"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-05-25 14:00:32 +00:00
parent 59ea61fd24
commit 26d299cf54
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
13 changed files with 26 additions and 1791 deletions

View File

@ -5,88 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2021-47411",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: allow conditional reschedule for intensive iterators\n\nIf we have a lot of threads and rings, the tctx list can get quite big.\nThis is especially true if we keep creating new threads and rings.\nLikewise for the provided buffers list. Be nice and insert a conditional\nreschedule point while iterating the nodes for deletion."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "648f59a06b0e"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5.14.11",
"lessThanOrEqual": "5.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.15",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/648f59a06b0e1fec7a4158cdee9acd362e493ce1",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/648f59a06b0e1fec7a4158cdee9acd362e493ce1"
},
{
"url": "https://git.kernel.org/stable/c/8bab4c09f24ec8d4a7a78ab343620f89d3a24804",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8bab4c09f24ec8d4a7a78ab343620f89d3a24804"
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
}
}

View File

@ -5,164 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2024-27420",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_link_fails_count\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "97a4d8b9f67c"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "2.6.12",
"status": "affected"
},
{
"version": "0",
"lessThan": "2.6.12",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.310",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.272",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.213",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.15.152",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.1.82",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6.22",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.7.10",
"lessThanOrEqual": "6.7.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/97a4d8b9f67cc7efe9a0c137e12f6d9e40795bf1",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/97a4d8b9f67cc7efe9a0c137e12f6d9e40795bf1"
},
{
"url": "https://git.kernel.org/stable/c/07bbccd1adb56b39eef982b8960d59e3c005c6a1",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/07bbccd1adb56b39eef982b8960d59e3c005c6a1"
},
{
"url": "https://git.kernel.org/stable/c/cfe0f73fb38a01bce86fe15ef5f750f850f7d3fe",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/cfe0f73fb38a01bce86fe15ef5f750f850f7d3fe"
},
{
"url": "https://git.kernel.org/stable/c/c558e54f7712b086fbcb611723272a0a4b0d451c",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/c558e54f7712b086fbcb611723272a0a4b0d451c"
},
{
"url": "https://git.kernel.org/stable/c/cfedde3058bf976f2f292c0a236edd43afcdab57",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/cfedde3058bf976f2f292c0a236edd43afcdab57"
},
{
"url": "https://git.kernel.org/stable/c/db364859ce68fb3a52d42cd87a54da3dc42dc1c8",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/db364859ce68fb3a52d42cd87a54da3dc42dc1c8"
},
{
"url": "https://git.kernel.org/stable/c/0b8eb369c182814d817b9449bc9e86bfae4310f9",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0b8eb369c182814d817b9449bc9e86bfae4310f9"
},
{
"url": "https://git.kernel.org/stable/c/bc76645ebdd01be9b9994dac39685a3d0f6f7985",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/bc76645ebdd01be9b9994dac39685a3d0f6f7985"
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
}
}

View File

@ -5,164 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2024-27421",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_routing_control\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "c13fbb5902bc"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "2.6.12",
"status": "affected"
},
{
"version": "0",
"lessThan": "2.6.12",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.310",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.272",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.213",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.15.152",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.1.82",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6.22",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.7.10",
"lessThanOrEqual": "6.7.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/c13fbb5902bce848759385986d4833f5b90782c1",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/c13fbb5902bce848759385986d4833f5b90782c1"
},
{
"url": "https://git.kernel.org/stable/c/c4309e5f8e80584715c814e1d012dbc3eee5a500",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/c4309e5f8e80584715c814e1d012dbc3eee5a500"
},
{
"url": "https://git.kernel.org/stable/c/b7d33e083f9d5d39445c0a91e7ad4f3e2c47fcb5",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b7d33e083f9d5d39445c0a91e7ad4f3e2c47fcb5"
},
{
"url": "https://git.kernel.org/stable/c/f9c4d42464173b826190fae2283ed1a4bbae0c8b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/f9c4d42464173b826190fae2283ed1a4bbae0c8b"
},
{
"url": "https://git.kernel.org/stable/c/4c02b9ccbb11862ee39850b2b285664cd579b039",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/4c02b9ccbb11862ee39850b2b285664cd579b039"
},
{
"url": "https://git.kernel.org/stable/c/d732b83251322ecd3b503e03442247745d6052ce",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/d732b83251322ecd3b503e03442247745d6052ce"
},
{
"url": "https://git.kernel.org/stable/c/859175d4bc11af829e2fdd261a7effdaba9b5d8f",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/859175d4bc11af829e2fdd261a7effdaba9b5d8f"
},
{
"url": "https://git.kernel.org/stable/c/b5dffcb8f71bdd02a4e5799985b51b12f4eeaf76",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b5dffcb8f71bdd02a4e5799985b51b12f4eeaf76"
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
}
}

View File

@ -5,164 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2024-27422",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_no_activity_timeout\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "73426c32e259"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "2.6.12",
"status": "affected"
},
{
"version": "0",
"lessThan": "2.6.12",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.310",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.272",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.213",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.15.152",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.1.82",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6.22",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.7.10",
"lessThanOrEqual": "6.7.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/73426c32e259c767d40613b956d5b80d0c28a9a9",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/73426c32e259c767d40613b956d5b80d0c28a9a9"
},
{
"url": "https://git.kernel.org/stable/c/cbba77abb4a553c1f5afac1ba2a0861aa1f13549",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/cbba77abb4a553c1f5afac1ba2a0861aa1f13549"
},
{
"url": "https://git.kernel.org/stable/c/01d4e3afe257768cd2a45f15a0e57bacf932b140",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/01d4e3afe257768cd2a45f15a0e57bacf932b140"
},
{
"url": "https://git.kernel.org/stable/c/4eacb242e22e31385a50a393681d0fe4b55ed1e9",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/4eacb242e22e31385a50a393681d0fe4b55ed1e9"
},
{
"url": "https://git.kernel.org/stable/c/498f1d6da11ed6d736d655a2db14ee2d9569eecb",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/498f1d6da11ed6d736d655a2db14ee2d9569eecb"
},
{
"url": "https://git.kernel.org/stable/c/2309b369fae2d9cdc3c945cd3eaec84eb1958ca3",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/2309b369fae2d9cdc3c945cd3eaec84eb1958ca3"
},
{
"url": "https://git.kernel.org/stable/c/6f254abae02abd4a0aca062c1b3812d7e2d8ea94",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/6f254abae02abd4a0aca062c1b3812d7e2d8ea94"
},
{
"url": "https://git.kernel.org/stable/c/f99b494b40431f0ca416859f2345746199398e2b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/f99b494b40431f0ca416859f2345746199398e2b"
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
}
}

View File

@ -5,164 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2024-27423",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_requested_window_size\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "4f2efa17c3ec"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "2.6.12",
"status": "affected"
},
{
"version": "0",
"lessThan": "2.6.12",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.310",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.272",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.213",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.15.152",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.1.82",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6.22",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.7.10",
"lessThanOrEqual": "6.7.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/4f2efa17c3ec5e4be0567b47439b9713c0dc6550",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/4f2efa17c3ec5e4be0567b47439b9713c0dc6550"
},
{
"url": "https://git.kernel.org/stable/c/89aa78a34340e9dbc3248095f44d81d0e1c23193",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/89aa78a34340e9dbc3248095f44d81d0e1c23193"
},
{
"url": "https://git.kernel.org/stable/c/652b0b35819610a42b8a90d21acb12f69943b397",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/652b0b35819610a42b8a90d21acb12f69943b397"
},
{
"url": "https://git.kernel.org/stable/c/489e05c614dbeb1a1148959f02bdb788891819e6",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/489e05c614dbeb1a1148959f02bdb788891819e6"
},
{
"url": "https://git.kernel.org/stable/c/46803b776d869b0c36041828a83c4f7da2dfa03b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/46803b776d869b0c36041828a83c4f7da2dfa03b"
},
{
"url": "https://git.kernel.org/stable/c/db006d7edbf0b4800390ece3727a82f4ae764043",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/db006d7edbf0b4800390ece3727a82f4ae764043"
},
{
"url": "https://git.kernel.org/stable/c/0d43a58900e5a2bfcc9de47e16c6c501c0bef853",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0d43a58900e5a2bfcc9de47e16c6c501c0bef853"
},
{
"url": "https://git.kernel.org/stable/c/a2e706841488f474c06e9b33f71afc947fb3bf56",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/a2e706841488f474c06e9b33f71afc947fb3bf56"
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
}
}

View File

@ -5,164 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2024-27424",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_busy_delay\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "7782e5e7047c"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "2.6.12",
"status": "affected"
},
{
"version": "0",
"lessThan": "2.6.12",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.310",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.272",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.213",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.15.152",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.1.82",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6.22",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.7.10",
"lessThanOrEqual": "6.7.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/7782e5e7047cae6b9255ee727c99fc73d77cf773",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7782e5e7047cae6b9255ee727c99fc73d77cf773"
},
{
"url": "https://git.kernel.org/stable/c/1f60795dcafc97c45984240d442cdc151f825977",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/1f60795dcafc97c45984240d442cdc151f825977"
},
{
"url": "https://git.kernel.org/stable/c/f3315a6edaec12b461031eab8c98c78111a41f95",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/f3315a6edaec12b461031eab8c98c78111a41f95"
},
{
"url": "https://git.kernel.org/stable/c/85f34d352f4b79afd63dd13634b23dafe6b570f9",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/85f34d352f4b79afd63dd13634b23dafe6b570f9"
},
{
"url": "https://git.kernel.org/stable/c/5ac337138272d26d6d3d4f71bc5b1a87adf8b24d",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/5ac337138272d26d6d3d4f71bc5b1a87adf8b24d"
},
{
"url": "https://git.kernel.org/stable/c/4ccad39009e7bd8a03d60a97c87b0327ae812880",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/4ccad39009e7bd8a03d60a97c87b0327ae812880"
},
{
"url": "https://git.kernel.org/stable/c/0a30016e892bccabea30af218782c4b6ce0970af",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0a30016e892bccabea30af218782c4b6ce0970af"
},
{
"url": "https://git.kernel.org/stable/c/43547d8699439a67b78d6bb39015113f7aa360fd",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/43547d8699439a67b78d6bb39015113f7aa360fd"
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
}
}

View File

@ -5,164 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2024-27425",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_acknowledge_delay\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "6133a71c75da"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "2.6.12",
"status": "affected"
},
{
"version": "0",
"lessThan": "2.6.12",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.310",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.272",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.213",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.15.152",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.1.82",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6.22",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.7.10",
"lessThanOrEqual": "6.7.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/6133a71c75dacea12fcc85838b4455c2055b0f14",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/6133a71c75dacea12fcc85838b4455c2055b0f14"
},
{
"url": "https://git.kernel.org/stable/c/80578681ea274e0a6512bb7515718c206a7b74cf",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/80578681ea274e0a6512bb7515718c206a7b74cf"
},
{
"url": "https://git.kernel.org/stable/c/34c84e0036a60e7e50ae50b42ed194d8daef8cc9",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/34c84e0036a60e7e50ae50b42ed194d8daef8cc9"
},
{
"url": "https://git.kernel.org/stable/c/33081e0f34899d5325e7c45683dd8dc9cb18b583",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/33081e0f34899d5325e7c45683dd8dc9cb18b583"
},
{
"url": "https://git.kernel.org/stable/c/5deaef2bf56456c71b841e0dfde1bee2fd88c4eb",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/5deaef2bf56456c71b841e0dfde1bee2fd88c4eb"
},
{
"url": "https://git.kernel.org/stable/c/7d56ffc51ebd2777ded8dca50d631ee19d97db5c",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7d56ffc51ebd2777ded8dca50d631ee19d97db5c"
},
{
"url": "https://git.kernel.org/stable/c/a22f9194f61ad4f2b6405c7c86bee85eac1befa5",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/a22f9194f61ad4f2b6405c7c86bee85eac1befa5"
},
{
"url": "https://git.kernel.org/stable/c/806f462ba9029d41aadf8ec93f2f99c5305deada",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/806f462ba9029d41aadf8ec93f2f99c5305deada"
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
}
}

View File

@ -5,164 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2024-27426",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_maximum_tries\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "84b8486e9ced"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "2.6.12",
"status": "affected"
},
{
"version": "0",
"lessThan": "2.6.12",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.310",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.272",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.213",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.15.152",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.1.82",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6.22",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.7.10",
"lessThanOrEqual": "6.7.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/84b8486e9cedc93875f251ba31abcf73bd586a3a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/84b8486e9cedc93875f251ba31abcf73bd586a3a"
},
{
"url": "https://git.kernel.org/stable/c/f716a68234242f95305dffb5c9426caa64b316b0",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/f716a68234242f95305dffb5c9426caa64b316b0"
},
{
"url": "https://git.kernel.org/stable/c/34a164d2448264b62af82bc0af3d2c83d12d38ac",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/34a164d2448264b62af82bc0af3d2c83d12d38ac"
},
{
"url": "https://git.kernel.org/stable/c/f84f7709486d8a578ab4b7d2a556d1b1a59cfc97",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/f84f7709486d8a578ab4b7d2a556d1b1a59cfc97"
},
{
"url": "https://git.kernel.org/stable/c/d28fa5f0e6c1554e2829f73a6a276c9a49689d04",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/d28fa5f0e6c1554e2829f73a6a276c9a49689d04"
},
{
"url": "https://git.kernel.org/stable/c/fa3f3ab5c399852d32a0c3cbb8c55882f7e2c61f",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/fa3f3ab5c399852d32a0c3cbb8c55882f7e2c61f"
},
{
"url": "https://git.kernel.org/stable/c/42e71408e2c138be9ccce60920bd6cf094ba1e32",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/42e71408e2c138be9ccce60920bd6cf094ba1e32"
},
{
"url": "https://git.kernel.org/stable/c/e799299aafed417cc1f32adccb2a0e5268b3f6d5",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/e799299aafed417cc1f32adccb2a0e5268b3f6d5"
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
}
}

View File

@ -5,164 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2024-27427",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_transport_timeout\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "500936692ccc"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "2.6.12",
"status": "affected"
},
{
"version": "0",
"lessThan": "2.6.12",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.310",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.272",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.213",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.15.152",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.1.82",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6.22",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.7.10",
"lessThanOrEqual": "6.7.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/500936692ccca8617a955652d1929f079b17a201",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/500936692ccca8617a955652d1929f079b17a201"
},
{
"url": "https://git.kernel.org/stable/c/eadec8da4451c2c0897199691184602e4ee497d1",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/eadec8da4451c2c0897199691184602e4ee497d1"
},
{
"url": "https://git.kernel.org/stable/c/291d36d772f5ea5c68a263ee440f2c9eade371c9",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/291d36d772f5ea5c68a263ee440f2c9eade371c9"
},
{
"url": "https://git.kernel.org/stable/c/b8006cb0a34aaf85cdd8741f4148fd9c76b351d3",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b8006cb0a34aaf85cdd8741f4148fd9c76b351d3"
},
{
"url": "https://git.kernel.org/stable/c/fed835d415766a94fc0246dcebc3af4c03fe9941",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/fed835d415766a94fc0246dcebc3af4c03fe9941"
},
{
"url": "https://git.kernel.org/stable/c/5d5c14efc987900509cec465af26608e39ac607c",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/5d5c14efc987900509cec465af26608e39ac607c"
},
{
"url": "https://git.kernel.org/stable/c/7d1e00fc2af3b7c30835d643a3655b7e9ff7cb20",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7d1e00fc2af3b7c30835d643a3655b7e9ff7cb20"
},
{
"url": "https://git.kernel.org/stable/c/60a7a152abd494ed4f69098cf0f322e6bb140612",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/60a7a152abd494ed4f69098cf0f322e6bb140612"
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
}
}

View File

@ -5,164 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2024-27428",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix data-races around sysctl_netrom_network_ttl_initialiser\n\nWe need to protect the reader reading the sysctl value because the\nvalue can be changed concurrently."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "acc653e8a3aa"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "2.6.12",
"status": "affected"
},
{
"version": "0",
"lessThan": "2.6.12",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.310",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.272",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.213",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.15.152",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.1.82",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6.22",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.7.10",
"lessThanOrEqual": "6.7.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/acc653e8a3aaab1b7103f98645f2cce7be89e3d3",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/acc653e8a3aaab1b7103f98645f2cce7be89e3d3"
},
{
"url": "https://git.kernel.org/stable/c/eda02a0bed550f07a8283d3e1f25b90a38e151ed",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/eda02a0bed550f07a8283d3e1f25b90a38e151ed"
},
{
"url": "https://git.kernel.org/stable/c/d1261bde59a3a087ab0c81181821e194278d9264",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/d1261bde59a3a087ab0c81181821e194278d9264"
},
{
"url": "https://git.kernel.org/stable/c/775ed3549819f814a6ecef5726d2b4c23f249b77",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/775ed3549819f814a6ecef5726d2b4c23f249b77"
},
{
"url": "https://git.kernel.org/stable/c/a47d68d777b41862757b7e3051f2d46d6e25f87b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/a47d68d777b41862757b7e3051f2d46d6e25f87b"
},
{
"url": "https://git.kernel.org/stable/c/5731369af2de21695fe7c1c91fe134fabe5b33b8",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/5731369af2de21695fe7c1c91fe134fabe5b33b8"
},
{
"url": "https://git.kernel.org/stable/c/dca1d93fe42fb9c42b66f61714fbdc55c87eb002",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/dca1d93fe42fb9c42b66f61714fbdc55c87eb002"
},
{
"url": "https://git.kernel.org/stable/c/119cae5ea3f9e35cdada8e572cc067f072fa825a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/119cae5ea3f9e35cdada8e572cc067f072fa825a"
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
}
}

View File

@ -5,164 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2024-27430",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Fix a data-race around sysctl_netrom_default_path_quality\n\nWe need to protect the reader reading sysctl_netrom_default_path_quality\nbecause the value can be changed concurrently."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "7644df766006"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "2.6.12",
"status": "affected"
},
{
"version": "0",
"lessThan": "2.6.12",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.310",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.272",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.213",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.15.152",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.1.82",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6.22",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.7.10",
"lessThanOrEqual": "6.7.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.8",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/7644df766006d4878a556e427e3ecc78c2d5606b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7644df766006d4878a556e427e3ecc78c2d5606b"
},
{
"url": "https://git.kernel.org/stable/c/7f615232556f3c6e3eeecef96ef2b00d0aa905bb",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7f615232556f3c6e3eeecef96ef2b00d0aa905bb"
},
{
"url": "https://git.kernel.org/stable/c/e041df5dc9e68adffcba5499ca28e1252bed6f4b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/e041df5dc9e68adffcba5499ca28e1252bed6f4b"
},
{
"url": "https://git.kernel.org/stable/c/bbc21f134b89535d1cf110c5f2b33ac54e5839c4",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/bbc21f134b89535d1cf110c5f2b33ac54e5839c4"
},
{
"url": "https://git.kernel.org/stable/c/dec82a8fc45c6ce494c2cb31f001a2aadb132b57",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/dec82a8fc45c6ce494c2cb31f001a2aadb132b57"
},
{
"url": "https://git.kernel.org/stable/c/7510b08c5f5ba15983da004b021fc6154eeb4047",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7510b08c5f5ba15983da004b021fc6154eeb4047"
},
{
"url": "https://git.kernel.org/stable/c/392eb88416dcbc5f1d61b9a88d79d78dc8b27652",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/392eb88416dcbc5f1d61b9a88d79d78dc8b27652"
},
{
"url": "https://git.kernel.org/stable/c/958d6145a6d9ba9e075c921aead8753fb91c9101",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/958d6145a6d9ba9e075c921aead8753fb91c9101"
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
}
}

View File

@ -5,109 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2024-35820",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: fix io_queue_proc modifying req->flags\n\nWith multiple poll entries __io_queue_proc() might be running in\nparallel with poll handlers and possibly task_work, we should not be\ncarelessly modifying req->flags there. io_poll_double_prepare() handles\na similar case with locking but it's much easier to move it into\n__io_arm_poll_handler()."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "595e52284d24",
"version_value": "51a490a7f63c"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "6.7",
"status": "affected"
},
{
"version": "0",
"lessThan": "6.7",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.7.12",
"lessThanOrEqual": "6.7.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.8.3",
"lessThanOrEqual": "6.8.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.9",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/51a490a7f63cae0754120e7c04f4f47920bd48db",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/51a490a7f63cae0754120e7c04f4f47920bd48db"
},
{
"url": "https://git.kernel.org/stable/c/0ecb8919469e6d5c74eea24086b34ce1bda5aef7",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0ecb8919469e6d5c74eea24086b34ce1bda5aef7"
},
{
"url": "https://git.kernel.org/stable/c/1a8ec63b2b6c91caec87d4e132b1f71b5df342be",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/1a8ec63b2b6c91caec87d4e132b1f71b5df342be"
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
}
}

View File

@ -5,110 +5,14 @@
"CVE_data_meta": {
"ID": "CVE-2024-35923",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring: clear opcode specific data for an early failure\n\nIf failure happens before the opcode prep handler is called, ensure that\nwe clear the opcode specific area of the request, which holds data\nspecific to that request type. This prevents errors where opcode\nhandlers either don't get to clear per-request private data since prep\nisn't even called."
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "5245a6da27ef"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "6.1.86",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6.27",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.8.6",
"lessThanOrEqual": "6.8.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.9",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/5245a6da27ef79f8dba98dad5542ebe56d311837",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/5245a6da27ef79f8dba98dad5542ebe56d311837"
},
{
"url": "https://git.kernel.org/stable/c/21162ad2de7446438cbd6224b3794a375bcb24df",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/21162ad2de7446438cbd6224b3794a375bcb24df"
},
{
"url": "https://git.kernel.org/stable/c/cb1cd176e0b431644653a7fa8691a1aaf7be98da",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/cb1cd176e0b431644653a7fa8691a1aaf7be98da"
},
{
"url": "https://git.kernel.org/stable/c/e21e1c45e1fe2e31732f40256b49c04e76a17cee",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/e21e1c45e1fe2e31732f40256b49c04e76a17cee"
}
]
},
"generator": {
"engine": "bippy-d175d3acf727"
}
}