aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-04-28 13:36:12 +0200
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-04-28 13:36:12 +0200
commitc9dcc772215b2d32de80c64c7cf157bedf590014 (patch)
tree2004d2f54da989a151593b243017356dbeaa579e
parent47d9e4b88a3d6b478167e3289ddf4be47451bb7b (diff)
downloadvulns-c9dcc772215b2d32de80c64c7cf157bedf590014.tar.gz
Add email signatures to 2 cves
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--cve/published/2024/CVE-2024-26927.mbox11
-rw-r--r--cve/published/2024/CVE-2024-26928.mbox11
2 files changed, 22 insertions, 0 deletions
diff --git a/cve/published/2024/CVE-2024-26927.mbox b/cve/published/2024/CVE-2024-26927.mbox
index 877313e7..22142489 100644
--- a/cve/published/2024/CVE-2024-26927.mbox
+++ b/cve/published/2024/CVE-2024-26927.mbox
@@ -3,6 +3,17 @@ From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26927: ASoC: SOF: Add some bounds checking to firmware data
+Message-Id: <2024042844-CVE-2024-26927-3374@gregkh>
+Content-Length: 2366
+Lines: 57
+X-Developer-Signature: v=1; a=openpgp-sha256; l=2421;
+ i=gregkh@linuxfoundation.org; h=from:subject:message-id;
+ bh=ZeXSzzGTc9kH+nZipTliOaNwbXkA2hi/zBhUiVYOYAA=;
+ b=owGbwMvMwCRo6H6F97bub03G02pJDGl6JhMDLzTtjg0q2Vh2b2JdN2P/eSPFJV13n9d3+Z5cU
+ PnY0u1kRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzk7juGueJ7O9d99dbv4+fj
+ nex+PN9b4/6WtQyzWeTKPmowOe7hunRoa/29Ut5zZfpBAA==
+X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
+ fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26928.mbox b/cve/published/2024/CVE-2024-26928.mbox
index 34a64cf0..dd9353b8 100644
--- a/cve/published/2024/CVE-2024-26928.mbox
+++ b/cve/published/2024/CVE-2024-26928.mbox
@@ -3,6 +3,17 @@ From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26928: smb: client: fix potential UAF in cifs_debug_files_proc_show()
+Message-Id: <2024042849-CVE-2024-26928-e543@gregkh>
+Content-Length: 1844
+Lines: 54
+X-Developer-Signature: v=1; a=openpgp-sha256; l=1896;
+ i=gregkh@linuxfoundation.org; h=from:subject:message-id;
+ bh=qZ3UXGf5LAaOZXV+UI6/4quiO7bPh1Ax4DzUUXN9r6Q=;
+ b=owGbwMvMwCRo6H6F97bub03G02pJDGl6JlO/Ll5XxnRA8TjzG6m+BOeyisTAJ3VCDWulDz5aL
+ n+bu+5lRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEwkLp9hfi5Xpug1y6zJzEGX
+ Xnt3XF8zT+uDKMOC3g3rtokLiwXJhet22t39EsXe+OUXAA==
+X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
+ fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========