a/cve/published/2024/CVE-2024-26591.mbox
+++ b/cve/published/2024/CVE-2024-26591.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26591: bpf: Fix re-attachment branch in bpf_tracing_prog_attach
@@ -53,7 +53,7 @@ Affected and fixed versions
Issue introduced in 5.13 with commit f3a95075549e0 and fixed in 6.1.75 with commit 6cc9c0af0aa0
Issue introduced in 5.13 with commit f3a95075549e0 and fixed in 6.6.14 with commit 8c8bcd45e9b1
Issue introduced in 5.13 with commit f3a95075549e0 and fixed in 6.7.2 with commit 50ae82f080cf
- Issue introduced in 5.13 with commit f3a95075549e0 and fixed in 6.8-rc1 with commit 715d82ba636c
+ Issue introduced in 5.13 with commit f3a95075549e0 and fixed in 6.8 with commit 715d82ba636c
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26592.json b/cve/published/2024/CVE-2024-26592.json
index c16d9e93..493427c1 100644
--- a/cve/published/2024/CVE-2024-26592.json
+++ b/cve/published/2024/CVE-2024-26592.json
@@ -90,7 +90,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -117,7 +117,7 @@
],
"title": "ksmbd: fix UAF issue in ksmbd_tcp_new_connection()",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26592.mbox b/cve/published/2024/CVE-2024-26592.mbox
index 91ab6c99..bdbf06cb 100644
--- a/cve/published/2024/CVE-2024-26592.mbox
+++ b/cve/published/2024/CVE-2024-26592.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26592: ksmbd: fix UAF issue in ksmbd_tcp_new_connection()
@@ -25,7 +25,7 @@ Affected and fixed versions
Issue introduced in 5.15 with commit a848c4f15ab6 and fixed in 6.1.75 with commit 380965e48e9c
Issue introduced in 5.15 with commit a848c4f15ab6 and fixed in 6.6.14 with commit 24290ba94cd0
Issue introduced in 5.15 with commit a848c4f15ab6 and fixed in 6.7.2 with commit 69d54650b751
- Issue introduced in 5.15 with commit a848c4f15ab6 and fixed in 6.8-rc1 with commit 38d20c62903d
+ Issue introduced in 5.15 with commit a848c4f15ab6 and fixed in 6.8 with commit 38d20c62903d
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26593.json b/cve/published/2024/CVE-2024-26593.json
index ca78b715..420bdb73 100644
--- a/cve/published/2024/CVE-2024-26593.json
+++ b/cve/published/2024/CVE-2024-26593.json
@@ -114,7 +114,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc5",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -147,7 +147,7 @@
],
"title": "i2c: i801: Fix block process call transactions",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26593.mbox b/cve/published/2024/CVE-2024-26593.mbox
index d07703e8..a7845a74 100644
--- a/cve/published/2024/CVE-2024-26593.mbox
+++ b/cve/published/2024/CVE-2024-26593.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26593: i2c: i801: Fix block process call transactions
@@ -31,7 +31,7 @@ Affected and fixed versions
Issue introduced in 5.3 with commit 315cd67c9453 and fixed in 6.1.79 with commit 491528935c9c
Issue introduced in 5.3 with commit 315cd67c9453 and fixed in 6.6.18 with commit 6be99c51829b
Issue introduced in 5.3 with commit 315cd67c9453 and fixed in 6.7.6 with commit 609c7c1cc976
- Issue introduced in 5.3 with commit 315cd67c9453 and fixed in 6.8-rc5 with commit c1c9d0f6f7f1
+ Issue introduced in 5.3 with commit 315cd67c9453 and fixed in 6.8 with commit c1c9d0f6f7f1
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26594.json b/cve/published/2024/CVE-2024-26594.json
index 2a27ed6c..09af60cb 100644
--- a/cve/published/2024/CVE-2024-26594.json
+++ b/cve/published/2024/CVE-2024-26594.json
@@ -80,7 +80,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -107,7 +107,7 @@
],
"title": "ksmbd: validate mech token in session setup",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26594.mbox b/cve/published/2024/CVE-2024-26594.mbox
index d8e2cd34..fde14526 100644
--- a/cve/published/2024/CVE-2024-26594.mbox
+++ b/cve/published/2024/CVE-2024-26594.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26594: ksmbd: validate mech token in session setup
@@ -24,7 +24,7 @@ Affected and fixed versions
Fixed in 6.1.75 with commit 6eb8015492bc
Fixed in 6.6.14 with commit a2b21ef1ea4c
Fixed in 6.7.2 with commit 5e6dfec95833
- Fixed in 6.8-rc1 with commit 92e470163d96
+ Fixed in 6.8 with commit 92e470163d96
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26595.json b/cve/published/2024/CVE-2024-26595.json
index 7698d8a9..9f943085 100644
--- a/cve/published/2024/CVE-2024-26595.json
+++ b/cve/published/2024/CVE-2024-26595.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26595.mbox b/cve/published/2024/CVE-2024-26595.mbox
index b4023c7e..e9b5ceff 100644
--- a/cve/published/2024/CVE-2024-26595.mbox
+++ b/cve/published/2024/CVE-2024-26595.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26595: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path
@@ -49,7 +49,7 @@ Affected and fixed versions
Issue introduced in 4.11 with commit 22a677661f56 and fixed in 6.6.14 with commit 817840d125a3
Issue introduced in 4.11 with commit 22a677661f56 and fixed in 6.7.2 with commit d0a1efe417c9
- Issue introduced in 4.11 with commit 22a677661f56 and fixed in 6.8-rc1 with commit efeb7dfea8ee
+ Issue introduced in 4.11 with commit 22a677661f56 and fixed in 6.8 with commit efeb7dfea8ee
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26596.json b/cve/published/2024/CVE-2024-26596.json
index 1afda497..8538bfd7 100644
--- a/cve/published/2024/CVE-2024-26596.json
+++ b/cve/published/2024/CVE-2024-26596.json
@@ -54,7 +54,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -72,7 +72,7 @@
],
"title": "net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26596.mbox b/cve/published/2024/CVE-2024-26596.mbox
index 2b28dbd1..7fcf7fe1 100644
--- a/cve/published/2024/CVE-2024-26596.mbox
+++ b/cve/published/2024/CVE-2024-26596.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events
@@ -60,7 +60,7 @@ Affected and fixed versions
===========================
Issue introduced in 6.1 with commit 4c3f80d22b2e and fixed in 6.7.2 with commit dbd909c20c11
- Issue introduced in 6.1 with commit 4c3f80d22b2e and fixed in 6.8-rc1 with commit 844f104790bd
+ Issue introduced in 6.1 with commit 4c3f80d22b2e and fixed in 6.8 with commit 844f104790bd
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26597.json b/cve/published/2024/CVE-2024-26597.json
index 54df3929..01b06623 100644
--- a/cve/published/2024/CVE-2024-26597.json
+++ b/cve/published/2024/CVE-2024-26597.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,7 +162,7 @@
],
"title": "net: qualcomm: rmnet: fix global oob in rmnet_policy",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26597.mbox b/cve/published/2024/CVE-2024-26597.mbox
index 5bd4e510..899df700 100644
--- a/cve/published/2024/CVE-2024-26597.mbox
+++ b/cve/published/2024/CVE-2024-26597.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26597: net: qualcomm: rmnet: fix global oob in rmnet_policy
@@ -92,7 +92,7 @@ Affected and fixed versions
Issue introduced in 4.17 with commit 14452ca3b5ce and fixed in 6.1.75 with commit ee1dc3bf86f2
Issue introduced in 4.17 with commit 14452ca3b5ce and fixed in 6.6.14 with commit c47345350346
Issue introduced in 4.17 with commit 14452ca3b5ce and fixed in 6.7.2 with commit 17d06a5c44d8
- Issue introduced in 4.17 with commit 14452ca3b5ce and fixed in 6.8-rc1 with commit b33fb5b801c6
+ Issue introduced in 4.17 with commit 14452ca3b5ce and fixed in 6.8 with commit b33fb5b801c6
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26598.json b/cve/published/2024/CVE-2024-26598.json
index 09a5f504..f71d783d 100644
--- a/cve/published/2024/CVE-2024-26598.json
+++ b/cve/published/2024/CVE-2024-26598.json
@@ -104,7 +104,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -137,7 +137,7 @@
],
"title": "KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26598.mbox b/cve/published/2024/CVE-2024-26598.mbox
index 4e69ce68..e1e0db23 100644
--- a/cve/published/2024/CVE-2024-26598.mbox
+++ b/cve/published/2024/CVE-2024-26598.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26598: KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache
@@ -32,7 +32,7 @@ Affected and fixed versions
Fixed in 6.1.75 with commit dba788e25f05
Fixed in 6.6.14 with commit 65b201bf3e9a
Fixed in 6.7.2 with commit dd3956a1b3dd
- Fixed in 6.8-rc1 with commit ad362fe07fec
+ Fixed in 6.8 with commit ad362fe07fec
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26599.json b/cve/published/2024/CVE-2024-26599.json
index ff21e270..04477ca7 100644
--- a/cve/published/2024/CVE-2024-26599.json
+++ b/cve/published/2024/CVE-2024-26599.json
@@ -78,7 +78,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -102,7 +102,7 @@
],
"title": "pwm: Fix out-of-bounds access in of_pwm_single_xlate()",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26599.mbox b/cve/published/2024/CVE-2024-26599.mbox
index e7254795..26de243b 100644
--- a/cve/published/2024/CVE-2024-26599.mbox
+++ b/cve/published/2024/CVE-2024-26599.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26599: pwm: Fix out-of-bounds access in of_pwm_single_xlate()
@@ -23,7 +23,7 @@ Affected and fixed versions
Issue introduced in 5.17 with commit 3ab7b6ac5d82 and fixed in 6.1.75 with commit 7b85554c7c2a
Issue introduced in 5.17 with commit 3ab7b6ac5d82 and fixed in 6.6.14 with commit e5f2b4b62977
Issue introduced in 5.17 with commit 3ab7b6ac5d82 and fixed in 6.7.2 with commit bae45b7ebb31
- Issue introduced in 5.17 with commit 3ab7b6ac5d82 and fixed in 6.8-rc1 with commit a297d07b9a1e
+ Issue introduced in 5.17 with commit 3ab7b6ac5d82 and fixed in 6.8 with commit a297d07b9a1e
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26600.json b/cve/published/2024/CVE-2024-26600.json
index c789322c..65c58ee4 100644
--- a/cve/published/2024/CVE-2024-26600.json
+++ b/cve/published/2024/CVE-2024-26600.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc3",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,7 +162,7 @@
],
"title": "phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26600.mbox b/cve/published/2024/CVE-2024-26600.mbox
index 9095fa6b..b5df2bf8 100644
--- a/cve/published/2024/CVE-2024-26600.mbox
+++ b/cve/published/2024/CVE-2024-26600.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26600: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP
@@ -56,7 +56,7 @@ Affected and fixed versions
Issue introduced in 3.7 with commit 657b306a7bdf and fixed in 6.1.78 with commit 0430bfcd4665
Issue introduced in 3.7 with commit 657b306a7bdf and fixed in 6.6.17 with commit 14ef61594a5a
Issue introduced in 3.7 with commit 657b306a7bdf and fixed in 6.7.5 with commit 396e17af6761
- Issue introduced in 3.7 with commit 657b306a7bdf and fixed in 6.8-rc3 with commit 7104ba0f1958
+ Issue introduced in 3.7 with commit 657b306a7bdf and fixed in 6.8 with commit 7104ba0f1958
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26601.json b/cve/published/2024/CVE-2024-26601.json
index d2d10b07..8d7fdd46 100644
--- a/cve/published/2024/CVE-2024-26601.json
+++ b/cve/published/2024/CVE-2024-26601.json
@@ -92,7 +92,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc3",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -122,7 +122,7 @@
],
"title": "ext4: regenerate buddy after block freeing failed if under fc replay",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26601.mbox b/cve/published/2024/CVE-2024-26601.mbox
index 4a142d86..3041e5e8 100644
--- a/cve/published/2024/CVE-2024-26601.mbox
+++ b/cve/published/2024/CVE-2024-26601.mbox
@@ -1,4 +1,4 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -28,7 +28,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit 6bd97bf273bd and fixed in 6.1.78 with commit 78327acd4cdc
Issue introduced in 5.11 with commit 6bd97bf273bd and fixed in 6.6.17 with commit ea42d6cffb0d
Issue introduced in 5.11 with commit 6bd97bf273bd and fixed in 6.7.5 with commit 6b0d48647935
- Issue introduced in 5.11 with commit 6bd97bf273bd and fixed in 6.8-rc3 with commit c9b528c35795
+ Issue introduced in 5.11 with commit 6bd97bf273bd and fixed in 6.8 with commit c9b528c35795
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26602.json b/cve/published/2024/CVE-2024-26602.json
index f0e3523d..f8737315 100644
--- a/cve/published/2024/CVE-2024-26602.json
+++ b/cve/published/2024/CVE-2024-26602.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc6",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,7 +162,7 @@
],
"title": "sched/membarrier: reduce the ability to hammer on sys_membarrier",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26602.mbox b/cve/published/2024/CVE-2024-26602.mbox
index 4d3cb154..62485221 100644
--- a/cve/published/2024/CVE-2024-26602.mbox
+++ b/cve/published/2024/CVE-2024-26602.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26602: sched/membarrier: reduce the ability to hammer on sys_membarrier
@@ -29,7 +29,7 @@ Affected and fixed versions
Issue introduced in 4.14 with commit c5f58bd58f43 and fixed in 6.1.79 with commit 24ec7504a08a
Issue introduced in 4.14 with commit c5f58bd58f43 and fixed in 6.6.18 with commit b6a2a9cbb675
Issue introduced in 4.14 with commit c5f58bd58f43 and fixed in 6.7.6 with commit c5b2063c65d0
- Issue introduced in 4.14 with commit c5f58bd58f43 and fixed in 6.8-rc6 with commit 944d5fe50f3f
+ Issue introduced in 4.14 with commit c5f58bd58f43 and fixed in 6.8 with commit 944d5fe50f3f
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26603.json b/cve/published/2024/CVE-2024-26603.json
index 5c56f4d0..98fa5959 100644
--- a/cve/published/2024/CVE-2024-26603.json
+++ b/cve/published/2024/CVE-2024-26603.json
@@ -90,7 +90,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc4",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -117,7 +117,7 @@
],
"title": "x86/fpu: Stop relying on userspace for info to fault in xsave buffer",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26603.mbox b/cve/published/2024/CVE-2024-26603.mbox
index 48d90182..2ffa5d31 100644
--- a/cve/published/2024/CVE-2024-26603.mbox
+++ b/cve/published/2024/CVE-2024-26603.mbox
@@ -1,4 +1,4 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -40,7 +40,7 @@ Affected and fixed versions
Issue introduced in 5.14 with commit fcb3635f5018 and fixed in 6.1.79 with commit 627339cccdc9
Issue introduced in 5.14 with commit fcb3635f5018 and fixed in 6.6.18 with commit b2479ab426ce
Issue introduced in 5.14 with commit fcb3635f5018 and fixed in 6.7.6 with commit 627e28cbb655
- Issue introduced in 5.14 with commit fcb3635f5018 and fixed in 6.8-rc4 with commit d877550eaf2d
+ Issue introduced in 5.14 with commit fcb3635f5018 and fixed in 6.8 with commit d877550eaf2d
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26604.json b/cve/published/2024/CVE-2024-26604.json
index ec4aa276..90f91772 100644
--- a/cve/published/2024/CVE-2024-26604.json
+++ b/cve/published/2024/CVE-2024-26604.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc5",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "Revert \"kobject: Remove redundant checks for whether ktype is NULL\"",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26604.mbox b/cve/published/2024/CVE-2024-26604.mbox
index b7270701..c6f1dd42 100644
--- a/cve/published/2024/CVE-2024-26604.mbox
+++ b/cve/published/2024/CVE-2024-26604.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26604: Revert "kobject: Remove redundant checks for whether ktype is NULL"
@@ -24,7 +24,7 @@ Affected and fixed versions
Issue introduced in 6.6 with commit 1b28cb81dab7 and fixed in 6.6.18 with commit 7f414d306320
Issue introduced in 6.6 with commit 1b28cb81dab7 and fixed in 6.7.6 with commit b746d52ce7bc
- Issue introduced in 6.6 with commit 1b28cb81dab7 and fixed in 6.8-rc5 with commit 3ca8fbabcceb
+ Issue introduced in 6.6 with commit 1b28cb81dab7 and fixed in 6.8 with commit 3ca8fbabcceb
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26605.json b/cve/published/2024/CVE-2024-26605.json
index 16f1a3a3..7497813d 100644
--- a/cve/published/2024/CVE-2024-26605.json
+++ b/cve/published/2024/CVE-2024-26605.json
@@ -54,7 +54,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc3",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -72,7 +72,7 @@
],
"title": "PCI/ASPM: Fix deadlock when enabling ASPM",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26605.mbox b/cve/published/2024/CVE-2024-26605.mbox
index 4050cafc..1e3a1bb2 100644
--- a/cve/published/2024/CVE-2024-26605.mbox
+++ b/cve/published/2024/CVE-2024-26605.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26605: PCI/ASPM: Fix deadlock when enabling ASPM
@@ -62,7 +62,7 @@ Affected and fixed versions
===========================
Issue introduced in 6.7 with commit f93e71aea6c6 and fixed in 6.7.5 with commit ef90508574d7
- Issue introduced in 6.7 with commit f93e71aea6c6 and fixed in 6.8-rc3 with commit 1e560864159d
+ Issue introduced in 6.7 with commit f93e71aea6c6 and fixed in 6.8 with commit 1e560864159d
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26606.json b/cve/published/2024/CVE-2024-26606.json
index fceae5b3..4132c647 100644
--- a/cve/published/2024/CVE-2024-26606.json
+++ b/cve/published/2024/CVE-2024-26606.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc3",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,7 +162,7 @@
],
"title": "binder: signal epoll threads of self-work",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26606.mbox b/cve/published/2024/CVE-2024-26606.mbox
index 7d400486..a5532baf 100644
--- a/cve/published/2024/CVE-2024-26606.mbox
+++ b/cve/published/2024/CVE-2024-26606.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26606: binder: signal epoll threads of self-work
@@ -34,7 +34,7 @@ Affected and fixed versions
Issue introduced in 2.6.29 with commit 457b9a6f09f0 and fixed in 6.1.79 with commit 90e09c016d72
Issue introduced in 2.6.29 with commit 457b9a6f09f0 and fixed in 6.6.18 with commit a7ae586f6f60
Issue introduced in 2.6.29 with commit 457b9a6f09f0 and fixed in 6.7.6 with commit 93b372c39c40
- Issue introduced in 2.6.29 with commit 457b9a6f09f0 and fixed in 6.8-rc3 with commit 97830f3c3088
+ Issue introduced in 2.6.29 with commit 457b9a6f09f0 and fixed in 6.8 with commit 97830f3c3088
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26607.json b/cve/published/2024/CVE-2024-26607.json
index 17a7f6a2..d065ca1c 100644
--- a/cve/published/2024/CVE-2024-26607.json
+++ b/cve/published/2024/CVE-2024-26607.json
@@ -78,7 +78,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc2",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -102,14 +102,14 @@
],
"title": "drm/bridge: sii902x: Fix probing race issue",
"x_generator": {
- "engine": "bippy-c44685ae717f"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2024-26607",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26607.mbox b/cve/published/2024/CVE-2024-26607.mbox
index b4113714..c161e1ba 100644
--- a/cve/published/2024/CVE-2024-26607.mbox
+++ b/cve/published/2024/CVE-2024-26607.mbox
@@ -1,24 +1,8 @@
-From bippy-c44685ae717f Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26607: drm/bridge: sii902x: Fix probing race issue
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4296; i=lee@kernel.org;
- h=from:subject; bh=Pf/GcPm1aMgiuhJG/zONSib5rRzR7EQpiWrqJ1p4ofw=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4IgSlUVLOo/UGOt532wUC0jt3apDCM8N0yyop
- 1LZUWCjU+2JAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCIEgAKCRBRr4ovh/x3
- YSWxD/oCUZ1PMCHmXQnYa25qt2YgvO19m2jLysA0f9L4z2m8CKKQJQiPyvvzTpkNkzH3KuZfBzA
- yaa4LytYClncpd3tMZ4gBBqiLXQTR4u0qkV1jj/zNKagaeDZIqMaEQcTks/7ZlO+fjyc1nz3WfS
- LrO4uJdyb0yWB2J7B8oK/+PjQkfO72+nmjLssLEtccgJG+WxBNgRlYn65gaJoneh01/w/jC6LWI
- 5xd8edDKvicViFv5tMu0hNJ5agnyz52F8wXAIuBwNJCEg2kqZcZCBnD2XtG6/hmHsiA7kNb6iQO
- bge3LLs8dL6IdCO9UBObtloC2RoPEmfNq/9v1+c9y1j2RZHRAdd2bMoWWi6qExgdPu45+lCOIGp
- DlCfwcKdDsicWig9N8pcSYcadX1Xj878r0WlUJrk3TM/MRF7dy0eMhOv5XOLjCDgdju1ypqadc4
- quPT8oHb9nc9D9IM8zN998yBMCkfqOQSbmRxrSN9+29nDeYZld78MsD8SMPg4Kz8Z9YHoiVUl6a
- 8ajm9tqWdvuj6sQZ8H6TKjOQFRa0goUwh3M/wT6z79nNnufXd+mWuM7nPTRRMd3veesompKgT1v
- xkQbHE74lLgDiRoeZ67/yk9xmf4vvqZwW5MwZ0ZKr84CGJvZKPBreEq2/Lm0B3ja2LXoIO+wFd4
- U9WfKQUsgP4BSzQ==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -85,7 +69,7 @@ Affected and fixed versions
Issue introduced in 5.0 with commit 21d808405fe4 and fixed in 6.1.76 with commit e0f83c234ea7
Issue introduced in 5.0 with commit 21d808405fe4 and fixed in 6.6.15 with commit 56f96cf6eb11
Issue introduced in 5.0 with commit 21d808405fe4 and fixed in 6.7.3 with commit 2a4c6af7934a
- Issue introduced in 5.0 with commit 21d808405fe4 and fixed in 6.8-rc2 with commit 08ac6f132dd7
+ Issue introduced in 5.0 with commit 21d808405fe4 and fixed in 6.8 with commit 08ac6f132dd7
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26608.json b/cve/published/2024/CVE-2024-26608.json
index 094d7eeb..27585b92 100644
--- a/cve/published/2024/CVE-2024-26608.json
+++ b/cve/published/2024/CVE-2024-26608.json
@@ -90,7 +90,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc2",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -117,14 +117,14 @@
],
"title": "ksmbd: fix global oob in ksmbd_nl_policy",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2024-26608",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26608.mbox b/cve/published/2024/CVE-2024-26608.mbox
index b52749a7..a724e185 100644
--- a/cve/published/2024/CVE-2024-26608.mbox
+++ b/cve/published/2024/CVE-2024-26608.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26608: ksmbd: fix global oob in ksmbd_nl_policy
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6098; i=lee@kernel.org;
- h=from:subject; bh=iJswLs06cWOULMW/A4gM/aE3Sf6jEgvi9QYSy+/+qsA=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhPFXz+HVS6mONTOzD1BJ2BnBRDtfX+IufVB
- /ODlGoCE8mJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTwAKCRBRr4ovh/x3
- YcmbEACaHzn74MdeT13NUw152mJLKeOY1uSMMGx6IsEf/cPSTbPvdE0GBhUsYXmPAnMKZELdPqm
- V2pJJ+EWuehZ9DS2bxFczfxMqregTLwxhD9+Fo9o39wSrU1ZF3Ovl6hJ3FVL5CkUTGlMLjEqUVu
- SogDiE178S+uRILHjXG2w9xxFvb6+TIfY6bXm8oIVOPZIygQAHB4JDzharTeGkz9AYuA0/Pne3T
- ffNR8ajifqUF0K46gCXddsCeDRHas1X6ZZ1KdEF/lZnK54Pp+P5RaZ1yhhuU3inXfCU3Aq0LBG/
- oj973L6okUpKHcmqh/PnSoNAtG+LsskCjs7WaV6f04MuOSBuZ5yO866QRbxGONc4U2Jdw1xUi0w
- wR2GCUIZ3wrOR8l7Di4CGUvm3zhxr/Ug5P7Ihf5lHRqncaPO950t0V1rb6iFKY1AkoadeZ3D9kF
- AZY1wno3a1XNPHpV9oQDqrQah2wGkNFnEF9Hh9y2sgfJ0P5AaFgL+ZOpRJd7Imbe/l+NN0qiF2E
- yOrxCrsPGYwnYPMalDpRS9bG20HU/hmYDEf1lYot7XUKckPpJKl3aSgpYj6nQAMHay1rbRN5MuP
- KO9YcUj3E5HQbHh7HNY+bNvzR5dgJS8m/AW7A1OSdqvofP1x7CsSj/zSAXoz6sP8pfRXZ7lfXPq
- TwcDv2/xxT8fp9A==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -111,7 +95,7 @@ Affected and fixed versions
Issue introduced in 5.15 with commit 0626e6641f6b and fixed in 6.1.76 with commit 2c939c74ef0b
Issue introduced in 5.15 with commit 0626e6641f6b and fixed in 6.6.15 with commit 9863a53100f4
Issue introduced in 5.15 with commit 0626e6641f6b and fixed in 6.7.3 with commit 6993328a4cd6
- Issue introduced in 5.15 with commit 0626e6641f6b and fixed in 6.8-rc2 with commit ebeae8adf89d
+ Issue introduced in 5.15 with commit 0626e6641f6b and fixed in 6.8 with commit ebeae8adf89d
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26609.json b/cve/published/2024/CVE-2024-26609.json
index 7f273a84..7e5254bd 100644
--- a/cve/published/2024/CVE-2024-26609.json
+++ b/cve/published/2024/CVE-2024-26609.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc2",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,14 +162,14 @@
],
"title": "netfilter: nf_tables: reject QUEUE/DROP verdict parameters",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2024-26609",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26609.mbox b/cve/published/2024/CVE-2024-26609.mbox
index 4c049c3e..f2cb4a37 100644
--- a/cve/published/2024/CVE-2024-26609.mbox
+++ b/cve/published/2024/CVE-2024-26609.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26609: netfilter: nf_tables: reject QUEUE/DROP verdict parameters
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3322; i=lee@kernel.org;
- h=from:subject; bh=d7SilxdbBFp3f74pF+784tJWkdxFM/T8Fqr3K4rYwRg=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhPiHn5Aq83t2LV0f5Vh6iuACoYu7MYhaoYI
- ZRU1dT2AFiJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTwAKCRBRr4ovh/x3
- YbyaD/9iSI19E2SiyEzJsUfa2e9cB8eIYOcnC5JcystU1f4XWY2ABbSL5WDizEpPikjxfPR5tPV
- XWraNythn0cpNM31dOrdJJ58LqURnAEECdNNYE1bIHw9n/ifSwCs1HUxQBDtzREimGax5+iKkwY
- nUi5vSX5uNBXtKNnWXwhoSCikap8FmI3PV6p5pItA2jxlO8a6ipiAKv+38wHdM5G9xNQBxMqBqH
- frJs4qHQ66du0jLSVen7O0zTo/5pntWM7/gopryEQehholykDNVtI0gQuU40uIA174z9xfMkYSQ
- OowsIWMXIafiB2Yw6mFx8bQQUnTRx32iiGOmbyRbhEkQXQYGFN+QlWAMZTCxBaogVm5wB+aYKXF
- 1MaaTt43VizPWxwoaaIbci8mFL4VSCR2g6MkNKprAqDuTwOQ6ULe9Yt20rbSCTC4ToglE1CgU7y
- bf+rJQMUW6JEMqBBHDEpjufNKEuKcPJNmYqs5LIlkLs/LmfwKy/s1zrbPNClbxcgZFcRM4sqq1t
- z+BJXsGINlfzLMJ9Niu8CY1+7dJ5Lw9qQB7Xl0DBFFyyQFT+4Pye1hx567vVllSQxX4DALZ7U9m
- s5k0e5vgAUyPzpZxagIKuRgarA++W0vHeSisGrjA51PmDUfH4AZU4I5L47t5D9P7SGhRfn09tbu
- 0BCi3vwrBVnusoQ==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -58,7 +42,7 @@ Affected and fixed versions
Issue introduced in 3.15 with commit e0abdadcc6e1 and fixed in 6.1.76 with commit 8e34430e33b8
Issue introduced in 3.15 with commit e0abdadcc6e1 and fixed in 6.6.15 with commit 6653118b176a
Issue introduced in 3.15 with commit e0abdadcc6e1 and fixed in 6.7.3 with commit f05a497e7bc8
- Issue introduced in 3.15 with commit e0abdadcc6e1 and fixed in 6.8-rc2 with commit f342de4e2f33
+ Issue introduced in 3.15 with commit e0abdadcc6e1 and fixed in 6.8 with commit f342de4e2f33
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26610.json b/cve/published/2024/CVE-2024-26610.json
index 1bcc2ea6..da99def6 100644
--- a/cve/published/2024/CVE-2024-26610.json
+++ b/cve/published/2024/CVE-2024-26610.json
@@ -102,7 +102,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc2",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -132,14 +132,14 @@
],
"title": "wifi: iwlwifi: fix a memory corruption",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2024-26610",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26610.mbox b/cve/published/2024/CVE-2024-26610.mbox
index 3d0b978a..2b77bad8 100644
--- a/cve/published/2024/CVE-2024-26610.mbox
+++ b/cve/published/2024/CVE-2024-26610.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26610: wifi: iwlwifi: fix a memory corruption
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2525; i=lee@kernel.org;
- h=from:subject; bh=jqps+IUGi72Bpam9yYbUAbFQPQlu6WqiCfr8SK8+zjc=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhPehlpOWrlGvT5uBHaTeHLk3OFa63bVnT/m
- QXqW6lhDj2JAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTwAKCRBRr4ovh/x3
- YUWBEACD/OqMnJvf0g5rE2iqcIZFdrjtFDUc+J+bo+DYuHqaCbpjwBn9gW7Kjmt+zm9qtGT5l2z
- lXvBK0puKD/N+5/r7Ves0GODXMjh/14TnGTc6kRFGMqRZbxbCZSC7tO3/G2u7d3wtTxTz2ScqkC
- 6fdvFMYlQFPEUUIMuzPhQn4p6jlOloVlxF2VjBwmy83Z9QlRaWj+mZjFwJVKaEHw2HO8Q7mrJnx
- ydpTzb+OZHvU6IAirCaPi21aVzzkp5JUgksh/jtlV+6a2Hf1GzNkgoA+0Ua4liWO5zHr5XdQiSJ
- SuQQIxstrIgzLGc5qtgdjZCkOAczTS4fPtlmj89bdiKLkUR6WzLKh7YDOuqwwcuWO/hJbQ4DCrk
- 32reMw4+3yqq+5+sDEM69+zhFrMcZcjn/zpJpI+gdgLLrru2ZiFTSHRFAErRer00ZNgwUVmW3B5
- 025ETBKOBQzCFOiuLCHuulbIsvwf30HpW+qqB8xAYdql/9ABt0mQVSMAtHXcZzAiHvru8FNKtIQ
- 1blswKCs5ICN106tMcFO2YE/VnvSBKermZ+t9/d46JiVoQorakxU1OtwPEzByjQnCir9DYpGk2e
- fZvZSYxttYvBhTKezz2LlmrIzSVv12O7SD7VX77+/NDxBuM1v91lEyr2ogY+WFOFW5kN4/N1qvE
- Fiq8DEJu3YMKgJg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -42,7 +26,7 @@ Affected and fixed versions
Issue introduced in 5.5 with commit cf29c5b66b9f and fixed in 6.1.76 with commit aa2cc9363926
Issue introduced in 5.5 with commit cf29c5b66b9f and fixed in 6.6.15 with commit 870171899d75
Issue introduced in 5.5 with commit cf29c5b66b9f and fixed in 6.7.3 with commit f32a81999d0b
- Issue introduced in 5.5 with commit cf29c5b66b9f and fixed in 6.8-rc2 with commit cf4a0d840ecc
+ Issue introduced in 5.5 with commit cf29c5b66b9f and fixed in 6.8 with commit cf4a0d840ecc
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26611.json b/cve/published/2024/CVE-2024-26611.json
index 193055da..99286fe8 100644
--- a/cve/published/2024/CVE-2024-26611.json
+++ b/cve/published/2024/CVE-2024-26611.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc2",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,14 +87,14 @@
],
"title": "xsk: fix usage of multi-buffer BPF helpers for ZC XDP",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2024-26611",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26611.mbox b/cve/published/2024/CVE-2024-26611.mbox
index b51309c4..ad84e693 100644
--- a/cve/published/2024/CVE-2024-26611.mbox
+++ b/cve/published/2024/CVE-2024-26611.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26611: xsk: fix usage of multi-buffer BPF helpers for ZC XDP
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4842; i=lee@kernel.org;
- h=from:subject; bh=nq+b7LDHYawl4VGZFco7Ea0v/3mM3JOyo8m77yVM0lw=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhPcwt3p69jPnTk4tcaVknsZHceYuqZi8Dal
- lJkJ73vM3GJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTwAKCRBRr4ovh/x3
- Yf09EACxZBQzbGUla8F4VrEQTr9gnzB8YPiaMWliPrln2QnAu6fOgeYaxwGwpCuGl5OY3biikDc
- hcMTxruuZIWnv6s7c+/Ltm0FDM9GJMtwDW1WTbbnsNGCoepA0Hu55ncHbnc0Ksi9xen710Wy7HT
- Re6wFgzMcwVVPBhX9ZtruRuwgpQe+i3yLaOrBgLwlWzhcx0q2WdWlMJGDAKbZyMS/4E9bh6WllY
- 6DaNzrsHGjrEiqM13ul8DtyQls+7oJywFLnfeEF9sqgcZDAfgbo6Bgm3mO6jFHICG0dFdUAQ88n
- XqIZiTZDqEvT1RQo00FEr8WZq41V43elenjYQC5xxK6A42UZ7QhLgE4es5P2agOQQTPQLhC2jbb
- kiCNK2C/v+7XxuebZEgSj4svv+bUccbAMGM/ZrDODDd/D66rNvz2Dp9fpX24Mv72CEwt5DG9w+w
- /7pk+lUqInHXCe0WKk31WO3ahR4jIpBCpQdjDWqW2/SDNLfGsSLWy8Y8kT/pgICMPweqfj4wbBN
- PAklTN04zl2J9R9dpXIx1Bkjk1IidPsAhttbYYkk1/zx//2ptxbqWmjewvQX0aQez/nnupmL8lL
- 1uXz8cmh+PofOq9JO3XR9Z3UjD0CyDKFzKOOlmaR2brZDjlveaLtGwqFlfcr1AsZlGvf5gRB5Bb
- tGSD4vrh3mKd29A==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -96,7 +80,7 @@ Affected and fixed versions
Issue introduced in 6.6 with commit 24ea50127ecf and fixed in 6.6.15 with commit 82ee4781b820
Issue introduced in 6.6 with commit 24ea50127ecf and fixed in 6.7.3 with commit 5cd781f7216f
- Issue introduced in 6.6 with commit 24ea50127ecf and fixed in 6.8-rc2 with commit c5114710c8ce
+ Issue introduced in 6.6 with commit 24ea50127ecf and fixed in 6.8 with commit c5114710c8ce
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26612.json b/cve/published/2024/CVE-2024-26612.json
index 0f1c5e68..33d34637 100644
--- a/cve/published/2024/CVE-2024-26612.json
+++ b/cve/published/2024/CVE-2024-26612.json
@@ -78,7 +78,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc2",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -102,14 +102,14 @@
],
"title": "netfs, fscache: Prevent Oops in fscache_put_cache()",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2024-26612",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26612.mbox b/cve/published/2024/CVE-2024-26612.mbox
index 8f4e0260..eb5fdf92 100644
--- a/cve/published/2024/CVE-2024-26612.mbox
+++ b/cve/published/2024/CVE-2024-26612.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26612: netfs, fscache: Prevent Oops in fscache_put_cache()
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2101; i=lee@kernel.org;
- h=from:subject; bh=j2Ch2ySOtX54VOWCgFOFWLpciFsR7M/fhfTa7AjByag=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhPL6KrL/HTikOO0Re0bz9Xl6c6zC1kFUSLA
- y8UpRlC5aGJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTwAKCRBRr4ovh/x3
- YV8MD/9A05xHIs6YRPANSjcHP65lnktqp5a4DdRjMO+Km3HCPHEimwPZJxJM1N+pCyB6pf2GfOh
- /OsWzxHMZUABNrbdy7r7p1RrX3ZA82yZ/IWboQ10QUj2C6opQbuSPrujsdXf33Mxmc6dHDBdKek
- tMEFidnYmQqfZSzRmE6M3WpI1VxvpE3+e+ZxxRS54bU8EvZmAI1xo+0WWLwUELHHHlFsSCJERgP
- ws9RBX2rli+wgzS2UMZbJtN4/I8OsJWCxRigWnf+16VnEsxAb0EbjxUPaK1sNVhLqGh3AWq4rR5
- 8Namo1tpC4vJoQ98RvgxEUqviBjAPik4StjcadOJRP8C4TPkzYsDNFl2rJs5BzhjG7LHwF8vYjq
- R959laRjYEHLh2eclikptuonAqAsoo88yupgJ26Zqd1BL+rByO86i2M/q+BpGZnW9Dh3hCc2gK0
- DLsake2Xed6jOf53rlu3KsXz2++fhvgZ6LTQBNiS0/ply8GYFblZMJzSMc2xWn4yvFQzwqAmrEU
- WYQ40VL6NjX15tmCCSlPmKh4K1G85t6grKlDOcJIfvDUgfilj4ezBQeFPxwv0Bxw/IEagKEXRVd
- 0yuL4UUVTuH80JR1NiJszRFyDpfrbtFCEmLEpeGcYGL6KIpKoCgd/WvyEHLyNcXyc6rKB82hLf/
- 5PoNabSHFFfy58g==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -39,7 +23,7 @@ Affected and fixed versions
Issue introduced in 5.17 with commit 9549332df4ed and fixed in 6.1.76 with commit 82a9bc343ba0
Issue introduced in 5.17 with commit 9549332df4ed and fixed in 6.6.15 with commit 1c45256e5990
Issue introduced in 5.17 with commit 9549332df4ed and fixed in 6.7.3 with commit 4200ad3e46ce
- Issue introduced in 5.17 with commit 9549332df4ed and fixed in 6.8-rc2 with commit 3be0b3ed1d76
+ Issue introduced in 5.17 with commit 9549332df4ed and fixed in 6.8 with commit 3be0b3ed1d76
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26613.json b/cve/published/2024/CVE-2024-26613.json
index f7b0b057..50c5b707 100644
--- a/cve/published/2024/CVE-2024-26613.json
+++ b/cve/published/2024/CVE-2024-26613.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc2",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,14 +162,14 @@
],
"title": "net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2024-26613",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26613.mbox b/cve/published/2024/CVE-2024-26613.mbox
index 3907f735..dd52f1b7 100644
--- a/cve/published/2024/CVE-2024-26613.mbox
+++ b/cve/published/2024/CVE-2024-26613.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26613: net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4292; i=lee@kernel.org;
- h=from:subject; bh=7dHVz5KRIqwn9ceBDBNexdm9L4R4UZfROFjvHg+hREc=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhPtkZtv5VKV+0QJ95q9jYognJcHqJ1MgU1m
- QJKcs+5qHGJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTwAKCRBRr4ovh/x3
- YWj8D/9QA2GbAKlSmX+pCvcfK0rofopLpDv2A9eykCiQMY69hNDhKf2sVyMmzutTWnoOmbNubuf
- Nd33BninUzlsrz1/Ie10TRGCzIqCPaXH19aS5OpmWEyymp36X++EmSNoTgwsw4W75RXOxBC9AO7
- AMkmqN/nw1Eq1vMIVDRUmhSrPBpt4BRse+flKgCRr49bDNW3pULQrSH/SVvO8LkIaNWIqkrmCTl
- z34DxXRBjoiCbxaAq0lQ9aFiYK7QyRCopZn6VnLCpRMwcVpVqH1tSIdAzoxLk59MPqYDBSCHU2l
- yaplFMJOXnhbOlnjyJY2EORSVkhfRXC4rg5RNgU73u4/Uj5HyewA/zYrpaMaRzYYQRXJipbw24x
- FVN4Vpylj1jGMCzLlruiKTrhZ7/CKTsXLHP3yrKvRlY3XjQDo6OvgSyBpEQN3ukE4o+eTW3xIOy
- 0UvnG/g0VOt3ILePxX84JT5Vmk7P0gKyAUQ/0I3YORIOiJT7OYBR3AbRAaAqEAsD/HkunKhBr1/
- dUiQln5gKXhwYxaMlIe3dgnfUb5EzHyP5oG8wC8EO4YWAIaSDgcLc4KcbOiHsI2lVlV+Qs9kqRk
- SISnwrlmHvUEQrrKUqvX4RnBwh2nUNC6j+edftjkR9I4dqaeVrr02DjyEpB9KRhpKV4mVP4DuLE
- F2luB2COPJzvFMg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -75,7 +59,7 @@ Affected and fixed versions
Issue introduced in 4.11 with commit 3289025aedc0 and fixed in 6.1.76 with commit 71024928b3f7
Issue introduced in 4.11 with commit 3289025aedc0 and fixed in 6.6.15 with commit 7a73190ea557
Issue introduced in 4.11 with commit 3289025aedc0 and fixed in 6.7.3 with commit 0b787c2dea15
- Issue introduced in 4.11 with commit 3289025aedc0 and fixed in 6.8-rc2 with commit 13e788deb734
+ Issue introduced in 4.11 with commit 3289025aedc0 and fixed in 6.8 with commit 13e788deb734
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26614.json b/cve/published/2024/CVE-2024-26614.json
index 9adf3410..a7cdcc7f 100644
--- a/cve/published/2024/CVE-2024-26614.json
+++ b/cve/published/2024/CVE-2024-26614.json
@@ -102,7 +102,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc2",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -132,14 +132,14 @@
],
"title": "tcp: make sure init the accept_queue's spinlocks once",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2024-26614",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26614.mbox b/cve/published/2024/CVE-2024-26614.mbox
index 5e32c35d..34c76242 100644
--- a/cve/published/2024/CVE-2024-26614.mbox
+++ b/cve/published/2024/CVE-2024-26614.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26614: tcp: make sure init the accept_queue's spinlocks once
-X-Developer-Signature: v=1; a=openpgp-sha256; l=7092; i=lee@kernel.org;
- h=from:subject; bh=Dsgo42JDu5w+7e3Ivh9EVB+Tn55xUX1bLvJdZ0RKfw0=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhPhrkyxSV/IeRi5B1cVplzDE+97oRCsWXfj
- 3mz+kGI/yaJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoTwAKCRBRr4ovh/x3
- YVdnD/40vbUIVTsqSBUX/USB9N/BVENpj38GZsONTjyOi5yDuBu+kKS2/adF2gcWV9npKbMgBuR
- R3POJGMLgTig4JNF2/dOSQ7DvjjPFEG+Yj4xmi1OMFr4tKzkydHgpC5Jol/C8eoHMGVs0uPeOzT
- +U4WK0nEmE75G8JmEfJAePT3TiDrXTUYeabRgkLcYH9MtkwgYpQlch5E8YmTVHZtZPlX5uiXY63
- C3Y2ZL46vjF3AGrryj7cB/mewI1yBVdyKXTcJ//sgUYoHjbduNTufH6W9tZvgebG7cNUA2BGSd7
- LHl1Pb6KoGaGxPSjtT1eS1lj57cDtF7BZTY45j3zHPODl8UGrydJ5eRKALki4oUyvnZ80kfO+OR
- LUYNAVajGb+AwUZpIpI5dfeNxFWkjMNmf8uAwi7GlXaWV032SzX5rEIdV+6agboDtAnSYa/4ADJ
- RL8yUxTMH7nRUam9sdsdGLXBMKvj7ep88UBcTqoj10KvmS0xpKnISFE5dpqYNiwx8GrjZprqDrQ
- 7eBq8Nuj0mf/nYn8Ax6vECgvFttXRH1dbl2UceH1dWkMbjCWQ892GdhIn57rfj/SvBcTbC9mEHF
- Zf53YkpoW6vTe/O/dfbGVQ6tgCArc948wximzB2UKY8lX03uA4JTdGmpv8HW+Cyfw2/9mIz8PTg
- 6Uj/A8CezhelizQ==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -121,7 +105,7 @@ Affected and fixed versions
Issue introduced in 3.7 with commit 168a8f58059a and fixed in 6.1.76 with commit b1e0a68a0cd2
Issue introduced in 3.7 with commit 168a8f58059a and fixed in 6.6.15 with commit 168e7e599860
Issue introduced in 3.7 with commit 168a8f58059a and fixed in 6.7.3 with commit 3982fe726a63
- Issue introduced in 3.7 with commit 168a8f58059a and fixed in 6.8-rc2 with commit 198bc90e0e73
+ Issue introduced in 3.7 with commit 168a8f58059a and fixed in 6.8 with commit 198bc90e0e73
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26615.json b/cve/published/2024/CVE-2024-26615.json
index 093eb414..9e911d46 100644
--- a/cve/published/2024/CVE-2024-26615.json
+++ b/cve/published/2024/CVE-2024-26615.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc2",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,14 +162,14 @@
],
"title": "net/smc: fix illegal rmb_desc access in SMC-D connection dump",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2024-26615",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26615.mbox b/cve/published/2024/CVE-2024-26615.mbox
index c02d4958..3cdba771 100644
--- a/cve/published/2024/CVE-2024-26615.mbox
+++ b/cve/published/2024/CVE-2024-26615.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4552; i=lee@kernel.org;
- h=from:subject; bh=0GjNOAtATg6sp5jnoB7i6G2HjOhC5tcFGea1/9rmIsk=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhQFC1YANkBgvPaBGDs18KRG6jA2Ghs6AH9D
- Y2bLEesdjyJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoUAAKCRBRr4ovh/x3
- YR/PEACdB66K0yJ88KEYW8SwLmb05sC5njz9+FzY4evDDUIHFnlGa/kXSrerp4qM2P0whlajwc+
- ToEPG1BlkXXgdgytyCcM0NACmGqeA+RW0ZJpih6hWPGgjErh/+Z0vzQCIMKABipVERo+hJW+f1g
- JQ5HMANMKKUYqz7HFSD8+8GLcQV3+t6GZ33ZFYsgs6NdCgwKNBoMeGlKgGAncnMqy28TKG6oZfT
- URPxXqZt0JKwTMimX25DlF2+w4mODJEtQW9aXgQnr1NV2sc3iS7iHnr8Uw5ra14kGF7eN2QlQK4
- 0N6L0/g+3owK8b9Ju59flgh52gsCv4HUS+kcR04JryPylpEfhZxVRImi04VGh0nTZFQIe7lm4Tq
- GQS4Po1x0ZWC8ycaU1yAYgAORxJYf0A9lPxzxd6V8ZNyPRuQqFRmYZePQMgxOVt5sfvckzEfabm
- h63plqMAWUPEeU+8rqagzyEGQlAB2RSh0xGZudhe9Y8p8+MWrQdBdos1YYQAMAkR5VjG0CB+V+W
- 3SiOl7FwyNwEiUK8SR37J43ogbm153xL4uByHYReWaytntgwXpQK2kcX1Mq17imvYPiirRgExrJ
- wBBl0XjOsJ5j2+wVJWzJ7p7Kgfr4/s/fHVcGjpdKKdevds1bv9uI3GxwQnCFBA24IPU/wGik9se
- YeduJ3bQXVUNN1w==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -92,7 +76,7 @@ Affected and fixed versions
Issue introduced in 4.19 with commit 4b1b7d3b30a6 and fixed in 6.1.76 with commit 6994dba06321
Issue introduced in 4.19 with commit 4b1b7d3b30a6 and fixed in 6.6.15 with commit a164c2922675
Issue introduced in 4.19 with commit 4b1b7d3b30a6 and fixed in 6.7.3 with commit 8f3f9186e5bb
- Issue introduced in 4.19 with commit 4b1b7d3b30a6 and fixed in 6.8-rc2 with commit dbc153fd3c14
+ Issue introduced in 4.19 with commit 4b1b7d3b30a6 and fixed in 6.8 with commit dbc153fd3c14
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26616.json b/cve/published/2024/CVE-2024-26616.json
index aa87aed3..ce6f445a 100644
--- a/cve/published/2024/CVE-2024-26616.json
+++ b/cve/published/2024/CVE-2024-26616.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc2",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,14 +87,14 @@
],
"title": "btrfs: scrub: avoid use-after-free when chunk length is not 64K aligned",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2024-26616",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26616.mbox b/cve/published/2024/CVE-2024-26616.mbox
index 01c8bd92..6ccc8f5f 100644
--- a/cve/published/2024/CVE-2024-26616.mbox
+++ b/cve/published/2024/CVE-2024-26616.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26616: btrfs: scrub: avoid use-after-free when chunk length is not 64K aligned
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5187; i=lee@kernel.org;
- h=from:subject; bh=HYGTiJ+rvc0XTvLJWE3w8jIS5ed1bXIgW0MrBhhyNq4=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhQm61mE3Cvp9XcJqeVU+ms9qe0bu2EaxJDA
- SNG98kJC2iJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoUAAKCRBRr4ovh/x3
- Yc/2D/4oUcomCYZHqDxEt8nHtZH3EW5DIomXYpW+4Vtmd8sYdDN7wWX8qk+qWeGQaQM0UpXnpxJ
- QQxY29Lg4OGhGViq470q+4Fuv1caX5SYk2eqaNGHdkmoC33S+zGZvSeFKtYS/o6Tg5ljMcsC0PU
- 6/TckZ/CuQHfPt6RvaaNUnp1BvQYoOUontP06Yt49VIacwdRSb+rRzVAubVuG4yTDq36ee8x07K
- J6/IphysGOa4fLs4BH+w3u2gRqh6FyKBuaE4PHsZJ1Vj06qQJLB1dapGztA0iBkGpQaE9/+BfIw
- qZ6RRb0OrjOSAe4QpIw5Y8VnJF88htdQUSYAV3xz75oKxXl/yhPaFdQpC+jesZWj3enEiXJjxqb
- MOBz5MXDLwOUeOyWRtxiymuzNLlwb4P2fkxs7NzneK9hzDcsMyrZBN0yqlkZ++iOnz4+Y3OhxT0
- V2J4nPnQFnLH6sCyPnYADAJkkGm/Vbvit/U2EvJaLpposmPOdtb6v5modNV1sf4ejjMx8RBxPw+
- OC2pXVt0pf6Nd0Muu0PbNdMINrNXRFUByR8zDthrc5e9wiBolV93hLLYRLjDVGEkvkBVFr4biQI
- QXv98tmLa84pTwqLXSCxVd+XYkjwN59QT6Rjy+7/6c3tt3+HDOdwWVOrEdaY2ZMVGtO5rjgmo0B
- 4y3KOU7qWnABlQQ==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -111,7 +95,7 @@ Affected and fixed versions
Issue introduced in 6.4 with commit e02ee89baa66 and fixed in 6.6.15 with commit 642b9c520ef2
Issue introduced in 6.4 with commit e02ee89baa66 and fixed in 6.7.3 with commit 34de0f04684e
- Issue introduced in 6.4 with commit e02ee89baa66 and fixed in 6.8-rc2 with commit f546c4282673
+ Issue introduced in 6.4 with commit e02ee89baa66 and fixed in 6.8 with commit f546c4282673
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26617.json b/cve/published/2024/CVE-2024-26617.json
index be536536..6436edb4 100644
--- a/cve/published/2024/CVE-2024-26617.json
+++ b/cve/published/2024/CVE-2024-26617.json
@@ -54,7 +54,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -72,14 +72,14 @@
],
"title": "fs/proc/task_mmu: move mmu notification mechanism inside mm lock",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2024-26617",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26617.mbox b/cve/published/2024/CVE-2024-26617.mbox
index 6d2a6dab..e84f3301 100644
--- a/cve/published/2024/CVE-2024-26617.mbox
+++ b/cve/published/2024/CVE-2024-26617.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26617: fs/proc/task_mmu: move mmu notification mechanism inside mm lock
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2317; i=lee@kernel.org;
- h=from:subject; bh=GCsn1+fuKMfHYvFbsIdEEddx7PBnjJfLeD+tphSuy7Q=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhQgcpv1eytiOeAXOEjpCe+3xeeR6sWanyWu
- RwdSAIUpS2JAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoUAAKCRBRr4ovh/x3
- Ya7iD/9zAgmqjbG9vgmU9pIAXZodaHnCubntFSkNWffVcjwO5nS7kmnGE3E/+FtPUmvCu9M38CL
- QF9GHuQnlAemkry66gRL2F3zKrMyWEuLQDjTR0VWH9hWB4FQlZ4rkXsrnGN4d9zhcfm8lv2yg4i
- 2g5WurECJc8OO/kFG8mzOWld1kywX57Z5iI1AinGvAAp6KpBwoeYu/+ToloCJj7xKF+KEiIEc3c
- LIqIiR8nnvRfBbS3d8/5d/7ux6vY9rsPQIDNRky+d4Fx9TWWVLCmHqHVbzPAJ6y7Q1KSJ1vxl7P
- 6RASXBBMpGX8K2150dwUumgD24xOIw8aQ2YEhQx3CJkJTCHaHBYg770u1kn2Zl5o0n5PNw1IwAE
- ua0IoQFqnthf1Hy4rtCFf7I5VZIDUDQUvlvZWHV0FaRBa31z8ocbPzq213Yy9YrxAhxKvp04odK
- lnMpISiUl9AxEr+aw700HnHYwW0hPvTKbObH966JNhcSA6o+TsQJW+ucVrRMn4B0eChjKqCZicR
- DvIJE2F+Sm+xz0NxjzWN3MRyv1tufDmjVuoDZSSj/AjCmJeujnShbWYLz6TkBG/wuth2gEb4juB
- Clmwe69Y5VpHHk2x6HVJ7fknlQAIopeM9Y950iqXcCToDcQWIQG8gpN7AAJ27+mmuqXI3gq/rCN
- 9V2N0RET9C0P17g==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -47,7 +31,7 @@ Affected and fixed versions
===========================
Issue introduced in 6.7 with commit 52526ca7fdb9 and fixed in 6.7.3 with commit 05509adf2979
- Issue introduced in 6.7 with commit 52526ca7fdb9 and fixed in 6.8-rc1 with commit 4cccb6221cae
+ Issue introduced in 6.7 with commit 52526ca7fdb9 and fixed in 6.8 with commit 4cccb6221cae
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26618.json b/cve/published/2024/CVE-2024-26618.json
index f8ad1b4d..e93c0e1b 100644
--- a/cve/published/2024/CVE-2024-26618.json
+++ b/cve/published/2024/CVE-2024-26618.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,14 +87,14 @@
],
"title": "arm64/sme: Always exit sme_alloc() early with existing storage",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2024-26618",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26618.mbox b/cve/published/2024/CVE-2024-26618.mbox
index 167de173..9f82e768 100644
--- a/cve/published/2024/CVE-2024-26618.mbox
+++ b/cve/published/2024/CVE-2024-26618.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26618: arm64/sme: Always exit sme_alloc() early with existing storage
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2195; i=lee@kernel.org;
- h=from:subject; bh=+Fg6Kg5MC6YqOF8zgxTAlNQt3vaALYVhaAe99dpPUvc=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhQeCD/t/QEuuREvDAo9CfCV231YxO882CWe
- cLkBvSldpqJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoUAAKCRBRr4ovh/x3
- Yan8D/4raWb609zI+mpfMX3UsWbT8a6Y1yRUn68D/1z2cr+AdXhV4RXzBViIbPcFzPIA/QPv6oR
- ioEmnsWRjWNYJeOWFHlWy+6vt9mhSAdPtHDbLgyWLCTzIXUezKAVrbnENjXe/YsXVKpwuhk+726
- 9LLRc27s2wifNs9Fwc/YKY1+mnSsOW3CEyev8+SjvnQWbQGZBfPfVsTuDtRWZfVSJ5kTmOqNcAd
- CGk2Y7/qBqAp7DNT2ZjBfl8i+zZOErN2kxvcaiUkAhxOv3/l76RXUiqbidbBUfdQJDjqalXQMN3
- Sru8hXF57O6t7bXIO1Qq0eqTEUDgpbhBRyD8GySF8C1pFtw/nSpcXd2seF9lG5e5p1kRT2Ps7L4
- Vep8LVT0VAoLOT0B4CMadYNFEanVGpdViIuwqb4WmHZQ/Ar8vlWRTjp47Mx5HgX6jhphVd+K640
- TmCpKHZhJmLNnRKEvQwxMhrGYXwdZRFD4/3gA/Pdxh3QBZrVq1MKjU1heEhiK8arEK6nx0a61/Z
- LWd4WBxZOsNkcPy39n5sS8RpqJNFB0WJnJ0XSTpes81fcaVcLZVJOSrg5KH9TL/nj25iX8AfPPM
- NxUxaNam0XfGLH/0L8hDYGP7G1KcmloFke/4EFMZ3CY3D1Fbrodrmp5DWCtC6reQA/E9PTn5FR5
- 5y7aiLwk5HVmovw==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -43,7 +27,7 @@ Affected and fixed versions
Issue introduced in 6.5 with commit 5d0a8d2fba50 and fixed in 6.6.15 with commit 569156e4fa34
Issue introduced in 6.5 with commit 5d0a8d2fba50 and fixed in 6.7.3 with commit 814af6b4e600
- Issue introduced in 6.5 with commit 5d0a8d2fba50 and fixed in 6.8-rc1 with commit dc7eb8755797
+ Issue introduced in 6.5 with commit 5d0a8d2fba50 and fixed in 6.8 with commit dc7eb8755797
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26619.json b/cve/published/2024/CVE-2024-26619.json
index 4f757f01..ca165ede 100644
--- a/cve/published/2024/CVE-2024-26619.json
+++ b/cve/published/2024/CVE-2024-26619.json
@@ -54,7 +54,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -72,14 +72,14 @@
],
"title": "riscv: Fix module loading free order",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2024-26619",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26619.mbox b/cve/published/2024/CVE-2024-26619.mbox
index 27a7c8ba..ed8f3fb5 100644
--- a/cve/published/2024/CVE-2024-26619.mbox
+++ b/cve/published/2024/CVE-2024-26619.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26619: riscv: Fix module loading free order
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1694; i=lee@kernel.org;
- h=from:subject; bh=+wNRRr7LA9bNKofwQOj5I9DhV1s/4EfeEYQuoZlMWjQ=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhQIbD96R2/UVuvKR5yx8pv9rl7If16tRmlt
- mLHYC9pB6eJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoUAAKCRBRr4ovh/x3
- YSdsD/sHueASwlCClvH3S0JTFZNehd8G/5Pf2nKTezburLGHSe3eYMCB345fGjO6JtgVnRgjLl8
- /o0nsUlldIUsGmiIcius91Ha4Pgt21g5O4zjUN7RqGdmgTRRKnT8K5AOwzYdzFZBDgNtkWBNtxd
- GPP/ntpsh50oAinDAzy7hjXKGJ4ho3mjYcwq6ZV2Higw63TujVDF8fDmk++dxITB8QSoz3Ay9Vn
- PXkKtQaXS0m6VG5G+nLG15z2dXe9Hy2HfX0kCT9rIdGr0UMIazIPGn/ddBtkwgHxqrqGkVUEY08
- 26S2Yu258dmCXsnqknlKUXTcnwicVL8I2tiqOiWV9DYIkqxN8vwm10GAtod7hMXbmOpwke/L8+Q
- jVfnNLS5GEWZj1aXG+OLM35M83zGBcFMofckMiGgCQWsT0foHUdQbJIlHqccjj2d3M/hE+uFIMw
- fhiGmN5nskjFof6o78N1TJURVOl8TXfEgsFnz/o5JNJbFTIxMkj3ZPWasI+BOJYtjQQeYQIIbhu
- PmiC/+igxDc9lFmn5Llf4Yw9RL9rHOsl634uKLsdOxJalexkBSETCRiAE9aBP7knLrRWgdDxHH6
- 2AfHexOCQet69XgC2J3+MzxWLjJu+TVV3PQEs5hktm/fnJ01zzJjaZo4vjkuOZ5AZc4XLAsZj5i
- ExL1oSvoYQQWtZQ==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -36,7 +20,7 @@ Affected and fixed versions
===========================
Issue introduced in 6.7 with commit d8792a5734b0 and fixed in 6.7.3 with commit 2fa79badf4bf
- Issue introduced in 6.7 with commit d8792a5734b0 and fixed in 6.8-rc1 with commit 78996eee79eb
+ Issue introduced in 6.7 with commit d8792a5734b0 and fixed in 6.8 with commit 78996eee79eb
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26620.json b/cve/published/2024/CVE-2024-26620.json
index e17ba4f0..94cf9e2e 100644
--- a/cve/published/2024/CVE-2024-26620.json
+++ b/cve/published/2024/CVE-2024-26620.json
@@ -78,7 +78,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -102,14 +102,14 @@
],
"title": "s390/vfio-ap: always filter entire AP matrix",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2024-26620",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26620.mbox b/cve/published/2024/CVE-2024-26620.mbox
index 7b4e7915..3b2e818a 100644
--- a/cve/published/2024/CVE-2024-26620.mbox
+++ b/cve/published/2024/CVE-2024-26620.mbox
@@ -1,24 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26620: s390/vfio-ap: always filter entire AP matrix
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3682; i=lee@kernel.org;
- h=from:subject; bh=rgm0wOSdI+rQsyx14YZBjkDdVtSQtTBrtN++sFC+4tI=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl4KhQTUq76nSLPTylP6vOWqK3A/NXi2TkfWqzo
- 8gNYHnq+WiJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZeCoUAAKCRBRr4ovh/x3
- YWDoD/4hwfMaZXyPTfrb+SS2urr15G3l0/bUOq2EYpnqOCaFc0mqEzfRF74fGMxVU8XoFKOUoLH
- bGhZXBOmqvdezQgBSk3OwE0QKJOyRfJLnKggsJ2Em0ZArkR5sOSr4GZvqXaYlQYt5IstAyp3muW
- HbyaQA5i51pwdGYVqPcZzEF4FIy+Zc4oTaarq+T9rftG0b7QDdyDw68tgHHIwuFCVdWsap0TkC1
- nEZ7OW4G/BPvWHzQUYpZOMtZN+emETOcJxvAa0+pr1hM2Sbos8AcZxULolcVAlIK0ft1gUrxf3d
- CP+0tMleNJ/nDcsZ85DvKi8ZfuKQiPbCFIE77XRTK/bNrTxN26r8gHvws8L6ynII1shivZEiKyL
- ueowFUTlGh9JFpBIH68F0cHaV8YYg1IzW9RzHwxOFnOtLD7OwXPM4pxylUgw0vvBsXfT42gwlRt
- 910uK6nV+Grap9xWguUMpZQLSQdW/k0FgnxOqQ1QWQuj1jLDUkl/gBj81jfnlwKbEcE1FwltYYh
- EpqAS09oK1NBD0LT+IgBudaxRWlxis2WY5cXH5wBEO3+qSVqX9jYQh+zERCfxlquroM6m7dBnql
- 0H+e5mrohEB5/YAsWpfrR2MtbwXWWnaFC7oyFle+QCaLgkVnn+zx19Wyq4uvQrTAuckVbBWBYF5
- 0WYPTryLyPTTGYw==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -77,7 +61,7 @@ Affected and fixed versions
Issue introduced in 6.0 with commit 48cae940c31d and fixed in 6.1.76 with commit d6b8d034b576
Issue introduced in 6.0 with commit 48cae940c31d and fixed in 6.6.15 with commit c69d82119761
Issue introduced in 6.0 with commit 48cae940c31d and fixed in 6.7.3 with commit cdd134d56138
- Issue introduced in 6.0 with commit 48cae940c31d and fixed in 6.8-rc1 with commit 850fb7fa8c68
+ Issue introduced in 6.0 with commit 48cae940c31d and fixed in 6.8 with commit 850fb7fa8c68
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26621.json b/cve/published/2024/CVE-2024-26621.json
index e01087e0..dc72ecb8 100644
--- a/cve/published/2024/CVE-2024-26621.json
+++ b/cve/published/2024/CVE-2024-26621.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc3",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "mm: huge_memory: don't force huge page alignment on 32 bit",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26621.mbox b/cve/published/2024/CVE-2024-26621.mbox
index 86156434..51a188ba 100644
--- a/cve/published/2024/CVE-2024-26621.mbox
+++ b/cve/published/2024/CVE-2024-26621.mbox
@@ -1,4 +1,4 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -29,7 +29,7 @@ Affected and fixed versions
Issue introduced in 5.18 with commit 1854bc6e2420 and fixed in 6.1.81 with commit 87632bc9ecff
Issue introduced in 5.18 with commit 1854bc6e2420 and fixed in 6.7.6 with commit 7432376c9133
- Issue introduced in 5.18 with commit 1854bc6e2420 and fixed in 6.8-rc3 with commit 4ef9ad19e176
+ Issue introduced in 5.18 with commit 1854bc6e2420 and fixed in 6.8 with commit 4ef9ad19e176
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26622.json b/cve/published/2024/CVE-2024-26622.json
index d2f85f0f..a551d465 100644
--- a/cve/published/2024/CVE-2024-26622.json
+++ b/cve/published/2024/CVE-2024-26622.json
@@ -102,7 +102,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc7",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -132,7 +132,7 @@
],
"title": "tomoyo: fix UAF write bug in tomoyo_write_control()",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26622.mbox b/cve/published/2024/CVE-2024-26622.mbox
index be48aa6e..767842ce 100644
--- a/cve/published/2024/CVE-2024-26622.mbox
+++ b/cve/published/2024/CVE-2024-26622.mbox
@@ -1,4 +1,4 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -27,7 +27,7 @@ Affected and fixed versions
Issue introduced in 3.1 with commit bd03a3e4c9a9 and fixed in 6.1.81 with commit 3bfe04c1273d
Issue introduced in 3.1 with commit bd03a3e4c9a9 and fixed in 6.6.21 with commit 2caa60507948
Issue introduced in 3.1 with commit bd03a3e4c9a9 and fixed in 6.7.9 with commit 6edefe1b6c29
- Issue introduced in 3.1 with commit bd03a3e4c9a9 and fixed in 6.8-rc7 with commit 2f03fc340cac
+ Issue introduced in 3.1 with commit bd03a3e4c9a9 and fixed in 6.8 with commit 2f03fc340cac
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26623.json b/cve/published/2024/CVE-2024-26623.json
index 2261b2dc..f1223098 100644
--- a/cve/published/2024/CVE-2024-26623.json
+++ b/cve/published/2024/CVE-2024-26623.json
@@ -66,7 +66,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc3",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -87,7 +87,7 @@
],
"title": "pds_core: Prevent race issues involving the adminq",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26623.mbox b/cve/published/2024/CVE-2024-26623.mbox
index f6d8c7b0..6d1b6f22 100644
--- a/cve/published/2024/CVE-2024-26623.mbox
+++ b/cve/published/2024/CVE-2024-26623.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26623: pds_core: Prevent race issues involving the adminq
-Message-Id: <2024030648-CVE-2024-26623-ee77@gregkh>
-Content-Length: 3422
-Lines: 85
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3508;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=vYiT4ENDZ9LNLfggE+K3SSbt5v6NuQ7cfgnwdnnLy4I=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBGW+7r151vH5l91xdbJpAa7hC2ulfxj1SC/qCJ9yT
- f7Bz47ujlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjIhmcMCyZp7Dqqd2r5/v8R
- gYVvz9ZxNLZfY2WYK7bH/lZffGz95ZeSRb86rGb9jGfRAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -66,7 +55,7 @@ Affected and fixed versions
Issue introduced in 6.4 with commit 01ba61b55b20 and fixed in 6.6.16 with commit 22cd6046eb21
Issue introduced in 6.4 with commit 01ba61b55b20 and fixed in 6.7.4 with commit 5939feb63ea1
- Issue introduced in 6.4 with commit 01ba61b55b20 and fixed in 6.8-rc3 with commit 7e82a8745b95
+ Issue introduced in 6.4 with commit 01ba61b55b20 and fixed in 6.8 with commit 7e82a8745b95
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26624.json b/cve/published/2024/CVE-2024-26624.json
index 05674b12..4196ae48 100644
--- a/cve/published/2024/CVE-2024-26624.json
+++ b/cve/published/2024/CVE-2024-26624.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc3",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,7 +162,7 @@
],
"title": "af_unix: fix lockdep positive in sk_diag_dump_icons()",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26624.mbox b/cve/published/2024/CVE-2024-26624.mbox
index 3df9e064..442774c8 100644
--- a/cve/published/2024/CVE-2024-26624.mbox
+++ b/cve/published/2024/CVE-2024-26624.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26624: af_unix: fix lockdep positive in sk_diag_dump_icons()
-Message-Id: <2024030648-CVE-2024-26624-3032@gregkh>
-Content-Length: 8933
-Lines: 194
-X-Developer-Signature: v=1; a=openpgp-sha256; l=9128;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=IR/flDipyjjN7Fgo2XKew/SzSxrT9DMN7y9xvG2kWTI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBGX6VBd5F7z/tULb/Y59/8Kom57eC+JPiy762dHWH
- bxg0QK+jlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjIhYUMc8WMT4Y2C/nKzBe6
- 4L9E1PpP+rWgXwwL9qvOqnm2MdQg5uP12o3GH7Oum6q9AQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -170,7 +159,7 @@ Affected and fixed versions
Issue introduced in 3.3 with commit 2aac7a2cb0d9 and fixed in 6.1.77 with commit a2104f438764
Issue introduced in 3.3 with commit 2aac7a2cb0d9 and fixed in 6.6.16 with commit 5e7f3e0381c0
Issue introduced in 3.3 with commit 2aac7a2cb0d9 and fixed in 6.7.4 with commit c2d272a9a1e8
- Issue introduced in 3.3 with commit 2aac7a2cb0d9 and fixed in 6.8-rc3 with commit 4d322dce82a1
+ Issue introduced in 3.3 with commit 2aac7a2cb0d9 and fixed in 6.8 with commit 4d322dce82a1
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26625.json b/cve/published/2024/CVE-2024-26625.json
index 0234531c..7a21efe1 100644
--- a/cve/published/2024/CVE-2024-26625.json
+++ b/cve/published/2024/CVE-2024-26625.json
@@ -126,7 +126,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc3",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -162,7 +162,7 @@
],
"title": "llc: call sock_orphan() at release time",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26625.mbox b/cve/published/2024/CVE-2024-26625.mbox
index 645c7e05..d97ce0ab 100644
--- a/cve/published/2024/CVE-2024-26625.mbox
+++ b/cve/published/2024/CVE-2024-26625.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26625: llc: call sock_orphan() at release time
-Message-Id: <2024030648-CVE-2024-26625-3549@gregkh>
-Content-Length: 10673
-Lines: 224
-X-Developer-Signature: v=1; a=openpgp-sha256; l=10898;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=QJdQ7Lz71XPyX6mB1g2OJ0LnMS7PZDonXL3hrsLJ7J0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBGUMf99yCFsw4+01v6PlC0z5/O857X9iWmrbLaKV9
- Tv0bo5YRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzE8DPDgoOJgvNFrh1Xi2NS
- OBN5v+H3glX3pjPMzzY70a010SNg79b0VVG875accWLLAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -202,7 +191,7 @@ Affected and fixed versions
Issue introduced in 2.6.35 with commit 43815482370c and fixed in 6.1.77 with commit 9c333d9891f3
Issue introduced in 2.6.35 with commit 43815482370c and fixed in 6.6.16 with commit 3151051b787f
Issue introduced in 2.6.35 with commit 43815482370c and fixed in 6.7.4 with commit 8e51f084b571
- Issue introduced in 2.6.35 with commit 43815482370c and fixed in 6.8-rc3 with commit aa2b2eb39348
+ Issue introduced in 2.6.35 with commit 43815482370c and fixed in 6.8 with commit aa2b2eb39348
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26627.json b/cve/published/2024/CVE-2024-26627.json
index 5103f5f4..5d613637 100644
--- a/cve/published/2024/CVE-2024-26627.json
+++ b/cve/published/2024/CVE-2024-26627.json
@@ -102,7 +102,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc3",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -132,7 +132,7 @@
],
"title": "scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26627.mbox b/cve/published/2024/CVE-2024-26627.mbox
index 8fabc9b9..2df99ea7 100644
--- a/cve/published/2024/CVE-2024-26627.mbox
+++ b/cve/published/2024/CVE-2024-26627.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26627: scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler
-Message-Id: <2024030648-CVE-2024-26627-e3a2@gregkh>
-Content-Length: 3342
-Lines: 80
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3423;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=vX8XUXxxK22yIALT2R8BH9LybpjMPZXROgwcyxpAR+w=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBGUmb2oQ7sgtNlHTupDznUvIp+dbutDWjY8dbjmYu
- J9Xkd3fEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABPJrmCYX7Goh3Pf/F0xLlKc
- qVbPsyy8tj75xzCHd2rCbq7UNSl7P705sFg9vaH/UpMLAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -58,7 +47,7 @@ Affected and fixed versions
Issue introduced in 5.5 with commit 6eb045e092ef and fixed in 6.1.77 with commit db6338f45971
Issue introduced in 5.5 with commit 6eb045e092ef and fixed in 6.6.16 with commit 65ead8468c21
Issue introduced in 5.5 with commit 6eb045e092ef and fixed in 6.7.4 with commit 07e3ca0f17f5
- Issue introduced in 5.5 with commit 6eb045e092ef and fixed in 6.8-rc3 with commit 4373534a9850
+ Issue introduced in 5.5 with commit 6eb045e092ef and fixed in 6.8 with commit 4373534a9850
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.
diff --git a/cve/published/2024/CVE-2024-26628.json b/cve/published/2024/CVE-2024-26628.json
index 8a582194..55d16106 100644
--- a/cve/published/2024/CVE-2024-26628.json
+++ b/cve/published/2024/CVE-2024-26628.json
@@ -80,7 +80,7 @@
"versionType": "custom"
},
{
- "version": "6.8-rc1",
+ "version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
@@ -107,7 +107,7 @@
],
"title": "drm/amdkfd: Fix lock dependency warning",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-8df59b4913de"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26628.mbox b/cve/published/2024/CVE-2024-26628.mbox
index 5060df9e..6a08d473 100644
--- a/cve/published/2024/CVE-2024-26628.mbox
+++ b/cve/published/2024/CVE-2024-26628.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26628: drm/amdkfd: Fix lock dependency warning
-Message-Id: <2024030649-CVE-2024-26628-f6ce@gregkh>
-Content-Length: 4595
-Lines: 124
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4720;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=j52VRwwOSDVFllWfh2lfDtZO3l+3HyHaVZc8jtWYZiQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBGVfTXzbtKFH287p0nPppV+E385KX1d5533i0/Utf
- oxqvI8lOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiWxYzzNPiqg7ZKHHXXvOb
- +om+x6Jq907e+M8wPzdh531fdXmNCuO/e4vfh018/qpaAQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -105,7 +94,7 @@ Affected and fixed versions
Fixed in 6.1.77 with commit 8b25d397162b
Fixed in 6.6.16 with commit 28d2d623d2fb
Fixed in 6.7.4 with commit cb96e492d72d
- Fixed in 6.8-rc1 with commit 47bf0f83fc86
+ Fixed in 6.8 with commit 47bf0f83fc86
Please see https://www.kernel.org or a full list of currently supported
kernel versions by the kernel community.