aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-04-04 12:29:06 +0200
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-04-04 12:29:06 +0200
commit7a31176fab910eb63ee059f77e094993714f1c41 (patch)
tree22ece8b81b8102284ee5f44fff0f79b235e87a1e
parentd3b5481f2964313ce6fea193aec75d9453b98a49 (diff)
downloadvulns-7a31176fab910eb63ee059f77e094993714f1c41.tar.gz
cve: fix up a bunch of json entries
Turned out we had a bug in the json creations, we would not properly describe the "affected" kernel version if there were stable kernel branches older than the mainline kernel that was affected. This bug is now fixed in bippy, so update all the relevent json entries that were incorrect. Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--cve/published/2021/CVE-2021-46905.json12
-rw-r--r--cve/published/2021/CVE-2021-46950.json12
-rw-r--r--cve/published/2021/CVE-2021-46955.json12
-rw-r--r--cve/published/2021/CVE-2021-46959.json12
-rw-r--r--cve/published/2021/CVE-2021-46963.json12
-rw-r--r--cve/published/2021/CVE-2021-46966.json12
-rw-r--r--cve/published/2021/CVE-2021-46974.json12
-rw-r--r--cve/published/2021/CVE-2021-46978.json12
-rw-r--r--cve/published/2021/CVE-2021-46985.json12
-rw-r--r--cve/published/2021/CVE-2021-46990.json12
-rw-r--r--cve/published/2021/CVE-2021-46999.json12
-rw-r--r--cve/published/2021/CVE-2021-47000.json12
-rw-r--r--cve/published/2021/CVE-2021-47003.json12
-rw-r--r--cve/published/2021/CVE-2021-47009.json12
-rw-r--r--cve/published/2021/CVE-2021-47011.json12
-rw-r--r--cve/published/2021/CVE-2021-47021.json12
-rw-r--r--cve/published/2021/CVE-2021-47022.json12
-rw-r--r--cve/published/2021/CVE-2021-47055.json12
-rw-r--r--cve/published/2021/CVE-2021-47058.json12
-rw-r--r--cve/published/2021/CVE-2021-47060.json12
-rw-r--r--cve/published/2021/CVE-2021-47068.json12
-rw-r--r--cve/published/2021/CVE-2021-47087.json12
-rw-r--r--cve/published/2021/CVE-2021-47097.json12
-rw-r--r--cve/published/2021/CVE-2021-47104.json12
-rw-r--r--cve/published/2021/CVE-2021-47124.json12
-rw-r--r--cve/published/2021/CVE-2021-47165.json12
-rw-r--r--cve/published/2021/CVE-2021-47172.json12
-rw-r--r--cve/published/2021/CVE-2021-47176.json12
-rw-r--r--cve/published/2022/CVE-2022-48630.json12
-rw-r--r--cve/published/2023/CVE-2023-52457.json12
-rw-r--r--cve/published/2023/CVE-2023-52462.json12
-rw-r--r--cve/published/2023/CVE-2023-52524.json12
-rw-r--r--cve/published/2023/CVE-2023-52563.json12
-rw-r--r--cve/published/2023/CVE-2023-52564.json12
-rw-r--r--cve/published/2023/CVE-2023-52565.json12
-rw-r--r--cve/published/2023/CVE-2023-52567.json12
-rw-r--r--cve/published/2023/CVE-2023-52571.json12
-rw-r--r--cve/published/2023/CVE-2023-52575.json12
-rw-r--r--cve/published/2023/CVE-2023-52626.json14
-rw-r--r--cve/published/2024/CVE-2024-26581.json12
-rw-r--r--cve/published/2024/CVE-2024-26601.json12
-rw-r--r--cve/published/2024/CVE-2024-26634.json14
-rw-r--r--cve/published/2024/CVE-2024-26643.json12
-rw-r--r--cve/published/2024/CVE-2024-26664.json12
-rw-r--r--cve/published/2024/CVE-2024-26676.json12
-rw-r--r--cve/published/2024/CVE-2024-26695.json12
-rw-r--r--cve/published/2024/CVE-2024-26722.json12
-rw-r--r--cve/published/2024/CVE-2024-26731.json12
-rw-r--r--cve/published/2024/CVE-2024-26752.json12
-rw-r--r--cve/published/2024/CVE-2024-26753.json12
-rw-r--r--cve/published/2024/CVE-2024-26766.json12
-rw-r--r--cve/published/2024/CVE-2024-26798.json12
-rw-r--r--cve/published/2024/CVE-2024-26809.json12
53 files changed, 585 insertions, 55 deletions
diff --git a/cve/published/2021/CVE-2021-46905.json b/cve/published/2021/CVE-2021-46905.json
index 09f0acdc..325125ad 100644
--- a/cve/published/2021/CVE-2021-46905.json
+++ b/cve/published/2021/CVE-2021-46905.json
@@ -62,6 +62,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.12",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.12",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.19.189",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
@@ -122,7 +132,7 @@
],
"title": "net: hso: fix NULL-deref on disconnect regression",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46950.json b/cve/published/2021/CVE-2021-46950.json
index 5ba2184f..a6877d9f 100644
--- a/cve/published/2021/CVE-2021-46950.json
+++ b/cve/published/2021/CVE-2021-46950.json
@@ -68,6 +68,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.4",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.4",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.14.233",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
@@ -137,7 +147,7 @@
],
"title": "md/raid1: properly indicate failure when ending a failed write request",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46955.json b/cve/published/2021/CVE-2021-46955.json
index 92b363f9..fdfe3e16 100644
--- a/cve/published/2021/CVE-2021-46955.json
+++ b/cve/published/2021/CVE-2021-46955.json
@@ -80,6 +80,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "4.16",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "4.16",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.4.269",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
@@ -167,7 +177,7 @@
],
"title": "openvswitch: fix stack OOB read while fragmenting IPv4 packets",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46959.json b/cve/published/2021/CVE-2021-46959.json
index 8c54f48a..17e06ac8 100644
--- a/cve/published/2021/CVE-2021-46959.json
+++ b/cve/published/2021/CVE-2021-46959.json
@@ -80,6 +80,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.10",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.10",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.4.271",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
@@ -167,7 +177,7 @@
],
"title": "spi: Fix use-after-free with devm_spi_alloc_*",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46963.json b/cve/published/2021/CVE-2021-46963.json
index 05d15b55..807a9550 100644
--- a/cve/published/2021/CVE-2021-46963.json
+++ b/cve/published/2021/CVE-2021-46963.json
@@ -62,6 +62,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.5",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.5",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.19.191",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
@@ -122,7 +132,7 @@
],
"title": "scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46966.json b/cve/published/2021/CVE-2021-46966.json
index 72555a0b..87338e2a 100644
--- a/cve/published/2021/CVE-2021-46966.json
+++ b/cve/published/2021/CVE-2021-46966.json
@@ -80,6 +80,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.4",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.4",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.4.269",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
@@ -167,7 +177,7 @@
],
"title": "ACPI: custom_method: fix potential use-after-free issue",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46974.json b/cve/published/2021/CVE-2021-46974.json
index 48a5a3a8..d2e7c5fe 100644
--- a/cve/published/2021/CVE-2021-46974.json
+++ b/cve/published/2021/CVE-2021-46974.json
@@ -68,6 +68,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.0",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.0",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.14.233",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
@@ -137,7 +147,7 @@
],
"title": "bpf: Fix masking negation logic upon negative dst register",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46978.json b/cve/published/2021/CVE-2021-46978.json
index 2cd743d1..b283c06c 100644
--- a/cve/published/2021/CVE-2021-46978.json
+++ b/cve/published/2021/CVE-2021-46978.json
@@ -50,6 +50,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.11",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.11",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.10.38",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
@@ -92,7 +102,7 @@
],
"title": "KVM: nVMX: Always make an attempt to map eVMCS after migration",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46985.json b/cve/published/2021/CVE-2021-46985.json
index 4defb26d..654d5838 100644
--- a/cve/published/2021/CVE-2021-46985.json
+++ b/cve/published/2021/CVE-2021-46985.json
@@ -74,6 +74,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.12",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.12",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.9.269",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
@@ -152,7 +162,7 @@
],
"title": "ACPI: scan: Fix a memory leak in an error handling path",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46990.json b/cve/published/2021/CVE-2021-46990.json
index 6b4b2fdc..a1d90614 100644
--- a/cve/published/2021/CVE-2021-46990.json
+++ b/cve/published/2021/CVE-2021-46990.json
@@ -80,6 +80,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.10",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.10",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.4.269",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
@@ -167,7 +177,7 @@
],
"title": "powerpc/64s: Fix crashes when toggling entry flush barrier",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-46999.json b/cve/published/2021/CVE-2021-46999.json
index 2b84276b..e17cfaa1 100644
--- a/cve/published/2021/CVE-2021-46999.json
+++ b/cve/published/2021/CVE-2021-46999.json
@@ -62,6 +62,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.7",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.7",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.19.191",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
@@ -122,7 +132,7 @@
],
"title": "sctp: do asoc update earlier in sctp_sf_do_dupcook_a",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47000.json b/cve/published/2021/CVE-2021-47000.json
index a8877817..805f541f 100644
--- a/cve/published/2021/CVE-2021-47000.json
+++ b/cve/published/2021/CVE-2021-47000.json
@@ -56,6 +56,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.8",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.8",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.4.120",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
@@ -107,7 +117,7 @@
],
"title": "ceph: fix inode leak on getattr error in __fh_to_dentry",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47003.json b/cve/published/2021/CVE-2021-47003.json
index 230c6e18..a6b662f4 100644
--- a/cve/published/2021/CVE-2021-47003.json
+++ b/cve/published/2021/CVE-2021-47003.json
@@ -50,6 +50,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.11",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.11",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.10.38",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
@@ -92,7 +102,7 @@
],
"title": "dmaengine: idxd: Fix potential null dereference on pointer status",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47009.json b/cve/published/2021/CVE-2021-47009.json
index 413977c0..7cfc4c62 100644
--- a/cve/published/2021/CVE-2021-47009.json
+++ b/cve/published/2021/CVE-2021-47009.json
@@ -50,6 +50,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.12",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.12",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.10.38",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
@@ -92,7 +102,7 @@
],
"title": "KEYS: trusted: Fix memory leak on object td",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47011.json b/cve/published/2021/CVE-2021-47011.json
index 649b730b..1174bf2b 100644
--- a/cve/published/2021/CVE-2021-47011.json
+++ b/cve/published/2021/CVE-2021-47011.json
@@ -50,6 +50,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.11",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.11",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.10.37",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
@@ -92,7 +102,7 @@
],
"title": "mm: memcontrol: slab: fix obtain a reference to a freeing memcg",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47021.json b/cve/published/2021/CVE-2021-47021.json
index 49b6f0d5..fa6ec55a 100644
--- a/cve/published/2021/CVE-2021-47021.json
+++ b/cve/published/2021/CVE-2021-47021.json
@@ -44,6 +44,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.12",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.12",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.11.21",
"lessThanOrEqual": "5.11.*",
"status": "unaffected",
@@ -77,7 +87,7 @@
],
"title": "mt76: mt7915: fix memleak when mt7915_unregister_device()",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47022.json b/cve/published/2021/CVE-2021-47022.json
index fb7b4dad..436744c2 100644
--- a/cve/published/2021/CVE-2021-47022.json
+++ b/cve/published/2021/CVE-2021-47022.json
@@ -50,6 +50,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.12",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.12",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.10.37",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
@@ -92,7 +102,7 @@
],
"title": "mt76: mt7615: fix memleak when mt7615_unregister_device()",
"x_generator": {
- "engine": "bippy-c298863b1525"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47055.json b/cve/published/2021/CVE-2021-47055.json
index 0a9ae42c..98226a44 100644
--- a/cve/published/2021/CVE-2021-47055.json
+++ b/cve/published/2021/CVE-2021-47055.json
@@ -80,6 +80,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.9",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.9",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.4.269",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
@@ -167,7 +177,7 @@
],
"title": "mtd: require write permissions for locking and badblock ioctls",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47058.json b/cve/published/2021/CVE-2021-47058.json
index 2282ec9f..2d01097f 100644
--- a/cve/published/2021/CVE-2021-47058.json
+++ b/cve/published/2021/CVE-2021-47058.json
@@ -62,6 +62,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.11",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.11",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.19.191",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
@@ -122,7 +132,7 @@
],
"title": "regmap: set debugfs_name to NULL after it is freed",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47060.json b/cve/published/2021/CVE-2021-47060.json
index 5f15c70c..1eee520d 100644
--- a/cve/published/2021/CVE-2021-47060.json
+++ b/cve/published/2021/CVE-2021-47060.json
@@ -56,6 +56,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.9",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.9",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.4.119",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
@@ -107,7 +117,7 @@
],
"title": "KVM: Stop looking for coalesced MMIO zones if the bus is destroyed",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47068.json b/cve/published/2021/CVE-2021-47068.json
index ad1af6c0..78616bea 100644
--- a/cve/published/2021/CVE-2021-47068.json
+++ b/cve/published/2021/CVE-2021-47068.json
@@ -80,6 +80,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.12",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.12",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.4.269",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
@@ -167,7 +177,7 @@
],
"title": "net/nfc: fix use-after-free llcp_sock_bind/connect",
"x_generator": {
- "engine": "bippy-1e70cc10feda"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47087.json b/cve/published/2021/CVE-2021-47087.json
index 3015de0f..8ba14c6b 100644
--- a/cve/published/2021/CVE-2021-47087.json
+++ b/cve/published/2021/CVE-2021-47087.json
@@ -50,6 +50,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.14",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.14",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.4.169",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
@@ -92,7 +102,7 @@
],
"title": "tee: optee: Fix incorrect page free bug",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47097.json b/cve/published/2021/CVE-2021-47097.json
index e76cebb3..9434ea50 100644
--- a/cve/published/2021/CVE-2021-47097.json
+++ b/cve/published/2021/CVE-2021-47097.json
@@ -50,6 +50,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.11",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.11",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.4.169",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
@@ -92,7 +102,7 @@
],
"title": "Input: elantech - fix stack out of bound access in elantech_change_report_id()",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47104.json b/cve/published/2021/CVE-2021-47104.json
index 3ca470b0..e7270890 100644
--- a/cve/published/2021/CVE-2021-47104.json
+++ b/cve/published/2021/CVE-2021-47104.json
@@ -74,6 +74,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.15",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.15",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.4.297",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
@@ -152,7 +162,7 @@
],
"title": "IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47124.json b/cve/published/2021/CVE-2021-47124.json
index 2804aa0d..683eab56 100644
--- a/cve/published/2021/CVE-2021-47124.json
+++ b/cve/published/2021/CVE-2021-47124.json
@@ -56,6 +56,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.12",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.12",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.10.43",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
@@ -107,7 +117,7 @@
],
"title": "io_uring: fix link timeout refs",
"x_generator": {
- "engine": "bippy-1e70cc10feda"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47165.json b/cve/published/2021/CVE-2021-47165.json
index 67e715e1..c37dec2d 100644
--- a/cve/published/2021/CVE-2021-47165.json
+++ b/cve/published/2021/CVE-2021-47165.json
@@ -62,6 +62,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.12",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.12",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.14.235",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
@@ -122,7 +132,7 @@
],
"title": "drm/meson: fix shutdown crash when component not probed",
"x_generator": {
- "engine": "bippy-b4257b672505"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47172.json b/cve/published/2021/CVE-2021-47172.json
index ed749a7e..e82c2e59 100644
--- a/cve/published/2021/CVE-2021-47172.json
+++ b/cve/published/2021/CVE-2021-47172.json
@@ -50,6 +50,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.5",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.5",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.4.124",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
@@ -92,7 +102,7 @@
],
"title": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers",
"x_generator": {
- "engine": "bippy-1e70cc10feda"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2021/CVE-2021-47176.json b/cve/published/2021/CVE-2021-47176.json
index 5af767ad..b81add4e 100644
--- a/cve/published/2021/CVE-2021-47176.json
+++ b/cve/published/2021/CVE-2021-47176.json
@@ -50,6 +50,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.11",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.11",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.4.237",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
@@ -92,7 +102,7 @@
],
"title": "s390/dasd: add missing discipline function",
"x_generator": {
- "engine": "bippy-b4257b672505"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2022/CVE-2022-48630.json b/cve/published/2022/CVE-2022-48630.json
index 3c60fc5c..1af540ae 100644
--- a/cve/published/2022/CVE-2022-48630.json
+++ b/cve/published/2022/CVE-2022-48630.json
@@ -62,6 +62,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.17",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.17",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.19.245",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
@@ -122,7 +132,7 @@
],
"title": "crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52457.json b/cve/published/2023/CVE-2023-52457.json
index bc75cd9f..25e4661c 100644
--- a/cve/published/2023/CVE-2023-52457.json
+++ b/cve/published/2023/CVE-2023-52457.json
@@ -68,6 +68,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.1",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.1",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.4.268",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
@@ -137,7 +147,7 @@
],
"title": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52462.json b/cve/published/2023/CVE-2023-52462.json
index 954d258c..08260002 100644
--- a/cve/published/2023/CVE-2023-52462.json
+++ b/cve/published/2023/CVE-2023-52462.json
@@ -62,6 +62,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.16",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.16",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.10.209",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
@@ -122,7 +132,7 @@
],
"title": "bpf: fix check for attempt to corrupt spilled pointer",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52524.json b/cve/published/2023/CVE-2023-52524.json
index 25b55c41..bb21a536 100644
--- a/cve/published/2023/CVE-2023-52524.json
+++ b/cve/published/2023/CVE-2023-52524.json
@@ -62,6 +62,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.5",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.5",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.4.258",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
@@ -122,7 +132,7 @@
],
"title": "net: nfc: llcp: Add lock when modifying device list",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52563.json b/cve/published/2023/CVE-2023-52563.json
index 1d6a3a60..459a7032 100644
--- a/cve/published/2023/CVE-2023-52563.json
+++ b/cve/published/2023/CVE-2023-52563.json
@@ -50,6 +50,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.17",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.17",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.15.134",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
@@ -92,7 +102,7 @@
],
"title": "drm/meson: fix memory leak on ->hpd_notify callback",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52564.json b/cve/published/2023/CVE-2023-52564.json
index d05b5dcc..fff0beaf 100644
--- a/cve/published/2023/CVE-2023-52564.json
+++ b/cve/published/2023/CVE-2023-52564.json
@@ -56,6 +56,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.5",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.5",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.10.198",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
@@ -107,7 +117,7 @@
],
"title": "Revert \"tty: n_gsm: fix UAF in gsm_cleanup_mux\"",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52565.json b/cve/published/2023/CVE-2023-52565.json
index ec654b52..20019c6d 100644
--- a/cve/published/2023/CVE-2023-52565.json
+++ b/cve/published/2023/CVE-2023-52565.json
@@ -44,6 +44,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.3",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.3",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "6.1.56",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
@@ -77,7 +87,7 @@
],
"title": "media: uvcvideo: Fix OOB read",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52567.json b/cve/published/2023/CVE-2023-52567.json
index 7f76459d..54988902 100644
--- a/cve/published/2023/CVE-2023-52567.json
+++ b/cve/published/2023/CVE-2023-52567.json
@@ -74,6 +74,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.4",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.4",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.14.327",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
@@ -152,7 +162,7 @@
],
"title": "serial: 8250_port: Check IRQ data before use",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52571.json b/cve/published/2023/CVE-2023-52571.json
index f1d7a693..c0a6993a 100644
--- a/cve/published/2023/CVE-2023-52571.json
+++ b/cve/published/2023/CVE-2023-52571.json
@@ -44,6 +44,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.2",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.2",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "6.1.56",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
@@ -77,7 +87,7 @@
],
"title": "power: supply: rk817: Fix node refcount leak",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52575.json b/cve/published/2023/CVE-2023-52575.json
index 7debabd8..0e071252 100644
--- a/cve/published/2023/CVE-2023-52575.json
+++ b/cve/published/2023/CVE-2023-52575.json
@@ -56,6 +56,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.5",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.5",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.10.198",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
@@ -107,7 +117,7 @@
],
"title": "x86/srso: Fix SBPB enablement for spec_rstack_overflow=off",
"x_generator": {
- "engine": "bippy-4986f5686161"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52626.json b/cve/published/2023/CVE-2023-52626.json
index c83c55e2..f613c5bd 100644
--- a/cve/published/2023/CVE-2023-52626.json
+++ b/cve/published/2023/CVE-2023-52626.json
@@ -44,6 +44,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.7",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.7",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "6.6.15",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
@@ -77,14 +87,14 @@
],
"title": "net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context",
"x_generator": {
- "engine": "bippy-b4257b672505"
+ "engine": "bippy-851b3ed3d212"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2023-52626",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26581.json b/cve/published/2024/CVE-2024-26581.json
index 3051b003..c9e7c354 100644
--- a/cve/published/2024/CVE-2024-26581.json
+++ b/cve/published/2024/CVE-2024-26581.json
@@ -68,6 +68,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.5",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.5",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.4.269",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
@@ -137,7 +147,7 @@
],
"title": "netfilter: nft_set_rbtree: skip end interval element from gc",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26601.json b/cve/published/2024/CVE-2024-26601.json
index 8d7fdd46..731894a8 100644
--- a/cve/published/2024/CVE-2024-26601.json
+++ b/cve/published/2024/CVE-2024-26601.json
@@ -62,6 +62,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.11",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.11",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.10.211",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
@@ -122,7 +132,7 @@
],
"title": "ext4: regenerate buddy after block freeing failed if under fc replay",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26634.json b/cve/published/2024/CVE-2024-26634.json
index 30254dd1..dda57fe7 100644
--- a/cve/published/2024/CVE-2024-26634.json
+++ b/cve/published/2024/CVE-2024-26634.json
@@ -50,6 +50,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.6",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.6",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "6.1.76",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
@@ -92,14 +102,14 @@
],
"title": "net: fix removing a namespace with conflicting altnames",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-851b3ed3d212"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2024-26634",
- "requesterUserId": "lee@kernel.org",
+ "requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
diff --git a/cve/published/2024/CVE-2024-26643.json b/cve/published/2024/CVE-2024-26643.json
index d42bb041..f5670217 100644
--- a/cve/published/2024/CVE-2024-26643.json
+++ b/cve/published/2024/CVE-2024-26643.json
@@ -50,6 +50,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.5",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.5",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "6.1.84",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
@@ -92,7 +102,7 @@
],
"title": "netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout",
"x_generator": {
- "engine": "bippy-d3b290d2becc"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26664.json b/cve/published/2024/CVE-2024-26664.json
index 98c52649..b5626470 100644
--- a/cve/published/2024/CVE-2024-26664.json
+++ b/cve/published/2024/CVE-2024-26664.json
@@ -74,6 +74,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.1",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.1",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.19.307",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
@@ -152,7 +162,7 @@
],
"title": "hwmon: (coretemp) Fix out-of-bounds memory access",
"x_generator": {
- "engine": "bippy-b4257b672505"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26676.json b/cve/published/2024/CVE-2024-26676.json
index 54de7553..89a650e3 100644
--- a/cve/published/2024/CVE-2024-26676.json
+++ b/cve/published/2024/CVE-2024-26676.json
@@ -56,6 +56,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.3",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.3",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.15.149",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
@@ -107,7 +117,7 @@
],
"title": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.",
"x_generator": {
- "engine": "bippy-b4257b672505"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26695.json b/cve/published/2024/CVE-2024-26695.json
index c4a3d54f..32cd11e5 100644
--- a/cve/published/2024/CVE-2024-26695.json
+++ b/cve/published/2024/CVE-2024-26695.json
@@ -62,6 +62,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.0",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.0",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.10.210",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
@@ -122,7 +132,7 @@
],
"title": "crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked",
"x_generator": {
- "engine": "bippy-d3b290d2becc"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26722.json b/cve/published/2024/CVE-2024-26722.json
index e6c0fea7..ddbd5130 100644
--- a/cve/published/2024/CVE-2024-26722.json
+++ b/cve/published/2024/CVE-2024-26722.json
@@ -74,6 +74,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.7",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.7",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.19.307",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
@@ -152,7 +162,7 @@
],
"title": "ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()",
"x_generator": {
- "engine": "bippy-d3b290d2becc"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26731.json b/cve/published/2024/CVE-2024-26731.json
index c2dcd76b..09e673f6 100644
--- a/cve/published/2024/CVE-2024-26731.json
+++ b/cve/published/2024/CVE-2024-26731.json
@@ -50,6 +50,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.4",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.4",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "6.1.80",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
@@ -92,7 +102,7 @@
],
"title": "bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()",
"x_generator": {
- "engine": "bippy-d3b290d2becc"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26752.json b/cve/published/2024/CVE-2024-26752.json
index 1881ab10..5dff3712 100644
--- a/cve/published/2024/CVE-2024-26752.json
+++ b/cve/published/2024/CVE-2024-26752.json
@@ -74,6 +74,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.6",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.6",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.19.308",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
@@ -152,7 +162,7 @@
],
"title": "l2tp: pass correct message length to ip6_append_data",
"x_generator": {
- "engine": "bippy-d3b290d2becc"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26753.json b/cve/published/2024/CVE-2024-26753.json
index 22b229e3..1729c0e5 100644
--- a/cve/published/2024/CVE-2024-26753.json
+++ b/cve/published/2024/CVE-2024-26753.json
@@ -56,6 +56,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.18",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.18",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.10.212",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
@@ -107,7 +117,7 @@
],
"title": "crypto: virtio/akcipher - Fix stack overflow on memcpy",
"x_generator": {
- "engine": "bippy-d3b290d2becc"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26766.json b/cve/published/2024/CVE-2024-26766.json
index 70c17c40..d669f01a 100644
--- a/cve/published/2024/CVE-2024-26766.json
+++ b/cve/published/2024/CVE-2024-26766.json
@@ -74,6 +74,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.3",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.3",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "4.19.308",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
@@ -152,7 +162,7 @@
],
"title": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error",
"x_generator": {
- "engine": "bippy-d3b290d2becc"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26798.json b/cve/published/2024/CVE-2024-26798.json
index 558582ec..b88e4b97 100644
--- a/cve/published/2024/CVE-2024-26798.json
+++ b/cve/published/2024/CVE-2024-26798.json
@@ -56,6 +56,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "6.0",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "6.0",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.15.151",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
@@ -107,7 +117,7 @@
],
"title": "fbcon: always restore the old font data in fbcon_do_set_font()",
"x_generator": {
- "engine": "bippy-e0c11145c45e"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2024/CVE-2024-26809.json b/cve/published/2024/CVE-2024-26809.json
index b36e228d..c9703ff3 100644
--- a/cve/published/2024/CVE-2024-26809.json
+++ b/cve/published/2024/CVE-2024-26809.json
@@ -68,6 +68,16 @@
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"versions": [
{
+ "version": "5.19",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.19",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
"version": "5.10.214",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
@@ -137,7 +147,7 @@
],
"title": "netfilter: nft_set_pipapo: release elements in clone only from destroy path",
"x_generator": {
- "engine": "bippy-e0c11145c45e"
+ "engine": "bippy-851b3ed3d212"
}
}
},