aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-02-12 19:35:52 +0100
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-02-12 19:35:52 +0100
commit3332363069be9b425ed85e0990e3e785de382bc7 (patch)
treee60ce3e88d58eed1ad24ef4442d0983a60ee61f7
parent28742e2d005443ff7fa9d405301f8208d6fa8a67 (diff)
downloadvulns-3332363069be9b425ed85e0990e3e785de382bc7.tar.gz
updated cve entries based on fixes in bippy
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--cve/published/2021/CVE-2021-47181.json8
-rw-r--r--cve/published/2021/CVE-2021-47181.mbox4
-rw-r--r--cve/published/2023/CVE-2023-1851.json2
-rw-r--r--cve/published/2023/CVE-2023-1851.mbox3
-rw-r--r--cve/published/2023/CVE-2023-21657.json2
-rw-r--r--cve/published/2023/CVE-2023-21657.mbox3
-rw-r--r--cve/published/2023/CVE-2023-21658.json2
-rw-r--r--cve/published/2023/CVE-2023-21658.mbox3
-rw-r--r--cve/published/2023/CVE-2023-21659.json2
-rw-r--r--cve/published/2023/CVE-2023-21659.mbox3
-rw-r--r--cve/published/2024/CVE-2024-0052.json2
-rw-r--r--cve/published/2024/CVE-2024-0052.mbox3
-rw-r--r--cve/published/2024/CVE-2024-20607.json8
-rw-r--r--cve/published/2024/CVE-2024-20607.mbox4
14 files changed, 21 insertions, 28 deletions
diff --git a/cve/published/2021/CVE-2021-47181.json b/cve/published/2021/CVE-2021-47181.json
index f56fb23f..487ae1a6 100644
--- a/cve/published/2021/CVE-2021-47181.json
+++ b/cve/published/2021/CVE-2021-47181.json
@@ -57,12 +57,6 @@
"lessThan": "5.15.11",
"status": "affected",
"versionType": "custom"
- },
- {
- "version": "4.4.295",
- "lessThan": "5.16",
- "status": "affected",
- "versionType": "custom"
}
]
}
@@ -74,7 +68,7 @@
],
"title": "USB: gadget: bRequestType is a bitfield, not a enum",
"x_generator": {
- "engine": "bippy-8e45bd7fd5ec"
+ "engine": "bippy-0e8e3772d16e"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47181.mbox b/cve/published/2021/CVE-2021-47181.mbox
index 2d28d3b9..1fd41ab6 100644
--- a/cve/published/2021/CVE-2021-47181.mbox
+++ b/cve/published/2021/CVE-2021-47181.mbox
@@ -1,4 +1,5 @@
-From: Linux Kernel CVE team <cve@kernel.org>
+To: <linux-cve-announce@vger.kernel.org>
+Reply-to: <cve@kernel.org>
Subject: CVE-2021-47181: USB: gadget: bRequestType is a bitfield, not a enum
Description
@@ -33,7 +34,6 @@ Affected versions
Issue introduced in 5.4.165 and fixed in 5.4.168
Issue introduced in 5.10.85 and fixed in 5.10.88
Issue introduced in 5.15.8 and fixed in 5.15.11
- Issue introduced in 4.4.295 and fixed in 5.16
Recomendation
diff --git a/cve/published/2023/CVE-2023-1851.json b/cve/published/2023/CVE-2023-1851.json
index 77cb2f8d..bcac0cf9 100644
--- a/cve/published/2023/CVE-2023-1851.json
+++ b/cve/published/2023/CVE-2023-1851.json
@@ -74,7 +74,7 @@
],
"title": "nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local",
"x_generator": {
- "engine": "bippy-8e45bd7fd5ec"
+ "engine": "bippy-0e8e3772d16e"
}
}
},
diff --git a/cve/published/2023/CVE-2023-1851.mbox b/cve/published/2023/CVE-2023-1851.mbox
index cfd1e031..32c99bc6 100644
--- a/cve/published/2023/CVE-2023-1851.mbox
+++ b/cve/published/2023/CVE-2023-1851.mbox
@@ -1,4 +1,5 @@
-From: Linux Kernel CVE team <cve@kernel.org>
+To: <linux-cve-announce@vger.kernel.org>
+Reply-to: <cve@kernel.org>
Subject: CVE-2023-1851: nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local
Description
diff --git a/cve/published/2023/CVE-2023-21657.json b/cve/published/2023/CVE-2023-21657.json
index 66815f0e..5715edf7 100644
--- a/cve/published/2023/CVE-2023-21657.json
+++ b/cve/published/2023/CVE-2023-21657.json
@@ -68,7 +68,7 @@
],
"title": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace",
"x_generator": {
- "engine": "bippy-8e45bd7fd5ec"
+ "engine": "bippy-0e8e3772d16e"
}
}
},
diff --git a/cve/published/2023/CVE-2023-21657.mbox b/cve/published/2023/CVE-2023-21657.mbox
index 7e58fea5..0cfad306 100644
--- a/cve/published/2023/CVE-2023-21657.mbox
+++ b/cve/published/2023/CVE-2023-21657.mbox
@@ -1,4 +1,5 @@
-From: Linux Kernel CVE team <cve@kernel.org>
+To: <linux-cve-announce@vger.kernel.org>
+Reply-to: <cve@kernel.org>
Subject: CVE-2023-21657: kvm: initialize all of the kvm_debugregs structure before sending it to userspace
Description
diff --git a/cve/published/2023/CVE-2023-21658.json b/cve/published/2023/CVE-2023-21658.json
index 45f8eed2..09c54779 100644
--- a/cve/published/2023/CVE-2023-21658.json
+++ b/cve/published/2023/CVE-2023-21658.json
@@ -74,7 +74,7 @@
],
"title": "memstick: fix memory leak if card device is never registered",
"x_generator": {
- "engine": "bippy-8e45bd7fd5ec"
+ "engine": "bippy-0e8e3772d16e"
}
}
},
diff --git a/cve/published/2023/CVE-2023-21658.mbox b/cve/published/2023/CVE-2023-21658.mbox
index 002b5668..79474e74 100644
--- a/cve/published/2023/CVE-2023-21658.mbox
+++ b/cve/published/2023/CVE-2023-21658.mbox
@@ -1,4 +1,5 @@
-From: Linux Kernel CVE team <cve@kernel.org>
+To: <linux-cve-announce@vger.kernel.org>
+Reply-to: <cve@kernel.org>
Subject: CVE-2023-21658: memstick: fix memory leak if card device is never registered
Description
diff --git a/cve/published/2023/CVE-2023-21659.json b/cve/published/2023/CVE-2023-21659.json
index f7f1a6dc..2b004ed5 100644
--- a/cve/published/2023/CVE-2023-21659.json
+++ b/cve/published/2023/CVE-2023-21659.json
@@ -32,7 +32,7 @@
],
"title": "fs: sysfs_emit_at: Remove PAGE_SIZE alignment check",
"x_generator": {
- "engine": "bippy-8e45bd7fd5ec"
+ "engine": "bippy-0e8e3772d16e"
}
}
},
diff --git a/cve/published/2023/CVE-2023-21659.mbox b/cve/published/2023/CVE-2023-21659.mbox
index 0eaaecbc..622065de 100644
--- a/cve/published/2023/CVE-2023-21659.mbox
+++ b/cve/published/2023/CVE-2023-21659.mbox
@@ -1,4 +1,5 @@
-From: Linux Kernel CVE team <cve@kernel.org>
+To: <linux-cve-announce@vger.kernel.org>
+Reply-to: <cve@kernel.org>
Subject: CVE-2023-21659: fs: sysfs_emit_at: Remove PAGE_SIZE alignment check
Description
diff --git a/cve/published/2024/CVE-2024-0052.json b/cve/published/2024/CVE-2024-0052.json
index ab35c03b..f5c8f35f 100644
--- a/cve/published/2024/CVE-2024-0052.json
+++ b/cve/published/2024/CVE-2024-0052.json
@@ -38,7 +38,7 @@
],
"title": "mm/memory_hotplug: fix memmap_on_memory sysfs value retrieval",
"x_generator": {
- "engine": "bippy-8e45bd7fd5ec"
+ "engine": "bippy-0e8e3772d16e"
}
}
},
diff --git a/cve/published/2024/CVE-2024-0052.mbox b/cve/published/2024/CVE-2024-0052.mbox
index 0e240324..4e37e04a 100644
--- a/cve/published/2024/CVE-2024-0052.mbox
+++ b/cve/published/2024/CVE-2024-0052.mbox
@@ -1,4 +1,5 @@
-From: Linux Kernel CVE team <cve@kernel.org>
+To: <linux-cve-announce@vger.kernel.org>
+Reply-to: <cve@kernel.org>
Subject: CVE-2024-0052: mm/memory_hotplug: fix memmap_on_memory sysfs value retrieval
Description
diff --git a/cve/published/2024/CVE-2024-20607.json b/cve/published/2024/CVE-2024-20607.json
index 59b2e04f..fdc89501 100644
--- a/cve/published/2024/CVE-2024-20607.json
+++ b/cve/published/2024/CVE-2024-20607.json
@@ -17,12 +17,6 @@
"defaultStatus": "affected",
"versions": [
{
- "version": "6.6.16",
- "lessThan": "6.6.16",
- "status": "affected",
- "versionType": "custom"
- },
- {
"version": "6.7",
"lessThan": "6.7.4",
"status": "affected",
@@ -38,7 +32,7 @@
],
"title": "pds_core: Prevent health thread from running during reset/remove",
"x_generator": {
- "engine": "bippy-8e45bd7fd5ec"
+ "engine": "bippy-0e8e3772d16e"
}
}
},
diff --git a/cve/published/2024/CVE-2024-20607.mbox b/cve/published/2024/CVE-2024-20607.mbox
index 1e48453e..10bcfa58 100644
--- a/cve/published/2024/CVE-2024-20607.mbox
+++ b/cve/published/2024/CVE-2024-20607.mbox
@@ -1,4 +1,5 @@
-From: Linux Kernel CVE team <cve@kernel.org>
+To: <linux-cve-announce@vger.kernel.org>
+Reply-to: <cve@kernel.org>
Subject: CVE-2024-20607: pds_core: Prevent health thread from running during reset/remove
Description
@@ -26,7 +27,6 @@ The individual change to resolve this issue can be found at:
Affected versions
=================
- Issue introduced in 6.6.16 and fixed in 6.6.16
Issue introduced in 6.7 and fixed in 6.7.4