diff options
author | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-04-04 12:29:06 +0200 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-04-04 12:29:06 +0200 |
commit | 7a31176fab910eb63ee059f77e094993714f1c41 (patch) | |
tree | 22ece8b81b8102284ee5f44fff0f79b235e87a1e | |
parent | d3b5481f2964313ce6fea193aec75d9453b98a49 (diff) | |
download | vulns-7a31176fab910eb63ee059f77e094993714f1c41.tar.gz |
cve: fix up a bunch of json entries
Turned out we had a bug in the json creations, we would not properly
describe the "affected" kernel version if there were stable kernel
branches older than the mainline kernel that was affected.
This bug is now fixed in bippy, so update all the relevent json entries
that were incorrect.
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
53 files changed, 585 insertions, 55 deletions
diff --git a/cve/published/2021/CVE-2021-46905.json b/cve/published/2021/CVE-2021-46905.json index 09f0acdc..325125ad 100644 --- a/cve/published/2021/CVE-2021-46905.json +++ b/cve/published/2021/CVE-2021-46905.json @@ -62,6 +62,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.12", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.12", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.19.189", "lessThanOrEqual": "4.19.*", "status": "unaffected", @@ -122,7 +132,7 @@ ], "title": "net: hso: fix NULL-deref on disconnect regression", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-46950.json b/cve/published/2021/CVE-2021-46950.json index 5ba2184f..a6877d9f 100644 --- a/cve/published/2021/CVE-2021-46950.json +++ b/cve/published/2021/CVE-2021-46950.json @@ -68,6 +68,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.4", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.4", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.14.233", "lessThanOrEqual": "4.14.*", "status": "unaffected", @@ -137,7 +147,7 @@ ], "title": "md/raid1: properly indicate failure when ending a failed write request", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-46955.json b/cve/published/2021/CVE-2021-46955.json index 92b363f9..fdfe3e16 100644 --- a/cve/published/2021/CVE-2021-46955.json +++ b/cve/published/2021/CVE-2021-46955.json @@ -80,6 +80,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "4.16", + "status": "affected" + }, + { + "version": "0", + "lessThan": "4.16", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.4.269", "lessThanOrEqual": "4.4.*", "status": "unaffected", @@ -167,7 +177,7 @@ ], "title": "openvswitch: fix stack OOB read while fragmenting IPv4 packets", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-46959.json b/cve/published/2021/CVE-2021-46959.json index 8c54f48a..17e06ac8 100644 --- a/cve/published/2021/CVE-2021-46959.json +++ b/cve/published/2021/CVE-2021-46959.json @@ -80,6 +80,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.10", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.10", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.4.271", "lessThanOrEqual": "4.4.*", "status": "unaffected", @@ -167,7 +177,7 @@ ], "title": "spi: Fix use-after-free with devm_spi_alloc_*", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-46963.json b/cve/published/2021/CVE-2021-46963.json index 05d15b55..807a9550 100644 --- a/cve/published/2021/CVE-2021-46963.json +++ b/cve/published/2021/CVE-2021-46963.json @@ -62,6 +62,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.5", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.5", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.19.191", "lessThanOrEqual": "4.19.*", "status": "unaffected", @@ -122,7 +132,7 @@ ], "title": "scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-46966.json b/cve/published/2021/CVE-2021-46966.json index 72555a0b..87338e2a 100644 --- a/cve/published/2021/CVE-2021-46966.json +++ b/cve/published/2021/CVE-2021-46966.json @@ -80,6 +80,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.4", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.4", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.4.269", "lessThanOrEqual": "4.4.*", "status": "unaffected", @@ -167,7 +177,7 @@ ], "title": "ACPI: custom_method: fix potential use-after-free issue", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-46974.json b/cve/published/2021/CVE-2021-46974.json index 48a5a3a8..d2e7c5fe 100644 --- a/cve/published/2021/CVE-2021-46974.json +++ b/cve/published/2021/CVE-2021-46974.json @@ -68,6 +68,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.0", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.0", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.14.233", "lessThanOrEqual": "4.14.*", "status": "unaffected", @@ -137,7 +147,7 @@ ], "title": "bpf: Fix masking negation logic upon negative dst register", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-46978.json b/cve/published/2021/CVE-2021-46978.json index 2cd743d1..b283c06c 100644 --- a/cve/published/2021/CVE-2021-46978.json +++ b/cve/published/2021/CVE-2021-46978.json @@ -50,6 +50,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.11", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.11", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.10.38", "lessThanOrEqual": "5.10.*", "status": "unaffected", @@ -92,7 +102,7 @@ ], "title": "KVM: nVMX: Always make an attempt to map eVMCS after migration", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-46985.json b/cve/published/2021/CVE-2021-46985.json index 4defb26d..654d5838 100644 --- a/cve/published/2021/CVE-2021-46985.json +++ b/cve/published/2021/CVE-2021-46985.json @@ -74,6 +74,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.12", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.12", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.9.269", "lessThanOrEqual": "4.9.*", "status": "unaffected", @@ -152,7 +162,7 @@ ], "title": "ACPI: scan: Fix a memory leak in an error handling path", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-46990.json b/cve/published/2021/CVE-2021-46990.json index 6b4b2fdc..a1d90614 100644 --- a/cve/published/2021/CVE-2021-46990.json +++ b/cve/published/2021/CVE-2021-46990.json @@ -80,6 +80,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.10", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.10", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.4.269", "lessThanOrEqual": "4.4.*", "status": "unaffected", @@ -167,7 +177,7 @@ ], "title": "powerpc/64s: Fix crashes when toggling entry flush barrier", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-46999.json b/cve/published/2021/CVE-2021-46999.json index 2b84276b..e17cfaa1 100644 --- a/cve/published/2021/CVE-2021-46999.json +++ b/cve/published/2021/CVE-2021-46999.json @@ -62,6 +62,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.7", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.7", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.19.191", "lessThanOrEqual": "4.19.*", "status": "unaffected", @@ -122,7 +132,7 @@ ], "title": "sctp: do asoc update earlier in sctp_sf_do_dupcook_a", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47000.json b/cve/published/2021/CVE-2021-47000.json index a8877817..805f541f 100644 --- a/cve/published/2021/CVE-2021-47000.json +++ b/cve/published/2021/CVE-2021-47000.json @@ -56,6 +56,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.8", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.8", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.4.120", "lessThanOrEqual": "5.4.*", "status": "unaffected", @@ -107,7 +117,7 @@ ], "title": "ceph: fix inode leak on getattr error in __fh_to_dentry", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47003.json b/cve/published/2021/CVE-2021-47003.json index 230c6e18..a6b662f4 100644 --- a/cve/published/2021/CVE-2021-47003.json +++ b/cve/published/2021/CVE-2021-47003.json @@ -50,6 +50,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.11", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.11", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.10.38", "lessThanOrEqual": "5.10.*", "status": "unaffected", @@ -92,7 +102,7 @@ ], "title": "dmaengine: idxd: Fix potential null dereference on pointer status", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47009.json b/cve/published/2021/CVE-2021-47009.json index 413977c0..7cfc4c62 100644 --- a/cve/published/2021/CVE-2021-47009.json +++ b/cve/published/2021/CVE-2021-47009.json @@ -50,6 +50,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.12", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.12", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.10.38", "lessThanOrEqual": "5.10.*", "status": "unaffected", @@ -92,7 +102,7 @@ ], "title": "KEYS: trusted: Fix memory leak on object td", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47011.json b/cve/published/2021/CVE-2021-47011.json index 649b730b..1174bf2b 100644 --- a/cve/published/2021/CVE-2021-47011.json +++ b/cve/published/2021/CVE-2021-47011.json @@ -50,6 +50,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.11", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.11", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.10.37", "lessThanOrEqual": "5.10.*", "status": "unaffected", @@ -92,7 +102,7 @@ ], "title": "mm: memcontrol: slab: fix obtain a reference to a freeing memcg", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47021.json b/cve/published/2021/CVE-2021-47021.json index 49b6f0d5..fa6ec55a 100644 --- a/cve/published/2021/CVE-2021-47021.json +++ b/cve/published/2021/CVE-2021-47021.json @@ -44,6 +44,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.12", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.12", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.11.21", "lessThanOrEqual": "5.11.*", "status": "unaffected", @@ -77,7 +87,7 @@ ], "title": "mt76: mt7915: fix memleak when mt7915_unregister_device()", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47022.json b/cve/published/2021/CVE-2021-47022.json index fb7b4dad..436744c2 100644 --- a/cve/published/2021/CVE-2021-47022.json +++ b/cve/published/2021/CVE-2021-47022.json @@ -50,6 +50,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.12", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.12", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.10.37", "lessThanOrEqual": "5.10.*", "status": "unaffected", @@ -92,7 +102,7 @@ ], "title": "mt76: mt7615: fix memleak when mt7615_unregister_device()", "x_generator": { - "engine": "bippy-c298863b1525" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47055.json b/cve/published/2021/CVE-2021-47055.json index 0a9ae42c..98226a44 100644 --- a/cve/published/2021/CVE-2021-47055.json +++ b/cve/published/2021/CVE-2021-47055.json @@ -80,6 +80,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.9", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.9", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.4.269", "lessThanOrEqual": "4.4.*", "status": "unaffected", @@ -167,7 +177,7 @@ ], "title": "mtd: require write permissions for locking and badblock ioctls", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47058.json b/cve/published/2021/CVE-2021-47058.json index 2282ec9f..2d01097f 100644 --- a/cve/published/2021/CVE-2021-47058.json +++ b/cve/published/2021/CVE-2021-47058.json @@ -62,6 +62,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.11", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.11", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.19.191", "lessThanOrEqual": "4.19.*", "status": "unaffected", @@ -122,7 +132,7 @@ ], "title": "regmap: set debugfs_name to NULL after it is freed", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47060.json b/cve/published/2021/CVE-2021-47060.json index 5f15c70c..1eee520d 100644 --- a/cve/published/2021/CVE-2021-47060.json +++ b/cve/published/2021/CVE-2021-47060.json @@ -56,6 +56,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.9", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.9", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.4.119", "lessThanOrEqual": "5.4.*", "status": "unaffected", @@ -107,7 +117,7 @@ ], "title": "KVM: Stop looking for coalesced MMIO zones if the bus is destroyed", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47068.json b/cve/published/2021/CVE-2021-47068.json index ad1af6c0..78616bea 100644 --- a/cve/published/2021/CVE-2021-47068.json +++ b/cve/published/2021/CVE-2021-47068.json @@ -80,6 +80,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.12", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.12", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.4.269", "lessThanOrEqual": "4.4.*", "status": "unaffected", @@ -167,7 +177,7 @@ ], "title": "net/nfc: fix use-after-free llcp_sock_bind/connect", "x_generator": { - "engine": "bippy-1e70cc10feda" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47087.json b/cve/published/2021/CVE-2021-47087.json index 3015de0f..8ba14c6b 100644 --- a/cve/published/2021/CVE-2021-47087.json +++ b/cve/published/2021/CVE-2021-47087.json @@ -50,6 +50,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.14", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.14", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.4.169", "lessThanOrEqual": "5.4.*", "status": "unaffected", @@ -92,7 +102,7 @@ ], "title": "tee: optee: Fix incorrect page free bug", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47097.json b/cve/published/2021/CVE-2021-47097.json index e76cebb3..9434ea50 100644 --- a/cve/published/2021/CVE-2021-47097.json +++ b/cve/published/2021/CVE-2021-47097.json @@ -50,6 +50,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.11", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.11", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.4.169", "lessThanOrEqual": "5.4.*", "status": "unaffected", @@ -92,7 +102,7 @@ ], "title": "Input: elantech - fix stack out of bound access in elantech_change_report_id()", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47104.json b/cve/published/2021/CVE-2021-47104.json index 3ca470b0..e7270890 100644 --- a/cve/published/2021/CVE-2021-47104.json +++ b/cve/published/2021/CVE-2021-47104.json @@ -74,6 +74,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.15", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.15", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.4.297", "lessThanOrEqual": "4.4.*", "status": "unaffected", @@ -152,7 +162,7 @@ ], "title": "IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47124.json b/cve/published/2021/CVE-2021-47124.json index 2804aa0d..683eab56 100644 --- a/cve/published/2021/CVE-2021-47124.json +++ b/cve/published/2021/CVE-2021-47124.json @@ -56,6 +56,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.12", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.12", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.10.43", "lessThanOrEqual": "5.10.*", "status": "unaffected", @@ -107,7 +117,7 @@ ], "title": "io_uring: fix link timeout refs", "x_generator": { - "engine": "bippy-1e70cc10feda" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47165.json b/cve/published/2021/CVE-2021-47165.json index 67e715e1..c37dec2d 100644 --- a/cve/published/2021/CVE-2021-47165.json +++ b/cve/published/2021/CVE-2021-47165.json @@ -62,6 +62,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.12", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.12", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.14.235", "lessThanOrEqual": "4.14.*", "status": "unaffected", @@ -122,7 +132,7 @@ ], "title": "drm/meson: fix shutdown crash when component not probed", "x_generator": { - "engine": "bippy-b4257b672505" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47172.json b/cve/published/2021/CVE-2021-47172.json index ed749a7e..e82c2e59 100644 --- a/cve/published/2021/CVE-2021-47172.json +++ b/cve/published/2021/CVE-2021-47172.json @@ -50,6 +50,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.5", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.5", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.4.124", "lessThanOrEqual": "5.4.*", "status": "unaffected", @@ -92,7 +102,7 @@ ], "title": "iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers", "x_generator": { - "engine": "bippy-1e70cc10feda" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2021/CVE-2021-47176.json b/cve/published/2021/CVE-2021-47176.json index 5af767ad..b81add4e 100644 --- a/cve/published/2021/CVE-2021-47176.json +++ b/cve/published/2021/CVE-2021-47176.json @@ -50,6 +50,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.11", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.11", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.4.237", "lessThanOrEqual": "5.4.*", "status": "unaffected", @@ -92,7 +102,7 @@ ], "title": "s390/dasd: add missing discipline function", "x_generator": { - "engine": "bippy-b4257b672505" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2022/CVE-2022-48630.json b/cve/published/2022/CVE-2022-48630.json index 3c60fc5c..1af540ae 100644 --- a/cve/published/2022/CVE-2022-48630.json +++ b/cve/published/2022/CVE-2022-48630.json @@ -62,6 +62,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.17", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.17", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.19.245", "lessThanOrEqual": "4.19.*", "status": "unaffected", @@ -122,7 +132,7 @@ ], "title": "crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2023/CVE-2023-52457.json b/cve/published/2023/CVE-2023-52457.json index bc75cd9f..25e4661c 100644 --- a/cve/published/2023/CVE-2023-52457.json +++ b/cve/published/2023/CVE-2023-52457.json @@ -68,6 +68,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.1", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.1", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.4.268", "lessThanOrEqual": "5.4.*", "status": "unaffected", @@ -137,7 +147,7 @@ ], "title": "serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed", "x_generator": { - "engine": "bippy-8df59b4913de" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2023/CVE-2023-52462.json b/cve/published/2023/CVE-2023-52462.json index 954d258c..08260002 100644 --- a/cve/published/2023/CVE-2023-52462.json +++ b/cve/published/2023/CVE-2023-52462.json @@ -62,6 +62,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.16", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.16", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.10.209", "lessThanOrEqual": "5.10.*", "status": "unaffected", @@ -122,7 +132,7 @@ ], "title": "bpf: fix check for attempt to corrupt spilled pointer", "x_generator": { - "engine": "bippy-8df59b4913de" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2023/CVE-2023-52524.json b/cve/published/2023/CVE-2023-52524.json index 25b55c41..bb21a536 100644 --- a/cve/published/2023/CVE-2023-52524.json +++ b/cve/published/2023/CVE-2023-52524.json @@ -62,6 +62,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.5", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.5", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.4.258", "lessThanOrEqual": "5.4.*", "status": "unaffected", @@ -122,7 +132,7 @@ ], "title": "net: nfc: llcp: Add lock when modifying device list", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2023/CVE-2023-52563.json b/cve/published/2023/CVE-2023-52563.json index 1d6a3a60..459a7032 100644 --- a/cve/published/2023/CVE-2023-52563.json +++ b/cve/published/2023/CVE-2023-52563.json @@ -50,6 +50,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.17", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.17", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.15.134", "lessThanOrEqual": "5.15.*", "status": "unaffected", @@ -92,7 +102,7 @@ ], "title": "drm/meson: fix memory leak on ->hpd_notify callback", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2023/CVE-2023-52564.json b/cve/published/2023/CVE-2023-52564.json index d05b5dcc..fff0beaf 100644 --- a/cve/published/2023/CVE-2023-52564.json +++ b/cve/published/2023/CVE-2023-52564.json @@ -56,6 +56,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.5", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.5", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.10.198", "lessThanOrEqual": "5.10.*", "status": "unaffected", @@ -107,7 +117,7 @@ ], "title": "Revert \"tty: n_gsm: fix UAF in gsm_cleanup_mux\"", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2023/CVE-2023-52565.json b/cve/published/2023/CVE-2023-52565.json index ec654b52..20019c6d 100644 --- a/cve/published/2023/CVE-2023-52565.json +++ b/cve/published/2023/CVE-2023-52565.json @@ -44,6 +44,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.3", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.3", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "6.1.56", "lessThanOrEqual": "6.1.*", "status": "unaffected", @@ -77,7 +87,7 @@ ], "title": "media: uvcvideo: Fix OOB read", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2023/CVE-2023-52567.json b/cve/published/2023/CVE-2023-52567.json index 7f76459d..54988902 100644 --- a/cve/published/2023/CVE-2023-52567.json +++ b/cve/published/2023/CVE-2023-52567.json @@ -74,6 +74,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.4", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.4", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.14.327", "lessThanOrEqual": "4.14.*", "status": "unaffected", @@ -152,7 +162,7 @@ ], "title": "serial: 8250_port: Check IRQ data before use", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2023/CVE-2023-52571.json b/cve/published/2023/CVE-2023-52571.json index f1d7a693..c0a6993a 100644 --- a/cve/published/2023/CVE-2023-52571.json +++ b/cve/published/2023/CVE-2023-52571.json @@ -44,6 +44,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.2", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.2", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "6.1.56", "lessThanOrEqual": "6.1.*", "status": "unaffected", @@ -77,7 +87,7 @@ ], "title": "power: supply: rk817: Fix node refcount leak", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2023/CVE-2023-52575.json b/cve/published/2023/CVE-2023-52575.json index 7debabd8..0e071252 100644 --- a/cve/published/2023/CVE-2023-52575.json +++ b/cve/published/2023/CVE-2023-52575.json @@ -56,6 +56,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.5", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.5", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.10.198", "lessThanOrEqual": "5.10.*", "status": "unaffected", @@ -107,7 +117,7 @@ ], "title": "x86/srso: Fix SBPB enablement for spec_rstack_overflow=off", "x_generator": { - "engine": "bippy-4986f5686161" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2023/CVE-2023-52626.json b/cve/published/2023/CVE-2023-52626.json index c83c55e2..f613c5bd 100644 --- a/cve/published/2023/CVE-2023-52626.json +++ b/cve/published/2023/CVE-2023-52626.json @@ -44,6 +44,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.7", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.7", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "6.6.15", "lessThanOrEqual": "6.6.*", "status": "unaffected", @@ -77,14 +87,14 @@ ], "title": "net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context", "x_generator": { - "engine": "bippy-b4257b672505" + "engine": "bippy-851b3ed3d212" } } }, "cveMetadata": { "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", "cveID": "CVE-2023-52626", - "requesterUserId": "lee@kernel.org", + "requesterUserId": "gregkh@kernel.org", "serial": "1", "state": "PUBLISHED" }, diff --git a/cve/published/2024/CVE-2024-26581.json b/cve/published/2024/CVE-2024-26581.json index 3051b003..c9e7c354 100644 --- a/cve/published/2024/CVE-2024-26581.json +++ b/cve/published/2024/CVE-2024-26581.json @@ -68,6 +68,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.5", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.5", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.4.269", "lessThanOrEqual": "5.4.*", "status": "unaffected", @@ -137,7 +147,7 @@ ], "title": "netfilter: nft_set_rbtree: skip end interval element from gc", "x_generator": { - "engine": "bippy-8df59b4913de" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2024/CVE-2024-26601.json b/cve/published/2024/CVE-2024-26601.json index 8d7fdd46..731894a8 100644 --- a/cve/published/2024/CVE-2024-26601.json +++ b/cve/published/2024/CVE-2024-26601.json @@ -62,6 +62,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.11", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.11", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.10.211", "lessThanOrEqual": "5.10.*", "status": "unaffected", @@ -122,7 +132,7 @@ ], "title": "ext4: regenerate buddy after block freeing failed if under fc replay", "x_generator": { - "engine": "bippy-8df59b4913de" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2024/CVE-2024-26634.json b/cve/published/2024/CVE-2024-26634.json index 30254dd1..dda57fe7 100644 --- a/cve/published/2024/CVE-2024-26634.json +++ b/cve/published/2024/CVE-2024-26634.json @@ -50,6 +50,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.6", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.6", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "6.1.76", "lessThanOrEqual": "6.1.*", "status": "unaffected", @@ -92,14 +102,14 @@ ], "title": "net: fix removing a namespace with conflicting altnames", "x_generator": { - "engine": "bippy-8df59b4913de" + "engine": "bippy-851b3ed3d212" } } }, "cveMetadata": { "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", "cveID": "CVE-2024-26634", - "requesterUserId": "lee@kernel.org", + "requesterUserId": "gregkh@kernel.org", "serial": "1", "state": "PUBLISHED" }, diff --git a/cve/published/2024/CVE-2024-26643.json b/cve/published/2024/CVE-2024-26643.json index d42bb041..f5670217 100644 --- a/cve/published/2024/CVE-2024-26643.json +++ b/cve/published/2024/CVE-2024-26643.json @@ -50,6 +50,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.5", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.5", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "6.1.84", "lessThanOrEqual": "6.1.*", "status": "unaffected", @@ -92,7 +102,7 @@ ], "title": "netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout", "x_generator": { - "engine": "bippy-d3b290d2becc" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2024/CVE-2024-26664.json b/cve/published/2024/CVE-2024-26664.json index 98c52649..b5626470 100644 --- a/cve/published/2024/CVE-2024-26664.json +++ b/cve/published/2024/CVE-2024-26664.json @@ -74,6 +74,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.1", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.1", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.19.307", "lessThanOrEqual": "4.19.*", "status": "unaffected", @@ -152,7 +162,7 @@ ], "title": "hwmon: (coretemp) Fix out-of-bounds memory access", "x_generator": { - "engine": "bippy-b4257b672505" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2024/CVE-2024-26676.json b/cve/published/2024/CVE-2024-26676.json index 54de7553..89a650e3 100644 --- a/cve/published/2024/CVE-2024-26676.json +++ b/cve/published/2024/CVE-2024-26676.json @@ -56,6 +56,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.3", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.3", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.15.149", "lessThanOrEqual": "5.15.*", "status": "unaffected", @@ -107,7 +117,7 @@ ], "title": "af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC.", "x_generator": { - "engine": "bippy-b4257b672505" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2024/CVE-2024-26695.json b/cve/published/2024/CVE-2024-26695.json index c4a3d54f..32cd11e5 100644 --- a/cve/published/2024/CVE-2024-26695.json +++ b/cve/published/2024/CVE-2024-26695.json @@ -62,6 +62,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.0", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.0", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.10.210", "lessThanOrEqual": "5.10.*", "status": "unaffected", @@ -122,7 +132,7 @@ ], "title": "crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked", "x_generator": { - "engine": "bippy-d3b290d2becc" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2024/CVE-2024-26722.json b/cve/published/2024/CVE-2024-26722.json index e6c0fea7..ddbd5130 100644 --- a/cve/published/2024/CVE-2024-26722.json +++ b/cve/published/2024/CVE-2024-26722.json @@ -74,6 +74,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.7", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.7", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.19.307", "lessThanOrEqual": "4.19.*", "status": "unaffected", @@ -152,7 +162,7 @@ ], "title": "ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()", "x_generator": { - "engine": "bippy-d3b290d2becc" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2024/CVE-2024-26731.json b/cve/published/2024/CVE-2024-26731.json index c2dcd76b..09e673f6 100644 --- a/cve/published/2024/CVE-2024-26731.json +++ b/cve/published/2024/CVE-2024-26731.json @@ -50,6 +50,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.4", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.4", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "6.1.80", "lessThanOrEqual": "6.1.*", "status": "unaffected", @@ -92,7 +102,7 @@ ], "title": "bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()", "x_generator": { - "engine": "bippy-d3b290d2becc" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2024/CVE-2024-26752.json b/cve/published/2024/CVE-2024-26752.json index 1881ab10..5dff3712 100644 --- a/cve/published/2024/CVE-2024-26752.json +++ b/cve/published/2024/CVE-2024-26752.json @@ -74,6 +74,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.6", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.6", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.19.308", "lessThanOrEqual": "4.19.*", "status": "unaffected", @@ -152,7 +162,7 @@ ], "title": "l2tp: pass correct message length to ip6_append_data", "x_generator": { - "engine": "bippy-d3b290d2becc" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2024/CVE-2024-26753.json b/cve/published/2024/CVE-2024-26753.json index 22b229e3..1729c0e5 100644 --- a/cve/published/2024/CVE-2024-26753.json +++ b/cve/published/2024/CVE-2024-26753.json @@ -56,6 +56,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.18", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.18", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.10.212", "lessThanOrEqual": "5.10.*", "status": "unaffected", @@ -107,7 +117,7 @@ ], "title": "crypto: virtio/akcipher - Fix stack overflow on memcpy", "x_generator": { - "engine": "bippy-d3b290d2becc" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2024/CVE-2024-26766.json b/cve/published/2024/CVE-2024-26766.json index 70c17c40..d669f01a 100644 --- a/cve/published/2024/CVE-2024-26766.json +++ b/cve/published/2024/CVE-2024-26766.json @@ -74,6 +74,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.3", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.3", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "4.19.308", "lessThanOrEqual": "4.19.*", "status": "unaffected", @@ -152,7 +162,7 @@ ], "title": "IB/hfi1: Fix sdma.h tx->num_descs off-by-one error", "x_generator": { - "engine": "bippy-d3b290d2becc" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2024/CVE-2024-26798.json b/cve/published/2024/CVE-2024-26798.json index 558582ec..b88e4b97 100644 --- a/cve/published/2024/CVE-2024-26798.json +++ b/cve/published/2024/CVE-2024-26798.json @@ -56,6 +56,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "6.0", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.0", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.15.151", "lessThanOrEqual": "5.15.*", "status": "unaffected", @@ -107,7 +117,7 @@ ], "title": "fbcon: always restore the old font data in fbcon_do_set_font()", "x_generator": { - "engine": "bippy-e0c11145c45e" + "engine": "bippy-851b3ed3d212" } } }, diff --git a/cve/published/2024/CVE-2024-26809.json b/cve/published/2024/CVE-2024-26809.json index b36e228d..c9703ff3 100644 --- a/cve/published/2024/CVE-2024-26809.json +++ b/cve/published/2024/CVE-2024-26809.json @@ -68,6 +68,16 @@ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "versions": [ { + "version": "5.19", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.19", + "status": "unaffected", + "versionType": "custom" + }, + { "version": "5.10.214", "lessThanOrEqual": "5.10.*", "status": "unaffected", @@ -137,7 +147,7 @@ ], "title": "netfilter: nft_set_pipapo: release elements in clone only from destroy path", "x_generator": { - "engine": "bippy-e0c11145c45e" + "engine": "bippy-851b3ed3d212" } } }, |