diff options
author | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-04-28 13:36:12 +0200 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-04-28 13:36:12 +0200 |
commit | c9dcc772215b2d32de80c64c7cf157bedf590014 (patch) | |
tree | 2004d2f54da989a151593b243017356dbeaa579e | |
parent | 47d9e4b88a3d6b478167e3289ddf4be47451bb7b (diff) | |
download | vulns-c9dcc772215b2d32de80c64c7cf157bedf590014.tar.gz |
Add email signatures to 2 cves
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r-- | cve/published/2024/CVE-2024-26927.mbox | 11 | ||||
-rw-r--r-- | cve/published/2024/CVE-2024-26928.mbox | 11 |
2 files changed, 22 insertions, 0 deletions
diff --git a/cve/published/2024/CVE-2024-26927.mbox b/cve/published/2024/CVE-2024-26927.mbox index 877313e7..22142489 100644 --- a/cve/published/2024/CVE-2024-26927.mbox +++ b/cve/published/2024/CVE-2024-26927.mbox @@ -3,6 +3,17 @@ From: Greg Kroah-Hartman <gregkh@linuxfoundation.org> To: <linux-cve-announce@vger.kernel.org> Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org> Subject: CVE-2024-26927: ASoC: SOF: Add some bounds checking to firmware data +Message-Id: <2024042844-CVE-2024-26927-3374@gregkh> +Content-Length: 2366 +Lines: 57 +X-Developer-Signature: v=1; a=openpgp-sha256; l=2421; + i=gregkh@linuxfoundation.org; h=from:subject:message-id; + bh=ZeXSzzGTc9kH+nZipTliOaNwbXkA2hi/zBhUiVYOYAA=; + b=owGbwMvMwCRo6H6F97bub03G02pJDGl6JhMDLzTtjg0q2Vh2b2JdN2P/eSPFJV13n9d3+Z5cU + PnY0u1kRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzk7juGueJ7O9d99dbv4+fj + nex+PN9b4/6WtQyzWeTKPmowOe7hunRoa/29Ut5zZfpBAA== +X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp; + fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29 Description =========== diff --git a/cve/published/2024/CVE-2024-26928.mbox b/cve/published/2024/CVE-2024-26928.mbox index 34a64cf0..dd9353b8 100644 --- a/cve/published/2024/CVE-2024-26928.mbox +++ b/cve/published/2024/CVE-2024-26928.mbox @@ -3,6 +3,17 @@ From: Greg Kroah-Hartman <gregkh@linuxfoundation.org> To: <linux-cve-announce@vger.kernel.org> Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org> Subject: CVE-2024-26928: smb: client: fix potential UAF in cifs_debug_files_proc_show() +Message-Id: <2024042849-CVE-2024-26928-e543@gregkh> +Content-Length: 1844 +Lines: 54 +X-Developer-Signature: v=1; a=openpgp-sha256; l=1896; + i=gregkh@linuxfoundation.org; h=from:subject:message-id; + bh=qZ3UXGf5LAaOZXV+UI6/4quiO7bPh1Ax4DzUUXN9r6Q=; + b=owGbwMvMwCRo6H6F97bub03G02pJDGl6JlO/Ll5XxnRA8TjzG6m+BOeyisTAJ3VCDWulDz5aL + n+bu+5lRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEwkLp9hfi5Xpug1y6zJzEGX + Xnt3XF8zT+uDKMOC3g3rtokLiwXJhet22t39EsXe+OUXAA== +X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp; + fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29 Description =========== |