aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-04-04 15:12:42 +0200
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-04-04 15:12:42 +0200
commit7d07939029be8115a38f2c3ea6822b036da02e3e (patch)
tree160e9505efdbb29326c4444a3cc3442bcd6d5a15
parentc7fa97092e49c5518035fccf9a0e2d8151b33073 (diff)
downloadvulns-7d07939029be8115a38f2c3ea6822b036da02e3e.tar.gz
cve/published: update almost all mbox files
With the fixup in the cve_update grep pattern, almost all mbox files need to be regenerated to handle the updated grammer, and in some cases, a few new git ids that are being tracked properly now due to dyad being used. Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--cve/published/2019/CVE-2019-25162.mbox6
-rw-r--r--cve/published/2020/CVE-2020-36775.mbox6
-rw-r--r--cve/published/2020/CVE-2020-36777.mbox6
-rw-r--r--cve/published/2020/CVE-2020-36778.mbox17
-rw-r--r--cve/published/2020/CVE-2020-36779.mbox17
-rw-r--r--cve/published/2020/CVE-2020-36780.mbox17
-rw-r--r--cve/published/2020/CVE-2020-36781.mbox17
-rw-r--r--cve/published/2020/CVE-2020-36782.mbox17
-rw-r--r--cve/published/2020/CVE-2020-36783.mbox17
-rw-r--r--cve/published/2020/CVE-2020-36784.mbox17
-rw-r--r--cve/published/2020/CVE-2020-36785.mbox17
-rw-r--r--cve/published/2020/CVE-2020-36786.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46905.mbox9
-rw-r--r--cve/published/2021/CVE-2021-46906.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46908.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46909.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46911.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46912.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46913.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46914.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46916.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46918.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46919.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46920.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46922.mbox7
-rw-r--r--cve/published/2021/CVE-2021-46923.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46924.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46925.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46926.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46927.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46928.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46929.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46930.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46931.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46932.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46933.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46934.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46935.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46936.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46937.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46938.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46940.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46941.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46943.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46944.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46945.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46947.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46948.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46949.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46951.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46952.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46953.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46954.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46956.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46960.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46962.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46964.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46965.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46967.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46968.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46969.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46970.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46971.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46972.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46973.mbox6
-rw-r--r--cve/published/2021/CVE-2021-46976.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46977.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46978.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46980.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46982.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46984.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46985.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46986.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46988.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46991.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46992.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46993.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46994.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46995.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46996.mbox17
-rw-r--r--cve/published/2021/CVE-2021-46997.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47002.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47003.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47006.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47007.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47008.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47009.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47010.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47011.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47012.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47018.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47019.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47020.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47021.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47022.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47023.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47025.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47026.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47027.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47032.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47033.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47034.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47037.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47038.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47039.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47041.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47043.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47044.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47045.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47046.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47047.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47048.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47050.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47051.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47052.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47053.mbox17
-rw-r--r--cve/published/2021/CVE-2021-47054.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47056.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47057.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47059.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47062.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47063.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47064.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47065.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47066.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47067.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47070.mbox7
-rw-r--r--cve/published/2021/CVE-2021-47071.mbox7
-rw-r--r--cve/published/2021/CVE-2021-47073.mbox7
-rw-r--r--cve/published/2021/CVE-2021-47074.mbox7
-rw-r--r--cve/published/2021/CVE-2021-47075.mbox7
-rw-r--r--cve/published/2021/CVE-2021-47076.mbox7
-rw-r--r--cve/published/2021/CVE-2021-47077.mbox7
-rw-r--r--cve/published/2021/CVE-2021-47078.mbox7
-rw-r--r--cve/published/2021/CVE-2021-47080.mbox7
-rw-r--r--cve/published/2021/CVE-2021-47082.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47083.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47086.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47088.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47089.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47090.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47091.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47092.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47093.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47095.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47097.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47098.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47099.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47100.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47101.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47102.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47103.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47105.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47106.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47107.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47109.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47110.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47111.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47112.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47113.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47114.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47116.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47117.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47119.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47120.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47121.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47122.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47125.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47127.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47128.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47129.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47130.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47131.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47133.mbox15
-rw-r--r--cve/published/2021/CVE-2021-47137.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47138.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47139.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47140.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47141.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47142.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47143.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47144.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47145.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47146.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47147.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47148.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47149.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47150.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47151.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47152.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47153.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47158.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47159.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47160.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47161.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47163.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47164.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47166.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47167.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47168.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47169.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47170.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47171.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47173.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47174.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47175.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47176.mbox13
-rw-r--r--cve/published/2021/CVE-2021-47178.mbox14
-rw-r--r--cve/published/2021/CVE-2021-47180.mbox13
-rw-r--r--cve/published/2022/CVE-2022-48626.mbox6
-rw-r--r--cve/published/2022/CVE-2022-48627.mbox15
-rw-r--r--cve/published/2022/CVE-2022-48628.mbox15
-rw-r--r--cve/published/2022/CVE-2022-48629.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52434.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52435.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52436.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52438.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52440.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52441.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52442.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52443.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52444.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52445.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52446.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52448.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52449.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52450.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52451.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52453.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52454.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52455.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52456.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52458.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52459.json4
-rw-r--r--cve/published/2023/CVE-2023-52459.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52460.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52462.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52464.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52465.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52467.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52468.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52469.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52470.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52471.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52472.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52473.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52474.mbox6
-rw-r--r--cve/published/2023/CVE-2023-52475.mbox17
-rw-r--r--cve/published/2023/CVE-2023-52476.mbox17
-rw-r--r--cve/published/2023/CVE-2023-52477.mbox17
-rw-r--r--cve/published/2023/CVE-2023-52478.mbox17
-rw-r--r--cve/published/2023/CVE-2023-52479.mbox17
-rw-r--r--cve/published/2023/CVE-2023-52480.mbox17
-rw-r--r--cve/published/2023/CVE-2023-52481.mbox17
-rw-r--r--cve/published/2023/CVE-2023-52482.mbox17
-rw-r--r--cve/published/2023/CVE-2023-52483.mbox17
-rw-r--r--cve/published/2023/CVE-2023-52484.mbox17
-rw-r--r--cve/published/2023/CVE-2023-52485.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52486.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52487.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52488.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52489.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52490.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52491.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52492.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52493.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52495.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52498.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52499.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52500.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52501.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52502.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52503.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52504.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52505.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52506.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52507.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52508.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52509.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52510.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52511.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52512.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52513.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52516.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52517.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52518.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52519.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52520.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52522.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52523.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52526.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52527.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52528.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52531.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52532.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52559.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52560.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52561.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52566.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52568.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52569.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52570.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52571.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52572.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52573.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52574.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52576.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52578.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52580.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52582.mbox15
-rw-r--r--cve/published/2023/CVE-2023-52583.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52584.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52585.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52586.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52587.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52588.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52589.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52590.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52591.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52593.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52594.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52595.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52596.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52597.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52598.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52599.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52600.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52601.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52602.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52603.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52604.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52606.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52607.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52608.mbox4
-rw-r--r--cve/published/2023/CVE-2023-52609.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52610.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52611.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52612.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52613.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52614.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52615.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52616.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52617.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52618.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52619.mbox22
-rw-r--r--cve/published/2023/CVE-2023-52620.mbox13
-rw-r--r--cve/published/2023/CVE-2023-52621.mbox20
-rw-r--r--cve/published/2023/CVE-2023-52622.mbox20
-rw-r--r--cve/published/2023/CVE-2023-52623.mbox20
-rw-r--r--cve/published/2023/CVE-2023-52624.mbox20
-rw-r--r--cve/published/2023/CVE-2023-52625.mbox20
-rw-r--r--cve/published/2023/CVE-2023-52627.mbox20
-rw-r--r--cve/published/2023/CVE-2023-52629.mbox13
-rw-r--r--cve/published/2023/CVE-2023-52630.mbox13
-rw-r--r--cve/published/2023/CVE-2023-52631.mbox13
-rw-r--r--cve/published/2023/CVE-2023-52632.mbox13
-rw-r--r--cve/published/2023/CVE-2023-52633.mbox13
-rw-r--r--cve/published/2023/CVE-2023-52634.mbox13
-rw-r--r--cve/published/2023/CVE-2023-52635.mbox13
-rw-r--r--cve/published/2023/CVE-2023-52636.mbox13
-rw-r--r--cve/published/2023/CVE-2023-52637.mbox13
-rw-r--r--cve/published/2023/CVE-2023-52638.mbox13
-rw-r--r--cve/published/2023/CVE-2023-52639.mbox13
-rw-r--r--cve/published/2023/CVE-2023-52640.mbox13
-rw-r--r--cve/published/2023/CVE-2023-52641.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26582.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26586.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26587.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26589.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26592.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26593.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26594.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26595.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26596.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26597.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26598.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26599.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26600.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26601.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26603.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26604.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26606.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26607.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26608.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26610.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26611.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26612.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26614.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26615.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26616.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26617.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26619.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26620.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26621.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26622.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26623.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26625.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26626.mbox16
-rw-r--r--cve/published/2024/CVE-2024-26627.mbox4
-rw-r--r--cve/published/2024/CVE-2024-26630.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26631.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26632.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26635.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26636.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26637.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26638.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26640.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26641.mbox22
-rw-r--r--cve/published/2024/CVE-2024-26644.mbox20
-rw-r--r--cve/published/2024/CVE-2024-26645.mbox20
-rw-r--r--cve/published/2024/CVE-2024-26646.mbox20
-rw-r--r--cve/published/2024/CVE-2024-26647.mbox20
-rw-r--r--cve/published/2024/CVE-2024-26648.mbox20
-rw-r--r--cve/published/2024/CVE-2024-26649.mbox20
-rw-r--r--cve/published/2024/CVE-2024-26650.mbox20
-rw-r--r--cve/published/2024/CVE-2024-26651.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26652.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26658.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26659.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26660.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26661.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26662.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26663.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26665.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26666.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26667.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26668.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26669.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26671.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26672.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26673.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26674.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26675.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26677.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26678.mbox14
-rw-r--r--cve/published/2024/CVE-2024-26680.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26681.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26682.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26683.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26684.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26685.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26686.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26687.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26688.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26689.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26690.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26691.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26692.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26693.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26694.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26695.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26696.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26697.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26698.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26699.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26700.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26702.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26703.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26704.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26705.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26706.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26707.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26708.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26709.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26710.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26711.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26712.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26713.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26714.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26715.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26716.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26717.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26718.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26719.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26720.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26721.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26722.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26723.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26724.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26725.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26726.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26727.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26728.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26729.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26730.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26731.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26732.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26733.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26734.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26735.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26736.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26737.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26738.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26739.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26740.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26741.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26742.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26743.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26744.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26745.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26746.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26747.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26748.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26749.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26750.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26751.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26752.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26753.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26754.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26755.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26756.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26757.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26758.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26759.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26760.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26761.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26762.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26763.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26764.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26765.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26766.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26767.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26768.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26769.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26770.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26771.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26772.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26773.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26774.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26775.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26776.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26777.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26778.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26779.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26780.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26781.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26782.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26783.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26784.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26785.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26786.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26787.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26788.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26789.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26790.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26791.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26792.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26793.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26794.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26795.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26796.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26797.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26798.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26799.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26800.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26801.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26802.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26803.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26804.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26805.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26806.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26807.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26808.mbox13
-rw-r--r--cve/published/2024/CVE-2024-26809.mbox13
564 files changed, 1087 insertions, 5630 deletions
diff --git a/cve/published/2019/CVE-2019-25162.mbox b/cve/published/2019/CVE-2019-25162.mbox
index a605afe1..f522eccc 100644
--- a/cve/published/2019/CVE-2019-25162.mbox
+++ b/cve/published/2019/CVE-2019-25162.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2019-25162: i2c: Fix a potential use after free
@@ -32,7 +32,7 @@ Affected and fixed versions
Issue introduced in 4.3 with commit 611e12ea0f12 and fixed in 5.19.2 with commit 12b0606000d0
Issue introduced in 4.3 with commit 611e12ea0f12 and fixed in 6.0 with commit e4c72c06c367
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2020/CVE-2020-36775.mbox b/cve/published/2020/CVE-2020-36775.mbox
index 16e97dc9..653cb3d5 100644
--- a/cve/published/2020/CVE-2020-36775.mbox
+++ b/cve/published/2020/CVE-2020-36775.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2020-36775: f2fs: fix to avoid potential deadlock
@@ -24,7 +24,7 @@ Affected and fixed versions
Fixed in 5.6.7 with commit 8e8542437bb4
Fixed in 5.7 with commit df77fbd8c5b2
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2020/CVE-2020-36777.mbox b/cve/published/2020/CVE-2020-36777.mbox
index 676888ab..17a48ee8 100644
--- a/cve/published/2020/CVE-2020-36777.mbox
+++ b/cve/published/2020/CVE-2020-36777.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2020-36777: media: dvbdev: Fix memory leak in dvb_media_device_free()
@@ -31,7 +31,7 @@ Affected and fixed versions
Issue introduced in 4.5 with commit 0230d60e4661 and fixed in 5.12.3 with commit cede24d13be6
Issue introduced in 4.5 with commit 0230d60e4661 and fixed in 5.13 with commit bf9a40ae8d72
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2020/CVE-2020-36778.mbox b/cve/published/2020/CVE-2020-36778.mbox
index dce5b400..9dbd2c6a 100644
--- a/cve/published/2020/CVE-2020-36778.mbox
+++ b/cve/published/2020/CVE-2020-36778.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2020-36778: i2c: xiic: fix reference leak when pm_runtime_get_sync fails
-Message-Id: <2024022817-CVE-2020-36778-48a5@gregkh>
-Content-Length: 2276
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2336;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=wtCilUZviysT1KQXGbqfSHTylP9pw1dbPfjKsDdiAWo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XkfK/Va9LXh7UtYv4+1xE/LSXtTO5Gaos5uZWsk55
- WjRm+orHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRuUsZ5nCunPbQVkjxzNGN
- +58bzZ3C83RfhTfD/PKLE1hsvR2CnUNUuxOvPPhtpM8hDAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -43,7 +32,7 @@ Affected and fixed versions
Issue introduced in 5.6 with commit 10b17004a74c and fixed in 5.12.4 with commit a42ac16e6573
Issue introduced in 5.6 with commit 10b17004a74c and fixed in 5.13 with commit a85c5c7a3aa8
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2020/CVE-2020-36779.mbox b/cve/published/2020/CVE-2020-36779.mbox
index 3c136975..291a9897 100644
--- a/cve/published/2020/CVE-2020-36779.mbox
+++ b/cve/published/2020/CVE-2020-36779.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2020-36779: i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails
-Message-Id: <2024022819-CVE-2020-36779-9f1e@gregkh>
-Content-Length: 2291
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2351;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=HUpEZTmHky1wwpdPC5VTc3BbFy0KS4DjhQWtON4mpE0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xsdc2DDlYcnFB1PMp/oqcm074rPr6s6PJU/07Gduu
- Pzmba6kR0csC4MgE4OsmCLLl208R/dXHFL0MrQ9DTOHlQlkCAMXpwBMRG83w4Jl7xO6ss7dkeO4
- x5MQJBX39vm2p8cYFrTMPPKurcRTIdOvzWVJ3/MdbgefzAcA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -43,7 +32,7 @@ Affected and fixed versions
Issue introduced in 5.6 with commit ea6dd25deeb5 and fixed in 5.12.4 with commit c7ea772c9fcf
Issue introduced in 5.6 with commit ea6dd25deeb5 and fixed in 5.13 with commit 2c662660ce2b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2020/CVE-2020-36780.mbox b/cve/published/2020/CVE-2020-36780.mbox
index 99c48719..253b79bb 100644
--- a/cve/published/2020/CVE-2020-36780.mbox
+++ b/cve/published/2020/CVE-2020-36780.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2020-36780: i2c: sprd: fix reference leak when pm_runtime_get_sync fails
-Message-Id: <2024022820-CVE-2020-36780-9637@gregkh>
-Content-Length: 2466
-Lines: 61
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2528;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Ffy+S1lvN6e2FRZo7HzB9FznHmX9NgLca++0kVx4y+U=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XsfoB3lurjLkCf+m81pUeubpTQmTnq2/ue/5Ct3CA
- 43thme7O2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAif04zzGatn/ztduP18xKr
- ppRt1J4v9Nq/j5dhnpqAX/9B+fm/T+TPErtwaVqVz5olgQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -44,7 +33,7 @@ Affected and fixed versions
Issue introduced in 4.14 with commit 8b9ec0719834 and fixed in 5.12.4 with commit d3406ab52097
Issue introduced in 4.14 with commit 8b9ec0719834 and fixed in 5.13 with commit 3a4f32646311
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2020/CVE-2020-36781.mbox b/cve/published/2020/CVE-2020-36781.mbox
index ec2f5905..ca363c95 100644
--- a/cve/published/2020/CVE-2020-36781.mbox
+++ b/cve/published/2020/CVE-2020-36781.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2020-36781: i2c: imx: fix reference leak when pm_runtime_get_sync fails
-Message-Id: <2024022820-CVE-2020-36781-d70c@gregkh>
-Content-Length: 2277
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2337;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=WTqEMHTUgnvxdiyIGyqUJWYlOFduNT0ajymjCsz1YMQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XsckbP1s0Xf2QFtHWaLIjx8JDy68ubo+5bjonJKdM
- 7KfiaW97IhlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJ8MsyzNP9JWlUriGgNmcy
- wyWLt77H3BaeUmKY7/S0affddxveLLlebCKdtkPF+U9ZFwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -43,7 +32,7 @@ Affected and fixed versions
Issue introduced in 5.7 with commit 3a5ee18d2a32 and fixed in 5.12.4 with commit ff406f6cd09c
Issue introduced in 5.7 with commit 3a5ee18d2a32 and fixed in 5.13 with commit 47ff617217ca
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2020/CVE-2020-36782.mbox b/cve/published/2020/CVE-2020-36782.mbox
index 87e025ae..56e308ed 100644
--- a/cve/published/2020/CVE-2020-36782.mbox
+++ b/cve/published/2020/CVE-2020-36782.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2020-36782: i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails
-Message-Id: <2024022820-CVE-2020-36782-e7d8@gregkh>
-Content-Length: 2455
-Lines: 61
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2517;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=RZf9AqyUF6LNpqCKwo1+659KNQoe4w16YqC6IW+54Oc=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XsdUlrqrCLFPDA2wD+KdnOm3ij/en+P4bQWHuqJ99
- yK+vWLpiGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIloLGZYMC/uiufyIq2Uxw93
- J1z7lij+avXTVoYFOxk47h6Z6KzDmW53Nz7yzBTZmkuaAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -44,7 +33,7 @@ Affected and fixed versions
Issue introduced in 4.16 with commit 13d6eb20fc79 and fixed in 5.12.4 with commit b100650d80cd
Issue introduced in 4.16 with commit 13d6eb20fc79 and fixed in 5.13 with commit 278e5bbdb9a9
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2020/CVE-2020-36783.mbox b/cve/published/2020/CVE-2020-36783.mbox
index 2a7560d5..b4ad2c2c 100644
--- a/cve/published/2020/CVE-2020-36783.mbox
+++ b/cve/published/2020/CVE-2020-36783.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2020-36783: i2c: img-scb: fix reference leak when pm_runtime_get_sync fails
-Message-Id: <2024022820-CVE-2020-36783-8372@gregkh>
-Content-Length: 2467
-Lines: 61
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2529;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=KR3Y4z6oRh6FGqAaXzMi8l242N3gdEOqZbCx4H0yiwQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XsdqM846NNmjz7pClXeS15oDOWrc77WD1Bc2r+py0
- ROy0vHtiGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIn862KYX69XL7Pz2C+Lted0
- V3t/qWOI/rMkgmG+qx/rRLdS9nWT271uLKyeKvtQw/0dAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -44,7 +33,7 @@ Affected and fixed versions
Issue introduced in 4.15 with commit 93222bd9b966 and fixed in 5.12.4 with commit 7ee35cde1e81
Issue introduced in 4.15 with commit 93222bd9b966 and fixed in 5.13 with commit 223125e37af8
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2020/CVE-2020-36784.mbox b/cve/published/2020/CVE-2020-36784.mbox
index 1d334fcf..074641b4 100644
--- a/cve/published/2020/CVE-2020-36784.mbox
+++ b/cve/published/2020/CVE-2020-36784.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2020-36784: i2c: cadence: fix reference leak when pm_runtime_get_sync fails
-Message-Id: <2024022821-CVE-2020-36784-a266@gregkh>
-Content-Length: 2296
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2356;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=PuywVSBnGtd6f/4s+AjwJ5DTiklemrtZhBE2OxGGrww=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xsc+MpDuXM75dOU2zbvNecZveK+zxf+Vys5KYfS/r
- tWW9FWiI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACZi4c4wT2F577/1zy0uzGxq
- 199cd+Q9h7/SNYYF848XpIbMeaqXomrZbCexlPdB5vfjAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -43,7 +32,7 @@ Affected and fixed versions
Issue introduced in 4.5 with commit 7fa32329ca03 and fixed in 5.12.4 with commit a45fc41beed8
Issue introduced in 4.5 with commit 7fa32329ca03 and fixed in 5.13 with commit 23ceb8462dc6
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2020/CVE-2020-36785.mbox b/cve/published/2020/CVE-2020-36785.mbox
index ab5d9fd7..f2d4adf4 100644
--- a/cve/published/2020/CVE-2020-36785.mbox
+++ b/cve/published/2020/CVE-2020-36785.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2020-36785: media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs()
-Message-Id: <2024022821-CVE-2020-36785-96c7@gregkh>
-Content-Length: 2109
-Lines: 52
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2162;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=fqDL0QYKj60woaNkYGGwDkX5qaLM0Hjl/Apb6pfzx4g=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xsc+E9np/+Zv/Bz77B/fU+asXiimy8nspyRzaJrq+
- aLDprv1O2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiac8YFiz5uvSagldQ9V4X
- l3kqE1w6d0f/SWJY0DNpz37r21yVF9cp5zI3xXNG828qBAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -36,7 +25,7 @@ Affected and fixed versions
Issue introduced in 5.8 with commit ad85094b293e and fixed in 5.12.4 with commit 8267ccd7b9df
Issue introduced in 5.8 with commit ad85094b293e and fixed in 5.13 with commit ba11bbf303fa
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2020/CVE-2020-36786.mbox b/cve/published/2020/CVE-2020-36786.mbox
index f6766df9..b9849b90 100644
--- a/cve/published/2020/CVE-2020-36786.mbox
+++ b/cve/published/2020/CVE-2020-36786.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2020-36786: media: [next] staging: media: atomisp: fix memory leak of object flash
-Message-Id: <2024022821-CVE-2020-36786-fa2b@gregkh>
-Content-Length: 2237
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2292;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=EAf5JMVIKVu4I6WCzfOxAxtcQjnhP85RpUSJ65j/Dgs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XsduzM9fptykeuXh7YkvMto2hy6QLF/+zz/z9VWNX
- a9NBf06OmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAisTwMC5rNl7+535DJomeq
- OzksvWStM7eSKsP8AEv2zsD6hy19TM+3XKjaqnCssmcJAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -38,7 +27,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 9289cdf39992 and fixed in 5.12.4 with commit 27d2eab69f7d
Issue introduced in 5.10 with commit 9289cdf39992 and fixed in 5.13 with commit 6045b01dd0e3
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46905.mbox b/cve/published/2021/CVE-2021-46905.mbox
index a721c51e..c01b51f6 100644
--- a/cve/published/2021/CVE-2021-46905.mbox
+++ b/cve/published/2021/CVE-2021-46905.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46905: net: hso: fix NULL-deref on disconnect regression
@@ -32,7 +32,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit 8a12f8836145 and fixed in 5.12.1 with commit 41c44e1f3112
Issue introduced in 5.12 with commit 8a12f8836145 and fixed in 5.13 with commit 2ad5692db728
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
@@ -59,6 +59,9 @@ release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
+ https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554
+ https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570e
+ https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1
https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725
https://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e
https://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273
diff --git a/cve/published/2021/CVE-2021-46906.mbox b/cve/published/2021/CVE-2021-46906.mbox
index 42d568af..9cb47cff 100644
--- a/cve/published/2021/CVE-2021-46906.mbox
+++ b/cve/published/2021/CVE-2021-46906.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46906: HID: usbhid: fix info leak in hid_submit_ctrl
@@ -36,7 +36,7 @@ Affected and fixed versions
Fixed in 5.12.12 with commit 21883bff0fd8
Fixed in 5.13 with commit 6be388f4a35d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46908.mbox b/cve/published/2021/CVE-2021-46908.mbox
index 65755803..397a0b01 100644
--- a/cve/published/2021/CVE-2021-46908.mbox
+++ b/cve/published/2021/CVE-2021-46908.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46908: bpf: Use correct permission flag for mixed signed bounds arithmetic
@@ -25,7 +25,7 @@ Affected and fixed versions
Issue introduced in 5.8 with commit 2c78ee898d8f and fixed in 5.11.16 with commit 4ccdc6c6cae3
Issue introduced in 5.8 with commit 2c78ee898d8f and fixed in 5.12 with commit 960114839252
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46909.mbox b/cve/published/2021/CVE-2021-46909.mbox
index 826355f3..e95601af 100644
--- a/cve/published/2021/CVE-2021-46909.mbox
+++ b/cve/published/2021/CVE-2021-46909.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46909: ARM: footbridge: fix PCI interrupt mapping
@@ -30,7 +30,7 @@ Affected and fixed versions
Issue introduced in 4.13 with commit 30fdfb929e82 and fixed in 5.11.16 with commit c3efce8cc980
Issue introduced in 4.13 with commit 30fdfb929e82 and fixed in 5.12 with commit 30e3b4f256b4
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46911.mbox b/cve/published/2021/CVE-2021-46911.mbox
index c65e5223..37295c2b 100644
--- a/cve/published/2021/CVE-2021-46911.mbox
+++ b/cve/published/2021/CVE-2021-46911.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46911: ch_ktls: Fix kernel panic
@@ -25,7 +25,7 @@ Affected and fixed versions
Issue introduced in 5.7 with commit 5a4b9fe7fece and fixed in 5.11.16 with commit 8348665d4181
Issue introduced in 5.7 with commit 5a4b9fe7fece and fixed in 5.12 with commit 1a73e427b824
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46912.mbox b/cve/published/2021/CVE-2021-46912.mbox
index c094ff96..df7868c4 100644
--- a/cve/published/2021/CVE-2021-46912.mbox
+++ b/cve/published/2021/CVE-2021-46912.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46912: net: Make tcp_allowed_congestion_control readonly in non-init netns
@@ -50,7 +50,7 @@ Affected and fixed versions
Issue introduced in 5.7 with commit 9cb8e048e5d9 and fixed in 5.11.16 with commit 1ccdf1bed140
Issue introduced in 5.7 with commit 9cb8e048e5d9 and fixed in 5.12 with commit 97684f0970f6
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46913.mbox b/cve/published/2021/CVE-2021-46913.mbox
index 991e40ca..42e7b303 100644
--- a/cve/published/2021/CVE-2021-46913.mbox
+++ b/cve/published/2021/CVE-2021-46913.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46913: netfilter: nftables: clone set element expression template
@@ -41,7 +41,7 @@ Affected and fixed versions
Issue introduced in 5.7 with commit 409444522976 and fixed in 5.11.16 with commit 47d8de3c2265
Issue introduced in 5.7 with commit 409444522976 and fixed in 5.12 with commit 4d8f9065830e
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46914.mbox b/cve/published/2021/CVE-2021-46914.mbox
index 0d5191ce..b41dece0 100644
--- a/cve/published/2021/CVE-2021-46914.mbox
+++ b/cve/published/2021/CVE-2021-46914.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46914: ixgbe: fix unbalanced device enable/disable in suspend/resume
@@ -46,7 +46,7 @@ Affected and fixed versions
Issue introduced in 5.9 with commit 6f82b2558735 and fixed in 5.11.16 with commit f1b4be4a753c
Issue introduced in 5.9 with commit 6f82b2558735 and fixed in 5.12 with commit debb9df31158
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46916.mbox b/cve/published/2021/CVE-2021-46916.mbox
index c75fb958..0a4d136a 100644
--- a/cve/published/2021/CVE-2021-46916.mbox
+++ b/cve/published/2021/CVE-2021-46916.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46916: ixgbe: Fix NULL pointer dereference in ethtool loopback test
@@ -29,7 +29,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit b02e5a0ebb17 and fixed in 5.11.16 with commit 758d19098df4
Issue introduced in 5.11 with commit b02e5a0ebb17 and fixed in 5.12 with commit 31166efb1cee
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46918.mbox b/cve/published/2021/CVE-2021-46918.mbox
index 4272928a..6321f24b 100644
--- a/cve/published/2021/CVE-2021-46918.mbox
+++ b/cve/published/2021/CVE-2021-46918.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46918: dmaengine: idxd: clear MSIX permission entry on shutdown
@@ -24,7 +24,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit 8e50d392652f and fixed in 5.11.16 with commit c84b8982d7aa
Issue introduced in 5.11 with commit 8e50d392652f and fixed in 5.12 with commit 6df0e6c57dfc
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46919.mbox b/cve/published/2021/CVE-2021-46919.mbox
index e9321158..78bbeaab 100644
--- a/cve/published/2021/CVE-2021-46919.mbox
+++ b/cve/published/2021/CVE-2021-46919.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46919: dmaengine: idxd: fix wq size store permission state
@@ -25,7 +25,7 @@ Affected and fixed versions
Issue introduced in 5.6 with commit c52ca478233c and fixed in 5.11.16 with commit 05b7791c4c4a
Issue introduced in 5.6 with commit c52ca478233c and fixed in 5.12 with commit 0fff71c5a311
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46920.mbox b/cve/published/2021/CVE-2021-46920.mbox
index 54daea24..4a2352c0 100644
--- a/cve/published/2021/CVE-2021-46920.mbox
+++ b/cve/published/2021/CVE-2021-46920.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46920: dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback
@@ -25,7 +25,7 @@ Affected and fixed versions
Issue introduced in 5.6 with commit bfe1d56091c1 and fixed in 5.11.16 with commit 02981a44a0e4
Issue introduced in 5.6 with commit bfe1d56091c1 and fixed in 5.12 with commit ea941ac294d7
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46922.mbox b/cve/published/2021/CVE-2021-46922.mbox
index 9a865ada..e70d98ba 100644
--- a/cve/published/2021/CVE-2021-46922.mbox
+++ b/cve/published/2021/CVE-2021-46922.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46922: KEYS: trusted: Fix TPM reservation for seal/unseal
@@ -31,7 +31,7 @@ Affected and fixed versions
Issue introduced in 5.10.20 with commit 67118bb78d72 and fixed in 5.10.33 with commit bf84ef2dd2cc
Issue introduced in 5.11.3 with commit 498b8fc1cdc1 and fixed in 5.11.17 with commit 39c8d760d44c
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
@@ -60,3 +60,4 @@ the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/bf84ef2dd2ccdcd8f2658476d34b51455f970ce4
https://git.kernel.org/stable/c/39c8d760d44cb3fa0d67e8cd505df81cf4d80999
+ https://git.kernel.org/stable/c/9d5171eab462a63e2fbebfccf6026e92be018f20
diff --git a/cve/published/2021/CVE-2021-46923.mbox b/cve/published/2021/CVE-2021-46923.mbox
index fdf72b2d..dd4a0418 100644
--- a/cve/published/2021/CVE-2021-46923.mbox
+++ b/cve/published/2021/CVE-2021-46923.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46923: fs/mount_setattr: always cleanup mount_kattr
@@ -26,7 +26,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit 9caccd41541a and fixed in 5.15.13 with commit 47b5d0a7532d
Issue introduced in 5.12 with commit 9caccd41541a and fixed in 5.16 with commit 012e332286e2
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46924.mbox b/cve/published/2021/CVE-2021-46924.mbox
index ad409085..fdffef5f 100644
--- a/cve/published/2021/CVE-2021-46924.mbox
+++ b/cve/published/2021/CVE-2021-46924.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46924: NFC: st21nfca: Fix memory leak in device probe and remove
@@ -41,7 +41,7 @@ Affected and fixed versions
Issue introduced in 3.16 with commit 68957303f44a and fixed in 5.15.13 with commit 238920381b89
Issue introduced in 3.16 with commit 68957303f44a and fixed in 5.16 with commit 1b9dadba5022
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46925.mbox b/cve/published/2021/CVE-2021-46925.mbox
index f13805f7..48e0e705 100644
--- a/cve/published/2021/CVE-2021-46925.mbox
+++ b/cve/published/2021/CVE-2021-46925.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46925: net/smc: fix kernel panic caused by race of smc_sock
@@ -78,7 +78,7 @@ Affected and fixed versions
Issue introduced in 4.11 with commit 5f08318f617b and fixed in 5.15.13 with commit b85f751d71ae
Issue introduced in 4.11 with commit 5f08318f617b and fixed in 5.16 with commit 349d43127dac
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46926.mbox b/cve/published/2021/CVE-2021-46926.mbox
index 4c786b43..251b383f 100644
--- a/cve/published/2021/CVE-2021-46926.mbox
+++ b/cve/published/2021/CVE-2021-46926.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46926: ALSA: hda: intel-sdw-acpi: harden detection of controller
@@ -28,7 +28,7 @@ Affected and fixed versions
Fixed in 5.15.13 with commit cce476954401
Fixed in 5.16 with commit 385f287f9853
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46927.mbox b/cve/published/2021/CVE-2021-46927.mbox
index 95fab49a..6489a37c 100644
--- a/cve/published/2021/CVE-2021-46927.mbox
+++ b/cve/published/2021/CVE-2021-46927.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46927: nitro_enclaves: Use get_user_pages_unlocked() call to handle mmap assert
@@ -52,7 +52,7 @@ Affected and fixed versions
Issue introduced in 5.15 with commit 5b78ed24e8ec and fixed in 5.15.13 with commit 90d2beed5e75
Issue introduced in 5.15 with commit 5b78ed24e8ec and fixed in 5.16 with commit 3a0152b21952
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46928.mbox b/cve/published/2021/CVE-2021-46928.mbox
index 48f305ea..3f56c077 100644
--- a/cve/published/2021/CVE-2021-46928.mbox
+++ b/cve/published/2021/CVE-2021-46928.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46928: parisc: Clear stale IIR value on instruction access rights trap
@@ -32,7 +32,7 @@ Affected and fixed versions
Fixed in 5.15.13 with commit e96373f0a5f4
Fixed in 5.16 with commit 484730e5862f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46929.mbox b/cve/published/2021/CVE-2021-46929.mbox
index 683e7ba9..bc18d50e 100644
--- a/cve/published/2021/CVE-2021-46929.mbox
+++ b/cve/published/2021/CVE-2021-46929.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46929: sctp: use call_rcu to free endpoint
@@ -81,7 +81,7 @@ Affected and fixed versions
Issue introduced in 4.14 with commit d25adbeb0cdb and fixed in 5.15.13 with commit 75799e71df1d
Issue introduced in 4.14 with commit d25adbeb0cdb and fixed in 5.16 with commit 5ec7d18d1813
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46930.mbox b/cve/published/2021/CVE-2021-46930.mbox
index 897b41ba..f4253cf9 100644
--- a/cve/published/2021/CVE-2021-46930.mbox
+++ b/cve/published/2021/CVE-2021-46930.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46930: usb: mtu3: fix list_head check warning
@@ -40,7 +40,7 @@ Affected and fixed versions
Issue introduced in 5.2 with commit 83374e035b62 and fixed in 5.15.13 with commit 249ddfbe0057
Issue introduced in 5.2 with commit 83374e035b62 and fixed in 5.16 with commit 8c313e3bfd9a
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46931.mbox b/cve/published/2021/CVE-2021-46931.mbox
index 23397c88..9eab9014 100644
--- a/cve/published/2021/CVE-2021-46931.mbox
+++ b/cve/published/2021/CVE-2021-46931.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46931: net/mlx5e: Wrap the tx reporter dump callback to extract the sq
@@ -64,7 +64,7 @@ Affected and fixed versions
Issue introduced in 5.7 with commit 5f29458b77d5 and fixed in 5.15.13 with commit 07f13d58a8ec
Issue introduced in 5.7 with commit 5f29458b77d5 and fixed in 5.16 with commit 918fc3855a65
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46932.mbox b/cve/published/2021/CVE-2021-46932.mbox
index 1ea228ff..da63f4da 100644
--- a/cve/published/2021/CVE-2021-46932.mbox
+++ b/cve/published/2021/CVE-2021-46932.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46932: Input: appletouch - initialize work before device registration
@@ -36,7 +36,7 @@ Affected and fixed versions
Issue introduced in 2.6.23 with commit 5a6eb676d3bc and fixed in 5.15.13 with commit e79ff8c68acb
Issue introduced in 2.6.23 with commit 5a6eb676d3bc and fixed in 5.16 with commit 9f3ccdc3f6ef
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46933.mbox b/cve/published/2021/CVE-2021-46933.mbox
index 720ae45d..423f5aae 100644
--- a/cve/published/2021/CVE-2021-46933.mbox
+++ b/cve/published/2021/CVE-2021-46933.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46933: usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
@@ -95,7 +95,7 @@ Affected and fixed versions
Issue introduced in 4.0 with commit 5e33f6fdf735 and fixed in 5.15.13 with commit ebef2aa29f37
Issue introduced in 4.0 with commit 5e33f6fdf735 and fixed in 5.16 with commit b1e088737942
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46934.mbox b/cve/published/2021/CVE-2021-46934.mbox
index 7cb1615e..fb9fa97f 100644
--- a/cve/published/2021/CVE-2021-46934.mbox
+++ b/cve/published/2021/CVE-2021-46934.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46934: i2c: validate user data in compat ioctl
@@ -28,7 +28,7 @@ Affected and fixed versions
Issue introduced in 4.15 with commit 7d5cb45655f2 and fixed in 5.15.13 with commit f68599581067
Issue introduced in 4.15 with commit 7d5cb45655f2 and fixed in 5.16 with commit bb436283e25a
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46935.mbox b/cve/published/2021/CVE-2021-46935.mbox
index 4bd27eff..41aef2b4 100644
--- a/cve/published/2021/CVE-2021-46935.mbox
+++ b/cve/published/2021/CVE-2021-46935.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46935: binder: fix async_free_space accounting for empty parcels
@@ -41,7 +41,7 @@ Affected and fixed versions
Issue introduced in 4.14 with commit 74310e06be4d and fixed in 5.15.13 with commit 17691bada6b2
Issue introduced in 4.14 with commit 74310e06be4d and fixed in 5.16 with commit cfd0d84ba28c
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46936.mbox b/cve/published/2021/CVE-2021-46936.mbox
index e91d5220..24b3d8e6 100644
--- a/cve/published/2021/CVE-2021-46936.mbox
+++ b/cve/published/2021/CVE-2021-46936.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46936: net: fix use-after-free in tw_timer_handler
@@ -64,7 +64,7 @@ Affected and fixed versions
Issue introduced in 2.6.27 with commit 61a7e26028b9 and fixed in 5.15.13 with commit 08eacbd141e2
Issue introduced in 2.6.27 with commit 61a7e26028b9 and fixed in 5.16 with commit e22e45fc9e41
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46937.mbox b/cve/published/2021/CVE-2021-46937.mbox
index 8a05f7b9..4ac10a44 100644
--- a/cve/published/2021/CVE-2021-46937.mbox
+++ b/cve/published/2021/CVE-2021-46937.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46937: mm/damon/dbgfs: fix 'struct pid' leaks in 'dbgfs_target_ids_write()'
@@ -31,7 +31,7 @@ Affected and fixed versions
Issue introduced in 5.15 with commit 4bc05954d007 and fixed in 5.15.13 with commit ffe4a1ba1a82
Issue introduced in 5.15 with commit 4bc05954d007 and fixed in 5.16 with commit ebb3f994dd92
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46938.mbox b/cve/published/2021/CVE-2021-46938.mbox
index b5b4b2d6..18747d5e 100644
--- a/cve/published/2021/CVE-2021-46938.mbox
+++ b/cve/published/2021/CVE-2021-46938.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46938: dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails
@@ -81,7 +81,7 @@ Affected and fixed versions
Issue introduced in 4.6 with commit 1c357a1e86a4 and fixed in 5.12.3 with commit d757bf4c69cd
Issue introduced in 4.6 with commit 1c357a1e86a4 and fixed in 5.13 with commit 8e947c8f4a56
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46940.mbox b/cve/published/2021/CVE-2021-46940.mbox
index e29ef793..619765ab 100644
--- a/cve/published/2021/CVE-2021-46940.mbox
+++ b/cve/published/2021/CVE-2021-46940.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46940: tools/power turbostat: Fix offset overflow issue in index converting
@@ -29,7 +29,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 9972d5d84d76 and fixed in 5.12.3 with commit 337b1546cde8
Issue introduced in 5.10 with commit 9972d5d84d76 and fixed in 5.13 with commit 13a779de4175
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46941.mbox b/cve/published/2021/CVE-2021-46941.mbox
index 1d643724..156942f0 100644
--- a/cve/published/2021/CVE-2021-46941.mbox
+++ b/cve/published/2021/CVE-2021-46941.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46941: usb: dwc3: core: Do core softreset when switch mode
@@ -51,7 +51,7 @@ Affected and fixed versions
Issue introduced in 4.12 with commit 41ce1456e1db and fixed in 5.12.3 with commit 1c10fd60c859
Issue introduced in 4.12 with commit 41ce1456e1db and fixed in 5.13 with commit f88359e1588b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46943.mbox b/cve/published/2021/CVE-2021-46943.mbox
index d33cbcf3..64863e81 100644
--- a/cve/published/2021/CVE-2021-46943.mbox
+++ b/cve/published/2021/CVE-2021-46943.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46943: media: staging/intel-ipu3: Fix set_fmt error handling
@@ -33,7 +33,7 @@ Affected and fixed versions
Issue introduced in 5.2 with commit 6d5f26f2e045 and fixed in 5.12.3 with commit 6fb617e37a39
Issue introduced in 5.2 with commit 6d5f26f2e045 and fixed in 5.13 with commit ad91849996f9
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46944.mbox b/cve/published/2021/CVE-2021-46944.mbox
index 7de9f02d..06ded74c 100644
--- a/cve/published/2021/CVE-2021-46944.mbox
+++ b/cve/published/2021/CVE-2021-46944.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46944: media: staging/intel-ipu3: Fix memory leak in imu_fmt
@@ -26,7 +26,7 @@ Affected and fixed versions
Issue introduced in 5.2 with commit 6d5f26f2e045 and fixed in 5.12.3 with commit 74ba0adb5e98
Issue introduced in 5.2 with commit 6d5f26f2e045 and fixed in 5.13 with commit 3630901933af
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46945.mbox b/cve/published/2021/CVE-2021-46945.mbox
index 495f1dc1..42bdaeee 100644
--- a/cve/published/2021/CVE-2021-46945.mbox
+++ b/cve/published/2021/CVE-2021-46945.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46945: ext4: always panic when errors=panic is specified
@@ -45,7 +45,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit 014c9caa29d3 and fixed in 5.12.3 with commit 1e9ea8f46370
Issue introduced in 5.11 with commit 014c9caa29d3 and fixed in 5.13 with commit ac2f7ca51b09
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46947.mbox b/cve/published/2021/CVE-2021-46947.mbox
index 5e19963e..8a5592f6 100644
--- a/cve/published/2021/CVE-2021-46947.mbox
+++ b/cve/published/2021/CVE-2021-46947.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46947: sfc: adjust efx->xdp_tx_queue_count with the real number of initialized queues
@@ -53,7 +53,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit e26ca4b53582 and fixed in 5.12.3 with commit ebeac958b690
Issue introduced in 5.12 with commit e26ca4b53582 and fixed in 5.13 with commit 99ba0ea616aa
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46948.mbox b/cve/published/2021/CVE-2021-46948.mbox
index d1ef118c..51c3e081 100644
--- a/cve/published/2021/CVE-2021-46948.mbox
+++ b/cve/published/2021/CVE-2021-46948.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46948: sfc: farch: fix TX queue lookup in TX event handling
@@ -26,7 +26,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 12804793b17c and fixed in 5.12.3 with commit e531db1ea6f9
Issue introduced in 5.10 with commit 12804793b17c and fixed in 5.13 with commit 83b09a180741
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46949.mbox b/cve/published/2021/CVE-2021-46949.mbox
index 60b7e7e2..8f1706b5 100644
--- a/cve/published/2021/CVE-2021-46949.mbox
+++ b/cve/published/2021/CVE-2021-46949.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46949: sfc: farch: fix TX queue lookup in TX flush done handling
@@ -26,7 +26,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 12804793b17c and fixed in 5.12.3 with commit 98d911807489
Issue introduced in 5.10 with commit 12804793b17c and fixed in 5.13 with commit 5b1faa92289b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46951.mbox b/cve/published/2021/CVE-2021-46951.mbox
index c50af909..0fc31f94 100644
--- a/cve/published/2021/CVE-2021-46951.mbox
+++ b/cve/published/2021/CVE-2021-46951.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46951: tpm: efi: Use local variable for calculating final log size
@@ -53,7 +53,7 @@ Affected and fixed versions
Issue introduced in 5.3 with commit 166a2809d65b and fixed in 5.12.3 with commit ac07c557ca12
Issue introduced in 5.3 with commit 166a2809d65b and fixed in 5.13 with commit 48cff270b037
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46952.mbox b/cve/published/2021/CVE-2021-46952.mbox
index fae79f57..657e7d54 100644
--- a/cve/published/2021/CVE-2021-46952.mbox
+++ b/cve/published/2021/CVE-2021-46952.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46952: NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
@@ -30,7 +30,7 @@ Affected and fixed versions
Issue introduced in 5.6 with commit 9954bf92c0cd and fixed in 5.12.3 with commit 3d0163821c03
Issue introduced in 5.6 with commit 9954bf92c0cd and fixed in 5.13 with commit c09f11ef3595
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46953.mbox b/cve/published/2021/CVE-2021-46953.mbox
index 9ef74c0d..bdc06391 100644
--- a/cve/published/2021/CVE-2021-46953.mbox
+++ b/cve/published/2021/CVE-2021-46953.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46953: ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure
@@ -37,7 +37,7 @@ Affected and fixed versions
Issue introduced in 4.12 with commit ca9ae5ec4ef0 and fixed in 5.12.3 with commit 596e079c362a
Issue introduced in 4.12 with commit ca9ae5ec4ef0 and fixed in 5.13 with commit 1ecd5b129252
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46954.mbox b/cve/published/2021/CVE-2021-46954.mbox
index 524cf377..1fcdf006 100644
--- a/cve/published/2021/CVE-2021-46954.mbox
+++ b/cve/published/2021/CVE-2021-46954.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46954: net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets
@@ -98,7 +98,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit c129412f74e9 and fixed in 5.12.3 with commit 8e6dfb7beeb6
Issue introduced in 5.11 with commit c129412f74e9 and fixed in 5.13 with commit 31fe34a0118e
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46956.mbox b/cve/published/2021/CVE-2021-46956.mbox
index e401529d..101f3eb3 100644
--- a/cve/published/2021/CVE-2021-46956.mbox
+++ b/cve/published/2021/CVE-2021-46956.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46956: virtiofs: fix memory leak in virtio_fs_probe()
@@ -52,7 +52,7 @@ Affected and fixed versions
Issue introduced in 5.4 with commit a62a8ef9d97d and fixed in 5.12.3 with commit 5116e79fc6e6
Issue introduced in 5.4 with commit a62a8ef9d97d and fixed in 5.13 with commit c79c5e017892
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46960.mbox b/cve/published/2021/CVE-2021-46960.mbox
index c02445a5..7e25299c 100644
--- a/cve/published/2021/CVE-2021-46960.mbox
+++ b/cve/published/2021/CVE-2021-46960.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46960: cifs: Return correct error code from smb2_get_enc_key
@@ -46,7 +46,7 @@ Affected and fixed versions
Issue introduced in 4.11 with commit 61cfac6f267d and fixed in 5.12.3 with commit b399c1a3ea0b
Issue introduced in 4.11 with commit 61cfac6f267d and fixed in 5.13 with commit 83728cbf366e
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46962.mbox b/cve/published/2021/CVE-2021-46962.mbox
index e5d0364e..c220f45b 100644
--- a/cve/published/2021/CVE-2021-46962.mbox
+++ b/cve/published/2021/CVE-2021-46962.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46962: mmc: uniphier-sd: Fix a resource leak in the remove function
@@ -30,7 +30,7 @@ Affected and fixed versions
Issue introduced in 4.20 with commit 3fd784f745dd and fixed in 5.12.3 with commit d6e7fda49697
Issue introduced in 4.20 with commit 3fd784f745dd and fixed in 5.13 with commit e29c84857e2d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46964.mbox b/cve/published/2021/CVE-2021-46964.mbox
index ca762e95..3fa9160b 100644
--- a/cve/published/2021/CVE-2021-46964.mbox
+++ b/cve/published/2021/CVE-2021-46964.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46964: scsi: qla2xxx: Reserve extra IRQ vectors
@@ -89,7 +89,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit a6dcfe08487e and fixed in 5.12.3 with commit 0f86d66b3850
Issue introduced in 5.11 with commit a6dcfe08487e and fixed in 5.13 with commit f02d4086a8f3
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46965.mbox b/cve/published/2021/CVE-2021-46965.mbox
index 08f99302..0dca8e5a 100644
--- a/cve/published/2021/CVE-2021-46965.mbox
+++ b/cve/published/2021/CVE-2021-46965.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46965: mtd: physmap: physmap-bt1-rom: Fix unintentional stack access
@@ -31,7 +31,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit b3e79e7682e0 and fixed in 5.12.3 with commit 4d786870e326
Issue introduced in 5.10 with commit b3e79e7682e0 and fixed in 5.13 with commit 683313993dbe
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46967.mbox b/cve/published/2021/CVE-2021-46967.mbox
index 8ce3db2f..88c88184 100644
--- a/cve/published/2021/CVE-2021-46967.mbox
+++ b/cve/published/2021/CVE-2021-46967.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46967: vhost-vdpa: fix vm_flags for virtqueue doorbell mapping
@@ -30,7 +30,7 @@ Affected and fixed versions
Issue introduced in 5.8 with commit ddd89d0a059d and fixed in 5.12.3 with commit 93dbbf20e3ff
Issue introduced in 5.8 with commit ddd89d0a059d and fixed in 5.13 with commit 3a3e0fad16d4
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46968.mbox b/cve/published/2021/CVE-2021-46968.mbox
index 016bce7a..f549395d 100644
--- a/cve/published/2021/CVE-2021-46968.mbox
+++ b/cve/published/2021/CVE-2021-46968.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46968: s390/zcrypt: fix zcard and zqueue hot-unplug memleak
@@ -32,7 +32,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 29c2680fd2bf and fixed in 5.12.3 with commit 971dc8706cee
Issue introduced in 5.10 with commit 29c2680fd2bf and fixed in 5.13 with commit 70fac8088cfa
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46969.mbox b/cve/published/2021/CVE-2021-46969.mbox
index ffc58838..1b2566cb 100644
--- a/cve/published/2021/CVE-2021-46969.mbox
+++ b/cve/published/2021/CVE-2021-46969.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46969: bus: mhi: core: Fix invalid error returning in mhi_queue
@@ -34,7 +34,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit a8f75cb348fd and fixed in 5.12.3 with commit a99b661c3187
Issue introduced in 5.12 with commit a8f75cb348fd and fixed in 5.13 with commit 0ecc1c70dcd3
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46970.mbox b/cve/published/2021/CVE-2021-46970.mbox
index 04b85c1a..4506220c 100644
--- a/cve/published/2021/CVE-2021-46970.mbox
+++ b/cve/published/2021/CVE-2021-46970.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46970: bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue
@@ -53,7 +53,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit 8f7039787687 and fixed in 5.12.3 with commit ed541cff35cb
Issue introduced in 5.11 with commit 8f7039787687 and fixed in 5.13 with commit 0fccbf0a3b69
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46971.mbox b/cve/published/2021/CVE-2021-46971.mbox
index 3de9cc73..ff155866 100644
--- a/cve/published/2021/CVE-2021-46971.mbox
+++ b/cve/published/2021/CVE-2021-46971.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46971: perf/core: Fix unconditional security_locked_down() call
@@ -37,7 +37,7 @@ Affected and fixed versions
Issue introduced in 5.4 with commit b0c8fdc7fdb7 and fixed in 5.12.2 with commit c7b0208ee370
Issue introduced in 5.4 with commit b0c8fdc7fdb7 and fixed in 5.13 with commit 08ef1af4de5f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46972.mbox b/cve/published/2021/CVE-2021-46972.mbox
index 63e76a61..80b170da 100644
--- a/cve/published/2021/CVE-2021-46972.mbox
+++ b/cve/published/2021/CVE-2021-46972.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46972: ovl: fix leaked dentry
@@ -66,7 +66,7 @@ Affected and fixed versions
Issue introduced in 5.8 with commit 6815f479ca90 and fixed in 5.12.2 with commit d587cfaef72b
Issue introduced in 5.8 with commit 6815f479ca90 and fixed in 5.13 with commit eaab1d45cdb4
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46973.mbox b/cve/published/2021/CVE-2021-46973.mbox
index 4e748ba3..89f6a735 100644
--- a/cve/published/2021/CVE-2021-46973.mbox
+++ b/cve/published/2021/CVE-2021-46973.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46973: net: qrtr: Avoid potential use after free in MHI send
@@ -31,7 +31,7 @@ Affected and fixed versions
Issue introduced in 5.8 with commit 6e728f321393 and fixed in 5.12.2 with commit 03c649dee8b1
Issue introduced in 5.8 with commit 6e728f321393 and fixed in 5.13 with commit 47a017f33943
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46976.mbox b/cve/published/2021/CVE-2021-46976.mbox
index 1a990d8a..89fe1895 100644
--- a/cve/published/2021/CVE-2021-46976.mbox
+++ b/cve/published/2021/CVE-2021-46976.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46976: drm/i915: Fix crash in auto_retire
-Message-Id: <2024022822-CVE-2021-46976-1dd4@gregkh>
-Content-Length: 6336
-Lines: 86
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6423;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=elB3z62EJU+nEkLCwH/fZ8DoMpYG/XYbUqsVuUquyTI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XsfllG3sl+wX/bCx4PzR7A498c3zuoru3RC79fxFt
- 3SelZJiRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEwki4lhnprm/SjO1FWfI5a+
- /fPbI8Ul8VhtLMOCJc7yrNxHu7dnaTxl2dE2aek2RR5NAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -70,7 +59,7 @@ Affected and fixed versions
Issue introduced in 5.8 with commit 229007e02d69 and fixed in 5.12.5 with commit f7520970d535
Issue introduced in 5.8 with commit 229007e02d69 and fixed in 5.13 with commit 402be8a10119
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46977.mbox b/cve/published/2021/CVE-2021-46977.mbox
index 5dbbda30..3ecdf3d2 100644
--- a/cve/published/2021/CVE-2021-46977.mbox
+++ b/cve/published/2021/CVE-2021-46977.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46977: KVM: VMX: Disable preemption when probing user return MSRs
-Message-Id: <2024022822-CVE-2021-46977-76be@gregkh>
-Content-Length: 2338
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2398;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=zRZ4EZBNCOICHURM7s3ay292HWND51EZUvbPf/BLBsM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XscJFUwyYdFb39trVep/70CLL9McBQlFtWvVubulg
- hgS+ow7YlkYBJkYZMUUWb5s4zm6v+KQopeh7WmYOaxMIEMYuDgFYCKJjxjmh23fvSVkitSnoqnt
- VwUZ/splNL7zYpifz7ZxdrFehmyZmlMdw129hiXXyhcCAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -41,7 +30,7 @@ Affected and fixed versions
Issue introduced in 5.5 with commit 4be534102624 and fixed in 5.12.5 with commit e3ea1895df71
Issue introduced in 5.5 with commit 4be534102624 and fixed in 5.13 with commit 5104d7ffcf24
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46978.mbox b/cve/published/2021/CVE-2021-46978.mbox
index 4be47b57..e72c1021 100644
--- a/cve/published/2021/CVE-2021-46978.mbox
+++ b/cve/published/2021/CVE-2021-46978.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46978: KVM: nVMX: Always make an attempt to map eVMCS after migration
-Message-Id: <2024022822-CVE-2021-46978-3516@gregkh>
-Content-Length: 3372
-Lines: 74
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3447;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=ZDVw1CKasME+88esoiwGSawPXjVttog7kOr/z5non3I=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xsfl3HA9r5YTbrUkbuIOplv9z2KNLYR+s3XUb1u7c
- +7n2Xx5HbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjARdVOGmYxlUR/O+Tv4rYy+
- cXxR/6LHOuu2H2ZYcJhB4BmP3NcfZ9weZX8Rs7o5x3lrFgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -58,7 +47,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit f2c7ef3ba955 and fixed in 5.12.5 with commit bd0e8455b85b
Issue introduced in 5.11 with commit f2c7ef3ba955 and fixed in 5.13 with commit f5c7e8425f18
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46980.mbox b/cve/published/2021/CVE-2021-46980.mbox
index 1e1854cb..fb552fdf 100644
--- a/cve/published/2021/CVE-2021-46980.mbox
+++ b/cve/published/2021/CVE-2021-46980.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46980: usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4
-Message-Id: <2024022823-CVE-2021-46980-adda@gregkh>
-Content-Length: 3801
-Lines: 88
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3890;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=HIGwNy3pL5VpaMsADIHr5DtKtkGHy7OEzb//+7e2Wsg=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XsczSoufvVW78uyj85O7cjYYPrjUN03t7+uX4dc/r
- np2cU9obUcsC4MgE4OsmCLLl208R/dXHFL0MrQ9DTOHlQlkCAMXpwBMhG8lwzz1L/eq3prNDypR
- t0t6fXrNRTUPCy+GucKbveeePjl7Wfv3/DlcRtF74nj2mQMA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -71,7 +60,7 @@ Affected and fixed versions
Issue introduced in 5.8 with commit 4dbc6a4ef06d and fixed in 5.12.5 with commit 5e9c6f58b01e
Issue introduced in 5.8 with commit 4dbc6a4ef06d and fixed in 5.13 with commit 1f4642b72be7
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46982.mbox b/cve/published/2021/CVE-2021-46982.mbox
index 5cdd6722..37471101 100644
--- a/cve/published/2021/CVE-2021-46982.mbox
+++ b/cve/published/2021/CVE-2021-46982.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46982: f2fs: compress: fix race condition of overwrite vs truncate
-Message-Id: <2024022823-CVE-2021-46982-5134@gregkh>
-Content-Length: 3278
-Lines: 89
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3368;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=HWs268WkhLNDMF7Ciy4/2RBhcYodBJELqPS+6cEk9/U=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xsf7TVg3a+LnH+nyWV8mvY/5zl145FBdx7MDqxZec
- 12xNG2aS0csC4MgE4OsmCLLl208R/dXHFL0MrQ9DTOHlQlkCAMXpwBMJL+TYUGvZInsDyUXTkdN
- e6fzKYcnNR0XYmdYsHLVihW7vee/rd7274aX4TaDuTv/GQEA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -73,7 +62,7 @@ Affected and fixed versions
Issue introduced in 5.6 with commit 4c8ff7095bef and fixed in 5.12.5 with commit 936158b15e26
Issue introduced in 5.6 with commit 4c8ff7095bef and fixed in 5.13 with commit a949dc5f2c5c
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46984.mbox b/cve/published/2021/CVE-2021-46984.mbox
index 3d5816c4..b40a4070 100644
--- a/cve/published/2021/CVE-2021-46984.mbox
+++ b/cve/published/2021/CVE-2021-46984.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46984: kyber: fix out of bounds access when preempted
-Message-Id: <2024022824-CVE-2021-46984-e55e@gregkh>
-Content-Length: 4030
-Lines: 103
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4134;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=ooa4CjK7EV0HQbbae21Iw/JPzukH6pktPuwniYfwLu4=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XidMCHXzsdzGprC164GnbsuiBw61Ca0iXzbcFnfZ7
- 79WwcK8I5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACai9JdhQf8Krhlf0lqUn+6/
- qPjtonWl4XMpRYYFG1d8O6vXwKRm3GEXwtb3SGum3j42AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -82,7 +71,7 @@ Affected and fixed versions
Issue introduced in 4.18 with commit a6088845c2bf and fixed in 5.12.5 with commit 2ef3c76540c4
Issue introduced in 4.18 with commit a6088845c2bf and fixed in 5.13 with commit efed9a3337e3
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46985.mbox b/cve/published/2021/CVE-2021-46985.mbox
index 32b5f713..580ea84f 100644
--- a/cve/published/2021/CVE-2021-46985.mbox
+++ b/cve/published/2021/CVE-2021-46985.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46985: ACPI: scan: Fix a memory leak in an error handling path
-Message-Id: <2024022824-CVE-2021-46985-4dad@gregkh>
-Content-Length: 2760
-Lines: 60
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2821;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=bYn0qN3UaT6FWpC6VnpPRHQ5BTQyr7WTf9ovNR5tuq8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XidEewXPF8opYXSxZ5tesJun7kzCXe2tnsmKNnr9j
- 55PaLHtiGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIlEcjEsuHq4xjY5WodNVytE
- t+oBIxurlqcvwzx9W1WH1KevLRIK37Fd+mpw/OD5XkYA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -40,7 +29,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit eb50aaf960e3 and fixed in 5.12.5 with commit a7e17a8d421a
Issue introduced in 5.12 with commit eb50aaf960e3 and fixed in 5.13 with commit 0c8bd174f0fc
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46986.mbox b/cve/published/2021/CVE-2021-46986.mbox
index 42f97c95..c0a4c015 100644
--- a/cve/published/2021/CVE-2021-46986.mbox
+++ b/cve/published/2021/CVE-2021-46986.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46986: usb: dwc3: gadget: Free gadget structure only after freeing endpoints
-Message-Id: <2024022824-CVE-2021-46986-1d6e@gregkh>
-Content-Length: 3316
-Lines: 76
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3393;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=jmCrNfkOkiXs4wAP0cjZYCiQER4zdQe08nY2gwRhHeA=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XifMMdzi18uuvWnpnwqZpeJbfN98vNH+Ze3CdgFrV
- +cdVTv0OmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiM/YyzA91vBZez7Us3/7Z
- Eg9pbzUpqY3rBBgWNE3lZGr+6Wa3w/Qk2+TK9Q/XTf9xGQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -60,7 +49,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit e81a7018d93a and fixed in 5.12.5 with commit b4b8e9601d7e
Issue introduced in 5.10 with commit e81a7018d93a and fixed in 5.13 with commit bb9c74a5bd14
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46988.mbox b/cve/published/2021/CVE-2021-46988.mbox
index ce50674f..fd2f27a3 100644
--- a/cve/published/2021/CVE-2021-46988.mbox
+++ b/cve/published/2021/CVE-2021-46988.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46988: userfaultfd: release page in error path to avoid BUG_ON
-Message-Id: <2024022825-CVE-2021-46988-ae47@gregkh>
-Content-Length: 3333
-Lines: 74
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3408;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=FkzQR6icUfPcYH7vnzSO/W+OFa0XMmoKriqDRGz15Lo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XifeP/h5Ssqs1q27eavnhrn9ZvtoWr9EPKmmyb773
- pUoNzOdjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZhI00eGBScC1vV55ijMsI06
- YGB7u9nt2yqvpwxzxUqdTrLqT9yyf5L/q4pbL6917dKdCwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -55,7 +44,7 @@ Affected and fixed versions
Issue introduced in 4.11 with commit cb658a453b93 and fixed in 5.12.5 with commit 2d59a0ed8b26
Issue introduced in 4.11 with commit cb658a453b93 and fixed in 5.13 with commit 7ed9d238c7db
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46991.mbox b/cve/published/2021/CVE-2021-46991.mbox
index 00a12f48..a864f4e2 100644
--- a/cve/published/2021/CVE-2021-46991.mbox
+++ b/cve/published/2021/CVE-2021-46991.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46991: i40e: Fix use-after-free in i40e_client_subtask()
-Message-Id: <2024022826-CVE-2021-46991-3c16@gregkh>
-Content-Length: 2531
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2591;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Mqhp42aJKnKykYEnxpvJFkfSpvAjIPIfjWTcqgXdlhs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xie9y94Xs8x99vl9j4t3bg0TNp01oWpFYqSP9hGf/
- 7/4rvs86ohlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJhLAzLNj+rm1+98G0kp9T
- dRMFmHjXmQuIszLMU9k91Wfy8hQZHVfO9j2h4nqmv180AQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -41,7 +30,7 @@ Affected and fixed versions
Issue introduced in 4.16 with commit 7b0b1a6d0ac9 and fixed in 5.12.5 with commit 1fd5d262e744
Issue introduced in 4.16 with commit 7b0b1a6d0ac9 and fixed in 5.13 with commit 38318f23a7ef
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46992.mbox b/cve/published/2021/CVE-2021-46992.mbox
index 0d31b68e..1572be85 100644
--- a/cve/published/2021/CVE-2021-46992.mbox
+++ b/cve/published/2021/CVE-2021-46992.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46992: netfilter: nftables: avoid overflows in nft_hash_buckets()
-Message-Id: <2024022826-CVE-2021-46992-e8e8@gregkh>
-Content-Length: 4080
-Lines: 87
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4168;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=yCEmoZC4I6CcnDH9HX9hT9Y+qRXxEqqWGc0kvm21xTo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xid9XX10ZujubONziW0ZQWYLAqZ0ti5T4atQ4P29n
- a+P+eLdjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZiI/TGGeVYm5TIL9x0vf3TQ
- Nsb8/UnOrFmCQgzzY1P8LvJFX3vzZIf4p7v+MezPnqmfAQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -68,7 +57,7 @@ Affected and fixed versions
Issue introduced in 4.9 with commit 0ed6389c483d and fixed in 5.12.5 with commit a388d10961ff
Issue introduced in 4.9 with commit 0ed6389c483d and fixed in 5.13 with commit a54754ec9891
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46993.mbox b/cve/published/2021/CVE-2021-46993.mbox
index 3ba57aca..19770ba5 100644
--- a/cve/published/2021/CVE-2021-46993.mbox
+++ b/cve/published/2021/CVE-2021-46993.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46993: sched: Fix out-of-bound access in uclamp
-Message-Id: <2024022826-CVE-2021-46993-da22@gregkh>
-Content-Length: 2594
-Lines: 63
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2658;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=1IirdTiiF/v74cWJAZEIaEjqELJzU/EtUmZbhf/XbUw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XicJbd354BFr618mCY2j2tcM9IOdHl2uNpWouLDB9
- UHbdRvhjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjI3A0M88Ov+bB8iNkak7vR
- 7Cc/x4qkik9S3gzzVLyTGIKz/t431MjpOBy2OGCW6Il0AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -46,7 +35,7 @@ Affected and fixed versions
Issue introduced in 5.3 with commit 69842cba9ace and fixed in 5.12.5 with commit 42ee47c7e356
Issue introduced in 5.3 with commit 69842cba9ace and fixed in 5.13 with commit 6d2f8909a5fa
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46994.mbox b/cve/published/2021/CVE-2021-46994.mbox
index 0cc2ff01..fec2e416 100644
--- a/cve/published/2021/CVE-2021-46994.mbox
+++ b/cve/published/2021/CVE-2021-46994.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46994: can: mcp251x: fix resume from sleep before interface was brought up
-Message-Id: <2024022826-CVE-2021-46994-4722@gregkh>
-Content-Length: 2403
-Lines: 60
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2464;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=OQ3nI6+B8E+ZrG2WnGzVB+rb1Fzl0hLtCmQiBTB9tGU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XiedTzkRXLYz/F9BVduJ25P+TH7DVtY9q8LTdk3V5
- 4lR78vOdMSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEphozzA8/r99t43r8bPqh
- ykOsmU9edrwM38owV16C4bp3yN/fBy88vaJWxOH2OOeTEgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -44,7 +33,7 @@ Affected and fixed versions
Issue introduced in 5.5 with commit 8ce8c0abcba3 and fixed in 5.12.5 with commit e1e10a390fd9
Issue introduced in 5.5 with commit 8ce8c0abcba3 and fixed in 5.13 with commit 03c427147b2d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46995.mbox b/cve/published/2021/CVE-2021-46995.mbox
index fe378e2e..bcf3905b 100644
--- a/cve/published/2021/CVE-2021-46995.mbox
+++ b/cve/published/2021/CVE-2021-46995.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46995: can: mcp251xfd: mcp251xfd_probe(): fix an error pointer dereference in probe
-Message-Id: <2024022827-CVE-2021-46995-6757@gregkh>
-Content-Length: 1831
-Lines: 49
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1881;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=bwqVd9nFd4pbzjBlEG1izz/P3Kcl3MZf6CgK5uIku/M=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XiffUa65WMdwesFlpfV27n0bTt6YY6K/7dTPDwKnh
- PMF5zyU6YhlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJnL/OMD/QTTGy5ue/dYVN
- fprbSyP8JFxYnjLMYv744PdFo5nPPf1ztQve/2AxY/O7CgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -35,7 +24,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit cf8ee6de2543 and fixed in 5.12.5 with commit 15f8f96ec7fc
Issue introduced in 5.12 with commit cf8ee6de2543 and fixed in 5.13 with commit 4cc7faa40697
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46996.mbox b/cve/published/2021/CVE-2021-46996.mbox
index f8c8254e..ba262737 100644
--- a/cve/published/2021/CVE-2021-46996.mbox
+++ b/cve/published/2021/CVE-2021-46996.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46996: netfilter: nftables: Fix a memleak from userdata error path in new objects
-Message-Id: <2024022827-CVE-2021-46996-0af4@gregkh>
-Content-Length: 2017
-Lines: 51
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2069;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=3bBPvddPc/R58ehnLIC1vDU6hzHd74l8gILAbo+SNsk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xid75ereurE/4Pokrm1uxy3kjC9kXZCbP4utb/73k
- k36H63dO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAisn8YFpx4fMPhA+/PXS80
- 8qQW2iZcmsy4/RHDgtNece4MAoUPHPQe7njMe0ftp7OIIAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -35,7 +24,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit b131c96496b3 and fixed in 5.12.5 with commit dd3bebf515f3
Issue introduced in 5.10 with commit b131c96496b3 and fixed in 5.13 with commit 85dfd816fabf
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-46997.mbox b/cve/published/2021/CVE-2021-46997.mbox
index e1513715..32a19a08 100644
--- a/cve/published/2021/CVE-2021-46997.mbox
+++ b/cve/published/2021/CVE-2021-46997.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-46997: arm64: entry: always set GIC_PRIO_PSR_I_SET during entry
-Message-Id: <2024022827-CVE-2021-46997-a93c@gregkh>
-Content-Length: 5078
-Lines: 121
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5200;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=DsbcJwnvUlxa6yKAi5TRab2SyjCQxYjaOigR/ALKEno=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xifz75Bn+6rRdr7p2OUV7/PY9/hrTrmmmlWv12d9q
- rFfPi+zI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACZSEM2wYFaa10JfzncfCrJi
- pySzKybJchtNYlgwvyr0jeFCwxNLWjXb7jjra/ttrT4IAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -103,7 +92,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 2a9b3e6ac69a and fixed in 5.12.5 with commit d8d52005f57b
Issue introduced in 5.10 with commit 2a9b3e6ac69a and fixed in 5.13 with commit 4d6a38da8e79
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47002.mbox b/cve/published/2021/CVE-2021-47002.mbox
index 3b6ab3dd..388e5f01 100644
--- a/cve/published/2021/CVE-2021-47002.mbox
+++ b/cve/published/2021/CVE-2021-47002.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47002: SUNRPC: Fix null pointer dereference in svc_rqst_free()
-Message-Id: <2024022828-CVE-2021-47002-3946@gregkh>
-Content-Length: 2005
-Lines: 53
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2059;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=lU0QlTPLM+LAv4U2qp9y/6WxhoDvR3augSX41D1gaxk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XqdcEOCwu5Rj7nm18Na2w7Wa3S81ApZpbFwXcYbR3
- s6jYTdTRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEyk5jPDPAv+XbnfvQPEkp56
- 8Eg6rWL8HSiwgGF+2fz3SxSr8hp+6uhrPNwwfVX9tvJ2AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -38,7 +27,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit 5191955d6fc6 and fixed in 5.12.5 with commit c664aaec9aee
Issue introduced in 5.11 with commit 5191955d6fc6 and fixed in 5.13 with commit b9f83ffaa0c0
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47003.mbox b/cve/published/2021/CVE-2021-47003.mbox
index eb6b4edc..b30b74d2 100644
--- a/cve/published/2021/CVE-2021-47003.mbox
+++ b/cve/published/2021/CVE-2021-47003.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47003: dmaengine: idxd: Fix potential null dereference on pointer status
-Message-Id: <2024022829-CVE-2021-47003-12d7@gregkh>
-Content-Length: 2383
-Lines: 58
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2442;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=8s6BA3FKuKYfkn/ngWPpe4gbZJm7fMI8iCE6Jc9qUug=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XqeGSM2OWiOgyGTsWVL12vBH2rdV1ToRHLpzc1Rbb
- k3gDxfuiGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIlI1DLMj93Y5XnkVfvPps+x
- NUezDrKo9G3kYZjN5rd77c2mWOVXiY06T6eeXXlmSrgcAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit 89e3becd8f82 and fixed in 5.12.5 with commit 7bc402f843e7
Issue introduced in 5.11 with commit 89e3becd8f82 and fixed in 5.13 with commit 28ac8e03c43d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47006.mbox b/cve/published/2021/CVE-2021-47006.mbox
index cdf96cee..ee792f4d 100644
--- a/cve/published/2021/CVE-2021-47006.mbox
+++ b/cve/published/2021/CVE-2021-47006.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47006: ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook
-Message-Id: <2024022829-CVE-2021-47006-3312@gregkh>
-Content-Length: 3147
-Lines: 69
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3217;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=F916YEejLx2ANyz7IbJa8nPAHo6McIUVqttN72UEUeU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xqd+4lGZxmSc9dpiZ4vqDMUvPptfysxxWxqw9+6Uw
- 6Z1y1yndsSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEWnQZFpzMbJ/LXvD83rl/
- catDv5Qlp3NOc2RYsMlH6NA/S5ud1w608MVOzuc4xB14HQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -49,7 +38,7 @@ Affected and fixed versions
Issue introduced in 4.7 with commit 1879445dfa7b and fixed in 5.12.5 with commit dabe299425b1
Issue introduced in 4.7 with commit 1879445dfa7b and fixed in 5.13 with commit a506bd575629
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47007.mbox b/cve/published/2021/CVE-2021-47007.mbox
index 0296efd2..346835b6 100644
--- a/cve/published/2021/CVE-2021-47007.mbox
+++ b/cve/published/2021/CVE-2021-47007.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47007: f2fs: fix panic during f2fs_resize_fs()
-Message-Id: <2024022830-CVE-2021-47007-4d53@gregkh>
-Content-Length: 2851
-Lines: 79
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2931;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=2rm6IN9kKz5yxZ6lEy1wFLXEnRc2eDQM3RME9W2gYMg=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xqdd7hSKbJC4dqLpXMocydmLRT5I3LQtNjrKbP9ni
- enjsxrpHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRKzkMc/jO22ky+SXzb/JK
- 25XT6FLRXPZhG8P8uKqJkdxfNroXh6kK382YsL3z74J5AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -63,7 +52,7 @@ Affected and fixed versions
Issue introduced in 5.8 with commit b4b10061ef98 and fixed in 5.12.5 with commit 822054e5026c
Issue introduced in 5.8 with commit b4b10061ef98 and fixed in 5.13 with commit 3ab0598e6d86
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47008.mbox b/cve/published/2021/CVE-2021-47008.mbox
index 5bcf987b..5d9ffc45 100644
--- a/cve/published/2021/CVE-2021-47008.mbox
+++ b/cve/published/2021/CVE-2021-47008.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47008: KVM: SVM: Make sure GHCB is mapped before updating
-Message-Id: <2024022830-CVE-2021-47008-3dc3@gregkh>
-Content-Length: 2584
-Lines: 63
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2648;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=WqPyhiducWfjWna0XuzuEHPNJywNjI197i/afSSB2WY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XqdNl4lvezRr2hzd51o3Zuz7K9/E3haYe2dObuRHs
- bNz29OsOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiC9kY5pmlq6v4Rh+fnvT1
- 3a5d7TuWe54Wq2dYsOHdDoOnF1o9731Yv3QH30UR1wOfLwEA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -47,7 +36,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit 647daca25d24 and fixed in 5.12.5 with commit fd722a57fe0b
Issue introduced in 5.11 with commit 647daca25d24 and fixed in 5.13 with commit a3ba26ecfb56
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47009.mbox b/cve/published/2021/CVE-2021-47009.mbox
index 7ff3bf2f..584c9737 100644
--- a/cve/published/2021/CVE-2021-47009.mbox
+++ b/cve/published/2021/CVE-2021-47009.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47009: KEYS: trusted: Fix memory leak on object td
-Message-Id: <2024022830-CVE-2021-47009-3f56@gregkh>
-Content-Length: 2245
-Lines: 57
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2303;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=zDncxNe0UicD7bKlQyWaVHaWTxNUwCtr1MfNnzx5TYM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XqcxmLSIxRmG+G10fb4+zyG0WcR3ym9Ok7MSF88s9
- polE+TfEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhvCxSkAEzG7zzDfeWmBkWB1XUkX7wbp
- t+bzWq5+ZrFnWLCrMOpOImtSidaGpJqt1q94p97Qfg4A
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -41,7 +30,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit 5df16caada3f and fixed in 5.12.5 with commit 3e24fbd37e72
Issue introduced in 5.12 with commit 5df16caada3f and fixed in 5.13 with commit 83a775d5f9bf
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47010.mbox b/cve/published/2021/CVE-2021-47010.mbox
index 8b261715..413080c6 100644
--- a/cve/published/2021/CVE-2021-47010.mbox
+++ b/cve/published/2021/CVE-2021-47010.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47010: net: Only allow init netns to set default tcp cong to a restricted algo
-Message-Id: <2024022830-CVE-2021-47010-6853@gregkh>
-Content-Length: 3024
-Lines: 69
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3094;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=zz7wVZ85lLAWZfeQP5g5amkpNvN1HRGSx041SpMkU3Y=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xqe5v1Lpn8DJ/cnDuHn6Tju+7rOpf7f4Lf05u6Cyd
- 5n6Rq67HbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRnhCGWcyCEmyt4pd+HS0o
- n3X8W0VI7WTmKQzzFH7Mn2DDrBuSduz15YjZwdt5NI86AQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -51,7 +40,7 @@ Affected and fixed versions
Issue introduced in 4.15 with commit 6670e1524477 and fixed in 5.12.4 with commit e7d7bedd507b
Issue introduced in 4.15 with commit 6670e1524477 and fixed in 5.13 with commit 8d432592f30f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47011.mbox b/cve/published/2021/CVE-2021-47011.mbox
index ddfc02c9..ded8f978 100644
--- a/cve/published/2021/CVE-2021-47011.mbox
+++ b/cve/published/2021/CVE-2021-47011.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47011: mm: memcontrol: slab: fix obtain a reference to a freeing memcg
-Message-Id: <2024022831-CVE-2021-47011-5b75@gregkh>
-Content-Length: 4632
-Lines: 119
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4752;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=YvbepJhVNGPGHRu2pgFHbAxeM5eL8hEftQ9H5ZUvWZo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XqdHROnHtB+579NfXMQ17eLuc3F755z44zihxSwjI
- Of39haBjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZiInxDDPOtmoewDKfnvdz2v
- Y3d8kP2kI+iwJMOCRtvHz/mn3I5a8OhJtYmIibsF+7Z1AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -103,7 +92,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit 3de7d4f25a74 and fixed in 5.12.4 with commit c3ae6a3f3ca4
Issue introduced in 5.11 with commit 3de7d4f25a74 and fixed in 5.13 with commit 9f38f03ae8d5
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47012.mbox b/cve/published/2021/CVE-2021-47012.mbox
index 20ffe341..e3c4e658 100644
--- a/cve/published/2021/CVE-2021-47012.mbox
+++ b/cve/published/2021/CVE-2021-47012.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47012: RDMA/siw: Fix a use after free in siw_alloc_mr
-Message-Id: <2024022831-CVE-2021-47012-73c5@gregkh>
-Content-Length: 2604
-Lines: 62
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2667;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=4haT1x9/2IyK3lHBAvkAyZc7n7LXmuUYS0KgdNCtwQA=;
- b=kA0DAAIRMUfUDdst+ykByyZiAGXe62egBeF/Zo4wCOvmlf9ZdpaO17Hz2kAmJuLvwH4jhe7Kw
- 4hdBAARAgAdFiEE9LYMxb94wiFKMT3LMUfUDdst+ykFAmXe62cACgkQMUfUDdst+ylzagCcCNkl
- j7S0v1Wge2OioxOUvkZeKgsAnRptiHuxE2aE/FO6uj2W5rdUrZYr
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -45,7 +34,7 @@ Affected and fixed versions
Issue introduced in 5.3 with commit 2251334dcac9 and fixed in 5.12.4 with commit ad9ce7188432
Issue introduced in 5.3 with commit 2251334dcac9 and fixed in 5.13 with commit 3093ee182f01
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47018.mbox b/cve/published/2021/CVE-2021-47018.mbox
index aa8a17f1..6e1e39c8 100644
--- a/cve/published/2021/CVE-2021-47018.mbox
+++ b/cve/published/2021/CVE-2021-47018.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47018: powerpc/64: Fix the definition of the fixmap area
-Message-Id: <2024022832-CVE-2021-47018-f631@gregkh>
-Content-Length: 2443
-Lines: 63
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2507;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=uUmo5wfra/IODXoUxIGV2A7RJ8mFX2FRO5H3bLFi3y8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XmfUx8VWzCt5tS/ffraAduaT3MfPpu5We+G/9b25g
- PWrRfw/OmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiBiUMC5rkrs1lPc6aripb
- E/5h+SKjeY33jzEsWC/+/YtOhrvfPu0rB5c0qTA/k9wcDAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -45,7 +34,7 @@ Affected and fixed versions
Issue introduced in 5.5 with commit 265c3491c4bc and fixed in 5.12.4 with commit a84df7c80bda
Issue introduced in 5.5 with commit 265c3491c4bc and fixed in 5.13 with commit 9ccba66d4d2a
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47019.mbox b/cve/published/2021/CVE-2021-47019.mbox
index 94b3c9c0..06a15520 100644
--- a/cve/published/2021/CVE-2021-47019.mbox
+++ b/cve/published/2021/CVE-2021-47019.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47019: mt76: mt7921: fix possible invalid register access
-Message-Id: <2024022832-CVE-2021-47019-9b9a@gregkh>
-Content-Length: 3362
-Lines: 82
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3445;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Hf/K1umxubOqNUidxO3drwLYSxFekhcxugkzOHxrm8E=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xmc+758yK8T7iEO8xU9GC2/9yX7Na443KZ7btNln7
- +/oKs95HbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCR9gSGBZM0L6jf51iUfZfB
- oWjxnJr1fzbY7mCYX5y34fA8r0U68Z3dPyv7Kic83FpSCAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -68,7 +57,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit ffa1bf97425b and fixed in 5.12.4 with commit b13cbc536990
Issue introduced in 5.12 with commit ffa1bf97425b and fixed in 5.13 with commit fe3fccde8870
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47020.mbox b/cve/published/2021/CVE-2021-47020.mbox
index c23795ec..8f84897f 100644
--- a/cve/published/2021/CVE-2021-47020.mbox
+++ b/cve/published/2021/CVE-2021-47020.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47020: soundwire: stream: fix memory leak in stream config error path
-Message-Id: <2024022920-CVE-2021-47020-78d9@gregkh>
-Content-Length: 2530
-Lines: 58
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2589;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=AwnHxmDr1Z/xaYNM6d/40jVtrrMq9hndNS/7TTbxdcQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkPWXdIL/nGVv9w99v7U81unrkb1dfnxaD3VuVL3NGcI
- 6L9UsYHO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAihRoMC7bsfmzzJeVKetol
- cY1FWyNeMS3fXsmwYN7lANGcCgYnlz71Pz1u72Tf+5+cBgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -40,7 +29,7 @@ Affected and fixed versions
Issue introduced in 4.18 with commit 89e590535f32 and fixed in 5.12.4 with commit effd2bd62b41
Issue introduced in 4.18 with commit 89e590535f32 and fixed in 5.13 with commit 48f17f96a817
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47021.mbox b/cve/published/2021/CVE-2021-47021.mbox
index bf1d7af0..9e8b9f90 100644
--- a/cve/published/2021/CVE-2021-47021.mbox
+++ b/cve/published/2021/CVE-2021-47021.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47021: mt76: mt7915: fix memleak when mt7915_unregister_device()
-Message-Id: <2024022833-CVE-2021-47021-6cbb@gregkh>
-Content-Length: 1871
-Lines: 49
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1921;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=6UT9hzZV1Xih4hg5KBpRVG8UCczIFrJObZs3ncTS6CQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XmeaTLczP52arBhibrqg1yq8/XqpW+7U0Jut55d8m
- VcVc/5ERywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEwkmJthrsxf5+nCwstTXUod
- Tj+v172cNWn3OYb53lX2n3nfetm0/D4c2f5nQT3PfgFbAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -34,7 +23,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit f285dfb98562 and fixed in 5.12.4 with commit d754c80ae82a
Issue introduced in 5.12 with commit f285dfb98562 and fixed in 5.13 with commit e9d32af478cf
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47022.mbox b/cve/published/2021/CVE-2021-47022.mbox
index 31a9b3d2..096421cb 100644
--- a/cve/published/2021/CVE-2021-47022.mbox
+++ b/cve/published/2021/CVE-2021-47022.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47022: mt76: mt7615: fix memleak when mt7615_unregister_device()
-Message-Id: <2024022833-CVE-2021-47022-402e@gregkh>
-Content-Length: 2049
-Lines: 51
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2101;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=OcjsO8XbdgUOHBYcHSdFVLtCpCF9EBYfC1uGeYnuHSs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xmf2u05c91du55nl4n2GYT6f/+Tskt9k0s1c56ux8
- dqkCGmLjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZhIkwnD/FBGW669zzZdu7sz
- /RerDceLTN9NMQwLdrx7d6zPV0KPc3JH2oW9wb7eU29aAAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -35,7 +24,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit a6275e934605 and fixed in 5.12.4 with commit 6c5b2b0c6e5a
Issue introduced in 5.12 with commit a6275e934605 and fixed in 5.13 with commit 8ab31da7b89f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47023.mbox b/cve/published/2021/CVE-2021-47023.mbox
index baa9f214..2374f7c2 100644
--- a/cve/published/2021/CVE-2021-47023.mbox
+++ b/cve/published/2021/CVE-2021-47023.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47023: net: marvell: prestera: fix port event handling on init
-Message-Id: <2024022833-CVE-2021-47023-118c@gregkh>
-Content-Length: 4979
-Lines: 113
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5093;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=C59rTucVtbTb2g1GD/rqZTOVtGM7HjvHqggd30juhzw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XmeaxF4wyV14VOhJpMqFBTyzXhl1PrzT1vH/lJPa9
- /DYXvcZHTEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRZQYMCybbvGH+fbSt+V1I
- 1cYtTyOfLN7eHcgw46reEoXpSTPXcIr9k643iPj8cME0AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -97,7 +86,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 501ef3066c89 and fixed in 5.12.4 with commit 9d1ba11fabdd
Issue introduced in 5.10 with commit 501ef3066c89 and fixed in 5.13 with commit 333980481b99
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47025.mbox b/cve/published/2021/CVE-2021-47025.mbox
index 4312f69a..ee4585e6 100644
--- a/cve/published/2021/CVE-2021-47025.mbox
+++ b/cve/published/2021/CVE-2021-47025.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47025: iommu/mediatek: Always enable the clk on resume
-Message-Id: <2024022834-CVE-2021-47025-cbd5@gregkh>
-Content-Length: 4326
-Lines: 99
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4426;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=OirVWHXvTdXaIumaEtLY4r2R6QnBvHiQNkxTg2BGKCQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xme9vt5f8OLV3+uK+fc830y8aaLB8CG+69HhluPrT
- nRcjau52BHLwiDIxCArpsjyZRvP0f0VhxS9DG1Pw8xhZQIZwsDFKQATMZVmmMVsvnrjhmyW5+ZW
- Oy5tWrR53+2A3KUMc8UWpn8T/bpSqcdHfYbPs3Dj5Q//tAEA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -85,7 +74,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit c0b57581b73b and fixed in 5.12.4 with commit 5cad9e2caa96
Issue introduced in 5.12 with commit c0b57581b73b and fixed in 5.13 with commit b34ea31fe013
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47026.mbox b/cve/published/2021/CVE-2021-47026.mbox
index 0de40175..a407e26d 100644
--- a/cve/published/2021/CVE-2021-47026.mbox
+++ b/cve/published/2021/CVE-2021-47026.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47026: RDMA/rtrs-clt: destroy sysfs after removing session from active list
-Message-Id: <2024022834-CVE-2021-47026-4e19@gregkh>
-Content-Length: 3100
-Lines: 74
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3175;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=0cXzpbPk7OfQ7gsemH6p203+UtVuIZleKxPoJtIEnG8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XmftdaxuE/D+/XX93aMFd2/enrxjYpZPcWrKHvH8v
- suNL1aLdsSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEzgUyzA+7VJb4bG3DjOaf
- hroHjrXHszZXnWJYcNFNX/VChEX7VMe8P9u3/mg32+QVDgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -58,7 +47,7 @@ Affected and fixed versions
Issue introduced in 5.8 with commit 6a98d71daea1 and fixed in 5.12.4 with commit d3cca8067d43
Issue introduced in 5.8 with commit 6a98d71daea1 and fixed in 5.13 with commit 7f4a8592ff29
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47027.mbox b/cve/published/2021/CVE-2021-47027.mbox
index 315911cb..bea050b0 100644
--- a/cve/published/2021/CVE-2021-47027.mbox
+++ b/cve/published/2021/CVE-2021-47027.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47027: mt76: mt7921: fix kernel crash when the firmware fails to download
-Message-Id: <2024022834-CVE-2021-47027-4a56@gregkh>
-Content-Length: 4309
-Lines: 100
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4410;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=qOPx/BdThlk1Nhz2macJ4vQOX0LAU4ZH+DaLVZF+jOY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xme9+DxhifNbu2TDJzEXva6b3djt8/xlZMnja+wic
- gZXXTIPdsSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBE/okxLJjHMvXZp6InsZmf
- 7/m9/l06bfGnjFUMc/h+L3mxRWSd07fZe/uv274W5+8+yQkA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -86,7 +75,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit 5c14a5f944b9 and fixed in 5.12.4 with commit a46b536cd60c
Issue introduced in 5.12 with commit 5c14a5f944b9 and fixed in 5.13 with commit e230f0c44f01
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47032.mbox b/cve/published/2021/CVE-2021-47032.mbox
index b9a5da30..8ede9a8b 100644
--- a/cve/published/2021/CVE-2021-47032.mbox
+++ b/cve/published/2021/CVE-2021-47032.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47032: mt76: mt7915: fix tx skb dma unmap
-Message-Id: <2024022835-CVE-2021-47032-b4df@gregkh>
-Content-Length: 2047
-Lines: 52
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2100;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=bA5UIhFiEV+MbBGDMisFa10+B2xSnoBe7htsniEyRo4=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XufMPyWdK2/Qv7RCOsZbkfHR0ez/TP2tfx4+vO+/Y
- 5/vUqs1HbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjARnskM8/RO7w77JyDAW+6x
- 81/K/SdT3vfc0WBYcMhUYNcmBY019tI/WXb81vwmdar+DgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -36,7 +25,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 27d5c528a7ca and fixed in 5.12.4 with commit e2cdc9cb33c5
Issue introduced in 5.10 with commit 27d5c528a7ca and fixed in 5.13 with commit 7dcf3c04f0ac
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47033.mbox b/cve/published/2021/CVE-2021-47033.mbox
index 7a1b1baf..008a52d5 100644
--- a/cve/published/2021/CVE-2021-47033.mbox
+++ b/cve/published/2021/CVE-2021-47033.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47033: mt76: mt7615: fix tx skb dma unmap
-Message-Id: <2024022836-CVE-2021-47033-4d0d@gregkh>
-Content-Length: 2047
-Lines: 52
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2100;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=ByZ1U2OSsPIo67hizZQ5fn5nZFjic1JTIfKM1V9NAyM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XufY7Q6cXZaX514z5/LmfyxZL8r0ogXnv57r5bJw4
- s/VByr2d8SyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEVukyzGTM07lS8ejWI5mb
- P0/GbpqUaf9EgJlhFlNFlN2NbI6Ny1pshDmd02346kxdAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -36,7 +25,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 27d5c528a7ca and fixed in 5.12.4 with commit 821ae236ccea
Issue introduced in 5.10 with commit 27d5c528a7ca and fixed in 5.13 with commit ebee7885bb12
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47034.mbox b/cve/published/2021/CVE-2021-47034.mbox
index 7e57a47a..01a9082e 100644
--- a/cve/published/2021/CVE-2021-47034.mbox
+++ b/cve/published/2021/CVE-2021-47034.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47034: powerpc/64s: Fix pte update for kernel memory on radix
-Message-Id: <2024022836-CVE-2021-47034-0851@gregkh>
-Content-Length: 6772
-Lines: 141
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6914;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=r3/xmuBLtb+giCPE7oDaBfnvxospysPoSxKt3UP7dx8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XuecOa8f//TqEpO5M+UFT3x3d+q9dtjh1swNoWxzz
- 0p8f7p9QkcsC4MgE4OsmCLLl208R/dXHFL0MrQ9DTOHlQlkCAMXpwBM5LEmw4JTxkb7rwaErLO6
- sHQ9S/Jew4ZPQX8YFhwuOTptYtJmUWWjJ6ZWrquzH+7rcAQA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -122,7 +111,7 @@ Affected and fixed versions
Issue introduced in 4.18 with commit f1cb8f9beba8 and fixed in 5.12.4 with commit e40c52ee67b1
Issue introduced in 4.18 with commit f1cb8f9beba8 and fixed in 5.13 with commit b8b2f37cf632
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47037.mbox b/cve/published/2021/CVE-2021-47037.mbox
index af1a5751..b3b23ba1 100644
--- a/cve/published/2021/CVE-2021-47037.mbox
+++ b/cve/published/2021/CVE-2021-47037.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47037: ASoC: q6afe-clocks: fix reprobing of the driver
-Message-Id: <2024022837-CVE-2021-47037-d130@gregkh>
-Content-Length: 2151
-Lines: 55
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2207;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=GlgUY1OB8nT7RgvK1+EfZ1FvIOrF84F1ZCUQzAWb2Ac=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XudWHA5KYHXmkr/uM+3qN5H7a/1r7KZPkGgJqO2o8
- 17ZWD6vI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACZifJthQWvIy/bL2+Jmrnsb
- xfxsxW3n+pCgSoYFN9Yw/BBPneq6/OIBrqUdYWw9Ggy/AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -38,7 +27,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 520a1c396d19 and fixed in 5.12.4 with commit 62413972f526
Issue introduced in 5.10 with commit 520a1c396d19 and fixed in 5.13 with commit 96fadf7e8ff4
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47038.mbox b/cve/published/2021/CVE-2021-47038.mbox
index 144c8802..a60bf709 100644
--- a/cve/published/2021/CVE-2021-47038.mbox
+++ b/cve/published/2021/CVE-2021-47038.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47038: Bluetooth: avoid deadlock between hci_dev->lock and socket lock
-Message-Id: <2024022837-CVE-2021-47038-bfcf@gregkh>
-Content-Length: 6630
-Lines: 168
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6799;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=YCK2j7bKLuvhgrbnVe1N/SIfsYAS8L8Z3mjY0pPH230=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XudePpH9NtP/vcmVGu7l0tfVMk7U8t3ivpJmvE3zw
- b9ZTPYrOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiH/sZ5oqyL2XYNPtMXbiR
- rGnglORTF+Ituxjm12U468mrHb5zdH/n+iNBa9YeXMvEDQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -152,7 +141,7 @@ Affected and fixed versions
Issue introduced in 5.7 with commit eab2404ba798 and fixed in 5.12.4 with commit 332e69eb3bd9
Issue introduced in 5.7 with commit eab2404ba798 and fixed in 5.13 with commit 17486960d79b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47039.mbox b/cve/published/2021/CVE-2021-47039.mbox
index f3fd7fe9..adfb1ee8 100644
--- a/cve/published/2021/CVE-2021-47039.mbox
+++ b/cve/published/2021/CVE-2021-47039.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47039: ataflop: potential out of bounds in do_format()
-Message-Id: <2024022837-CVE-2021-47039-638f@gregkh>
-Content-Length: 1977
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2032;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=kzRBbF4qlcxKxjj2G6tL3ZHDPJge06QBuin85kzBNlg=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XudWzPD5yd0dcjXzyYGK56eOKgjli7vvl/vjw2v68
- K1p5XuLjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjIPCWG+RkZqWd+dt6uj3uZ
- MHXaofx8vlB7V4YFK3aknohmfDUnJexR0bzQm1UHhd8bAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -39,7 +28,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit bf9c0538e485 and fixed in 5.12.4 with commit 2a3a8bbca28b
Issue introduced in 5.11 with commit bf9c0538e485 and fixed in 5.13 with commit 1ffec389a643
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47041.mbox b/cve/published/2021/CVE-2021-47041.mbox
index ba799978..3abdc763 100644
--- a/cve/published/2021/CVE-2021-47041.mbox
+++ b/cve/published/2021/CVE-2021-47041.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47041: nvmet-tcp: fix incorrect locking in state_change sk callback
-Message-Id: <2024022838-CVE-2021-47041-de92@gregkh>
-Content-Length: 6649
-Lines: 175
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6825;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Vc2rE7AJTyHUO2IG4BEFBmuI/QB3dxg27gEQrocK330=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xud9yJ/fmHL0Psuz8svtzsYXOstvnT92yLbi4y5OD
- TePj08XdMSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEliowLFjCZeK0U914j6ZT
- v4rwumcRH/Nq5RkWTH9WZ2oT/D5+q/izWo2cfW8t5iTPAgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -158,7 +147,7 @@ Affected and fixed versions
Issue introduced in 5.0 with commit 872d26a391da and fixed in 5.12.4 with commit 906c538340dd
Issue introduced in 5.0 with commit 872d26a391da and fixed in 5.13 with commit b5332a9f3f3d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47043.mbox b/cve/published/2021/CVE-2021-47043.mbox
index 8393e449..424f77e2 100644
--- a/cve/published/2021/CVE-2021-47043.mbox
+++ b/cve/published/2021/CVE-2021-47043.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47043: media: venus: core: Fix some resource leaks in the error path of 'venus_probe()'
-Message-Id: <2024022838-CVE-2021-47043-cb3c@gregkh>
-Content-Length: 2211
-Lines: 56
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2268;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=IHlMPuXisCaYMLpUMImQPQPp8mTfFIzASAEWXb/YQQg=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xucd7t/t1PSP0eWV6oRrwetnbXr7wif+mo2o1q/Wg
- r33eRXed8SyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBErm1mmF8etlTouvXk69O1
- NRJNpuc49VjxXWNYcDVYfUVw+xUh6Y7KE3osJ9s2bTkhDAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -40,7 +29,7 @@ Affected and fixed versions
Issue introduced in 5.5 with commit 32f0a6ddc8c9 and fixed in 5.12.4 with commit 711acdf0228d
Issue introduced in 5.5 with commit 32f0a6ddc8c9 and fixed in 5.13 with commit 5a465c5391a8
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47044.mbox b/cve/published/2021/CVE-2021-47044.mbox
index c09bbcda..79b3d650 100644
--- a/cve/published/2021/CVE-2021-47044.mbox
+++ b/cve/published/2021/CVE-2021-47044.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47044: sched/fair: Fix shift-out-of-bounds in load_balance()
-Message-Id: <2024022839-CVE-2021-47044-2e16@gregkh>
-Content-Length: 3608
-Lines: 109
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3718;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=SusXK9mVuPDS1aMPTIeaYmv9Nhed2wgfvIwEm8rGDyw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xuf/q1qldCX9X8tnpo8x807cEH7Ub/nn6eK757uYj
- 0/YkfzgZ0csC4MgE4OsmCLLl208R/dXHFL0MrQ9DTOHlQlkCAMXpwBMpNCQYcFGlm833Pc8zDMv
- yc3W/LDd1/YMUy3DXLkd+44oGayeuD3WtkBxa9+hrNkfcgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -92,7 +81,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 5a7f55590467 and fixed in 5.12.4 with commit 805cea93e66c
Issue introduced in 5.10 with commit 5a7f55590467 and fixed in 5.13 with commit 39a2a6eb5c9b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47045.mbox b/cve/published/2021/CVE-2021-47045.mbox
index e2dd9973..97c03979 100644
--- a/cve/published/2021/CVE-2021-47045.mbox
+++ b/cve/published/2021/CVE-2021-47045.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47045: scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb()
-Message-Id: <2024022839-CVE-2021-47045-7363@gregkh>
-Content-Length: 2128
-Lines: 55
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2184;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=5mW9PjBUnkcGGrwYrWB/M64hK4V6q+N7fj4vqiTYmVQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XudXOT1lnbpRW++CHmc9e+7frca9bvta5v9c8H2Z+
- MMUKyOOjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjINB+GBfvmlgW0xjRxh8uf
- 7/X2vPeNc/LRbwzzo85vXGB9YsVvfxlRzcawgswTdkW3AQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -40,7 +29,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit 4430f7fd09ec and fixed in 5.12.4 with commit 9bdcfbed2a9f
Issue introduced in 5.11 with commit 4430f7fd09ec and fixed in 5.13 with commit 8dd1c125f7f8
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47046.mbox b/cve/published/2021/CVE-2021-47046.mbox
index e61a70f4..c4919945 100644
--- a/cve/published/2021/CVE-2021-47046.mbox
+++ b/cve/published/2021/CVE-2021-47046.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47046: drm/amd/display: Fix off by one in hdmi_14_process_transaction()
-Message-Id: <2024022839-CVE-2021-47046-3ffe@gregkh>
-Content-Length: 2427
-Lines: 58
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2486;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=fhJraq9c391e5KwsZRXkdVpeiLW2ALHRaUxX7XP/WtQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XuffSMuZtubfdr3We9Ld333F1BzYb9daRZyaerbbR
- Gza2tOSHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjAR1zCGOTwHvNcpP2lZrBa3
- iu+izMpnk/gvJzEs2J3xNFz4zLPnv3fc8TAR2Mo7y8RaDAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
Issue introduced in 5.5 with commit 4c283fdac08a and fixed in 5.12.4 with commit 080bd41d6478
Issue introduced in 5.5 with commit 4c283fdac08a and fixed in 5.13 with commit 8e6fafd5a22e
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47047.mbox b/cve/published/2021/CVE-2021-47047.mbox
index e69426bf..a80e9da3 100644
--- a/cve/published/2021/CVE-2021-47047.mbox
+++ b/cve/published/2021/CVE-2021-47047.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47047: spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails
-Message-Id: <2024022839-CVE-2021-47047-4c75@gregkh>
-Content-Length: 3135
-Lines: 73
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3209;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=84sz3vIFYFCXO7ZRTy+xJv1yQPFrw5n2e1foUBJrW10=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XufP6vWoPe13eNaiCdf6w07fFnO6sKde6bCn7vPpS
- +e+YrCw74hlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJ2D5nmKeo/vkP38OSZ+GL
- VzFwLfR8qHFJwYJhfviCZm+tnj2fGS0rpj+InRzB++dEJAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -57,7 +46,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 1c26372e5aa9 and fixed in 5.12.4 with commit bad5a23cf2b4
Issue introduced in 5.10 with commit 1c26372e5aa9 and fixed in 5.13 with commit 126bdb606fd2
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47048.mbox b/cve/published/2021/CVE-2021-47048.mbox
index ffcb2d9c..c5e8d7f8 100644
--- a/cve/published/2021/CVE-2021-47048.mbox
+++ b/cve/published/2021/CVE-2021-47048.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47048: spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op
-Message-Id: <2024022840-CVE-2021-47048-8586@gregkh>
-Content-Length: 2176
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2231;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=4c6JNnXp4lUn/fH7gGJfq08M1oVpNICf4HlcYX7AhGw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3Xhc4un2O98+wf+dx6abvi5Ri1XOSb88eeZpwwnhSS
- fxMuZWzOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiCQoM8zQ3/H/5yte7/sb5
- 3AlVDI5TCtxv3WKYK8dyqan5nUlJObvg3D8q0mcnvzxpAgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -38,7 +27,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 1c26372e5aa9 and fixed in 5.12.4 with commit 23269ac9f123
Issue introduced in 5.10 with commit 1c26372e5aa9 and fixed in 5.13 with commit a2c5bedb2d55
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47050.mbox b/cve/published/2021/CVE-2021-47050.mbox
index 18814671..e8a09130 100644
--- a/cve/published/2021/CVE-2021-47050.mbox
+++ b/cve/published/2021/CVE-2021-47050.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47050: memory: renesas-rpc-if: fix possible NULL pointer dereference of resource
-Message-Id: <2024022840-CVE-2021-47050-5ba5@gregkh>
-Content-Length: 2181
-Lines: 55
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2237;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=VmkjowHgscOHuZVZK+19dHlMpjsqt8wCM6JBiB1DHpM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XhfsFOL9MunffiWjVbP2MUQ+nt8rseG8hlfAvehlp
- eeYtu6b1xHLwiDIxCArpsjyZRvP0f0VhxS9DG1Pw8xhZQIZwsDFKQATidrPsGD+ydzy8m8MP6Q5
- Dkv0TeDylDl9ipthwYogj6eveF7UHzJzWJ1/ON1500fNYgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -39,7 +28,7 @@ Affected and fixed versions
Issue introduced in 5.9 with commit ca7d8b980b67 and fixed in 5.12.4 with commit a74cb41af7db
Issue introduced in 5.9 with commit ca7d8b980b67 and fixed in 5.13 with commit 59e27d7c94aa
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47051.mbox b/cve/published/2021/CVE-2021-47051.mbox
index cc2a9e81..1dd04a2e 100644
--- a/cve/published/2021/CVE-2021-47051.mbox
+++ b/cve/published/2021/CVE-2021-47051.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47051: spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()
-Message-Id: <2024022840-CVE-2021-47051-cf30@gregkh>
-Content-Length: 2349
-Lines: 56
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2406;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=kHXxcpp4+dcmOIrrDGililTCOiY09XoGyqArh3qq6DI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XhconEoyP5NU7C7IMcH2xoWpwm/2utd6rOBaFdD4p
- L9rRqZ6RywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzkjRzD/LKdeXqbjj1Mr3A7
- 2/W5Zc2dFJ5JvQwLTsyd0VXf8EWvY7Xh0oIr2Y5CXa1vAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -39,7 +28,7 @@ Affected and fixed versions
Issue introduced in 5.2 with commit 944c01a889d9 and fixed in 5.12.4 with commit 6a2b5cee0d31
Issue introduced in 5.2 with commit 944c01a889d9 and fixed in 5.13 with commit a03675497970
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47052.mbox b/cve/published/2021/CVE-2021-47052.mbox
index 38db3faa..53d50e54 100644
--- a/cve/published/2021/CVE-2021-47052.mbox
+++ b/cve/published/2021/CVE-2021-47052.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47052: crypto: sa2ul - Fix memory leak of rxd
-Message-Id: <2024022841-CVE-2021-47052-3cca@gregkh>
-Content-Length: 2059
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2114;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=ai4asLq8eRI1vZ/HSSiDJYxlScVsjdHfAb/rOzoSUs4=;
- b=kA0DAAIRMUfUDdst+ykByyZiAGXe63Gh14rI3XWppasz4/hEuVyi4bPQh9gN2XBSeGZdcc5rw
- 4hdBAARAgAdFiEE9LYMxb94wiFKMT3LMUfUDdst+ykFAmXe63EACgkQMUfUDdst+ymHFgCgw+M2
- E1VGv43qLIn4qzukIBjj63gAn23k3vjuYbz8o/NCit0X/Fhlw6mf
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -38,7 +27,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 00c9211f60db and fixed in 5.12.4 with commit b7bd0657c203
Issue introduced in 5.10 with commit 00c9211f60db and fixed in 5.13 with commit 854b77371998
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47053.mbox b/cve/published/2021/CVE-2021-47053.mbox
index f6643e41..1b7f5e05 100644
--- a/cve/published/2021/CVE-2021-47053.mbox
+++ b/cve/published/2021/CVE-2021-47053.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47053: crypto: sun8i-ss - Fix memory leak of pad
-Message-Id: <2024022841-CVE-2021-47053-c68d@gregkh>
-Content-Length: 2090
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2145;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=pLJUB6U4ityRIhIBHZAYO1jLJuBcZTuncgiz5IxFaOQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKn3XhdKGQXxpkQULv/56726s3ZiZUS5e4PS1dXzD522V
- eU5vn1bRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEykw5NhwWzB4Dle1hY+L6QX
- Xo78eO/+pUPcHgwLGrn3P8nNTF6Z5jNjf8l6y8PSn3/OBAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -38,7 +27,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit d9b45418a917 and fixed in 5.12.4 with commit d3d702084d12
Issue introduced in 5.10 with commit d9b45418a917 and fixed in 5.13 with commit 50274b01ac16
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47054.mbox b/cve/published/2021/CVE-2021-47054.mbox
index 59d0bd77..d1d4e4e6 100644
--- a/cve/published/2021/CVE-2021-47054.mbox
+++ b/cve/published/2021/CVE-2021-47054.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47054: bus: qcom: Put child node before return
-Message-Id: <2024022950-CVE-2021-47054-c994@gregkh>
-Content-Length: 2876
-Lines: 62
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2939;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=JhjKXPPvF2xD4tlYq8KQTvCx2trSIxoOXw/8Xtt+4Nk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkP2e2YWrl9Lu3QcOeJczumfS7Quj9UqebzwYlJoU9da
- 7acuPy8I5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACZSeJ5hftk750AHnjNi/gnf
- i/q5F+kx3mvzYJjvqFKnvoh7jntR1cuclc/O1+V/uG8CAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
Issue introduced in 4.9 with commit 335a12754808 and fixed in 5.12.4 with commit c6f8e0dc8da1
Issue introduced in 4.9 with commit 335a12754808 and fixed in 5.13 with commit ac6ad7c2a862
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47056.mbox b/cve/published/2021/CVE-2021-47056.mbox
index 753762c3..c1ecd9f2 100644
--- a/cve/published/2021/CVE-2021-47056.mbox
+++ b/cve/published/2021/CVE-2021-47056.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47056: crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
-Message-Id: <2024022950-CVE-2021-47056-c2b3@gregkh>
-Content-Length: 3497
-Lines: 74
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3572;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=uBvrGeuMdHtorD6ZBo/a/cpJg+/C5/ZdR6wIkhvZqhY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkP2e3rKz67P51dJVo6bYXOeT/3pw/l8os36f+VYJhuU
- 7CgXedpRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzEjIFhvk+r4uLgU6d1D297
- qOod9KF4g+++FoYFZ0putQl67pQV4Oudl8c/+fyp7y7sAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -52,7 +41,7 @@ Affected and fixed versions
Issue introduced in 4.7 with commit 25c6ffb249f6 and fixed in 5.12.4 with commit 1ea500ce6f7c
Issue introduced in 4.7 with commit 25c6ffb249f6 and fixed in 5.13 with commit 8609f5cfdc87
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47057.mbox b/cve/published/2021/CVE-2021-47057.mbox
index 046ec471..ea27507a 100644
--- a/cve/published/2021/CVE-2021-47057.mbox
+++ b/cve/published/2021/CVE-2021-47057.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47057: crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map
-Message-Id: <2024022951-CVE-2021-47057-01fa@gregkh>
-Content-Length: 2235
-Lines: 55
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2291;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=fT4wBDO/QOGMnVOfHkbzNDtv/m7mbSYyx15pX4o33c0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkP2e3ndbuzam/3v2D719P+ob05S7dSwsmS/y8K4rdoN
- V9ZoSbVEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABOJSmOYKxmkrcrJLBxUJCVZ
- VJ2ZcU+le9kmhvkB/2bP4bh2zPCV2tmmkkt1b+Yem9MHAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -39,7 +28,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit ac2614d721de and fixed in 5.12.4 with commit 6516cb852d70
Issue introduced in 5.10 with commit ac2614d721de and fixed in 5.13 with commit 98b5ef3e97b1
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47059.mbox b/cve/published/2021/CVE-2021-47059.mbox
index e788d588..5424ba9c 100644
--- a/cve/published/2021/CVE-2021-47059.mbox
+++ b/cve/published/2021/CVE-2021-47059.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47059: crypto: sun8i-ss - fix result memory leak on error path
-Message-Id: <2024022952-CVE-2021-47059-4bb8@gregkh>
-Content-Length: 2017
-Lines: 51
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2069;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=flWKoTiWtU//FK3eOqdWJcV76Zr4ey9MjtT4l9SlebE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkP2R3+WX28vt/T+l/3t7aHRgFrzVXELkZvaf27VYbxi
- WAx13WRjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjIiVMM8xQ0/JK231Z9qpxx
- Y8vu5ADbc42vmhnmu/ZH7392YnraodT9bUutWLl2CL+zBwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -35,7 +24,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit d9b45418a917 and fixed in 5.12.4 with commit 50e7b39b8084
Issue introduced in 5.10 with commit d9b45418a917 and fixed in 5.13 with commit 1dbc6a1e25be
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47062.mbox b/cve/published/2021/CVE-2021-47062.mbox
index aea9c193..3637348d 100644
--- a/cve/published/2021/CVE-2021-47062.mbox
+++ b/cve/published/2021/CVE-2021-47062.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47062: KVM: SVM: Use online_vcpus, not created_vcpus, to iterate over vCPUs
-Message-Id: <2024022953-CVE-2021-47062-ed39@gregkh>
-Content-Length: 2245
-Lines: 55
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2301;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=fs7j/BNdL3qKtnz65qhrphE7BZvJmR8w/gErRIvTJ+o=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkP2R3vu89SMfsTed/h5qrI5RzTn79t3Pvnw8f3rfc5m
- A3Xfy9l6ohlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJiNYwzOFMX9orP2PiqT+/
- W8TEO+b0blvLtYxhvkND3Q9354ZXUotZV8eGrl7Wp8fcDgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -40,7 +29,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit ad73109ae7ec and fixed in 5.12.4 with commit ba7bf5d6336a
Issue introduced in 5.11 with commit ad73109ae7ec and fixed in 5.13 with commit c36b16d29f3a
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47063.mbox b/cve/published/2021/CVE-2021-47063.mbox
index 693203b8..87056f9e 100644
--- a/cve/published/2021/CVE-2021-47063.mbox
+++ b/cve/published/2021/CVE-2021-47063.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47063: drm: bridge/panel: Cleanup connector on bridge detach
-Message-Id: <2024022953-CVE-2021-47063-2f50@gregkh>
-Content-Length: 2482
-Lines: 63
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2546;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=RbtgSWdNUZwiLQEPq/rGNwcW0LhvbzGMjubM1+KSQG8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkP2R3bmtc2nlmnvOX99EsZIiLlX9qvqHj6hAboSmyUm
- hzd/YupI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACZicp9hrvRFC+9E+cLmTyZ5
- SxgSJt86yF3BzbDg2mmjjS5WdZv2GkX3qWe3/D92POo+AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -47,7 +36,7 @@ Affected and fixed versions
Issue introduced in 4.13 with commit 13dfc0540a57 and fixed in 5.12.4 with commit 98d7d76a74e4
Issue introduced in 4.13 with commit 13dfc0540a57 and fixed in 5.13 with commit 4d906839d321
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47064.mbox b/cve/published/2021/CVE-2021-47064.mbox
index 8018c858..4102fb8b 100644
--- a/cve/published/2021/CVE-2021-47064.mbox
+++ b/cve/published/2021/CVE-2021-47064.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47064: mt76: fix potential DMA mapping leak
-Message-Id: <2024022954-CVE-2021-47064-f220@gregkh>
-Content-Length: 2180
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2235;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=W3DQOd1lTtA+sO+vMqMfn0ZtXqTzUppIGCkv1OOZ5JU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkP2Z3cRH6J/DypHaP+aXVy0KQlDAsbY3JF5J7GaeyeH
- yQ3P/F2RywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEyEy5thwbUvyatTXizbyx7e
- cco08PwDO63AXoYFi2Q/9nZMPC3FW5Nxbcr65DcrX4nMAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -38,7 +27,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 27d5c528a7ca and fixed in 5.12.4 with commit 91b9548d413f
Issue introduced in 5.10 with commit 27d5c528a7ca and fixed in 5.13 with commit b4403cee6400
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47065.mbox b/cve/published/2021/CVE-2021-47065.mbox
index 933576fd..cbfaa81b 100644
--- a/cve/published/2021/CVE-2021-47065.mbox
+++ b/cve/published/2021/CVE-2021-47065.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47065: rtw88: Fix array overrun in rtw_get_tx_power_params()
-Message-Id: <2024022954-CVE-2021-47065-be1d@gregkh>
-Content-Length: 4446
-Lines: 107
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4554;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=qcAPeLy8eSLHRmcJIlGL3EhWwPCsZ8HTWYM9RxmF1uE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkP2Z2UtbcdSZRw4JD/sUyL8aE8Q5BH8NxDCVxsQYUhL
- /N2HtDoiGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIlsX84wV0Jo8eMrTHK32afP
- nlGwc5vY77NPehjm2V3cuvYV+4/u+mzzP/1qkt0fhew3AAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -90,7 +79,7 @@ Affected and fixed versions
Issue introduced in 5.3 with commit fa6dfe6bff24 and fixed in 5.12.4 with commit 9cd09722e18a
Issue introduced in 5.3 with commit fa6dfe6bff24 and fixed in 5.13 with commit 2ff25985ea9c
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47066.mbox b/cve/published/2021/CVE-2021-47066.mbox
index 74424c0f..47e4af39 100644
--- a/cve/published/2021/CVE-2021-47066.mbox
+++ b/cve/published/2021/CVE-2021-47066.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47066: async_xor: increase src_offs when dropping destination page
-Message-Id: <2024022954-CVE-2021-47066-02e0@gregkh>
-Content-Length: 2735
-Lines: 66
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2802;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=FNNlExom19QjlLy0ge5MX1N3tXy/9affllEpEaP1/kQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkP2Z1+vJuq6/n5a4efwXEBx792H9T5T9t9uawy5bybU
- +ovzqiwjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjIuQkM8/OXNmled/S/qbhS
- Zd2Z7HyzYy872RnmF0wPiS8Pexaw4+y8x95yzobpN3jsAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -50,7 +39,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 29bcff787a25 and fixed in 5.12.4 with commit 53f8208e11ab
Issue introduced in 5.10 with commit 29bcff787a25 and fixed in 5.13 with commit ceaf2966ab08
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47067.mbox b/cve/published/2021/CVE-2021-47067.mbox
index 5eecab02..5303d4c7 100644
--- a/cve/published/2021/CVE-2021-47067.mbox
+++ b/cve/published/2021/CVE-2021-47067.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47067: soc/tegra: regulators: Fix locking up when voltage-spread is out of range
-Message-Id: <2024022955-CVE-2021-47067-8104@gregkh>
-Content-Length: 2268
-Lines: 55
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2324;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=XbgwaEwxa51qk0M3Lay29wFMxytfKn3JxvbFLdBFU2k=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkP2Z1zdyk+sTzwZhWPSMPcHRvbrqboLj23V0PJJ6zHS
- FbWUedORywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEwkM4ZhfshZvlCFMh+RZX33
- jKe8sbBe3DxdlGGuBJfJOZ7EXZWcVjbHeg/w9fbGi1QAAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -39,7 +28,7 @@ Affected and fixed versions
Issue introduced in 5.5 with commit 783807436f36 and fixed in 5.12.4 with commit ff39adf5d31c
Issue introduced in 5.5 with commit 783807436f36 and fixed in 5.13 with commit ef85bb582c41
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47070.mbox b/cve/published/2021/CVE-2021-47070.mbox
index 38cf3a27..089be939 100644
--- a/cve/published/2021/CVE-2021-47070.mbox
+++ b/cve/published/2021/CVE-2021-47070.mbox
@@ -1,11 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47070: uio_hv_generic: Fix another memory leak in error handling paths
-Message-Id: <2024030141-CVE-2021-47070-0525@gregkh>
-Content-Length: 1835
-Lines: 52
Description
===========
@@ -30,7 +27,7 @@ Affected and fixed versions
Issue introduced in 4.20 with commit cdfa835c6e5e and fixed in 5.12.7 with commit 5f59240cf25b
Issue introduced in 4.20 with commit cdfa835c6e5e and fixed in 5.13 with commit 0b0226be3a52
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47071.mbox b/cve/published/2021/CVE-2021-47071.mbox
index e0c54443..eb3784f5 100644
--- a/cve/published/2021/CVE-2021-47071.mbox
+++ b/cve/published/2021/CVE-2021-47071.mbox
@@ -1,11 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47071: uio_hv_generic: Fix a memory leak in error handling paths
-Message-Id: <2024030141-CVE-2021-47071-cd46@gregkh>
-Content-Length: 2184
-Lines: 55
Description
===========
@@ -31,7 +28,7 @@ Affected and fixed versions
Issue introduced in 4.20 with commit cdfa835c6e5e and fixed in 5.12.7 with commit 53486c467e35
Issue introduced in 4.20 with commit cdfa835c6e5e and fixed in 5.13 with commit 3ee098f96b8b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47073.mbox b/cve/published/2021/CVE-2021-47073.mbox
index 1fcc7a30..3744d331 100644
--- a/cve/published/2021/CVE-2021-47073.mbox
+++ b/cve/published/2021/CVE-2021-47073.mbox
@@ -1,11 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47073: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios
-Message-Id: <2024030142-CVE-2021-47073-704a@gregkh>
-Content-Length: 2775
-Lines: 67
Description
===========
@@ -42,7 +39,7 @@ Affected and fixed versions
Issue introduced in 4.15 with commit 1a258e670434 and fixed in 5.12.7 with commit 8d746ea7c687
Issue introduced in 4.15 with commit 1a258e670434 and fixed in 5.13 with commit 3a53587423d2
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47074.mbox b/cve/published/2021/CVE-2021-47074.mbox
index 133a092c..8ca47f58 100644
--- a/cve/published/2021/CVE-2021-47074.mbox
+++ b/cve/published/2021/CVE-2021-47074.mbox
@@ -1,11 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47074: nvme-loop: fix memory leak in nvme_loop_create_ctrl()
-Message-Id: <2024030142-CVE-2021-47074-46a7@gregkh>
-Content-Length: 1913
-Lines: 50
Description
===========
@@ -27,7 +24,7 @@ Affected and fixed versions
Issue introduced in 4.8 with commit 3a85a5de29ea and fixed in 5.12.7 with commit 551ba08d4b7e
Issue introduced in 4.8 with commit 3a85a5de29ea and fixed in 5.13 with commit 03504e3b54cc
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47075.mbox b/cve/published/2021/CVE-2021-47075.mbox
index bdab5774..5cbbd46c 100644
--- a/cve/published/2021/CVE-2021-47075.mbox
+++ b/cve/published/2021/CVE-2021-47075.mbox
@@ -1,11 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47075: nvmet: fix memory leak in nvmet_alloc_ctrl()
-Message-Id: <2024030142-CVE-2021-47075-8d12@gregkh>
-Content-Length: 2000
-Lines: 52
Description
===========
@@ -29,7 +26,7 @@ Affected and fixed versions
Issue introduced in 5.7 with commit 94a39d61f80f and fixed in 5.12.7 with commit afb680ed7ecb
Issue introduced in 5.7 with commit 94a39d61f80f and fixed in 5.13 with commit fec356a61aa3
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47076.mbox b/cve/published/2021/CVE-2021-47076.mbox
index 2d759e2b..d9985e89 100644
--- a/cve/published/2021/CVE-2021-47076.mbox
+++ b/cve/published/2021/CVE-2021-47076.mbox
@@ -1,11 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47076: RDMA/rxe: Return CQE error if invalid lkey was supplied
-Message-Id: <2024030142-CVE-2021-47076-a6b6@gregkh>
-Content-Length: 3870
-Lines: 86
Description
===========
@@ -64,7 +61,7 @@ Affected and fixed versions
Issue introduced in 4.8 with commit 8700e3e7c485 and fixed in 5.12.7 with commit abe31d25facd
Issue introduced in 4.8 with commit 8700e3e7c485 and fixed in 5.13 with commit dc07628bd2bb
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47077.mbox b/cve/published/2021/CVE-2021-47077.mbox
index e2c6837e..a21b50b7 100644
--- a/cve/published/2021/CVE-2021-47077.mbox
+++ b/cve/published/2021/CVE-2021-47077.mbox
@@ -1,11 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47077: scsi: qedf: Add pointer checks in qedf_update_link_speed()
-Message-Id: <2024030142-CVE-2021-47077-994b@gregkh>
-Content-Length: 2828
-Lines: 73
Description
===========
@@ -50,7 +47,7 @@ Affected and fixed versions
Issue introduced in 4.11 with commit 61d8658b4a43 and fixed in 5.12.7 with commit 11014efcec37
Issue introduced in 4.11 with commit 61d8658b4a43 and fixed in 5.13 with commit 73578af92a0f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47078.mbox b/cve/published/2021/CVE-2021-47078.mbox
index e2e01921..845fcde5 100644
--- a/cve/published/2021/CVE-2021-47078.mbox
+++ b/cve/published/2021/CVE-2021-47078.mbox
@@ -1,11 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47078: RDMA/rxe: Clear all QP fields if creation failed
-Message-Id: <2024030142-CVE-2021-47078-71f9@gregkh>
-Content-Length: 6326
-Lines: 117
Description
===========
@@ -90,7 +87,7 @@ Affected and fixed versions
Issue introduced in 4.8 with commit 8700e3e7c485 and fixed in 5.12.7 with commit 03344e843ab6
Issue introduced in 4.8 with commit 8700e3e7c485 and fixed in 5.13 with commit 67f29896fdc8
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47080.mbox b/cve/published/2021/CVE-2021-47080.mbox
index 9460907a..791b9c82 100644
--- a/cve/published/2021/CVE-2021-47080.mbox
+++ b/cve/published/2021/CVE-2021-47080.mbox
@@ -1,11 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47080: RDMA/core: Prevent divide-by-zero error triggered by the user
-Message-Id: <2024030142-CVE-2021-47080-eb20@gregkh>
-Content-Length: 3429
-Lines: 75
Description
===========
@@ -52,7 +49,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 9f85cbe50aa0 and fixed in 5.12.7 with commit e6871b4270c0
Issue introduced in 5.10 with commit 9f85cbe50aa0 and fixed in 5.13 with commit 54d87913f147
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47082.mbox b/cve/published/2021/CVE-2021-47082.mbox
index a2fb73e5..7b72b63f 100644
--- a/cve/published/2021/CVE-2021-47082.mbox
+++ b/cve/published/2021/CVE-2021-47082.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47082: tun: avoid double free in tun_free_netdev
-Message-Id: <2024030451-CVE-2021-47082-b12c@gregkh>
-Content-Length: 3590
-Lines: 90
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3681;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=/sbMyDuFou/WbhyMTKsAp35J7mGTEQCuHDvsDr6+HlU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnPeHcv/371+TwZOxsOQwON+mub7679Jn72/oFVMz0Zm
- xmqfM0MO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAis74wzLML+buw4d/6nAzv
- B3dLhC3bk3ZxnGBYsMRh0rvoIh1LyQkvC3bf3eQZe+fCNQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -73,7 +62,7 @@ Affected and fixed versions
Fixed in 5.15.12 with commit 3cb5ae77799e
Fixed in 5.16 with commit 158b515f703e
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47083.mbox b/cve/published/2021/CVE-2021-47083.mbox
index 76730c94..d235b05b 100644
--- a/cve/published/2021/CVE-2021-47083.mbox
+++ b/cve/published/2021/CVE-2021-47083.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47083: pinctrl: mediatek: fix global-out-of-bounds issue
-Message-Id: <2024030454-CVE-2021-47083-eab5@gregkh>
-Content-Length: 1870
-Lines: 52
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1923;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=8bPaAaEv8MWOrxWVPI4szLFFS1L0vQe4Ea/nUWEUrGY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnPePcpeYRPs1JILavdeODOFY0NAkaLF7xtZGD62ffU5
- OanWernO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiZkcY5oql5sQUn7qZWtu/
- 7EJsn8Pf/C8OFgwLWg8fPXT92UP1R7ea43XYQh9bMptPAgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -36,7 +25,7 @@ Affected and fixed versions
Fixed in 5.15.12 with commit fb563baa3eb8
Fixed in 5.16 with commit 2d5446da5ace
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47086.mbox b/cve/published/2021/CVE-2021-47086.mbox
index 12c582f9..9f75e022 100644
--- a/cve/published/2021/CVE-2021-47086.mbox
+++ b/cve/published/2021/CVE-2021-47086.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47086: phonet/pep: refuse to enable an unbound pipe
-Message-Id: <2024030455-CVE-2021-47086-cdaa@gregkh>
-Content-Length: 2542
-Lines: 65
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2608;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Lh2zBJBjzU1iwADo9n+uxJ1avWFWKhBIgw+IYnbxI30=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnPePcfNnST80t2KTcvelWT7nNon8jC4OfXtz5QtTWY9
- HOO3fmQjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZhIgQXDgnkBE/T4I8Wa+awO
- KrA3FHM+vN27i2HBjnUSqsprV7/sflMidlJmknGXZON0AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -45,7 +34,7 @@ Affected and fixed versions
Fixed in 5.15.12 with commit 53ccdc73eeda
Fixed in 5.16 with commit 75a2f3152009
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47088.mbox b/cve/published/2021/CVE-2021-47088.mbox
index 30734281..0475cabd 100644
--- a/cve/published/2021/CVE-2021-47088.mbox
+++ b/cve/published/2021/CVE-2021-47088.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47088: mm/damon/dbgfs: protect targets destructions with kdamond_lock
-Message-Id: <2024030413-CVE-2021-47088-269c@gregkh>
-Content-Length: 1985
-Lines: 52
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2038;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=BRALDPJ062nJVE0eCK9BvCTcLrlI6CiNYtjuk4PkbCU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnP+A6KCXPufjM5fKIqj7TzimuewUV+5zKTehwf/jlqp
- 3RnyRvfjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZhIlRbDPN2Jth7/Q/JTopL8
- zLSrPsq/ll//hmF+nvvFQ0bVhkeE07fFXEmzWcjm+/cBAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -38,7 +27,7 @@ Affected and fixed versions
Issue introduced in 5.15 with commit 4bc05954d007 and fixed in 5.15.12 with commit 330c6117a82c
Issue introduced in 5.15 with commit 4bc05954d007 and fixed in 5.16 with commit 34796417964b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47089.mbox b/cve/published/2021/CVE-2021-47089.mbox
index debd8920..d0c3f04f 100644
--- a/cve/published/2021/CVE-2021-47089.mbox
+++ b/cve/published/2021/CVE-2021-47089.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47089: kfence: fix memory leak when cat kfence objects
-Message-Id: <2024030413-CVE-2021-47089-bc5a@gregkh>
-Content-Length: 3824
-Lines: 111
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3936;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=uMQx+b6PRnZkQZXAROM20B39A9lwrbetcytVyeinfrg=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnP+A5mbDzA838te3TpvR9aoVu1zbgrJp90FNaZvc8wK
- ONrm+jejlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjIilqG+TlTLjxff6f60EWm
- 1ZyfqxZe/ND5JIdhwZwfX9f351/413WTqycu6EhZtHLLDwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -97,7 +86,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit 0ce20dd84089 and fixed in 5.15.12 with commit 2f06c8293d27
Issue introduced in 5.12 with commit 0ce20dd84089 and fixed in 5.16 with commit 0129ab1f268b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47090.mbox b/cve/published/2021/CVE-2021-47090.mbox
index 76fdeeda..0448d6da 100644
--- a/cve/published/2021/CVE-2021-47090.mbox
+++ b/cve/published/2021/CVE-2021-47090.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47090: mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page()
-Message-Id: <2024030413-CVE-2021-47090-a429@gregkh>
-Content-Length: 2981
-Lines: 77
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3059;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=g8J8MwV3DXv0jF3GYvoxptORswhnzH3mByCanL7GBlU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnP+A72Hzh54e3/dYeXKToVuX36ff6n6BSZx34Ggd31O
- lpX/kTt7ohlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJ3DnGsGBleIDWnGymxwfE
- 3z1WOPvujIp6TwrDPJV+2y9eRk32HQzv7m4pK9Z8yJxRDgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -62,7 +51,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit b94e02822deb and fixed in 5.15.12 with commit c691e7575eff
Issue introduced in 5.10 with commit b94e02822deb and fixed in 5.16 with commit 2a57d83c78f8
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47091.mbox b/cve/published/2021/CVE-2021-47091.mbox
index a698ba09..79c89e75 100644
--- a/cve/published/2021/CVE-2021-47091.mbox
+++ b/cve/published/2021/CVE-2021-47091.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47091: mac80211: fix locking in ieee80211_start_ap error path
-Message-Id: <2024030414-CVE-2021-47091-edad@gregkh>
-Content-Length: 1889
-Lines: 50
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1940;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=hBq3IkDJ3ak60hNgCzKxsf445ASS/F9QdLqhZ1qV3Qs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnP+A6pnBa9GMr269eC93unHOi//dcp93OA5OX4yWYZk
- y9ErQ2V6YhlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJKBxhmM0a1pJ/+9Qlnuer
- T209u074VYNEbyTD/OQj/3t/HdQ9e+1MJHvaDW7N802OngA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -35,7 +24,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit 295b02c4be74 and fixed in 5.15.12 with commit c1d1ec4db5f7
Issue introduced in 5.10 with commit 295b02c4be74 and fixed in 5.16 with commit 87a270625a89
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47092.mbox b/cve/published/2021/CVE-2021-47092.mbox
index 6080d527..db1d8606 100644
--- a/cve/published/2021/CVE-2021-47092.mbox
+++ b/cve/published/2021/CVE-2021-47092.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47092: KVM: VMX: Always clear vmx->fail on emulation_required
-Message-Id: <2024030414-CVE-2021-47092-36e2@gregkh>
-Content-Length: 4478
-Lines: 96
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4575;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=LFq/OYsSpqGOWFxnZBHELJ/i2QsjgvWdlMrqzqMlaPM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnP+A5tjfPOjAtjvntzs/VfG/bTZYwPvW8ccyl4eutzj
- 1y1rcO5jlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZiIUifDgt0shWyTXHP/35Jc
- 8LMxI1Bp4+u1IQzzI7b4Rave+h9pu/shx8kEj3qlr+4rAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -82,7 +71,7 @@ Affected and fixed versions
Issue introduced in 5.15 with commit c8607e4a086f and fixed in 5.15.12 with commit e4e4e7cb2298
Issue introduced in 5.15 with commit c8607e4a086f and fixed in 5.16 with commit a80dfc025924
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47093.mbox b/cve/published/2021/CVE-2021-47093.mbox
index 4a9dd178..3672d636 100644
--- a/cve/published/2021/CVE-2021-47093.mbox
+++ b/cve/published/2021/CVE-2021-47093.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47093: platform/x86: intel_pmc_core: fix memleak on registration failure
-Message-Id: <2024030414-CVE-2021-47093-ccd0@gregkh>
-Content-Length: 1990
-Lines: 51
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2042;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=xHehOcxlfEOyvdIjRidvUByDu/v2c6GeWwWo31TNItk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnP+A7t2C/1tXsm5173tucSfholQsmXG2pFT+7/apAe8
- jbv10qXjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjI9C8Mc2UaXuy2381b+s7k
- hKvCcR/blviiEob5qS/CC2K/e1ao7HNiTMtoP+f28UM3AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -36,7 +25,7 @@ Affected and fixed versions
Issue introduced in 5.9 with commit 938835aa903a and fixed in 5.15.12 with commit 9ca1324755f1
Issue introduced in 5.9 with commit 938835aa903a and fixed in 5.16 with commit 26a8b0943780
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47095.mbox b/cve/published/2021/CVE-2021-47095.mbox
index 31d66cbe..259122d7 100644
--- a/cve/published/2021/CVE-2021-47095.mbox
+++ b/cve/published/2021/CVE-2021-47095.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47095: ipmi: ssif: initialize ssif_info->client early
-Message-Id: <2024030414-CVE-2021-47095-39dd@gregkh>
-Content-Length: 2874
-Lines: 70
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2945;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=42KqLzSddUZtHmvH766upxCisBk8Yw6OjxwMn3m3uR4=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnP+A5NPBOb0bgytSWatWB1eMsVbY5F07ja10RvKLAPW
- cWcO3FXRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEwkaznDPLMsG5enMX6TnrPd
- snc7oWXIMmG5HsOCgw5Ptwlwi1XPkv7U06lhz7RhTW0uAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -54,7 +43,7 @@ Affected and fixed versions
Issue introduced in 5.4 with commit c4436c9149c5 and fixed in 5.15.12 with commit 77a7311ca167
Issue introduced in 5.4 with commit c4436c9149c5 and fixed in 5.16 with commit 34f35f8f14bc
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47097.mbox b/cve/published/2021/CVE-2021-47097.mbox
index 1d5b6854..bd8a343d 100644
--- a/cve/published/2021/CVE-2021-47097.mbox
+++ b/cve/published/2021/CVE-2021-47097.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47097: Input: elantech - fix stack out of bound access in elantech_change_report_id()
-Message-Id: <2024030415-CVE-2021-47097-e7f4@gregkh>
-Content-Length: 7048
-Lines: 147
-X-Developer-Signature: v=1; a=openpgp-sha256; l=7196;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=NAhwPTudPWUld5L1jMD4sWkGekiA7A80B/N2Dy4FZCw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnP+A6Xn1wnWn1s0VnR6Jp7JSclXQOzZ0VMEr5y3n/JP
- 4vZ1pomHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCR5fwM8zN/RwctXT/9p8vm
- 5W9COuQ2Tj7v3MiwYFZan79d5qfbZ4ql9AqfvKj6v/dZGgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -131,7 +120,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit e4c9062717fe and fixed in 5.15.12 with commit dfd5b60b5342
Issue introduced in 5.11 with commit e4c9062717fe and fixed in 5.16 with commit 1d72d9f960cc
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47098.mbox b/cve/published/2021/CVE-2021-47098.mbox
index 46f996af..61faf458 100644
--- a/cve/published/2021/CVE-2021-47098.mbox
+++ b/cve/published/2021/CVE-2021-47098.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47098: hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations
-Message-Id: <2024030415-CVE-2021-47098-e11f@gregkh>
-Content-Length: 2062
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2117;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=74miLTa60kmwme+R/yLMyHCptb0gmRMFeyXTCZxJdoE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnP+A5vn2l7aemlKf/KGw6oqBpuFudvWH3Sa/H+M4HVX
- m4frvlP6ohlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJHFrKMD8x4IJ8zYv0+elz
- +azNd029MJPx+jeG+ZVtKV/aQv8u1NEVat9avyWj3W3VOwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -40,7 +29,7 @@ Affected and fixed versions
Issue introduced in 5.14 with commit b50aa49638c7 and fixed in 5.15.12 with commit d105f30bea91
Issue introduced in 5.14 with commit b50aa49638c7 and fixed in 5.16 with commit 55840b9eae53
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47099.mbox b/cve/published/2021/CVE-2021-47099.mbox
index 9b446993..9c65e640 100644
--- a/cve/published/2021/CVE-2021-47099.mbox
+++ b/cve/published/2021/CVE-2021-47099.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47099: veth: ensure skb entering GRO are not cloned.
-Message-Id: <2024030415-CVE-2021-47099-3127@gregkh>
-Content-Length: 4857
-Lines: 103
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4961;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=s2FLh7pmdSq+Qn0c0w5CmVZtIXmzaEPtkMnA2jhqqHQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnP+A5LC00sEbo91e36w70Tf+tE6fFvY5qmVaHRE+GyI
- uwm7w6ejlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjIX0+GBRfdT6u6sCYyOsfl
- tVXd7n103kBUiGGe9Ydy1p59XFd4izYWd+94uZKvTpcVAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -89,7 +78,7 @@ Affected and fixed versions
Issue introduced in 5.13 with commit d3256efd8e8b and fixed in 5.15.12 with commit d2269ae48598
Issue introduced in 5.13 with commit d3256efd8e8b and fixed in 5.16 with commit 9695b7de5b47
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47100.mbox b/cve/published/2021/CVE-2021-47100.mbox
index ec50baaa..67dd8cda 100644
--- a/cve/published/2021/CVE-2021-47100.mbox
+++ b/cve/published/2021/CVE-2021-47100.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47100: ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module
-Message-Id: <2024030415-CVE-2021-47100-043d@gregkh>
-Content-Length: 7416
-Lines: 160
-X-Developer-Signature: v=1; a=openpgp-sha256; l=7577;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=b3jLOQB58xmSW2Etrpza4wtgcaiD3Y7FmnzTHbT0rA4=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnP+A4/3xVtpbnb2FhDxvPDUu6POQf2ZiWu5u/NSy2/J
- u1gLKjYEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABNR28AwT820c73pvqWTZ8+f
- 1VN3OL5oieI/VobZLJkbP31OYN6zce4t/r2LC233qG5hBwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -143,7 +132,7 @@ Affected and fixed versions
Issue introduced in 4.15 with commit b2cfd8ab4add and fixed in 5.15.12 with commit 6b3f7e4b10f3
Issue introduced in 4.15 with commit b2cfd8ab4add and fixed in 5.16 with commit ffb76a86f809
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47101.mbox b/cve/published/2021/CVE-2021-47101.mbox
index 608ed293..7fee99c2 100644
--- a/cve/published/2021/CVE-2021-47101.mbox
+++ b/cve/published/2021/CVE-2021-47101.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47101: asix: fix uninit-value in asix_mdio_read()
-Message-Id: <2024030415-CVE-2021-47101-f3fa@gregkh>
-Content-Length: 2307
-Lines: 56
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2364;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=GeYnq2NZ3mD1DfsvBU5+tMPHrwsJaXBUGA2Ri9377qM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnP+I7MvPJ61YUkOb4pUrnvW26ompof2XeJ6Vi0i9Tqt
- kxTkQvfOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiAlsYFvR+ZQpPeJ3QG3Pg
- 0pRT+17Zf5/tZ8cwzzJq4duEFC2mncf6b7PaeERJPd76GAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
Issue introduced in 4.9 with commit d9fe64e51114 and fixed in 5.15.12 with commit d259f621c859
Issue introduced in 4.9 with commit d9fe64e51114 and fixed in 5.16 with commit 8035b1a2a37a
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47102.mbox b/cve/published/2021/CVE-2021-47102.mbox
index 1708375a..08004e5c 100644
--- a/cve/published/2021/CVE-2021-47102.mbox
+++ b/cve/published/2021/CVE-2021-47102.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47102: net: marvell: prestera: fix incorrect structure access
-Message-Id: <2024030416-CVE-2021-47102-1335@gregkh>
-Content-Length: 2942
-Lines: 74
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3017;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=qTh2/lB7jC+aCD2tDUNwsW0wqkktFXnks7cQIBMA+O0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnP+I70MMs+ced5qfdrWsKDpgxDK3/xO4uza8+I7dOa9
- CBBIHB5RywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExkfgzDgkU/LS7tt9RxvRdk
- /uLziYrAxFdvvzHMD1mvEGWQUZW8UfJpesWxT5oXxE8bAQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -60,7 +49,7 @@ Affected and fixed versions
Issue introduced in 5.14 with commit 3d5048cc54bd and fixed in 5.15.12 with commit 5c553a0cd126
Issue introduced in 5.14 with commit 3d5048cc54bd and fixed in 5.16 with commit 2efc2256febf
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47103.mbox b/cve/published/2021/CVE-2021-47103.mbox
index eb715aaf..e6d3a9b4 100644
--- a/cve/published/2021/CVE-2021-47103.mbox
+++ b/cve/published/2021/CVE-2021-47103.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47103: inet: fully convert sk->sk_rx_dst to RCU rules
-Message-Id: <2024030416-CVE-2021-47103-4314@gregkh>
-Content-Length: 13183
-Lines: 281
-X-Developer-Signature: v=1; a=openpgp-sha256; l=13465;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=YtDQ8QNG9YXtva61n8Z0WhwRo2XcoEi7mOtoY46vfHk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnP+I7c3v1rl6w7Z8Ha6fEP3zxcWqCyYd7zNm/B4u4F3
- w4Wsrbe74hlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJLKhjWDBlYuH9uYtevdqq
- xF/nEya279K2u98Y5kf/vjJhS7zwnPNMTMftJ0Wxd+4NPAQA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -255,7 +244,7 @@ Affected and fixed versions
Issue introduced in 3.6 with commit 41063e9dd119 and fixed in 5.15.12 with commit 0249a4b8a554
Issue introduced in 3.6 with commit 41063e9dd119 and fixed in 5.16 with commit 8f905c0e7354
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47105.mbox b/cve/published/2021/CVE-2021-47105.mbox
index b03e2716..e1d34583 100644
--- a/cve/published/2021/CVE-2021-47105.mbox
+++ b/cve/published/2021/CVE-2021-47105.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47105: ice: xsk: return xsk buffers back to pool when cleaning the ring
-Message-Id: <2024030444-CVE-2021-47105-fa23@gregkh>
-Content-Length: 2098
-Lines: 56
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2155;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=COmZEdz+NgXW+6dAh3Pi74TIdlH5RxYLhyWUEayK4T0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnPBDyFqjUCqjcenLFI8KrPO4+Lv1sO8S22fqG2OeViA
- u+1BUZ+HbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjARZRGG+WmLPeeGGf4O/Txv
- JdOj+IjpP79NucKwoNM0Yt/y7y8nPFh+8Mn/Hdn8fAEBUwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
Issue introduced in 5.5 with commit 2d4238f55697 and fixed in 5.15.12 with commit ad6d20da2cfb
Issue introduced in 5.5 with commit 2d4238f55697 and fixed in 5.16 with commit afe8a3ba85ec
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47106.mbox b/cve/published/2021/CVE-2021-47106.mbox
index cc17012b..659a1e7c 100644
--- a/cve/published/2021/CVE-2021-47106.mbox
+++ b/cve/published/2021/CVE-2021-47106.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47106: netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy()
-Message-Id: <2024030445-CVE-2021-47106-fdff@gregkh>
-Content-Length: 12233
-Lines: 248
-X-Developer-Signature: v=1; a=openpgp-sha256; l=12482;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=ZgvQ3ECs3RFtZ3BgSNCf8hvnVlIIq/pD1pRxplVjG+E=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnPBDw31Iquv7DAJ0Nv2dEAASFp5h/sc0u2VG2Sr5/At
- qFsI4d+RywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzEIZFhwdwAztDkSSuWTYoP
- aZxxtY7vEn+ELsOC7kUFyw8xTFJbrfhyu6OG+KnJrxVCAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -234,7 +223,7 @@ Affected and fixed versions
Issue introduced in 5.13 with commit aaa31047a6d2 and fixed in 5.15.12 with commit 9d558e5f0d6f
Issue introduced in 5.13 with commit aaa31047a6d2 and fixed in 5.16 with commit 0f7d9b31ce7a
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47107.mbox b/cve/published/2021/CVE-2021-47107.mbox
index ba0ff82d..116878dc 100644
--- a/cve/published/2021/CVE-2021-47107.mbox
+++ b/cve/published/2021/CVE-2021-47107.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47107: NFSD: Fix READDIR buffer overflow
-Message-Id: <2024030445-CVE-2021-47107-7dda@gregkh>
-Content-Length: 2353
-Lines: 63
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2417;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=uEYwRrNHWdBpUi+2/90/x9pCz3YvDTWvjUhb87ogmYI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnPBDw1Xr+RdJxT/JQ7x0ehbk5sKkMcu4xC7tX/F60EJ
- e85CrJ2xLIwCDIxyIopsnzZxnN0f8UhRS9D29Mwc1iZQIYwcHEKwETqhBjmSs27wfXnohinuMPu
- 8qJeEYfNHwKPMsyzrHx2p+UD+8JVnyv3RX42azmj/7IUAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -48,7 +37,7 @@ Affected and fixed versions
Issue introduced in 5.13 with commit 7f87fc2d34d4 and fixed in 5.15.12 with commit eabc0aab98e5
Issue introduced in 5.13 with commit 7f87fc2d34d4 and fixed in 5.16 with commit 53b1119a6e50
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47109.mbox b/cve/published/2021/CVE-2021-47109.mbox
index eb4b632f..b3b2f46b 100644
--- a/cve/published/2021/CVE-2021-47109.mbox
+++ b/cve/published/2021/CVE-2021-47109.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47109: neighbour: allow NUD_NOARP entries to be forced GCed
-Message-Id: <2024031558-CVE-2021-47109-5bde@gregkh>
-Content-Length: 2321
-Lines: 57
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2379;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=EXVZdCrElRHfNVvB32S+ww/BRaiOyVwV0C7Cujg9KbQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1jhdOFWmo9I2+6gY6z6zWL21KbY+uaY/57TclCsQD
- r5jPoe5I5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACbC/5xhfqqvfsFF11oLgY9V
- RTXx/5obDFffYZhn8VbHeWUH78tjS1zlA9vmRf2Oa6gEAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -41,7 +30,7 @@ Affected and fixed versions
Issue introduced in 5.0 with commit 58956317c8de and fixed in 5.12.10 with commit ddf088d7aaaa
Issue introduced in 5.0 with commit 58956317c8de and fixed in 5.13 with commit 7a6b1ab7475f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47110.mbox b/cve/published/2021/CVE-2021-47110.mbox
index 508fd46f..c57294e2 100644
--- a/cve/published/2021/CVE-2021-47110.mbox
+++ b/cve/published/2021/CVE-2021-47110.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47110: x86/kvm: Disable kvmclock on all CPUs on shutdown
-Message-Id: <2024031506-CVE-2021-47110-2cb8@gregkh>
-Content-Length: 2254
-Lines: 60
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2315;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=MRogQqfdQio3/6/EWqFi0gCfWbHt7zl9YNTte3ZTLUM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1nh19XEeiOU8xbhK9ul5Jq7ch2I2bAIJQnMjrtu7t
- FjV9fR3xLIwCDIxyIopsnzZxnN0f8UhRS9D29Mwc1iZQIYwcHEKwEQOdDMsWBl3JtC1mN9E/wRf
- qsfuZ5PuzDs2m2HBKe2MP7LuB612zSjT+fVq0n8uCbcYAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
Fixed in 5.12.10 with commit 1df2dc09926f
Fixed in 5.13 with commit c02027b5742b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47111.mbox b/cve/published/2021/CVE-2021-47111.mbox
index ef529793..b9a106a8 100644
--- a/cve/published/2021/CVE-2021-47111.mbox
+++ b/cve/published/2021/CVE-2021-47111.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47111: xen-netback: take a reference to the RX task thread
-Message-Id: <2024031506-CVE-2021-47111-4bd0@gregkh>
-Content-Length: 2251
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2311;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=UMliAEtAOmkZjtgZuTKsjs81it66uE0o9Z8QO/GQROU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1nip7r9XOv/Q6q9SHJpLfmzSkpnz88bE5hMbeScrH
- 2C+wHd2V0csC4MgE4OsmCLLl208R/dXHFL0MrQ9DTOHlQlkCAMXpwBMxD6XYQ7fSonTXlcYRTas
- lL++82Xh5ht2KqwMC+YbHzH4/kLkQI7k5BUyJ2oPqVsangUA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -44,7 +33,7 @@ Affected and fixed versions
Issue introduced in 5.5 with commit 2ac061ce97f4 and fixed in 5.12.10 with commit caec9bcaeb1a
Issue introduced in 5.5 with commit 2ac061ce97f4 and fixed in 5.13 with commit 107866a8eb0b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47112.mbox b/cve/published/2021/CVE-2021-47112.mbox
index e0de079c..8ebc6dd7 100644
--- a/cve/published/2021/CVE-2021-47112.mbox
+++ b/cve/published/2021/CVE-2021-47112.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47112: x86/kvm: Teardown PV features on boot CPU as well
-Message-Id: <2024031507-CVE-2021-47112-339c@gregkh>
-Content-Length: 2163
-Lines: 57
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2221;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=K2mRXwR2ipbjmDVTwBunauYAi7jVWgkLwTzEa0K6J0M=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1njf2HHX6kueScWhpsYS0aAunoNhzwKOhlsZ6h1Ij
- rzQwa/WEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABOpkWCY79mUMf+XaIn7sUa7
- ErNFqU8Xn75yhmFBr/Q0832uKYtv56gWFOdbxqTx954GAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -41,7 +30,7 @@ Affected and fixed versions
Fixed in 5.12.10 with commit d1629b5b925d
Fixed in 5.13 with commit 8b79feffeca2
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47113.mbox b/cve/published/2021/CVE-2021-47113.mbox
index 2909e255..3bfb6eb5 100644
--- a/cve/published/2021/CVE-2021-47113.mbox
+++ b/cve/published/2021/CVE-2021-47113.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47113: btrfs: abort in rename_exchange if we fail to insert the second ref
-Message-Id: <2024031507-CVE-2021-47113-bf29@gregkh>
-Content-Length: 2020
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2075;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=R8CyICg3LuZ1vtfy2Fjg3Xjt1JUXlJ38Td9EyJHYoNE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1nhfZPh258sM5/sidbfS1HdwT274ybNLfaHORofD0
- vx8JnLcHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCR3I8MC/b3JSl4VFj2cla4
- yD/eeYwjU0SjmWGu9JeDWf/Vghl+J3BniuUdPzm/dasyAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -39,7 +28,7 @@ Affected and fixed versions
Fixed in 5.12.10 with commit ff8de2cec65a
Fixed in 5.13 with commit dc09ef356272
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47114.mbox b/cve/published/2021/CVE-2021-47114.mbox
index 999fce2e..67c13708 100644
--- a/cve/published/2021/CVE-2021-47114.mbox
+++ b/cve/published/2021/CVE-2021-47114.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47114: ocfs2: fix data corruption by fallocate
-Message-Id: <2024031507-CVE-2021-47114-6af8@gregkh>
-Content-Length: 3261
-Lines: 80
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3342;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=AHLefo1BQDELifwHnM3VhW57qEtSoQAmrACHqSes1tY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1njXLdolqOXsk+zeFuk2df6fP8dZMk3fTru6Ne3os
- qWLL0zk74hlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJ2OUyzGb/372asSK+ynPb
- vU/5341vOebeL2ZYcPyHX37c/IKJ0xee6pX67P9+rWvqTQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -60,7 +49,7 @@ Affected and fixed versions
Fixed in 5.12.10 with commit 0a31dd6fd2f4
Fixed in 5.13 with commit 6bba4471f0cc
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47116.mbox b/cve/published/2021/CVE-2021-47116.mbox
index 1a8d05c5..0dfe3019 100644
--- a/cve/published/2021/CVE-2021-47116.mbox
+++ b/cve/published/2021/CVE-2021-47116.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47116: ext4: fix memory leak in ext4_mb_init_backend on error path.
-Message-Id: <2024031508-CVE-2021-47116-8383@gregkh>
-Content-Length: 1727
-Lines: 50
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1778;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=bf+ai+vx2MDTMtDh44UqyHRrVEzxTM/e0LHDxazIdIE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1vjMupzfnN6+bb2GZNC0aRrJjmdbGJZv2qJ55knHs
- pAIVZ2dHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjARsW6GueJ856at1dqtf6WB
- e/KH3d0S+zPmsTEs2LJD02Tnqv3lH89EnS6svfEi0PnndgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -35,7 +24,7 @@ Affected and fixed versions
Fixed in 5.12.10 with commit 04fb2baa0b14
Fixed in 5.13 with commit a8867f4e3809
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47117.mbox b/cve/published/2021/CVE-2021-47117.mbox
index 67351347..b0a4fc8a 100644
--- a/cve/published/2021/CVE-2021-47117.mbox
+++ b/cve/published/2021/CVE-2021-47117.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47117: ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed
-Message-Id: <2024031508-CVE-2021-47117-5ea7@gregkh>
-Content-Length: 3695
-Lines: 86
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3782;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=YHSQ2lJMGVu9yuKdgv+axNeHJqRlncMSyXGRECvziN8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1vjy7RKOivnhZn6q9rPRvoi+CbEbJtucrWOXMTeZq
- P3Mfs6FjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZhItwjDgiVpYXLMIe9XGU5U
- Tn7m7fp5/0GnFIb5vnMXrdmx0CW9813l9mAJE6+4kpc3AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -66,7 +55,7 @@ Affected and fixed versions
Fixed in 5.12.10 with commit 48105dc98c9c
Fixed in 5.13 with commit 082cd4ec240b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47119.mbox b/cve/published/2021/CVE-2021-47119.mbox
index 81fb197f..cd42b438 100644
--- a/cve/published/2021/CVE-2021-47119.mbox
+++ b/cve/published/2021/CVE-2021-47119.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47119: ext4: fix memory leak in ext4_fill_super
-Message-Id: <2024031509-CVE-2021-47119-22d3@gregkh>
-Content-Length: 2617
-Lines: 66
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2684;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=CIV8Orjqp+X/587p0w7c3vLDvuEQ7gBsjJq2Moicp5g=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1viq1myz0V33ZkNSxeen12pzNSIKXrSZK/JaOkhrX
- Vdi3WLaEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABO5mc8wz37JSvaOjSx26oZm
- GbuWZbVtneJ5hGG+S4Mjr9sSQa0fSjY50eHT7vL/PLQBAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -51,7 +40,7 @@ Affected and fixed versions
Issue introduced in 2.6.19 with commit ac27a0ec112a and fixed in 5.12.10 with commit 1385b23396d5
Issue introduced in 2.6.19 with commit ac27a0ec112a and fixed in 5.13 with commit afd09b617db3
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47120.mbox b/cve/published/2021/CVE-2021-47120.mbox
index 9cc3289b..0c21da3f 100644
--- a/cve/published/2021/CVE-2021-47120.mbox
+++ b/cve/published/2021/CVE-2021-47120.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47120: HID: magicmouse: fix NULL-deref on disconnect
-Message-Id: <2024031510-CVE-2021-47120-c3db@gregkh>
-Content-Length: 2278
-Lines: 55
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2334;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=KKnAZzdh7D61eNLpkShBbmvz9bFHpWmnKwWHRD3Qo8w=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1vhJZk4K33DpgeqUtSrrbI4mhGnONflu4K0+xZzxI
- N/V94FqHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRwy4MCw4E7G2c02vVJdea
- UM5VeN+nd8qWuwzz1PmuXP3/IHLB7keZ+suNBTp+mDx/CQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -39,7 +28,7 @@ Affected and fixed versions
Issue introduced in 4.20 with commit 9d7b18668956 and fixed in 5.12.10 with commit 9cf27473f219
Issue introduced in 4.20 with commit 9d7b18668956 and fixed in 5.13 with commit 4b4f6cecca44
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47121.mbox b/cve/published/2021/CVE-2021-47121.mbox
index c6ffb37b..0b405645 100644
--- a/cve/published/2021/CVE-2021-47121.mbox
+++ b/cve/published/2021/CVE-2021-47121.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47121: net: caif: fix memory leak in cfusbl_device_notify
-Message-Id: <2024031510-CVE-2021-47121-13c1@gregkh>
-Content-Length: 2771
-Lines: 62
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2834;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=hJHQKZ1dy5HY3BJdNvw3pAlCqU52Ttyc70n9jF85Gs0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1vj9mjVRP3BFoeKB4GuJ3RPNr++894Tn1JWmV+KmI
- W5ZxcmVHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRJBWG+e6cbg//vN++VzTr
- otF0x8XrLBpPbGdY0DWl5XZVZct14/22f75digoWuN/2BQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
Issue introduced in 3.3 with commit 7ad65bf68d70 and fixed in 5.12.10 with commit dde8686985ec
Issue introduced in 3.3 with commit 7ad65bf68d70 and fixed in 5.13 with commit 7f5d86669fa4
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47122.mbox b/cve/published/2021/CVE-2021-47122.mbox
index 6e60947b..0718ba05 100644
--- a/cve/published/2021/CVE-2021-47122.mbox
+++ b/cve/published/2021/CVE-2021-47122.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47122: net: caif: fix memory leak in caif_device_notify
-Message-Id: <2024031510-CVE-2021-47122-b183@gregkh>
-Content-Length: 2768
-Lines: 62
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2831;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=n65gYxsjTIJDFtvCVX504pzs6vpi9xoqoBgxpSbVzsE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1vhpRHDlPPv0Myjv8bc9vjs+509iU1ra2PN2YWDRl
- DwJY87QjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZhIwTeGBVdXfNAt6phfvoX3
- 5nzjMkdtnyazqwzzNLwPvw00DeOxOSWmX670rywzvbcUAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
Issue introduced in 3.3 with commit 7c18d2205ea7 and fixed in 5.12.10 with commit 6a0e317f6109
Issue introduced in 3.3 with commit 7c18d2205ea7 and fixed in 5.13 with commit b53558a950a8
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47125.mbox b/cve/published/2021/CVE-2021-47125.mbox
index be0c9ed5..baf18d09 100644
--- a/cve/published/2021/CVE-2021-47125.mbox
+++ b/cve/published/2021/CVE-2021-47125.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47125: sch_htb: fix refcount leak in htb_parent_to_leaf_offload
-Message-Id: <2024031511-CVE-2021-47125-9c33@gregkh>
-Content-Length: 2270
-Lines: 60
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2331;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=lRE9FY1/aY+uI6PA6612qnHUm5vKf1dngbTwEcb71Pc=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1vg3sa2yfuXm+Xzqyw0PlrJMqp4gku7nGLyH3+j9h
- RNGmjuZOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiUW4M8/Tjrj3vMapIfZKW
- /XNeA9c3/zMXuBkWbDhyiOHI7Pg2zefdks/iFlcUPeZUAgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -46,7 +35,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit ae81feb7338c and fixed in 5.12.10 with commit 2411c02d0389
Issue introduced in 5.12 with commit ae81feb7338c and fixed in 5.13 with commit 944d671d5faa
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47127.mbox b/cve/published/2021/CVE-2021-47127.mbox
index 3974d07e..1c06c8fc 100644
--- a/cve/published/2021/CVE-2021-47127.mbox
+++ b/cve/published/2021/CVE-2021-47127.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47127: ice: track AF_XDP ZC enabled queues in bitmap
-Message-Id: <2024031512-CVE-2021-47127-d0d6@gregkh>
-Content-Length: 4638
-Lines: 99
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4738;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=72RFDLA4mlZ1dMOC+iz7tp0UnVp2Q+LMI3vPnLxqVHo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1gTonT6tamIT4a83+6T/gcnT6+3T3yxW8z5kJaN49
- t25Fu/dHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjARAWeGBROfOdiLVCb+fNLi
- +vaVh0FdxKHlqgxzhe79C3LPfvBggVFs0P8bXRf/PHq1HwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -83,7 +72,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit c7a219048e45 and fixed in 5.12.10 with commit 1d34fa4fcf06
Issue introduced in 5.12 with commit c7a219048e45 and fixed in 5.13 with commit e102db780e1c
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47128.mbox b/cve/published/2021/CVE-2021-47128.mbox
index d4685ba7..ae244ee7 100644
--- a/cve/published/2021/CVE-2021-47128.mbox
+++ b/cve/published/2021/CVE-2021-47128.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47128: bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks
-Message-Id: <2024031512-CVE-2021-47128-bef7@gregkh>
-Content-Length: 10017
-Lines: 193
-X-Developer-Signature: v=1; a=openpgp-sha256; l=10211;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=mbXLrkQrqSVUsMXrMuRA0u/MxjY9DterNR4RqBJiMDY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1gSytJ6s+LBeZCO7vMF53l2TGaI3np+8V08tQ3a99
- glL1yfLOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BeAiPxnmZx/4eZfpbGH7et1J
- ++Mer1nbXyL/kmEOZ+lerqDckhdzGxxL4vsunfD6WFcPAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -177,7 +166,7 @@ Affected and fixed versions
Issue introduced in 5.6 with commit 59438b46471a and fixed in 5.12.10 with commit acc43fc6cf0d
Issue introduced in 5.6 with commit 59438b46471a and fixed in 5.13 with commit ff40e51043af
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47129.mbox b/cve/published/2021/CVE-2021-47129.mbox
index c436d884..64643ab1 100644
--- a/cve/published/2021/CVE-2021-47129.mbox
+++ b/cve/published/2021/CVE-2021-47129.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47129: netfilter: nft_ct: skip expectations for confirmed conntrack
-Message-Id: <2024031513-CVE-2021-47129-7ba5@gregkh>
-Content-Length: 3930
-Lines: 81
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4012;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=gHL7OmLOOqHQAId02kz19NcsW5y5uLNblmSVn49/HOk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1gTO3qXZNNMtz+aj0LwZXmpbNjn5Wd1Qm7TuVKQ6q
- 7H+kS1mHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRo3MZZjLanrN/95P1mpnF
- xW+JdZOSFvbf5mZYsGKSxPUbJT7rNzvcljn4IVLucErtBwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -65,7 +54,7 @@ Affected and fixed versions
Issue introduced in 5.3 with commit 857b46027d6f and fixed in 5.12.10 with commit 2c0e6b35b88a
Issue introduced in 5.3 with commit 857b46027d6f and fixed in 5.13 with commit 1710eb913bdc
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47130.mbox b/cve/published/2021/CVE-2021-47130.mbox
index 5cf4f1a1..66c3cc0c 100644
--- a/cve/published/2021/CVE-2021-47130.mbox
+++ b/cve/published/2021/CVE-2021-47130.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47130: nvmet: fix freeing unallocated p2pmem
-Message-Id: <2024031513-CVE-2021-47130-9f71@gregkh>
-Content-Length: 2883
-Lines: 71
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2955;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=sFwYT9Lpum1tdal9ePQJ27nx0U48ha70mTNV4ELikXs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1gQ++1UlX2QZ01Vfw2xskuj5PrQ+Wt1esSiAuWCzt
- 8kfdq6OWBYGQSYGWTFFli/beI7urzik6GVoexpmDisTyBAGLk4BmMid7QzzU35cfsLqaXbBpiXi
- 5j/P3MnRS32NGeb7qXdaVN8sKJGuTpHzCv2aa59T9BAA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -56,7 +45,7 @@ Affected and fixed versions
Issue introduced in 5.8 with commit c6e3f1339812 and fixed in 5.12.10 with commit 8a452d62e7ce
Issue introduced in 5.8 with commit c6e3f1339812 and fixed in 5.13 with commit bcd9a0797d73
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47131.mbox b/cve/published/2021/CVE-2021-47131.mbox
index ee516dc6..4065f3e1 100644
--- a/cve/published/2021/CVE-2021-47131.mbox
+++ b/cve/published/2021/CVE-2021-47131.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47131: net/tls: Fix use-after-free after the TLS device goes down and up
-Message-Id: <2024031513-CVE-2021-47131-eafc@gregkh>
-Content-Length: 3225
-Lines: 76
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3302;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=wZAN/kS8ksi/icF49t1Jq9jR9Ow44UiS0fNZaDFn2zU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1gTNeX03K95MomPhtKfv7xUePlsjEnrtg2SlA8PN3
- 426UxpXdMSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEfh1gWLDBTvskRxLzE/F5
- kYqLzpjK/Xg9uYhhrtD/66HzK5pX/pimMcPzDy+/0oEtKgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -58,7 +47,7 @@ Affected and fixed versions
Issue introduced in 4.18 with commit e8f69799810c and fixed in 5.12.10 with commit 0f1e6fe66977
Issue introduced in 4.18 with commit e8f69799810c and fixed in 5.13 with commit c55dcdd435aa
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47133.mbox b/cve/published/2021/CVE-2021-47133.mbox
index 41a1d158..feccec61 100644
--- a/cve/published/2021/CVE-2021-47133.mbox
+++ b/cve/published/2021/CVE-2021-47133.mbox
@@ -1,19 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47133: HID: amd_sfh: Fix memory leak in amd_sfh_work
-Message-Id: <2024031514-CVE-2021-47133-1141@gregkh>
-Content-Length: 3079
-Lines: 75
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3155;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=aKwD0Nz2QUl2u3X7nthsoQPn4cyHBARNg8S3Lgz2LMk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKlf1gQ1Kgq9FueeuPJTVu6M67/Waqqerv6s8tx3Q4RMz
- M8zeq6bO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAikYsY5tnuuvvoWtHlgrei
- 873r3zqx1DYdXcSwYCNXpq1+/Fqd0KOvGtsUegOMfMROAAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -61,7 +50,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit 4b2c53d93a4b and fixed in 5.12.10 with commit 29beadea66a2
Issue introduced in 5.11 with commit 4b2c53d93a4b and fixed in 5.13 with commit 5ad755fd2b32
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2021/CVE-2021-47137.mbox b/cve/published/2021/CVE-2021-47137.mbox
index f69f813f..ed86e02e 100644
--- a/cve/published/2021/CVE-2021-47137.mbox
+++ b/cve/published/2021/CVE-2021-47137.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47137: net: lantiq: fix memory corruption in RX ring
-Message-Id: <2024032556-CVE-2021-47137-7c8e@gregkh>
-Content-Length: 2240
-Lines: 55
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2296;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=UpbjF2+KJDb0tHfoFAqFxp6Fvoex/E1paS+V4ku9b9E=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdm/Y3vN+kW7zvpPc2RwpXre97eNs+8z6py+2Ly2Yd
- 1OorU6sI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACaSV8gwT2Gz+s2fFXtmxc35
- tnAjk5Z888VvWgwLDt04178/Z2fX7qpJR89an7Z4f3BDIwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47138.mbox b/cve/published/2021/CVE-2021-47138.mbox
index 7964dfd0..0dabd512 100644
--- a/cve/published/2021/CVE-2021-47138.mbox
+++ b/cve/published/2021/CVE-2021-47138.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47138: cxgb4: avoid accessing registers when clearing filters
-Message-Id: <2024032557-CVE-2021-47138-9241@gregkh>
-Content-Length: 2255
-Lines: 55
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2311;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=qp9s3AOisLRwmLGd9gGWsTRl/E49+1zSmRAz8NuOahQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdm/DXQ96BeY+1vh2QILhaAH7wrVzkgM/yqf91pEIP
- FYgVXigI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACbyYjXDgoVsEZ/X1sj/P3nE
- I+fb9DDWgwF6qxgWLNbaMt9Y909X9mShboOqzUtW9hs8AQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47139.mbox b/cve/published/2021/CVE-2021-47139.mbox
index 9a4db92d..391af336 100644
--- a/cve/published/2021/CVE-2021-47139.mbox
+++ b/cve/published/2021/CVE-2021-47139.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47139: net: hns3: put off calling register_netdev() until client initialize complete
-Message-Id: <2024032557-CVE-2021-47139-994d@gregkh>
-Content-Length: 5495
-Lines: 121
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5617;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=u74KuGePYdwhO65xkT8m/7eawvCVddPUqbUsdgV9Iq0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdm9TWIUDdzzaL+3z4eHZNz9uTt9ms79ijxe7o6jM2
- eCFZ84+7ohlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJbPJmmO94VOLhhZbcmd+6
- vzdVl2btiDE57smwYPfXfYovrGXvBrnqdz9ytpeIvW09AwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47140.mbox b/cve/published/2021/CVE-2021-47140.mbox
index 77d293ec..55ab9923 100644
--- a/cve/published/2021/CVE-2021-47140.mbox
+++ b/cve/published/2021/CVE-2021-47140.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47140: iommu/amd: Clear DMA ops when switching domain
-Message-Id: <2024032557-CVE-2021-47140-5dd4@gregkh>
-Content-Length: 2451
-Lines: 66
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2518;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=ReWgKhO3bL/0lXzUcyfuXqqCHI5ZW24rkK1O75u21VU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdm+N58yMP3H/5kztF5ve7+FkfmPR23d2c/1KpdAVs
- e/WCKY3dMSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEFh1kmF+wnm9ixu8VZhn+
- +/enO0Q8EFmUlsyw4HDOclV3PfYn+Q+ezkkrXf/spO5qLgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47141.mbox b/cve/published/2021/CVE-2021-47141.mbox
index e8d6c8c2..54d22ce6 100644
--- a/cve/published/2021/CVE-2021-47141.mbox
+++ b/cve/published/2021/CVE-2021-47141.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47141: gve: Add NULL pointer checks when freeing irqs.
-Message-Id: <2024032557-CVE-2021-47141-ce47@gregkh>
-Content-Length: 2160
-Lines: 53
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2214;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=C0EA1NQwxoC6uNgAZ0XCioosvLu0kpgvZqvDynKPKok=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdu8U2MRcK+Yr/1H7oBS3qz0yp2WG88Voe6ZVv/87b
- nt7XHRxRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEwkwo5hftzaytzGEI5z177N
- /f5x2qonAT9e1TLMU38iuvxR/Ka7Fyax/OEOWdugkffYAAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47142.mbox b/cve/published/2021/CVE-2021-47142.mbox
index 1c218911..2e58adfc 100644
--- a/cve/published/2021/CVE-2021-47142.mbox
+++ b/cve/published/2021/CVE-2021-47142.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47142: drm/amdgpu: Fix a use-after-free
-Message-Id: <2024032558-CVE-2021-47142-9319@gregkh>
-Content-Length: 3019
-Lines: 74
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3094;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=nW371dOOrkriKNimBJzO5FxZJtTgGS/EO4C8aTx9L6g=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdu+kjxjO1Ve3PhoqIxB59LR1uaHH2v6c2VYbY98VK
- V84xDqhI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACYSZcMwV/gMR8LExPSb9dLx
- PBeENvicncgeyTA/09XgfkUOs9hRp+BnL2ed9w61LO0DAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47143.mbox b/cve/published/2021/CVE-2021-47143.mbox
index cc8d0a31..0325b8d1 100644
--- a/cve/published/2021/CVE-2021-47143.mbox
+++ b/cve/published/2021/CVE-2021-47143.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47143: net/smc: remove device from smcd_dev_list after failed device_add()
-Message-Id: <2024032558-CVE-2021-47143-4f3c@gregkh>
-Content-Length: 2021
-Lines: 53
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2075;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=N10i9v4UrpxLQvdA79eZhhlcxIIqcmIRMqeW2E9MNwY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdu+eGhVs4zHJ3md+33rNO7POLuMHS6Rd5zpJH9UJE
- rn+hvtMRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzkbinDLOb6IM7GD7O//L7E
- GPf++xvr1O3bnzPMT70SVW73mc/HtJBr0/qdTK6yfqnBAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47144.mbox b/cve/published/2021/CVE-2021-47144.mbox
index 6a6ab4e6..bd11e732 100644
--- a/cve/published/2021/CVE-2021-47144.mbox
+++ b/cve/published/2021/CVE-2021-47144.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47144: drm/amd/amdgpu: fix refcount leak
-Message-Id: <2024032558-CVE-2021-47144-26d3@gregkh>
-Content-Length: 2042
-Lines: 58
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2101;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=M01FnDA73h7zpO70eJQaZg/4+8JaLcL9k7JK5n0Tr24=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdu80b7g0/U9ZdT5kGduiZ4zL5h+cfEGsIPrQvjzG3
- HtP+SfO6IhlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJcD5iWNCxKS26/aRWrN6l
- tKoNe3X//+GSj2FYsC5+kVtd4P8rU/SOLnu/7ei6NsaTdwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47145.mbox b/cve/published/2021/CVE-2021-47145.mbox
index c8259155..b78dae57 100644
--- a/cve/published/2021/CVE-2021-47145.mbox
+++ b/cve/published/2021/CVE-2021-47145.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47145: btrfs: do not BUG_ON in link_to_fixup_dir
-Message-Id: <2024032558-CVE-2021-47145-e536@gregkh>
-Content-Length: 3961
-Lines: 100
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4062;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=VVLttswBsYmKE/7i/FsUpkCafYDQMvx3XrSxTkYMrnA=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdu+/G/3JjOK7oeZSIJwmOnOLluNfbc67x9SmHuJa4
- XjC3UK8I5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACai2cOwoKvY4IlA3Jn7GU2n
- Hz+V4r62vbdoP8N8v6ssleufKNx0q3Tczed2hEOrfskuAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47146.mbox b/cve/published/2021/CVE-2021-47146.mbox
index fcb36a4f..5fc28ccb 100644
--- a/cve/published/2021/CVE-2021-47146.mbox
+++ b/cve/published/2021/CVE-2021-47146.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47146: mld: fix panic in mld_newpack()
-Message-Id: <2024032559-CVE-2021-47146-05d4@gregkh>
-Content-Length: 5624
-Lines: 134
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5759;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=JuTL+n4vK5Q4KNNvMBoN/Uxzd/RpPVNoLuKrGClyAMA=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdu+nzJnYtCZv27bQyR8e8j0J4p/x56D6yrX3pzYv6
- 32T1j6hvSOWhUGQiUFWTJHlyzaeo/srDil6GdqehpnDygQyhIGLUwAm4urBsGBt4ZNjytv3HUs4
- d4D99K9bx9Wba4MYFmxir1UXDHtXLKV+8xz3tL33rsuxyQAA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47147.mbox b/cve/published/2021/CVE-2021-47147.mbox
index 3dec2a4f..db2b7b03 100644
--- a/cve/published/2021/CVE-2021-47147.mbox
+++ b/cve/published/2021/CVE-2021-47147.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47147: ptp: ocp: Fix a resource leak in an error handling path
-Message-Id: <2024032559-CVE-2021-47147-e4bc@gregkh>
-Content-Length: 1762
-Lines: 49
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1812;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=iaAwcJStXLsGijtZEpamoNn03lMpcYqNI8vjeFZB/b0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdu8Zvy2/OtWoVXoSf2p2rRJj5ooW+zeTK1atmeu5X
- PJ+oodWRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzEzoNhnk77mbqdio/Tb++b
- OMOVubLQWTGwmGGecvy9fqnnckYu9Wdq1Z8unjZxn5Y1AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47148.mbox b/cve/published/2021/CVE-2021-47148.mbox
index 97d190c4..46573c5e 100644
--- a/cve/published/2021/CVE-2021-47148.mbox
+++ b/cve/published/2021/CVE-2021-47148.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47148: octeontx2-pf: fix a buffer overflow in otx2_set_rxfh_context()
-Message-Id: <2024032559-CVE-2021-47148-502f@gregkh>
-Content-Length: 1786
-Lines: 49
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1836;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=SVSEBBHxj9XBZ05LM1gVfIFOGoPP5hknYxEtbvByYr8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdu+d51x46ryqnJ+pXjonapP0C38xubXiK+NrDlw8V
- yCj1rq7I5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACay/D/D/JSri/dlmbUW3v04
- f6Lijtqn2X4L4xnm1z1NFxS4/U6Awe/Gn6vqtWGXUh+uAQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47149.mbox b/cve/published/2021/CVE-2021-47149.mbox
index 1f2b7af9..83ae1812 100644
--- a/cve/published/2021/CVE-2021-47149.mbox
+++ b/cve/published/2021/CVE-2021-47149.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47149: net: fujitsu: fix potential null-ptr-deref
-Message-Id: <2024032500-CVE-2021-47149-b998@gregkh>
-Content-Length: 2373
-Lines: 61
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2435;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=wUAw6SMyzWs0IxiqzxlEvxzrMJ1biCx66Sc0TSddaLA=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdh9636nlpO6Pv8UiGnbgmJTvktL/ETK3t2/vuWkXU
- qQa9+tGRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzkrirD/NJe/ullJ7bfXtmo
- uXvOqplf5t21yGOY77poI+dr9rPVbtMeneDQuR0ytybiBAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47150.mbox b/cve/published/2021/CVE-2021-47150.mbox
index 5150cc2c..ba2067ae 100644
--- a/cve/published/2021/CVE-2021-47150.mbox
+++ b/cve/published/2021/CVE-2021-47150.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47150: net: fec: fix the potential memory leak in fec_enet_init()
-Message-Id: <2024032500-CVE-2021-47150-f066@gregkh>
-Content-Length: 2354
-Lines: 58
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2413;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=ylRrfUvpw/V8G4BDNhEmnRSCiFxTruPsKg1Q9pOSByo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdh88mOa0yCu2ctgvXvGjcu/73Q6bq9deur/AtSPFs
- 7zx+rNzHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRx8oM86sYjzA5vX77JaJy
- xpQfks4pihvrmRjmx9mXt5uWtRisc2i71W07JTDlka8wAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47151.mbox b/cve/published/2021/CVE-2021-47151.mbox
index d5df2ea4..e4e011ae 100644
--- a/cve/published/2021/CVE-2021-47151.mbox
+++ b/cve/published/2021/CVE-2021-47151.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47151: interconnect: qcom: bcm-voter: add a missing of_node_put()
-Message-Id: <2024032500-CVE-2021-47151-2551@gregkh>
-Content-Length: 1865
-Lines: 50
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1916;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=PyvxHNdG3chAQZDrz/K9BBRASUxawE/tNC+0k9cMwCQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdh9mbFA6NldF9cb0Nif3sto79x8e6jfJuzZvWY3uw
- 16fF7k3OmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAi05YyLNh1+a6kwvQvD9fm
- 1E6cYuzN63JpQxLDgsVn+vounTJ211fe3Wu77M3vIv8prAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47152.mbox b/cve/published/2021/CVE-2021-47152.mbox
index 378760b2..ec40e986 100644
--- a/cve/published/2021/CVE-2021-47152.mbox
+++ b/cve/published/2021/CVE-2021-47152.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47152: mptcp: fix data stream corruption
-Message-Id: <2024032500-CVE-2021-47152-a386@gregkh>
-Content-Length: 2300
-Lines: 63
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2364;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=l7YdC6Zpg2v6VlhvJzzjMd0cNf/11ioYas1bHR5rJJs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdh+6mze+n6B0OTd5yzPfn46GhYy3M9+rMWstP2cyK
- fiXq+WzjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZhI7SOG+a6K6R09NdmJ+Rn3
- JF31C6f+OV/IwjA/62/40j6bLy85fa9H8b0022UdP+c7AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47153.mbox b/cve/published/2021/CVE-2021-47153.mbox
index ea6dc63f..ecc23e19 100644
--- a/cve/published/2021/CVE-2021-47153.mbox
+++ b/cve/published/2021/CVE-2021-47153.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47153: i2c: i801: Don't generate an interrupt on bus reset
-Message-Id: <2024032501-CVE-2021-47153-8c75@gregkh>
-Content-Length: 3577
-Lines: 76
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3654;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=pKQrN0Q45Ouv/ywt08asEYePOyq7e7tvTS7SfRXLEmU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMdh8PNNo+vLVXvK59/0yPDcG5ly6fu3Nh4gZ53+OLQ
- 8xuX757rCOWhUGQiUFWTJHlyzaeo/srDil6GdqehpnDygQyhIGLUwAmwuTNsGDFzXlPfLe3T9tw
- Y/N7N6/bP70W7FrIMD/x75qtCeWd14vvnzi/lKUytvLBjAwA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47158.mbox b/cve/published/2021/CVE-2021-47158.mbox
index af903772..14cb216a 100644
--- a/cve/published/2021/CVE-2021-47158.mbox
+++ b/cve/published/2021/CVE-2021-47158.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47158: net: dsa: sja1105: add error handling in sja1105_setup()
-Message-Id: <2024032533-CVE-2021-47158-71e9@gregkh>
-Content-Length: 1979
-Lines: 51
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2031;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Kh8ZW2tI4YlorcRGlstWkrjBi/SjDOQaDLJC/snHmUk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDh8vp1bvFeJMdU38ecBVzT/v7yyGd7H1V/ee0EnWa
- spMdmLriGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIlELWFYsGoN+yWrkFcvgqPZ
- GOYUukXuS5DewjDPbj+3055ksfUOR0/3qLpJvJB9ds4EAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47159.mbox b/cve/published/2021/CVE-2021-47159.mbox
index ce0d2633..d125953f 100644
--- a/cve/published/2021/CVE-2021-47159.mbox
+++ b/cve/published/2021/CVE-2021-47159.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47159: net: dsa: fix a crash if ->get_sset_count() fails
-Message-Id: <2024032533-CVE-2021-47159-9ac6@gregkh>
-Content-Length: 2428
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2488;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Hu7E2eMYuxoizbgam+jCs4t5HD4j+qUJIMOmw29eppk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDh+NVTp/rb/ytvvIi5Z3xb0P8n/6Bz3oLtq6dafC8
- to1DjpCHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjAR6VsMC9pXTudkcjieKxMq
- U+01IyiwV1FFkWF+nrixdt6DBw1iNn6Nfi8C+SqZFX8CAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47160.mbox b/cve/published/2021/CVE-2021-47160.mbox
index 63b35cd9..ee983fc4 100644
--- a/cve/published/2021/CVE-2021-47160.mbox
+++ b/cve/published/2021/CVE-2021-47160.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47160: net: dsa: mt7530: fix VLAN traffic leaks
-Message-Id: <2024032534-CVE-2021-47160-8e53@gregkh>
-Content-Length: 2661
-Lines: 65
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2727;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=ncTMzwCg60bIIjZGv4IhBwFh4u9VDi1fzpVsn1WT/z4=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDp8K3k5rf8VsuzDq1Jo7nrsnvPnE3buCSfmGyf7Dy
- 5d1LAvi6IhlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJPLjFsGBinkbuizLPks+K
- 1mVxuzbNF52xUoNhDtfhWTYMqSyP7c0XeFTfthXwl77xHgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47161.mbox b/cve/published/2021/CVE-2021-47161.mbox
index b59dd1db..26d9db91 100644
--- a/cve/published/2021/CVE-2021-47161.mbox
+++ b/cve/published/2021/CVE-2021-47161.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47161: spi: spi-fsl-dspi: Fix a resource leak in an error handling path
-Message-Id: <2024032534-CVE-2021-47161-65ce@gregkh>
-Content-Length: 2457
-Lines: 57
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2515;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=D03Gl6C7kVAEL8LX4zcdzwcbhYdmMLBxzWuVYb82pAA=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDp8eHMlkbbB77PV5/7ZJ2vfnXcrf+HNy2MaDG++u/
- fTV5Yzo9I5YFgZBJgZZMUWWL9t4ju6vOKToZWh7GmYOKxPIEAYuTgGYyOdqhvnZ06bxXZ3StfPy
- jdIw12Nvii2+z9RimJ+33DajSF/HcVHEZbPFZmkrBJhWxgIA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47163.mbox b/cve/published/2021/CVE-2021-47163.mbox
index f2b2a4a2..d1bf7f26 100644
--- a/cve/published/2021/CVE-2021-47163.mbox
+++ b/cve/published/2021/CVE-2021-47163.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47163: tipc: wait and exit until all work queues are done
-Message-Id: <2024032534-CVE-2021-47163-3ab9@gregkh>
-Content-Length: 2991
-Lines: 78
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3070;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=hFpDtmRvOtpqvOlVRGh75xTao9WCgAIx3vkPB7bH4ys=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDp9L936dW/xBIXXpm9g/Ajc+rnjeqqYpLxd9wmX14
- r0aDPkbOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiH0UY5vvda0l/ujX05aqG
- OzcW3FmSE2WpvYBhwelHsX8bGS05mv9+dQ8T2mT4qPzvSgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47164.mbox b/cve/published/2021/CVE-2021-47164.mbox
index 5f72a0ab..ac460c2e 100644
--- a/cve/published/2021/CVE-2021-47164.mbox
+++ b/cve/published/2021/CVE-2021-47164.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47164: net/mlx5e: Fix null deref accessing lag dev
-Message-Id: <2024032535-CVE-2021-47164-0581@gregkh>
-Content-Length: 2096
-Lines: 53
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2150;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=+UUy18T2j6zLqwjWEIPzEBa6oRLVe1xkED0wCB1/f04=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDp+nrSvSEb8YK772bX1Lp4RDaISxyoT9nAI7Z8Vsm
- PvXVT2kI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACZyIpBhvrd64gPDNTNsRNll
- Nv8M+ml39ugFN4b5OdwyS9M3+DRn8i37eU/2Stg1n++PAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47166.mbox b/cve/published/2021/CVE-2021-47166.mbox
index 60dbc594..4e72130e 100644
--- a/cve/published/2021/CVE-2021-47166.mbox
+++ b/cve/published/2021/CVE-2021-47166.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47166: NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()
-Message-Id: <2024032535-CVE-2021-47166-6ab7@gregkh>
-Content-Length: 2758
-Lines: 60
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2819;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=nuFl2MV2dlzF8yKOUpaB8bniHZ0cKu/Y8Zz8B0hfozE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDp+36ScfVDA746Ai2/JV8f/bTtZP91YlLjPNFcpac
- 6Z5pvXTjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZiIRCLD/OhnJuZx+79GBYSk
- cn/qavsRNLe7jmF+VNDMHSJZ8TvYdwWFMdd8+9x3YcIqAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47167.mbox b/cve/published/2021/CVE-2021-47167.mbox
index 47dea6cc..0286f833 100644
--- a/cve/published/2021/CVE-2021-47167.mbox
+++ b/cve/published/2021/CVE-2021-47167.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47167: NFS: Fix an Oopsable condition in __nfs_pageio_add_request()
-Message-Id: <2024032535-CVE-2021-47167-c68c@gregkh>
-Content-Length: 2234
-Lines: 55
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2290;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=PnqneVCEo66rhY1SAql2aCcBw49tkyXvdYAhNZEZEvY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDl/+LQjNjGv9U/mmaXt01rwT5acNd3cwZ+UmTd8+t
- zbQPb6+I5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACbyOpZhwQLW1CeNx49kfkic
- sMkvMOlmzTm3SwyzWVOd47fvZ3y2dsKcPU9DV/DlXeVXAAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47168.mbox b/cve/published/2021/CVE-2021-47168.mbox
index e35847e2..9c2b29c7 100644
--- a/cve/published/2021/CVE-2021-47168.mbox
+++ b/cve/published/2021/CVE-2021-47168.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47168: NFS: fix an incorrect limit in filelayout_decode_layout()
-Message-Id: <2024032536-CVE-2021-47168-2916@gregkh>
-Content-Length: 2889
-Lines: 63
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2953;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=D6jU9GtS7/EASJrZo+KYAbTtw6nInDj5etJgkHpwOFs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDl88Ht22mGDVuf9sH+eWZ+9nyibYMCj5MYdNemsx+
- XH61EXvO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiBx8xzOGU3RAovWLxvRkX
- wyrZo8uyTJ0bBRjmByRf6ZZ7VF3C+sxz6qQjc5YWZl+bDQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47169.mbox b/cve/published/2021/CVE-2021-47169.mbox
index 48aaba40..6b36e1cb 100644
--- a/cve/published/2021/CVE-2021-47169.mbox
+++ b/cve/published/2021/CVE-2021-47169.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47169: serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
-Message-Id: <2024032536-CVE-2021-47169-4fd2@gregkh>
-Content-Length: 9870
-Lines: 199
-X-Developer-Signature: v=1; a=openpgp-sha256; l=10070;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=OxJLRBouUPvR/bvSu41O/S8dUOrZxM+Hqrm7jlTLz/0=;
- b=kA0DAAIRMUfUDdst+ykByyZiAGYBQPShLIyWNjabqKgk71xNq1psGIbfGJnsbB8UELRWvjVkS
- IhdBAARAgAdFiEE9LYMxb94wiFKMT3LMUfUDdst+ykFAmYBQPQACgkQMUfUDdst+ym5wQCglaDF
- 03aWM5IYJEAiyX8x32M7rOkAoNGiTc6qe5okrFZsQAzGFnYR2/42
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47170.mbox b/cve/published/2021/CVE-2021-47170.mbox
index 69f5edb6..f8cbde53 100644
--- a/cve/published/2021/CVE-2021-47170.mbox
+++ b/cve/published/2021/CVE-2021-47170.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47170: USB: usbfs: Don't WARN about excessively large memory allocations
-Message-Id: <2024032536-CVE-2021-47170-ee51@gregkh>
-Content-Length: 2394
-Lines: 63
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2458;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=ovcj9kTkuzCNxKAYhx2XKQmtnuu2j8KV/0bYYcjiKho=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDl/Kr9lFMKRevL5DeEN8e9eVnvcvZvutvOrJGbV/y
- 9KSYxJZHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCR6d4MC5a+fRboKzN57a2C
- R7Oa0vbbbxINm8gwv/qQRL3opIQjeumCea95hG/98+J/CQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47171.mbox b/cve/published/2021/CVE-2021-47171.mbox
index de1692e6..d2e3c979 100644
--- a/cve/published/2021/CVE-2021-47171.mbox
+++ b/cve/published/2021/CVE-2021-47171.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47171: net: usb: fix memory leak in smsc75xx_bind
-Message-Id: <2024032536-CVE-2021-47171-f223@gregkh>
-Content-Length: 3062
-Lines: 67
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3130;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=zEUIBoLfwnhwlNysWTWILRt7WMujylPEPIaZ3Hqsi54=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDl9F+6YsvpNeufa4vdAv2VMZCdvn/5h+UU/epNnl7
- Bz566+md8SyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEntcxzA/6fOEgx+95SYqr
- HR4+2vH7/JaX4u8Y5ucX8DGvSNGcfsZax/9a+UePggNhmwE=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47173.mbox b/cve/published/2021/CVE-2021-47173.mbox
index 3a33789f..07b509f8 100644
--- a/cve/published/2021/CVE-2021-47173.mbox
+++ b/cve/published/2021/CVE-2021-47173.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47173: misc/uss720: fix memory leak in uss720_probe
-Message-Id: <2024032537-CVE-2021-47173-12cc@gregkh>
-Content-Length: 3908
-Lines: 79
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3988;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=nlqjJmTWK+1mRYxohVfdF1gODI0Qa4XbCKET+e+QCPY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDl8t3V5/1F8/73LLMqErFllLo7xfO4Se2zbTTNXo+
- YcDTw/86IhlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJrGBgmCuof2L6kkPX4zgD
- 2by6rGukmR54uTHMZs87puewaEb/un3x8tkp1u2nXzLOBQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47174.mbox b/cve/published/2021/CVE-2021-47174.mbox
index 056eed94..2abeca34 100644
--- a/cve/published/2021/CVE-2021-47174.mbox
+++ b/cve/published/2021/CVE-2021-47174.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47174: netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version
-Message-Id: <2024032537-CVE-2021-47174-a330@gregkh>
-Content-Length: 8157
-Lines: 142
-X-Developer-Signature: v=1; a=openpgp-sha256; l=8300;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=ipfEGyZ/3zhMoHxt6H5qmb48Xt41TV5+5cZbPTrgVLU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDl/9PT703/9+T+Ffl2l1WjuDVIs4q1lQTpMmY0PiM
- uspPN86YlkYBJkYZMUUWb5s4zm6v+KQopeh7WmYOaxMIEMYuDgFYCLRcxgWzDO0Wnz+jLSn1e2I
- lx/f/Uw8qbdoGsM8RZ3Hwgkbp4b47+WxOOt1qeqaROFLAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47175.mbox b/cve/published/2021/CVE-2021-47175.mbox
index 0603c804..a9f57bf7 100644
--- a/cve/published/2021/CVE-2021-47175.mbox
+++ b/cve/published/2021/CVE-2021-47175.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47175: net/sched: fq_pie: fix OOB access in the traffic path
-Message-Id: <2024032537-CVE-2021-47175-5b85@gregkh>
-Content-Length: 5168
-Lines: 127
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5296;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=vOGkbkscP463eZtxAksRDLtcszWrDtFL8KDEROR5VwA=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDl9/rjl++tSdgw/LwyR3JT/YMe8dqyX/6glcs3+bt
- ToK/guQ6YhlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJKJxkWHA9fuP7xntWe9XW
- hdxLnPBQueLSUXmG+b7ir18Gtay7f2ppzvukq2/aroZeSwUA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47176.mbox b/cve/published/2021/CVE-2021-47176.mbox
index 09018880..1bcad893 100644
--- a/cve/published/2021/CVE-2021-47176.mbox
+++ b/cve/published/2021/CVE-2021-47176.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47176: s390/dasd: add missing discipline function
-Message-Id: <2024032538-CVE-2021-47176-015a@gregkh>
-Content-Length: 2382
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2442;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=GRU8Jqr/rDY+OLZ0kzMB86jYXhgu3LIKzDMlD3lkDHQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDt9MXhutCt+x+IatjsPpxAbthTE+C1au0A9Tb+7MX
- /NzvYFpRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzkzCSGBdMrfHpaTsXb7qzp
- Nb2z9cX1g1+eMjAs2CZQ/qdYwtbG5FbKrt9X78kz8TmtBQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2021/CVE-2021-47178.mbox b/cve/published/2021/CVE-2021-47178.mbox
index b243364f..586a40c9 100644
--- a/cve/published/2021/CVE-2021-47178.mbox
+++ b/cve/published/2021/CVE-2021-47178.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47178: scsi: target: core: Avoid smp_processor_id() in preemptible code
-Message-Id: <2024032538-CVE-2021-47178-6167@gregkh>
-Content-Length: 6800
-Lines: 138
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6939;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=rYsQUTShoYDlusD7fvFVJ/P2Z7AUDOsmOSCfiyMvMW0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDt/2Rxc6m+9g/y5hfL8ybHZ68+2E22kHXtp1rFM/e
- +H29NQtHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjARRQ6G+X7q02YoztqQOiVC
- XXxCau005tqvTAwL5s5bvH5qD/9R3poCs41zYyaX7IypAQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -151,5 +140,6 @@ release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
+ https://git.kernel.org/stable/c/a222d2794c53f8165de20aa91b39e35e4b72bce9
https://git.kernel.org/stable/c/a20b6eaf4f35046a429cde57bee7eb5f13d6857f
https://git.kernel.org/stable/c/70ca3c57ff914113f681e657634f7fbfa68e1ad1
diff --git a/cve/published/2021/CVE-2021-47180.mbox b/cve/published/2021/CVE-2021-47180.mbox
index 00006229..9eaa6f2e 100644
--- a/cve/published/2021/CVE-2021-47180.mbox
+++ b/cve/published/2021/CVE-2021-47180.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2021-47180: NFC: nci: fix memory leak in nci_allocate_device
-Message-Id: <2024032539-CVE-2021-47180-5b80@gregkh>
-Content-Length: 4584
-Lines: 89
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4674;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=o4F+Zd2sM7VEuaWl9VnCHBUZx31xCK/Kh5NAbqfNM/s=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGmMDt/z212ecnRbZgTav1VcITH9QrnIvHmvNass/n1ZI
- /aVfWZJRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzEPZZhwWxt3w/bzN1Fy6d5
- sqeEdG9kXmIRxTA/7tebN9Z7lv9mF3ViCVn2ljltsrEOAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2022/CVE-2022-48626.mbox b/cve/published/2022/CVE-2022-48626.mbox
index cd98ec7f..aee0a023 100644
--- a/cve/published/2022/CVE-2022-48626.mbox
+++ b/cve/published/2022/CVE-2022-48626.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2022-48626: moxart: fix potential use-after-free on remove path
@@ -30,7 +30,7 @@ Affected and fixed versions
Fixed in 5.16.9 with commit 7f901d53f120
Fixed in 5.17 with commit bd2db32e7c3e
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2022/CVE-2022-48627.mbox b/cve/published/2022/CVE-2022-48627.mbox
index 75b97494..bc9851f9 100644
--- a/cve/published/2022/CVE-2022-48627.mbox
+++ b/cve/published/2022/CVE-2022-48627.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2022-48627: vt: fix memory overlapping when deleting chars in the buffer
-Message-Id: <2024030252-CVE-2022-48627-c7bf@gregkh>
-Content-Length: 2399
-Lines: 58
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2458;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=kiWIv25rQ6y4QlVVPhMDJj31NK1UUQ6Nnh0n1s5AD+g=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPZ52cZT/h3oKsn3d8Yrdua16rxpvz8JfYy75nscrLL
- 3W0MZ8W6ohlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJLJjDMFfy/j+3rvn5cmUn
- +Vg0tmnt3BoQtp9hwbwlOTzbNrx5yH4idFlpyYIENW75CQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
Issue introduced in 3.7 with commit 81732c3b2fed and fixed in 5.18.13 with commit 14d2cc21ca62
Issue introduced in 3.7 with commit 81732c3b2fed and fixed in 5.19 with commit 39cdb68c64d8
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2022/CVE-2022-48628.mbox b/cve/published/2022/CVE-2022-48628.mbox
index f0ffa1ed..189925a9 100644
--- a/cve/published/2022/CVE-2022-48628.mbox
+++ b/cve/published/2022/CVE-2022-48628.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2022-48628: ceph: drop messages from MDS when unmounting
-Message-Id: <2024030245-CVE-2022-48628-181a@gregkh>
-Content-Length: 3717
-Lines: 97
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3815;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Es4PmIXv5q+ixhmjL0Ha+8gmm1BWk5rP/wjXkux5hgc=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP56/t9V/YNu+ser1CoUPOY4GTujfX2HaZZzCc5uf8v
- sTwsVxpRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzElp1hwZ71ekfOCrX037x4
- debOc7ls8nNm1jPMZnNasvq13xPp2kvHet9WJzP9Uyr6CwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -76,7 +65,7 @@ Affected and fixed versions
Fixed in 6.5.6 with commit 47f82395f04a
Fixed in 6.6 with commit e3dfcab2080d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2022/CVE-2022-48629.mbox b/cve/published/2022/CVE-2022-48629.mbox
index 1f846218..0bcc1236 100644
--- a/cve/published/2022/CVE-2022-48629.mbox
+++ b/cve/published/2022/CVE-2022-48629.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2022-48629: crypto: qcom-rng - ensure buffer for generate is completely filled
-Message-Id: <2024030513-CVE-2022-48629-8ee0@gregkh>
-Content-Length: 5097
-Lines: 131
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5229;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=bfUNQFxWxhxHGnNQOXNazkvvxgAQOGvNu5JxF8xAv1c=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKnP/pd9+TDvhQHD7OSDNSc8r1usKlHwrPjVGZyzwvKbX
- CE7U9+tjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjIxzyGBWvXh94qOtM/5ajI
- V7Ps+/5ruCaGbGaYK220lGkp0+HyrGXu6m/EDyx8HuwqAQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -113,7 +102,7 @@ Affected and fixed versions
Issue introduced in 4.19 with commit ceec5f5b5988 and fixed in 5.16.17 with commit 485995cbc98a
Issue introduced in 4.19 with commit ceec5f5b5988 and fixed in 5.17 with commit a680b1832ced
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52434.mbox b/cve/published/2023/CVE-2023-52434.mbox
index 40f84434..7bb43ea3 100644
--- a/cve/published/2023/CVE-2023-52434.mbox
+++ b/cve/published/2023/CVE-2023-52434.mbox
@@ -1,4 +1,4 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -78,7 +78,7 @@ Affected and fixed versions
Fixed in 6.6.8 with commit 17a0f64cc02d
Fixed in 6.7 with commit af1689a9b770
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52435.mbox b/cve/published/2023/CVE-2023-52435.mbox
index 1aa3d295..9db270ec 100644
--- a/cve/published/2023/CVE-2023-52435.mbox
+++ b/cve/published/2023/CVE-2023-52435.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52435: net: prevent mss overflow in skb_segment()
@@ -103,7 +103,7 @@ Affected and fixed versions
Issue introduced in 4.8 with commit 3953c46c3ac7 and fixed in 6.6.11 with commit 95b3904a261a
Issue introduced in 4.8 with commit 3953c46c3ac7 and fixed in 6.7 with commit 23d05d563b7e
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52436.mbox b/cve/published/2023/CVE-2023-52436.mbox
index 9b9d9249..9932ff11 100644
--- a/cve/published/2023/CVE-2023-52436.mbox
+++ b/cve/published/2023/CVE-2023-52436.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -30,7 +30,7 @@ Affected and fixed versions
Fixed in 6.7.1 with commit f6c30bfe5a49
Fixed in 6.8 with commit e26b6d39270f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52438.mbox b/cve/published/2023/CVE-2023-52438.mbox
index 648cc033..74e63da3 100644
--- a/cve/published/2023/CVE-2023-52438.mbox
+++ b/cve/published/2023/CVE-2023-52438.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -84,7 +84,7 @@ Affected and fixed versions
Issue introduced in 4.20 with commit dd2283f2605e and fixed in 6.7.1 with commit e074686e993f
Issue introduced in 4.20 with commit dd2283f2605e and fixed in 6.8 with commit 3f489c2067c5
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52440.mbox b/cve/published/2023/CVE-2023-52440.mbox
index 0d8cfcba..c8901079 100644
--- a/cve/published/2023/CVE-2023-52440.mbox
+++ b/cve/published/2023/CVE-2023-52440.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52440: ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()
@@ -27,7 +27,7 @@ Affected and fixed versions
Fixed in 6.5.2 with commit ecd7e1c562cb
Fixed in 6.6 with commit 4b081ce0d830
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52441.mbox b/cve/published/2023/CVE-2023-52441.mbox
index 91414bd6..8ff2fc14 100644
--- a/cve/published/2023/CVE-2023-52441.mbox
+++ b/cve/published/2023/CVE-2023-52441.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52441: ksmbd: fix out of bounds in init_smb2_rsp_hdr()
@@ -27,7 +27,7 @@ Affected and fixed versions
Fixed in 6.4.16 with commit aa669ef229ae
Fixed in 6.5 with commit 536bb492d39b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52442.mbox b/cve/published/2023/CVE-2023-52442.mbox
index 73ec619b..8370b573 100644
--- a/cve/published/2023/CVE-2023-52442.mbox
+++ b/cve/published/2023/CVE-2023-52442.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52442: ksmbd: validate session id and tree id in compound request
@@ -28,7 +28,7 @@ Affected and fixed versions
Fixed in 6.4.16 with commit 4c2b350b2e26
Fixed in 6.5 with commit 3df0411e132e
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52443.mbox b/cve/published/2023/CVE-2023-52443.mbox
index c6beb66a..a11010ac 100644
--- a/cve/published/2023/CVE-2023-52443.mbox
+++ b/cve/published/2023/CVE-2023-52443.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -73,7 +73,7 @@ Affected and fixed versions
Issue introduced in 4.11 with commit 04dc715e24d0 and fixed in 6.7.2 with commit 77ab09b92f16
Issue introduced in 4.11 with commit 04dc715e24d0 and fixed in 6.8 with commit 55a8210c9e7d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52444.mbox b/cve/published/2023/CVE-2023-52444.mbox
index 4cf08c52..32e7c64b 100644
--- a/cve/published/2023/CVE-2023-52444.mbox
+++ b/cve/published/2023/CVE-2023-52444.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -50,7 +50,7 @@ Affected and fixed versions
Issue introduced in 4.2 with commit 7e01e7ad746b and fixed in 6.7.2 with commit 2fb4867f4405
Issue introduced in 4.2 with commit 7e01e7ad746b and fixed in 6.8 with commit 53edb549565f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52445.mbox b/cve/published/2023/CVE-2023-52445.mbox
index 6543cf94..6aef7da6 100644
--- a/cve/published/2023/CVE-2023-52445.mbox
+++ b/cve/published/2023/CVE-2023-52445.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -33,7 +33,7 @@ Affected and fixed versions
Issue introduced in 2.6.26 with commit e5be15c63804 and fixed in 6.7.2 with commit 437b5f57732b
Issue introduced in 2.6.26 with commit e5be15c63804 and fixed in 6.8 with commit ded85b0c0edd
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52446.mbox b/cve/published/2023/CVE-2023-52446.mbox
index 6ab3aee3..c0d1c362 100644
--- a/cve/published/2023/CVE-2023-52446.mbox
+++ b/cve/published/2023/CVE-2023-52446.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -179,7 +179,7 @@ Affected and fixed versions
Issue introduced in 6.2 with commit 958cf2e273f0 and fixed in 6.7.2 with commit f9ff6ef1c73c
Issue introduced in 6.2 with commit 958cf2e273f0 and fixed in 6.8 with commit 59e5791f59dd
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52448.mbox b/cve/published/2023/CVE-2023-52448.mbox
index df95ff92..57b144d6 100644
--- a/cve/published/2023/CVE-2023-52448.mbox
+++ b/cve/published/2023/CVE-2023-52448.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -30,7 +30,7 @@ Affected and fixed versions
Issue introduced in 4.20 with commit 72244b6bc752 and fixed in 6.7.2 with commit c323efd620c7
Issue introduced in 4.20 with commit 72244b6bc752 and fixed in 6.8 with commit 8877243beafa
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52449.mbox b/cve/published/2023/CVE-2023-52449.mbox
index 1f041bc9..65a65d96 100644
--- a/cve/published/2023/CVE-2023-52449.mbox
+++ b/cve/published/2023/CVE-2023-52449.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -61,7 +61,7 @@ Affected and fixed versions
Issue introduced in 2.6.31 with commit 2ba3d76a1e29 and fixed in 6.7.2 with commit b36aaa64d58a
Issue introduced in 2.6.31 with commit 2ba3d76a1e29 and fixed in 6.8 with commit a43bdc376dea
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52450.mbox b/cve/published/2023/CVE-2023-52450.mbox
index bf336c54..5cf15acb 100644
--- a/cve/published/2023/CVE-2023-52450.mbox
+++ b/cve/published/2023/CVE-2023-52450.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -25,7 +25,7 @@ Affected and fixed versions
Issue introduced in 6.2 with commit f680b6e6062e and fixed in 6.7.2 with commit 3d6f4a78b104
Issue introduced in 6.2 with commit f680b6e6062e and fixed in 6.8 with commit 1692cf434ba1
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52451.mbox b/cve/published/2023/CVE-2023-52451.mbox
index a483035f..f36840eb 100644
--- a/cve/published/2023/CVE-2023-52451.mbox
+++ b/cve/published/2023/CVE-2023-52451.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -82,7 +82,7 @@ Affected and fixed versions
Issue introduced in 4.1 with commit 51925fb3c5c9 and fixed in 6.7.2 with commit 708a4b59baad
Issue introduced in 4.1 with commit 51925fb3c5c9 and fixed in 6.8 with commit bd68ffce69f6
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52453.mbox b/cve/published/2023/CVE-2023-52453.mbox
index 626c0b8e..541aa6ba 100644
--- a/cve/published/2023/CVE-2023-52453.mbox
+++ b/cve/published/2023/CVE-2023-52453.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -36,7 +36,7 @@ Affected and fixed versions
Issue introduced in 6.2 with commit d9a871e4a143 and fixed in 6.7.2 with commit 6bda81e24a35
Issue introduced in 6.2 with commit d9a871e4a143 and fixed in 6.8 with commit be12ad45e15b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52454.mbox b/cve/published/2023/CVE-2023-52454.mbox
index 6440baad..0a723315 100644
--- a/cve/published/2023/CVE-2023-52454.mbox
+++ b/cve/published/2023/CVE-2023-52454.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -41,7 +41,7 @@ Affected and fixed versions
Issue introduced in 5.0 with commit 872d26a391da and fixed in 6.7.2 with commit 70154e8d015c
Issue introduced in 5.0 with commit 872d26a391da and fixed in 6.8 with commit efa56305908b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52455.mbox b/cve/published/2023/CVE-2023-52455.mbox
index e8614ea0..a8cc243a 100644
--- a/cve/published/2023/CVE-2023-52455.mbox
+++ b/cve/published/2023/CVE-2023-52455.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -34,7 +34,7 @@ Affected and fixed versions
Issue introduced in 6.3 with commit a5bf3cfce8cb and fixed in 6.7.2 with commit 5e23e283910c
Issue introduced in 6.3 with commit a5bf3cfce8cb and fixed in 6.8 with commit bb57f6705960
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52456.mbox b/cve/published/2023/CVE-2023-52456.mbox
index 8260df7b..e609a6e1 100644
--- a/cve/published/2023/CVE-2023-52456.mbox
+++ b/cve/published/2023/CVE-2023-52456.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -39,7 +39,7 @@ Affected and fixed versions
Issue introduced in 5.9 with commit cb1a60923609 and fixed in 6.7.2 with commit 9a662d06c22d
Issue introduced in 5.9 with commit cb1a60923609 and fixed in 6.8 with commit 78d60dae9a0c
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52458.mbox b/cve/published/2023/CVE-2023-52458.mbox
index 01c7f989..64f96908 100644
--- a/cve/published/2023/CVE-2023-52458.mbox
+++ b/cve/published/2023/CVE-2023-52458.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -32,7 +32,7 @@ Affected and fixed versions
Fixed in 6.7.2 with commit bcdc288e7bc0
Fixed in 6.8 with commit 6f64f866aa1a
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52459.json b/cve/published/2023/CVE-2023-52459.json
index 7e998144..cdd09bd1 100644
--- a/cve/published/2023/CVE-2023-52459.json
+++ b/cve/published/2023/CVE-2023-52459.json
@@ -30,7 +30,7 @@
"versionType": "git"
},
{
- "version": "28a1295795d8",
+ "version": "",
"lessThan": "3de6ee94aae7",
"status": "affected",
"versionType": "git"
@@ -87,7 +87,7 @@
],
"title": "media: v4l: async: Fix duplicated list deletion",
"x_generator": {
- "engine": "bippy-8df59b4913de"
+ "engine": "bippy-851b3ed3d212"
}
}
},
diff --git a/cve/published/2023/CVE-2023-52459.mbox b/cve/published/2023/CVE-2023-52459.mbox
index f8e023b9..f1dc0c68 100644
--- a/cve/published/2023/CVE-2023-52459.mbox
+++ b/cve/published/2023/CVE-2023-52459.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -30,7 +30,7 @@ Affected and fixed versions
Issue introduced in 6.6 with commit 28a1295795d8 and fixed in 6.7.2 with commit 49d828114284
Issue introduced in 6.6 with commit 28a1295795d8 and fixed in 6.8 with commit 3de6ee94aae7
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52460.mbox b/cve/published/2023/CVE-2023-52460.mbox
index 8d05c468..b0273a92 100644
--- a/cve/published/2023/CVE-2023-52460.mbox
+++ b/cve/published/2023/CVE-2023-52460.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -23,7 +23,7 @@ Affected and fixed versions
Issue introduced in 6.7 with commit 7966f319c66d and fixed in 6.7.2 with commit 6b80326efff0
Issue introduced in 6.7 with commit 7966f319c66d and fixed in 6.8 with commit b719a9c15d52
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52462.mbox b/cve/published/2023/CVE-2023-52462.mbox
index 6c6701c8..a000e2cb 100644
--- a/cve/published/2023/CVE-2023-52462.mbox
+++ b/cve/published/2023/CVE-2023-52462.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -32,7 +32,7 @@ Affected and fixed versions
Issue introduced in 5.16 with commit 27113c59b6d0 and fixed in 6.7.2 with commit 40617d45ea05
Issue introduced in 5.16 with commit 27113c59b6d0 and fixed in 6.8 with commit ab125ed3ec1c
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52464.mbox b/cve/published/2023/CVE-2023-52464.mbox
index 64950375..d526f2b3 100644
--- a/cve/published/2023/CVE-2023-52464.mbox
+++ b/cve/published/2023/CVE-2023-52464.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -49,7 +49,7 @@ Affected and fixed versions
Issue introduced in 4.12 with commit 41003396f932 and fixed in 6.7.2 with commit 426fae93c01d
Issue introduced in 4.12 with commit 41003396f932 and fixed in 6.8 with commit 475c58e1a471
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52465.mbox b/cve/published/2023/CVE-2023-52465.mbox
index 8ed36b7d..1dd64ba2 100644
--- a/cve/published/2023/CVE-2023-52465.mbox
+++ b/cve/published/2023/CVE-2023-52465.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -24,7 +24,7 @@ Affected and fixed versions
Issue introduced in 6.5 with commit 8648aeb5d7b7 and fixed in 6.7.2 with commit bd3d2ec447ed
Issue introduced in 6.5 with commit 8648aeb5d7b7 and fixed in 6.8 with commit 88f04bc3e737
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52467.mbox b/cve/published/2023/CVE-2023-52467.mbox
index 404dc6ec..313b0e26 100644
--- a/cve/published/2023/CVE-2023-52467.mbox
+++ b/cve/published/2023/CVE-2023-52467.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -27,7 +27,7 @@ Affected and fixed versions
Issue introduced in 5.9 with commit e15d7f2b81d2 and fixed in 6.7.2 with commit 7f2c410ac470
Issue introduced in 5.9 with commit e15d7f2b81d2 and fixed in 6.8 with commit 41673c66b3d0
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52468.mbox b/cve/published/2023/CVE-2023-52468.mbox
index 4b158569..b57bdc22 100644
--- a/cve/published/2023/CVE-2023-52468.mbox
+++ b/cve/published/2023/CVE-2023-52468.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -68,7 +68,7 @@ Affected and fixed versions
Issue introduced in 6.4 with commit dcfbb67e48a2 and fixed in 6.7.2 with commit 0f1486dafca3
Issue introduced in 6.4 with commit dcfbb67e48a2 and fixed in 6.8 with commit 93ec4a3b7640
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52469.mbox b/cve/published/2023/CVE-2023-52469.mbox
index c7281cd5..2f90c1f3 100644
--- a/cve/published/2023/CVE-2023-52469.mbox
+++ b/cve/published/2023/CVE-2023-52469.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -38,7 +38,7 @@ Affected and fixed versions
Issue introduced in 4.2 with commit a2e73f56fa62 and fixed in 6.7.2 with commit 3426f059eacc
Issue introduced in 4.2 with commit a2e73f56fa62 and fixed in 6.8 with commit 28dd788382c4
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52470.mbox b/cve/published/2023/CVE-2023-52470.mbox
index 642d5562..947dadc1 100644
--- a/cve/published/2023/CVE-2023-52470.mbox
+++ b/cve/published/2023/CVE-2023-52470.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -29,7 +29,7 @@ Affected and fixed versions
Issue introduced in 3.16 with commit fa7f517cb26e and fixed in 6.7.2 with commit fb2d8bc9b5e5
Issue introduced in 3.16 with commit fa7f517cb26e and fixed in 6.8 with commit 7a2464fac80d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52471.mbox b/cve/published/2023/CVE-2023-52471.mbox
index 1868c2a9..4d42bdaf 100644
--- a/cve/published/2023/CVE-2023-52471.mbox
+++ b/cve/published/2023/CVE-2023-52471.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -23,7 +23,7 @@ Affected and fixed versions
Issue introduced in 6.7 with commit d938a8cca88a and fixed in 6.7.2 with commit 3cd9b9bee33f
Issue introduced in 6.7 with commit d938a8cca88a and fixed in 6.8 with commit 3027e7b15b02
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52472.mbox b/cve/published/2023/CVE-2023-52472.mbox
index 647d72bd..37a9a888 100644
--- a/cve/published/2023/CVE-2023-52472.mbox
+++ b/cve/published/2023/CVE-2023-52472.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -26,7 +26,7 @@ Affected and fixed versions
Issue introduced in 6.5 with commit 6637e11e4ad2 and fixed in 6.7.2 with commit 95ad8b6879e2
Issue introduced in 6.5 with commit 6637e11e4ad2 and fixed in 6.8 with commit d872ca165cb6
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52473.mbox b/cve/published/2023/CVE-2023-52473.mbox
index 54e654d8..665354df 100644
--- a/cve/published/2023/CVE-2023-52473.mbox
+++ b/cve/published/2023/CVE-2023-52473.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -35,7 +35,7 @@ Affected and fixed versions
Issue introduced in 6.4 with commit 3d439b1a2ad3 and fixed in 6.7.2 with commit 02871710b930
Issue introduced in 6.4 with commit 3d439b1a2ad3 and fixed in 6.8 with commit 04e6ccfc93c5
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52474.mbox b/cve/published/2023/CVE-2023-52474.mbox
index 8b049e0d..1acb1e6d 100644
--- a/cve/published/2023/CVE-2023-52474.mbox
+++ b/cve/published/2023/CVE-2023-52474.mbox
@@ -1,5 +1,5 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52474: IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests
@@ -77,7 +77,7 @@ Affected and fixed versions
Issue introduced in 4.3 with commit 7724105686e7 and fixed in 6.3.2 with commit 7e6010f79b58
Issue introduced in 4.3 with commit 7724105686e7 and fixed in 6.4 with commit 00cbce5cbf88
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52475.mbox b/cve/published/2023/CVE-2023-52475.mbox
index 2b784dbc..05a606a1 100644
--- a/cve/published/2023/CVE-2023-52475.mbox
+++ b/cve/published/2023/CVE-2023-52475.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52475: Input: powermate - fix use-after-free in powermate_config_complete
-Message-Id: <2024022918-CVE-2023-52475-442e@gregkh>
-Content-Length: 2695
-Lines: 68
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2764;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=CH/iWXPTsYEC4XxDfZxDIzRb917pSxDuMIHZ7OChtp0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkPJMvK9M+eNvbV6hWpL35nrLZC6MGs7KB9ibM8+TXeq
- u6Y1OrZEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABP5u5RhwcVrin/MRcIfz30g
- nF3MHbT0h2bfDYZ5pvfnOjgeWZn42/CWR62Qd8QmhwtzAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -48,7 +37,7 @@ Affected and fixed versions
Fixed in 6.5.8 with commit e528b1b9d607
Fixed in 6.6 with commit 5c15c60e7be6
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52476.mbox b/cve/published/2023/CVE-2023-52476.mbox
index e6e01b25..4d5f6531 100644
--- a/cve/published/2023/CVE-2023-52476.mbox
+++ b/cve/published/2023/CVE-2023-52476.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52476: perf/x86/lbr: Filter vsyscall addresses
-Message-Id: <2024022921-CVE-2023-52476-e307@gregkh>
-Content-Length: 2802
-Lines: 81
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2884;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=c3EC+pUxUcrtX2hQBD1WY3nQi7ZPfMOPQ2NXL4dPysM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkPJCtjD2cUXVwfIfIja2Ozmt6z4/Pnl854aCm4rcZj4
- 87GVasCO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAinxsY5gclaIosuB6+bc6S
- c/kvdl54FFCkn8Sw4DjPbVeOadHHs07GfMuf1zez7vHUMgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -65,7 +54,7 @@ Affected and fixed versions
Fixed in 6.5.8 with commit f71edacbd4f9
Fixed in 6.6 with commit e53899771a02
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52477.mbox b/cve/published/2023/CVE-2023-52477.mbox
index d4036d0f..a2f129ef 100644
--- a/cve/published/2023/CVE-2023-52477.mbox
+++ b/cve/published/2023/CVE-2023-52477.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52477: usb: hub: Guard against accesses to uninitialized BOS descriptors
-Message-Id: <2024022921-CVE-2023-52477-6f20@gregkh>
-Content-Length: 4048
-Lines: 95
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4144;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=9vEc72+eB7YymUhVv4UVdCpDTaQOIrBDFrJxKOMKNlM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkPJCubmL2Xnd7uLrjP3CDqdPuq5YJ1j1muXM+PLFq1I
- DRO5qtpRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzk+AaGBX1eVTdk5eU+7bE7
- 3/b4TVfTFKWsGoY5HBE7lK87nHow87B/1vbbqjsNfKJfAQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -74,7 +63,7 @@ Affected and fixed versions
Fixed in 6.5.8 with commit 136f69a04e71
Fixed in 6.6 with commit f74a7afc224a
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52478.mbox b/cve/published/2023/CVE-2023-52478.mbox
index 58ad9a6d..6a58bcbc 100644
--- a/cve/published/2023/CVE-2023-52478.mbox
+++ b/cve/published/2023/CVE-2023-52478.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52478: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect
-Message-Id: <2024022921-CVE-2023-52478-c0a1@gregkh>
-Content-Length: 7975
-Lines: 199
-X-Developer-Signature: v=1; a=openpgp-sha256; l=8175;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=rJ/FtX7FcyCMX8q+D7gve146hOX0IE5Rd9H+/yhRfGg=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkPJCtfRy5m6RI6Z18x6aepGqPUw3cb3rrdfxK4e1Vn3
- e0jMdf5OmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAimoUM86N2mSdv5dh8R5NN
- t/3PtGsFZqaH/zPMFVzFu4ilpmDxl2sLP5b5vduusauiEQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -179,7 +168,7 @@ Affected and fixed versions
Fixed in 6.5.8 with commit f7b2c7d9831a
Fixed in 6.6 with commit dac501397b9d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52479.mbox b/cve/published/2023/CVE-2023-52479.mbox
index 053efe17..18772e72 100644
--- a/cve/published/2023/CVE-2023-52479.mbox
+++ b/cve/published/2023/CVE-2023-52479.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52479: ksmbd: fix uaf in smb20_oplock_break_ack
-Message-Id: <2024022922-CVE-2023-52479-fc87@gregkh>
-Content-Length: 1742
-Lines: 51
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1794;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=RrFWJI+ydA/rC9/H0VYSeaY9ZkQthjitSnKslzJULzs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkPJKuu5P04fktpyYXUvIjSpI6OQofUxck/eT515D7bZ
- KUcbH+4I5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACaSfJNhfknaxQyxlU/rZ+xu
- qfjuobl+i0KqA8Nc+Wmtcz0NNZiCA97K3YoNqPo8ie8KAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -35,7 +24,7 @@ Affected and fixed versions
Fixed in 6.5.7 with commit d5b0e9d3563e
Fixed in 6.6 with commit c69813471a1e
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52480.mbox b/cve/published/2023/CVE-2023-52480.mbox
index 713e5beb..dcc11d74 100644
--- a/cve/published/2023/CVE-2023-52480.mbox
+++ b/cve/published/2023/CVE-2023-52480.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52480: ksmbd: fix race condition between session lookup and expire
-Message-Id: <2024022922-CVE-2023-52480-ff7f@gregkh>
-Content-Length: 2392
-Lines: 66
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2459;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Jjt6F141HmtchWguNLW5R0WqBAMeg0ktrp7hcmy6Ofw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkPJKtOL6q09f3gtiRpUo3SBwZJzxNHps3755Ue1XQrw
- M1E5FlPRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExEoJRhno6jjV1219/N3hek
- 3S/+6JDxC1zfyjBX5rnQuqT3ktVCVWFMwvdOu7lutroLAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -48,7 +37,7 @@ Affected and fixed versions
Fixed in 6.5.7 with commit 18ced78b0ebc
Fixed in 6.6 with commit 53ff5cf89142
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52481.mbox b/cve/published/2023/CVE-2023-52481.mbox
index ba14ff0a..8dedd28e 100644
--- a/cve/published/2023/CVE-2023-52481.mbox
+++ b/cve/published/2023/CVE-2023-52481.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52481: arm64: errata: Add Cortex-A520 speculative unprivileged load workaround
-Message-Id: <2024022922-CVE-2023-52481-99a8@gregkh>
-Content-Length: 2518
-Lines: 67
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2586;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Z333XgWU054I8AnHOncyIkpMTxOPztpZGyYheI9TB70=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkPJKtC2+YkPGVa/6Ft374bT2+su1XCMNFh7UXu5fJZl
- vc5nFxCOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiWz0Y5nuLh0lq7vXVSQ8r
- KRG50ZE38/n+1wwLbnKmnRe99IdNKdRnwkSFpP38vkovAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -48,7 +37,7 @@ Affected and fixed versions
Fixed in 6.5.7 with commit 32b0a4ffcaea
Fixed in 6.6 with commit 471470bc7052
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52482.mbox b/cve/published/2023/CVE-2023-52482.mbox
index 1ae627d9..18be56d4 100644
--- a/cve/published/2023/CVE-2023-52482.mbox
+++ b/cve/published/2023/CVE-2023-52482.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52482: x86/srso: Add SRSO mitigation for Hygon processors
-Message-Id: <2024022922-CVE-2023-52482-9375@gregkh>
-Content-Length: 1833
-Lines: 52
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1886;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=wkCyEQNEPowZtFWxgrrlUB4EwqVhs4HPIYtxO4Dy1ec=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkPJKu//gle0Oq9OjvN4NR2Y42PWxb8O/5hzdq3RvkBX
- V1Xg9pudsSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEuOUYZjEtUBOY+/fvFImL
- dz5XZZnoz69bMJFhrsSLmNOinJwV6/pWL5gjNLH+pprOdAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -36,7 +25,7 @@ Affected and fixed versions
Fixed in 6.5.6 with commit cf43b304b695
Fixed in 6.6 with commit a5ef7d68cea1
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52483.mbox b/cve/published/2023/CVE-2023-52483.mbox
index c4a1e92e..3b53f209 100644
--- a/cve/published/2023/CVE-2023-52483.mbox
+++ b/cve/published/2023/CVE-2023-52483.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52483: mctp: perform route lookups under a RCU read-side lock
-Message-Id: <2024022923-CVE-2023-52483-5b9d@gregkh>
-Content-Length: 2643
-Lines: 65
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2709;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=mF7ImCFFvjNRJJN2t9kGj0PJz2DjvkC+LkyNNYVbvYs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkPJKsPzzZ79KNvodOZBkdv5crMC28OqCvwrfvKwj/re
- nnUVf2ojlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjI1mkMC3Zm7fiqtHqmaChT
- 2reC2P86f1t08hkWHGjY3Hoxj/vT1GNX1n7y8+/fXloZCgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -49,7 +38,7 @@ Affected and fixed versions
Issue introduced in 5.15 with commit 889b7da23abf and fixed in 6.5.8 with commit 2405f64a95a7
Issue introduced in 5.15 with commit 889b7da23abf and fixed in 6.6 with commit 5093bbfc10ab
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52484.mbox b/cve/published/2023/CVE-2023-52484.mbox
index 2660cd82..a5173a48 100644
--- a/cve/published/2023/CVE-2023-52484.mbox
+++ b/cve/published/2023/CVE-2023-52484.mbox
@@ -1,19 +1,8 @@
-From bippy-c298863b1525 Mon Sep 17 00:00:00 2001
-From: gregkh@kernel.org
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52484: iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range
-Message-Id: <2024022923-CVE-2023-52484-3635@gregkh>
-Content-Length: 4349
-Lines: 111
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4461;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=qBL5u3bGSFlu5sIyreUM2zPNPkEVp/zC4G+lA4TRTM8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkPJKt3zb1pNnfyOuvLzeVXr0RWCe6U0xRt/33YnWG5H
- dOCKMPNHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRB/8ZFuyUNOpQiosqqbsh
- n/mu82vJWW+fSQwL1sqmTn1+ievuA/U4+dRP3bcqt5uaAQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -95,7 +84,7 @@ Affected and fixed versions
Fixed in 6.5.6 with commit 3283a1bce9bb
Fixed in 6.6 with commit d5afb4b47e13
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52485.mbox b/cve/published/2023/CVE-2023-52485.mbox
index 3b51f0bb..8bebc16a 100644
--- a/cve/published/2023/CVE-2023-52485.mbox
+++ b/cve/published/2023/CVE-2023-52485.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -36,7 +36,7 @@ Affected and fixed versions
Fixed in 6.7.3 with commit 303197775a97
Fixed in 6.8 with commit 8892780834ae
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52486.mbox b/cve/published/2023/CVE-2023-52486.mbox
index d19b055a..c96e6e85 100644
--- a/cve/published/2023/CVE-2023-52486.mbox
+++ b/cve/published/2023/CVE-2023-52486.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -43,7 +43,7 @@ Affected and fixed versions
Fixed in 6.7.3 with commit bfd0feb1b109
Fixed in 6.8 with commit cb4daf271302
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52487.mbox b/cve/published/2023/CVE-2023-52487.mbox
index bb8b32d9..29df07f4 100644
--- a/cve/published/2023/CVE-2023-52487.mbox
+++ b/cve/published/2023/CVE-2023-52487.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -110,7 +110,7 @@ Affected and fixed versions
Issue introduced in 6.5 with commit 9be6c21fdcf8 and fixed in 6.7.3 with commit e24d6f5a7f2d
Issue introduced in 6.5 with commit 9be6c21fdcf8 and fixed in 6.8 with commit d76fdd31f953
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52488.mbox b/cve/published/2023/CVE-2023-52488.mbox
index 5b9786c2..46d0b896 100644
--- a/cve/published/2023/CVE-2023-52488.mbox
+++ b/cve/published/2023/CVE-2023-52488.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -40,7 +40,7 @@ Affected and fixed versions
Issue introduced in 3.16 with commit dfeae619d781 and fixed in 6.7.3 with commit aa7cb4787698
Issue introduced in 3.16 with commit dfeae619d781 and fixed in 6.8 with commit dbf4ab821804
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52489.mbox b/cve/published/2023/CVE-2023-52489.mbox
index 7a46cd5f..ff7e9c95 100644
--- a/cve/published/2023/CVE-2023-52489.mbox
+++ b/cve/published/2023/CVE-2023-52489.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -121,7 +121,7 @@ Affected and fixed versions
Issue introduced in 5.3 with commit f46edbd1b151 and fixed in 6.7.3 with commit 3a01daace71b
Issue introduced in 5.3 with commit f46edbd1b151 and fixed in 6.8 with commit 5ec8e8ea8b77
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52490.mbox b/cve/published/2023/CVE-2023-52490.mbox
index de029ecb..9eace146 100644
--- a/cve/published/2023/CVE-2023-52490.mbox
+++ b/cve/published/2023/CVE-2023-52490.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -75,7 +75,7 @@ Affected and fixed versions
Issue introduced in 6.3 with commit 64c8902ed441 and fixed in 6.7.3 with commit 3889a418b6eb
Issue introduced in 6.3 with commit 64c8902ed441 and fixed in 6.8 with commit d1adb25df711
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52491.mbox b/cve/published/2023/CVE-2023-52491.mbox
index 4f2a90e7..7eed7a72 100644
--- a/cve/published/2023/CVE-2023-52491.mbox
+++ b/cve/published/2023/CVE-2023-52491.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -54,7 +54,7 @@ Affected and fixed versions
Issue introduced in 4.12 with commit b2f0d2724ba4 and fixed in 6.7.3 with commit 6e2f37022f0f
Issue introduced in 4.12 with commit b2f0d2724ba4 and fixed in 6.8 with commit 206c857dd17d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52492.mbox b/cve/published/2023/CVE-2023-52492.mbox
index 7e13db76..c352421e 100644
--- a/cve/published/2023/CVE-2023-52492.mbox
+++ b/cve/published/2023/CVE-2023-52492.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -43,7 +43,7 @@ Affected and fixed versions
Issue introduced in 5.6 with commit d2fb0a043838 and fixed in 6.7.3 with commit 9263fd2a6348
Issue introduced in 5.6 with commit d2fb0a043838 and fixed in 6.8 with commit f5c24d94512f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52493.mbox b/cve/published/2023/CVE-2023-52493.mbox
index c29fa157..2e426eb2 100644
--- a/cve/published/2023/CVE-2023-52493.mbox
+++ b/cve/published/2023/CVE-2023-52493.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -32,7 +32,7 @@ Affected and fixed versions
Issue introduced in 5.7 with commit 1d3173a3bae7 and fixed in 6.7.3 with commit b8eff20d8709
Issue introduced in 5.7 with commit 1d3173a3bae7 and fixed in 6.8 with commit 01bd694ac2f6
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52495.mbox b/cve/published/2023/CVE-2023-52495.mbox
index 0ac020a4..0ceda610 100644
--- a/cve/published/2023/CVE-2023-52495.mbox
+++ b/cve/published/2023/CVE-2023-52495.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -27,7 +27,7 @@ Affected and fixed versions
Issue introduced in 6.3 with commit 080b4e24852b and fixed in 6.7.3 with commit d26edf4ee367
Issue introduced in 6.3 with commit 080b4e24852b and fixed in 6.8 with commit c4fb7d2eac9f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52498.mbox b/cve/published/2023/CVE-2023-52498.mbox
index 97dd7e9d..e36cbaf2 100644
--- a/cve/published/2023/CVE-2023-52498.mbox
+++ b/cve/published/2023/CVE-2023-52498.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -38,7 +38,7 @@ Affected and fixed versions
Fixed in 6.7.3 with commit 9bd3dce27b01
Fixed in 6.8 with commit 7839d0078e0d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52499.mbox b/cve/published/2023/CVE-2023-52499.mbox
index 7b7fccf9..5e1983c5 100644
--- a/cve/published/2023/CVE-2023-52499.mbox
+++ b/cve/published/2023/CVE-2023-52499.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52499: powerpc/47x: Fix 47x syscall return crash
-Message-Id: <2024030247-CVE-2023-52499-1b6f@gregkh>
-Content-Length: 3932
-Lines: 92
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4025;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=bt6UmQbMEuvZlX22FxHGwtKbR3TK5925YbFE8tEL0bk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP568/c1XgXByTUOiltLxJlvIupw/NWVS36+5qR0OuO
- Qay1gdfdMSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEFs9kmKcbdWU5+wu+GPXc
- c2f+t/112TIt+ynDggMZ1lXLud7EZAlynbbeoztT2zucHwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -76,7 +65,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit 6f76a01173cc and fixed in 6.5.8 with commit 70f6756ad96d
Issue introduced in 5.12 with commit 6f76a01173cc and fixed in 6.6 with commit f0eee815babe
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52500.mbox b/cve/published/2023/CVE-2023-52500.mbox
index 30236daa..4002d3d9 100644
--- a/cve/published/2023/CVE-2023-52500.mbox
+++ b/cve/published/2023/CVE-2023-52500.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52500: scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command
-Message-Id: <2024030248-CVE-2023-52500-3d53@gregkh>
-Content-Length: 1986
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2041;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=wWa42d47VWHpxG75azOB23gnc2lWKHzxPQ8dwujLSw8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP529g3+MsI3kk6/avgvork4yZqu72prWdTWN2P7/jz
- IdpmQLLO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAi504xzNNlUn1cOVtJw/lX
- zdWSvkcpjKsSZBnmpx3UYFBrD+xzfKkyUcW3zH7JyTe2AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -37,7 +26,7 @@ Affected and fixed versions
Fixed in 6.5.6 with commit 22e6d783a330
Fixed in 6.6 with commit c13e73317458
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52501.mbox b/cve/published/2023/CVE-2023-52501.mbox
index c5230b05..a7c8728b 100644
--- a/cve/published/2023/CVE-2023-52501.mbox
+++ b/cve/published/2023/CVE-2023-52501.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52501: ring-buffer: Do not attempt to read past "commit"
-Message-Id: <2024030248-CVE-2023-52501-75ba@gregkh>
-Content-Length: 2766
-Lines: 68
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2835;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=U5Efn4HxncxhxKFYd0ahm/MHEAM9MKv4fYnjSiHs2Fo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP52+oWP4wvrWkap/TqeWO+aYujo+X5PzzEPnJftLoY
- azDyWMbO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAif70Z5setviTgJ2581nhh
- eKeq4ONtGxe4szDMj+huCm84t3Njo3zI/fudV+1c6587AQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -51,7 +40,7 @@ Affected and fixed versions
Fixed in 6.5.6 with commit 75fc9e99b3a7
Fixed in 6.6 with commit 95a404bd60af
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52502.mbox b/cve/published/2023/CVE-2023-52502.mbox
index 5103bc41..54c0b855 100644
--- a/cve/published/2023/CVE-2023-52502.mbox
+++ b/cve/published/2023/CVE-2023-52502.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52502: net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()
-Message-Id: <2024030248-CVE-2023-52502-6863@gregkh>
-Content-Length: 2797
-Lines: 65
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2863;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=uBhcqhRyYO7bqPLPAZ3vcedZ2ZAXVsSTVsKOjkGIcdg=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP529YEeZX96LXL+nLpTj9z4Fql7aZscR73DzHIbRZ7
- Onr8KScjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZiIMSfDXPkSuQCTn5b+fNbq
- 7KvFHDN2cXz0ZliwQq3F91Ghy8XVBgvL1Fb6C5rw3+4DAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -46,7 +35,7 @@ Affected and fixed versions
Issue introduced in 3.6 with commit 8f50020ed9b8 and fixed in 6.5.8 with commit d1af8a39cf83
Issue introduced in 3.6 with commit 8f50020ed9b8 and fixed in 6.6 with commit 31c07dffafce
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52503.mbox b/cve/published/2023/CVE-2023-52503.mbox
index 18e76add..b3d73a92 100644
--- a/cve/published/2023/CVE-2023-52503.mbox
+++ b/cve/published/2023/CVE-2023-52503.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52503: tee: amdtee: fix use-after-free vulnerability in amdtee_close_session
-Message-Id: <2024030248-CVE-2023-52503-cb3a@gregkh>
-Content-Length: 2895
-Lines: 68
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2964;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=+GBLmskA/LNyinXNhOF5vL8x3hY+taz7oNUqviq657w=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP52/Q0umsu79a8LbbKp4ocfUf1znde6/vKKnvuRjgF
- zQ/VmpyRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzkQDvDLGahf3s8vvYKqTHn
- PbfKeREx76iIEsM8q+tfjQUelWdfm7g/4pSKIr/Opjt1AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -51,7 +40,7 @@ Affected and fixed versions
Issue introduced in 5.6 with commit 757cc3e9ff1d and fixed in 6.5.8 with commit 1c95574350cd
Issue introduced in 5.6 with commit 757cc3e9ff1d and fixed in 6.6 with commit f4384b3e54ea
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52504.mbox b/cve/published/2023/CVE-2023-52504.mbox
index 401091dc..715ed01a 100644
--- a/cve/published/2023/CVE-2023-52504.mbox
+++ b/cve/published/2023/CVE-2023-52504.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52504: x86/alternatives: Disable KASAN in apply_alternatives()
-Message-Id: <2024030249-CVE-2023-52504-ebc5@gregkh>
-Content-Length: 3301
-Lines: 80
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3382;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=9dWD8KBUn1+q8Q+RwVT2/UmQWHtGTB52hFHKjfhJkNM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP528sM5FoUprr90ldIkq44l37P4UZHx4EGRvOOSByx
- meFZcvujlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjI50aG+V41QY8EpyVH1TvW
- b8myYgy/Jx/IwbBgSxKXR5S3lm35HO0V3MrBh1eeW/gFAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -61,7 +50,7 @@ Affected and fixed versions
Issue introduced in 4.17 with commit 6657fca06e3f and fixed in 6.5.8 with commit cd287cc208df
Issue introduced in 4.17 with commit 6657fca06e3f and fixed in 6.6 with commit d35652a5fc99
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52505.mbox b/cve/published/2023/CVE-2023-52505.mbox
index cb056028..1db00281 100644
--- a/cve/published/2023/CVE-2023-52505.mbox
+++ b/cve/published/2023/CVE-2023-52505.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52505: phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers
-Message-Id: <2024030249-CVE-2023-52505-8ac5@gregkh>
-Content-Length: 2459
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2519;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=/9Gh6ZdFt/EabN9s3XbpjV8jkxq2mLTKjDkJcSIvfEw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP528U/cV4z9Tzn/+rmo/3JfK8DpnynlV5aKVVFOTN9
- H6HVL5oRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExkqQ7DPLvrbQx7z+tZF8ge
- +VU62am9yazSlGF+9s+llZlHDc99P7WP8fnXMw4hRr9zAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -44,7 +33,7 @@ Affected and fixed versions
Issue introduced in 5.18 with commit 8f73b37cf3fb and fixed in 6.5.8 with commit c2d7c79898b4
Issue introduced in 5.18 with commit 8f73b37cf3fb and fixed in 6.6 with commit 139ad1143151
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52506.mbox b/cve/published/2023/CVE-2023-52506.mbox
index d1a859f8..27d76147 100644
--- a/cve/published/2023/CVE-2023-52506.mbox
+++ b/cve/published/2023/CVE-2023-52506.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52506: LoongArch: Set all reserved memblocks on Node#0 at initialization
-Message-Id: <2024030249-CVE-2023-52506-2b5a@gregkh>
-Content-Length: 5326
-Lines: 102
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5429;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=7hvVHZF7IVRXrUVbZ1RHgJo9CKWKZA1xsS2jT8Jysy8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP528UOeF9P+bdb6YMdgmmzN7DgT/Oz7uozydWrX3Kh
- k988pE9HbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjARmWkMc0Wuyq0t1pzya/3N
- f+8W8220lF994w/DXGFpYxZZ1mWVC4x4lyno3rgWZqhjAgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -87,7 +76,7 @@ Affected and fixed versions
Fixed in 6.5.6 with commit 19878758accf
Fixed in 6.6 with commit b795fb9f5861
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52507.mbox b/cve/published/2023/CVE-2023-52507.mbox
index 4098cf13..f2cc4a8b 100644
--- a/cve/published/2023/CVE-2023-52507.mbox
+++ b/cve/published/2023/CVE-2023-52507.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52507: nfc: nci: assert requested protocol is valid
-Message-Id: <2024030249-CVE-2023-52507-030c@gregkh>
-Content-Length: 2872
-Lines: 62
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2935;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=W8+hV+tfQdEN6vqfFFwl/NrYjyIzS24bayaFVrzDE4I=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP52+aoO788C33C6XVZ3YWTjQR7FNz1lB34FOJXLmuY
- GoiW09lRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzkz36G+cl5Bafapj52+G/j
- fXytjObZwHN6zAwLGjr3+r6//OCepd/H4MACzc78x5lHAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
Issue introduced in 3.2 with commit 6a2968aaf50c and fixed in 6.5.8 with commit 6584eba7688d
Issue introduced in 3.2 with commit 6a2968aaf50c and fixed in 6.6 with commit 354a6e707e29
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52508.mbox b/cve/published/2023/CVE-2023-52508.mbox
index 2810efd0..fc5f4da6 100644
--- a/cve/published/2023/CVE-2023-52508.mbox
+++ b/cve/published/2023/CVE-2023-52508.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52508: nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()
-Message-Id: <2024030250-CVE-2023-52508-359c@gregkh>
-Content-Length: 1905
-Lines: 53
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1959;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Eg+qOAAJLX+/Pl7T5U1pED2G2MVapLrEvac1gz5xF0Y=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP52+qmPLOTDgiZVVz6ZGaxgq1z2uOiX079S1Nv6LUd
- nZXw8KKjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZhINC/DgnNVK/gOzPn2Ivzi
- +3tmzbpKMvdy1BkWdG3zSNu34vN6O/u3nWtdFkbcCCmTAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -38,7 +27,7 @@ Affected and fixed versions
Fixed in 6.5.6 with commit dd46b3ac7322
Fixed in 6.6 with commit 8ae5b3a685dc
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52509.mbox b/cve/published/2023/CVE-2023-52509.mbox
index c1c8de25..06a56eb5 100644
--- a/cve/published/2023/CVE-2023-52509.mbox
+++ b/cve/published/2023/CVE-2023-52509.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52509: ravb: Fix use-after-free issue in ravb_tx_timeout_work()
-Message-Id: <2024030250-CVE-2023-52509-997c@gregkh>
-Content-Length: 2800
-Lines: 71
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2872;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=uJo15P/ETrl7SAR9h/y8MQGn5XogTyheoktkDivQ3+o=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP529yXfzp6g2vyzP1TeMPemzgLJG/fVVYJzPQ4GnIr
- jzvqZ/2dMSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEmFMZ5nA27FScOm/TL/11
- HpbL5t0903ay6CXDPCONOey71+RVTeGJ9lCQL3xVv8hyBgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -53,7 +42,7 @@ Affected and fixed versions
Issue introduced in 4.2 with commit c156633f1353 and fixed in 6.5.8 with commit 105abd68ad8f
Issue introduced in 4.2 with commit c156633f1353 and fixed in 6.6 with commit 397144287071
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52510.mbox b/cve/published/2023/CVE-2023-52510.mbox
index 7ab9ec2b..0ac96c39 100644
--- a/cve/published/2023/CVE-2023-52510.mbox
+++ b/cve/published/2023/CVE-2023-52510.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52510: ieee802154: ca8210: Fix a potential UAF in ca8210_probe
-Message-Id: <2024030250-CVE-2023-52510-6f8a@gregkh>
-Content-Length: 3184
-Lines: 68
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3253;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=TZ3Hy8xmdnCBvwskdxkOTJ0uTiTIxRVBNvXTctEgcy0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP52/aF26j3jVJQ32X8d7A11Uc+o952Y5IhlzJFVfps
- /J/4OzXEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABMJlGOYZxhklunZXDF/YpEX
- 99MZdw/OmfpJk2F+8KwLSjGmHPFpGkaLrXO3C7memrMYAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -48,7 +37,7 @@ Affected and fixed versions
Issue introduced in 4.12 with commit ded845a781a5 and fixed in 6.5.8 with commit becf5c147198
Issue introduced in 4.12 with commit ded845a781a5 and fixed in 6.6 with commit f990874b1c98
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52511.mbox b/cve/published/2023/CVE-2023-52511.mbox
index 696b3b69..09a3a269 100644
--- a/cve/published/2023/CVE-2023-52511.mbox
+++ b/cve/published/2023/CVE-2023-52511.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52511: spi: sun6i: reduce DMA RX transfer width to single byte
-Message-Id: <2024030250-CVE-2023-52511-1dbc@gregkh>
-Content-Length: 2228
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2288;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=mSdYzziuB7pybcUN6C72a49JnxnneNPUwEK2AzVJLxE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP529Wv28U61k8j7cqlMv/16JftqvNIg7PnHCi/rpLi
- 6ay7Z3dHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjAR1WUM87P2vEsSKnku8O+X
- 5q8+GSOPiYpMrgzzQ2bMdaxb1S/+4k6SUdiMqixFhkWHAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -43,7 +32,7 @@ Affected and fixed versions
Fixed in 6.5.6 with commit b3c21c9c7289
Fixed in 6.6 with commit 171f8a49f212
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52512.mbox b/cve/published/2023/CVE-2023-52512.mbox
index 7ec14326..96032db4 100644
--- a/cve/published/2023/CVE-2023-52512.mbox
+++ b/cve/published/2023/CVE-2023-52512.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52512: pinctrl: nuvoton: wpcm450: fix out of bounds write
-Message-Id: <2024030251-CVE-2023-52512-92f7@gregkh>
-Content-Length: 1963
-Lines: 52
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2016;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=QNkilPO06SgIakv7xAv/d9YwKGefDb3MClFsF+QIE2g=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP52/+JycyoWix7Q+5RSfkQv8oHyjwbVMu8d0hXx3lk
- bzpbx9bRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEykVZ1hfuifN5+WnmJkM7x4
- VHSubOHUe/tbTzHMj2K/8dpK7/X1G5ftH3Fu5Ap5fW+DEgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -37,7 +26,7 @@ Affected and fixed versions
Issue introduced in 5.18 with commit a1d1e0e3d80a and fixed in 6.5.8 with commit c9d7cac0fd27
Issue introduced in 5.18 with commit a1d1e0e3d80a and fixed in 6.6 with commit 87d315a34133
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52513.mbox b/cve/published/2023/CVE-2023-52513.mbox
index b11bbdc5..c5dd9609 100644
--- a/cve/published/2023/CVE-2023-52513.mbox
+++ b/cve/published/2023/CVE-2023-52513.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52513: RDMA/siw: Fix connection failure handling
-Message-Id: <2024030251-CVE-2023-52513-5224@gregkh>
-Content-Length: 2887
-Lines: 67
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2955;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=H+k0hemxAW40HLZx1Om9Q/5y7CfGr90iCh9ITxcfM/o=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP52+etPGrStCLdN1HuVxt65o9f1QJvU04K8WT0/E+U
- URf3flrRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExEdAPD/MibHEte9l3Lnhvh
- ZMg8/bTCzFfpBxjmR+yqZWhfzTjxzonzV5ufWwaK3PGZDwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -49,7 +38,7 @@ Affected and fixed versions
Issue introduced in 5.3 with commit 6c52fdc244b5 and fixed in 6.5.7 with commit eeafc50a77f6
Issue introduced in 5.3 with commit 6c52fdc244b5 and fixed in 6.6 with commit 53a3f7770497
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52516.mbox b/cve/published/2023/CVE-2023-52516.mbox
index 75c04db4..cd8283f3 100644
--- a/cve/published/2023/CVE-2023-52516.mbox
+++ b/cve/published/2023/CVE-2023-52516.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52516: dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock
-Message-Id: <2024030252-CVE-2023-52516-9b4a@gregkh>
-Content-Length: 6163
-Lines: 182
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6346;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=+7brRI9xeMfkUL767kb8TMp/s1WfwkP3kowQBSRbl6A=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP52+xKJIw5j9TaX1tfdxLJeflaRdWyzGLsS85+uWEh
- Ul+z2zTjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZhIdDXDggbLsqWRLdfWzn3K
- ZvXm+Ju/it05EgzzXfYqPz22MTXA5IGCLfeilnU83sJhAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -165,7 +154,7 @@ Affected and fixed versions
Fixed in 6.5.6 with commit fe2b811a02c3
Fixed in 6.6 with commit fb5a4315591d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52517.mbox b/cve/published/2023/CVE-2023-52517.mbox
index 6b6d1844..e0deaa26 100644
--- a/cve/published/2023/CVE-2023-52517.mbox
+++ b/cve/published/2023/CVE-2023-52517.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52517: spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain
-Message-Id: <2024030252-CVE-2023-52517-30dc@gregkh>
-Content-Length: 2608
-Lines: 63
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2672;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=w1Uldr/yq2QxaLCKo8A4E195uZFVYPN6y2CdxIRxBbs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP52+xMLOy0Dub8KPOqeXq0qJ4ie5fM0/yfcxp3Fy3Z
- /8O9vBtHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjARy/cM84O/dbndlDUX8zP+
- qpv+rvqWpPvxvQzzrBX85sxkYpw6x8rTqdZZ/13aGaZjAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -47,7 +36,7 @@ Affected and fixed versions
Fixed in 6.5.6 with commit 4e149d524678
Fixed in 6.6 with commit 1f11f4202caf
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52518.mbox b/cve/published/2023/CVE-2023-52518.mbox
index be8301a3..e94694e0 100644
--- a/cve/published/2023/CVE-2023-52518.mbox
+++ b/cve/published/2023/CVE-2023-52518.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52518: Bluetooth: hci_codec: Fix leaking content of local_codecs
-Message-Id: <2024030251-CVE-2023-52518-bcfa@gregkh>
-Content-Length: 2928
-Lines: 72
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3001;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Xuo7frRc8w6smIKX4EOOrwcKE8RXES1sP0uph1lNjCc=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF2gf0zP4cZXt9uTl7j7Xlm7O2Nr+Q7Ga45Htps3Jy
- nYXi9fHd8SyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBE1H4wzHdLmjPLYYut5qmT
- 53K6dGsC7tx/IMYwV7xcIauBm+djslmxxsqWYwX71/ZaAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -55,7 +44,7 @@ Affected and fixed versions
Issue introduced in 5.16 with commit 8961987f3f5f and fixed in 6.5.7 with commit eea5a8f0c3b7
Issue introduced in 5.16 with commit 8961987f3f5f and fixed in 6.6 with commit b938790e7054
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52519.mbox b/cve/published/2023/CVE-2023-52519.mbox
index 0beb247f..130ee5ab 100644
--- a/cve/published/2023/CVE-2023-52519.mbox
+++ b/cve/published/2023/CVE-2023-52519.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52519: HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit
-Message-Id: <2024030252-CVE-2023-52519-d53f@gregkh>
-Content-Length: 2650
-Lines: 62
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2713;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=SjnsOh5DejDnhFeOenauenclJssSFjRX8nN4cwh/u7E=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP528RdPfQv5t/wN0gpvL/70bryzoXCnq0Da/91LZxL
- wqzWcbQEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABN5Gc2w4HrdxpDw1F9B+st5
- dMIM/r/mTFadxLBgIqOHV19vfWYL04lJbB/3vPZUTskAAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -46,7 +35,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit 2e23a70edabe and fixed in 6.5.7 with commit 60fb3f054c99
Issue introduced in 5.12 with commit 2e23a70edabe and fixed in 6.6 with commit 8f02139ad9a7
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52520.mbox b/cve/published/2023/CVE-2023-52520.mbox
index 170f8e85..3470624d 100644
--- a/cve/published/2023/CVE-2023-52520.mbox
+++ b/cve/published/2023/CVE-2023-52520.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52520: platform/x86: think-lmi: Fix reference leak
-Message-Id: <2024030252-CVE-2023-52520-0a4e@gregkh>
-Content-Length: 2437
-Lines: 60
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2498;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=HgGA3Ux2ZkuIuxWnrtGvxUMnh7I2HHy0cnyaPUE9lYM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP528tUzv7TCxO32qHJ+Pf3mNiwvF/g35vWR6UOZEt+
- 86LDRn/O2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAisn4MC2ZczdaTPLI1wqvy
- 5vxFpRxtNrNV9BkWbO6NyVvyUEU7YFf+tJcBEy/uaJBlAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -44,7 +33,7 @@ Affected and fixed versions
Issue introduced in 5.14 with commit 1bcad8e510b2 and fixed in 6.5.8 with commit c6e3023579de
Issue introduced in 5.14 with commit 1bcad8e510b2 and fixed in 6.6 with commit 528ab3e605ca
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52522.mbox b/cve/published/2023/CVE-2023-52522.mbox
index 98db6f35..cd9f01dd 100644
--- a/cve/published/2023/CVE-2023-52522.mbox
+++ b/cve/published/2023/CVE-2023-52522.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52522: net: fix possible store tearing in neigh_periodic_work()
-Message-Id: <2024030253-CVE-2023-52522-6abd@gregkh>
-Content-Length: 2692
-Lines: 64
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2757;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=q7xHGZh1kS4VlzcDjaavyfwwLJmzEhKNaZ5UV9EJ3Aw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP5289z/J/7kqR12erCn5ZOkYKPPq/YvULvvUfs5UPf
- my2j4zk6ohlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJbD/PsOBC/inNEJ8EZbVv
- /oHf4h6yZSy+U8QwT13qD6efeLvZF4kp3tPXqjJcLgiQBgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -46,7 +35,7 @@ Affected and fixed versions
Issue introduced in 2.6.37 with commit 767e97e1e0db and fixed in 6.5.7 with commit a75152d23337
Issue introduced in 2.6.37 with commit 767e97e1e0db and fixed in 6.6 with commit 25563b581ba3
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52523.mbox b/cve/published/2023/CVE-2023-52523.mbox
index d2553527..6c3d5e1f 100644
--- a/cve/published/2023/CVE-2023-52523.mbox
+++ b/cve/published/2023/CVE-2023-52523.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52523: bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets
-Message-Id: <2024030253-CVE-2023-52523-5ae2@gregkh>
-Content-Length: 3912
-Lines: 107
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4020;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=3qzNBbzrN2+EIcyO4CeL8C+TuOUWsYKAdURPvota/jY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP529dub1SMKFk5jWnk5P91kb09Z0SjddX6omQ0BTNM
- U47c+9XRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExk5h2GudKLmBYdCg65snjd
- xdj7K9RFBG45VDHMdy5bUez45FjX9TP6kY8uz2T2m9J1HgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -91,7 +80,7 @@ Affected and fixed versions
Issue introduced in 5.13 with commit 122e6c79efe1 and fixed in 6.5.7 with commit ded6e448028f
Issue introduced in 5.13 with commit 122e6c79efe1 and fixed in 6.6 with commit b80e31baa436
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52526.mbox b/cve/published/2023/CVE-2023-52526.mbox
index 0c783072..8ea1d1e6 100644
--- a/cve/published/2023/CVE-2023-52526.mbox
+++ b/cve/published/2023/CVE-2023-52526.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52526: erofs: fix memory leak of LZMA global compressed deduplication
-Message-Id: <2024030254-CVE-2023-52526-8928@gregkh>
-Content-Length: 2071
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2126;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=UIdcN+IMsQVgLMxCz76tGfQZwUX3BK+CnkwNceW/j3w=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP52+rUjW58TpI4n7LpOsTCwPXtKw4eOGGj2OAdtj1d
- RMUpvud74hlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJnD/CME+Ju0Ek/zH/wqY0
- ge+r1jwJZdh2yIphwZY5J/aEiCpJvH6aJ/TWOHdzUf6k2wA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -39,7 +28,7 @@ Affected and fixed versions
Issue introduced in 6.1 with commit 5c2a64252c5d and fixed in 6.5.7 with commit c955751cbf86
Issue introduced in 6.1 with commit 5c2a64252c5d and fixed in 6.6 with commit 75a5221630fe
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52527.mbox b/cve/published/2023/CVE-2023-52527.mbox
index 5050aec4..8e089e38 100644
--- a/cve/published/2023/CVE-2023-52527.mbox
+++ b/cve/published/2023/CVE-2023-52527.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52527: ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
-Message-Id: <2024030254-CVE-2023-52527-a1e8@gregkh>
-Content-Length: 3931
-Lines: 85
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4017;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=2ZkaGqiDO1aDT7y8+VPOGbMQ1zyVmM/hVq4FP8+Gtx0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP5297Hat9qFdg6bUnhafXPhAWveDh6u3Ps+jBNYMzL
- 5c4vf+xriOWhUGQiUFWTJHlyzaeo/srDil6GdqehpnDygQyhIGLUwAmosXDsGDeDvFPUQvfs9gv
- aliz9eL77zKMOeUMc+XsFvK5O3zWcrp78Nik74b89497nwMA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -65,7 +54,7 @@ Affected and fixed versions
Issue introduced in 3.5 with commit a32e0eec7042 and fixed in 6.5.7 with commit fe80658c08e3
Issue introduced in 3.5 with commit a32e0eec7042 and fixed in 6.6 with commit 9d4c75800f61
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52528.mbox b/cve/published/2023/CVE-2023-52528.mbox
index 2e991c4f..9e783d72 100644
--- a/cve/published/2023/CVE-2023-52528.mbox
+++ b/cve/published/2023/CVE-2023-52528.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52528: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
-Message-Id: <2024030254-CVE-2023-52528-c33b@gregkh>
-Content-Length: 5789
-Lines: 117
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5907;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=DPEdDZ9lfksU5DiiCj3k1t1YkxvQ+z+flkOVqfQHIgE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP528/ZWGty/jgrHlT9sYZlRHTOPMu2HIZ3Ln797bpn
- 2WRuYfTO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAi08UY5mfPvWLMIcseF+ir
- 953T4mTEpveqjQwLln/+GXDg3cPGZP7VZpZFSWYFbTwPAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -97,7 +86,7 @@ Affected and fixed versions
Issue introduced in 2.6.34 with commit d0cad871703b and fixed in 6.5.7 with commit 4931e80da946
Issue introduced in 2.6.34 with commit d0cad871703b and fixed in 6.6 with commit e9c65989920f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52531.mbox b/cve/published/2023/CVE-2023-52531.mbox
index 6343c5ae..e61560ae 100644
--- a/cve/published/2023/CVE-2023-52531.mbox
+++ b/cve/published/2023/CVE-2023-52531.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52531: wifi: iwlwifi: mvm: Fix a memory corruption issue
-Message-Id: <2024030255-CVE-2023-52531-be21@gregkh>
-Content-Length: 2838
-Lines: 77
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2916;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Qom+l7Xb2S4l54nffi2JMjZjXchVw0FzK0pc8qtXDA8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP52+ffjr0bNCBlO2F92fZp+ta9px2SHjmzn7PYo/lX
- t2395e96ohlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJtIgyzFOMNDQVOWu/sZGP
- tdv8Xdeahe57mhjmqT5vUmZ+xO5yr+xQpMeNwzp/+tmaAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -61,7 +50,7 @@ Affected and fixed versions
Issue introduced in 3.9 with commit 8ca151b568b6 and fixed in 6.5.7 with commit f06cdd8d4ba5
Issue introduced in 3.9 with commit 8ca151b568b6 and fixed in 6.6 with commit 8ba438ef3cac
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52532.mbox b/cve/published/2023/CVE-2023-52532.mbox
index f21e7ca3..5cb6b4e5 100644
--- a/cve/published/2023/CVE-2023-52532.mbox
+++ b/cve/published/2023/CVE-2023-52532.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52532: net: mana: Fix TX CQE error handling
-Message-Id: <2024030255-CVE-2023-52532-57db@gregkh>
-Content-Length: 2048
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2103;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Vk/vWnKZ6CZlvIoSOenFejkg44+pFZ0tlyflu+I3vGQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmP5+84VvJu6eG/jtMmvm/+ub/z6+/qfR805v13PpZi9
- a6kScTnSUcsC4MgE4OsmCLLl208R/dXHFL0MrQ9DTOHlQlkCAMXpwBM5PUJhgUTxN+USC7/M3HV
- 69z5NwTXR/UJyfAyLLj2x9FqumO7XeLJNTMbv02cW+263gAA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -39,7 +28,7 @@ Affected and fixed versions
Issue introduced in 5.13 with commit ca9c54d2d6a5 and fixed in 6.5.7 with commit a910e0f63047
Issue introduced in 5.13 with commit ca9c54d2d6a5 and fixed in 6.6 with commit b2b000069a4c
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52559.mbox b/cve/published/2023/CVE-2023-52559.mbox
index 07d5634e..e6132cd8 100644
--- a/cve/published/2023/CVE-2023-52559.mbox
+++ b/cve/published/2023/CVE-2023-52559.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52559: iommu/vt-d: Avoid memory allocation in iommu_suspend()
-Message-Id: <2024030252-CVE-2023-52559-680e@gregkh>
-Content-Length: 3486
-Lines: 97
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3584;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=RMEZlMQo+7+WlJJx9f+ar/N+Hir7C/4SS2EgOr/drwY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF0bM2Pb52M0tSTFifyO/y4jNSTK9ZRgjesd44/W9L
- 7+9DLv0tSOWhUGQiUFWTJHlyzaeo/srDil6GdqehpnDygQyhIGLUwAmonuMYX5i5QeRWRpHFqwy
- eKUklzrpygFdy0kM84MXH4p743j2YErG00fTlH5JMj0tPwQA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -80,7 +69,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit 33e07157105e and fixed in 6.5.7 with commit 496c591f0b38
Issue introduced in 5.11 with commit 33e07157105e and fixed in 6.6 with commit 59df44bfb0ca
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52560.mbox b/cve/published/2023/CVE-2023-52560.mbox
index 4bc1e2b7..34c50bc6 100644
--- a/cve/published/2023/CVE-2023-52560.mbox
+++ b/cve/published/2023/CVE-2023-52560.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52560: mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()
-Message-Id: <2024030252-CVE-2023-52560-c3de@gregkh>
-Content-Length: 9764
-Lines: 184
-X-Developer-Signature: v=1; a=openpgp-sha256; l=9949;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=KDqNgO35EQEilA+jnHOXQrbrQXQLdWXKmWo6Tz/boNE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF0buirRZEVy0RbxOY9JDrWlpr6IsbK8dXnBZKk04c
- s+MsNKZHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRlwYMC5Z3tidNXWzo/MX8
- SrJN1fPYPRxLBBnmZykKVXgx2XuJcx1g27NnwYNNjhV3AQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -169,7 +158,7 @@ Affected and fixed versions
Issue introduced in 5.16 with commit 9f86d624292c and fixed in 6.5.6 with commit 6b522001693a
Issue introduced in 5.16 with commit 9f86d624292c and fixed in 6.6 with commit 45120b15743f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52561.mbox b/cve/published/2023/CVE-2023-52561.mbox
index 6e4a137f..a8546628 100644
--- a/cve/published/2023/CVE-2023-52561.mbox
+++ b/cve/published/2023/CVE-2023-52561.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52561: arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved
-Message-Id: <2024030253-CVE-2023-52561-89b2@gregkh>
-Content-Length: 1887
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1942;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=PfbIbamrZX/ov6aN5tPeQDdooVTyVDarJihaTquC6ho=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF0Yavj3Dd8vmxJHAms5pb65f/XDeYfv3fQJz+u1eK
- 15YsOyBdEcsC4MgE4OsmCLLl208R/dXHFL0MrQ9DTOHlQlkCAMXpwBMxOcgw4JZzM+tBeudduv+
- 7ms0Xy+9ymAivwfDfOftWVY3DCNnzX18zXfe1m0RT2vjtQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -39,7 +28,7 @@ Affected and fixed versions
Fixed in 6.5.6 with commit 82dacd0ca0d9
Fixed in 6.6 with commit 110e70fccce4
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52566.mbox b/cve/published/2023/CVE-2023-52566.mbox
index ea0a1106..6f616530 100644
--- a/cve/published/2023/CVE-2023-52566.mbox
+++ b/cve/published/2023/CVE-2023-52566.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52566: nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()
-Message-Id: <2024030254-CVE-2023-52566-69f0@gregkh>
-Content-Length: 3482
-Lines: 72
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3555;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=lAeVrOpxgEt7sQgUYMkLfNrggC5c8qmfvBL5+PoWa8w=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF0a5azvdz7pppCyRX6G9rq1MatfvAq49Mt9uehlU2
- IocdLPviGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIlkdDAsOK6g5bDqlWnl/TO5
- U68ej9c6KpEzgWGumESURFH1JJv9VqX9eXE8wmVJS4QB
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -52,7 +41,7 @@ Affected and fixed versions
Issue introduced in 2.6.30 with commit a3d93f709e89 and fixed in 6.5.6 with commit 28df4646ad8b
Issue introduced in 2.6.30 with commit a3d93f709e89 and fixed in 6.6 with commit 7ee29facd8a9
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52568.mbox b/cve/published/2023/CVE-2023-52568.mbox
index 257ac515..e4054383 100644
--- a/cve/published/2023/CVE-2023-52568.mbox
+++ b/cve/published/2023/CVE-2023-52568.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52568: x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race
-Message-Id: <2024030255-CVE-2023-52568-b5c6@gregkh>
-Content-Length: 3246
-Lines: 84
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3331;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=I+a63q7SbvN3GxxvIi3oZ58GUeazSVqBP0Q/yWEgHmI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF0ZPP/2658/8mZN+f+HJf7NqubFdr3TwOce5b2dYa
- 3NeEC/f0RHLwiDIxCArpsjyZRvP0f0VhxS9DG1Pw8xhZQIZwsDFKQAT2ZTPME+PUc7G682Xjced
- TJp38Z8XmdDlv41hnlHvy95qi317w9lsudhkZ+nJlSgtAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -69,7 +58,7 @@ Affected and fixed versions
Issue introduced in 6.0 with commit 5a90d2c3f5ef and fixed in 6.5.6 with commit 1348f7f15d7c
Issue introduced in 6.0 with commit 5a90d2c3f5ef and fixed in 6.6 with commit c6c2adcba50c
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52569.mbox b/cve/published/2023/CVE-2023-52569.mbox
index cc9987da..d2024720 100644
--- a/cve/published/2023/CVE-2023-52569.mbox
+++ b/cve/published/2023/CVE-2023-52569.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52569: btrfs: remove BUG() after failure to insert delayed dir index item
-Message-Id: <2024030255-CVE-2023-52569-a9c1@gregkh>
-Content-Length: 2306
-Lines: 60
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2367;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=ZPmw6QyTSI5aEJeTiRDdd8qqmciGNT6t38xVlR95ZKI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF0b/auNmcok52adVdfvdg2Nurxac3Mn26+Fyrc6Ed
- 87BqW3dHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRqWcYFiyZGX+77J2hmaG+
- x/wTE6v/WE/+EMgwPyhQ7ZfhqU2azHtrlEMDBZ38eNg4AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -45,7 +34,7 @@ Affected and fixed versions
Fixed in 6.5.6 with commit d10fd53393cc
Fixed in 6.6 with commit 2c58c3931ede
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52570.mbox b/cve/published/2023/CVE-2023-52570.mbox
index d6156334..c5371072 100644
--- a/cve/published/2023/CVE-2023-52570.mbox
+++ b/cve/published/2023/CVE-2023-52570.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52570: vfio/mdev: Fix a null-ptr-deref bug for mdev_unregister_parent()
-Message-Id: <2024030255-CVE-2023-52570-0789@gregkh>
-Content-Length: 6068
-Lines: 126
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6195;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=MwBfvGoHODL68VNRygMr75uNdODN4TBAyK+Vw5iHUUQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF0ZbSwSu5W6KePnm/50tt9a7L77KvmTSgplz5kcYe
- 1bE7OU26YhlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJPLFiWLCLXa/kQNi10zvy
- 6kz07qdWG3w2UWaYyWhvfPzY1uSru7+cDfq7aY3paWn9WwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -111,7 +100,7 @@ Affected and fixed versions
Issue introduced in 6.1 with commit da44c340c4fe and fixed in 6.5.6 with commit 52093779b183
Issue introduced in 6.1 with commit da44c340c4fe and fixed in 6.6 with commit c777b11d34e0
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52571.mbox b/cve/published/2023/CVE-2023-52571.mbox
index 4ca5c868..26f21d8f 100644
--- a/cve/published/2023/CVE-2023-52571.mbox
+++ b/cve/published/2023/CVE-2023-52571.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52571: power: supply: rk817: Fix node refcount leak
-Message-Id: <2024030255-CVE-2023-52571-087e@gregkh>
-Content-Length: 2054
-Lines: 53
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2108;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=l5zdszb8oSGRrHNsP8wsVCPwstP8lFTDqmPhY760UZI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF0ZPur+qkXelo4GYbLLmuyWzTk8NXem5eUNHcKXYv
- Y+iLn+TO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAi3F8Y5vt5XBHsWs5ff/Jr
- t9iWdedfBL0z4maYH95fH/ufLW45d6irGbO2V+6Vv8u5AQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -38,7 +27,7 @@ Affected and fixed versions
Issue introduced in 6.2 with commit 54c03bfd094f and fixed in 6.5.6 with commit 70326b46b6a0
Issue introduced in 6.2 with commit 54c03bfd094f and fixed in 6.6 with commit 488ef44c068e
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52572.mbox b/cve/published/2023/CVE-2023-52572.mbox
index 4b61d7a3..34e12707 100644
--- a/cve/published/2023/CVE-2023-52572.mbox
+++ b/cve/published/2023/CVE-2023-52572.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52572: cifs: Fix UAF in cifs_demultiplex_thread()
-Message-Id: <2024030256-CVE-2023-52572-2b92@gregkh>
-Content-Length: 4692
-Lines: 138
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4831;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=s1Maojw+P7uou0qBvfV7fp5Cv7VX65ZVfS8xssYzQao=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF8Yw6zr9mF/Jc5799noBIcUiRbfP1/b8lrl3L7jEe
- PWN1RfNO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiAfcY5gecuyD460uDpZf+
- v/kmBY7mHDr/ORjm8Cxdy/7pevIiIUk7r+Jlcx/+nSlfAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -122,7 +111,7 @@ Affected and fixed versions
Issue introduced in 2.6.16 with commit ec637e3ffb6b and fixed in 6.5.6 with commit 76569e3819e0
Issue introduced in 2.6.16 with commit ec637e3ffb6b and fixed in 6.6 with commit d527f51331ca
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52573.mbox b/cve/published/2023/CVE-2023-52573.mbox
index df4d1f49..50303ae4 100644
--- a/cve/published/2023/CVE-2023-52573.mbox
+++ b/cve/published/2023/CVE-2023-52573.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52573: net: rds: Fix possible NULL-pointer dereference
-Message-Id: <2024030256-CVE-2023-52573-531c@gregkh>
-Content-Length: 2462
-Lines: 58
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2521;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=ZsXGB+kftcLXj27BSIdIfAaZ8HTDVjChRlL4I2UtYHQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF8Y83LH6wCK/BK2S1Flz2w5/svT6fr/+bKNwduG91
- UvfrF5v3hHLwiDIxCArpsjyZRvP0f0VhxS9DG1Pw8xhZQIZwsDFKQATSQlkWLDxidrSa1qmL9KL
- bt9asefymoMGCT8Y5sqeDZTUe7ZK9d439pdqgvNmzLLdfAsA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -40,7 +29,7 @@ Affected and fixed versions
Issue introduced in 5.1 with commit fd261ce6a30e and fixed in 6.5.6 with commit 069ac51c37a6
Issue introduced in 5.1 with commit fd261ce6a30e and fixed in 6.6 with commit f1d95df0f310
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52574.mbox b/cve/published/2023/CVE-2023-52574.mbox
index 21768597..afbd28c9 100644
--- a/cve/published/2023/CVE-2023-52574.mbox
+++ b/cve/published/2023/CVE-2023-52574.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52574: team: fix null-ptr-deref when team device type is changed
-Message-Id: <2024030256-CVE-2023-52574-a423@gregkh>
-Content-Length: 4301
-Lines: 110
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4412;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=rd3/gZDjzeY2yh/zdCxWF/onSohBGi4ysZ3KGAKkOrw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF8Y8W/opwd9F9+5ajsULDZuT3BZKy3KJTimb3ioWs
- WJhJP+6jlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZhIylWG+eWGC6a9yO7nr9x/
- eJp3nSPzT+7fYgzzNFL+W/q9zOaelybQNc2is1VIaY4uAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -89,7 +78,7 @@ Affected and fixed versions
Issue introduced in 3.7 with commit 1d76efe1577b and fixed in 6.5.6 with commit cac50d9f5d87
Issue introduced in 3.7 with commit 1d76efe1577b and fixed in 6.6 with commit 492032760127
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52576.mbox b/cve/published/2023/CVE-2023-52576.mbox
index e62fa10b..eed2b526 100644
--- a/cve/published/2023/CVE-2023-52576.mbox
+++ b/cve/published/2023/CVE-2023-52576.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52576: x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()
-Message-Id: <2024030257-CVE-2023-52576-7ee2@gregkh>
-Content-Length: 2160
-Lines: 57
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2218;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=zylpl6Ckk0UnGw0tAivCR7GGeGLXBhu9zIlqF2puiik=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF8ZGpvTl76903TSRNczh0/MHx6w2ONesePd1Umet2
- GSOc0xBHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRZ6IM813VLRbrOHK8t1RN
- qNsR0hDakP+mkGHBFEmTStU5InJ1UzbnZ6nZ7GNLak0FAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -42,7 +31,7 @@ Affected and fixed versions
Issue introduced in 5.13 with commit fee3ff99bc67 and fixed in 6.5.6 with commit d2dfbc0e3b7a
Issue introduced in 5.13 with commit fee3ff99bc67 and fixed in 6.6 with commit 34cf99c250d5
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52578.mbox b/cve/published/2023/CVE-2023-52578.mbox
index dddcd6f0..c8eb61e8 100644
--- a/cve/published/2023/CVE-2023-52578.mbox
+++ b/cve/published/2023/CVE-2023-52578.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52578: net: bridge: use DEV_STATS_INC()
-Message-Id: <2024030257-CVE-2023-52578-50cb@gregkh>
-Content-Length: 5855
-Lines: 127
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5983;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=vlq02InqwqM68kouC41jDSwEGAZ8Vi+P6LEBq0K4+8w=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF8Y21n6smbzjnAav+G2hvlRFHWeF0zYSuo0Sfzx8v
- DvazpR0xLIwCDIxyIopsnzZxnN0f8UhRS9D29Mwc1iZQIYwcHEKwEQUtRnm8MqYW1w7LJscs7P/
- uEa8sZ6YNf8lhvnFHz5/2Pr10835H5LPzdE59Mra7BMnAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -107,7 +96,7 @@ Affected and fixed versions
Issue introduced in 2.6.17 with commit 1c29fc4989bc and fixed in 6.5.6 with commit f2ef4cb4d418
Issue introduced in 2.6.17 with commit 1c29fc4989bc and fixed in 6.6 with commit 44bdb313da57
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52580.mbox b/cve/published/2023/CVE-2023-52580.mbox
index 829c2fd9..e3249c0a 100644
--- a/cve/published/2023/CVE-2023-52580.mbox
+++ b/cve/published/2023/CVE-2023-52580.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52580: net/core: Fix ETH_P_1588 flow dissector
-Message-Id: <2024030258-CVE-2023-52580-c37e@gregkh>
-Content-Length: 8101
-Lines: 138
-X-Developer-Signature: v=1; a=openpgp-sha256; l=8240;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=6yrw7L9tNXKA1Nhx6k0+rR98gUSND3BHFPpcxkl4wss=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF8btCAlPYjofoPjvZXqf51XfwxNjJOZqLcsK9mX/3
- pLveyGuI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACbC1sUwv6bn97qGJi1vs/AJ
- S77eLzMqCzWRYpin9yd9zxrd/MVrk0TmBkXf/RZ44YsoAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -122,7 +111,7 @@ Affected and fixed versions
Issue introduced in 5.12 with commit 4f1cc51f3488 and fixed in 6.5.6 with commit 48e105a2a1a1
Issue introduced in 5.12 with commit 4f1cc51f3488 and fixed in 6.6 with commit 75ad80ed88a1
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52582.mbox b/cve/published/2023/CVE-2023-52582.mbox
index 9ac716d1..d54978b0 100644
--- a/cve/published/2023/CVE-2023-52582.mbox
+++ b/cve/published/2023/CVE-2023-52582.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52582: netfs: Only call folio_start_fscache() one time for each folio
-Message-Id: <2024030258-CVE-2023-52582-07c8@gregkh>
-Content-Length: 3139
-Lines: 86
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3226;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=SQ2bkCquKSxhnwXZmJNPyMdw2uuicJAj7G2uLegfiQ8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKmPF8Zd/Ck13au8cfrusgZLwyMZjpoP8lwPux4tVD7Dw
- 23wovZgRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzk1X6GeZoGCkcSr6n//1iq
- I8Ky643pdRWp7wwLdvhE+hYXqB51dv8ulC27Ze2E5zHXAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -71,7 +60,7 @@ Affected and fixed versions
Issue introduced in 5.13 with commit 3d3c95046742 and fixed in 6.5.6 with commit d9f5537479d4
Issue introduced in 5.13 with commit 3d3c95046742 and fixed in 6.6 with commit df1c357f25d8
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52583.mbox b/cve/published/2023/CVE-2023-52583.mbox
index 65f48275..2ef8ecec 100644
--- a/cve/published/2023/CVE-2023-52583.mbox
+++ b/cve/published/2023/CVE-2023-52583.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -32,7 +32,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit 76cb2aa3421f
Fixed in 6.8 with commit b493ad718b1f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52584.mbox b/cve/published/2023/CVE-2023-52584.mbox
index 0eaef1de..a29a2ce0 100644
--- a/cve/published/2023/CVE-2023-52584.mbox
+++ b/cve/published/2023/CVE-2023-52584.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -35,7 +35,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit 9a3881b1f07d
Fixed in 6.8 with commit e821d50ab5b9
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52585.mbox b/cve/published/2023/CVE-2023-52585.mbox
index 315f29b0..fde04ed2 100644
--- a/cve/published/2023/CVE-2023-52585.mbox
+++ b/cve/published/2023/CVE-2023-52585.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -26,7 +26,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit 195a6289282e
Fixed in 6.8 with commit b8d55a90fd55
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52586.mbox b/cve/published/2023/CVE-2023-52586.mbox
index 1d036be8..1e52b22a 100644
--- a/cve/published/2023/CVE-2023-52586.mbox
+++ b/cve/published/2023/CVE-2023-52586.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -33,7 +33,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit 14f109bf74dd
Fixed in 6.8 with commit 45284ff733e4
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52587.mbox b/cve/published/2023/CVE-2023-52587.mbox
index 5f700190..ec0f5b94 100644
--- a/cve/published/2023/CVE-2023-52587.mbox
+++ b/cve/published/2023/CVE-2023-52587.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -111,7 +111,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit 7c7bd4d561e9
Fixed in 6.8 with commit 4f973e211b3b
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52588.mbox b/cve/published/2023/CVE-2023-52588.mbox
index 81c560fa..f63a30d6 100644
--- a/cve/published/2023/CVE-2023-52588.mbox
+++ b/cve/published/2023/CVE-2023-52588.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -31,7 +31,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit b8094c0f1aae
Fixed in 6.8 with commit 4961acdd65c9
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52589.mbox b/cve/published/2023/CVE-2023-52589.mbox
index ddd2db90..5ae6f439 100644
--- a/cve/published/2023/CVE-2023-52589.mbox
+++ b/cve/published/2023/CVE-2023-52589.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -38,7 +38,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit 7bb1a2822aa2
Fixed in 6.8 with commit 870565f063a5
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52590.mbox b/cve/published/2023/CVE-2023-52590.mbox
index bbcaa00b..9d12f1bd 100644
--- a/cve/published/2023/CVE-2023-52590.mbox
+++ b/cve/published/2023/CVE-2023-52590.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -25,7 +25,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit de940cede3c4
Fixed in 6.8 with commit 9d618d19b29c
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52591.mbox b/cve/published/2023/CVE-2023-52591.mbox
index 078c4b78..07921ee2 100644
--- a/cve/published/2023/CVE-2023-52591.mbox
+++ b/cve/published/2023/CVE-2023-52591.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -26,7 +26,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit c04c162f82ac
Fixed in 6.8 with commit 49db9b1b86a8
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52593.mbox b/cve/published/2023/CVE-2023-52593.mbox
index e9a8ff42..39ed1efc 100644
--- a/cve/published/2023/CVE-2023-52593.mbox
+++ b/cve/published/2023/CVE-2023-52593.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -27,7 +27,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit 3739121443f5
Fixed in 6.8 with commit fe0a7776d4d1
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52594.mbox b/cve/published/2023/CVE-2023-52594.mbox
index c4bf66e1..e1d10623 100644
--- a/cve/published/2023/CVE-2023-52594.mbox
+++ b/cve/published/2023/CVE-2023-52594.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -45,7 +45,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit be609c7002dd
Fixed in 6.8 with commit 2adc886244df
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52595.mbox b/cve/published/2023/CVE-2023-52595.mbox
index ee1bf880..9d416f7d 100644
--- a/cve/published/2023/CVE-2023-52595.mbox
+++ b/cve/published/2023/CVE-2023-52595.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -32,7 +32,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit fdb580ed05df
Fixed in 6.8 with commit a11d965a218f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52596.mbox b/cve/published/2023/CVE-2023-52596.mbox
index 35ac7e06..5636f3e2 100644
--- a/cve/published/2023/CVE-2023-52596.mbox
+++ b/cve/published/2023/CVE-2023-52596.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -33,7 +33,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit 2ae7081bc101
Fixed in 6.8 with commit 315552310c7d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52597.mbox b/cve/published/2023/CVE-2023-52597.mbox
index d618505d..eaa7edd0 100644
--- a/cve/published/2023/CVE-2023-52597.mbox
+++ b/cve/published/2023/CVE-2023-52597.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -52,7 +52,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit 2823db0010c4
Fixed in 6.8 with commit b988b1bb0053
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52598.mbox b/cve/published/2023/CVE-2023-52598.mbox
index dcd9c3a7..00bbc65e 100644
--- a/cve/published/2023/CVE-2023-52598.mbox
+++ b/cve/published/2023/CVE-2023-52598.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -46,7 +46,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit bdce67df7f12
Fixed in 6.8 with commit 8b13601d19c5
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52599.mbox b/cve/published/2023/CVE-2023-52599.mbox
index 63a502d9..a8076110 100644
--- a/cve/published/2023/CVE-2023-52599.mbox
+++ b/cve/published/2023/CVE-2023-52599.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -70,7 +70,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit 5a6660139195
Fixed in 6.8 with commit 49f9637aafa6
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52600.mbox b/cve/published/2023/CVE-2023-52600.mbox
index f69c5c98..6619e596 100644
--- a/cve/published/2023/CVE-2023-52600.mbox
+++ b/cve/published/2023/CVE-2023-52600.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -33,7 +33,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit bacdaa042513
Fixed in 6.8 with commit e0e1958f4c36
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52601.mbox b/cve/published/2023/CVE-2023-52601.mbox
index 03300b15..25886579 100644
--- a/cve/published/2023/CVE-2023-52601.mbox
+++ b/cve/published/2023/CVE-2023-52601.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -32,7 +32,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit fc67a2e18f4c
Fixed in 6.8 with commit 74ecdda68242
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52602.mbox b/cve/published/2023/CVE-2023-52602.mbox
index eac41f6f..65b9a1c7 100644
--- a/cve/published/2023/CVE-2023-52602.mbox
+++ b/cve/published/2023/CVE-2023-52602.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -33,7 +33,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit bff9d4078a23
Fixed in 6.8 with commit fa5492ee8946
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52603.mbox b/cve/published/2023/CVE-2023-52603.mbox
index 29dc02d9..c9905130 100644
--- a/cve/published/2023/CVE-2023-52603.mbox
+++ b/cve/published/2023/CVE-2023-52603.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -69,7 +69,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit 6e2902ecc77e
Fixed in 6.8 with commit 27e56f59bab5
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52604.mbox b/cve/published/2023/CVE-2023-52604.mbox
index 228f26bf..0fefef44 100644
--- a/cve/published/2023/CVE-2023-52604.mbox
+++ b/cve/published/2023/CVE-2023-52604.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -90,7 +90,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit 59342822276f
Fixed in 6.8 with commit 9862ec7ac1cb
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52606.mbox b/cve/published/2023/CVE-2023-52606.mbox
index 65c600f7..7509333e 100644
--- a/cve/published/2023/CVE-2023-52606.mbox
+++ b/cve/published/2023/CVE-2023-52606.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -33,7 +33,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit 848e1d7fd710
Fixed in 6.8 with commit 8f9abaa6d7de
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52607.mbox b/cve/published/2023/CVE-2023-52607.mbox
index e7555e88..ba39dd88 100644
--- a/cve/published/2023/CVE-2023-52607.mbox
+++ b/cve/published/2023/CVE-2023-52607.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -30,7 +30,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit ffd29dc45bc0
Fixed in 6.8 with commit f46c8a75263f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52608.mbox b/cve/published/2023/CVE-2023-52608.mbox
index 690e7bda..50ddb88a 100644
--- a/cve/published/2023/CVE-2023-52608.mbox
+++ b/cve/published/2023/CVE-2023-52608.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -50,7 +50,7 @@ Affected and fixed versions
Issue introduced in 5.7 with commit 5c8a47a5a91d and fixed in 6.7.3 with commit 12dc4217f165
Issue introduced in 5.7 with commit 5c8a47a5a91d and fixed in 6.8 with commit 437a310b2224
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52609.mbox b/cve/published/2023/CVE-2023-52609.mbox
index 11b78328..c9e082a9 100644
--- a/cve/published/2023/CVE-2023-52609.mbox
+++ b/cve/published/2023/CVE-2023-52609.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52609: binder: fix race between mmput() and do_exit()
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3865; i=lee@kernel.org;
- h=from:subject; bh=SKxxVVLrLgCMai9NymuNZ03A7FVr1sh5FEFl0ejBPYo=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BJ/x6y4kjNu7nsZb6/1YmC9i0vreEBvsUM/8
- 0jLEC0jHcyJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgSfwAKCRBRr4ovh/x3
- YXN1EACvCiwpYd+bCUcQtXEnEuoUok80UMyUtoWdjTRChrQh5Aj9ijkGXs6pZBFDMjrA4Xai/jt
- xDk19gv04qgowiZpPY8VLs9t+FUf7QRWCu9MnB2RwntMxGkMn7ZULWT4yQJE+OQ1S9RApACW4uw
- +hSx/4YoSNATWLLVo/IxRRw65hxDUFeJVLNNYn36atE8KaSz6Nsqeo7aOXzk8pqwI+Z6f0s234h
- G1mUGBkZG2f4xw6+/43//U+yTazXTGDn+JdqHUL46WbUJiVHgREhxf38mUdUxZVPqomBWBB0ymW
- GGUaDMC0c02k4UOMJeJw/buUB2YmgnMlsXyxmaFRnCbLo7mJX03Nf11TasIMVA9/Hlw2omH+fHw
- 1TWmZvhckL4ORcZOK6fxNvuNTzmf8F9AyU1BSnXvJFyL530QICOMjSCGMyIEc1onE45HWVUm0ur
- x8HFG43LMZc1mwjqGEPfszTUqxf/rFc2wXyi2s0wuszIaBmYrJUY3K7EFbyzNI8ceHTFaNaw8qD
- p1e8axPwF/l6asQI+XZMYTZgC5XW2Q+GW+C2WJslHqbIWCBP6TGMZw8IeXN3GTR97kXU3vzIn75
- i9M0cT3LgfeXCnMx3z0hCZZ+E859f7dWthpcvehen24KOwFcdJgPW/hmoRa9fUT22ZYdO9hcZ77
- aq2wc0vMd6CZhdQ==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -70,7 +54,7 @@ Affected and fixed versions
Issue introduced in 2.6.29 with commit 457b9a6f09f0 and fixed in 6.7.2 with commit 77d210e8db4d
Issue introduced in 2.6.29 with commit 457b9a6f09f0 and fixed in 6.8 with commit 9a9ab0d96362
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52610.mbox b/cve/published/2023/CVE-2023-52610.mbox
index 6b4b575a..45a342be 100644
--- a/cve/published/2023/CVE-2023-52610.mbox
+++ b/cve/published/2023/CVE-2023-52610.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6970; i=lee@kernel.org;
- h=from:subject; bh=ZGt5XCH8awS2Trzr1kYNo7cRddz5VAYAztwW/Fd1vwo=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BJ/RCdb6sjG67bjP4v1/dzPAVHiWAgtuVUe4
- OWQwGEOcF6JAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgSfwAKCRBRr4ovh/x3
- YZvID/0Srqq0Ulit9Ebqwg6ADZQXnXvSwzeBQz8z85tVvDBtIdw3GXds+WCb+wT3DfVPp8/Wrpx
- pSmHU0Bxa87FI1KX0ey6z96bEtFT4KwWPWLEjjBaZBli+nJo9+j9TXAOKXZs/MwdY5EEdbhcR//
- FMdEjtWxLXvrHyDi/tjel+tLdEG2Ua1Fj+RmOePS8QTYq/V/Au5tPrR1fYOmCGw/0vSvR1XkDSI
- Gzd0Q706UzdoTSbcnGYk+ot6PY6eTXgwrz+Xv+tCA1LwJgbewZmzVdA3YCCKhpoFDyIkRpv5vpV
- k60x8qrgut5jdZTI6Z0wRFguzhByW7u6Bj49Lvqte7z+Nw339qkO9c4wVzMOuycuN0+Lb4DYCD8
- kXeuiC5hPhcV30XW+ZKgcsBXH7MZSOvOq8Fv1VYB3liBB6avN4mvmPBRQZg6D1gTSlRaCyiGYvq
- DdjhCtpkQEQmruYoDQlujeF+Pu2lyQbR2vGhzrJleM+27sQzBl7kGlT+Pn77rSGNwwpz++FIgZw
- 9nB/u8/dK+dSDEuWWncAvGo7yqBgK90lm7+9pBBi4xsFHkTR2Ik4ADkJSsuJ4C4j5P4wsCcLCGe
- rKhBg+jriga0xs0YE5gaPfjFB+HzMr+6ZHkDLi+ShkSSMAN6LfqfQkGcRrc+YT7tHU1ZS0+X7TM
- ePTqZiLw7uI3uxQ==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -129,7 +113,7 @@ Affected and fixed versions
Issue introduced in 5.3 with commit b57dc7c13ea9 and fixed in 6.7.2 with commit f5346df0591d
Issue introduced in 5.3 with commit b57dc7c13ea9 and fixed in 6.8 with commit 3f14b377d01d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52611.mbox b/cve/published/2023/CVE-2023-52611.mbox
index 27b036d4..f9b1fd28 100644
--- a/cve/published/2023/CVE-2023-52611.mbox
+++ b/cve/published/2023/CVE-2023-52611.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52611: wifi: rtw88: sdio: Honor the host max_req_size in the RX path
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3950; i=lee@kernel.org;
- h=from:subject; bh=Q+3wKrE347W9AqOkjFI+Blcp2XOggufKAukpPozqX0I=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BJ/cbbzEHBnQAIR9rNNn8ew0ld5CcpheiaMK
- TOc1o6UrwaJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgSfwAKCRBRr4ovh/x3
- YS19D/9d+bGZDUEkR44LXSijJk1koo2K/uncKwPG7HjwivdiRf7NzRaKRbIhC5Fya25U0MPOEZ8
- mIoi8POd9dkGPhdi/9chTofbjh0x8TPT63tkMUbCG+NyTQzVX9Li6ke7RYysiQY/XKQMlZLd/FY
- Rfo1DVb2fV4Pv4uAbTlrMViyH69RfqqoSEjnvgtZdKoNqi6k/ZN/MJQKSpIvBiiOBZ9M+AVmfTZ
- V18GQkC5LwhkRoHw6yQYlV1ZM7nQ7YCcepQ9J+/tSutEUtRs2crY4cyR/7Kde1dn5knYsFBoi5b
- HW5omEJRgsraP9hXWqLE44punhLGYdQo9/MkW+4SU+OKxEv6LaStB91EVG9E1gScVS5VQellkdh
- sttUbCn8Cou4gkNEvOS0ezuudQ2xinY0sK0oJKBpx7nT4v6SEh5SAdAnOHSN4BoftS/+6GxhhZ/
- 3Nrbc9wf+MuIAN4VaO+2HMmsBOAKjF5dmLh+Qs8PcCBrZvilWwYjckoidrl0tGSV3rjYemS9Kes
- 9EYkPJ9csdALsG9tE81EhHku1mkzXC2dfFX6D0kzKch/Q4D260vvzW4SLbCKSi/CcPIWGwsB7r4
- ZpbX+4UYPG3MGRDdz4ehTnzZR1yw7FAEeLZ1WKtFVwrGN+Vgp1CJzjq2eGkTxqY3vrSBOfkuZdc
- GLSwQEQyiynRrpg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -72,7 +56,7 @@ Affected and fixed versions
Issue introduced in 6.4 with commit 65371a3f14e7 and fixed in 6.7.2 with commit 0e9ffff72a06
Issue introduced in 6.4 with commit 65371a3f14e7 and fixed in 6.8 with commit 00384f565a91
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52612.mbox b/cve/published/2023/CVE-2023-52612.mbox
index 914db10e..fe1303b1 100644
--- a/cve/published/2023/CVE-2023-52612.mbox
+++ b/cve/published/2023/CVE-2023-52612.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52612: crypto: scomp - fix req->dst buffer overflow
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2799; i=lee@kernel.org;
- h=from:subject; bh=95CUoBo22+Yf7w5ydHdRdmqVJA8PE/Ul/9KvWVRQvvU=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BJ/uI76tgqo89CAUtjfjlWXzupTOXl1KFReP
- jbaipi9VsyJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgSfwAKCRBRr4ovh/x3
- YVuZD/44GXEwBIkyAGZMIfyFbsLp18Yi4mMGO8W+7YFTk+43/O9aWMLXxzn6jCA8TeoEsGFayI3
- X6FVo/pgUmfuYG+3TqJDbjM5vdLazDWfnoPZU1qEGc5fEJZUClbtWBXm9hhIUMzCPfpopfYoIIc
- wputfvSrw6FrXHuBKGszGWapr2eGgY8zzBJMRzxuC9iFAB+fL4YUBYVUMd5bLMVD2/l+XdZJQsl
- ElsQCTAkj0c7Bn3NrHOJLEc2uSXEb0FUWsGE3c780/chr56Q3P8Wtn4T13Xgat5IqfU0U8RQAaX
- G4oaXajvKK6DNMN6n/l7UBvQC4MBNhd4DqcETRvJ4gOOvyFU3+cz4xMCrs3eU/ZkzHK3M0RhUsB
- R02Vy/cMzVMKOOcE51Acvsl4GWd7uzcuhArxs9hbIM9Z+kCQAuQdkiND2yY+WgqhDubBnMKJNkX
- KQqR15RmxMLqo3HRjAUu5UlcaNttw89ngd9xSrtruOD+hcfWDbuljwlwWUb+ApSk6PyT3+MM1P5
- gLD68QCbVX7WHA5h6Pzxc0GFT1h8bL8TZLfUDgrT6/1wMdlJJqV2FMP19NfRFDVcpwvjC1WeK8Q
- WuS0UJ4KC8pkQQVhFC44JX2YnPcJsIOIdcjcbAefxtD22DZ/f4aF08Cb+cLwsz0r3JLSizGiIsW
- uJk7m0QkX2+MQnQ==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -45,7 +29,7 @@ Affected and fixed versions
Issue introduced in 4.10 with commit 1ab53a77b772 and fixed in 6.7.2 with commit 71c6670f9f03
Issue introduced in 4.10 with commit 1ab53a77b772 and fixed in 6.8 with commit 744e1885922a
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52613.mbox b/cve/published/2023/CVE-2023-52613.mbox
index 5b404661..e1446a93 100644
--- a/cve/published/2023/CVE-2023-52613.mbox
+++ b/cve/published/2023/CVE-2023-52613.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52613: drivers/thermal/loongson2_thermal: Fix incorrect PTR_ERR() judgment
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5992; i=lee@kernel.org;
- h=from:subject; bh=pkGR7kgfNyBkW027tknaoh8bSa9ki1zH2qYUUdhivsg=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BJ/I+Ju7kEImA33+KIj5jJ9iAxGDm/5zL9zP
- yR+YkVBc4mJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgSfwAKCRBRr4ovh/x3
- YVL9D/wL+eVVyKjLGYyY2eqyV3a7ap8vUWYc30NtenHA7ozz69zdHTOQLsDNMx8WUXgeE+txp0Z
- gO5H+msvdtaCvfyaJ432I3mh5WqSQNd/R7sV4itlLA7vNCYHFv1WkRSj15HVAba4xAsQy6pzc22
- 9Q0QhoNUeyI92y7gphO3UQF6Ih0dYJMglVXZiU8FMlBLo1dWkhNXdhgeqH5hVdaa4sCD/5FKXzp
- 6+X5+FsTUpnEe+NzeAvK5yiHrFSjL88fIgHzswHS9STW4EyEd1NeeRXVgpc9c82404M3TFvHNEj
- HtBrVsvAF98MtONA6++76N+u/jTAht/QJssyDvWr2wYw5ETUYe2OHMt4z+p9PovTqGRftaItHtD
- AjkXH4ymUwItpRnmyF8bwZGCmupub+YHlnQiIq/OZ/Dp+A3RDk8qO8Oyyn4AVzsyLXUy+Cs8GdF
- sv5ONLIl+hpWmLtL8UQ+9Ek4p0qZ/81KK9QBwyAbeyNhicVlSaNxApHffttkfk1HsxqRybm/NjT
- G+GQU8dRshPxpxysIzQ2ybO67SxpvUj3MqkrhPMFqt7CqbEvL15jtwz+p16nQPrBRihAzx7usVV
- OjPOyk/7+KU29VkuN26ZXHFkfCM4Bfzo5a/NPa3u3WSQO/Nm1ORP6Ot5lsAMp9FZ7uT0LHK/1U4
- AbLEbgkcIL77nnQ==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -96,7 +80,7 @@ Affected and fixed versions
Issue introduced in 6.6 with commit e7e3a7c35791 and fixed in 6.7.2 with commit 6010a9fc14eb
Issue introduced in 6.6 with commit e7e3a7c35791 and fixed in 6.8 with commit 15ef92e9c411
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52614.mbox b/cve/published/2023/CVE-2023-52614.mbox
index 5c2c656b..f0a7d33b 100644
--- a/cve/published/2023/CVE-2023-52614.mbox
+++ b/cve/published/2023/CVE-2023-52614.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52614: PM / devfreq: Fix buffer overflow in trans_stat_show
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2669; i=lee@kernel.org;
- h=from:subject; bh=mYchYbJUv47Z04cdeHPsCuEM8bNNOqpOK1Qsqpylq+w=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BQimoWkK1Lm1FtrUG/bD8sS6nwu9VpXX6HhY
- UAVPMnQQwSJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgUIgAKCRBRr4ovh/x3
- YUfdD/9xOMbsewM78tNMVMoCqS89zgAFy/REFaTUUGFyb3+shVztLHuQun0qUe7mKGcEreSGeic
- lXt41A5CjFSdJ+O3vZ81AD7YYtdeSswu/f2TgW0dDklyxd94WDKHPTRaBiz3MnaRjkln6a66jve
- nKVhwdwC+SF9j4mpnMcmUZ9yxdZ/5mAirLgEbRBRo3dW5YrBfomn44dkNzYRqFWtsoY7SdAY8wI
- hhUbxHHr9o7Gaz2sfHhyoHKqoUOVP6oRDDp7q80ehKDhD7/r2twLoVKP87d3DkgzPoXA190PJZy
- ++M/KfK6VIF8ZutP/DTi4UREO6LxakYCPUDO3doZW4/QV4h8z0ZrVOvXBHHc4xJgsvIcocZEB5u
- FnQRK2ANmB95Z+3CHaws/iHYXsITNSIh6JmzR58VKRluFVBUxjnWtcIBkMVSv6RxfC4QJZ9ySC3
- NT6L0gffje1vjHtwA1B1rtSl5lBgXVq1YvWbVV9tImOG5Gvddi4RQ4WoR/UxMCSnB1g9Zl3IjcW
- IyCBHbrukH3KCfPl87CBTXmvcvmTYVx6Q1bQmX1Ax2X6gZcMVDrIDhKiEDLEiTw72YRZtFUWjMk
- GQnkyFCVpyNxkWhX2t5Tv4Em+x4aL0jayqZ9ImV6k4GklzRfnSEgx4XPmYxLeqer+atrjZHJDvZ
- AS5Gbt/0uVXlN8w==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -53,7 +37,7 @@ Affected and fixed versions
Issue introduced in 3.8 with commit e552bbaf5b98 and fixed in 6.7.3 with commit eaef4650fa20
Issue introduced in 3.8 with commit e552bbaf5b98 and fixed in 6.8 with commit 08e23d05fa6d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52615.mbox b/cve/published/2023/CVE-2023-52615.mbox
index 8d196544..1eb21734 100644
--- a/cve/published/2023/CVE-2023-52615.mbox
+++ b/cve/published/2023/CVE-2023-52615.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52615: hwrng: core - Fix page fault dead lock on mmap-ed hwrng
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2993; i=lee@kernel.org;
- h=from:subject; bh=IDt93Cfp8sq44YaG9jTFob0DfIAbvvavIeEHR2bnShA=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BQiVz+34fUMjqRwU2lHO1u2j62XDTenksSWq
- vMLi0eotHOJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgUIgAKCRBRr4ovh/x3
- YdXFD/9dsjWfT4J5sC042TkBRbOWCE9k7L+0ZDUSWbD1YMss8OKnta6VcVgkfmKTpXdTNbF8wLw
- ZC04w4DLzK0bx3gVWWE1Gwz28NJ4B8z1g/eVJxp0DL1B9hKHmsPJ+G43GsoTF455y0yiRj08ySR
- hK4JmCkf8CkU3IGwvCgdqZR+KveFxCULnouy1NzLkBrV+O6CLsz4C+opK553LfC9MImqqDNWr8S
- hWL3H767tn03zHInCw3Mz2BobBCe6f7S2w/DnpjUQ/r/LlMLh269FI4krC7ZWQujaeoDZaG7UIP
- infImJRq3UTmqgzAJnKSo1Q9H1WW8+IB5tiFv1zLotFk+9QGMojUv67yZn5y9tNJDLCvsjvUlZb
- 1tljj/uNbcQat0D8mlDsC3cvgB8KLphTttmn4ImyEfiaeRyb0IhH6a7ldiLHITGzmEj2n7iGhnl
- Lo6bbqbiVS6dLdGnWrj+PMg6F1UqFqiCbpKrANekLRVdj4ET15As5a1nZYFixC4//linFgvDCGT
- 9xYDBl7BALIUqywTPOwXT57Mzi6kZjUEFB2GdBEFCgHNoIy+v1v4+BR+XfdXJB7b2RcwwrydeK3
- Y5nwbvgFA1VzsDIQhGepp6hOhTV/A/FcFlIOMBCW59Ws7oRC6Vr/TusUgQq6ZeaxH0EOHe4ZEkT
- /CeEWzCzqWQWYcg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -49,7 +33,7 @@ Affected and fixed versions
Issue introduced in 2.6.33 with commit 9996508b3353 and fixed in 6.7.3 with commit 6822a1427178
Issue introduced in 2.6.33 with commit 9996508b3353 and fixed in 6.8 with commit 78aafb3884f6
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52616.mbox b/cve/published/2023/CVE-2023-52616.mbox
index 9649983c..836ddf3b 100644
--- a/cve/published/2023/CVE-2023-52616.mbox
+++ b/cve/published/2023/CVE-2023-52616.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52616: crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2692; i=lee@kernel.org;
- h=from:subject; bh=Y2C1XOrm26ah5eIYvFy2mVkhN2UAmY3CAB2v9vA91/8=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BQiGU9CoHr6WivBEMInpGidUSWB6ghFp17/5
- OzngnHzKDeJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgUIgAKCRBRr4ovh/x3
- YWi9D/9SnPQ62m12+CI8SYt0mYg7b66/RGnPwFqqJUw1mMX3ezokMIiRyd5VeLMAE6WXERY4lLS
- dxpf3RDGtKnq77RHOg+iSx2ytbDL3ABi5FX15EnWKWFqcOK3NI85F7DBIpGAWjCMRpHv7BZ3kNL
- 18iQPQWhHjmHcnQsZeLcHsKpWgN1gVxqpCD2/j6rxBtj5DoBqVe4qVZ8u5YB6cSpK2hUk+Cxn5x
- h+auGaNKlpTxhVJL5vwILui6qI3AgOMdsFJdAL/ytdmg9yjM64lU1loolYZ0KYrNkXEZY+EJpwH
- AwqXtuRbM2BLGMEctU+NyOQ+jSVmbYiZ90a3kbVzioY77VC4RXwHApgzzvWRcbVjXQ61fBo4HVu
- RvR75An65ALotcucni/sKLeITamD+/OMzGlqGM/IQ3b0qTe8wVCU1ymTHIY1ui5YvzXoJUdsrC0
- Utxs+7w0I/tDvTZSieNImQOTioqcseRpOsu/s4JEeLYryRygF1dfoZDbIVCVfhvAhd4KLB636u8
- +kloMQ+MPXoK0REBM0FKAo8p5ZV/G+ABf0Qg2SsJ/dxelTtbS0lO4dX9vNtGnG5qpSwe9Ef3C1m
- 6fL0GWHuGB1hBOM7rUmyoqRbieuk0HzzqAErfU/QHHL7OxydpbUHB6seX2ikPMQe1rk6biOOejX
- afjvHSTbpBBdWNg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -47,7 +31,7 @@ Affected and fixed versions
Issue introduced in 5.10 with commit d58bb7e55a8a and fixed in 6.7.3 with commit 7abdfd45a650
Issue introduced in 5.10 with commit d58bb7e55a8a and fixed in 6.8 with commit ba3c55742030
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52617.mbox b/cve/published/2023/CVE-2023-52617.mbox
index 5ec8eb94..e8878d9f 100644
--- a/cve/published/2023/CVE-2023-52617.mbox
+++ b/cve/published/2023/CVE-2023-52617.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52617: PCI: switchtec: Fix stdev_release() crash after surprise hot remove
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3028; i=lee@kernel.org;
- h=from:subject; bh=iswLtFBCFXVJhy/IsDINK9gOSGZ7MqUD6y3QuOwuxBA=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BWdRvutPxours1Vc94//I2mFcEfQwBzUQ8Kj
- MBg7oHqCW6JAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgVnQAKCRBRr4ovh/x3
- YdWQD/sHTEjIDybLOJ2UPmlC28qi0RviVq1e8HkwNyu9B8TXWOW+8mw2nEvYTRZ4lIIs2t/x0zv
- rUv9egKAenl6YLmVz8zwv88yfpyLkzRZSWsaECJpSncTfy1JOF+KQpGPM4zB2cV2TZo6GJi1p/G
- FCWOPsw1vqDb+a0mBS4y3I5VllsF+i1tHN2/OARgOtTX8NjbCZSnb4QuLhUxzqhVlrYiVmRlAEM
- GaeEWG7IiRgl7dpiX0RZn5IIiIvjF7xtr5WkNr4/0FV7RbVdou0wbZilToS0ftIq2xNRGYDjvgG
- qhAa246RzWqiHK+aATW+Loh9h6nNJx7pCANiC7hZpnnU2OyUoPmi/umabqgI1TnckHxdGahXJzG
- 6k4uMiQ7vOWH6vYEbJwE/ermElF4Cr7MoB+xJ83shkQkw58RbDUwq0HNXtkukKSe+mGMvsQClgv
- gOrsdJfRiyc1p2VtAnlLOWNyh7dFjD/ZEhEF47kBsUqO3N7fBNz0uXerLEKRAjYrfmO8o1LL7iq
- D+Fyvz4L91xEXCUJiymhYKVqQ6Ggxz6WDZ1PJ4rjoQLwl0P+Na0ZnS2mBxTDZICGRSY6ceYxr1x
- sqB+tL0xSUZiVqHDF7gmy81GJPBdIkm7RbjR4gG+Nb/5RbWOJ6klIlxpLuMHyCKwkFPJmHSZhu4
- +x0wAJtfEdK/zvg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -59,7 +43,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit e129c7fa7070
Fixed in 6.8 with commit df25461119d9
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52618.mbox b/cve/published/2023/CVE-2023-52618.mbox
index 8644016f..277eb7b9 100644
--- a/cve/published/2023/CVE-2023-52618.mbox
+++ b/cve/published/2023/CVE-2023-52618.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52618: block/rnbd-srv: Check for unlikely string overflow
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3230; i=lee@kernel.org;
- h=from:subject; bh=WpEV1D1EQNxw5Wl338cfu5ZMGR7OcMxwZ7fRROd+4cM=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BWdN/kU8ihaIoQ1I9CvJPofO8Cor+SfD7GCD
- jqST7n2VSOJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgVnQAKCRBRr4ovh/x3
- YY+SD/4xKUmRJS3sNhsOsHwDA4Tb6eUmFILeEBgwb8h91PnLceEHO5sJ8cLE6gYHZ3H9tyZVUSp
- lug1yr6DKjAP9IXxrXlaDZ+PBtvNL/7OV5znoIkNx6Cdzai7T2wzVFAOKCgXv0yntOmKstxVS8i
- 5wKOkh+2H7be22g/W4IqzfkwRKVb5cPx6chyt2B7KcEbSRBOWRVezOLjs0I/61QApiomPMpn2Km
- au5qCkZMRI8kYz0eFYS22Cx3Qsf76Lxy9SECIFiCEVjm0wB+kjuo+lpB8XlXRA+/2dBszxR2JW8
- F84BOW+wDft0sEd19li9HqwDkD6JEgxWCvZQOlE31Yi/I505uRlpa1IbvYAc+pb4OMsuxM0SS36
- L8ueSGE7sCrISuN2pVAnedqolTBATTUJAKEA9OVTlIo5sgCFvFY8lSTDWI6UC7GsX/JxINfbZNe
- ZkDBldaAyYzxiacymasRC4+o1NcKyW/tfSem1Ntpis3H1UuH0pdFYI4RczBBrVXtUSTbHuWErh/
- rLUcmt24G9WoxRJ7tp7vFSVFGDYFnpREjVqHa2oVe5l9WqSbiQhTAi49TdEHyxPhIPbOvDU2fdS
- bg+Oax6eKXkao6XnV+vnU8qh+F/utKX+YQpV7aKDig/0dFuQpmQat96/OQiONXdqhOmb0I1T19Q
- rcTbGQ1QlhH03iQ==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -59,7 +43,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit a2c6206f1810
Fixed in 6.8 with commit 9e4bf6a08d1e
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52619.mbox b/cve/published/2023/CVE-2023-52619.mbox
index 0025eb91..86704944 100644
--- a/cve/published/2023/CVE-2023-52619.mbox
+++ b/cve/published/2023/CVE-2023-52619.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52619: pstore/ram: Fix crash when setting number of cpus to an odd number
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2716; i=lee@kernel.org;
- h=from:subject; bh=f1oXcU/N577tgyPjng06pM7SXqzNMPsbw5OTFObI8u4=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BWdqn09skyxImCmCKogj7Xhr0XEBaSpjXplJ
- N66HPG+inSJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgVnQAKCRBRr4ovh/x3
- YeW1EACp3H/z2/Q6NfTFrUhYL5JCN+ivy/T/k2H4UhwgBeJO/Ti5YxociT0n/2qCyBJLW0O35Ym
- uc2n4uJIPzOagAZYMiTw2v5C+ENcuImf6sAzMfkOIbxzd2UGGsbxkLLT0dojw6Q7f5rKKspvSx/
- vaeCOh1yhjCgDHMU6C9ciEwdBvR/hHgfWzNX+rcW4Xtkj+16hc6ucIsWt3C+i1nB6T1sHRkV508
- Tk5xC5GmUFZZokCJqhcxAW0uRh360mx3nz3Mx6V3weqt8US3XAjpWOseX56brs3cfrJWSM6+M8A
- NwWH3Z8gYUqVaXyjOTsVSEkvTPxmMuhXk8HJuTdiZ7nQ14EJcJ3b3AfrTGqUJsB3yKo0FmgB0dX
- SDBm/8ZMNq8b6aBkt5QmpP9bdufp+T+YLlvagBNHiJjqJ1J+KYq1PLKErW2IeMYbIqzrdFovstq
- 3QO3Lo8PZyL17Lg9+NgX138aedpu+STmVmV5aVBcK6WeZFpJ8YBC+t2ic9zBZCnQFuPgfog0ZYO
- /5uK2fjRz/zUe4Q8FHYagphpuDaerfg53ok8RdnFbBy0dpNyc2rNj6haeT7+kijSbBdFPLikXrQ
- B4oXG5MGJmC1Qz7AoiAMbja/IMDmbRSimoXBZL+KeA0khG8y7AvQZMGlZX7wLOmvZ5DXhr0rcz/
- 3mjTFxdI6Z5a/Yg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -55,7 +39,7 @@ Affected and fixed versions
Fixed in 6.7.4 with commit cd40e43f870c
Fixed in 6.8 with commit d49270a04623
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2023/CVE-2023-52620.mbox b/cve/published/2023/CVE-2023-52620.mbox
index 66562cbe..54fadde7 100644
--- a/cve/published/2023/CVE-2023-52620.mbox
+++ b/cve/published/2023/CVE-2023-52620.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52620: netfilter: nf_tables: disallow timeout for anonymous sets
-Message-Id: <2024032147-CVE-2023-52620-11a9@gregkh>
-Content-Length: 1672
-Lines: 49
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1722;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=QnpSgSVVqr+Orp0h3E3vHGER1zSmO/2tGKhrE9a7h2c=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKl/+FMYk2OmiDstdsz+/eClEOP3Lfx8O27/6TlvGZpX7
- KwW1f6qI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACaSfp5hnvGL7Tv81e9UrJok
- p658jF1ZoOjtBoYFXfdWq8wXZCqcPO+B5bFr+3SXnvooCQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2023/CVE-2023-52621.mbox b/cve/published/2023/CVE-2023-52621.mbox
index 6df3e51c..562cabe8 100644
--- a/cve/published/2023/CVE-2023-52621.mbox
+++ b/cve/published/2023/CVE-2023-52621.mbox
@@ -1,24 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52621: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3077; i=lee@kernel.org;
- h=from:subject; bh=E8EkmCtKjd4P3QjfiKp1bDDsUUoBAbFGtloT5m8/9IE=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBmAwOjjUMFs+5jJsxwA5a+/vCvKKTHu3BJETAug
- +nJqMxAfUiJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZgMDowAKCRBRr4ovh/x3
- YZOAD/9+PYD+749hOXa/7EwNp+iwK2VHoWmUU2GhEUAx5HLyYmR3nIevvbrIWsgrReOp6M+1Z8U
- xpm183nJcPSMWUmXGSJVAb4+p+yjUq4UTQn5TFU/zbgaN7TADpbyPIplfRrrLj68qtnFlj3cN7b
- D+XUNU6GF3tJpydDtNmgj57olQw1uVAUpFqVO4eJckNeSaxaSbYxtyN5gCmOESp6a4KUEyerl9a
- CrivmzfVB4VrA2t+uQ7K/uUz89LgdcT4sRmj8amCTBLv+pHJvFiETV1bgftuvDK2erO6gbh9ULn
- hHxETia3GqlvS+tBOclLLBhlEV19A8FPDQmzt5mshBsR7bQC17aPt+IUto9zRxRF8WeJoG3j1mL
- DcsuoEPoOD0wiDFEGJXZFLxpYTlFLEYsIuvjXrzU5aZgft3DG6BMPlx6iT11s1enNYh2Gqz3A7g
- r6WIeNOzHERjWtw9w4dXIYCWCqcxcRuI0WrPwDkQ7EEy68uPB7YoG+iJgZxOPaSPL/Q61XG1NOV
- nv4yAVoaUe/sNB0W9PgTTSnaaqXuTLi/hyZ/9PHvlsaFz5ysFi2Hq72cCP0/yNO4tjKu6Lt4Laq
- H1txjhcuz/CzoE7nqrAgUsUK/zqUo+x9f9dbdl1tbkVLAWB4sMdcN1gqmQJ2tJqivZmf+m1EE+Q
- WCcH7ePmXSJGv5Q==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
diff --git a/cve/published/2023/CVE-2023-52622.mbox b/cve/published/2023/CVE-2023-52622.mbox
index d0b607a3..8af7d83b 100644
--- a/cve/published/2023/CVE-2023-52622.mbox
+++ b/cve/published/2023/CVE-2023-52622.mbox
@@ -1,24 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3711; i=lee@kernel.org;
- h=from:subject; bh=NmUU5F0Km3r8mgtguVDjqATqOSFhJi/ge7BJnViitmQ=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBmAwOjn5gQu/RPGd7JXG6DZWwKtenwiOxZ1n9nB
- MEPVAtd/niJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZgMDowAKCRBRr4ovh/x3
- YZPkEACeR3PxiEOm6GlLTd/3H5D2Nj5ZjbBRE2XGt4hOAgJ0KndofMJ/Or16wwwWCCdLLT5koK7
- G1ozewctG1KchCDF7CX1EY4wPTfT+xAEe1JShodXo8Mnj4B2PWivar5+puMQbcC7nRKJV7JBl75
- oWC9QQoY7UCmKS2BWl5Ezu62sRX4EWPCmTzlTwkAtTlpMEJ2HrFtVIK/AhKgMUyggCt3LRxx0v2
- vTboYEn90hIJ5AsQ+B8kE6CZgP1b2nD582ZssfiOXx+EI3xOLDmY41/MC0tvXxHrLid1Czri9EB
- oJ0qgd95vy2SQYpbnQBoiDhDoOy0bn7w0nM1wLAay6frV7bPWZJ7wsWbkxhhjbYkdIfFefsYbCh
- ceUdI2FfkZza1TBUVQvbHtEiQQBCSNhHIbj/gNc716z3p71BrrujZ+5WbKYtCYbqcR4scBdpOKG
- zvIcCPVemA+jva3j+H8VLa3vOQcF3D4DVc1OpjBTmgtNKx0QXwvtNk/zWjw30L/CS+IcrQlAOB+
- IXU1xc4O2QQVOIg16KuAGDz5ock1EUum0bmUhMMtXldY8V6L85efSN+PHAvCKhlkuwSQby5pj2y
- t7Y9BLrFJIi/G331cai0YJwtjbZ2jBPS4ySUeWWwz21hbeOuOSoYxBMj7a6o9mYElKkzcgzI1wY
- e/fKSpUQjcRUOiw==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
diff --git a/cve/published/2023/CVE-2023-52623.mbox b/cve/published/2023/CVE-2023-52623.mbox
index 833f03d9..591e7b99 100644
--- a/cve/published/2023/CVE-2023-52623.mbox
+++ b/cve/published/2023/CVE-2023-52623.mbox
@@ -1,24 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52623: SUNRPC: Fix a suspicious RCU usage warning
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6695; i=lee@kernel.org;
- h=from:subject; bh=lRDhFpDBni+vP5xrlMslOl0nEvkmlyjArKtv24aPQkU=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBmAwOjsPhrDK7MWG7M+Z9N0DuKYUj/wsVw779LX
- UP9yM1ZidiJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZgMDowAKCRBRr4ovh/x3
- YQZID/9JC/Qc1Gvw/j9uRmrKnPPNinPwnRfjNzTtsn1wu9Lf6B0OPt0PI0M8UVOD/FOLjjkEdje
- NvnqZvayNfZmKnOQHpKVU6dFZtgkHRfgKvjgYuQPWNAKrtkkVLxzkmDjSApRsTxoojM2xqxZp/c
- sPfPDXpu1VBR9b9IueFwAYx+1HCKqcHHrPTkCVb0ahAtx/euhK1v1pDMq51KckvUkjxIBRLw7/z
- YoI00b4o8S74onzou6zbakIF9sywh4jvJUFhl52oO2fVWyhRJEtHmnFKvGKgF1NvUYT2DpN7xHl
- 9JZ72uuvaBh4Sv1SAjZa061EDJ4oFQAIY+8EioHaqCxmd1yXVlkzzpFAEPUQyMG2jPST/ySNLIc
- 9UnbsJkKmoqPGIj4lf1ysOKv27+xlPrhvErbNf5wLhaz2aMRR6xz5KH5npY1uNQPKA6Vy0G1OL8
- i8YusumlBcKycD10eca/uy+qetAwcKxakhbglEQPIuphdmKQkiElA32wbTubcYmxbp1CXi57iso
- v/bmRuTsc4455CkGhUZ5I0ejUKoWevV/D4FLaW/7PKLIQSeWgt4UD9feu7tAPHVR0SFbSa00TMx
- AMX0go3hYW02kkeo9Meh68dvey8W1CaVMix6yUHE4QJNHLLN7FisM86iplugouVODjjq/eR5Bam
- 3YNJxH9WVmJ4GFg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
diff --git a/cve/published/2023/CVE-2023-52624.mbox b/cve/published/2023/CVE-2023-52624.mbox
index 2f293291..af1ec037 100644
--- a/cve/published/2023/CVE-2023-52624.mbox
+++ b/cve/published/2023/CVE-2023-52624.mbox
@@ -1,24 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52624: drm/amd/display: Wake DMCUB before executing GPINT commands
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2104; i=lee@kernel.org;
- h=from:subject; bh=JsMaTO42uLqkqpygGDZUV4kvlHtiLoaELIsFXvpe+fY=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBmAwrPTh/XctctmU7uwETnJUVPOY58xpmI41Aoz
- mbTdspWezqJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZgMKzwAKCRBRr4ovh/x3
- YXS8EACHx0s1y/OL6GLbuz14uf2rKk4lefYLvVyPlnRRnRxArZlLU1LHo41yynjpm7LGjI32MTf
- Vhm0/jMHCXFcYzkKid7tGtalcT9LCKuHN+PD1ykekNPAV7JaLJbgqiVEqv6cclYOHdQTUPO0kjy
- EWrD8afQNGWQ0oZOMv0VRFDkfOopRXWwKGAmXd6R11QD7eYlXXMS3SbnEz5hY4iCzkKH5tvtXpx
- ws6sdhthOpVNKrIb2SDEoAU4qYNu3D6L8F77ff5btiOL3XcQCnPWvP/kLs21FRzZwFm530Nxjft
- A4nKHiNnVcUJJMVOa3sxFnYPLuiRFjIhb18bkZzhFGX+c7I80+gZizahTxJkNWsnWr61F3ZAVKy
- S2KpzAv7n2xRzC2CXqDRv4VK0mskpObjYv1DQSdLiPS2iT9BrnFJLNDHN5z5u8agjL2PhBYa1KB
- 4SzGMUjpRupfRFHindBvQvDc24iNGlMemRKKzBxB8wQ/Gs9E8+uI88UWduEqmDIZbPw9fJEMV6t
- WDVSP2yIDn+rTBxp1nS6lIrjdzr7dBkjt18k5VuJzu07ivPEgtI46lJ/XXB+IN+2bhPGhJo4cEy
- nVbtRUc3Y+9kQOoEKA9xAdl07qun+ucwPw4B9SdfvMLKbiQoJhkbwhs+4xavgHgK9h9PZhs1zp9
- EwGw9euRmPKweYg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
diff --git a/cve/published/2023/CVE-2023-52625.mbox b/cve/published/2023/CVE-2023-52625.mbox
index 8f238d29..9297a385 100644
--- a/cve/published/2023/CVE-2023-52625.mbox
+++ b/cve/published/2023/CVE-2023-52625.mbox
@@ -1,24 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52625: drm/amd/display: Refactor DMCUB enter/exit idle interface
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2908; i=lee@kernel.org;
- h=from:subject; bh=dYQuEgf/y2ZX5GMC2xyK/I+FRLR6a3Rzv1UaPtbrZCM=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBmAwrQ7Ra9/z7IBROjG02wb/G/kuYqsFpwbmJL8
- GyPx7PmyMiJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZgMK0AAKCRBRr4ovh/x3
- YZSdD/9uwipBJFi+vIdSrsgc6ITGqChyQPSgnhFHEQeFiHTDaK92B1YuJvJ1sr3TQDePBxqJ7E8
- Wqjrso+Z4Hnt6baYqUnnlKYmok5cgbLBpUU305c06GYcPbtyF6sZSMxMHn73uRMVlJvanTlwI+Y
- dp+3PC4/6+XQQIj3epWrZ0gCxHszo9RaO7wj54j3kcqd9f/Wt+VS6nAsyQyRbwgq9r4hS4O54C7
- 2I2H0yi7/RSezTyUr+AkpoS4vP5oFAvfuv06TTFEAavw/R52QsIbGuYOmpXHphkwyFOI5Qxf7OL
- /mV/AbaIoQ++7LPLLI2xrBbf6LS0F1oO9BwJaAZXBvyncutKNBnN4FpB0oLtGJ4tGTQc/ygI07S
- nhjIRZl+P34n5SVWPoMtrHdUt093xAM51aSqMHCmSTCg/d7NnlqFs1dWtoJ78Gj1aPm+b3eYUMM
- yzTq3EfJfyeniHvZgIGeKjVf+QvhyHIxL8rO8CibEZgkehMuOmCI1FTn/UYsXPjFbNq8EYJKQmf
- UCpzxV+PjbKIQsWRGvxjJWI36Qr2DfbTP7fTSAg6kBMUZ0ymVXRPdKLgpDQFm8jITda4YhglsDD
- K+hVd7WD5jtAcBw0434jmrXQ4oz2FnpInxgcEVR7oSJR1XDqSg+kmh/9H/MlaeTeiQXUay5H7GQ
- LzaTQ2Wlg5Tqgnw==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
diff --git a/cve/published/2023/CVE-2023-52627.mbox b/cve/published/2023/CVE-2023-52627.mbox
index 668ccda0..0b8472e7 100644
--- a/cve/published/2023/CVE-2023-52627.mbox
+++ b/cve/published/2023/CVE-2023-52627.mbox
@@ -1,24 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52627: iio: adc: ad7091r: Allow users to configure device events
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3340; i=lee@kernel.org;
- h=from:subject; bh=GVHFRUACekLQ1n+blhNzmzYBykaFN2ZgwFxEopG1RE0=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBmAwrQe8a/FNHdJtBr0ISjd7DK+FsxG68DDMZbJ
- 5e1xkAwn+iJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZgMK0AAKCRBRr4ovh/x3
- YUsZD/9xSYPHchpJdl1YNVRLFjGVzTKQEk3DOx/8QaKGYu02m8ZCaFLElZvmbvHQDLzog3mBOAM
- oyKK4EPnc3wFn2Q/ahu4L/JMNJVr+3ag4lU7LzmCQcknmXs6kq/5rrZ5eW/1uHOyPD/nEL5xzW9
- wX4RnIO5vhFSGwtkekZ8Qj4Xu7F0ciDr5wnoQEpjK4Yh5m80p0rPF7MNRX0/Lg4MLNgsO+PEPAK
- 4yuz+s8E150fde0HMQljFma9NqAvwyrcR9ZSUacCTf0J4nrqir+30YwqVaIgDFoNX2B0H8eXwjN
- tagOBP9+kGN7cyW6wBJZ1MYdhKBZ44h9YosODtOpWppRsv0cYguTXULdzgjySUEuMdGoguHLMAs
- OjY6z6cUTF4VP5K9cAY98RtHgUX27mEplLkL9TerJbx9DW4X5A6c7THosPaT3HKzQ/7OQ96AQJ+
- pXHy40UzGhTSXcZ57GLF2bqytLm8RCeq1lKGUx57t540a0AwvEqGqNK+3Xo+7iZIKsaRFT+0Vvy
- mcfBVJLT3ozY2Hnn0MMczkKCxG3yV0if3LJUQZ8CkM0WI6h4q10gOMGJQNf0Qk+2LQ34PTKDCfj
- tzYAKDydCLDmvQbJA+Yoe2ULonRgj115y0CB7mK7e6yCDpjtZUABR/liWACrofZAbladP8qjdsE
- g8T87A2wXRulEQA==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
diff --git a/cve/published/2023/CVE-2023-52629.mbox b/cve/published/2023/CVE-2023-52629.mbox
index 1512e749..957302a6 100644
--- a/cve/published/2023/CVE-2023-52629.mbox
+++ b/cve/published/2023/CVE-2023-52629.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52629: sh: push-switch: Reorder cleanup operations to avoid use-after-free bug
-Message-Id: <2024032949-CVE-2023-52629-a508@gregkh>
-Content-Length: 2487
-Lines: 64
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2552;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=qG2zCY46Uz7u/IJy2GTXiFsICC6dQw0wnp96YS8YgDg=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGlsbb6HfzwUmf3yv0nzpnuSwZ9dP19xd76bya2X6fVdX
- HSziHdzRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEwkWodhfpHT66Xy3RGWzj4t
- FTNC+Jcwem8IY1jQmNDvbyRf+MtKZlHM/0mvGPdwrtcBAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2023/CVE-2023-52630.mbox b/cve/published/2023/CVE-2023-52630.mbox
index 65fe9226..9809f6a8 100644
--- a/cve/published/2023/CVE-2023-52630.mbox
+++ b/cve/published/2023/CVE-2023-52630.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52630: blk-iocost: Fix an UBSAN shift-out-of-bounds warning
-Message-Id: <2024040219-CVE-2023-52630-a529@gregkh>
-Content-Length: 3426
-Lines: 82
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3509;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=U2UCkRhWXI8uGOirAijF7X2qtvkdkQNCChkkB67Spfw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncS6T/ZL7+c3r+rwXPeG3Wtz15oL9EY77sLSGfIB7x5
- 5wWpdv7OmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAibksZFhzd+v2vHleMgklj
- VpKANser1AOLfjLMlZpas3ip1GanwwET1nO58VlKtW1oAAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2023/CVE-2023-52631.mbox b/cve/published/2023/CVE-2023-52631.mbox
index af332303..3863694c 100644
--- a/cve/published/2023/CVE-2023-52631.mbox
+++ b/cve/published/2023/CVE-2023-52631.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52631: fs/ntfs3: Fix an NULL dereference bug
-Message-Id: <2024040222-CVE-2023-52631-ea7b@gregkh>
-Content-Length: 2458
-Lines: 58
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2517;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=WHR8kFbupkI7m+WQ4Upw6GX/OwueYXC19fp5smMegB0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncS+SuVwjUbg659GPOvmWGlp+6kk0Zzfp+LhA2tO2fx
- XQm7fiNjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjIbX+GeTqnF39Qn2fnFnFr
- ocWZ2jXTWxZNOcuwYJb0TQ/u3ywXgg2N92z7q33l8/lyRQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2023/CVE-2023-52632.mbox b/cve/published/2023/CVE-2023-52632.mbox
index e02a8298..50606a5a 100644
--- a/cve/published/2023/CVE-2023-52632.mbox
+++ b/cve/published/2023/CVE-2023-52632.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52632: drm/amdkfd: Fix lock dependency warning with srcu
-Message-Id: <2024040218-CVE-2023-52632-f7bb@gregkh>
-Content-Length: 4075
-Lines: 115
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4191;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=y5igWICpayZxCOpIPmHlYPObsKQAmppEDXh2g0AfMko=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncq/Kuc1071+Sx4nzyqYa3V7tn1Enm2Fismb3u/4P0l
- f5FCgcud8SyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBE6o0Y5qff+t2/sORvg/q1
- HdXrVxx89e8+VwjDXMm/U0+fLXEV/1kotflVB+c3Hnft9wA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2023/CVE-2023-52633.mbox b/cve/published/2023/CVE-2023-52633.mbox
index b26e980b..7bc50c85 100644
--- a/cve/published/2023/CVE-2023-52633.mbox
+++ b/cve/published/2023/CVE-2023-52633.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52633: um: time-travel: fix time corruption
-Message-Id: <2024040218-CVE-2023-52633-d020@gregkh>
-Content-Length: 2423
-Lines: 65
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2489;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=EoXv5onnkOaJNTTCbDFqha0JD+uPC++lnJKm5+U1m5A=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncq/KurM1v7Cnk+Xsoj01zZv+WXyn/Gr5NeMi9Z2L90
- Xm5/v+rO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiT1gY5udl1QeePLp/j6tB
- 1YYZ/3Ilo657JTPMj3+sv7Iu6pXJDgm32S8SO2cslHnTCgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2023/CVE-2023-52634.mbox b/cve/published/2023/CVE-2023-52634.mbox
index 9bb57383..d787f8c0 100644
--- a/cve/published/2023/CVE-2023-52634.mbox
+++ b/cve/published/2023/CVE-2023-52634.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52634: drm/amd/display: Fix disable_otg_wa logic
-Message-Id: <2024040219-CVE-2023-52634-27e0@gregkh>
-Content-Length: 1921
-Lines: 57
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1979;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=TrNO1YvQNGE2FZr+Sdcmlma8JHGt0mMBkB3RgaehlUI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncq/L53O8/U86c1K7LwsM3ba/+5rAj0zRd5q5MaD+rn
- diyrWRXRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzE5g7D/KC0tNd207YF5StO
- DI3af7Q2feOt8wzz1ApWvsrt+3ySzWZ1e7WxgMPPpun/AQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2023/CVE-2023-52635.mbox b/cve/published/2023/CVE-2023-52635.mbox
index fcf88e39..629ee1cc 100644
--- a/cve/published/2023/CVE-2023-52635.mbox
+++ b/cve/published/2023/CVE-2023-52635.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52635: PM / devfreq: Synchronize devfreq_monitor_[start/stop]
-Message-Id: <2024040219-CVE-2023-52635-8b18@gregkh>
-Content-Length: 6341
-Lines: 134
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6476;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=jqeEP/ACwkvHIqrxB7bgiw7iXvD9+DTLOtYAQzRT+P4=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncq/KP7370K0g45VyDm/wmfs/4kKwS9lltezUv5KvOC
- Jy13fJBRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEykhoFhNqvr4otbdLNXs57Z
- 2tUuMzndvTruCMOCLR/re1yfxU5fxcT2cO4a9mvlWy4XAgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2023/CVE-2023-52636.mbox b/cve/published/2023/CVE-2023-52636.mbox
index bd118d58..b58c106e 100644
--- a/cve/published/2023/CVE-2023-52636.mbox
+++ b/cve/published/2023/CVE-2023-52636.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52636: libceph: just wait for more data to be available on the socket
-Message-Id: <2024040249-CVE-2023-52636-d965@gregkh>
-Content-Length: 2895
-Lines: 71
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2967;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=PH0cTy+kzfUdeK79cCo6WuiGy7GtIIw05DhMRL59vfo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGnca2M9AhZz5E30mmFXo6vIcZ/JaNX9YzzvpOp3bvp/a
- 4HrnZD4jlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjIWleGOdwVnu8OyAY/jdz3
- 9IR2W9TkxB9/8xkW7ItQD2l0v55ufPBvC0uSu99r7wnqAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2023/CVE-2023-52637.mbox b/cve/published/2023/CVE-2023-52637.mbox
index 6f2d4e21..8636c506 100644
--- a/cve/published/2023/CVE-2023-52637.mbox
+++ b/cve/published/2023/CVE-2023-52637.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52637: can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)
-Message-Id: <2024040332-CVE-2023-52637-5e37@gregkh>
-Content-Length: 5946
-Lines: 157
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6104;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=drwxyR5l09P+zC/IvENCRzJDbYBTgots8YDpvP/S4pg=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uU8KvQ/odaf93LvGoPhDltmP/Ixj50yK9yyR/qCr0
- npg7cNnHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRtF8MC2ZtO6fiFTqvkmPe
- rz7NaZefLWFxP8Ewz8R8gU/w5AQmg6OXHUXsq/kPugcdAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2023/CVE-2023-52638.mbox b/cve/published/2023/CVE-2023-52638.mbox
index 1016d328..6ba70241 100644
--- a/cve/published/2023/CVE-2023-52638.mbox
+++ b/cve/published/2023/CVE-2023-52638.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52638: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock
-Message-Id: <2024040334-CVE-2023-52638-26a6@gregkh>
-Content-Length: 2907
-Lines: 76
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2984;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=gkQ0UmuHiDaOJnSfYH6Umbl3AjxnOr/SuyJdRvEz2Ho=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uc/Mv3y9mr3llnKfgPS0rBofL+EOH7FJlrotHbx6/
- IbVt+d0xLIwCDIxyIopsnzZxnN0f8UhRS9D29Mwc1iZQIYwcHEKwESSFRjmCmgoHa8+M+Vl8PzY
- H88SLLdqpxYJMyy4WbQyrebEDGmv7Cfe6VJF4R/cqngB
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2023/CVE-2023-52639.mbox b/cve/published/2023/CVE-2023-52639.mbox
index 2d0fae77..8c6dc988 100644
--- a/cve/published/2023/CVE-2023-52639.mbox
+++ b/cve/published/2023/CVE-2023-52639.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52639: KVM: s390: vsie: fix race during shadow creation
-Message-Id: <2024040335-CVE-2023-52639-5b67@gregkh>
-Content-Length: 2464
-Lines: 65
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2530;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=MbMvABrlGndc+tUjJJhGDg+CIIdTgH/+4NItTZJELa4=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uc833U3/9bDw+p8P8Qm8T7/YNMyvmHT6lXL8HJ+Es
- rfXLZIcO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiHzMYZrMtOnRIWLWddflG
- fRPHWw933rVi9WBYcL1g7nT+pJtKgtN15OdYMhze1PBUBgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2023/CVE-2023-52640.mbox b/cve/published/2023/CVE-2023-52640.mbox
index 82ac3892..993956da 100644
--- a/cve/published/2023/CVE-2023-52640.mbox
+++ b/cve/published/2023/CVE-2023-52640.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52640: fs/ntfs3: Fix oob in ntfs_listxattr
-Message-Id: <2024040355-CVE-2023-52640-2657@gregkh>
-Content-Length: 1873
-Lines: 53
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1927;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=1qC6iAU9Ykdd5hMfQ+sPMbCPoiz+MFsYjZfpea/Y6KE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k/y/+DsVcvKbx+x9N03aIO3Si7D3T29Pex7SavJq5
- 5ypgvNcO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiDrcYFhwXm/ToKmP7jofM
- 57pmXZ5ZWrlQvYxhnvZ/kdJ5V20dkh/rJyX1Bx1pvlw1DwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2023/CVE-2023-52641.mbox b/cve/published/2023/CVE-2023-52641.mbox
index 42c80cc3..bcb73a55 100644
--- a/cve/published/2023/CVE-2023-52641.mbox
+++ b/cve/published/2023/CVE-2023-52641.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2023-52641: fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()
-Message-Id: <2024040357-CVE-2023-52641-1c18@gregkh>
-Content-Length: 1963
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2018;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=RH83nE8THziEUTL/5CzphgTzJU5Dti9Pe7nO6jhe1Bo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8kwI3rk7n5QvVfturfmvZt4o1RgHJgvN3F88/sS2/a
- Zt3lmxzRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzEMYZhwbXO+6YFRa+8vvyP
- fPvn7lKvL0pztBgW7Ja89+lx83Z1pt+5atzLf1rMf712GwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26582.mbox b/cve/published/2024/CVE-2024-26582.mbox
index ba82e710..82465476 100644
--- a/cve/published/2024/CVE-2024-26582.mbox
+++ b/cve/published/2024/CVE-2024-26582.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -27,7 +27,7 @@ Affected and fixed versions
Issue introduced in 6.0 with commit fd31f3996af2 and fixed in 6.7.6 with commit 754c9bab77a1
Issue introduced in 6.0 with commit fd31f3996af2 and fixed in 6.8 with commit 32b55c5ff910
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26586.mbox b/cve/published/2024/CVE-2024-26586.mbox
index 1e75a531..c6936ff0 100644
--- a/cve/published/2024/CVE-2024-26586.mbox
+++ b/cve/published/2024/CVE-2024-26586.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -73,7 +73,7 @@ Affected and fixed versions
Issue introduced in 4.19 with commit c3ab435466d5 and fixed in 6.7.2 with commit a361c2c1da5d
Issue introduced in 4.19 with commit c3ab435466d5 and fixed in 6.8 with commit 483ae90d8f97
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26587.mbox b/cve/published/2024/CVE-2024-26587.mbox
index cf479639..acf5afe2 100644
--- a/cve/published/2024/CVE-2024-26587.mbox
+++ b/cve/published/2024/CVE-2024-26587.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -49,7 +49,7 @@ Affected and fixed versions
Issue introduced in 6.6 with commit b63e78fca889 and fixed in 6.7.2 with commit c5068e442eed
Issue introduced in 6.6 with commit b63e78fca889 and fixed in 6.8 with commit ea937f772083
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26589.mbox b/cve/published/2024/CVE-2024-26589.mbox
index d43cd972..e737444b 100644
--- a/cve/published/2024/CVE-2024-26589.mbox
+++ b/cve/published/2024/CVE-2024-26589.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -74,7 +74,7 @@ Affected and fixed versions
Issue introduced in 4.20 with commit d58e468b1112 and fixed in 6.7.2 with commit 1b500d5d6cec
Issue introduced in 4.20 with commit d58e468b1112 and fixed in 6.8 with commit 22c7fa171a02
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26592.mbox b/cve/published/2024/CVE-2024-26592.mbox
index bdbf06cb..d497a47c 100644
--- a/cve/published/2024/CVE-2024-26592.mbox
+++ b/cve/published/2024/CVE-2024-26592.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -27,7 +27,7 @@ Affected and fixed versions
Issue introduced in 5.15 with commit a848c4f15ab6 and fixed in 6.7.2 with commit 69d54650b751
Issue introduced in 5.15 with commit a848c4f15ab6 and fixed in 6.8 with commit 38d20c62903d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26593.mbox b/cve/published/2024/CVE-2024-26593.mbox
index a7845a74..5d33f8cb 100644
--- a/cve/published/2024/CVE-2024-26593.mbox
+++ b/cve/published/2024/CVE-2024-26593.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -33,7 +33,7 @@ Affected and fixed versions
Issue introduced in 5.3 with commit 315cd67c9453 and fixed in 6.7.6 with commit 609c7c1cc976
Issue introduced in 5.3 with commit 315cd67c9453 and fixed in 6.8 with commit c1c9d0f6f7f1
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26594.mbox b/cve/published/2024/CVE-2024-26594.mbox
index fde14526..d85142ff 100644
--- a/cve/published/2024/CVE-2024-26594.mbox
+++ b/cve/published/2024/CVE-2024-26594.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -26,7 +26,7 @@ Affected and fixed versions
Fixed in 6.7.2 with commit 5e6dfec95833
Fixed in 6.8 with commit 92e470163d96
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26595.mbox b/cve/published/2024/CVE-2024-26595.mbox
index e9b5ceff..81b54bc0 100644
--- a/cve/published/2024/CVE-2024-26595.mbox
+++ b/cve/published/2024/CVE-2024-26595.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -51,7 +51,7 @@ Affected and fixed versions
Issue introduced in 4.11 with commit 22a677661f56 and fixed in 6.7.2 with commit d0a1efe417c9
Issue introduced in 4.11 with commit 22a677661f56 and fixed in 6.8 with commit efeb7dfea8ee
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26596.mbox b/cve/published/2024/CVE-2024-26596.mbox
index 7fcf7fe1..1c5b2e29 100644
--- a/cve/published/2024/CVE-2024-26596.mbox
+++ b/cve/published/2024/CVE-2024-26596.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -62,7 +62,7 @@ Affected and fixed versions
Issue introduced in 6.1 with commit 4c3f80d22b2e and fixed in 6.7.2 with commit dbd909c20c11
Issue introduced in 6.1 with commit 4c3f80d22b2e and fixed in 6.8 with commit 844f104790bd
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26597.mbox b/cve/published/2024/CVE-2024-26597.mbox
index 899df700..59d8bf76 100644
--- a/cve/published/2024/CVE-2024-26597.mbox
+++ b/cve/published/2024/CVE-2024-26597.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -94,7 +94,7 @@ Affected and fixed versions
Issue introduced in 4.17 with commit 14452ca3b5ce and fixed in 6.7.2 with commit 17d06a5c44d8
Issue introduced in 4.17 with commit 14452ca3b5ce and fixed in 6.8 with commit b33fb5b801c6
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26598.mbox b/cve/published/2024/CVE-2024-26598.mbox
index e1e0db23..797b2f20 100644
--- a/cve/published/2024/CVE-2024-26598.mbox
+++ b/cve/published/2024/CVE-2024-26598.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -34,7 +34,7 @@ Affected and fixed versions
Fixed in 6.7.2 with commit dd3956a1b3dd
Fixed in 6.8 with commit ad362fe07fec
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26599.mbox b/cve/published/2024/CVE-2024-26599.mbox
index 26de243b..ef5d47b6 100644
--- a/cve/published/2024/CVE-2024-26599.mbox
+++ b/cve/published/2024/CVE-2024-26599.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -25,7 +25,7 @@ Affected and fixed versions
Issue introduced in 5.17 with commit 3ab7b6ac5d82 and fixed in 6.7.2 with commit bae45b7ebb31
Issue introduced in 5.17 with commit 3ab7b6ac5d82 and fixed in 6.8 with commit a297d07b9a1e
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26600.mbox b/cve/published/2024/CVE-2024-26600.mbox
index b5df2bf8..94b034ff 100644
--- a/cve/published/2024/CVE-2024-26600.mbox
+++ b/cve/published/2024/CVE-2024-26600.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -58,7 +58,7 @@ Affected and fixed versions
Issue introduced in 3.7 with commit 657b306a7bdf and fixed in 6.7.5 with commit 396e17af6761
Issue introduced in 3.7 with commit 657b306a7bdf and fixed in 6.8 with commit 7104ba0f1958
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26601.mbox b/cve/published/2024/CVE-2024-26601.mbox
index 3041e5e8..0030b8f0 100644
--- a/cve/published/2024/CVE-2024-26601.mbox
+++ b/cve/published/2024/CVE-2024-26601.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -30,7 +30,7 @@ Affected and fixed versions
Issue introduced in 5.11 with commit 6bd97bf273bd and fixed in 6.7.5 with commit 6b0d48647935
Issue introduced in 5.11 with commit 6bd97bf273bd and fixed in 6.8 with commit c9b528c35795
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26603.mbox b/cve/published/2024/CVE-2024-26603.mbox
index 2ffa5d31..fb458598 100644
--- a/cve/published/2024/CVE-2024-26603.mbox
+++ b/cve/published/2024/CVE-2024-26603.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -42,7 +42,7 @@ Affected and fixed versions
Issue introduced in 5.14 with commit fcb3635f5018 and fixed in 6.7.6 with commit 627e28cbb655
Issue introduced in 5.14 with commit fcb3635f5018 and fixed in 6.8 with commit d877550eaf2d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26604.mbox b/cve/published/2024/CVE-2024-26604.mbox
index c6f1dd42..8b3c4a58 100644
--- a/cve/published/2024/CVE-2024-26604.mbox
+++ b/cve/published/2024/CVE-2024-26604.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -26,7 +26,7 @@ Affected and fixed versions
Issue introduced in 6.6 with commit 1b28cb81dab7 and fixed in 6.7.6 with commit b746d52ce7bc
Issue introduced in 6.6 with commit 1b28cb81dab7 and fixed in 6.8 with commit 3ca8fbabcceb
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26606.mbox b/cve/published/2024/CVE-2024-26606.mbox
index a5532baf..466566ff 100644
--- a/cve/published/2024/CVE-2024-26606.mbox
+++ b/cve/published/2024/CVE-2024-26606.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -36,7 +36,7 @@ Affected and fixed versions
Issue introduced in 2.6.29 with commit 457b9a6f09f0 and fixed in 6.7.6 with commit 93b372c39c40
Issue introduced in 2.6.29 with commit 457b9a6f09f0 and fixed in 6.8 with commit 97830f3c3088
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26607.mbox b/cve/published/2024/CVE-2024-26607.mbox
index c161e1ba..10ebc186 100644
--- a/cve/published/2024/CVE-2024-26607.mbox
+++ b/cve/published/2024/CVE-2024-26607.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -71,7 +71,7 @@ Affected and fixed versions
Issue introduced in 5.0 with commit 21d808405fe4 and fixed in 6.7.3 with commit 2a4c6af7934a
Issue introduced in 5.0 with commit 21d808405fe4 and fixed in 6.8 with commit 08ac6f132dd7
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26608.mbox b/cve/published/2024/CVE-2024-26608.mbox
index a724e185..50898843 100644
--- a/cve/published/2024/CVE-2024-26608.mbox
+++ b/cve/published/2024/CVE-2024-26608.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -97,7 +97,7 @@ Affected and fixed versions
Issue introduced in 5.15 with commit 0626e6641f6b and fixed in 6.7.3 with commit 6993328a4cd6
Issue introduced in 5.15 with commit 0626e6641f6b and fixed in 6.8 with commit ebeae8adf89d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26610.mbox b/cve/published/2024/CVE-2024-26610.mbox
index 2b77bad8..8444096f 100644
--- a/cve/published/2024/CVE-2024-26610.mbox
+++ b/cve/published/2024/CVE-2024-26610.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -28,7 +28,7 @@ Affected and fixed versions
Issue introduced in 5.5 with commit cf29c5b66b9f and fixed in 6.7.3 with commit f32a81999d0b
Issue introduced in 5.5 with commit cf29c5b66b9f and fixed in 6.8 with commit cf4a0d840ecc
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26611.mbox b/cve/published/2024/CVE-2024-26611.mbox
index ad84e693..beab0297 100644
--- a/cve/published/2024/CVE-2024-26611.mbox
+++ b/cve/published/2024/CVE-2024-26611.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -82,7 +82,7 @@ Affected and fixed versions
Issue introduced in 6.6 with commit 24ea50127ecf and fixed in 6.7.3 with commit 5cd781f7216f
Issue introduced in 6.6 with commit 24ea50127ecf and fixed in 6.8 with commit c5114710c8ce
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26612.mbox b/cve/published/2024/CVE-2024-26612.mbox
index eb5fdf92..43b16dfc 100644
--- a/cve/published/2024/CVE-2024-26612.mbox
+++ b/cve/published/2024/CVE-2024-26612.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -25,7 +25,7 @@ Affected and fixed versions
Issue introduced in 5.17 with commit 9549332df4ed and fixed in 6.7.3 with commit 4200ad3e46ce
Issue introduced in 5.17 with commit 9549332df4ed and fixed in 6.8 with commit 3be0b3ed1d76
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26614.mbox b/cve/published/2024/CVE-2024-26614.mbox
index 34c76242..7826f0d2 100644
--- a/cve/published/2024/CVE-2024-26614.mbox
+++ b/cve/published/2024/CVE-2024-26614.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -107,7 +107,7 @@ Affected and fixed versions
Issue introduced in 3.7 with commit 168a8f58059a and fixed in 6.7.3 with commit 3982fe726a63
Issue introduced in 3.7 with commit 168a8f58059a and fixed in 6.8 with commit 198bc90e0e73
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26615.mbox b/cve/published/2024/CVE-2024-26615.mbox
index 3cdba771..7ae1c868 100644
--- a/cve/published/2024/CVE-2024-26615.mbox
+++ b/cve/published/2024/CVE-2024-26615.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -78,7 +78,7 @@ Affected and fixed versions
Issue introduced in 4.19 with commit 4b1b7d3b30a6 and fixed in 6.7.3 with commit 8f3f9186e5bb
Issue introduced in 4.19 with commit 4b1b7d3b30a6 and fixed in 6.8 with commit dbc153fd3c14
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26616.mbox b/cve/published/2024/CVE-2024-26616.mbox
index 6ccc8f5f..aec952ca 100644
--- a/cve/published/2024/CVE-2024-26616.mbox
+++ b/cve/published/2024/CVE-2024-26616.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -97,7 +97,7 @@ Affected and fixed versions
Issue introduced in 6.4 with commit e02ee89baa66 and fixed in 6.7.3 with commit 34de0f04684e
Issue introduced in 6.4 with commit e02ee89baa66 and fixed in 6.8 with commit f546c4282673
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26617.mbox b/cve/published/2024/CVE-2024-26617.mbox
index e84f3301..b3520b17 100644
--- a/cve/published/2024/CVE-2024-26617.mbox
+++ b/cve/published/2024/CVE-2024-26617.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -33,7 +33,7 @@ Affected and fixed versions
Issue introduced in 6.7 with commit 52526ca7fdb9 and fixed in 6.7.3 with commit 05509adf2979
Issue introduced in 6.7 with commit 52526ca7fdb9 and fixed in 6.8 with commit 4cccb6221cae
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26619.mbox b/cve/published/2024/CVE-2024-26619.mbox
index ed8f3fb5..55d5947f 100644
--- a/cve/published/2024/CVE-2024-26619.mbox
+++ b/cve/published/2024/CVE-2024-26619.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -22,7 +22,7 @@ Affected and fixed versions
Issue introduced in 6.7 with commit d8792a5734b0 and fixed in 6.7.3 with commit 2fa79badf4bf
Issue introduced in 6.7 with commit d8792a5734b0 and fixed in 6.8 with commit 78996eee79eb
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26620.mbox b/cve/published/2024/CVE-2024-26620.mbox
index 3b2e818a..2e082ac1 100644
--- a/cve/published/2024/CVE-2024-26620.mbox
+++ b/cve/published/2024/CVE-2024-26620.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -63,7 +63,7 @@ Affected and fixed versions
Issue introduced in 6.0 with commit 48cae940c31d and fixed in 6.7.3 with commit cdd134d56138
Issue introduced in 6.0 with commit 48cae940c31d and fixed in 6.8 with commit 850fb7fa8c68
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26621.mbox b/cve/published/2024/CVE-2024-26621.mbox
index 51a188ba..d1434eb1 100644
--- a/cve/published/2024/CVE-2024-26621.mbox
+++ b/cve/published/2024/CVE-2024-26621.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -31,7 +31,7 @@ Affected and fixed versions
Issue introduced in 5.18 with commit 1854bc6e2420 and fixed in 6.7.6 with commit 7432376c9133
Issue introduced in 5.18 with commit 1854bc6e2420 and fixed in 6.8 with commit 4ef9ad19e176
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26622.mbox b/cve/published/2024/CVE-2024-26622.mbox
index 767842ce..90bf6208 100644
--- a/cve/published/2024/CVE-2024-26622.mbox
+++ b/cve/published/2024/CVE-2024-26622.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -29,7 +29,7 @@ Affected and fixed versions
Issue introduced in 3.1 with commit bd03a3e4c9a9 and fixed in 6.7.9 with commit 6edefe1b6c29
Issue introduced in 3.1 with commit bd03a3e4c9a9 and fixed in 6.8 with commit 2f03fc340cac
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26623.mbox b/cve/published/2024/CVE-2024-26623.mbox
index 6d1b6f22..1128a42d 100644
--- a/cve/published/2024/CVE-2024-26623.mbox
+++ b/cve/published/2024/CVE-2024-26623.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -57,7 +57,7 @@ Affected and fixed versions
Issue introduced in 6.4 with commit 01ba61b55b20 and fixed in 6.7.4 with commit 5939feb63ea1
Issue introduced in 6.4 with commit 01ba61b55b20 and fixed in 6.8 with commit 7e82a8745b95
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26625.mbox b/cve/published/2024/CVE-2024-26625.mbox
index d97ce0ab..375a790a 100644
--- a/cve/published/2024/CVE-2024-26625.mbox
+++ b/cve/published/2024/CVE-2024-26625.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -193,7 +193,7 @@ Affected and fixed versions
Issue introduced in 2.6.35 with commit 43815482370c and fixed in 6.7.4 with commit 8e51f084b571
Issue introduced in 2.6.35 with commit 43815482370c and fixed in 6.8 with commit aa2b2eb39348
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26626.mbox b/cve/published/2024/CVE-2024-26626.mbox
index 5f816d16..0afdd575 100644
--- a/cve/published/2024/CVE-2024-26626.mbox
+++ b/cve/published/2024/CVE-2024-26626.mbox
@@ -1,19 +1,8 @@
-From bippy-4986f5686161 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26626: ipmr: fix kernel panic when forwarding mcast packets
-Message-Id: <2024030648-CVE-2024-26626-a910@gregkh>
-Content-Length: 7037
-Lines: 116
-X-Developer-Signature: v=1; a=openpgp-sha256; l=7154;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=/Oa7ILmEMdpANFvJMCxbr/8HLZq57j192fMKauXsPuw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDKkvBGUCmmdHZK+d0mVhn1R2ecm8u4acxbJzX88zljVjm
- TclgmVFRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzE+jjDghkfA9YIfQk8tuty
- rOzaWc0f/78M52VYMI+jPKoi6evN2+8f737izu0R+br0OAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -94,9 +83,8 @@ Affected and fixed versions
Issue introduced in 6.1.75 with commit f69365e3a7ca and fixed in 6.1.77 with commit d2f1b7fe74af
Issue introduced in 6.6.14 with commit 7b32e63f8814 and fixed in 6.6.16 with commit dcaafdba6c61
Issue introduced in 6.7.2 with commit 7d97858e21fb and fixed in 6.7.4 with commit 2e8c9ae40add
- Issue introduced in 6.8-rc1 with commit bb7403655b3c and fixed in 6.8-rc3 with commit e622502c310f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26627.mbox b/cve/published/2024/CVE-2024-26627.mbox
index 2df99ea7..6bacf1f0 100644
--- a/cve/published/2024/CVE-2024-26627.mbox
+++ b/cve/published/2024/CVE-2024-26627.mbox
@@ -1,4 +1,4 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
@@ -49,7 +49,7 @@ Affected and fixed versions
Issue introduced in 5.5 with commit 6eb045e092ef and fixed in 6.7.4 with commit 07e3ca0f17f5
Issue introduced in 5.5 with commit 6eb045e092ef and fixed in 6.8 with commit 4373534a9850
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26630.mbox b/cve/published/2024/CVE-2024-26630.mbox
index 22fd5163..8a49c8ed 100644
--- a/cve/published/2024/CVE-2024-26630.mbox
+++ b/cve/published/2024/CVE-2024-26630.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26630: mm: cachestat: fix folio read-after-free in cache walk
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2516; i=lee@kernel.org;
- h=from:subject; bh=Nur/8qCiB8FsaNtC7u0uLRtX+k4p13BEE5EAyGosZ9g=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl8ctN/eyqyl4C/SiCufgGyNP+Kny+huFomgbwm
- Kum9LFOJJ2JAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfHLTQAKCRBRr4ovh/x3
- YUjeD/9Yjt6Ld+r3+IHWpn94/+nSMnAq5cSRhTsUw8C0WCSoklbak8zFH/M2ryABhdF3hUfMnPd
- hoCXMsgE9FQWFKdDf2unxOZNb1h8kPdyHJRP8KVcU1+A9j3/whzmRT1RBEIAyXWURzftAEfztb2
- x9cAUpZU5iPOS7BO6+Crqzr297MgZkTSxNmLYoajBAI611vyKItSaVlKn1mGPaHNwYQYkyymGT9
- HGckm/R+IYkWRg69L2gbJlW9tH+Hd+PiQtOsy4u3tfTbdCsoFKBXlFUMS0dvbukr4BKsPBJ1Za9
- 57BSUPg4iaunQdkdE7Ue8mSnvFZgIt5qGFQy0C2ij3rcLA8TjxFqwc7HFpyUvpPS4y/8vVWEgt0
- Dp0kPcM7xkYb6g55RtIpOUT4rvxEsJtNzY1Jm+uFozTjTRBgw9On4GoazJ6hR/6dulzOYFnFmaM
- PpQmlUCRlUiqyOPVZxkH0NYgoQvCiBAYp/jsBq5/8XuDRksReouEXczSKTa3xsd5CApf/bJ2V8h
- FFCyHRHCJOtM1ldHIf2eGIbJgwKblcxF9V7O3Jnkgl7BdJ/PW850Be0ryUNNOQcRWkKpy1s6tDn
- DGgRgQWXIk1URNivS9Tw9/xDHpHfinXxN1WYx3m1O5uQEyAsnI7HSBitQWQ2GXIrAZ9UIzNUUpb
- xiBebYVoSp8xnsg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -51,7 +35,7 @@ Affected and fixed versions
Issue introduced in 6.5 with commit cf264e1329fb and fixed in 6.7.9 with commit fe7e008e0ce7
Issue introduced in 6.5 with commit cf264e1329fb and fixed in 6.8 with commit 3a75cb05d53f
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26631.mbox b/cve/published/2024/CVE-2024-26631.mbox
index e1e3920c..6785d007 100644
--- a/cve/published/2024/CVE-2024-26631.mbox
+++ b/cve/published/2024/CVE-2024-26631.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26631: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3855; i=lee@kernel.org;
- h=from:subject; bh=V6OOBA7k6o/GCzIvm17FtGsaf3B+dhTNWlBhzOdxjks=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BJ/knLFImgvq6u9G0Ej1c9xXShjRwF2nWEFt
- kAHh1GsjKGJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgSfwAKCRBRr4ovh/x3
- YeQ/D/4nKSEK8Iw1W/Rtb5Si1zQnwbioChJsqqPd5BIrvwCHKn6MiyaJwBnILOQY4+M4pdMWiwF
- EpIAvKZiSIOQZlTGm8mLNb/Hl0WBfYGjpFqWBjUo+hby+Rp+vZWKvEtYDmwO/LavyAedJEDkVUc
- zZs5DZj8nzWvm5Ky/IERuIsuJzuGrzcjuBip2wz+MNSNREuSXVJJNscumz0Zdvp2aP4k2eXnvqu
- l2gg5IL/PD+Phiw5vpYv0W3OOIV9QAu6f840hyB+Bt2hvbKrJ1B21hHnIglO/CvN5JCZRaaGHPf
- i89+56V3Wwx/NxkdwSGHtAyFJc9nydFFpQ3A2/j+86eocIz/8TfmHQpqFE/az+tRwqX/BFxfa3r
- SEi0FnDssECE8/bMJZixhI1xlnTocXAkN3HyXmmSBBbCXBAjmgIr6LGD4JjzjdEmfMSNbkVtNCX
- nq2Mn1XAmZocvUOOrfpBSio6/4viA9u7XMfl36Mq/r1CqnvN3r/14AXr8ZAA5OsaoK8W7XJu8zi
- /PGYaTWu1rFYI8knsncgL1H8yPY4upsW6ssOOYk/7jInqtnbviLHuKRJm24beNtCniv/4+pc8rd
- lSRDn/z6bUAx72RNxSLmIqfwozp18Io5NKbR6sTVXZFvni+yTJWr6RHhPbGPILp/TwTvvIg+YR4
- dWJSJ1kJbWn7Yzw==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -77,7 +61,7 @@ Affected and fixed versions
Issue introduced in 5.13 with commit 2d9a93b4902b and fixed in 6.7.2 with commit 3bb5849675ae
Issue introduced in 5.13 with commit 2d9a93b4902b and fixed in 6.8 with commit 2e7ef287f07c
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26632.mbox b/cve/published/2024/CVE-2024-26632.mbox
index 8333183e..a0f6090a 100644
--- a/cve/published/2024/CVE-2024-26632.mbox
+++ b/cve/published/2024/CVE-2024-26632.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26632: block: Fix iterating over an empty bio with bio_for_each_folio_all
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2233; i=lee@kernel.org;
- h=from:subject; bh=L1jzKvNZY/qdMYeugO3kL77oyIGE6tlaoLv5eHp6348=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BJ/3s6M+IqeG+3aA7oQZd4URa7g2KgN8Oi7e
- OWraWrnwJiJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgSfwAKCRBRr4ovh/x3
- YWc6D/9HfAK5iP/Veny+hh5AswD1eBAdNWRyxmGNPyCt1Qgi0kIwubhZl658iLS++j6vy4sxllA
- tFvg2/aAYSwJpoWuchtKEYdDtx6Zxhl3oBCcLlcQkJSA16KblAnkbq3VDE4YMH3yqt4LWOeI20n
- 6HWS2Ls0/D8yBxpr/UZ/Ex/bfpezX/S7oPGzGEByqAwK1x9AhFBeX2xhjFqVq21dn7PKUtOQVHK
- vKqgtV4QkcN6g0WuIANOLoGBsZ/d435u5iQzB+BV4WBCfwVXcyLvn7yB3i7xBorRX/cEKCvc6Pe
- NNG9Sov9+2A/o5zw4edgJsQr3ZRwDye9G6lYxVM/L/9YpOYfR0ZNjsXTC3+68veTdUQkz47Tgs5
- u5pWeCO+QhaC7fWLQe1DK3IHdibAkhPwt+yT0KUFcfl+8nWyef3Lx0VK96m5ukOdaoILxdAYvgV
- DW+R4WPcstBZ7V18IOIf8nwDx4Rq7j6APY4R2NdpNd1EvkiJV5faNOP6LZfhrsUCshoy+ftYysu
- OejUsZPlAJ5v4ZykyjzviPibi3cnMtf5bchanIm9SF0TZVJsyiZgKJ/z28IkBwg4OUSAUU1+Bo0
- YwRVRiN5p7Fl7yUv78ichXpMTiKLbyOLARfQLBItrajtcRUMfV434O6/I3Vd5EAUdRd/N4AGl+o
- 7LSgBpBpaWz6MTw==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -44,7 +28,7 @@ Affected and fixed versions
Issue introduced in 5.17 with commit 640d1930bef4 and fixed in 6.7.2 with commit ca3ede3f5893
Issue introduced in 5.17 with commit 640d1930bef4 and fixed in 6.8 with commit 7bed6f3d08b7
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26635.mbox b/cve/published/2024/CVE-2024-26635.mbox
index 76f6a784..ce99f221 100644
--- a/cve/published/2024/CVE-2024-26635.mbox
+++ b/cve/published/2024/CVE-2024-26635.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2.
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5100; i=lee@kernel.org;
- h=from:subject; bh=gU6nqW41Uop8Ie712h6bQSjVaTTdenqnYr/T91p/TIU=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BQjYpATKzX6eAEUSOUG8ry0mYhQzYbi8Qbw6
- DhoZfr72NCJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgUIwAKCRBRr4ovh/x3
- YWy+D/98ROAOdoF5oDlMPdSd+quWvYQ/3tgtLNAZxvLmMrcV+PJT316jRpIsgTVWdjIZbqtxWWL
- OvDgzzBjEoIW2PS8iGImwFGnSsPirTfG2wfz/w6xAgzrDd4lp/WZYyfzZnTTE8SAYmlkrKJunx5
- Fe7eYXnxt6cMe9rpoeGBN84KOxugzzh3CmThJG2YwsWRV5VZ7AllFmaL/oRvcED0sljSYoGDF4d
- pnGZQ5wlS6Rzyr9MLv+uXTazjnlLJ76l0LIkUog6vjB7vmCMyTlfLJB5XsTC6BMZ50zZJVAVdkb
- NAof5SD0X8yivZFH+KlAup36KP8xBh+cBzQePQYswthSSbgKhYZhADprJjxz83I797MoflAUt0N
- qam52zsaBlOmtBIJCgLGcBXJP2u0am4aJZNxIJ+Wb3X3FJ4zCpNXMirE1DYe7SpQxBKxrcn0zTW
- swpi2fIcToC3awp8GMYtDpXdSblglj1RGHZc82GrKZ5gBKB5FN9mggx1DNTbqhXGBF8pQ/4bpKa
- raNb8LvDEwHupax8tsIo6eCEyI9krXLhfFqY1ig2emq4YF+cjMdcq3CzE79qbGN3k2dzBZ7uOPr
- 7QyRMcc6rCo0AxSYCxs3thGcJ/HJuP4ZsR1fmF7cQk05HpW3HDZRgEHsRthLYclhOIC1SyroXQ2
- kQjpSkyj5BrP2Og==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -96,7 +80,7 @@ Affected and fixed versions
Issue introduced in 3.5 with commit 211ed865108e and fixed in 6.7.3 with commit df57fc2f2abf
Issue introduced in 3.5 with commit 211ed865108e and fixed in 6.8 with commit e3f9bed9bee2
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26636.mbox b/cve/published/2024/CVE-2024-26636.mbox
index e020b034..9755e40d 100644
--- a/cve/published/2024/CVE-2024-26636.mbox
+++ b/cve/published/2024/CVE-2024-26636.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6392; i=lee@kernel.org;
- h=from:subject; bh=9oQLmemMyMSDZhlIrFy7aMzRxWWw1mompIN4G7VADoE=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BQjlUe/WtVrDnHtnqmX9ZT5VTY3xpFKQdfgs
- GqHjVpDd7+JAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgUIwAKCRBRr4ovh/x3
- YfkAD/9M/wZ/wLK8gNXIrlWV9I8DsrBYwtcebAIdS4CJVGm77uWoTmMsrbODZWArBonzes53u7k
- lKjlkf7BnGW/RSBUldFXSdjWYpKxLAw2O6kHqehYReIhJJ5dW3r8zfaOw3QsAXBW9cFXuC5PsBH
- u1mo1T3VkImsmI+jsko3IsOumZDq7lmpSassfKOSROvuECTZGIAdilPhYHEi+6URJWPnxv2ulsr
- tVofJ+tzTn3iclO0b5suzaZEhHUtURuFVNEt3xAhtXsXIlrGnCDRxSZd9bReSjXeIv4/SZy94Nk
- LPKRf7MAVO1ZIdjdhk8IpLbrOpP+DrTvvTxdwaPX4ZUXZo5nszCpPDgvTWe9bsKuv5cB4PTlP4e
- xyRsMm+Jz2klJQtHCcKMRCPBO3BeR//e5rCS5bBYcNMFkVHXvow6TwjcyPvhFCQmbEMu0webH5s
- 3HEjmxNcpRjFH78sxCCu53P+r6TKnkkZZ1e2KhVvi6HbdR3g6lyjN3tku4k+oWVBBwXqZXg6Ja5
- yqt0/ouUl8IYQ40c0cJDaxVN2mt/yym8sqLFLlDnecYLgJH+sn1TEO4HsK34qVPgiPpgipJ6+em
- c0cm4dFh9O7QcGB4sAG02RThoovwTRrjHD8u58tlKkR0K/MUn5EqCmSPPqNwh+7sSkZABEboHtM
- bZ0kdyPxUnX71Hg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -115,7 +99,7 @@ Affected and fixed versions
Issue introduced in 2.6.12 with commit 1da177e4c3f4 and fixed in 6.7.3 with commit c451c008f563
Issue introduced in 2.6.12 with commit 1da177e4c3f4 and fixed in 6.8 with commit dad555c816a5
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26637.mbox b/cve/published/2024/CVE-2024-26637.mbox
index 62c03dff..81ee60cd 100644
--- a/cve/published/2024/CVE-2024-26637.mbox
+++ b/cve/published/2024/CVE-2024-26637.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26637: wifi: ath11k: rely on mac80211 debugfs handling for vif
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2041; i=lee@kernel.org;
- h=from:subject; bh=yeK0oL0BMQPns3xhVC/mWyaPD3Mbc4tfVxsdUA9gXzc=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BQjeZ9/daVDihmY1pQZYWCf44FrU4l0NGNX8
- xEqLkYEbd2JAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgUIwAKCRBRr4ovh/x3
- YVYOD/9eBaxerY/5GMlcfLVtCYV7a48qVKtBoVP2xWY8Kwv4EVPLXXo+rWVN1Ix75uZ2za4kzC4
- zZcyCk3leFGVqcfNqcx43/xGp/+cIHW49bywzKgOrIAegmMtQx14W6PRpr9PaEeAHJGKn2Vgon3
- xgn1zZk4NIMQDkdUUKWMXs5hi8Je7mURx2nMLBZVjhPbobg26XEybutJm/5dbUtLdd5c2Ni7nbP
- NDz7RK34qJaKOOtcwzqDsyr0Bo9whFx+TPc4XuGqPOlEwHnJ6LDlZSWWIksUs6V1b2Z63G/vvUZ
- UkguUxnDvp+lDx0/JOzCDBU8wOInez0JA6H6J7BPyNsdQ/Nslt4HqVedry3gUMWqc24yCvOX6gc
- 0jiNmbg96M11yBVwg7kgNZIfMYuLD56USQ/OIJW4lHus5gyqH4FzL9mppmgDStAMAHaNmuFu/Ra
- FeQcvD9P+n6EKL1IcCamXEJMT40MAVoffbhxFMpRi97psJBzZsNRFUkwQsWU0/v1aqAlxiHrurx
- 4VFhs9dsd9BTtC/TRz5KzbVYPtCeGSq3DPBczUInaQ1K7or6s61mn6ETaVTCIvki+nDUVFXjRab
- jlSccOgMo59BOstnYeD+AdQXwj3SAZWgixad0ZMJTPIN5nag7YGUNA7RumPRv6TZrJ8yOjtzgzs
- n7Pmb2CZsVHJJFg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -41,7 +25,7 @@ Affected and fixed versions
Issue introduced in 6.7 with commit 0a3d898ee9a8 and fixed in 6.7.3 with commit aa74ce30a8a4
Issue introduced in 6.7 with commit 0a3d898ee9a8 and fixed in 6.8 with commit 556857aa1d08
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26638.mbox b/cve/published/2024/CVE-2024-26638.mbox
index 972cd17f..bd122032 100644
--- a/cve/published/2024/CVE-2024-26638.mbox
+++ b/cve/published/2024/CVE-2024-26638.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26638: nbd: always initialize struct msghdr completely
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3318; i=lee@kernel.org;
- h=from:subject; bh=U4gkFWUjebCUM/Nm19ryRjUcEKFnDMHVG/1Roi3qH6Y=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BQjzHS0eB88JAYhHyeRuYKpH2CUjQh7n9CYg
- D2umZNc33mJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgUIwAKCRBRr4ovh/x3
- YaY+EACNH2oLaLB5ZISdpwWxeoOjndNOL8W/CWFR9qUkuZF4cb+N4k7VSNdD7Tw8uGGYcpKnRk+
- 3iPsW6O9nlQzfOcd9cfuDvAr5+B2igseCDtabixZ48/B3ntNi2ZaCqTWzXmEfQgk3MkJPRXCRgo
- of2F6uILldYGV4F+eeQJHZ+8yDMbxzhjdbeZUORf+TxhZXzRgHF2Q1xjf+BqG01S8a9ogupp28b
- KTwZAudFuL9qDWou1ecQr8QxisICwL77/Ap9djSBCvgo5sKFNLJWYl5+1dzdngi5ZT02fn1aEtP
- KnM3FUxAaavXMmXuZ5j+GtkTCBC6z89GEbidsOMke8he3Iwto7ckgJycrR2BUlQxo7+ddIGiw0z
- WzVGGL9BWlRVE958qsC0eOGL7QObmf4AnAiMu5STmZ3iDRfHBUrmrDgKEfdiK4d0X8O3sBbzJh9
- 9MhOFERzMQcK8e/3mBJigUxO2uoA96Skku6R7I099pelHiwPcod+BAmgtp4p541C18pnNFHzvNU
- k2PAMLhwseaT166tFOxXceA7L329IpUW2bvkFo2mtMfsGthL5XhLHkL1RYKIj/OpNjn/8zYBzAG
- tFokeOBqvY8BNlNT8C8hRY9X0WBFUVNth9XJlTVC2i2NfLb5SYGyyugr8ADq+O5wtm8NXaGcl3z
- P5PoAaqbeoCE+6Q==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -68,7 +52,7 @@ Affected and fixed versions
Issue introduced in 5.19 with commit f94fd25cb0aa and fixed in 6.7.3 with commit b0028f333420
Issue introduced in 5.19 with commit f94fd25cb0aa and fixed in 6.8 with commit 78fbb92af27d
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26640.mbox b/cve/published/2024/CVE-2024-26640.mbox
index 2853cf28..3ff98838 100644
--- a/cve/published/2024/CVE-2024-26640.mbox
+++ b/cve/published/2024/CVE-2024-26640.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26640: tcp: add sanity checks to rx zerocopy
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3411; i=lee@kernel.org;
- h=from:subject; bh=Ep45lsUhqP4kXgKdIDZGkV5mwmPdkD9tz9LA898tcY8=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BWdF7YZABLD9ZSBu/cCihpz/udK3AWVuWFvy
- I+oYdHD37uJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgVnQAKCRBRr4ovh/x3
- YRcZEACHZ8VCklP0i2BqDjH6dl9d09gZHrBgRcWE2BOPYLE8JyQHKRiq/knwO0RweP0aRmHLiVx
- Ru+PFLOgQo/yRBnsPVwqV5LNYSaDYBUYeemZrQSqoI017a3iUurZ92HYP3b1PZbl0Ia534E36aQ
- fz7lhp+X4Es0EHtIovDj4aPk2qcy58OdVLMfKsaemt63HNeYF4OvTADTQRZIRYUaDCGdD8Q2cJF
- wKjhJkBi1iu7/sYBeGcEnccN50HBfjm8nJOSshTwuINuiFrdUgaadsz7Xo54d4ChTtPO2ktLqNF
- CrJ+xUZtwD8GolL10bd2EcRRp+YfxoG82I5jlvQS++q+3k1XsRCPD9q0GYEX4h+vLuKvkG/Bryt
- 685dReKTV42Tw9jl6Y9Qpn+GlDCbqwMy9KSGT85dilprYlcpGYKo/y1umvJf9VoUKnzHasSGnKk
- kXhwLiAiCAX4kLAxom7z/dbfcQSXCRnzbF0HJ41FhMJ6/t7zJce4jLMen5+0WLRufgql1phiWf7
- 2OUq1cY+kJ5mje7B1sI+vLWVNa37GjZwT1B/yvzUKiDAkN77DXSKYzxSChGu8Q9xKkE6yi/tccK
- J1Y7mutiAu2JW06HayCkM4mpWDrORVKSc/mEeHc9D/dtw1BtgoGTG3ZwDXpcQds2GBXgcmZRKgy
- D7tszaHrO/FKDAA==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -68,7 +52,7 @@ Affected and fixed versions
Issue introduced in 4.18 with commit 93ab6cc69162 and fixed in 6.7.4 with commit 1b8adcc0e2c5
Issue introduced in 4.18 with commit 93ab6cc69162 and fixed in 6.8 with commit 577e4432f3ac
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26641.mbox b/cve/published/2024/CVE-2024-26641.mbox
index 83450f9a..44312811 100644
--- a/cve/published/2024/CVE-2024-26641.mbox
+++ b/cve/published/2024/CVE-2024-26641.mbox
@@ -1,24 +1,8 @@
-From bippy-8df59b4913de Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5788; i=lee@kernel.org;
- h=from:subject; bh=DgwyN4eN0uFy8nT4odbHe71DHvwxz2qbbncxs5ukJO4=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBl+BWdTJ4k9xq0/3eDmN+TPVRm4CNxJXA1j7SnX
- PkiSzds4zCJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZfgVnQAKCRBRr4ovh/x3
- YcFZD/sFQv3C4d4V5rdAm2aWTNB0eyfH2Zm58nIVvvoF667AeUm96WKl4+W0zvyQKYLNU7x2ypX
- SJCCwrFzf8Uxijx28D5GPDx9m8KmXv1xL9Zro0SZsysy/Nu7KwdhiheOh1oiWdKocCbrzBeekSL
- uzZhqOLxBavveMojdVYSSs8POSBwp/tzUqbAQQ1QeoLhN/2ZIdy69cVZuDtj60j16UeHmdCcsHJ
- caTJ3UTWhf7bdz6V0v/lUWuIX852G7VlctFf1r0YltsQElTY2yUmeiUPCNE1MY0rLH7zTxMaeS+
- NUodirOsn1zFYqSUmDGCDS0Yq6m92S/45TuspkvHGaWlFJpdlv5GM1qGcjCW53aqeeu+a8yjMXz
- pUvozYHSgYALVSlJOrWea/9ASgfEaPuhDnws+YspJcT38fSaNXQD1GCUaGlSO7BsUE0ftNI4fxA
- Z3KdUFcCvJS+jMFicLa9W/HMQLQzsnVgIOT8xQG3ZHYCa0haaOuUyNHUcXRmw5nT9bBZ84FAU3F
- bpteHKUt01uJB/rjvoAZFaqafdIbD1JwllhM8NMnfV1N2Am9QRJK7cJQwWBzoiiSGyIaH8vmtcq
- NrKiwzGvvwb25razgPej+SIf2IrDEEoceBhE8VkJR6ND4Rr1xxEhjcCOgbYhXxdBencSAucxDSp
- GkdiRsP+NibjYEg==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
@@ -109,7 +93,7 @@ Affected and fixed versions
Issue introduced in 4.7 with commit 0d3c703a9d17 and fixed in 6.7.4 with commit c835df3bcc14
Issue introduced in 4.7 with commit 0d3c703a9d17 and fixed in 6.8 with commit 8d975c15c0cd
-Please see https://www.kernel.org or a full list of currently supported
+Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
diff --git a/cve/published/2024/CVE-2024-26644.mbox b/cve/published/2024/CVE-2024-26644.mbox
index 90dba76b..fd5ab57d 100644
--- a/cve/published/2024/CVE-2024-26644.mbox
+++ b/cve/published/2024/CVE-2024-26644.mbox
@@ -1,24 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26644: btrfs: don't abort filesystem when attempting to snapshot deleted subvolume
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5463; i=lee@kernel.org;
- h=from:subject; bh=JymWCPslXuQRESq/5LoUWlv7CMuPNt2Fle58Sl39eSs=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBmAucDPoQ9de2l98T+u+ZpCJyqmorKXp8T+pX9V
- I2VrrUV9tqJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZgLnAwAKCRBRr4ovh/x3
- YTA0D/9xsMTDKrK7QbDwPwIFFZ5xTWFLomPK0mP9Qbup/6LAd8mjMekJXlyKzodetyhZ3aPyW4c
- 0/nUr1OIGfaFLyCh37SBKYIgZOv2dsh01glSOKvysopSqxEIjC2/hEP4j6uYU31zsCu4/WC09RY
- 5CfVh5g9/tIaIg5jdFGJgeBDKDGCwNnKX+yKG2xODi0Vv4VRAx8ZEOu8bvtN258/M6rtm96YcaO
- yKi2rcKcVBWZIUuR663BOuVu7kcgskBlr1fhlr39lqxcNgcBOEWUIl/xVGaAOxilXKpX4Xpjvbq
- LNuunhYXDVykRnRePZJY9ddXgfNFh4Z1rqS6a2D3c4lpY/iy/zTeNQMk0+WZZHhw1/nRYgzJPtu
- p25TJGGl7T8uKeljSSbQi4liNC5Nm1zS4z248TSRNcpN1/o0w+HybDlljBcVhe6MW2MJ006pwp0
- VEofI/C5+iCldeOEGjgKYuu9t3D5mI5l/wT3usO7VQOzL809kWfRUUu9oKNOKfZraItAw/qpwaZ
- SJBlipxrjooodmGpXuhwV4fOteiQklYFT2IgUj8u2lNrfsgiV0OoWQJxuhUpwQbO/yFP/0q9/iP
- lMBjUws1x0S4IFrWZ506pIYNbz3CZXyfslQ6I1mTmZQUNapqGpzgBtPC0C+lghlmTo+yQZccPbD
- GGvWPUcX8aDMS0g==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
diff --git a/cve/published/2024/CVE-2024-26645.mbox b/cve/published/2024/CVE-2024-26645.mbox
index 11bb4a09..f14e13cd 100644
--- a/cve/published/2024/CVE-2024-26645.mbox
+++ b/cve/published/2024/CVE-2024-26645.mbox
@@ -1,24 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26645: tracing: Ensure visibility when inserting an element into tracing_map
-X-Developer-Signature: v=1; a=openpgp-sha256; l=7520; i=lee@kernel.org;
- h=from:subject; bh=a+3dnnizi/bZaanOrjbnycqrAbz2RXZy1SbtMMMTqXY=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBmAucDcGzne8u2bXj2ZfeB6e9GO8vL+11EZXFi2
- 8y0zI7byTGJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZgLnAwAKCRBRr4ovh/x3
- YdBaEACEt5i4xuC4gFiWtgi/H9nbG0vtD6jMEGONpqzsdHOEvLaXLzAzgSCveNmBGVGyn3mlBka
- xEA7FVXC7yFbbT6jmCzPMLEOw+t9PbTBw2bndkAFOkMENmWFkl43N/x9zO6FBkIF2GsjN33V+ky
- 7Cgss2mKW/94bxcmSvhJDv1d3gkzB+OPNEfBWLT9LBnAUs+nTgKvKA44IXYFhTzwD96b6FvKRMg
- 5bWkuzClLSSUaNw2TxuDBtkj0IQu1pHhUVQ448og7c9wPrCp2LiMYDtsNH+HayoKlEjyigaNNC0
- 99GZ7iqNbtJw902yhVXy7qsFUIdhtjo3i8qKvekkIWohHXpZ2vpGE9q5lapYbNW7WaNojk3mH8i
- 8zUzV85j+z9BJSREsKBxuuj5xsVtC7MPwZxbLWnHsApWmaTZNieT2JcpPDNqrxMP7yjQ3T6gegq
- 3QBqxmp9b9lq+1NIHRMeTczohENSDIv1hwFCfxQojscbUeUYfvsbriWtzyCCynUwY95tgqwCJqx
- s5r4XzqudxxKB98+Yld3viZN1Z5lXzrjCU01f1MXAgVFcKP0Q7H9ROiLcrueY4EFBjvW//+BE4n
- c3uyUsV6cimp0PGH9aVayAxO47X6y6F0EJ/j3tqHAwvxogrJNkStJ/8xAvADn6sMoX+q3w/lXHg
- m8k0jaO7CyButqA==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
diff --git a/cve/published/2024/CVE-2024-26646.mbox b/cve/published/2024/CVE-2024-26646.mbox
index 55ecec4c..3988d3ee 100644
--- a/cve/published/2024/CVE-2024-26646.mbox
+++ b/cve/published/2024/CVE-2024-26646.mbox
@@ -1,24 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26646: thermal: intel: hfi: Add syscore callbacks for system-wide PM
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3135; i=lee@kernel.org;
- h=from:subject; bh=oA4bc/E0m4HTaPz24rFBP1w/Mc+E/Zzm1ZHqPAZGcsE=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBmAwrQwAyQArSh4ctH2w8ioVJjV/wkEX1NPtuXF
- BlQkjz0YIOJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZgMK0AAKCRBRr4ovh/x3
- YZdAEACewGAwNmgcIZJqsI8oZ1N9QJuj/BSTGjniRmc8boiuKVgoO71TKFN0OSDIV2tbdrr0kmY
- 7P+iqykIbSNDlqNInQ9y03zEAaOQ8k0ARzptWKbJOEYbSXAedDVrzQSBXMXa4s6sTFUi8uxvC+w
- tdOWIaWkDdORs9Wl4aX6q6XpXM6N0Ru4qI/hCCJ+MEClAPIA/WoKuF7w+hKsgNM+dLVxtjKMkpT
- kfn6r7dSo6ASHHn5pfswEsj0SvDVAS5vlYovJIE2LSVctKRNpihNDzUQPIeyqJJuaVY1pdZeqfO
- I/iDpONR0Ns1RPGXS2r8BpDcQSbNc2/mOGvG2cTCtSoy8cqFk4g1TQMxNtCY4W2jmBgLFjgqyvb
- oZevCxG9sVQPctwPmvi0LueHkqejqzPynkavCiOerjquinaiaiOltQjJG5pLyqvOh8TrvBjHCm7
- vYiE6urz4vyVN17upBH/bz6QbMgibVJllztRnBYxgSqLN23NKqPT7m/5l06hABIhHJ3KMTSPVuz
- /IHQ2e5mwhZxoXGpQE5HqZEQunDMQX2gJzF52mM7/sA3j2EHK+27t+2j5DgJhc0OSWH3+UnnHqf
- XLoN7ujQgx2KQhipUnxTSPLtPydz0ffQOkLeAzOJL52HkbcJLTbhtSZqiidjyr0skh7p8rw8d1/
- Pd9rBmzkwdR/4HA==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
diff --git a/cve/published/2024/CVE-2024-26647.mbox b/cve/published/2024/CVE-2024-26647.mbox
index 7dab7207..21f5155a 100644
--- a/cve/published/2024/CVE-2024-26647.mbox
+++ b/cve/published/2024/CVE-2024-26647.mbox
@@ -1,24 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26647: drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2041; i=lee@kernel.org;
- h=from:subject; bh=I9dQFRaQ1vvUJbTTevm54HcE8oipvu6J805l0qMCasY=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBmAwrQDdSalcYUqsDSa7LMiGsCyrdwYMQWtIY4j
- +fmLIJ1LT+JAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZgMK0AAKCRBRr4ovh/x3
- YeOLD/9229yRqqSV16JqQR3u4VGs4StuU3+Zf7NCH+me0vBb7dhY7Y68ofRnvXj4PdCeMFPs0Bj
- ESFyV6dnbrRbovveyNX2K61ktsJXmAidK5QcjOjLxfiOz8tbyp3jIYy1SCuop5ntwfNRAGK6031
- Mj4XEIygo6RGObfNQeELzjA0hWhBtEhB5pkvlDmLj+R6gnMMWbBSjlHpOQmkmC7RCDRaMuYJGrI
- RtpakCJ5RPcpHZArN2NJQxQ7N5bd1p7TNCjxRIbt7jm3uCOvr9MbDjaf9bnUqCNnczuLMdC9WlL
- +JeDGcYSIY0exSoHSmUK0elJsrYzWb0ZxpXtBgBk4xDBW+DM03MwfB7zDnYIh/vZSmlBUs4J1F1
- FEaaPIsF3coh0f5cvFJsjEBGQNd2cfGJ31MW4mkrZkL4dKAwn+mzEov8XBYI6pk/xqWe10OID7a
- cwcpQ519QMqCmBBbIrl9FBZx/8vOlEJaRECcY89jiR9oH6lnduFUn05qztV5Ffh1VCLFCQElRjE
- M+toA1MBRbJswHBSQqDzGVRtrua8akYVrAncOF1BA/BdloU7Je1m59oIKWKUBjxVz5HuW2m0HfY
- ESp9DKB2DbjAADW3FtDb0eiHgRsaVuB75HsBuZr1MSzGUw3adJElGIy1UFlDkz6xgOiOwMNfpse
- QUx6i6e/zRF1RoA==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
diff --git a/cve/published/2024/CVE-2024-26648.mbox b/cve/published/2024/CVE-2024-26648.mbox
index b2134cb7..4b03c194 100644
--- a/cve/published/2024/CVE-2024-26648.mbox
+++ b/cve/published/2024/CVE-2024-26648.mbox
@@ -1,24 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26648: drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2055; i=lee@kernel.org;
- h=from:subject; bh=Y+NF9qNwkMiyufF4h9XJ2F7yhL+Bg6/qMAz8C2cFXAA=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBmAwrQbkO5VYgsPihLyoQeDDFa6YJ8/p7AFdLrk
- wLc7weDdJqJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZgMK0AAKCRBRr4ovh/x3
- YZEtD/9lsqRpNlh0QYqP5HEjg70JbWreQCzL43ZbjYHx706zc5IfDh+CAlz3PM6npFB4ZxaxnJ+
- zPjxeErZB3rdbjSV5qqAgE1Jrg4g4w6b6nSpjFrUvV3SBm/mtL2XRZkTjWAdWvJKpHbBLutch6W
- tKCdWqcYF/Ipt0x4isZkwnOn6+E5cmOU3o14g/CflXRmIYmwYZOwuE8eXM9o4hYTUWeg2aszqKm
- RZ0NCEa+VAUukgbWINubBEBv/W23/tMT4poiIESROIVXT4ahR3lwKYkImpExdXKYQgaY/KChbUg
- KnzPz3xuR3dyknH6q3dHnP8tJH39Ij/xbxbZzWrBRjSD1C3wIuLVUwzL89mjaueCmvzQqkLj0rm
- zQVZkewOJ5qtZfSb2WRPNPDlIbu39lzNiS3yx6Z/PHLn0FPM8P30mPHjzj2Dd+knUEWLooTZI7L
- qFBNaMxAjEBYyyPLYyuv6CR4d2MGDA7TiTwP1D+ARinSPTzZgQC0DRrnJL/KZeFjXs1BKPfkQiZ
- AGEY1p5AcqBDl0EBIEhwHnJ/7Jw5ZTyOJm4tLjxQIrK9bProGW92Yzmja0bclfqjX8JuhVWEE9n
- xcTLZVmIYvw28pHaLttuYBeMCW2pY2uq0jjYX72FHWlKf0s6BWIyHoY/OMawOGW+xtr869tUsv5
- /WUk/cbdY3D0AZA==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
diff --git a/cve/published/2024/CVE-2024-26649.mbox b/cve/published/2024/CVE-2024-26649.mbox
index 78c40126..7f4831ea 100644
--- a/cve/published/2024/CVE-2024-26649.mbox
+++ b/cve/published/2024/CVE-2024-26649.mbox
@@ -1,24 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26649: drm/amdgpu: Fix the null pointer when load rlc firmware
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2057; i=lee@kernel.org;
- h=from:subject; bh=NZ/ngD5lsedWlTTxVtHoNpA6KPBt2DMGRMsmUBCoCaw=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBmAwrQPQQ5ihB3AbR5fQQUVsNhhq7oTOJ8wEv4H
- xHiJsL097aJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZgMK0AAKCRBRr4ovh/x3
- YSMyD/9cQo9QvcDR4RUSFLKzZ5MlTOFwNDl9YKghn2AAL66gUiqXSajggjgWhtTMSLrp48cIJuj
- uskkN9AHwPg/JAT1AUb89dglDVexJxhof18mpE4V+SrqEV5N0C5WWSYDQXXZJeydXUzoxKgO/D/
- uNUVu4kwu9rPcoiN0yDgU9X1+Z+hR+GFwsph3LIkypEvPLZLhpYosCIjhgq+ZPrwaXiHuhjKljy
- ngLR0eCcGpmrLkDHPCjjW57fbmIKPgw6ZdbSi1ptaFcO8HL94hwEmsAfONEhaG7sQcuAI8SnuYO
- zy+3q7OfsU+JjGKY8tLOh7VJV0VeqpGGazWwvjYlKUMDzlX5KToAT7cDfZ9CdAjelWn51XgjKWP
- p1+LvVkfcTi2s2D2xiQDwof7SHy5aDsQo9qQCgIj2x24y6yXLACkDLYDhpvVUTgaprYl7l8e972
- hkBfZmbtn5PRdq+cA5OOVBC5PoAT6QE81qJkhi947QWGualCd9eepQ5ngDOGXp/WP4vuMUJ/czH
- mgAz9RjJSpNeLpraheV9qhkTJqZkINuge7kpFc9HgIclRKoDN43bwUZDG8ftR9t0yQ+qo0XsdTJ
- 3izEW9FZWoGWX1nNxFf4m6GLqISgV2VI3vItUVq2++hvcLpU94D2hevEhnlfUH6dnxyoJBiAiZp
- 8rCc47JiN0ip3DQ==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
diff --git a/cve/published/2024/CVE-2024-26650.mbox b/cve/published/2024/CVE-2024-26650.mbox
index f801592c..3d488a31 100644
--- a/cve/published/2024/CVE-2024-26650.mbox
+++ b/cve/published/2024/CVE-2024-26650.mbox
@@ -1,24 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
-From: Lee Jones <lee@kernel.org>
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26650: platform/x86: p2sb: Allow p2sb_bar() calls during PCI device probe
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2990; i=lee@kernel.org;
- h=from:subject; bh=ZoKbYWm5bX1ZCe2YMdYmfU3qGnYQ0X+RBmAIp/PO4vQ=;
- b=owEBbQKS/ZANAwAKAVGvii+H/HdhAcsmYgBmAwrQXhGLtfsPNoqKXW99am2TOhxkiDjBR59Ng
- heUdClm+IqJAjMEAAEKAB0WIQR2tsk1o74gmpTwh0hRr4ovh/x3YQUCZgMK0AAKCRBRr4ovh/x3
- YfghD/420hCu3C56YtEXvV6RDovMPW2V4nO2xdMBu/WrNZa95g6SVkFfGrQvQ6HpDqa7zn7aqod
- eqzR4mPf7EAFq/Zh2+AAzLrt157BZVwEbnUkkUq4WFrZuOA6joXn9/uaMPC4Sq7ZjxI4YM49Y0l
- Flj39Pwh2BAl//mc/+aWNXE781tcnFa35JBaNfalK556EY4SyPIx25AErxd3/7sQuXST6Ihfenz
- WpUM88LtNtQBrr7XsiCdgaNe4CQnoQwzctcMB9hDyj1thiQVc8w20h+IEU4EvXlDTDIdfhacSpl
- xV9fp4zYxAn5ltXL7HITedFN4blmuFE1KHSVdJm2gYXmxBvKoKoKH26+W1Dwz6AZcV1q7/4jT91
- EjKexVSHa4IL9FbtUSfYPUola7FTHEs80o+tKRxsxs71/ftvtt7ZnhLvnwOI/z7Uv0PgheMAmUW
- CTjLdaKoKpDKvY0UwLCpeHOXhegcToFSU/XDgvucQRU1yqXNAH92lHvlSIfhFIWcr6aP58tGHRI
- C7zXjAHRp+KCObQKp4gw2xKOQEJTLWdIiswbvrD1LVGsyPhWSl9USuNT1lofmKwcwRZ/Wya0Aa8
- 4s57o0xvruCE6VUvuhAZX1nV5XqM7KTqxvZc1+5WB/NXEbufYGfoSJZEox31a9U+s2GOqozIMfH
- g5HAcY7ackorV6g==
-X-Developer-Key: i=lee@kernel.org; a=openpgp;
- fpr=76B6C935A3BE209A94F0874851AF8A2F87FC7761
Description
===========
diff --git a/cve/published/2024/CVE-2024-26651.mbox b/cve/published/2024/CVE-2024-26651.mbox
index 5640712b..98a97855 100644
--- a/cve/published/2024/CVE-2024-26651.mbox
+++ b/cve/published/2024/CVE-2024-26651.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26651: sr9800: Add check for usbnet_get_endpoints
-Message-Id: <2024032721-CVE-2024-26651-34b3@gregkh>
-Content-Length: 2890
-Lines: 62
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2953;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=z0/rgo7JDvp6cPPJlKVqORnFMHMujyiavPTAB/6vGys=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGksKpGZck1rK6UzUq/9qw/LnMWr57rnHHMJG89S+fQp/
- RsXnVPriGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIk8kWOYX71BZNaya6zMS3xX
- 5TUs+GyidaVCm2HB7upPbxQObbkacfFp7YMoH5uT+w6KAAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26652.mbox b/cve/published/2024/CVE-2024-26652.mbox
index 5ee3c28b..d424d087 100644
--- a/cve/published/2024/CVE-2024-26652.mbox
+++ b/cve/published/2024/CVE-2024-26652.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26652: net: pds_core: Fix possible double free in error handling path
-Message-Id: <2024032713-CVE-2024-26652-f95c@gregkh>
-Content-Length: 2132
-Lines: 55
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2188;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=HmggiJ5S7TzcRDGvRbJUmxT2CkKDwdDYEHwEqMDeARw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGksqqyTu9I07sXWihmpeJ9/oXosYU9aRItqbnI+7zTx0
- 1f6Wfd2xLIwCDIxyIopsnzZxnN0f8UhRS9D29Mwc1iZQIYwcHEKwES8djHMM/PhfTixrsO738bs
- dLya+wcL8x/uDAvWZxZk/BYs/Gw257Rn3aXrfRJM1+sA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26658.mbox b/cve/published/2024/CVE-2024-26658.mbox
index 19754b4f..bb1bc9b4 100644
--- a/cve/published/2024/CVE-2024-26658.mbox
+++ b/cve/published/2024/CVE-2024-26658.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26658: bcachefs: grab s_umount only if snapshotting
-Message-Id: <2024040222-CVE-2024-26658-1451@gregkh>
-Content-Length: 7462
-Lines: 185
-X-Developer-Signature: v=1; a=openpgp-sha256; l=7648;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=s9Gs9QuloPNLzDxqPynz5Jko4GSA12vrL3xa3FnOkC0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncS+SqBXIfbd0Xtml3+Y1bVz9OL20RCVM14d2dK9z15
- Z241NzkjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZiItBHDfMfaRgn7NZ3O964F
- LO4K/HJUb2YoB8OCNRGBwReCT+/Wq92y6dVtwYArEV8FAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26659.mbox b/cve/published/2024/CVE-2024-26659.mbox
index 91f598f0..2324c435 100644
--- a/cve/published/2024/CVE-2024-26659.mbox
+++ b/cve/published/2024/CVE-2024-26659.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26659: xhci: handle isoc Babble and Buffer Overrun events properly
-Message-Id: <2024040222-CVE-2024-26659-e4f6@gregkh>
-Content-Length: 2789
-Lines: 69
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2859;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=adsKCf22PctBtn5ZIKLk77rr62LfllD3IponG90J4FM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncS+SOpuo+uSBnfGG1+AFub/EuLm/tH5uCN1gJyiwqP
- 3hRyWJ/RywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzk4yeGecpqLgZv3jG7sAW/
- LJJLez91VlCLO8NcyRj1kz9fawV9PGEx3fDl1qeh3y49AgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26660.mbox b/cve/published/2024/CVE-2024-26660.mbox
index 107d91b6..af35cd72 100644
--- a/cve/published/2024/CVE-2024-26660.mbox
+++ b/cve/published/2024/CVE-2024-26660.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26660: drm/amd/display: Implement bounds check for stream encoder creation in DCN301
-Message-Id: <2024040222-CVE-2024-26660-3f40@gregkh>
-Content-Length: 3042
-Lines: 68
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3111;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=II8p8iNGIfh63r739VYyMUHBhw7LCXMz/RO5W8wFgto=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncS+Q2PMja0NN+/RbX+SUPo1ZscdkWmHqES7g4PPOTr
- wVnYUBwRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExEeynDgtWr+5fONrD9H76i
- 6MPy+47TQh7vOcmw4Li43263hoPfeA+/UDPa+stQ9tDWxQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26661.mbox b/cve/published/2024/CVE-2024-26661.mbox
index 36a268f8..1fa5a4b3 100644
--- a/cve/published/2024/CVE-2024-26661.mbox
+++ b/cve/published/2024/CVE-2024-26661.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26661: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'
-Message-Id: <2024040223-CVE-2024-26661-bef6@gregkh>
-Content-Length: 1966
-Lines: 51
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2018;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=290gjhArxysvTt8JL2hyOgxCiQevy5QqKO/shTOs2jM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncS+Q9DXs8dTWjly1sveLMElZU6TdBgWH7w1ld9z8HZ
- fX++NPUEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABM56sQwP6Lq49rgb3kqoceX
- f+Tl29zE8HzXIYYFswWl3adNf/tatMSvcHXUtl0WG0X/AAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26662.mbox b/cve/published/2024/CVE-2024-26662.mbox
index 7de99ace..ed873d6c 100644
--- a/cve/published/2024/CVE-2024-26662.mbox
+++ b/cve/published/2024/CVE-2024-26662.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26662: drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'
-Message-Id: <2024040223-CVE-2024-26662-863c@gregkh>
-Content-Length: 2136
-Lines: 53
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2190;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=fzYN3fVUzXJBlrtrMsvYog1D+ClUcBs50LZja7gOyVI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncS+R1JZMrO4Pe98ct0I9YnnagUv3zO7Esk+ezV/x/7
- h3yRCS2I5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACZy7THDgpOr7bY7uwUWH+vS
- +Hwtl+vfzIhoQYb5xZPtTrcwvnBbFiJ7n9Hx3IWTv+q2AAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26663.mbox b/cve/published/2024/CVE-2024-26663.mbox
index 49886c37..4953bc48 100644
--- a/cve/published/2024/CVE-2024-26663.mbox
+++ b/cve/published/2024/CVE-2024-26663.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
-Message-Id: <2024040223-CVE-2024-26663-9705@gregkh>
-Content-Length: 4415
-Lines: 96
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4512;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=t0LBOFtjAnxf5mJ/5PEl9TURq4Vl/5b6NiSZaXKW1F4=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncS+T5lf8K1SdVOK982vuIJ+rzUanujw25DkkztMvaI
- svyle90xLIwCDIxyIopsnzZxnN0f8UhRS9D29Mwc1iZQIYwcHEKwETWWDPM036d/zX68Y/ypRWH
- XvJNPSrs90QglWGu7M3bjyebPVo4a+nK2K4tM9b36BifBwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26665.mbox b/cve/published/2024/CVE-2024-26665.mbox
index 86f4fb2d..c9d0eda7 100644
--- a/cve/published/2024/CVE-2024-26665.mbox
+++ b/cve/published/2024/CVE-2024-26665.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error
-Message-Id: <2024040224-CVE-2024-26665-5daa@gregkh>
-Content-Length: 2908
-Lines: 73
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2982;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=31zlRQNw5iz4IlJD+IYs7XAvsHk/yk7+Y9o5065zFR8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncSxSevHg32aR0fpRc1nE53bnrpwYd+hh0x1Y28Mg6a
- Qm+HRWvO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiWY4M8xTyc0x4jXL4tXV3
- nDtt8X+zfCDjP4YFbfm9s1b7GizPeNVy8euPsF8z1s2JBQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26666.mbox b/cve/published/2024/CVE-2024-26666.mbox
index 39153dfb..3ab4e7ba 100644
--- a/cve/published/2024/CVE-2024-26666.mbox
+++ b/cve/published/2024/CVE-2024-26666.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26666: wifi: mac80211: fix RCU use in TDLS fast-xmit
-Message-Id: <2024040224-CVE-2024-26666-fcfe@gregkh>
-Content-Length: 1855
-Lines: 50
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1906;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=X8w2WaR+eQL76e1kJWdi1va87mr5J6CwJm9NNPQAi18=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncSxRWnDHer7mrtWjyEiWh1B8COYGCb5do9bpXOx2X5
- LqX5vynI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACZSFciwoIXjRPqxewcW7YlT
- Oq57c5HgnQnTvzEs2BKoG6Aj67ntl88qhhm8zK91gjjPAgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26667.mbox b/cve/published/2024/CVE-2024-26667.mbox
index 46f81337..a639f641 100644
--- a/cve/published/2024/CVE-2024-26667.mbox
+++ b/cve/published/2024/CVE-2024-26667.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26667: drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup
-Message-Id: <2024040224-CVE-2024-26667-cf72@gregkh>
-Content-Length: 2399
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2459;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=qiG6LvdCtbDk5n/lGeCMXr1ZUojEDH5xxuYIXwPr490=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncSxSalZaWR2v6JZy88u6BO1drxbQj/KWFDu8CLD4op
- LzKvGHWEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABM5ModhwYYLW4IFSncLrHgS
- tKxqdnKJlhjHU4b5UX/T1/pM3R7d/vVTc3WizKtmll/OAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26668.mbox b/cve/published/2024/CVE-2024-26668.mbox
index 01338e5e..99468cf2 100644
--- a/cve/published/2024/CVE-2024-26668.mbox
+++ b/cve/published/2024/CVE-2024-26668.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26668: netfilter: nft_limit: reject configurations that cause integer overflow
-Message-Id: <2024040235-CVE-2024-26668-636e@gregkh>
-Content-Length: 2322
-Lines: 56
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2379;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Fn75ei5mh31nntAE4EtbnjUvGFra/wl6K8qkBD3Jlgk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncK8VPZukcXtLE7Lq4Y8KNR7Xpu/ZYP+J68aewzeH36
- V2CJVr6HbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRDmeGeVoMt5StBSpZ9uZM
- fR2+uOu/RUlIB8N8d7MPFm5/9/6pnua/uiTU5ZT74+8HAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26669.mbox b/cve/published/2024/CVE-2024-26669.mbox
index 87b9db8b..e4827425 100644
--- a/cve/published/2024/CVE-2024-26669.mbox
+++ b/cve/published/2024/CVE-2024-26669.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26669: net/sched: flower: Fix chain template offload
-Message-Id: <2024040237-CVE-2024-26669-ca3c@gregkh>
-Content-Length: 5721
-Lines: 127
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5849;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=7k+h9KR1CUm5Afh94PaDU2eKdaaOE9MkixS7L+5KNsI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncKyVniITFmayZalyT5XVkpV5KdekRmby/toYCfv9+P
- hJVZl7eEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABORFWBYMMMn84W5Q84Xr/bz
- J+q/X5nqyS68iWHBkfjmzan7glmFFmlwa8pkveT+y20BAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26671.mbox b/cve/published/2024/CVE-2024-26671.mbox
index a80754ca..9603b5b6 100644
--- a/cve/published/2024/CVE-2024-26671.mbox
+++ b/cve/published/2024/CVE-2024-26671.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26671: blk-mq: fix IO hang from sbitmap wakeup race
-Message-Id: <2024040219-CVE-2024-26671-2543@gregkh>
-Content-Length: 3182
-Lines: 79
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3262;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=v1szmM9QU+4r53L3E1rFHaqrK+Cr22rImG1VOg+WPRM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncq/Jn/f21Zt3/0tvt4pe3t/3eN11b68JHGZd+deEZz
- CwWToFMHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRjukMc/j5Zk3StNIIdFJ5
- sfsgt7DZU62JRxjmhxv8Uc+5oX/slaKg0U7xkOy/PruOAAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26672.mbox b/cve/published/2024/CVE-2024-26672.mbox
index 469f4e78..1c301d3d 100644
--- a/cve/published/2024/CVE-2024-26672.mbox
+++ b/cve/published/2024/CVE-2024-26672.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26672: drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'
-Message-Id: <2024040219-CVE-2024-26672-e96e@gregkh>
-Content-Length: 2603
-Lines: 82
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2686;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=47rut0NIdOgkGw/qRGnDknoKGh0d1o680H4dOPG6a8Q=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncq/IncMlMcXbfJ/vajfHCS/07Zxn/mdUGFLdk1l8Mb
- 1hQ3mvTEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABPJOsaw4Fh1wLxs35nnpEUX
- eB+a+mL9svC/EgzzPbgbRF8WBPtqm8TenB9x/frL47Y8AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26673.mbox b/cve/published/2024/CVE-2024-26673.mbox
index 21a98587..0db15745 100644
--- a/cve/published/2024/CVE-2024-26673.mbox
+++ b/cve/published/2024/CVE-2024-26673.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26673: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations
-Message-Id: <2024040212-CVE-2024-26673-b2d3@gregkh>
-Content-Length: 2638
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2698;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=4ot3XRqWCsz/tSBYwma+lRfKGxNHLSGIl5JeyJk3qFM=;
- b=kA0DAAIRMUfUDdst+ykByyZiAGYLquCiPEtpvLEwAMTlkSMODeH4vN3kWevf8u9nOP+6R2UXI
- IhdBAARAgAdFiEE9LYMxb94wiFKMT3LMUfUDdst+ykFAmYLquAACgkQMUfUDdst+yk7vwCggw5M
- 5nELr+x06NNxPgA8+P8/HvsAoKNrG6Kpl76pUrirZKaWjjmNbfed
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26674.mbox b/cve/published/2024/CVE-2024-26674.mbox
index 091cc06b..67103593 100644
--- a/cve/published/2024/CVE-2024-26674.mbox
+++ b/cve/published/2024/CVE-2024-26674.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26674: x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups
-Message-Id: <2024040252-CVE-2024-26674-4ff9@gregkh>
-Content-Length: 3549
-Lines: 88
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3638;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=wMREaZ+6v62n4PRkanxp5n0Kwvg52QEcjsGY9Qa0BKY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncaxPOuHKs6q9kVkiZXHhQ+Zb39sMN5ncWRU13YopOT
- Su4WuPYEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABOxDmKY76Dw0tydr6m4XVNh
- 7belj7m4j5e/Ypin+F/x2PlTFdc74j7fWub8a7aWu7IFAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26675.mbox b/cve/published/2024/CVE-2024-26675.mbox
index 78e9aaa1..a6e707b1 100644
--- a/cve/published/2024/CVE-2024-26675.mbox
+++ b/cve/published/2024/CVE-2024-26675.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26675: ppp_async: limit MRU to 64K
-Message-Id: <2024040252-CVE-2024-26675-5b19@gregkh>
-Content-Length: 5258
-Lines: 110
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5369;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Cn72Jvfz72eKGyA8V5PzNZf9NkUrI5vlObDU1YTI2D8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncaxNy+RwEtQPVLtrJ6D/aJx0QkZHkIbFiYfs2M+eSz
- k+GrOwdsSwMgkwMsmKKLF+28RzdX3FI0cvQ9jTMHFYmkCEMXJwCMJGMZQwL5lp5nuRyCvKv6BG0
- 5nc+e5n3vY4IwzyzK2kmAk5ZmrteO5omvmdJ13jXdBsA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26677.mbox b/cve/published/2024/CVE-2024-26677.mbox
index ecf4160a..4c08c4c4 100644
--- a/cve/published/2024/CVE-2024-26677.mbox
+++ b/cve/published/2024/CVE-2024-26677.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26677: rxrpc: Fix delayed ACKs to not set the reference serial number
-Message-Id: <2024040252-CVE-2024-26677-8bc6@gregkh>
-Content-Length: 1925
-Lines: 51
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1977;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=SX5y3LoHKQFZJPogXXD7gzI+966ppC+VTn3j94IlF9g=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncaxMexMouUUzacf70+aZKBUezC61T97TOOWYROMck8
- fG5NI9DHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjARNU+G+cHuG16o6S29XczD
- F5TJ4XqLTXtVJMOC/ute7g5iF4If+7z4/XhS79+8x2vYAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26678.mbox b/cve/published/2024/CVE-2024-26678.mbox
index 33834711..2056c8e9 100644
--- a/cve/published/2024/CVE-2024-26678.mbox
+++ b/cve/published/2024/CVE-2024-26678.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26678: x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section
-Message-Id: <2024040253-CVE-2024-26678-2cf0@gregkh>
-Content-Length: 2648
-Lines: 66
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2715;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=BXGOW1KfdGAsXHdDbKpXk2lEiZt/LrhV3wLp7odtFiY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncaxP/fVcK01RateeKg0ToP6OG6LppPFaM69b6tiS1Z
- T19vONjRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExEOYZhwZEqjqNTWmQiJ/kG
- pK/mmfw1itNyEsM8o/837ptwqZ+YKOH21bBjzYXMpw37AQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
@@ -79,5 +68,6 @@ release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
+ https://git.kernel.org/stable/c/0a962f2fbaa976af9eed21d0306370cded485787
https://git.kernel.org/stable/c/4adeeff8c12321cd453412a659c3c0eeb9bb2397
https://git.kernel.org/stable/c/1ad55cecf22f05f1c884adf63cc09d3c3e609ebf
diff --git a/cve/published/2024/CVE-2024-26680.mbox b/cve/published/2024/CVE-2024-26680.mbox
index 8c743455..3d66acbd 100644
--- a/cve/published/2024/CVE-2024-26680.mbox
+++ b/cve/published/2024/CVE-2024-26680.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26680: net: atlantic: Fix DMA mapping for PTP hwts ring
-Message-Id: <2024040253-CVE-2024-26680-d16c@gregkh>
-Content-Length: 3864
-Lines: 91
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3956;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=I70hfmQINGTc4o1zTFv/3hpoyIyF2rrY/lDi+tZc7lw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGncaxNL1ksqrfkqHdOy9qmGyVaPW0r/QgxXL7iUqC3by
- LhD4929jlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjIxZkMs9kMbfjPvdoxI0iW
- b9eq41M3p/3K+sUwP2W7y5n/9qGLf9akGx6TeHXIXypaAgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26681.mbox b/cve/published/2024/CVE-2024-26681.mbox
index 555ed597..c40cddec 100644
--- a/cve/published/2024/CVE-2024-26681.mbox
+++ b/cve/published/2024/CVE-2024-26681.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26681: netdevsim: avoid potential loop in nsim_dev_trap_report_work()
-Message-Id: <2024040253-CVE-2024-26681-7e46@gregkh>
-Content-Length: 5046
-Lines: 106
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5153;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=cUchtBsZ1/VaJr/27gmVJMqJZ03wVvDqE/MCVG+e12U=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGnca5P8Bd9ph7XsvZC68h5T//prt2WL9+9cpCTP98mYq
- +rhiWaWjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZiIty/D/LIY2y3C++P3KzNs
- CGfoiDl4UTIkg2Ge/os91wTFNezdc4JjFf7P26R2nfkiAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26682.mbox b/cve/published/2024/CVE-2024-26682.mbox
index b2d80bc9..b6c88c5d 100644
--- a/cve/published/2024/CVE-2024-26682.mbox
+++ b/cve/published/2024/CVE-2024-26682.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26682: wifi: mac80211: improve CSA/ECSA connection refusal
-Message-Id: <2024040254-CVE-2024-26682-f2b2@gregkh>
-Content-Length: 2243
-Lines: 60
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2304;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=f+aa5UY2av+lsWwCe/DWCWq/Q4iULrSCvYy5FvdJaa8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGnca5OeBS+7dH6+kFjx+azv/JXy2Ul5q2Z+uOjWyGP2c
- J2Z2qfsjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjI638M8+tPLQt7eTefbfL3
- vWbuGkfntjQsiWaYK2i3SOrHr/k7d/i+tJTUaz1bInvqEwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26683.mbox b/cve/published/2024/CVE-2024-26683.mbox
index 06e8f110..ddde7b3b 100644
--- a/cve/published/2024/CVE-2024-26683.mbox
+++ b/cve/published/2024/CVE-2024-26683.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26683: wifi: cfg80211: detect stuck ECSA element in probe resp
-Message-Id: <2024040254-CVE-2024-26683-8614@gregkh>
-Content-Length: 2377
-Lines: 64
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2442;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=k4d/dK/yugzIZl43dvYYDFE33NruVs4mFBeB+GzsvJI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGnca5MerO3an2XzvDP1We3qkEmud+a9ub60uMMz6YB+d
- pvrtjmZHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRcwsY5lkFMF5d+IapeBqj
- 4wGWJwvinxkHv2OYyZjzScQ01Mb6N8vbM9cZ2Pk/cDwyAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26684.mbox b/cve/published/2024/CVE-2024-26684.mbox
index bccc37a6..4e8a5acb 100644
--- a/cve/published/2024/CVE-2024-26684.mbox
+++ b/cve/published/2024/CVE-2024-26684.mbox
@@ -1,19 +1,8 @@
-From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26684: net: stmmac: xgmac: fix handling of DPP safety error for DMA channels
-Message-Id: <2024040254-CVE-2024-26684-7ce8@gregkh>
-Content-Length: 2876
-Lines: 63
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2940;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=IMs1Qq2ndEBHjL0dRvWO8T+5yfCUWPb18gyaVimTvX4=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGnca5NuLr52ckLuqvK9ywtqj04+bGe97pKXVFXqoQcOx
- 2uFFFapdsSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEjjYwLDh1QEBS1FmL2/bJ
- nS4uB7Pi7x/W1zDMU14rxma7KEfiy9Kqd2yXNMrVTn37AgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26685.mbox b/cve/published/2024/CVE-2024-26685.mbox
index 42f7a8b0..add13924 100644
--- a/cve/published/2024/CVE-2024-26685.mbox
+++ b/cve/published/2024/CVE-2024-26685.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26685: nilfs2: fix potential bug in end_buffer_async_write
-Message-Id: <2024040335-CVE-2024-26685-e15e@gregkh>
-Content-Length: 4094
-Lines: 86
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4181;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=qdZav0ipc++95OXVntahM8H72nm6g249bXtodZOLiEY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uc9lJ2nOzE7tv7bb+vCTWf6TV3/OYrw7O3216/0Jr
- 86+ifzW0xHLwiDIxCArpsjyZRvP0f0VhxS9DG1Pw8xhZQIZwsDFKQATeaHJsKBV+7D0wubPOw6H
- tF8r3n6gZKZIjivDgmVqzz06yx1COXa8MZ811a1p4TWhOAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26686.mbox b/cve/published/2024/CVE-2024-26686.mbox
index f0b07364..38e8bf68 100644
--- a/cve/published/2024/CVE-2024-26686.mbox
+++ b/cve/published/2024/CVE-2024-26686.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26686: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats
-Message-Id: <2024040335-CVE-2024-26686-b22f@gregkh>
-Content-Length: 1980
-Lines: 55
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2036;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=srZb3OMXtDISbiNybMdIvoamGzUlBJNQ0zrn20kidfI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uc+X5nH8dHhx+9inAPmgW1dv+Srs/eJyKmIHD1vHJ
- wXxP3/dOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAisq0MC+bN3bgy/m7ajjVn
- dELemPmF3fHMt2BY0B+6SKBzQ9wTjfat+SuUK3R3arppAAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26687.mbox b/cve/published/2024/CVE-2024-26687.mbox
index 3bdaa143..3f82f4a1 100644
--- a/cve/published/2024/CVE-2024-26687.mbox
+++ b/cve/published/2024/CVE-2024-26687.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26687: xen/events: close evtchn after mapping cleanup
-Message-Id: <2024040335-CVE-2024-26687-55d0@gregkh>
-Content-Length: 6597
-Lines: 155
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6753;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=iRNsEYKuffmgpPX7L6seF2yfxAyT+0YWUiUe0JI00qc=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uS887N5oTJucfEaqvXaGAYPr6VuTLNNV165dKiXe6
- /5m4/uDHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRWA6G+cV3VS5u2Ke4/uPS
- jJ+68yvcv3kyzmGYp2PLeZLjh2TJ+mb3A/NYz7VdO71rKQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26688.mbox b/cve/published/2024/CVE-2024-26688.mbox
index d348ef3d..a311f799 100644
--- a/cve/published/2024/CVE-2024-26688.mbox
+++ b/cve/published/2024/CVE-2024-26688.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26688: fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super
-Message-Id: <2024040336-CVE-2024-26688-7b0e@gregkh>
-Content-Length: 8942
-Lines: 165
-X-Developer-Signature: v=1; a=openpgp-sha256; l=9108;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=j1ltE3NPho06TQbNN0x5qlY8WqfyldnSKtG1DV+BVLk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uS+0asVCLFjnWhwz5w+xkBPaMNtJS2Gjq3jWDx/JD
- R4THs/siGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIloHGSYzebUe1wjablDr8rl
- 3wYMaoe+8qaeYVhwSWFZVVpXWIDPm7uXrc8IRJ26tTQJAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26689.mbox b/cve/published/2024/CVE-2024-26689.mbox
index 7881686d..3aa09246 100644
--- a/cve/published/2024/CVE-2024-26689.mbox
+++ b/cve/published/2024/CVE-2024-26689.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26689: ceph: prevent use-after-free in encode_cap_msg()
-Message-Id: <2024040336-CVE-2024-26689-990b@gregkh>
-Content-Length: 2663
-Lines: 67
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2731;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=hKEY9FbrPmdmsNgErhg/5XE3O6usPsgawnrCeGy7yUw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uS82ZF9Y6+gluk7dfeLei+lXBE2WbuSaOK9qnbvY8
- lifaccXdcSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBESk8wzGT8o2qXFC9fFHky
- cOLv7/fcmAU7bBkWXDnbeuyofLiTd9orp0X5bR9P5ui+AwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26690.mbox b/cve/published/2024/CVE-2024-26690.mbox
index 95f2d194..22db9b53 100644
--- a/cve/published/2024/CVE-2024-26690.mbox
+++ b/cve/published/2024/CVE-2024-26690.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26690: net: stmmac: protect updates of 64-bit statistics counters
-Message-Id: <2024040336-CVE-2024-26690-0097@gregkh>
-Content-Length: 3246
-Lines: 78
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3325;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=PPntKuocD4fMnb1wGf19LH1dtTUPh3qVf//laI1URA0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uS+c7/dNab1+RN6RYy5Hto2WSGE6045Txe9zGf4lc
- 2l/L/nSEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABPhYWWYZ7hsmm7Bj7ZJf8Sv
- GARIX0g0/yMbxLBg3eFn67+oNFzpXfp4/0veidEvM18XAAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26691.mbox b/cve/published/2024/CVE-2024-26691.mbox
index 248d424c..279a01d8 100644
--- a/cve/published/2024/CVE-2024-26691.mbox
+++ b/cve/published/2024/CVE-2024-26691.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26691: KVM: arm64: Fix circular locking dependency
-Message-Id: <2024040336-CVE-2024-26691-fff7@gregkh>
-Content-Length: 1978
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2033;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Gr3ai+6tKPrx9XkIly6PDXluV1ipgPenEQa6va4EdHo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uS9vWvKqp2x7+lf5iP7PkKfmpiIZi1y/TGj/5zeT0
- 8p5p6NARywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEyEvZVhwUa21Fzxvep/pB32
- yh4OSJ3/v3HTWYb5eaYL5bV17Je/8v346ctPhwd8tVbrAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26692.mbox b/cve/published/2024/CVE-2024-26692.mbox
index 636fc7f7..7c6046d5 100644
--- a/cve/published/2024/CVE-2024-26692.mbox
+++ b/cve/published/2024/CVE-2024-26692.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26692: smb: Fix regression in writes when non-standard maximum write size negotiated
-Message-Id: <2024040337-CVE-2024-26692-162f@gregkh>
-Content-Length: 2773
-Lines: 66
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2840;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=n0Gr46dfXsSWj+F+fAsGm7yd1zTw+eWr3vmbTxeF04Y=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uS+97d6nd6994nEriqvfW2FBwdoTM/2kHr/9tuHwo
- 2MuU5vFO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiJmoMC1ZtPTNVaAO/9yIp
- R+WN3reZb5W3ijDMj9/L/bic41FE/wMlX1+/3MVGcjpXAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26693.mbox b/cve/published/2024/CVE-2024-26693.mbox
index 38a02b56..630e9cb9 100644
--- a/cve/published/2024/CVE-2024-26693.mbox
+++ b/cve/published/2024/CVE-2024-26693.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26693: wifi: iwlwifi: mvm: fix a crash when we run out of stations
-Message-Id: <2024040337-CVE-2024-26693-9c3b@gregkh>
-Content-Length: 2503
-Lines: 61
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2565;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=lMNTZ0Z9cF9G3XKYWl4wzFLiTeMzHzXGGUJGrvfYQi4=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uS9n3dzeJz798AUVNYXXFkf9LN7cnsbqWfLQ9kjcV
- 3XNCSsDO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAi+5cxLNjksmf69a0SXhsu
- yIj6nS2YmPVr4z+G+f4ex36d5+wUkjpa0/53h/3E/Ft7vwIA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26694.mbox b/cve/published/2024/CVE-2024-26694.mbox
index 2df0accc..a8a8cbcd 100644
--- a/cve/published/2024/CVE-2024-26694.mbox
+++ b/cve/published/2024/CVE-2024-26694.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26694: wifi: iwlwifi: fix double-free bug
-Message-Id: <2024040337-CVE-2024-26694-b216@gregkh>
-Content-Length: 2229
-Lines: 56
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2286;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=diwEIesc/R9VM18G/1TAh7W2bKHVI0zNYDvVRNwH45o=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uS/Pno1JkPdmKVfMfbXmsfwOc+tq+y9fu2OPah47O
- CXvLn9PRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzE7hbD/Lr6eRMWc/yp/pe5
- mPl8Skvipo97HzMsuDDl2LTHG6Y4r31zeL7bppKiLebxjQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26695.mbox b/cve/published/2024/CVE-2024-26695.mbox
index ee701208..59434726 100644
--- a/cve/published/2024/CVE-2024-26695.mbox
+++ b/cve/published/2024/CVE-2024-26695.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26695: crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
-Message-Id: <2024040338-CVE-2024-26695-e41f@gregkh>
-Content-Length: 6415
-Lines: 131
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6547;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=kNSsyscThtMRRUPf0v7OM8on72F3PCI/ehOxyiihR4c=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8ua8CT25azfE9ekLPX4FJPZ63pvw+NH22Y/vm1x1/I
- qeaHHxX1RHLwiDIxCArpsjyZRvP0f0VhxS9DG1Pw8xhZQIZwsDFKQATmZXDsOByx6sls4LfFMVF
- HXl94m7MjslTuEQYFhzjaJtzZML0FxzxeW7bV0x/lPXp0D4A
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26696.mbox b/cve/published/2024/CVE-2024-26696.mbox
index a00b5e8c..83d8e1ad 100644
--- a/cve/published/2024/CVE-2024-26696.mbox
+++ b/cve/published/2024/CVE-2024-26696.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26696: nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()
-Message-Id: <2024040338-CVE-2024-26696-9dff@gregkh>
-Content-Length: 3808
-Lines: 80
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3889;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=s/68XMDus0wx3xcJr32LDL2u/DtyLtUFHw5BcUMkQks=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8ua+iPZlFLEy6p30IeWPcc1lE9dztl+VptbLdj/3M7
- hcIrd/dEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABO56sUw3y1xX0zcyz29R483
- zvs749NVc9WUnwwLZk4u0lbbXiZYEWn53FSfdbN+xYZkAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26697.mbox b/cve/published/2024/CVE-2024-26697.mbox
index 83de189e..bc6c0fde 100644
--- a/cve/published/2024/CVE-2024-26697.mbox
+++ b/cve/published/2024/CVE-2024-26697.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26697: nilfs2: fix data corruption in dsync block recovery for small block sizes
-Message-Id: <2024040338-CVE-2024-26697-9521@gregkh>
-Content-Length: 2728
-Lines: 67
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2796;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=vEjcaD1lXyj834m3W7U9iW9OO6zlcTktmhG+ABMwwIo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8ua/uGP/y3V7/5tM9/Q2nl0exZrT4n7S7ucgk2oGvX
- zWF8X5QRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzE7DzD/MSr+5NX6DBdVp+i
- IiMYlT1pg87ajQzzXU4bz+jf9PiirKJ567IyhpZDgundAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26698.mbox b/cve/published/2024/CVE-2024-26698.mbox
index f965239a..2ce2e284 100644
--- a/cve/published/2024/CVE-2024-26698.mbox
+++ b/cve/published/2024/CVE-2024-26698.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26698: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove
-Message-Id: <2024040338-CVE-2024-26698-36ac@gregkh>
-Content-Length: 4117
-Lines: 93
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4211;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=BaSHgfIw+M9J0vBzhtQjz+/chr9EdhYKGFHaECNgb/4=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8ua8eyccvXcH07uyFTMXJy6sPn1j5ePGV+vnqKx5eY
- LNo/LmxpSOWhUGQiUFWTJHlyzaeo/srDil6GdqehpnDygQyhIGLUwAm8juDYcHavsVegmGRO6Xc
- ppRXFK8KfSx2TZJhfoTWO8MpSQ5MxZ/aVx6Pj1r1VunbOQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26699.mbox b/cve/published/2024/CVE-2024-26699.mbox
index 6ed1d75e..56d424e8 100644
--- a/cve/published/2024/CVE-2024-26699.mbox
+++ b/cve/published/2024/CVE-2024-26699.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26699: drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr
-Message-Id: <2024040339-CVE-2024-26699-c700@gregkh>
-Content-Length: 1670
-Lines: 52
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1723;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=WBa1jTLaU9wJWOiezYMK7xbk8+JBPIPZO/b2McAn/wk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8ua+jJURTP6c/L5dt+cp6WfxBlslZ5sMrRLbHrrrCz
- Kfz36+rI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACbSeYhhnrr8Im+m0i8xHyUe
- mpz5uMz602IlboYFzVcTXO/ODH/CGN0lZrt1XmWRz+ZZAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26700.mbox b/cve/published/2024/CVE-2024-26700.mbox
index 315cbbd2..fed979ff 100644
--- a/cve/published/2024/CVE-2024-26700.mbox
+++ b/cve/published/2024/CVE-2024-26700.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26700: drm/amd/display: Fix MST Null Ptr for RV
-Message-Id: <2024040339-CVE-2024-26700-a2b8@gregkh>
-Content-Length: 6465
-Lines: 129
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6595;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=4J9ugq90OraXtsCvl7d8KE9l2BT0cT+cLcJfo2rdNVU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8ua/F+ZcoBC2snfjgWHijQ65EFedl4xVqEycvqDRfZ
- tYw5WtaRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExEqJthnr2gsUCrQUQpb2bA
- nNXHVrRrMp4TZ1hwS+XS+29F+asjJnPOuq/BWxD9QbkIAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26702.mbox b/cve/published/2024/CVE-2024-26702.mbox
index 40a5e1dc..2cbb744c 100644
--- a/cve/published/2024/CVE-2024-26702.mbox
+++ b/cve/published/2024/CVE-2024-26702.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26702: iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC
-Message-Id: <2024040339-CVE-2024-26702-acda@gregkh>
-Content-Length: 2711
-Lines: 60
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2772;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=M+KtZnrBeMPa+DGWM42GWZwVntRWEMb8T2WeS15ldtA=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uW8Md87ZOadO67bm0Wtfv08T19oqqCF7r1n/sou1f
- fX9lwnfO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiYsEMC/aHfp2itSL6R3Ca
- ZU0Tj9eLvNcdKxjmWQVfnFttdtfwwi0nNeXCjv9GNftnAAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26703.mbox b/cve/published/2024/CVE-2024-26703.mbox
index 8ab34f3a..02dda37c 100644
--- a/cve/published/2024/CVE-2024-26703.mbox
+++ b/cve/published/2024/CVE-2024-26703.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26703: tracing/timerlat: Move hrtimer_init to timerlat_fd open()
-Message-Id: <2024040340-CVE-2024-26703-d60d@gregkh>
-Content-Length: 5146
-Lines: 126
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5273;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=mWTMXdHkAff+6X+moLe+sm+1QJBMyUOn2I/syA0c5CM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uW9e/sr2F6sq2dUqlxnM3Hm0zDidq/7hm+3vk5ziH
- hyblSbfEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABP5IMKwoOdN3DFpo8cfHLv6
- ilwXbnD1n/diNcNcEXk+f97SS/MLBAXd0yU1bxr+PVgBAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26704.mbox b/cve/published/2024/CVE-2024-26704.mbox
index 234f3306..209b7a88 100644
--- a/cve/published/2024/CVE-2024-26704.mbox
+++ b/cve/published/2024/CVE-2024-26704.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26704: ext4: fix double-free of blocks due to wrong extents moved_len
-Message-Id: <2024040340-CVE-2024-26704-a082@gregkh>
-Content-Length: 3477
-Lines: 73
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3551;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=TM1+2SoaMTGyogtD2n5vwa5yRjwR5DYVHJnYZ06Fk3k=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uW/mffNKYX0xYV72x75vOSd961dFPfIV+HrK5bcc9
- xRdD8vMjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjI1jkM8x3D7OMEfh+4UZYn
- Nrn5xr20D5oWVxnmp/T8XiSjWFgt/+stQ7TIg8TjkS+iAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26705.mbox b/cve/published/2024/CVE-2024-26705.mbox
index cc0c7928..34d3a694 100644
--- a/cve/published/2024/CVE-2024-26705.mbox
+++ b/cve/published/2024/CVE-2024-26705.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26705: parisc: BTLB: Fix crash when setting up BTLB at CPU bringup
-Message-Id: <2024040340-CVE-2024-26705-c0ff@gregkh>
-Content-Length: 2124
-Lines: 56
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2181;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=XLmVVqMpKJELlBL3AniIokDgLLMm9pWN9Tu1qCBlBmo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uW9KJ/4vfOm0cpXine2nP6QvXr915Qn7987TFifW/
- d9yMlpqUkcsC4MgE4OsmCLLl208R/dXHFL0MrQ9DTOHlQlkCAMXpwBM5Jw7w4L1x9NYF85c3HIv
- 5XZQ+JkJGxZF6PMzzE/KvmY95cD0bBv52ImGl1ZynZj1/DwA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26706.mbox b/cve/published/2024/CVE-2024-26706.mbox
index 26e5724d..17c59041 100644
--- a/cve/published/2024/CVE-2024-26706.mbox
+++ b/cve/published/2024/CVE-2024-26706.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26706: parisc: Fix random data corruption from exception handler
-Message-Id: <2024040341-CVE-2024-26706-844b@gregkh>
-Content-Length: 3412
-Lines: 82
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3495;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=yXtFnENlhKpxFCMn4wgfJ02i1KNm4Vi8LV0ai8uuzHo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uW8FUmbZT1mrJSkt+lGDv3vZe0GeTUFTD1eoye9Z+
- ijKPv1vRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExkw0WG+ekX/6sdaSiyuMgR
- 6nqK4adeQ3HxVIZ5lq+Wb6yR5VpzZGk759UD0/Wzz4TcAQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26707.mbox b/cve/published/2024/CVE-2024-26707.mbox
index 6be9f7da..b629076d 100644
--- a/cve/published/2024/CVE-2024-26707.mbox
+++ b/cve/published/2024/CVE-2024-26707.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26707: net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()
-Message-Id: <2024040341-CVE-2024-26707-1153@gregkh>
-Content-Length: 3586
-Lines: 86
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3673;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=NO2sob/0SyTHprM/Ce9Pe3lmmWCyhLuUz6HJMKH2+dw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uW9nZb/xiVCZ8vKXK9+iM4o1Ey7YFm9PyDz0dvLUh
- 5vYSi+s64hlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJ3AxgmO/4NkK0m4ujKCpw
- nuirjtv6U981v2WYZ8lUqxBQse3ezaNfTAVt9qzqLgpuAgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26708.mbox b/cve/published/2024/CVE-2024-26708.mbox
index e00395a8..bfa959a8 100644
--- a/cve/published/2024/CVE-2024-26708.mbox
+++ b/cve/published/2024/CVE-2024-26708.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26708: mptcp: really cope with fastopen race
-Message-Id: <2024040341-CVE-2024-26708-c98a@gregkh>
-Content-Length: 2074
-Lines: 57
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2132;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=nFZKJoj8kCh+Tyng9sCBYJV5k2GfPMzX6egig/MiyrE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uW8DLizm5Jkvk5qyq4QhV/k83+LDb/UazN78FS5bU
- icXb7KjI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACZy3IJhfmb5/K64M3eTjCWt
- vyyY57k+M7uZm2HByY32q9Ma/8w4kcB7SaOXc0fnymB3AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26709.mbox b/cve/published/2024/CVE-2024-26709.mbox
index 61dfb4bb..6efe971f 100644
--- a/cve/published/2024/CVE-2024-26709.mbox
+++ b/cve/published/2024/CVE-2024-26709.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26709: powerpc/iommu: Fix the missing iommu_group_put() during platform domain attach
-Message-Id: <2024040341-CVE-2024-26709-19b4@gregkh>
-Content-Length: 2970
-Lines: 76
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3047;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=LAK73qGb0xEJsFYRLfCM+QJ0GIj9ndNLLGFLWt3tIbU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uW8NmuLb3Q5c1zi45ILMcz/vYltZ5wUydxWt3KfIt
- 4d/nTunI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACYikMMwPzgqLcVwHee5U/qG
- ym5T4sLOMgW9YJintX2Sleb/lpCe1WukjlcmzU06PGELAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26710.mbox b/cve/published/2024/CVE-2024-26710.mbox
index 163f7960..171d8448 100644
--- a/cve/published/2024/CVE-2024-26710.mbox
+++ b/cve/published/2024/CVE-2024-26710.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26710: powerpc/kasan: Limit KASAN thread size increase to 32KB
-Message-Id: <2024040342-CVE-2024-26710-6332@gregkh>
-Content-Length: 2699
-Lines: 66
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2766;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Pwn0IEHJX8bwBtj0ehP4na/+ZIo3b/Mck7SOrENNBqs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8ue+WVq3QNOtL9U94urf0xYeyBDVt9uUBn98e62bL3
- li0T/J9RywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzk6C6GBUtj9t6Rc39aIxTh
- HDTvubtN2bawvwwL5sTzMuebdUm+evtf9WuUXkaZ5fJ7AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26711.mbox b/cve/published/2024/CVE-2024-26711.mbox
index 8286a729..5d6631a4 100644
--- a/cve/published/2024/CVE-2024-26711.mbox
+++ b/cve/published/2024/CVE-2024-26711.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26711: iio: adc: ad4130: zero-initialize clock init data
-Message-Id: <2024040342-CVE-2024-26711-de47@gregkh>
-Content-Length: 1958
-Lines: 53
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2012;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=5y3+ZN0vHlNjTW0bLAgdTOukL7zrxPwh3nRAVxWBjHs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8ue90P82xn3o4W3WNUmhgTlt1+hyOOJ28gm+cKS8+T
- P32OVqvI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACYimMcw35Nxhsium3KuH3co
- qZkprbc+4yRXzzCH85PGn5kaAnfW3Yz6Nkck2/rG3LjNAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26712.mbox b/cve/published/2024/CVE-2024-26712.mbox
index 326f5114..3d40067d 100644
--- a/cve/published/2024/CVE-2024-26712.mbox
+++ b/cve/published/2024/CVE-2024-26712.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26712: powerpc/kasan: Fix addr error caused by page alignment
-Message-Id: <2024040342-CVE-2024-26712-d713@gregkh>
-Content-Length: 3384
-Lines: 84
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3469;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=JL4Pe0hQW2E4GSDunxbnjzWDgaCxGFaXojwG7aB+p+Q=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8ue8+pBppPG8sbXlzrEpC+NHz7CssIaeNJnVtaLr3S
- rF8Ul1ERywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEyE7zjDgn07p+aLhNuI86t2
- eiryv9jU81CdhWHBiZ3XOGpcm1fz3s08on1w5imdGW9+AAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26713.mbox b/cve/published/2024/CVE-2024-26713.mbox
index 17da77d1..6d33ccad 100644
--- a/cve/published/2024/CVE-2024-26713.mbox
+++ b/cve/published/2024/CVE-2024-26713.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26713: powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add
-Message-Id: <2024040342-CVE-2024-26713-1b52@gregkh>
-Content-Length: 4705
-Lines: 107
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4813;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=QbFeoE4jCXu5LeGkN6NBBUNQqT3z/lKRzpaHY55cnSE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8ue+F9J9tfHtgrujHsvuXFS51MZxf8/Miz/74P/M0F
- /hnTw007YhlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJLO5jWNB4V2qV9CTHDy9/
- Bi8rKdXpmzN1aT7DPLuTgn8OqUWnqO/zmi7ov0gnWH6/OQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26714.mbox b/cve/published/2024/CVE-2024-26714.mbox
index f41c711a..d8c1cea4 100644
--- a/cve/published/2024/CVE-2024-26714.mbox
+++ b/cve/published/2024/CVE-2024-26714.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26714: interconnect: qcom: sc8180x: Mark CO0 BCM keepalive
-Message-Id: <2024040343-CVE-2024-26714-d9a8@gregkh>
-Content-Length: 2203
-Lines: 56
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2260;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=GxjjQ1BEbVzcDnT9UIryAWja7LoaAETkNTRir4sI6AM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8ue8Nnds4pPMWHpCLez/zj1VJdOd9QSOjaSeTpFqe5
- U8+oPS/I5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACZisZJhDq9dpqI/l1IGw/N5
- 2w+9ztnBkdqTxjBX8v6nv/I5kY2KLA8kYgsT68pUVsYAAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26715.mbox b/cve/published/2024/CVE-2024-26715.mbox
index c9b70ec8..5846beb2 100644
--- a/cve/published/2024/CVE-2024-26715.mbox
+++ b/cve/published/2024/CVE-2024-26715.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26715: usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend
-Message-Id: <2024040343-CVE-2024-26715-20ed@gregkh>
-Content-Length: 3075
-Lines: 72
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3148;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=GCZsUB19B8sn57O/R8FEYsi8SLTEC2I+XEax2Pag05A=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8ue93bdyYcenLegYl/njH91P7NjhLeazf/djgCMPXF
- dWcRq9vd8SyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBETsxhmCs1+8Nz63qb6kiO
- qQJTjrG9Y3HRk2JYsGjD9Nea1620mbIqV4lwu/2W9PO6DQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26716.mbox b/cve/published/2024/CVE-2024-26716.mbox
index e44f4299..6fbc34fb 100644
--- a/cve/published/2024/CVE-2024-26716.mbox
+++ b/cve/published/2024/CVE-2024-26716.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26716: usb: core: Prevent null pointer dereference in update_port_device_state
-Message-Id: <2024040343-CVE-2024-26716-74a8@gregkh>
-Content-Length: 2132
-Lines: 55
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2188;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=lcIDSA2kPuxhoklGZIFr89jISsQW9z3Dsg63oOyEvgI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8ue/XXXpiIPDqw/1X+/4fUTQW7eqLvLzyu7rzzTd/t
- 6gvV/mb2RHLwiDIxCArpsjyZRvP0f0VhxS9DG1Pw8xhZQIZwsDFKQATWZzLMN/9/aGFdlpPy2eZ
- heuvSwg77jb3+XGG+aFWrat+zXvLtzn0Gv/cEw/3h4mYBAAA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26717.mbox b/cve/published/2024/CVE-2024-26717.mbox
index d1b8c9ae..466c9ebc 100644
--- a/cve/published/2024/CVE-2024-26717.mbox
+++ b/cve/published/2024/CVE-2024-26717.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26717: HID: i2c-hid-of: fix NULL-deref on failed power up
-Message-Id: <2024040344-CVE-2024-26717-0d01@gregkh>
-Content-Length: 2292
-Lines: 55
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2348;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=C51i9VZgCmhUVdChyTOgg49u+aPofhqJS1p5SG5p6CY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uR9Cvjq+T0oLmzbR5c/1vAf8MxbyOG+Oe/WrcqLSq
- jOPZ9nv74hlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJxHAyLNg612ih+AUfgaXH
- RDX2FCa+OClx6j1QdKXW9Ox8qZcTXQpKHZbHnvm92VcHAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26718.mbox b/cve/published/2024/CVE-2024-26718.mbox
index 6621c8d6..9a68a31f 100644
--- a/cve/published/2024/CVE-2024-26718.mbox
+++ b/cve/published/2024/CVE-2024-26718.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26718: dm-crypt, dm-verity: disable tasklets
-Message-Id: <2024040344-CVE-2024-26718-7259@gregkh>
-Content-Length: 3208
-Lines: 75
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3284;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=DreEoQ+Qsjr7XMixgGxoJI6i1Spt2DFHKxHt0jsm1TE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uR/sedq8Yk81crM8zxQv2DtburuE7WEHU9rfyIKde
- Qk5LKs7YlkYBJkYZMUUWb5s4zm6v+KQopeh7WmYOaxMIEMYuDgFYCLpbAzzEyeVL7NQX7Rvy/u6
- pBcXbhR3vXp1gWFBf9VbR8O02c067f1zj1VFeKmxWDAAAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26719.mbox b/cve/published/2024/CVE-2024-26719.mbox
index 53db2514..2621529b 100644
--- a/cve/published/2024/CVE-2024-26719.mbox
+++ b/cve/published/2024/CVE-2024-26719.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26719: nouveau: offload fence uevents work to workqueue
-Message-Id: <2024040344-CVE-2024-26719-b66e@gregkh>
-Content-Length: 1802
-Lines: 52
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1855;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=tx1bTlQX4IT/0QHYG9pjhDQnUo/He3cD5cc1B0IpXiw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uR/eXe1K4XxicHLuzq9v6vfxV7YantH+Lvll8gL3b
- X+uBb0S6YhlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJ7DnAMFdWf3WdiFn9xjX1
- eeEL3W74bHgWk8uwYHqS85Zod28jUx+NiYGZRpPd8w7VAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26720.mbox b/cve/published/2024/CVE-2024-26720.mbox
index 17989e94..37020ab2 100644
--- a/cve/published/2024/CVE-2024-26720.mbox
+++ b/cve/published/2024/CVE-2024-26720.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26720: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again
-Message-Id: <2024040344-CVE-2024-26720-06fa@gregkh>
-Content-Length: 3505
-Lines: 75
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3581;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=UnuHVE5gwKuFFV32oqZnhQt37OH4Zj47T+mVs9fMQzc=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uR8KfYOesXDEL++6m/XkVr5uuZT8+cpPU+Vnhj1O3
- RAdevpORywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzkMxPDXNmwjwvWKViIxsq0
- Td/K07b0jPWGhwzzay6ZV+b78WvcvhSVp/Pab9mCivcRAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26721.mbox b/cve/published/2024/CVE-2024-26721.mbox
index acf937b7..d37f4b80 100644
--- a/cve/published/2024/CVE-2024-26721.mbox
+++ b/cve/published/2024/CVE-2024-26721.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26721: drm/i915/dsc: Fix the macro that calculates DSCC_/DSCA_ PPS reg address
-Message-Id: <2024040345-CVE-2024-26721-3377@gregkh>
-Content-Length: 2539
-Lines: 67
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2607;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=p/miq+CGqAN6IPx9x+OosgS1G+vGexqwGnTB86l9BtY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uR+DGBh8j4qU7P7Vu6suJmuKnU5gdOuiE+//nooIr
- lxxfuXljlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZiIrxPDfPd/ttv2JYTPCktr
- WL6mo5r5y87N7gzzI870XL72udYz1Yx3S9GHNa+vS0alAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26722.mbox b/cve/published/2024/CVE-2024-26722.mbox
index d11a39a7..4947f444 100644
--- a/cve/published/2024/CVE-2024-26722.mbox
+++ b/cve/published/2024/CVE-2024-26722.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26722: ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()
-Message-Id: <2024040345-CVE-2024-26722-4df2@gregkh>
-Content-Length: 2893
-Lines: 63
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2957;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=YWK1ggP/BOU6eDcWMhimVUU6FxGOfzzszL98URGv3xI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uR9lHi5XE7yi1DlNY18T67yH6Y9TvM93eLn/s8tQm
- S5WH/elI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACay/ALDgs2fTvpap2U75vH9
- 8Q0ufRt2gGuPO8P87I75s805o27ZZkvPefJ7kmGn3DUGAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26723.mbox b/cve/published/2024/CVE-2024-26723.mbox
index 26d35201..9bf2d848 100644
--- a/cve/published/2024/CVE-2024-26723.mbox
+++ b/cve/published/2024/CVE-2024-26723.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26723: lan966x: Fix crash when adding interface under a lag
-Message-Id: <2024040345-CVE-2024-26723-49ee@gregkh>
-Content-Length: 2642
-Lines: 62
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2705;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=QmwpxNgMk1K5SJFJMSMEq+sqLdi+V2UgcL/QzVZdgAQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uR+XFOYkTRf06+stjOk3yT9ce4Pni7fpoi3BU0ODa
- j5wG57oiGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIl8Osgwz+RJhMavqZN3z+Vf
- lKU2VfFKS1HDfIb5BWoT32vvtBSbduLV/Ezfe4ofdtzXBgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26724.mbox b/cve/published/2024/CVE-2024-26724.mbox
index b5515b5f..8af52dcc 100644
--- a/cve/published/2024/CVE-2024-26724.mbox
+++ b/cve/published/2024/CVE-2024-26724.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26724: net/mlx5: DPLL, Fix possible use after free after delayed work timer triggers
-Message-Id: <2024040345-CVE-2024-26724-4e19@gregkh>
-Content-Length: 8413
-Lines: 179
-X-Developer-Signature: v=1; a=openpgp-sha256; l=8593;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=2HD7RKXYt4mTmagYN0Lxd1TVVC1DjDbypAxQcu2tDFk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uR8tg7ii+B6+nXPRok3+zEKBo0yLwud82xautiVr8
- n93o08eHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRLRYMc8VKt3/9Vihb+u+q
- 7oFSuVreSvebXQwLrs7sf7vlNstszzZHk3ih2c/s5hzIBgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26725.mbox b/cve/published/2024/CVE-2024-26725.mbox
index 432331c2..15d54142 100644
--- a/cve/published/2024/CVE-2024-26725.mbox
+++ b/cve/published/2024/CVE-2024-26725.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26725: dpll: fix possible deadlock during netlink dump operation
-Message-Id: <2024040346-CVE-2024-26725-d16b@gregkh>
-Content-Length: 5136
-Lines: 124
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5261;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=5IDM7RGacDmUO0QzEBE2sFm8oOQPOHpaX35yuf+BmvE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uZ8aI+ffZn3w+OW3zVvz1rU5GrWdr1r9qOT7n3ftW
- x7zBuZ1d8SyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBE0nMYFjQvC/j+bMoujppK
- R06x6CmXpUXXLWJYcP7CLBa5vOvJJqmS+Y0zz3hfnPM/DwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26726.mbox b/cve/published/2024/CVE-2024-26726.mbox
index 046ad8f3..e2e31d14 100644
--- a/cve/published/2024/CVE-2024-26726.mbox
+++ b/cve/published/2024/CVE-2024-26726.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26726: btrfs: don't drop extent_map for free space inode on write error
-Message-Id: <2024040346-CVE-2024-26726-fed0@gregkh>
-Content-Length: 3781
-Lines: 97
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3879;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=3PEo0ravLBUFHCgu25qSkvqP3jKJho52O/FMv+hfzok=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uZ/s3l+cmCiy/tbffGmzeeFCCvyxGpvnlnucN1U/b
- tlsG3K2I5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACYS/JdhQdfn2gUq8VX/fPTt
- l7nH7LHyttsqwrDgSqj61BoLD7djoutMQirjBQzT/90BAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26727.mbox b/cve/published/2024/CVE-2024-26727.mbox
index 56edd663..14159d26 100644
--- a/cve/published/2024/CVE-2024-26727.mbox
+++ b/cve/published/2024/CVE-2024-26727.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26727: btrfs: do not ASSERT() if the newly created subvolume already got read
-Message-Id: <2024040346-CVE-2024-26727-3ec3@gregkh>
-Content-Length: 4083
-Lines: 103
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4187;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=qBBSvKXAl7rIOtwKl+hq7vC6nWLicPNLVhBKcZFyUPo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8uZ9KMxzvcbCoOhjeOHVFQbL1Q/EFh77LXl9vT7wfs
- Y4herp0RywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEyk5gjDgonfL/64t651Rpn3
- 83LFhXyRYTvn+DIsuLyocJq/qIbopp8pU6NfPnA7nXveCAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26728.mbox b/cve/published/2024/CVE-2024-26728.mbox
index f2d286c2..9d3699c1 100644
--- a/cve/published/2024/CVE-2024-26728.mbox
+++ b/cve/published/2024/CVE-2024-26728.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26728: drm/amd/display: fix null-pointer dereference on edid reading
-Message-Id: <2024040357-CVE-2024-26728-316a@gregkh>
-Content-Length: 7907
-Lines: 118
-X-Developer-Signature: v=1; a=openpgp-sha256; l=8026;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=nZnv+HIegfSItFgdXwHjjs/KcfQqM7YuQhuIYR73HtQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8kwJNP3Ftv2F598ddYd61nnvUjYOuzv+33DhISW7vz
- U+sZ0/874hlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJrPBimO//299bqG3nHPnn
- JxYFrjybtT88pJhhftRvty/ssz7OjVBt83z7kJWjWE59EwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26729.mbox b/cve/published/2024/CVE-2024-26729.mbox
index 3ed386c2..99158d68 100644
--- a/cve/published/2024/CVE-2024-26729.mbox
+++ b/cve/published/2024/CVE-2024-26729.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26729: drm/amd/display: Fix potential null pointer dereference in dc_dmub_srv
-Message-Id: <2024040357-CVE-2024-26729-2f3e@gregkh>
-Content-Length: 2526
-Lines: 62
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2589;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=YmQX3Z3Y1MqRgW3oMV0g58G8a8BCQn59RPxf21aBbqE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8kwItXqY51eZcDE8MuxXS9iK0adUlziMXJnx8Eb9av
- uJYrlhLRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzEdQLDgoPvTWsSD8wXE1vi
- +XVqgIWe/V71pQxzZadxRugob5XVn/zfy3Vn+1QTHllWAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26730.mbox b/cve/published/2024/CVE-2024-26730.mbox
index cfb375fc..e4f543b7 100644
--- a/cve/published/2024/CVE-2024-26730.mbox
+++ b/cve/published/2024/CVE-2024-26730.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26730: hwmon: (nct6775) Fix access to temperature configuration registers
-Message-Id: <2024040358-CVE-2024-26730-4c35@gregkh>
-Content-Length: 2038
-Lines: 53
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2092;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=D+07ztUJOt3oZ3wfes9IxKS+i1evUrVWCAKiTmlG3jM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k4L8lpYFny5sZrCYWuj8dJtD95oXNnsrwpRtpkd+v
- 5Me0hrYEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABNpUGKY76pzceLjplrlCq2Z
- 3D9Wqf0y62NQYpgrHT8vItDCXcr70jeLArMd227lvpYAAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26731.mbox b/cve/published/2024/CVE-2024-26731.mbox
index 225e8ae3..a889e76a 100644
--- a/cve/published/2024/CVE-2024-26731.mbox
+++ b/cve/published/2024/CVE-2024-26731.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26731: bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()
-Message-Id: <2024040358-CVE-2024-26731-e084@gregkh>
-Content-Length: 2951
-Lines: 75
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3027;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=nsMYORN9nRPdCegEiPLPzLC2vqOS6iGOoXlg48kWXp8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k4KqX5ikvpnCxmfX+/xYQtiFQ0UtEZOFvhzymqe89
- dnp64oTO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiOUcZZjL+evUp3lsiSs6a
- YdEMH7faeqFpxgwLNn5Y4t4gWHp4p8DVrdc7N0+elXL9CgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26732.mbox b/cve/published/2024/CVE-2024-26732.mbox
index 64fadc1f..8969194a 100644
--- a/cve/published/2024/CVE-2024-26732.mbox
+++ b/cve/published/2024/CVE-2024-26732.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26732: net: implement lockless setsockopt(SO_PEEK_OFF)
-Message-Id: <2024040358-CVE-2024-26732-8cda@gregkh>
-Content-Length: 7146
-Lines: 168
-X-Developer-Signature: v=1; a=openpgp-sha256; l=7315;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=qSgY7o7iL8I5zjUGh87BJksCTaq0Aj1cyxpC+bwj6+w=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k4J0P/gz/WJ5pPsgcEdaxuknkl3B4XXRV7Yw/D3bE
- nmsW4y1I5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACainM2w4JKkdsJl06790s1N
- xy3FRObUTncWZVhw2XbvpILL/AsjBBffOv5CXXwFd+I5AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26733.mbox b/cve/published/2024/CVE-2024-26733.mbox
index 25951385..8719da43 100644
--- a/cve/published/2024/CVE-2024-26733.mbox
+++ b/cve/published/2024/CVE-2024-26733.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26733: arp: Prevent overflow in arp_req_get().
-Message-Id: <2024040358-CVE-2024-26733-617f@gregkh>
-Content-Length: 5583
-Lines: 117
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5701;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=XDaO/+QnXElwvdrSwwNGCtzQVO9W8wFJMhxooX9iegg=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k4IOzLnyce/Dhf/+BvznOXDpzvPmFXtnndq2wlrpE
- D//2X3R2h2xLAyCTAyyYoosX7bxHN1fcUjRy9D2NMwcViaQIQxcnAIwkb+LGBac89+8mWnRmaye
- fTWhPiInHzKwC5kxzM9sS/8bbq8ltVueoffoWTedSVdNEgE=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26734.mbox b/cve/published/2024/CVE-2024-26734.mbox
index a6484761..037ad9c1 100644
--- a/cve/published/2024/CVE-2024-26734.mbox
+++ b/cve/published/2024/CVE-2024-26734.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26734: devlink: fix possible use-after-free and memory leaks in devlink_init()
-Message-Id: <2024040359-CVE-2024-26734-277b@gregkh>
-Content-Length: 1951
-Lines: 52
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2004;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=leKWH18xzS6X0xtMI1602czpiAhNtBVF9uzrBgsHedY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k4Ir04u+au5hunS416J2e23/mx2OM53D5KPK5Fm5p
- z56pvilI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACay8wbD/OSnU0+tSU7fIrLy
- kvcRlqfz/87nK2CYK73Ket5/Lh2995IF3XFtyWp8y93OAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26735.mbox b/cve/published/2024/CVE-2024-26735.mbox
index 8b75dba8..626c772b 100644
--- a/cve/published/2024/CVE-2024-26735.mbox
+++ b/cve/published/2024/CVE-2024-26735.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref
-Message-Id: <2024040359-CVE-2024-26735-462f@gregkh>
-Content-Length: 2735
-Lines: 60
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2796;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Q4wBh3oezCkuP/V9cmFAs99CXaVga9rxg5Z7yNub2Vg=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k4IbsgJWLJ0w3T/b+u2LyV5pG1TvXzv/c9KW9549T
- bGZKlpnOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiP3IZ5jsKnPdL3b9eYNoH
- PZvf0x82hp0x5mGYw8XUUL/xXZCEM1d2Z/KO1WpNX361AAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26736.mbox b/cve/published/2024/CVE-2024-26736.mbox
index 1fd0b29b..814d48e9 100644
--- a/cve/published/2024/CVE-2024-26736.mbox
+++ b/cve/published/2024/CVE-2024-26736.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26736: afs: Increase buffer size in afs_update_volume_status()
-Message-Id: <2024040359-CVE-2024-26736-284d@gregkh>
-Content-Length: 2692
-Lines: 62
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2755;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=YhAFXGxbBzDnQIU+Wu17jqGDiXUVPkcEv0iGm30aVmY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k4Kz/mlksD0O8XROX3xzQ+2MhzqH58mIff45I/2G2
- Z+fggcLOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiDJcY5gpxfNrroHpaYXlL
- jfep0EmF72oj+RkWrJ5cdDFY3m32Zmml+TcaOmskvm7UAAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26737.mbox b/cve/published/2024/CVE-2024-26737.mbox
index 1e19affb..1feabbfc 100644
--- a/cve/published/2024/CVE-2024-26737.mbox
+++ b/cve/published/2024/CVE-2024-26737.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26737: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel
-Message-Id: <2024040359-CVE-2024-26737-a9c3@gregkh>
-Content-Length: 3462
-Lines: 88
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3551;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=eASFuwIqaJqgSF9uwVIZXdmLhXi5W9uRKO+XL7sLNSI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k4J/trfuYs9Zu+ti3XFvBdF7PWbfHfc65R161aa0Q
- DbAcVV8RywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExEMYJhftrWHxc56gq07oYy
- HnS89udf3uoVVxnml1y0cn6QrPAv8H3KIv1+u3lBx/3+AQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26738.mbox b/cve/published/2024/CVE-2024-26738.mbox
index 7ce1bb8b..cc76d901 100644
--- a/cve/published/2024/CVE-2024-26738.mbox
+++ b/cve/published/2024/CVE-2024-26738.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26738: powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller
-Message-Id: <2024040300-CVE-2024-26738-844b@gregkh>
-Content-Length: 4666
-Lines: 105
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4772;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=4k6QZz1BtjTEkAUlEQ1mnEoRNzPoNzR/oTYTDaemiOQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k0I48xjeyh5aPf/Rm0JPEe7Nqz86S+n0mN6+V7229
- uGtizLeHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRVcUMCxq23/50fkehiujc
- KWa/nI9ckLNcLcewYMf9zRKPUi6+WXlQy/qtkkZxj4ibBwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26739.mbox b/cve/published/2024/CVE-2024-26739.mbox
index a5ae00d5..bddbb77c 100644
--- a/cve/published/2024/CVE-2024-26739.mbox
+++ b/cve/published/2024/CVE-2024-26739.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26739: net/sched: act_mirred: don't override retval if we already lost the skb
-Message-Id: <2024040300-CVE-2024-26739-170e@gregkh>
-Content-Length: 2115
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2170;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=qMGFp9At34AoLgoHZnZ9hy92dFmdn3o1a8UkFB5rr5I=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k0K6nsxO3SX7xVlMLvUsX4DSIi0FJ910rscuXzJfi
- Sx49MKxI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACbyOY5hfoZ4hdNfvt2/KzT2
- tXrXcvE8FWM7wrCgdWrZEtfP0o5/L+to7hZ47LJs6QYJAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26740.mbox b/cve/published/2024/CVE-2024-26740.mbox
index 0269a7ea..f8cae285 100644
--- a/cve/published/2024/CVE-2024-26740.mbox
+++ b/cve/published/2024/CVE-2024-26740.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26740: net/sched: act_mirred: use the backlog for mirred ingress
-Message-Id: <2024040300-CVE-2024-26740-4d6f@gregkh>
-Content-Length: 2679
-Lines: 65
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2745;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Nq/FZCQ5BuMkZh6xOgqkaoJ+iRTN1IcRIuLQUvzRtzM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k0IOuVSJe/KH3flotYMzp1w/rFk8fpfR+xaXVFW5C
- nbDJZs6YlkYBJkYZMUUWb5s4zm6v+KQopeh7WmYOaxMIEMYuDgFYCLbTBgWHOS7fO7+tYYA3/ev
- 1aUfTDXW2c9ZzTBXLvj8jhk3p5UvWJfs3DxxoVKi25l2AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26741.mbox b/cve/published/2024/CVE-2024-26741.mbox
index 13a51d12..a22bd872 100644
--- a/cve/published/2024/CVE-2024-26741.mbox
+++ b/cve/published/2024/CVE-2024-26741.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished().
-Message-Id: <2024040300-CVE-2024-26741-961e@gregkh>
-Content-Length: 6917
-Lines: 144
-X-Developer-Signature: v=1; a=openpgp-sha256; l=7062;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=YWSLOi4vsNj1OrxQTU4Jq5T03w14V+QS3IZlhQQS2lg=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k0J6Tupn/GL/kXpq81xZ1Y/u/CfnC3w0kj76O/JZ9
- /7m/jq2jlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjI6hMM80ynh6WvC2IP9zGr
- nOyTcyOE08CknGHBDEHtL5lnufuOadSFvfGouhcX3XsTAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26742.mbox b/cve/published/2024/CVE-2024-26742.mbox
index 58b4d7fc..6514f561 100644
--- a/cve/published/2024/CVE-2024-26742.mbox
+++ b/cve/published/2024/CVE-2024-26742.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26742: scsi: smartpqi: Fix disable_managed_interrupts
-Message-Id: <2024040301-CVE-2024-26742-1b19@gregkh>
-Content-Length: 4751
-Lines: 95
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4847;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=gS3g6xsjLIpzk7J44q10tSAg/Ew8FCtqqmLLf8k+6gk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k0JZAkStjXV5tDumG80TLmWp/R0x8ywvo+/fyzdzV
- rcfVbLuiGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIlU9zAsOHv3kxODq8Rsk9h7
- 9vwfTPbyJ+6RYVgwacnv65Kzcndu3G17qKgkv2ZDWFIEAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26743.mbox b/cve/published/2024/CVE-2024-26743.mbox
index e921966a..48d44675 100644
--- a/cve/published/2024/CVE-2024-26743.mbox
+++ b/cve/published/2024/CVE-2024-26743.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26743: RDMA/qedr: Fix qedr_create_user_qp error flow
-Message-Id: <2024040301-CVE-2024-26743-6034@gregkh>
-Content-Length: 6151
-Lines: 118
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6270;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=NgfuQFh7fL2YkoxIsaSBf+Eg5hT/ehyaMseDKabLyLM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k0IbLvKJptf+Vd/7JF1ZpEXeTVBmt7jXg/+fV7nPm
- z1hYwFLRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEykRohhNquzrJTxznjnn6//
- LnCyceS46X3pKsOCmVNWFcRmK135VVLEx6TW7S6d3/ILAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26744.mbox b/cve/published/2024/CVE-2024-26744.mbox
index add843b1..fc86bde2 100644
--- a/cve/published/2024/CVE-2024-26744.mbox
+++ b/cve/published/2024/CVE-2024-26744.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26744: RDMA/srpt: Support specifying the srpt_service_guid parameter
-Message-Id: <2024040301-CVE-2024-26744-d344@gregkh>
-Content-Length: 2974
-Lines: 71
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3046;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=US2Nldjxr+PSrwREFRwiGWU2aBb0Au7HCTf7BnMfjrU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k0I7bpVLcDa8n79ZrHbeXw0FhjkTKzYv/p8/W25fs
- nuacS5jRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEyEIYBhNovvlKw/GkfCUgsj
- DT7zZBYFL920jmF+2Zol35RkNhs3cojNti16vGDNoSPLAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26745.mbox b/cve/published/2024/CVE-2024-26745.mbox
index 88d27a5b..17056ab5 100644
--- a/cve/published/2024/CVE-2024-26745.mbox
+++ b/cve/published/2024/CVE-2024-26745.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26745: powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV
-Message-Id: <2024040454-CVE-2024-26745-fa88@gregkh>
-Content-Length: 5672
-Lines: 131
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5804;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=FvoBHpT5EWQTomgcNeEmCt1WU7nsvS8EFsLCF1jHV8g=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yXHBAi/fnJeLWnZ3Q8yV1uqCffE3xXRt3sfGZdYfD
- l+coH+rI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACZyfAPDgmOXtimsdXDIEjtn
- 8Uxzrspx94lN7xgWHJ20YfcD/nusWVcP/V91Y6Xc6jdT/gAA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26746.mbox b/cve/published/2024/CVE-2024-26746.mbox
index d3aef991..1e9bce3c 100644
--- a/cve/published/2024/CVE-2024-26746.mbox
+++ b/cve/published/2024/CVE-2024-26746.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26746: dmaengine: idxd: Ensure safe user copy of completion record
-Message-Id: <2024040457-CVE-2024-26746-8aa9@gregkh>
-Content-Length: 4873
-Lines: 104
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4978;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=+eUp0xnXA327G7wqHWyRfnBsYIxgMyE619EysXInvoU=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yYkX13F6T1lSO+l+y4KUnd3/5i8vfHpKsPe2kOLE/
- ab2UifiOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiiXsY5meKvJHu5ty900n4
- S4vumhVPdpSar2aYp5rD/eGql9/Vk/OP2qmfvvGi6Jd7IwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26747.mbox b/cve/published/2024/CVE-2024-26747.mbox
index b3fc05f6..b58e2599 100644
--- a/cve/published/2024/CVE-2024-26747.mbox
+++ b/cve/published/2024/CVE-2024-26747.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26747: usb: roles: fix NULL pointer issue when put module's reference
-Message-Id: <2024040301-CVE-2024-26747-50b0@gregkh>
-Content-Length: 2876
-Lines: 64
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2941;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=5l9AYOpgfP2OzPsnUeKdYMfv7Z+nQZztGGNXKx6NF6Y=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k8LevEi+7727rHnFN4ZJrtMehxsv3PV+6/ppq8vPr
- /R5vlb+V0csC4MgE4OsmCLLl208R/dXHFL0MrQ9DTOHlQlkCAMXpwBM5Js9w4I1urPX/DTavpjn
- 14+wTM34s/Y/N8kzzFMz/7Axo/dxwuyafZqChpPEOHdJ+QIA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26748.mbox b/cve/published/2024/CVE-2024-26748.mbox
index 877eef36..b6936ef7 100644
--- a/cve/published/2024/CVE-2024-26748.mbox
+++ b/cve/published/2024/CVE-2024-26748.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26748: usb: cdns3: fix memory double free when handle zero packet
-Message-Id: <2024040302-CVE-2024-26748-f000@gregkh>
-Content-Length: 3638
-Lines: 82
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3721;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=fXiU8fQuGL08sWEfXBGodHW2j0DwaK8qVVBBNDghAVQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k8Lk35p4NkaczjSfdnAdz4rdGQFa9Ypp282z/iuke
- E/5EfinI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACbi2M4w3/cdd/ecvp5/dy3n
- xefPdGCvPX/ZiWGeSd2tB29dRc70PT1h03B+krDgDPGDAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26749.mbox b/cve/published/2024/CVE-2024-26749.mbox
index 85620d28..e5d9225b 100644
--- a/cve/published/2024/CVE-2024-26749.mbox
+++ b/cve/published/2024/CVE-2024-26749.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26749: usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()
-Message-Id: <2024040302-CVE-2024-26749-eac4@gregkh>
-Content-Length: 3311
-Lines: 76
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3388;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=e+R5M6Qi3Qg4jMyZu8YlZGFuUd1HdFI4WT0DSe8MPoc=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k8J+HJ+wyK1uQpt+lfJK93d7y5a5L3fRbtrAceHMI
- RuLs57SHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRSVcZ5hn2yfSevbrOUWOV
- nNt77XXFt43e/GJYsD9gzUWe+nmTVrhfbY6eX25+NdniMgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26750.mbox b/cve/published/2024/CVE-2024-26750.mbox
index 4c4ece8c..05eafdf1 100644
--- a/cve/published/2024/CVE-2024-26750.mbox
+++ b/cve/published/2024/CVE-2024-26750.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26750: af_unix: Drop oob_skb ref before purging queue in GC.
-Message-Id: <2024040457-CVE-2024-26750-4468@gregkh>
-Content-Length: 3957
-Lines: 94
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4052;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=9tkpe3fxoGaI4zYD9HiJ0EP0cg8NlQnW2eeHODT5dIo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yYk/9Y9Ouy16YsKJg7OeJXTN+d7xS6n0W37u11+bN
- z1Sq8r93xHLwiDIxCArpsjyZRvP0f0VhxS9DG1Pw8xhZQIZwsDFKQATmczJML90RkuYDS/LeoeM
- 3dvUJU6JfFz2SJphwYIed1bLREXt/OSYhBbGtmlb7LacAAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26751.mbox b/cve/published/2024/CVE-2024-26751.mbox
index a79e33cc..95b10357 100644
--- a/cve/published/2024/CVE-2024-26751.mbox
+++ b/cve/published/2024/CVE-2024-26751.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26751: ARM: ep93xx: Add terminator to gpiod_lookup_table
-Message-Id: <2024040302-CVE-2024-26751-fd31@gregkh>
-Content-Length: 2801
-Lines: 61
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2863;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=dKTJFrLNc3o78KZa2iPpEkNxzNxMLN8cKeqGSxkSvDE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k8LEt1bsXDxfdLLBusuXElPaqt8cOv1bxtLk6jnmU
- K3CWeYXOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAi//4wLFj/3HIPA9P3L1/Y
- CzISjN5d36Aq5M+wYO76NZUL531jLHSVklI6c8M3i2PtUgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26752.mbox b/cve/published/2024/CVE-2024-26752.mbox
index 57e28418..e7e01099 100644
--- a/cve/published/2024/CVE-2024-26752.mbox
+++ b/cve/published/2024/CVE-2024-26752.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26752: l2tp: pass correct message length to ip6_append_data
-Message-Id: <2024040302-CVE-2024-26752-cb0a@gregkh>
-Content-Length: 3402
-Lines: 77
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3480;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=7HlEoqsPR3DQ7lZpxGt563GCBIQkrapaATGjfYqPvzQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k8IVFjYLT9R8FqOnnNmaIBkn+fHfJuWgD3GhGse9w
- 3a91V/REcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABOJK2NY0C3p+VPh8BaGAAVl
- Dh8Po9OSwqx7GRacK4o1V5x0YWtZ0YeeAKEr28T4K1IB
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26753.mbox b/cve/published/2024/CVE-2024-26753.mbox
index 4a9ff230..7a228e4e 100644
--- a/cve/published/2024/CVE-2024-26753.mbox
+++ b/cve/published/2024/CVE-2024-26753.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26753: crypto: virtio/akcipher - Fix stack overflow on memcpy
-Message-Id: <2024040303-CVE-2024-26753-b93a@gregkh>
-Content-Length: 2563
-Lines: 60
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2624;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Ff2lyuP8XuHSi3v4oL0pSxMqOw3WLCoGUYLEIhVgN2E=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k8Kv/BGpvd08/c48gcArCRGNe+Qbfx+WiH5c5Gm2W
- rZvl3NERywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExE4zDD/MRN0wIf75PM+7hJ
- QWqqV2nCNkWbEwwLzgpwpvit3qQYtK30JO9i0ZrpAS4LAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26754.mbox b/cve/published/2024/CVE-2024-26754.mbox
index 85d734ff..7d0b3c1f 100644
--- a/cve/published/2024/CVE-2024-26754.mbox
+++ b/cve/published/2024/CVE-2024-26754.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26754: gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()
-Message-Id: <2024040303-CVE-2024-26754-b34f@gregkh>
-Content-Length: 4741
-Lines: 107
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4849;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=EmJqhw8gMg+hdoAObWrNivoe1mOnUuNxbk2TJ0SbmmQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k8Jn/HnBvCB69bpzioIfxbt9euK899RN+tC7guPFm
- 6Xf1wo97IhlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJ6J1gmJ8/qWhXstYz9Ruh
- 2s7skxXlIzQ+qzEsWMg9x3vft8l1PCVOuq0umfE825j8AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26755.mbox b/cve/published/2024/CVE-2024-26755.mbox
index 8994e85e..aed3ccba 100644
--- a/cve/published/2024/CVE-2024-26755.mbox
+++ b/cve/published/2024/CVE-2024-26755.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26755: md: Don't suspend the array for interrupted reshape
-Message-Id: <2024040303-CVE-2024-26755-947e@gregkh>
-Content-Length: 2652
-Lines: 70
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2723;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=jjHbPtP1AL2Ovp2HaQ1kJwvyoBCzBq0Oa+NLscxnGlQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k8ITFjw8u1xczcOP9Z01Q8qJ60du1e8s3fqI+9BGx
- hnzUnWiO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAij0wZ5pd7XQxYfqJQb+GS
- i2vs5667yN8ueYFhvmvcz/enftv3TWSY59Kzcd9yDv0ZBwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26756.mbox b/cve/published/2024/CVE-2024-26756.mbox
index c65471a1..27dccc0f 100644
--- a/cve/published/2024/CVE-2024-26756.mbox
+++ b/cve/published/2024/CVE-2024-26756.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26756: md: Don't register sync_thread for reshape directly
-Message-Id: <2024040303-CVE-2024-26756-135f@gregkh>
-Content-Length: 2936
-Lines: 82
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3019;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=UFh24MHhotrF7JXNXXQFEm4xESOlqpFRdQmCclx8LOA=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8kyK2H9lYIlj/1Gn6GqEi73suK3cfnvDBrmxnQ9/qm
- z8lDP9c6ohlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJhBYzzNN2b5n9qCrDQjOs
- pyF1h02+lqSMNMP84tPfvA79W3qxunYxx4M979Zo3i+eAwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26757.mbox b/cve/published/2024/CVE-2024-26757.mbox
index b60fc5d7..5c229232 100644
--- a/cve/published/2024/CVE-2024-26757.mbox
+++ b/cve/published/2024/CVE-2024-26757.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26757: md: Don't ignore read-only array in md_check_recovery()
-Message-Id: <2024040304-CVE-2024-26757-7f96@gregkh>
-Content-Length: 3178
-Lines: 93
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3272;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=6uoTuGjxhaJV2FRhH+z5MLDWHbhG8qHGQkpuj2pYW78=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8kyK+xy6c0Pji+ZL320v8rT4GMB1RKfn4cdnGb8u5f
- ql16uz93xHLwiDIxCArpsjyZRvP0f0VhxS9DG1Pw8xhZQIZwsDFKQAT0XVmmCv6bEWVtdvm/6dv
- iFdNv7nWMYS7249hwVHpN5aC/x5XLdDfd4h3UsfEZ8tvnAAA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26758.mbox b/cve/published/2024/CVE-2024-26758.mbox
index 2483a5a4..2b55708a 100644
--- a/cve/published/2024/CVE-2024-26758.mbox
+++ b/cve/published/2024/CVE-2024-26758.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26758: md: Don't ignore suspended array in md_check_recovery()
-Message-Id: <2024040304-CVE-2024-26758-dcc3@gregkh>
-Content-Length: 2749
-Lines: 82
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2832;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=QTem4Lb9s38RUXJrZaTHnRS1hVo/7eXLppImqag6jN0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8kyICngoVR7FMP3NIbMNT1tsreXQ/r5+wKEDYRc+zK
- Oji9eN3O2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiHr8Z5uesn9m1a/eEGN2l
- 7WmGfFO64vOtnRgWXPxjuEBq8evJvMf4zu9/tv++XNaOJwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26759.mbox b/cve/published/2024/CVE-2024-26759.mbox
index 8164163e..30883257 100644
--- a/cve/published/2024/CVE-2024-26759.mbox
+++ b/cve/published/2024/CVE-2024-26759.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26759: mm/swap: fix race when skipping swapcache
-Message-Id: <2024040304-CVE-2024-26759-45f1@gregkh>
-Content-Length: 5617
-Lines: 134
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5752;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Vj8iQSUBMsVQccT6wIfM7cth+K3NuLTC5BnyE7UqtFQ=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8kyJsfk3Ykp4YLmL3mTM+701xwvNZ8tu3bj375li84
- /TTB7LzO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAia/YxzPc0fP+gJUHo+gIN
- S5b9teZLEuZuO8iwYNH8lQuVzgRPLDl4dapt0eLJSdVdzgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26760.mbox b/cve/published/2024/CVE-2024-26760.mbox
index a8017ccc..ee533dca 100644
--- a/cve/published/2024/CVE-2024-26760.mbox
+++ b/cve/published/2024/CVE-2024-26760.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26760: scsi: target: pscsi: Fix bio_put() for error case
-Message-Id: <2024040305-CVE-2024-26760-560a@gregkh>
-Content-Length: 2208
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2263;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=cDyni4FM9gBpOjaQ8UC+jEViLPijxVNCpYcB+Q4osTw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8kyJXPjC8dawz/6Kjz7uvz/tu7VYPF1Er9nP+WbHy4
- cLAbJvujlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZiIbTvDPONVu5bv+Obk/b/W
- LCn5xYblb7/0lDHMFc8Myy4Sf9nU5PZwxal/kkZ6E6tlAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26761.mbox b/cve/published/2024/CVE-2024-26761.mbox
index a4af0976..e251ce86 100644
--- a/cve/published/2024/CVE-2024-26761.mbox
+++ b/cve/published/2024/CVE-2024-26761.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26761: cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window
-Message-Id: <2024040305-CVE-2024-26761-0646@gregkh>
-Content-Length: 2951
-Lines: 71
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3023;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=SaHhIjDMGN2sdtrmTd3Fh8arHAhb6c5UIYH5H/GZZf8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8kyI/fF8me4jRN0DuhxojM//OTZMKD3VKTRPa/K803
- v7ZzSP8HbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjARXXGG+cnr07rsElwTFOTY
- j751/8S9vXzuC4a58vHbz0hqp74WkZj/Wfv1HrewzSIvAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26762.mbox b/cve/published/2024/CVE-2024-26762.mbox
index cf205acc..0b4a0c96 100644
--- a/cve/published/2024/CVE-2024-26762.mbox
+++ b/cve/published/2024/CVE-2024-26762.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26762: cxl/pci: Skip to handle RAS errors if CXL.mem device is detached
-Message-Id: <2024040305-CVE-2024-26762-b719@gregkh>
-Content-Length: 3123
-Lines: 84
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3208;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=3NdfSdwIeEPav5BTMddH3nfS+Gd5ZRB8fPLOeH0GARY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8kyKvnrhW07bIZE34de0CcYYdc2bpvs74cmepvvjpQ
- 4kyV0yOdsSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEcgIZ5oe0LK+V1G3dsnnq
- 5i8167YdDpbacoBhvt/jMKkr8ccferKu7y7sd3jkJBDGCgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26763.mbox b/cve/published/2024/CVE-2024-26763.mbox
index 6b6960cf..bb62658a 100644
--- a/cve/published/2024/CVE-2024-26763.mbox
+++ b/cve/published/2024/CVE-2024-26763.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26763: dm-crypt: don't modify the data when using authenticated encryption
-Message-Id: <2024040305-CVE-2024-26763-4627@gregkh>
-Content-Length: 2673
-Lines: 68
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2742;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=qiZyaYKiWWfd8fcmxVQS+2O/+idaozgrsD78BHuNhY8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8kyK50rrtS5I5d9pUdtu/irTbv9Pi1/zWfr39Mxbbm
- HBtFmjuiGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIn0T2BYsK1L+3zJh6LoGUWu
- fU/3yYitmHY1kmF+uN2e1ZudzKPaxZU/CscdOGlpOV8dAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26764.mbox b/cve/published/2024/CVE-2024-26764.mbox
index 1d1c5b6c..191b8240 100644
--- a/cve/published/2024/CVE-2024-26764.mbox
+++ b/cve/published/2024/CVE-2024-26764.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26764: fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio
-Message-Id: <2024040306-CVE-2024-26764-c1e7@gregkh>
-Content-Length: 2825
-Lines: 79
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2905;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Y8XXmr7+diExytf+QT1KlgzBksCetACjoWyWnw9he2U=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k6JCfu5iO6+s9lA4qfZs9qpDyVuPrvD8fe5deBlD9
- iVr8fTejlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjI5ksMC1qX5/Mah06f+Hid
- KPetfXleWxir/Rjm2Qf4F+9S1Z3odI3ve8MR1rLvDuarAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26765.mbox b/cve/published/2024/CVE-2024-26765.mbox
index 8f7fcd29..d3dbea65 100644
--- a/cve/published/2024/CVE-2024-26765.mbox
+++ b/cve/published/2024/CVE-2024-26765.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26765: LoongArch: Disable IRQ before init_fn() for nonboot CPUs
-Message-Id: <2024040306-CVE-2024-26765-157f@gregkh>
-Content-Length: 4387
-Lines: 97
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4485;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=+ZxRSQeHL35LRUzd0jP+bWFdxBURXlxS/Iv6fKK8I3c=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k6ICflT15d5OCvx0+dWTC8961bTW7pthtvHbJMP2x
- mnLug8qdsSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEfDUY5tkxe307lxmgaFqk
- fNYwUb9tJVfUZIb57nlfrr7VUZzh7VD1JfWf8I6XBVXXAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26766.mbox b/cve/published/2024/CVE-2024-26766.mbox
index 691daa88..50de1697 100644
--- a/cve/published/2024/CVE-2024-26766.mbox
+++ b/cve/published/2024/CVE-2024-26766.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26766: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error
-Message-Id: <2024040306-CVE-2024-26766-6b6a@gregkh>
-Content-Length: 5079
-Lines: 126
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5206;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=M3jZShr4PScL080QA62qkDUXdlcNkhQA78NnsEeyZD0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k6KO6Lv2MBbff6AiLejFrxZ7/5VJmKDWvVXnJQ9Xx
- Wy1PdLeEcvCIMjEICumyPJlG8/R/RWHFL0MbU/DzGFlAhnCwMUpABO5dodhfopih9/lz1ZiX+R2
- Xlk1qTEqZalsIcM8y9ucXhuzbyxRuZvg4Rmbc5e5WKsOAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26767.mbox b/cve/published/2024/CVE-2024-26767.mbox
index 2fc06a15..d30b0c81 100644
--- a/cve/published/2024/CVE-2024-26767.mbox
+++ b/cve/published/2024/CVE-2024-26767.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26767: drm/amd/display: fixed integer types and null check locations
-Message-Id: <2024040306-CVE-2024-26767-bdac@gregkh>
-Content-Length: 1842
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1897;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=jvnh6G3zsaPZZaLoICPezXkN1qlreGc+/WOmv31XXWk=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k6KVm6Z0PmC/Kl0bn6C7fMnaR5ttTP9vNP3N5L88Y
- cXNzvqOjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjIhfcMC3qfHpV+WTotX7Kj
- KDbw4LSuJRWTmhnmV4Z/2XIpdxmfwKJ6admVHW18H2bcBQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26768.mbox b/cve/published/2024/CVE-2024-26768.mbox
index 2ed740fd..d933e37d 100644
--- a/cve/published/2024/CVE-2024-26768.mbox
+++ b/cve/published/2024/CVE-2024-26768.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26768: LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]
-Message-Id: <2024040307-CVE-2024-26768-efa4@gregkh>
-Content-Length: 5449
-Lines: 104
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5554;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=i4xg3XsVNrFqEmQNY0J5rgCB9uGfjiSFuMVsBLsc4kM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k6In99/Qdsr3NzaKVKn2rXunY9XVrvRGRKPJut75/
- 7qvduIdsSwMgkwMsmKKLF+28RzdX3FI0cvQ9jTMHFYmkCEMXJwCMJGjEQxzRVoFtCI3TNr6rX3X
- 9VVv9qrN3ZanyrBgl/D2s1mztUoyDkao+R15trJ+3tZkAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26769.mbox b/cve/published/2024/CVE-2024-26769.mbox
index e432ef27..09f3f010 100644
--- a/cve/published/2024/CVE-2024-26769.mbox
+++ b/cve/published/2024/CVE-2024-26769.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26769: nvmet-fc: avoid deadlock on delete association path
-Message-Id: <2024040307-CVE-2024-26769-e9cc@gregkh>
-Content-Length: 2018
-Lines: 55
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2074;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=LhgInaNiML2XM1nZzlK9kv1RCr7Z+Rcpq6QLtTMi5Ys=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k6I58ptjtF8I1F8Sadtcs3mxfD9jbJmCKy9T4YmEV
- rl2H+WOWBYGQSYGWTFFli/beI7urzik6GVoexpmDisTyBAGLk4BmIh5JcP8rFCTjcd5ZtX2nlhj
- 3hLC7Tvl7ruFDAs2er85yDCj+7yn9z67A2+WLF+bEyAIAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26770.mbox b/cve/published/2024/CVE-2024-26770.mbox
index 521ea8e2..a3d3643a 100644
--- a/cve/published/2024/CVE-2024-26770.mbox
+++ b/cve/published/2024/CVE-2024-26770.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26770: HID: nvidia-shield: Add missing null pointer checks to LED initialization
-Message-Id: <2024040307-CVE-2024-26770-1c08@gregkh>
-Content-Length: 1846
-Lines: 53
-X-Developer-Signature: v=1; a=openpgp-sha256; l=1900;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=HnXXXrMzvT3u0HWgvAmbqzQ9Zcm12vpX1L1wb/kHMM4=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k6L1wrex6LxXXM0epd91fsfq+zkFj++ZLVQ6ocLz/
- njrzi+ZHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRjUEM8+zWpDUctu+UTlwk
- 5/lHZILmo/XHchnmmR+Rvr/TyPrMPf92jpCwfeb2TJ/+AQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26771.mbox b/cve/published/2024/CVE-2024-26771.mbox
index d2776ca3..f0925acf 100644
--- a/cve/published/2024/CVE-2024-26771.mbox
+++ b/cve/published/2024/CVE-2024-26771.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26771: dmaengine: ti: edma: Add some null pointer checks to the edma_probe
-Message-Id: <2024040307-CVE-2024-26771-b6de@gregkh>
-Content-Length: 2139
-Lines: 57
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2197;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=enXfd0sGj75sgjvw55bQFv3akHvHg0/6Ad5IVqReNdM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k2JSRZKlG+We6hxuXP39D6uBUfsVvbuLXf/b9XC9+
- BbksnRtRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEyELYJhrvA/9dUnPX/Ib6g4
- /vzV52ZltuSzygwLmlS3dt2I6BGaeaWpbade7/TuaNEuAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26772.mbox b/cve/published/2024/CVE-2024-26772.mbox
index 5791b070..c0a3bc7e 100644
--- a/cve/published/2024/CVE-2024-26772.mbox
+++ b/cve/published/2024/CVE-2024-26772.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26772: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()
-Message-Id: <2024040308-CVE-2024-26772-5168@gregkh>
-Content-Length: 2390
-Lines: 61
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2452;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=pmXTZI2EdALtY7P18hbv1n9PIynpHJ52RQc3/qyvQO0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k2Jy1k9XmMi5NNvd0cl0ucO3q/Gmpe9zw96xf3501
- OnXnZWXO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAi5xMZ5mdw965T/mOfG/+q
- 88wC1eyEq1+4LRgWLD6d3MEy5Xm4eS3b94Dt0roPYpaHAQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26773.mbox b/cve/published/2024/CVE-2024-26773.mbox
index 95e80890..5bbfa166 100644
--- a/cve/published/2024/CVE-2024-26773.mbox
+++ b/cve/published/2024/CVE-2024-26773.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26773: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()
-Message-Id: <2024040308-CVE-2024-26773-a314@gregkh>
-Content-Length: 3027
-Lines: 78
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3106;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=XmmRHDbYsMZSoTfqVAw0m6fbnY6SQdAzFs9QoaH2OGc=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k2JcO350K7RtMW6YsGLXrU+u2eUx6nEZqTIqq5fJ2
- DpqtSZ0xLIwCDIxyIopsnzZxnN0f8UhRS9D29Mwc1iZQIYwcHEKwER6JzHM97vpfev1Vz4rV6Mq
- lhXt1289NfgkxzCH6++h1f5nv/7VdA2RsOqVLDsYz8cJAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26774.mbox b/cve/published/2024/CVE-2024-26774.mbox
index 1f91aa62..c0d82a01 100644
--- a/cve/published/2024/CVE-2024-26774.mbox
+++ b/cve/published/2024/CVE-2024-26774.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26774: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt
-Message-Id: <2024040308-CVE-2024-26774-52d9@gregkh>
-Content-Length: 2004
-Lines: 54
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2059;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=+PJF6zPqNW359vge20WMvVNKpqTCoF0Rz5iXLCSgzoI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k2JC4t22iUzYYHRn3r3NU8O6Vu5U+DDhm9XTJk2Ou
- p2nGb8u7ohlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJJBxjmF90J6xlxbp4V8XT
- cx/ftTt04PVzliSG+SH5T29MShdJeZapr/6CYVf+pFauEgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26775.mbox b/cve/published/2024/CVE-2024-26775.mbox
index eed10f13..951cccf4 100644
--- a/cve/published/2024/CVE-2024-26775.mbox
+++ b/cve/published/2024/CVE-2024-26775.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26775: aoe: avoid potential deadlock at set_capacity
-Message-Id: <2024040309-CVE-2024-26775-8dc1@gregkh>
-Content-Length: 2595
-Lines: 73
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2669;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=XgGeM99czrP+qwBrf1VMzfazqYuLQ8XWwkA6gkJhgdE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k2I3bNy3+K+WjuAnZi3lM2VMPRvvuUgdLpzdzrA09
- ZCb8IR5HbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRPn2G+fH/JrzNvcOwf3bx
- rC1msevOPr132JZhQV/nmbXGuw5PbJumKcPk+EtWqKA+FgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26776.mbox b/cve/published/2024/CVE-2024-26776.mbox
index e2eb2abe..58270aba 100644
--- a/cve/published/2024/CVE-2024-26776.mbox
+++ b/cve/published/2024/CVE-2024-26776.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26776: spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected
-Message-Id: <2024040309-CVE-2024-26776-8119@gregkh>
-Content-Length: 2386
-Lines: 64
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2451;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=nITdqCi/jk5SB6w8jrh1bQIu/ZBXoYNrNmYLAPvjHJs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k2JZJ/+ovB874e/N18eddR7v+fKn8Li04v5jYRNfz
- PMQusSm3RHLwiDIxCArpsjyZRvP0f0VhxS9DG1Pw8xhZQIZwsDFKQATCTVkmB/l/7twa1Hea9fL
- LVobVDYemrOGYwbD/OIpjCxMLAGW2hVfFaS7mD77SW2YDwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26777.mbox b/cve/published/2024/CVE-2024-26777.mbox
index dde34cf5..112a7d0f 100644
--- a/cve/published/2024/CVE-2024-26777.mbox
+++ b/cve/published/2024/CVE-2024-26777.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26777: fbdev: sis: Error out if pixclock equals zero
-Message-Id: <2024040309-CVE-2024-26777-3c7c@gregkh>
-Content-Length: 2598
-Lines: 68
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2667;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=7sPMPtOZf0HnCICm01eryqzd7UV4GNwbmWG3rNtZt6g=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k2IfvnT4x5ZvlS8c9fD501sXnzE0Zgr21C3UuLTik
- 9nE6RcXdcSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEFm9gmB+0ZXrUoZMKp/on
- 2b+24WToeSzysp9hfrL7mqAbDJriyp3baxdvjFmUePDIIQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26778.mbox b/cve/published/2024/CVE-2024-26778.mbox
index 35104cb7..49eae4de 100644
--- a/cve/published/2024/CVE-2024-26778.mbox
+++ b/cve/published/2024/CVE-2024-26778.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26778: fbdev: savage: Error out if pixclock equals zero
-Message-Id: <2024040309-CVE-2024-26778-8137@gregkh>
-Content-Length: 2699
-Lines: 69
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2769;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=JAH2gq7bH26N45a/FwyQlDtdHyHl+YPj3rqGFleaLUE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k2LDEm6EaU1b83xSdsWCnotRE/bkv3TP+zBPpeC3O
- NvZ3ktJHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCR6CMM87RCjO5vVX99k51z
- xiFFzs5rP+L++DPM03nhImayS3ex3qTg9bsWesWaFG8IBAA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26779.mbox b/cve/published/2024/CVE-2024-26779.mbox
index 12fcdf73..7988eac2 100644
--- a/cve/published/2024/CVE-2024-26779.mbox
+++ b/cve/published/2024/CVE-2024-26779.mbox
@@ -1,19 +1,8 @@
-From bippy-d3b290d2becc Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26779: wifi: mac80211: fix race condition on enabling fast-xmit
-Message-Id: <2024040310-CVE-2024-26779-8030@gregkh>
-Content-Length: 2532
-Lines: 64
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2597;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=9Ml5Do+WhffeRw1VEhmdLdVyrTBcG7uRRqMs5XkfY7I=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGm8k+IO2vOqRZw7z/vTurB+duxy06/VIfkrbMuUTnQ66
- q8717aiI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACbCtY1hvh/fO9UPDwSNd59P
- URWct0h8xfnXDxjm6XxdHlRk/WSGoQXTG0FDCfn1/YziAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26780.mbox b/cve/published/2024/CVE-2024-26780.mbox
index bb95db5b..2b6a5c5a 100644
--- a/cve/published/2024/CVE-2024-26780.mbox
+++ b/cve/published/2024/CVE-2024-26780.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26780: af_unix: Fix task hung while purging oob_skb in GC.
-Message-Id: <2024040458-CVE-2024-26780-9951@gregkh>
-Content-Length: 5158
-Lines: 115
-X-Developer-Signature: v=1; a=openpgp-sha256; l=5274;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=RBRKBoDPG9GtAqDAXgZvSUwH1NNsAVlC4gcxCuYW6Ys=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yUmlTlPfTJfukbvekv9j6+kjEzWUFsc9V5u/9Ftl0
- Lljl3r+d8SyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEPnQwzC//laWjtzo42IhN
- 6Ytyy8fw3aGL9RjmZxWo837mX9bbY/DXmMVW00HSyfYTAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26781.mbox b/cve/published/2024/CVE-2024-26781.mbox
index ef242e83..e00b665f 100644
--- a/cve/published/2024/CVE-2024-26781.mbox
+++ b/cve/published/2024/CVE-2024-26781.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26781: mptcp: fix possible deadlock in subflow diag
-Message-Id: <2024040458-CVE-2024-26781-0389@gregkh>
-Content-Length: 6146
-Lines: 133
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6280;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Iq724xf8zDBBub7jZWKHHvFxMDuiC6Q2EYn7C+3ZR9I=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yUktj73q//yZ/27H1ZUsigyTXkyseCZ6+fOGAt3i4
- hxvxSmdHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRuSUM810+CB83nHpIO/tk
- VViCiTartbmfL8M862ubpS+cdv5i+OS4qaim1NTbh5WLAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26782.mbox b/cve/published/2024/CVE-2024-26782.mbox
index 4cab93ba..20d9aa17 100644
--- a/cve/published/2024/CVE-2024-26782.mbox
+++ b/cve/published/2024/CVE-2024-26782.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26782: mptcp: fix double-free on socket dismantle
-Message-Id: <2024040458-CVE-2024-26782-71ca@gregkh>
-Content-Length: 6675
-Lines: 164
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6840;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=cqtIbh0i0IOKaKgsivelwxmS/u3RRz1izCaqb/UVT00=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yUl9BUvLHB2ffz0fUG3V+cWHh2nm1pBN8T28Iew1C
- 0IM8391xLIwCDIxyIopsnzZxnN0f8UhRS9D29Mwc1iZQIYwcHEKwETOdjIsmGf2TWCHYFFRS0QU
- u9MdLl0NC64LDPMDrL+dOvX/g5z9sae+Gl9ERK9kszcCAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26783.mbox b/cve/published/2024/CVE-2024-26783.mbox
index 6da6c163..a7b2b022 100644
--- a/cve/published/2024/CVE-2024-26783.mbox
+++ b/cve/published/2024/CVE-2024-26783.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26783: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index
-Message-Id: <2024040458-CVE-2024-26783-68c8@gregkh>
-Content-Length: 3973
-Lines: 99
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4073;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=tolXngncyBYkNcuWluUEVSd+L6TQSC/JcwNv4A9qFw4=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yUmdj++ffRKhKz15Otuvqfcfm++4+nj7Fu2MS86Fx
- 4VXPNu4uiOWhUGQiUFWTJHlyzaeo/srDil6GdqehpnDygQyhIGLUwAmMm0bwzxdvXfMHx2qL4d4
- Gx97tHmbb43EAQuGeYZScu13r877ebV7Hpv8IjNHjfVCswE=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26784.mbox b/cve/published/2024/CVE-2024-26784.mbox
index c1f9fc05..ecac786f 100644
--- a/cve/published/2024/CVE-2024-26784.mbox
+++ b/cve/published/2024/CVE-2024-26784.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26784: pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal
-Message-Id: <2024040459-CVE-2024-26784-9e9c@gregkh>
-Content-Length: 2719
-Lines: 73
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2793;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=wOnUjCy+1M1NSTfanO7LLSz8vzH023xB7MQoVw/3gEM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yckvj03MYlNePe/Eo+hbF1vlnhUWuPfuOSv8Jpnr9
- iQx5fMnOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiGxYyLDgvo79kpZ+twIaT
- 1408xIP1Z7T3nWVY0HF3XteOHatZO+w2ZeicmP/6fn6hGwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26785.mbox b/cve/published/2024/CVE-2024-26785.mbox
index 7c72ce53..7054d2ad 100644
--- a/cve/published/2024/CVE-2024-26785.mbox
+++ b/cve/published/2024/CVE-2024-26785.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26785: iommufd: Fix protection fault in iommufd_test_syz_conv_iova
-Message-Id: <2024040459-CVE-2024-26785-857d@gregkh>
-Content-Length: 2457
-Lines: 71
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2529;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=4naI0LgSv30+gTPJU/DPYCdc7ehYrpzxOoSR8bPs+W0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yckhUVNtNv+4ZlPoc4uFpbNLQLf3zdwd4m+fXM8QD
- jrvoL+kI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACZi/YJhwdTil8ej/3rv/aWU
- Pf80K4vy1dz0jwwLNs57F3p2ZUn/i9RExs0P2CS683cwAgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26786.mbox b/cve/published/2024/CVE-2024-26786.mbox
index 1af540fe..a5062216 100644
--- a/cve/published/2024/CVE-2024-26786.mbox
+++ b/cve/published/2024/CVE-2024-26786.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26786: iommufd: Fix iopt_access_list_id overwrite bug
-Message-Id: <2024040459-CVE-2024-26786-802f@gregkh>
-Content-Length: 2636
-Lines: 72
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2709;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=iWIsrOxJR3cXePC8Sf3n5gDOJRlCWlE8XRBZ6RsP/GY=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8ycmtVWfESwvP8KfmBJ37wHb38fafWyQr1RZ4rOHOu
- nrwlplmRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzksx/Dgu5Sc8W2J3fttC/I
- vJ6rxnTkxjc7eYZ5qr1Ppmr1xDTe/KhYdkrx0vH8P/HeAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26787.mbox b/cve/published/2024/CVE-2024-26787.mbox
index 535f68e0..f278e805 100644
--- a/cve/published/2024/CVE-2024-26787.mbox
+++ b/cve/published/2024/CVE-2024-26787.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26787: mmc: mmci: stm32: fix DMA API overlapping mappings warning
-Message-Id: <2024040459-CVE-2024-26787-48c0@gregkh>
-Content-Length: 3548
-Lines: 90
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3639;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=K9y2AQgrrgz3p5DJ8n849eLL1qPCIywutx+0o/07m/A=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8ycncWanSRjraG0ptf9hKLePUMfuTsESq8n5bns/9j
- 4+u+0zqiGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIns/cYwV0a9ylh4VpOKs0nr
- 47g5oU+X5K+IY1hw9fTuAxZsuhY+C5JuebXELtntK78WAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26788.mbox b/cve/published/2024/CVE-2024-26788.mbox
index 13f1b2ae..62c0a328 100644
--- a/cve/published/2024/CVE-2024-26788.mbox
+++ b/cve/published/2024/CVE-2024-26788.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26788: dmaengine: fsl-qdma: init irq after reg initialization
-Message-Id: <2024040400-CVE-2024-26788-1f84@gregkh>
-Content-Length: 3622
-Lines: 91
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3714;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=1wir85CKj42NU8Om0+gJQ5y53lRBWrb0pX2uscN5m6Y=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8ySka1g78Z9RsQx8s6I0R57nxfPqeakfvkGzhX6eYH
- FQz/nl1xLIwCDIxyIopsnzZxnN0f8UhRS9D29Mwc1iZQIYwcHEKwERqSxjmB394xLM0zEalNEZY
- Ki0w9aZrclIEwzyNI0p77ztPv379geVqpqaABWIS+RMA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26789.mbox b/cve/published/2024/CVE-2024-26789.mbox
index 3e4d1bc7..1847e27b 100644
--- a/cve/published/2024/CVE-2024-26789.mbox
+++ b/cve/published/2024/CVE-2024-26789.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26789: crypto: arm64/neonbs - fix out-of-bounds access on short input
-Message-Id: <2024040400-CVE-2024-26789-1744@gregkh>
-Content-Length: 2720
-Lines: 64
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2785;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Km1wBT0xbZFHbSIfEQ7f72278Ntgv/w0D/n0i7TcFwM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8ySkHF2Tc6VskdzRPU9nmrcztep7+8wvnqbu0aZ3av
- yz5i9OKjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZiIzAaGBQdeM+5rWLSN5fOj
- rb+3rbczOdEizccwz3yrVOrb97xTLkW/XHTttUyKw4WVvwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26790.mbox b/cve/published/2024/CVE-2024-26790.mbox
index f4beb95a..8ae07135 100644
--- a/cve/published/2024/CVE-2024-26790.mbox
+++ b/cve/published/2024/CVE-2024-26790.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26790: dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read
-Message-Id: <2024040400-CVE-2024-26790-a4a4@gregkh>
-Content-Length: 2866
-Lines: 69
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2936;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=dwmXzP4caYgPYBOPA/2BocfhtOlgG0wFuiY8aQfN44I=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8ySnNLt43VGpK3x/ra3520O0byz/Oh/mfb6b8iLU/q
- aF0U0GiI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACZycxfDgguPp1aXaTYzSuy0
- 8S8+KvFZQfEeUPTSuoK9oexxHqsNvlxctGVbRULw5XAA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26791.mbox b/cve/published/2024/CVE-2024-26791.mbox
index 234e79a2..d7446c59 100644
--- a/cve/published/2024/CVE-2024-26791.mbox
+++ b/cve/published/2024/CVE-2024-26791.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26791: btrfs: dev-replace: properly validate device names
-Message-Id: <2024040400-CVE-2024-26791-1002@gregkh>
-Content-Length: 2642
-Lines: 68
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2711;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=+4xOjUXXc2eOjqqsimmurEDFLF37mMgUEfMMGJszQ1Y=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yam/HP/fqzNP+rPFZWLSv0XMlWdXeM9KvNqS1bk5O
- rjcJIW5I5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACbyVJJhvmPXwY0yK1qYQhZG
- bzyQVjJLWek+H8P8+i4XGdPp4a+z7G2eCIu3X56iJ2AJAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26792.mbox b/cve/published/2024/CVE-2024-26792.mbox
index 64c99c87..bffedf33 100644
--- a/cve/published/2024/CVE-2024-26792.mbox
+++ b/cve/published/2024/CVE-2024-26792.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26792: btrfs: fix double free of anonymous device after snapshot creation failure
-Message-Id: <2024040401-CVE-2024-26792-6048@gregkh>
-Content-Length: 6178
-Lines: 136
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6315;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Lqd/U8KSLBufoiUkBlMV2+1N9u6kbbTELuRTgfj4fHI=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yamrY9dertpzQ0rt0vfVN0IkuE7FZ30/9P08r8Oh7
- zdKSvQ7OmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiT8QZFhytTfwrHXFI+Sef
- 7qWghxLNxsKH6hgW3Cjp7tcJi5kmydYVfkNijbzVRHFVAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26793.mbox b/cve/published/2024/CVE-2024-26793.mbox
index 44b5e2e1..589d5e79 100644
--- a/cve/published/2024/CVE-2024-26793.mbox
+++ b/cve/published/2024/CVE-2024-26793.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26793: gtp: fix use-after-free and null-ptr-deref in gtp_newlink()
-Message-Id: <2024040401-CVE-2024-26793-2beb@gregkh>
-Content-Length: 9031
-Lines: 153
-X-Developer-Signature: v=1; a=openpgp-sha256; l=9185;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=Ngbu3oE3li2G2co2Y/eFoVhf+Q3w8eXThyk5HYI3qbs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yann9v6uDdzx+8DN7R2tj593btqulH66O7n1idI0o
- 8mHP1k/7ohlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJzPrIMFf8RkdjnIqIrOqG
- NbdrKyI1radUPGOYXx56a2VP7voZAZJTjaSXHTu2LvLOTgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26794.mbox b/cve/published/2024/CVE-2024-26794.mbox
index ffd178ee..366d3583 100644
--- a/cve/published/2024/CVE-2024-26794.mbox
+++ b/cve/published/2024/CVE-2024-26794.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26794: btrfs: fix race between ordered extent completion and fiemap
-Message-Id: <2024040401-CVE-2024-26794-3890@gregkh>
-Content-Length: 7935
-Lines: 161
-X-Developer-Signature: v=1; a=openpgp-sha256; l=8097;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=LGzyKk+ZmG82MoqcAESZ0iHfUD2TFbkEXbfDdtUhAuE=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yamrlT9Pi+E5f+mMmsQO5TOqzst8YsKFd0oahv+Mu
- 56lfO1NRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEyEj4FhrmTOzkW3Q9VOdf2y
- D27kEmzWFNZ7yzC/7qeZvIyH8w2OfTn5i+xVt074zv8PAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26795.mbox b/cve/published/2024/CVE-2024-26795.mbox
index a1ff60a7..700abfa3 100644
--- a/cve/published/2024/CVE-2024-26795.mbox
+++ b/cve/published/2024/CVE-2024-26795.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26795: riscv: Sparse-Memory/vmemmap out-of-bounds fix
-Message-Id: <2024040402-CVE-2024-26795-404a@gregkh>
-Content-Length: 2648
-Lines: 62
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2711;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=cWZAndt04/v923QVQ2KzXqd0UMm8ceZlT5LejrMlNfM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yWkXL+3xim5/2DiDU2qd6rQQtZVPxQ66rHrVdozfq
- D9uvmNBRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzktSfDPNXd9Xp+X3SfORic
- /nfsTm1tOUvGE4b5wV8NxYs/+Bu/lfKQW2QjMTPKb3kNAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26796.mbox b/cve/published/2024/CVE-2024-26796.mbox
index fe0176f9..d234a3a0 100644
--- a/cve/published/2024/CVE-2024-26796.mbox
+++ b/cve/published/2024/CVE-2024-26796.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26796: drivers: perf: ctr_get_width function for legacy is not defined
-Message-Id: <2024040402-CVE-2024-26796-85c5@gregkh>
-Content-Length: 3656
-Lines: 81
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3738;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=S5KtueptK5Jh8AmsMSjj3OoDcVEPVWMHdwXhqpguxMg=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yWlKB1ta225XZcVKMua4p6w4dvo57wKPV+JF3/T2r
- /2498bjjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZjIppUMC6aKv/+8SGZWX/b0
- rPd317pPmab2noFhftGJF/ble4NWy8/pTPoTw201Z1VOEwA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26797.mbox b/cve/published/2024/CVE-2024-26797.mbox
index f9cb7dc2..355da00e 100644
--- a/cve/published/2024/CVE-2024-26797.mbox
+++ b/cve/published/2024/CVE-2024-26797.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26797: drm/amd/display: Prevent potential buffer overflow in map_hw_resources
-Message-Id: <2024040402-CVE-2024-26797-704f@gregkh>
-Content-Length: 2482
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2542;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=jwVp4H/TpJl4M3/0wEZ3XWWFjbHEU0+pSA2k0UVCRUg=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yWnFUzOtjaes4Pu0mWsVQ1bOCe45NXYmi0qNIu3id
- 4QcNhXoiGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgInsms8wP/VG9a/1ZkuVHfiy
- hL5ZfFx6wGbHZIY5PMrXbZcemqHZ0Vw4I+/14mcduw2DAQ==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26798.mbox b/cve/published/2024/CVE-2024-26798.mbox
index f680a9a6..deb8437f 100644
--- a/cve/published/2024/CVE-2024-26798.mbox
+++ b/cve/published/2024/CVE-2024-26798.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26798: fbcon: always restore the old font data in fbcon_do_set_font()
-Message-Id: <2024040402-CVE-2024-26798-191e@gregkh>
-Content-Length: 3877
-Lines: 87
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3965;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=aESZUt8C+dxFXEIJ5H2vJVcIZQ3MBt6zidFlrySaKsM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yWmK/0O4vXdsy2XwX9Nk8aL/Wc7MkwX94RWWxRdzU
- uU26a/uiGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgInclGGYH/8nReyD37ENYtXe
- sQJTX7asPpMRzTBXfEfjEcPVi29sDdp9wH6SSs7/9bY6AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26799.mbox b/cve/published/2024/CVE-2024-26799.mbox
index 851ea7c6..22f2cb08 100644
--- a/cve/published/2024/CVE-2024-26799.mbox
+++ b/cve/published/2024/CVE-2024-26799.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26799: ASoC: qcom: Fix uninitialized pointer dmactl
-Message-Id: <2024040403-CVE-2024-26799-1fd6@gregkh>
-Content-Length: 2413
-Lines: 59
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2473;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=FZMYjs9tacFiyoTKeIBu0Nrhs5z23uqIlgA8FHbmNzw=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yem2HSdlfEKEjb7dzhQpjlF+XbV4pVF/rXzU2uc/p
- ja8NqjtiGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgImYPWSY7/DH6/kLmQnaR6bP
- 97qTV6Aad/igH8McDk0HG45Fz1N6o73e1O5gFUwMdi8HAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26800.mbox b/cve/published/2024/CVE-2024-26800.mbox
index 92fb2396..87c229ef 100644
--- a/cve/published/2024/CVE-2024-26800.mbox
+++ b/cve/published/2024/CVE-2024-26800.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26800: tls: fix use-after-free on failed backlog decryption
-Message-Id: <2024040403-CVE-2024-26800-0bf4@gregkh>
-Content-Length: 2433
-Lines: 60
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2494;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=bguObsACvehO5nd0z5BaqcaYKrLBh2lhWpMlrdQFZdo=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yek+/1WtxfyNpxxTNGF8y7/wxlTBU8v3X3JZeejds
- RPuQnZbO2JZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAiatkMC2a4TNjeFZ6dnDLN
- fMWS6avTWm8+DmZYcFlp2Rmb4z7/je4Fd93JFw78o3lRHQA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26801.mbox b/cve/published/2024/CVE-2024-26801.mbox
index 99e6b031..3b3d2632 100644
--- a/cve/published/2024/CVE-2024-26801.mbox
+++ b/cve/published/2024/CVE-2024-26801.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26801: Bluetooth: Avoid potential use-after-free in hci_error_reset
-Message-Id: <2024040403-CVE-2024-26801-da9f@gregkh>
-Content-Length: 3411
-Lines: 77
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3489;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=D9DYizEZDAB89opehCc0TA6iDuxCLKUYdvC/tbKMim4=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yemsHde2VfhP72pU+19fen3aVJVLkrnLGnaW1Mf7X
- 7pg8u1ARywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzkwgGGOVxJ28W2Clmpi2/3
- /nfhqtVUtp5wIYZ5mhHBRX4XFc15IyvObt8uUb+wUUgfAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26802.mbox b/cve/published/2024/CVE-2024-26802.mbox
index 1d85d00a..03d6fbbc 100644
--- a/cve/published/2024/CVE-2024-26802.mbox
+++ b/cve/published/2024/CVE-2024-26802.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26802: stmmac: Clear variable when destroying workqueue
-Message-Id: <2024040403-CVE-2024-26802-b3da@gregkh>
-Content-Length: 4309
-Lines: 97
-X-Developer-Signature: v=1; a=openpgp-sha256; l=4407;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=+e2vG4tCQaHsVCk2vFM+wuQLOCDfcUuBuhVC9FGmQ6w=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yemyAiVOTm4X86zk5j6aWdc9pVnRPab1YJdD8a2ql
- n2M3qYdsSwMgkwMsmKKLF+28RzdX3FI0cvQ9jTMHFYmkCEMXJwCMJHrbQwLdnRVy9Q570nMmeC8
- 31DttxbrqrL3DAsmPku3qt2p8F1vp7Tr8YJXFte81LUB
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26803.mbox b/cve/published/2024/CVE-2024-26803.mbox
index 0f0d95f6..146507dd 100644
--- a/cve/published/2024/CVE-2024-26803.mbox
+++ b/cve/published/2024/CVE-2024-26803.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26803: net: veth: clear GRO when clearing XDP even when down
-Message-Id: <2024040404-CVE-2024-26803-9985@gregkh>
-Content-Length: 3431
-Lines: 77
-X-Developer-Signature: v=1; a=openpgp-sha256; l=3509;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=JXwakAyiTFMaNr+UeZsnsWgaWaR2kWUCvV8xqrweIPs=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yRmnxVclGrf9frn2yas7oTu5rzOum6sX93+OmYmWt
- 1LGr0vTOmJZGASZGGTFFFm+bOM5ur/ikKKXoe1pmDmsTCBDGLg4BWAi78oY5orOk7Oa3LnQ/6Bi
- nV4BZ+t879lX9BjmGVeubr+ULzFxS5/GbLH34tFb8tmTAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26804.mbox b/cve/published/2024/CVE-2024-26804.mbox
index 894e067e..9a88cb34 100644
--- a/cve/published/2024/CVE-2024-26804.mbox
+++ b/cve/published/2024/CVE-2024-26804.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth
-Message-Id: <2024040404-CVE-2024-26804-a6ff@gregkh>
-Content-Length: 6284
-Lines: 149
-X-Developer-Signature: v=1; a=openpgp-sha256; l=6434;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=jYEJeL13Osg+Lg6nOaBIrk0GRvFHtl+sxbdjSwOvdwM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yRlcF+2urO/Mfakz+3dF9WE+G5+i8oerpzEv2yJZL
- Cm2++u0jlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZgIUP08uxPblfnesWwVCtTI
- mzTNdFF349ZnDPOzDNcZHKuZ0zohiUPx7HPFXUnym0oA
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26805.mbox b/cve/published/2024/CVE-2024-26805.mbox
index 4baad93d..216e7500 100644
--- a/cve/published/2024/CVE-2024-26805.mbox
+++ b/cve/published/2024/CVE-2024-26805.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26805: netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter
-Message-Id: <2024040404-CVE-2024-26805-7016@gregkh>
-Content-Length: 7783
-Lines: 159
-X-Developer-Signature: v=1; a=openpgp-sha256; l=7943;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=dXJEor6BFSwBLZTy1Ct9rTbx4Ib0wCZUpoSua5AJt90=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yRmzrjlsyv+YKPFQ67+Zf/B65hnLJt5/eGK3/Yqnm
- wXeRBne7IhlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJMIQzzE9JODr1/LlJRysS
- Kg+fvBya0DpXL59hwbl36ieaAuc1BUw78iLYZlt72Ms6ZgA=
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26806.mbox b/cve/published/2024/CVE-2024-26806.mbox
index e2c3bfd4..67a9efa5 100644
--- a/cve/published/2024/CVE-2024-26806.mbox
+++ b/cve/published/2024/CVE-2024-26806.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26806: spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks
-Message-Id: <2024040404-CVE-2024-26806-4644@gregkh>
-Content-Length: 2914
-Lines: 79
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2994;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=afuUbOlUbyKUPz8ZwN87dn2WRmHiwHVy94Z/Fp/icU8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yZlffvNv8LwQFv/JrKzy/Ftl2Q8Jai9V+L67mvLvz
- v/fZXqwI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACai959hwcSyg8fbri32ljq6
- myXsKKebWR3/IoYF0yxK6taEXZns12N9vl965TSG27LZAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26807.mbox b/cve/published/2024/CVE-2024-26807.mbox
index 219da3ad..3d5d3ec8 100644
--- a/cve/published/2024/CVE-2024-26807.mbox
+++ b/cve/published/2024/CVE-2024-26807.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26807: spi: cadence-qspi: fix pointer reference in runtime PM hooks
-Message-Id: <2024040405-CVE-2024-26807-c071@gregkh>
-Content-Length: 2495
-Lines: 61
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2557;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=2DMMMtbjS0FVc2zT/W2kLLLXPJwebgYc/XEjaZmtUu0=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8yZkyV+0Dft1rUGn4x6S4ryg44fK+Tpn4aYdU7jccd
- /2q+39PRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAExEeCbDgktJbAvsy9qeb3Xf
- durakVyFPlXRaIYFc1933ez1smp59MCvzzl0XWM9P2cHAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26808.mbox b/cve/published/2024/CVE-2024-26808.mbox
index 36af2e43..f854fc21 100644
--- a/cve/published/2024/CVE-2024-26808.mbox
+++ b/cve/published/2024/CVE-2024-26808.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain
-Message-Id: <2024040458-CVE-2024-26808-2df2@gregkh>
-Content-Length: 2474
-Lines: 57
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2532;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=CjhNjaNcef3vjGNosEJVrRyHEtVSx12fJ+VwUclfKGM=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8Ffa3nbJqDuw//spcsDetI5Dh7ftja+rnVsdnGv2fM
- LvFa61ARywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEwku4hhfpnciVli5yYoHjb2
- fctspc8sL/7RiWGexiz+rZ7HzJ1fSH9ZsvDwyoIzfFx6AA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========
diff --git a/cve/published/2024/CVE-2024-26809.mbox b/cve/published/2024/CVE-2024-26809.mbox
index 4d2410ea..fb6fa8f8 100644
--- a/cve/published/2024/CVE-2024-26809.mbox
+++ b/cve/published/2024/CVE-2024-26809.mbox
@@ -1,19 +1,8 @@
-From bippy-e0c11145c45e Mon Sep 17 00:00:00 2001
+From bippy-851b3ed3d212 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-26809: netfilter: nft_set_pipapo: release elements in clone only from destroy path
-Message-Id: <2024040401-CVE-2024-26809-b0d1@gregkh>
-Content-Length: 2897
-Lines: 67
-X-Developer-Signature: v=1; a=openpgp-sha256; l=2965;
- i=gregkh@linuxfoundation.org; h=from:subject:message-id;
- bh=viJyPOgjqhfS8ZbxQyzlqOaVTarGe5h3qsiMfNcoCh8=;
- b=owGbwMvMwCRo6H6F97bub03G02pJDGl8FY5G/1jznEyiQnN1Z6b+MXv21u+I6ZmPpwVWVpqwz
- ryR4f6rI5aFQZCJQVZMkeXLNp6j+ysOKXoZ2p6GmcPKBDKEgYtTACZy3IJhfjrfrJ6pLQxZzKfm
- Lq3VFXjU8nxPDMOC/Qr2pn6PTtwPPv1O542Exyvne70cAA==
-X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
- fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
Description
===========