diff options
author | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-02-12 19:35:52 +0100 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-02-12 19:35:52 +0100 |
commit | 3332363069be9b425ed85e0990e3e785de382bc7 (patch) | |
tree | e60ce3e88d58eed1ad24ef4442d0983a60ee61f7 | |
parent | 28742e2d005443ff7fa9d405301f8208d6fa8a67 (diff) | |
download | vulns-3332363069be9b425ed85e0990e3e785de382bc7.tar.gz |
updated cve entries based on fixes in bippy
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r-- | cve/published/2021/CVE-2021-47181.json | 8 | ||||
-rw-r--r-- | cve/published/2021/CVE-2021-47181.mbox | 4 | ||||
-rw-r--r-- | cve/published/2023/CVE-2023-1851.json | 2 | ||||
-rw-r--r-- | cve/published/2023/CVE-2023-1851.mbox | 3 | ||||
-rw-r--r-- | cve/published/2023/CVE-2023-21657.json | 2 | ||||
-rw-r--r-- | cve/published/2023/CVE-2023-21657.mbox | 3 | ||||
-rw-r--r-- | cve/published/2023/CVE-2023-21658.json | 2 | ||||
-rw-r--r-- | cve/published/2023/CVE-2023-21658.mbox | 3 | ||||
-rw-r--r-- | cve/published/2023/CVE-2023-21659.json | 2 | ||||
-rw-r--r-- | cve/published/2023/CVE-2023-21659.mbox | 3 | ||||
-rw-r--r-- | cve/published/2024/CVE-2024-0052.json | 2 | ||||
-rw-r--r-- | cve/published/2024/CVE-2024-0052.mbox | 3 | ||||
-rw-r--r-- | cve/published/2024/CVE-2024-20607.json | 8 | ||||
-rw-r--r-- | cve/published/2024/CVE-2024-20607.mbox | 4 |
14 files changed, 21 insertions, 28 deletions
diff --git a/cve/published/2021/CVE-2021-47181.json b/cve/published/2021/CVE-2021-47181.json index f56fb23f..487ae1a6 100644 --- a/cve/published/2021/CVE-2021-47181.json +++ b/cve/published/2021/CVE-2021-47181.json @@ -57,12 +57,6 @@ "lessThan": "5.15.11", "status": "affected", "versionType": "custom" - }, - { - "version": "4.4.295", - "lessThan": "5.16", - "status": "affected", - "versionType": "custom" } ] } @@ -74,7 +68,7 @@ ], "title": "USB: gadget: bRequestType is a bitfield, not a enum", "x_generator": { - "engine": "bippy-8e45bd7fd5ec" + "engine": "bippy-0e8e3772d16e" } } }, diff --git a/cve/published/2021/CVE-2021-47181.mbox b/cve/published/2021/CVE-2021-47181.mbox index 2d28d3b9..1fd41ab6 100644 --- a/cve/published/2021/CVE-2021-47181.mbox +++ b/cve/published/2021/CVE-2021-47181.mbox @@ -1,4 +1,5 @@ -From: Linux Kernel CVE team <cve@kernel.org> +To: <linux-cve-announce@vger.kernel.org> +Reply-to: <cve@kernel.org> Subject: CVE-2021-47181: USB: gadget: bRequestType is a bitfield, not a enum Description @@ -33,7 +34,6 @@ Affected versions Issue introduced in 5.4.165 and fixed in 5.4.168 Issue introduced in 5.10.85 and fixed in 5.10.88 Issue introduced in 5.15.8 and fixed in 5.15.11 - Issue introduced in 4.4.295 and fixed in 5.16 Recomendation diff --git a/cve/published/2023/CVE-2023-1851.json b/cve/published/2023/CVE-2023-1851.json index 77cb2f8d..bcac0cf9 100644 --- a/cve/published/2023/CVE-2023-1851.json +++ b/cve/published/2023/CVE-2023-1851.json @@ -74,7 +74,7 @@ ], "title": "nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local", "x_generator": { - "engine": "bippy-8e45bd7fd5ec" + "engine": "bippy-0e8e3772d16e" } } }, diff --git a/cve/published/2023/CVE-2023-1851.mbox b/cve/published/2023/CVE-2023-1851.mbox index cfd1e031..32c99bc6 100644 --- a/cve/published/2023/CVE-2023-1851.mbox +++ b/cve/published/2023/CVE-2023-1851.mbox @@ -1,4 +1,5 @@ -From: Linux Kernel CVE team <cve@kernel.org> +To: <linux-cve-announce@vger.kernel.org> +Reply-to: <cve@kernel.org> Subject: CVE-2023-1851: nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local Description diff --git a/cve/published/2023/CVE-2023-21657.json b/cve/published/2023/CVE-2023-21657.json index 66815f0e..5715edf7 100644 --- a/cve/published/2023/CVE-2023-21657.json +++ b/cve/published/2023/CVE-2023-21657.json @@ -68,7 +68,7 @@ ], "title": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace", "x_generator": { - "engine": "bippy-8e45bd7fd5ec" + "engine": "bippy-0e8e3772d16e" } } }, diff --git a/cve/published/2023/CVE-2023-21657.mbox b/cve/published/2023/CVE-2023-21657.mbox index 7e58fea5..0cfad306 100644 --- a/cve/published/2023/CVE-2023-21657.mbox +++ b/cve/published/2023/CVE-2023-21657.mbox @@ -1,4 +1,5 @@ -From: Linux Kernel CVE team <cve@kernel.org> +To: <linux-cve-announce@vger.kernel.org> +Reply-to: <cve@kernel.org> Subject: CVE-2023-21657: kvm: initialize all of the kvm_debugregs structure before sending it to userspace Description diff --git a/cve/published/2023/CVE-2023-21658.json b/cve/published/2023/CVE-2023-21658.json index 45f8eed2..09c54779 100644 --- a/cve/published/2023/CVE-2023-21658.json +++ b/cve/published/2023/CVE-2023-21658.json @@ -74,7 +74,7 @@ ], "title": "memstick: fix memory leak if card device is never registered", "x_generator": { - "engine": "bippy-8e45bd7fd5ec" + "engine": "bippy-0e8e3772d16e" } } }, diff --git a/cve/published/2023/CVE-2023-21658.mbox b/cve/published/2023/CVE-2023-21658.mbox index 002b5668..79474e74 100644 --- a/cve/published/2023/CVE-2023-21658.mbox +++ b/cve/published/2023/CVE-2023-21658.mbox @@ -1,4 +1,5 @@ -From: Linux Kernel CVE team <cve@kernel.org> +To: <linux-cve-announce@vger.kernel.org> +Reply-to: <cve@kernel.org> Subject: CVE-2023-21658: memstick: fix memory leak if card device is never registered Description diff --git a/cve/published/2023/CVE-2023-21659.json b/cve/published/2023/CVE-2023-21659.json index f7f1a6dc..2b004ed5 100644 --- a/cve/published/2023/CVE-2023-21659.json +++ b/cve/published/2023/CVE-2023-21659.json @@ -32,7 +32,7 @@ ], "title": "fs: sysfs_emit_at: Remove PAGE_SIZE alignment check", "x_generator": { - "engine": "bippy-8e45bd7fd5ec" + "engine": "bippy-0e8e3772d16e" } } }, diff --git a/cve/published/2023/CVE-2023-21659.mbox b/cve/published/2023/CVE-2023-21659.mbox index 0eaaecbc..622065de 100644 --- a/cve/published/2023/CVE-2023-21659.mbox +++ b/cve/published/2023/CVE-2023-21659.mbox @@ -1,4 +1,5 @@ -From: Linux Kernel CVE team <cve@kernel.org> +To: <linux-cve-announce@vger.kernel.org> +Reply-to: <cve@kernel.org> Subject: CVE-2023-21659: fs: sysfs_emit_at: Remove PAGE_SIZE alignment check Description diff --git a/cve/published/2024/CVE-2024-0052.json b/cve/published/2024/CVE-2024-0052.json index ab35c03b..f5c8f35f 100644 --- a/cve/published/2024/CVE-2024-0052.json +++ b/cve/published/2024/CVE-2024-0052.json @@ -38,7 +38,7 @@ ], "title": "mm/memory_hotplug: fix memmap_on_memory sysfs value retrieval", "x_generator": { - "engine": "bippy-8e45bd7fd5ec" + "engine": "bippy-0e8e3772d16e" } } }, diff --git a/cve/published/2024/CVE-2024-0052.mbox b/cve/published/2024/CVE-2024-0052.mbox index 0e240324..4e37e04a 100644 --- a/cve/published/2024/CVE-2024-0052.mbox +++ b/cve/published/2024/CVE-2024-0052.mbox @@ -1,4 +1,5 @@ -From: Linux Kernel CVE team <cve@kernel.org> +To: <linux-cve-announce@vger.kernel.org> +Reply-to: <cve@kernel.org> Subject: CVE-2024-0052: mm/memory_hotplug: fix memmap_on_memory sysfs value retrieval Description diff --git a/cve/published/2024/CVE-2024-20607.json b/cve/published/2024/CVE-2024-20607.json index 59b2e04f..fdc89501 100644 --- a/cve/published/2024/CVE-2024-20607.json +++ b/cve/published/2024/CVE-2024-20607.json @@ -17,12 +17,6 @@ "defaultStatus": "affected", "versions": [ { - "version": "6.6.16", - "lessThan": "6.6.16", - "status": "affected", - "versionType": "custom" - }, - { "version": "6.7", "lessThan": "6.7.4", "status": "affected", @@ -38,7 +32,7 @@ ], "title": "pds_core: Prevent health thread from running during reset/remove", "x_generator": { - "engine": "bippy-8e45bd7fd5ec" + "engine": "bippy-0e8e3772d16e" } } }, diff --git a/cve/published/2024/CVE-2024-20607.mbox b/cve/published/2024/CVE-2024-20607.mbox index 1e48453e..10bcfa58 100644 --- a/cve/published/2024/CVE-2024-20607.mbox +++ b/cve/published/2024/CVE-2024-20607.mbox @@ -1,4 +1,5 @@ -From: Linux Kernel CVE team <cve@kernel.org> +To: <linux-cve-announce@vger.kernel.org> +Reply-to: <cve@kernel.org> Subject: CVE-2024-20607: pds_core: Prevent health thread from running during reset/remove Description @@ -26,7 +27,6 @@ The individual change to resolve this issue can be found at: Affected versions ================= - Issue introduced in 6.6.16 and fixed in 6.6.16 Issue introduced in 6.7 and fixed in 6.7.4 |