From 92dfaf72c4c8920b118e09b9d66a2b9882f507f5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 5 Nov 2024 10:03:14 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/26xxx/CVE-2024-26615.json | 28 +++----- 2024/26xxx/CVE-2024-26616.json | 8 +-- 2024/26xxx/CVE-2024-26617.json | 6 +- 2024/26xxx/CVE-2024-26618.json | 8 +-- 2024/26xxx/CVE-2024-26619.json | 6 +- 2024/26xxx/CVE-2024-26620.json | 10 +-- 2024/26xxx/CVE-2024-26621.json | 10 +-- 2024/26xxx/CVE-2024-26622.json | 19 ++---- 2024/26xxx/CVE-2024-26623.json | 8 +-- 2024/26xxx/CVE-2024-26625.json | 28 +++----- 2024/26xxx/CVE-2024-26626.json | 2 +- 2024/26xxx/CVE-2024-26627.json | 19 ++---- 2024/26xxx/CVE-2024-26629.json | 14 ++-- 2024/26xxx/CVE-2024-26630.json | 8 +-- 2024/26xxx/CVE-2024-26631.json | 12 ++-- 2024/26xxx/CVE-2024-26874.json | 30 +++------ 2024/26xxx/CVE-2024-26875.json | 30 +++------ 2024/26xxx/CVE-2024-26876.json | 10 +-- 2024/26xxx/CVE-2024-26877.json | 21 +++--- 2024/26xxx/CVE-2024-26878.json | 28 +++----- 2024/26xxx/CVE-2024-26879.json | 14 ++-- 2024/26xxx/CVE-2024-26880.json | 30 +++------ 2024/26xxx/CVE-2024-26881.json | 14 ++-- 2024/26xxx/CVE-2024-26882.json | 23 +++---- 2024/26xxx/CVE-2024-26883.json | 30 +++------ 2024/26xxx/CVE-2024-26884.json | 30 +++------ 2024/26xxx/CVE-2024-26885.json | 18 ++--- 2024/26xxx/CVE-2024-26886.json | 12 ++-- 2024/26xxx/CVE-2024-26887.json | 10 +-- 2024/35xxx/CVE-2024-35785.json | 19 ++---- 2024/35xxx/CVE-2024-35786.json | 8 +-- 2024/35xxx/CVE-2024-35787.json | 10 +-- 2024/35xxx/CVE-2024-35788.json | 8 +-- 2024/35xxx/CVE-2024-35789.json | 28 +++----- 2024/35xxx/CVE-2024-35790.json | 8 +-- 2024/35xxx/CVE-2024-35791.json | 19 ++---- 2024/35xxx/CVE-2024-35792.json | 8 +-- 2024/35xxx/CVE-2024-35793.json | 8 +-- 2024/35xxx/CVE-2024-35794.json | 8 +-- 2024/35xxx/CVE-2024-35795.json | 10 +-- 2024/35xxx/CVE-2024-35796.json | 21 +++--- 2024/35xxx/CVE-2024-35797.json | 10 +-- 2024/35xxx/CVE-2024-35798.json | 10 +-- 2024/36xxx/CVE-2024-36886.json | 28 +++----- 2024/36xxx/CVE-2024-36887.json | 87 ++++++++++++++++++++++-- 2024/36xxx/CVE-2024-36888.json | 103 ++++++++++++++++++++++++++-- 2024/36xxx/CVE-2024-36889.json | 19 ++---- 2024/36xxx/CVE-2024-36890.json | 119 +++++++++++++++++++++++++++++++-- 2024/36xxx/CVE-2024-36891.json | 10 +-- 2024/36xxx/CVE-2024-36892.json | 92 +++++++++++++++++++++++-- 2024/36xxx/CVE-2024-36893.json | 12 ++-- 2024/36xxx/CVE-2024-36894.json | 18 ++--- 2024/36xxx/CVE-2024-36895.json | 103 ++++++++++++++++++++++++++-- 2024/36xxx/CVE-2024-36896.json | 114 +++++++++++++++++++++++++++++-- 2024/36xxx/CVE-2024-36897.json | 115 +++++++++++++++++++++++++++++-- 2024/36xxx/CVE-2024-36898.json | 114 +++++++++++++++++++++++++++++-- 2024/36xxx/CVE-2024-36899.json | 103 ++++++++++++++++++++++++++-- 2024/39xxx/CVE-2024-39495.json | 14 ++-- 2024/39xxx/CVE-2024-39496.json | 8 +-- 2024/39xxx/CVE-2024-39497.json | 12 ++-- 2024/39xxx/CVE-2024-39498.json | 6 +- 2024/39xxx/CVE-2024-39499.json | 18 ++--- 2024/39xxx/CVE-2024-39500.json | 12 ++-- 2024/39xxx/CVE-2024-39501.json | 18 ++--- 2024/39xxx/CVE-2024-39502.json | 16 ++--- 2024/39xxx/CVE-2024-39503.json | 16 ++--- 2024/39xxx/CVE-2024-39504.json | 8 +-- 2024/39xxx/CVE-2024-39505.json | 16 ++--- 2024/39xxx/CVE-2024-39506.json | 18 ++--- 2024/39xxx/CVE-2024-39507.json | 12 ++-- 2024/39xxx/CVE-2024-39508.json | 6 +- 2024/42xxx/CVE-2024-42107.json | 6 +- 2024/42xxx/CVE-2024-42108.json | 6 +- 2024/42xxx/CVE-2024-42109.json | 12 ++-- 2024/42xxx/CVE-2024-42110.json | 10 +-- 2024/42xxx/CVE-2024-42111.json | 6 +- 2024/42xxx/CVE-2024-42112.json | 6 +- 2024/42xxx/CVE-2024-42113.json | 8 +-- 2024/42xxx/CVE-2024-42114.json | 14 ++-- 2024/42xxx/CVE-2024-42115.json | 16 ++--- 2024/42xxx/CVE-2024-42116.json | 10 +-- 2024/42xxx/CVE-2024-42117.json | 4 +- 2024/42xxx/CVE-2024-42118.json | 4 +- 2024/42xxx/CVE-2024-42119.json | 16 ++--- 2024/42xxx/CVE-2024-42120.json | 12 ++-- 2024/44xxx/CVE-2024-44935.json | 16 ++--- 2024/44xxx/CVE-2024-44936.json | 6 +- 2024/44xxx/CVE-2024-44937.json | 6 +- 2024/44xxx/CVE-2024-44938.json | 8 +-- 2024/44xxx/CVE-2024-44939.json | 8 +-- 2024/44xxx/CVE-2024-44940.json | 8 +-- 2024/44xxx/CVE-2024-44941.json | 6 +- 2024/44xxx/CVE-2024-44942.json | 6 +- 2024/44xxx/CVE-2024-44943.json | 6 +- 2024/44xxx/CVE-2024-44944.json | 18 ++--- 2024/44xxx/CVE-2024-44945.json | 6 +- 2024/44xxx/CVE-2024-44946.json | 18 ++--- 2024/44xxx/CVE-2024-44947.json | 18 ++--- 2024/44xxx/CVE-2024-44948.json | 18 ++--- 2024/44xxx/CVE-2024-44949.json | 6 +- 100 files changed, 1450 insertions(+), 712 deletions(-) diff --git a/2024/26xxx/CVE-2024-26615.json b/2024/26xxx/CVE-2024-26615.json index 496e8e8543e..29002aa3299 100644 --- a/2024/26xxx/CVE-2024-26615.json +++ b/2024/26xxx/CVE-2024-26615.json @@ -55,49 +55,49 @@ "version": "0", "lessThan": "4.19", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.307", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.269", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.210", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.149", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.76", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.15", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.3", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -159,20 +159,10 @@ "url": "https://git.kernel.org/stable/c/dbc153fd3c142909e564bb256da087e13fbf239c", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/dbc153fd3c142909e564bb256da087e13fbf239c" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26616.json b/2024/26xxx/CVE-2024-26616.json index d07060a51a5..4afa7a122e5 100644 --- a/2024/26xxx/CVE-2024-26616.json +++ b/2024/26xxx/CVE-2024-26616.json @@ -55,19 +55,19 @@ "version": "0", "lessThan": "6.4", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.15", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.3", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26617.json b/2024/26xxx/CVE-2024-26617.json index ea8b181c0df..2a8bd3aeb75 100644 --- a/2024/26xxx/CVE-2024-26617.json +++ b/2024/26xxx/CVE-2024-26617.json @@ -55,13 +55,13 @@ "version": "0", "lessThan": "6.7", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.3", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26618.json b/2024/26xxx/CVE-2024-26618.json index 50c7706a137..67aa700e598 100644 --- a/2024/26xxx/CVE-2024-26618.json +++ b/2024/26xxx/CVE-2024-26618.json @@ -55,19 +55,19 @@ "version": "0", "lessThan": "6.5", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.15", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.3", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26619.json b/2024/26xxx/CVE-2024-26619.json index f5db15f8608..462ae4a803a 100644 --- a/2024/26xxx/CVE-2024-26619.json +++ b/2024/26xxx/CVE-2024-26619.json @@ -55,13 +55,13 @@ "version": "0", "lessThan": "6.7", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.3", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26620.json b/2024/26xxx/CVE-2024-26620.json index daf3fe91d30..d56cf35c405 100644 --- a/2024/26xxx/CVE-2024-26620.json +++ b/2024/26xxx/CVE-2024-26620.json @@ -55,25 +55,25 @@ "version": "0", "lessThan": "6.0", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.76", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.15", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.3", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26621.json b/2024/26xxx/CVE-2024-26621.json index 886f0ff28a2..92d1d4fab92 100644 --- a/2024/26xxx/CVE-2024-26621.json +++ b/2024/26xxx/CVE-2024-26621.json @@ -55,25 +55,25 @@ "version": "0", "lessThan": "5.18", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.81", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.46", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.6", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26622.json b/2024/26xxx/CVE-2024-26622.json index 52671630866..629e3cb6789 100644 --- a/2024/26xxx/CVE-2024-26622.json +++ b/2024/26xxx/CVE-2024-26622.json @@ -55,37 +55,37 @@ "version": "0", "lessThan": "3.1", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.212", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.151", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.81", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.21", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.9", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -137,15 +137,10 @@ "url": "https://git.kernel.org/stable/c/2f03fc340cac9ea1dc63cbf8c93dd2eb0f227815", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/2f03fc340cac9ea1dc63cbf8c93dd2eb0f227815" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26623.json b/2024/26xxx/CVE-2024-26623.json index 07d095b186b..18ba7375f83 100644 --- a/2024/26xxx/CVE-2024-26623.json +++ b/2024/26xxx/CVE-2024-26623.json @@ -55,19 +55,19 @@ "version": "0", "lessThan": "6.4", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.16", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.4", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26625.json b/2024/26xxx/CVE-2024-26625.json index 062b070b3fd..1d508f9a40b 100644 --- a/2024/26xxx/CVE-2024-26625.json +++ b/2024/26xxx/CVE-2024-26625.json @@ -55,49 +55,49 @@ "version": "0", "lessThan": "2.6.35", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.307", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.269", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.210", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.149", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.77", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.16", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.4", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -159,20 +159,10 @@ "url": "https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26626.json b/2024/26xxx/CVE-2024-26626.json index 9e2394adc27..243d00a98a9 100644 --- a/2024/26xxx/CVE-2024-26626.json +++ b/2024/26xxx/CVE-2024-26626.json @@ -107,6 +107,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26627.json b/2024/26xxx/CVE-2024-26627.json index 14dfc03c786..b75f312bc00 100644 --- a/2024/26xxx/CVE-2024-26627.json +++ b/2024/26xxx/CVE-2024-26627.json @@ -55,37 +55,37 @@ "version": "0", "lessThan": "5.5", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.210", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.149", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.77", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.16", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.4", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -137,15 +137,10 @@ "url": "https://git.kernel.org/stable/c/4373534a9850627a2695317944898eb1283a2db0", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/4373534a9850627a2695317944898eb1283a2db0" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26629.json b/2024/26xxx/CVE-2024-26629.json index ac18e88391a..2e6ce79af76 100644 --- a/2024/26xxx/CVE-2024-26629.json +++ b/2024/26xxx/CVE-2024-26629.json @@ -65,37 +65,37 @@ "version": "0", "lessThan": "5.19", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.220", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.154", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.79", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.15", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.3", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -151,6 +151,6 @@ ] }, "generator": { - "engine": "bippy-7d53e8ef8be4" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26630.json b/2024/26xxx/CVE-2024-26630.json index 1ae7edd03e3..585cdc35b78 100644 --- a/2024/26xxx/CVE-2024-26630.json +++ b/2024/26xxx/CVE-2024-26630.json @@ -55,19 +55,19 @@ "version": "0", "lessThan": "6.5", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.21", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.9", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26631.json b/2024/26xxx/CVE-2024-26631.json index f20de19786f..69c7eb483d0 100644 --- a/2024/26xxx/CVE-2024-26631.json +++ b/2024/26xxx/CVE-2024-26631.json @@ -55,31 +55,31 @@ "version": "0", "lessThan": "5.13", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.148", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.75", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.14", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.2", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -130,6 +130,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26874.json b/2024/26xxx/CVE-2024-26874.json index 585bba4299b..1f99bca6435 100644 --- a/2024/26xxx/CVE-2024-26874.json +++ b/2024/26xxx/CVE-2024-26874.json @@ -55,55 +55,55 @@ "version": "0", "lessThan": "4.7", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.311", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.273", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.214", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.153", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.83", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.23", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.11", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.2", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -170,20 +170,10 @@ "url": "https://git.kernel.org/stable/c/c958e86e9cc1b48cac004a6e245154dfba8e163b", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/c958e86e9cc1b48cac004a6e245154dfba8e163b" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26875.json b/2024/26xxx/CVE-2024-26875.json index cdf58b1e37a..be5bc53d309 100644 --- a/2024/26xxx/CVE-2024-26875.json +++ b/2024/26xxx/CVE-2024-26875.json @@ -55,55 +55,55 @@ "version": "0", "lessThan": "2.6.26", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.311", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.273", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.214", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.153", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.83", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.23", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.11", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.2", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -170,20 +170,10 @@ "url": "https://git.kernel.org/stable/c/0a0b79ea55de8514e1750884e5fec77f9fdd01ee", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/0a0b79ea55de8514e1750884e5fec77f9fdd01ee" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26876.json b/2024/26xxx/CVE-2024-26876.json index 20cdc1b91a8..bb9da902b41 100644 --- a/2024/26xxx/CVE-2024-26876.json +++ b/2024/26xxx/CVE-2024-26876.json @@ -55,25 +55,25 @@ "version": "0", "lessThan": "4.15", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.55", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.11", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.2", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26877.json b/2024/26xxx/CVE-2024-26877.json index ae7ef624ee7..c5c7d8ca740 100644 --- a/2024/26xxx/CVE-2024-26877.json +++ b/2024/26xxx/CVE-2024-26877.json @@ -55,43 +55,43 @@ "version": "0", "lessThan": "5.7", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.214", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.153", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.83", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.23", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.11", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.2", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -148,15 +148,10 @@ "url": "https://git.kernel.org/stable/c/a853450bf4c752e664abab0b2fad395b7ad7701c", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/a853450bf4c752e664abab0b2fad395b7ad7701c" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26878.json b/2024/26xxx/CVE-2024-26878.json index e1d423054a0..6d2678a7f7a 100644 --- a/2024/26xxx/CVE-2024-26878.json +++ b/2024/26xxx/CVE-2024-26878.json @@ -51,49 +51,49 @@ "version": "4.19.311", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.273", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.214", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.153", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.83", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.23", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.11", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.2", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -160,20 +160,10 @@ "url": "https://git.kernel.org/stable/c/d0aa72604fbd80c8aabb46eda00535ed35570f1f", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/d0aa72604fbd80c8aabb46eda00535ed35570f1f" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26879.json b/2024/26xxx/CVE-2024-26879.json index affde3640f9..1156e5ff1a8 100644 --- a/2024/26xxx/CVE-2024-26879.json +++ b/2024/26xxx/CVE-2024-26879.json @@ -55,37 +55,37 @@ "version": "0", "lessThan": "5.11", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.153", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.83", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.23", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.11", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.2", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -141,6 +141,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26880.json b/2024/26xxx/CVE-2024-26880.json index 7ef99105934..cd91aaf83db 100644 --- a/2024/26xxx/CVE-2024-26880.json +++ b/2024/26xxx/CVE-2024-26880.json @@ -55,55 +55,55 @@ "version": "0", "lessThan": "3.19", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.311", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.273", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.214", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.153", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.83", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.23", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.11", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.2", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -170,20 +170,10 @@ "url": "https://git.kernel.org/stable/c/65e8fbde64520001abf1c8d0e573561b4746ef38", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/65e8fbde64520001abf1c8d0e573561b4746ef38" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26881.json b/2024/26xxx/CVE-2024-26881.json index 7276d674918..57582ccf6c2 100644 --- a/2024/26xxx/CVE-2024-26881.json +++ b/2024/26xxx/CVE-2024-26881.json @@ -55,37 +55,37 @@ "version": "0", "lessThan": "5.14", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.153", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.83", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.23", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.11", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.2", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -141,6 +141,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26882.json b/2024/26xxx/CVE-2024-26882.json index dc9ecf2cf3f..3ed706b5e03 100644 --- a/2024/26xxx/CVE-2024-26882.json +++ b/2024/26xxx/CVE-2024-26882.json @@ -55,49 +55,49 @@ "version": "0", "lessThan": "3.10", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.273", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.214", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.153", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.83", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.23", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.11", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.2", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -159,15 +159,10 @@ "url": "https://git.kernel.org/stable/c/b0ec2abf98267f14d032102551581c833b0659d3", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/b0ec2abf98267f14d032102551581c833b0659d3" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26883.json b/2024/26xxx/CVE-2024-26883.json index 2f327082887..210d9d6c576 100644 --- a/2024/26xxx/CVE-2024-26883.json +++ b/2024/26xxx/CVE-2024-26883.json @@ -70,55 +70,55 @@ "version": "0", "lessThan": "5.11", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.311", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.273", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.214", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.153", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.83", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.23", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.11", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.2", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -185,20 +185,10 @@ "url": "https://git.kernel.org/stable/c/7a4b21250bf79eef26543d35bd390448646c536b", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/7a4b21250bf79eef26543d35bd390448646c536b" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26884.json b/2024/26xxx/CVE-2024-26884.json index b1139f3c654..380f754447a 100644 --- a/2024/26xxx/CVE-2024-26884.json +++ b/2024/26xxx/CVE-2024-26884.json @@ -55,55 +55,55 @@ "version": "0", "lessThan": "3.19", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.311", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.273", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.214", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.153", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.83", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.23", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.11", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.2", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -170,20 +170,10 @@ "url": "https://git.kernel.org/stable/c/6787d916c2cf9850c97a0a3f73e08c43e7d973b1", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/6787d916c2cf9850c97a0a3f73e08c43e7d973b1" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26885.json b/2024/26xxx/CVE-2024-26885.json index 75ac86cfbc7..5c5923b550b 100644 --- a/2024/26xxx/CVE-2024-26885.json +++ b/2024/26xxx/CVE-2024-26885.json @@ -55,49 +55,49 @@ "version": "0", "lessThan": "5.4", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.214", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.227", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.153", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.83", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.23", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.11", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.2", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -163,6 +163,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26886.json b/2024/26xxx/CVE-2024-26886.json index 6b79e943a93..cc96fbed5d4 100644 --- a/2024/26xxx/CVE-2024-26886.json +++ b/2024/26xxx/CVE-2024-26886.json @@ -65,31 +65,31 @@ "version": "0", "lessThan": "6.7", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.83", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.23", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.11", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.2", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -140,6 +140,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/26xxx/CVE-2024-26887.json b/2024/26xxx/CVE-2024-26887.json index 9ba8518593a..a15194efede 100644 --- a/2024/26xxx/CVE-2024-26887.json +++ b/2024/26xxx/CVE-2024-26887.json @@ -55,25 +55,25 @@ "version": "0", "lessThan": "6.6", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.23", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.11", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.2", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/35xxx/CVE-2024-35785.json b/2024/35xxx/CVE-2024-35785.json index 16092866af1..3af641fe046 100644 --- a/2024/35xxx/CVE-2024-35785.json +++ b/2024/35xxx/CVE-2024-35785.json @@ -75,37 +75,37 @@ "version": "0", "lessThan": "6.7", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.215", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.154", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.84", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.24", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.12", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -157,15 +157,10 @@ "url": "https://git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/35xxx/CVE-2024-35786.json b/2024/35xxx/CVE-2024-35786.json index d73021cd0ed..a17265d29bc 100644 --- a/2024/35xxx/CVE-2024-35786.json +++ b/2024/35xxx/CVE-2024-35786.json @@ -55,19 +55,19 @@ "version": "0", "lessThan": "6.6", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.24", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.12", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/35xxx/CVE-2024-35787.json b/2024/35xxx/CVE-2024-35787.json index 37879407cf0..f8c75590e8d 100644 --- a/2024/35xxx/CVE-2024-35787.json +++ b/2024/35xxx/CVE-2024-35787.json @@ -55,25 +55,25 @@ "version": "0", "lessThan": "6.6", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.24", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.12", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.3", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/35xxx/CVE-2024-35788.json b/2024/35xxx/CVE-2024-35788.json index f6d723a135a..5bd811d7af4 100644 --- a/2024/35xxx/CVE-2024-35788.json +++ b/2024/35xxx/CVE-2024-35788.json @@ -55,19 +55,19 @@ "version": "0", "lessThan": "6.9", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.12", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.3", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" } ], "defaultStatus": "affected" @@ -102,6 +102,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/35xxx/CVE-2024-35789.json b/2024/35xxx/CVE-2024-35789.json index eb625eb56b5..7dd40bdd331 100644 --- a/2024/35xxx/CVE-2024-35789.json +++ b/2024/35xxx/CVE-2024-35789.json @@ -51,49 +51,49 @@ "version": "4.19.312", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.274", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.215", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.154", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.84", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.24", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.12", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.3", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -160,20 +160,10 @@ "url": "https://git.kernel.org/stable/c/4f2bdb3c5e3189297e156b3ff84b140423d64685", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/4f2bdb3c5e3189297e156b3ff84b140423d64685" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/35xxx/CVE-2024-35790.json b/2024/35xxx/CVE-2024-35790.json index 2d69b2f0037..162aae81c93 100644 --- a/2024/35xxx/CVE-2024-35790.json +++ b/2024/35xxx/CVE-2024-35790.json @@ -55,19 +55,19 @@ "version": "0", "lessThan": "4.19", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.24", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.12", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/35xxx/CVE-2024-35791.json b/2024/35xxx/CVE-2024-35791.json index d133a1a1f24..3831e50a441 100644 --- a/2024/35xxx/CVE-2024-35791.json +++ b/2024/35xxx/CVE-2024-35791.json @@ -60,37 +60,37 @@ "version": "0", "lessThan": "5.11", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.215", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.154", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.84", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.24", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.12", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -142,15 +142,10 @@ "url": "https://git.kernel.org/stable/c/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/35xxx/CVE-2024-35792.json b/2024/35xxx/CVE-2024-35792.json index ffe3abdf920..4302ca784f2 100644 --- a/2024/35xxx/CVE-2024-35792.json +++ b/2024/35xxx/CVE-2024-35792.json @@ -55,19 +55,19 @@ "version": "0", "lessThan": "6.6", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.24", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.12", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8", @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/35xxx/CVE-2024-35793.json b/2024/35xxx/CVE-2024-35793.json index 6b03adede83..e55f0e8a65e 100644 --- a/2024/35xxx/CVE-2024-35793.json +++ b/2024/35xxx/CVE-2024-35793.json @@ -55,19 +55,19 @@ "version": "0", "lessThan": "6.7", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.12", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.3", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/35xxx/CVE-2024-35794.json b/2024/35xxx/CVE-2024-35794.json index 3fec02d1fb6..da6a932e86c 100644 --- a/2024/35xxx/CVE-2024-35794.json +++ b/2024/35xxx/CVE-2024-35794.json @@ -55,19 +55,19 @@ "version": "0", "lessThan": "4.8", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.12", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.3", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/35xxx/CVE-2024-35795.json b/2024/35xxx/CVE-2024-35795.json index 5fa165eeaad..21c72170dff 100644 --- a/2024/35xxx/CVE-2024-35795.json +++ b/2024/35xxx/CVE-2024-35795.json @@ -55,25 +55,25 @@ "version": "0", "lessThan": "6.5", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.24", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.12", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.3", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/35xxx/CVE-2024-35796.json b/2024/35xxx/CVE-2024-35796.json index 6e5e7f94fac..0bb6a29eb30 100644 --- a/2024/35xxx/CVE-2024-35796.json +++ b/2024/35xxx/CVE-2024-35796.json @@ -55,43 +55,43 @@ "version": "0", "lessThan": "5.9", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.215", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.154", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.84", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.24", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.12", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.3", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -148,15 +148,10 @@ "url": "https://git.kernel.org/stable/c/3a38a829c8bc27d78552c28e582eb1d885d07d11", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/3a38a829c8bc27d78552c28e582eb1d885d07d11" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/35xxx/CVE-2024-35797.json b/2024/35xxx/CVE-2024-35797.json index 83a2f9d7cf6..2a80929d680 100644 --- a/2024/35xxx/CVE-2024-35797.json +++ b/2024/35xxx/CVE-2024-35797.json @@ -55,25 +55,25 @@ "version": "0", "lessThan": "6.5", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.24", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.12", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.3", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/35xxx/CVE-2024-35798.json b/2024/35xxx/CVE-2024-35798.json index 0fa813e71d0..1d5aff9309d 100644 --- a/2024/35xxx/CVE-2024-35798.json +++ b/2024/35xxx/CVE-2024-35798.json @@ -55,25 +55,25 @@ "version": "0", "lessThan": "6.5", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.24", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.7.12", "lessThanOrEqual": "6.7.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.3", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36886.json b/2024/36xxx/CVE-2024-36886.json index b8ecb5fe17f..0a2a0bd19b2 100644 --- a/2024/36xxx/CVE-2024-36886.json +++ b/2024/36xxx/CVE-2024-36886.json @@ -55,49 +55,49 @@ "version": "0", "lessThan": "4.1", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.314", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.276", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.217", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.159", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.91", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.31", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.10", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -159,20 +159,10 @@ "url": "https://git.kernel.org/stable/c/080cbb890286cd794f1ee788bbc5463e2deb7c2b", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/080cbb890286cd794f1ee788bbc5463e2deb7c2b" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36887.json b/2024/36xxx/CVE-2024-36887.json index 948e5ab1564..2d10496d89a 100644 --- a/2024/36xxx/CVE-2024-36887.json +++ b/2024/36xxx/CVE-2024-36887.json @@ -1,18 +1,97 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-36887", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ne1000e: change usleep_range to udelay in PHY mdic access\n\nThis is a partial revert of commit 6dbdd4de0362 (\"e1000e: Workaround\nfor sporadic MDI error on Meteor Lake systems\"). The referenced commit\nused usleep_range inside the PHY access routines, which are sometimes\ncalled from an atomic context. This can lead to a kernel panic in some\nscenarios, such as cable disconnection and reconnection on vPro systems.\n\nSolve this by changing the usleep_range calls back to udelay." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1d16cd91cd31", + "version_value": "f8a139656c95" + }, + { + "version_affected": "<", + "version_name": "0a4e3c2d976a", + "version_value": "950d5226cd6b" + }, + { + "version_affected": "<", + "version_name": "6dbdd4de0362", + "version_value": "387f295cb215" + }, + { + "version_affected": "<", + "version_name": "6.6.26", + "version_value": "6.6.31" + }, + { + "version_affected": "<", + "version_name": "6.8.5", + "version_value": "6.8.10" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/f8a139656c95db893a543159873c57a470d7376d", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/f8a139656c95db893a543159873c57a470d7376d" + }, + { + "url": "https://git.kernel.org/stable/c/950d5226cd6bb83ba720961a8d4d5cf79e6afd57", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/950d5226cd6bb83ba720961a8d4d5cf79e6afd57" + }, + { + "url": "https://git.kernel.org/stable/c/387f295cb2150ed164905b648d76dfcbd3621778", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/387f295cb2150ed164905b648d76dfcbd3621778" + } + ] + }, + "generator": { + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36888.json b/2024/36xxx/CVE-2024-36888.json index 6a7deea3416..ae9ff212758 100644 --- a/2024/36xxx/CVE-2024-36888.json +++ b/2024/36xxx/CVE-2024-36888.json @@ -1,18 +1,113 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-36888", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nworkqueue: Fix selection of wake_cpu in kick_pool()\n\nWith cpu_possible_mask=0-63 and cpu_online_mask=0-7 the following\nkernel oops was observed:\n\nsmp: Bringing up secondary CPUs ...\nsmp: Brought up 1 node, 8 CPUs\nUnable to handle kernel pointer dereference in virtual kernel address space\nFailing address: 0000000000000000 TEID: 0000000000000803\n[..]\n Call Trace:\narch_vcpu_is_preempted+0x12/0x80\nselect_idle_sibling+0x42/0x560\nselect_task_rq_fair+0x29a/0x3b0\ntry_to_wake_up+0x38e/0x6e0\nkick_pool+0xa4/0x198\n__queue_work.part.0+0x2bc/0x3a8\ncall_timer_fn+0x36/0x160\n__run_timers+0x1e2/0x328\n__run_timer_base+0x5a/0x88\nrun_timer_softirq+0x40/0x78\n__do_softirq+0x118/0x388\nirq_exit_rcu+0xc0/0xd8\ndo_ext_irq+0xae/0x168\next_int_handler+0xbe/0xf0\npsw_idle_exit+0x0/0xc\ndefault_idle_call+0x3c/0x110\ndo_idle+0xd4/0x158\ncpu_startup_entry+0x40/0x48\nrest_init+0xc6/0xc8\nstart_kernel+0x3c4/0x5e0\nstartup_continue+0x3c/0x50\n\nThe crash is caused by calling arch_vcpu_is_preempted() for an offline\nCPU. To avoid this, select the cpu with cpumask_any_and_distribute()\nto mask __pod_cpumask with cpu_online_mask. In case no cpu is left in\nthe pool, skip the assignment.\n\ntj: This doesn't fully fix the bug as CPUs can still go down between picking\nthe target CPU and the wake call. Fixing that likely requires adding\ncpu_online() test to either the sched or s390 arch code. However, regardless\nof how that is fixed, workqueue shouldn't be picking a CPU which isn't\nonline as that would result in unpredictable and worse behavior." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "8639ecebc9b1", + "version_value": "c57824d4fe07" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.6", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.6", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.31", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.8.10", + "lessThanOrEqual": "6.8.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.9", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/c57824d4fe07c2131f8c48687cbd5ee2be60c767", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c57824d4fe07c2131f8c48687cbd5ee2be60c767" + }, + { + "url": "https://git.kernel.org/stable/c/6d559e70b3eb6623935cbe7f94c1912c1099777b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/6d559e70b3eb6623935cbe7f94c1912c1099777b" + }, + { + "url": "https://git.kernel.org/stable/c/57a01eafdcf78f6da34fad9ff075ed5dfdd9f420", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/57a01eafdcf78f6da34fad9ff075ed5dfdd9f420" + } + ] + }, + "generator": { + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36889.json b/2024/36xxx/CVE-2024-36889.json index ea394da4dd1..a3a2a685a0d 100644 --- a/2024/36xxx/CVE-2024-36889.json +++ b/2024/36xxx/CVE-2024-36889.json @@ -55,37 +55,37 @@ "version": "0", "lessThan": "5.9", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.218", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.159", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.91", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.31", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.10", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -137,15 +137,10 @@ "url": "https://git.kernel.org/stable/c/fb7a0d334894206ae35f023a82cad5a290fd7386", "refsource": "MISC", "name": "https://git.kernel.org/stable/c/fb7a0d334894206ae35f023a82cad5a290fd7386" - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html", - "refsource": "MISC", - "name": "https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html" } ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36890.json b/2024/36xxx/CVE-2024-36890.json index 11652f82a0c..9efad90379d 100644 --- a/2024/36xxx/CVE-2024-36890.json +++ b/2024/36xxx/CVE-2024-36890.json @@ -1,18 +1,129 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-36890", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/slab: make __free(kfree) accept error pointers\n\nCurrently, if an automatically freed allocation is an error pointer that\nwill lead to a crash. An example of this is in wm831x_gpio_dbg_show().\n\n 171\tchar *label __free(kfree) = gpiochip_dup_line_label(chip, i);\n 172\tif (IS_ERR(label)) {\n 173\t\tdev_err(wm831x->dev, \"Failed to duplicate label\\n\");\n 174\t\tcontinue;\n 175 }\n\nThe auto clean up function should check for error pointers as well,\notherwise we're going to keep hitting issues like this." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3c6cc62ce126", + "version_value": "9f6eb0ab4f95" + }, + { + "version_affected": "<", + "version_name": "54da6a092431", + "version_value": "ac6cf3ce9b7d" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.5", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.5", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.91", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.31", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.8.10", + "lessThanOrEqual": "6.8.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.9", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/9f6eb0ab4f95240589ee85fd9886a944cd3645b2", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/9f6eb0ab4f95240589ee85fd9886a944cd3645b2" + }, + { + "url": "https://git.kernel.org/stable/c/ac6cf3ce9b7d12acb7b528248df5f87caa25fcdc", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ac6cf3ce9b7d12acb7b528248df5f87caa25fcdc" + }, + { + "url": "https://git.kernel.org/stable/c/79cbe0be6c0317b215ddd8bd3e32f0afdac48543", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/79cbe0be6c0317b215ddd8bd3e32f0afdac48543" + }, + { + "url": "https://git.kernel.org/stable/c/cd7eb8f83fcf258f71e293f7fc52a70be8ed0128", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/cd7eb8f83fcf258f71e293f7fc52a70be8ed0128" + } + ] + }, + "generator": { + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36891.json b/2024/36xxx/CVE-2024-36891.json index b0ce0313d69..84a3d95a704 100644 --- a/2024/36xxx/CVE-2024-36891.json +++ b/2024/36xxx/CVE-2024-36891.json @@ -55,25 +55,25 @@ "version": "0", "lessThan": "6.1", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.94", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.31", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.10", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-a5840b7849dd" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36892.json b/2024/36xxx/CVE-2024-36892.json index a165ce8e12c..4c10dee9652 100644 --- a/2024/36xxx/CVE-2024-36892.json +++ b/2024/36xxx/CVE-2024-36892.json @@ -1,18 +1,102 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-36892", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/slub: avoid zeroing outside-object freepointer for single free\n\nCommit 284f17ac13fe (\"mm/slub: handle bulk and single object freeing\nseparately\") splits single and bulk object freeing in two functions\nslab_free() and slab_free_bulk() which leads slab_free() to call\nslab_free_hook() directly instead of slab_free_freelist_hook().\n\nIf `init_on_free` is set, slab_free_hook() zeroes the object.\nAfterward, if `slub_debug=F` and `CONFIG_SLAB_FREELIST_HARDENED` are\nset, the do_slab_free() slowpath executes freelist consistency\nchecks and try to decode a zeroed freepointer which leads to a\n\"Freepointer corrupt\" detection in check_object().\n\nDuring bulk free, slab_free_freelist_hook() isn't affected as it always\nsets it objects freepointer using set_freepointer() to maintain its\nreconstructed freelist after `init_on_free`.\n\nFor single free, object's freepointer thus needs to be avoided when\nstored outside the object if `init_on_free` is set. The freepointer left\nas is, check_object() may later detect an invalid pointer value due to\nobjects overflow.\n\nTo reproduce, set `slub_debug=FU init_on_free=1 log_level=7` on the\ncommand line of a kernel build with `CONFIG_SLAB_FREELIST_HARDENED=y`.\n\ndmesg sample log:\n[ 10.708715] =============================================================================\n[ 10.710323] BUG kmalloc-rnd-05-32 (Tainted: G B T ): Freepointer corrupt\n[ 10.712695] -----------------------------------------------------------------------------\n[ 10.712695]\n[ 10.712695] Slab 0xffffd8bdc400d580 objects=32 used=4 fp=0xffff9d9a80356f80 flags=0x200000000000a00(workingset|slab|node=0|zone=2)\n[ 10.716698] Object 0xffff9d9a80356600 @offset=1536 fp=0x7ee4f480ce0ecd7c\n[ 10.716698]\n[ 10.716698] Bytes b4 ffff9d9a803565f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n[ 10.720703] Object ffff9d9a80356600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n[ 10.720703] Object ffff9d9a80356610: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n[ 10.724696] Padding ffff9d9a8035666c: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n[ 10.724696] Padding ffff9d9a8035667c: 00 00 00 00 ....\n[ 10.724696] FIX kmalloc-rnd-05-32: Object at 0xffff9d9a80356600 not freed" } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "284f17ac13fe", + "version_value": "56900355485f" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.8", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.8", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.8.10", + "lessThanOrEqual": "6.8.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.9", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/56900355485f6e82114b18c812edd57fd7970dcb", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/56900355485f6e82114b18c812edd57fd7970dcb" + }, + { + "url": "https://git.kernel.org/stable/c/8f828aa48812ced28aa39cb3cfe55ef2444d03dd", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/8f828aa48812ced28aa39cb3cfe55ef2444d03dd" + } + ] + }, + "generator": { + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36893.json b/2024/36xxx/CVE-2024-36893.json index a79f70d0094..425570dab4c 100644 --- a/2024/36xxx/CVE-2024-36893.json +++ b/2024/36xxx/CVE-2024-36893.json @@ -65,31 +65,31 @@ "version": "0", "lessThan": "6.6", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.168", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.91", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.31", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.10", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -140,6 +140,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36894.json b/2024/36xxx/CVE-2024-36894.json index 9afc74d8601..0ce7737c2c9 100644 --- a/2024/36xxx/CVE-2024-36894.json +++ b/2024/36xxx/CVE-2024-36894.json @@ -55,49 +55,49 @@ "version": "0", "lessThan": "3.15", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.317", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.279", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.221", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.162", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.95", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.31", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.8.10", "lessThanOrEqual": "6.8.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9", @@ -163,6 +163,6 @@ ] }, "generator": { - "engine": "bippy-7d53e8ef8be4" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36895.json b/2024/36xxx/CVE-2024-36895.json index 745cf7ae931..000351ef9f6 100644 --- a/2024/36xxx/CVE-2024-36895.json +++ b/2024/36xxx/CVE-2024-36895.json @@ -1,18 +1,113 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-36895", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: uvc: use correct buffer size when parsing configfs lists\n\nThis commit fixes uvc gadget support on 32-bit platforms.\n\nCommit 0df28607c5cb (\"usb: gadget: uvc: Generalise helper functions for\nreuse\") introduced a helper function __uvcg_iter_item_entries() to aid\nwith parsing lists of items on configfs attributes stores. This function\nis a generalization of another very similar function, which used a\nstack-allocated temporary buffer of fixed size for each item in the list\nand used the sizeof() operator to check for potential buffer overruns.\nThe new function was changed to allocate the now variably sized temp\nbuffer on heap, but wasn't properly updated to also check for max buffer\nsize using the computed size instead of sizeof() operator.\n\nAs a result, the maximum item size was 7 (plus null terminator) on\n64-bit platforms, and 3 on 32-bit ones. While 7 is accidentally just\nbarely enough, 3 is definitely too small for some of UVC configfs\nattributes. For example, dwFrameInteval, specified in 100ns units,\nusually has 6-digit item values, e.g. 166666 for 60fps." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0df28607c5cb", + "version_value": "7a54e5052bde" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.3", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.3", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.31", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.8.10", + "lessThanOrEqual": "6.8.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.9", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/7a54e5052bde582fd0e7677334fe7a5be92e242c", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7a54e5052bde582fd0e7677334fe7a5be92e242c" + }, + { + "url": "https://git.kernel.org/stable/c/a422089ce42ced73713e5032aad29a9a7cbe9528", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a422089ce42ced73713e5032aad29a9a7cbe9528" + }, + { + "url": "https://git.kernel.org/stable/c/650ae71c80749fc7cb8858c8049f532eaec64410", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/650ae71c80749fc7cb8858c8049f532eaec64410" + } + ] + }, + "generator": { + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36896.json b/2024/36xxx/CVE-2024-36896.json index 8ddf10aa2b4..336d52d73c1 100644 --- a/2024/36xxx/CVE-2024-36896.json +++ b/2024/36xxx/CVE-2024-36896.json @@ -1,18 +1,124 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-36896", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix access violation during port device removal\n\nTesting with KASAN and syzkaller revealed a bug in port.c:disable_store():\nusb_hub_to_struct_hub() can return NULL if the hub that the port belongs to\nis concurrently removed, but the function does not check for this\npossibility before dereferencing the returned value.\n\nIt turns out that the first dereference is unnecessary, since hub->intfdev\nis the parent of the port device, so it can be changed easily. Adding a\ncheck for hub == NULL prevents further problems.\n\nThe same bug exists in the disable_show() routine, and it can be fixed the\nsame way." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "f061f43d7418", + "version_value": "5f1d68ef5dda" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "6.0", + "status": "affected" + }, + { + "version": "0", + "lessThan": "6.0", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.91", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.31", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.8.10", + "lessThanOrEqual": "6.8.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.9", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/5f1d68ef5ddac27c6b997adccd1c339cef1e6848", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/5f1d68ef5ddac27c6b997adccd1c339cef1e6848" + }, + { + "url": "https://git.kernel.org/stable/c/63533549ff53d24daf47c443dbd43c308afc3434", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/63533549ff53d24daf47c443dbd43c308afc3434" + }, + { + "url": "https://git.kernel.org/stable/c/6119ef6517ce501fc548154691abdaf1f954a277", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/6119ef6517ce501fc548154691abdaf1f954a277" + }, + { + "url": "https://git.kernel.org/stable/c/a4b46d450c49f32e9d4247b421e58083fde304ce", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a4b46d450c49f32e9d4247b421e58083fde304ce" + } + ] + }, + "generator": { + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36897.json b/2024/36xxx/CVE-2024-36897.json index 234e63b752e..b4a6179eb09 100644 --- a/2024/36xxx/CVE-2024-36897.json +++ b/2024/36xxx/CVE-2024-36897.json @@ -1,18 +1,125 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-36897", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Atom Integrated System Info v2_2 for DCN35\n\nNew request from KMD/VBIOS in order to support new UMA carveout\nmodel. This fixes a null dereference from accessing\nCtx->dc_bios->integrated_info while it was NULL.\n\nDAL parses through the BIOS and extracts the necessary\nintegrated_info but was missing a case for the new BIOS\nversion 2.3." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f4", + "version_value": "3c7013a87124" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.15.159", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.91", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.31", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.8.10", + "lessThanOrEqual": "6.8.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.9", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/3c7013a87124bab54216d9b99f77e8b6de6fbc1a", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/3c7013a87124bab54216d9b99f77e8b6de6fbc1a" + }, + { + "url": "https://git.kernel.org/stable/c/02f5300f6827206f6e48a77f51e6264993695e5c", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/02f5300f6827206f6e48a77f51e6264993695e5c" + }, + { + "url": "https://git.kernel.org/stable/c/7e3030774431eb093165a31baff040d35446fb8b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7e3030774431eb093165a31baff040d35446fb8b" + }, + { + "url": "https://git.kernel.org/stable/c/c2797ec16d9072327e7578d09ee05bcab52fffd0", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c2797ec16d9072327e7578d09ee05bcab52fffd0" + }, + { + "url": "https://git.kernel.org/stable/c/9a35d205f466501dcfe5625ca313d944d0ac2d60", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/9a35d205f466501dcfe5625ca313d944d0ac2d60" + } + ] + }, + "generator": { + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36898.json b/2024/36xxx/CVE-2024-36898.json index 976a8d34f3f..a406cdbf51b 100644 --- a/2024/36xxx/CVE-2024-36898.json +++ b/2024/36xxx/CVE-2024-36898.json @@ -1,18 +1,124 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-36898", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpiolib: cdev: fix uninitialised kfifo\n\nIf a line is requested with debounce, and that results in debouncing\nin software, and the line is subsequently reconfigured to enable edge\ndetection then the allocation of the kfifo to contain edge events is\noverlooked. This results in events being written to and read from an\nuninitialised kfifo. Read events are returned to userspace.\n\nInitialise the kfifo in the case where the software debounce is\nalready active." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "65cff7046406", + "version_value": "1a51e24404d7" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.10", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.10", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.91", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.31", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.8.10", + "lessThanOrEqual": "6.8.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.9", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/1a51e24404d77bb3307c1e39eee0d8e86febb1a5", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/1a51e24404d77bb3307c1e39eee0d8e86febb1a5" + }, + { + "url": "https://git.kernel.org/stable/c/883e4bbf06eb5fb7482679e4edb201093e9f55a2", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/883e4bbf06eb5fb7482679e4edb201093e9f55a2" + }, + { + "url": "https://git.kernel.org/stable/c/bd7139a70ee8d8ea872b223e043730cf6f5e2b0e", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/bd7139a70ee8d8ea872b223e043730cf6f5e2b0e" + }, + { + "url": "https://git.kernel.org/stable/c/ee0166b637a5e376118e9659e5b4148080f1d27e", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ee0166b637a5e376118e9659e5b4148080f1d27e" + } + ] + }, + "generator": { + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36899.json b/2024/36xxx/CVE-2024-36899.json index 374894b440f..3f4f9ecb09c 100644 --- a/2024/36xxx/CVE-2024-36899.json +++ b/2024/36xxx/CVE-2024-36899.json @@ -1,18 +1,113 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-36899", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpiolib: cdev: Fix use after free in lineinfo_changed_notify\n\nThe use-after-free issue occurs as follows: when the GPIO chip device file\nis being closed by invoking gpio_chrdev_release(), watched_lines is freed\nby bitmap_free(), but the unregistration of lineinfo_changed_nb notifier\nchain failed due to waiting write rwsem. Additionally, one of the GPIO\nchip's lines is also in the release process and holds the notifier chain's\nread rwsem. Consequently, a race condition leads to the use-after-free of\nwatched_lines.\n\nHere is the typical stack when issue happened:\n\n[free]\ngpio_chrdev_release()\n --> bitmap_free(cdev->watched_lines) <-- freed\n --> blocking_notifier_chain_unregister()\n --> down_write(&nh->rwsem) <-- waiting rwsem\n --> __down_write_common()\n --> rwsem_down_write_slowpath()\n --> schedule_preempt_disabled()\n --> schedule()\n\n[use]\nst54spi_gpio_dev_release()\n --> gpio_free()\n --> gpiod_free()\n --> gpiod_free_commit()\n --> gpiod_line_state_notify()\n --> blocking_notifier_call_chain()\n --> down_read(&nh->rwsem); <-- held rwsem\n --> notifier_call_chain()\n --> lineinfo_changed_notify()\n --> test_bit(xxxx, cdev->watched_lines) <-- use after free\n\nThe side effect of the use-after-free issue is that a GPIO line event is\nbeing generated for userspace where it shouldn't. However, since the chrdev\nis being closed, userspace won't have the chance to read that event anyway.\n\nTo fix the issue, call the bitmap_free() function after the unregistration\nof lineinfo_changed_nb notifier chain." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "51c1064e82e7", + "version_value": "95ca7c90eaf5" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.7", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.7", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.6.31", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.8.10", + "lessThanOrEqual": "6.8.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.9", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/95ca7c90eaf5ea8a8460536535101e3e81160e2a", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/95ca7c90eaf5ea8a8460536535101e3e81160e2a" + }, + { + "url": "https://git.kernel.org/stable/c/ca710b5f40b8b16fdcad50bebd47f50e4c62d239", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/ca710b5f40b8b16fdcad50bebd47f50e4c62d239" + }, + { + "url": "https://git.kernel.org/stable/c/02f6b0e1ec7e0e7d059dddc893645816552039da", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/02f6b0e1ec7e0e7d059dddc893645816552039da" + } + ] + }, + "generator": { + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/39xxx/CVE-2024-39495.json b/2024/39xxx/CVE-2024-39495.json index c8c58507cdc..ca393ad56ed 100644 --- a/2024/39xxx/CVE-2024-39495.json +++ b/2024/39xxx/CVE-2024-39495.json @@ -51,37 +51,37 @@ "version": "5.4.279", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.221", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.162", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.95", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.35", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.6", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -142,6 +142,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/39xxx/CVE-2024-39496.json b/2024/39xxx/CVE-2024-39496.json index ffa29de4724..eac7a2ba044 100644 --- a/2024/39xxx/CVE-2024-39496.json +++ b/2024/39xxx/CVE-2024-39496.json @@ -51,19 +51,19 @@ "version": "6.1.95", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.35", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.6", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -109,6 +109,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/39xxx/CVE-2024-39497.json b/2024/39xxx/CVE-2024-39497.json index b294e8f4fed..a828dd6d449 100644 --- a/2024/39xxx/CVE-2024-39497.json +++ b/2024/39xxx/CVE-2024-39497.json @@ -55,31 +55,31 @@ "version": "0", "lessThan": "5.2", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.169", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.114", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.35", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.6", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -130,6 +130,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/39xxx/CVE-2024-39498.json b/2024/39xxx/CVE-2024-39498.json index 2f0fb88a721..298ca631234 100644 --- a/2024/39xxx/CVE-2024-39498.json +++ b/2024/39xxx/CVE-2024-39498.json @@ -55,13 +55,13 @@ "version": "0", "lessThan": "6.7", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.6", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/39xxx/CVE-2024-39499.json b/2024/39xxx/CVE-2024-39499.json index 8547ea1eb58..fc836759420 100644 --- a/2024/39xxx/CVE-2024-39499.json +++ b/2024/39xxx/CVE-2024-39499.json @@ -55,49 +55,49 @@ "version": "0", "lessThan": "3.9", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.317", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.279", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.221", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.162", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.95", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.35", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.6", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -163,6 +163,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/39xxx/CVE-2024-39500.json b/2024/39xxx/CVE-2024-39500.json index 4591cc6579b..6e3e60c4bbd 100644 --- a/2024/39xxx/CVE-2024-39500.json +++ b/2024/39xxx/CVE-2024-39500.json @@ -55,31 +55,31 @@ "version": "0", "lessThan": "5.13", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.162", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.95", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.35", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.6", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -130,6 +130,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/39xxx/CVE-2024-39501.json b/2024/39xxx/CVE-2024-39501.json index 1e0fb74ef99..d09fbefbee0 100644 --- a/2024/39xxx/CVE-2024-39501.json +++ b/2024/39xxx/CVE-2024-39501.json @@ -55,49 +55,49 @@ "version": "0", "lessThan": "2.6.21", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.317", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.279", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.221", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.162", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.95", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.35", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.6", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -163,6 +163,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/39xxx/CVE-2024-39502.json b/2024/39xxx/CVE-2024-39502.json index 8dc13aa52ac..82d01cbd377 100644 --- a/2024/39xxx/CVE-2024-39502.json +++ b/2024/39xxx/CVE-2024-39502.json @@ -55,43 +55,43 @@ "version": "0", "lessThan": "5.4", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.279", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.221", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.162", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.95", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.35", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.6", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -152,6 +152,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/39xxx/CVE-2024-39503.json b/2024/39xxx/CVE-2024-39503.json index 46a056e5ef1..31a77891cb4 100644 --- a/2024/39xxx/CVE-2024-39503.json +++ b/2024/39xxx/CVE-2024-39503.json @@ -80,43 +80,43 @@ "version": "0", "lessThan": "6.8", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.279", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.221", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.162", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.95", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.35", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.6", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -177,6 +177,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/39xxx/CVE-2024-39504.json b/2024/39xxx/CVE-2024-39504.json index e5f7650ccdf..6faee56a4f7 100644 --- a/2024/39xxx/CVE-2024-39504.json +++ b/2024/39xxx/CVE-2024-39504.json @@ -55,19 +55,19 @@ "version": "0", "lessThan": "6.2", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.35", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.6", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/39xxx/CVE-2024-39505.json b/2024/39xxx/CVE-2024-39505.json index 8065c55321f..ff3d4ae8b93 100644 --- a/2024/39xxx/CVE-2024-39505.json +++ b/2024/39xxx/CVE-2024-39505.json @@ -55,43 +55,43 @@ "version": "0", "lessThan": "5.3", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.279", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.221", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.162", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.95", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.35", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.6", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -152,6 +152,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/39xxx/CVE-2024-39506.json b/2024/39xxx/CVE-2024-39506.json index 6642025b042..8951acb1368 100644 --- a/2024/39xxx/CVE-2024-39506.json +++ b/2024/39xxx/CVE-2024-39506.json @@ -55,49 +55,49 @@ "version": "0", "lessThan": "4.15", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.317", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.279", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.221", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.162", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.95", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.35", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.6", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -163,6 +163,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/39xxx/CVE-2024-39507.json b/2024/39xxx/CVE-2024-39507.json index f5db1aa4840..75d3791acc3 100644 --- a/2024/39xxx/CVE-2024-39507.json +++ b/2024/39xxx/CVE-2024-39507.json @@ -55,31 +55,31 @@ "version": "0", "lessThan": "5.1", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.162", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.95", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.35", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.6", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -130,6 +130,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/39xxx/CVE-2024-39508.json b/2024/39xxx/CVE-2024-39508.json index 992835a235b..519f76f2613 100644 --- a/2024/39xxx/CVE-2024-39508.json +++ b/2024/39xxx/CVE-2024-39508.json @@ -51,13 +51,13 @@ "version": "6.6.35", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.6", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -98,6 +98,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/42xxx/CVE-2024-42107.json b/2024/42xxx/CVE-2024-42107.json index c6ff6e3b17a..f7e44d83fe5 100644 --- a/2024/42xxx/CVE-2024-42107.json +++ b/2024/42xxx/CVE-2024-42107.json @@ -55,13 +55,13 @@ "version": "0", "lessThan": "5.14", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.9", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/42xxx/CVE-2024-42108.json b/2024/42xxx/CVE-2024-42108.json index ebb3f195d7a..feb73f1c5f6 100644 --- a/2024/42xxx/CVE-2024-42108.json +++ b/2024/42xxx/CVE-2024-42108.json @@ -55,13 +55,13 @@ "version": "0", "lessThan": "6.8", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.9", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/42xxx/CVE-2024-42109.json b/2024/42xxx/CVE-2024-42109.json index c269cd58506..ae29ba21250 100644 --- a/2024/42xxx/CVE-2024-42109.json +++ b/2024/42xxx/CVE-2024-42109.json @@ -65,31 +65,31 @@ "version": "0", "lessThan": "6.5", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.163", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.98", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.39", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.9", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -140,6 +140,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/42xxx/CVE-2024-42110.json b/2024/42xxx/CVE-2024-42110.json index 6f3a37b69c3..203d22f8d35 100644 --- a/2024/42xxx/CVE-2024-42110.json +++ b/2024/42xxx/CVE-2024-42110.json @@ -55,25 +55,25 @@ "version": "0", "lessThan": "3.9", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.98", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.39", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.9", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -119,6 +119,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/42xxx/CVE-2024-42111.json b/2024/42xxx/CVE-2024-42111.json index caf98265817..90bfd2982d0 100644 --- a/2024/42xxx/CVE-2024-42111.json +++ b/2024/42xxx/CVE-2024-42111.json @@ -55,13 +55,13 @@ "version": "0", "lessThan": "6.9", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.9", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/42xxx/CVE-2024-42112.json b/2024/42xxx/CVE-2024-42112.json index 91d89199a3d..ecfc1455ce0 100644 --- a/2024/42xxx/CVE-2024-42112.json +++ b/2024/42xxx/CVE-2024-42112.json @@ -55,13 +55,13 @@ "version": "0", "lessThan": "6.9", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.9", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/42xxx/CVE-2024-42113.json b/2024/42xxx/CVE-2024-42113.json index f1d037a1450..2091dfe929c 100644 --- a/2024/42xxx/CVE-2024-42113.json +++ b/2024/42xxx/CVE-2024-42113.json @@ -55,19 +55,19 @@ "version": "0", "lessThan": "6.3", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.39", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.9", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -108,6 +108,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/42xxx/CVE-2024-42114.json b/2024/42xxx/CVE-2024-42114.json index a2019af45d7..535c4b8b8e5 100644 --- a/2024/42xxx/CVE-2024-42114.json +++ b/2024/42xxx/CVE-2024-42114.json @@ -55,37 +55,37 @@ "version": "0", "lessThan": "4.18", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.224", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.165", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.106", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.47", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.9", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -141,6 +141,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/42xxx/CVE-2024-42115.json b/2024/42xxx/CVE-2024-42115.json index 2d16ffc2da0..6c3e991ae7d 100644 --- a/2024/42xxx/CVE-2024-42115.json +++ b/2024/42xxx/CVE-2024-42115.json @@ -51,43 +51,43 @@ "version": "4.19.318", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.280", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.222", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.163", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.98", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.39", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.9", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -153,6 +153,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/42xxx/CVE-2024-42116.json b/2024/42xxx/CVE-2024-42116.json index a7f1a129fe2..851ff73e519 100644 --- a/2024/42xxx/CVE-2024-42116.json +++ b/2024/42xxx/CVE-2024-42116.json @@ -51,25 +51,25 @@ "version": "5.15.163", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.98", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.39", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.9", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -120,6 +120,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/42xxx/CVE-2024-42117.json b/2024/42xxx/CVE-2024-42117.json index 164cee45abd..f06730bb074 100644 --- a/2024/42xxx/CVE-2024-42117.json +++ b/2024/42xxx/CVE-2024-42117.json @@ -51,7 +51,7 @@ "version": "6.9.9", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -87,6 +87,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/42xxx/CVE-2024-42118.json b/2024/42xxx/CVE-2024-42118.json index b14dd6f6066..a3d3ef80e9b 100644 --- a/2024/42xxx/CVE-2024-42118.json +++ b/2024/42xxx/CVE-2024-42118.json @@ -51,7 +51,7 @@ "version": "6.9.9", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -87,6 +87,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/42xxx/CVE-2024-42119.json b/2024/42xxx/CVE-2024-42119.json index 1693c849558..d24e2bfca2b 100644 --- a/2024/42xxx/CVE-2024-42119.json +++ b/2024/42xxx/CVE-2024-42119.json @@ -51,43 +51,43 @@ "version": "4.19.318", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.280", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.222", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.163", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.98", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.39", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.9", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -153,6 +153,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/42xxx/CVE-2024-42120.json b/2024/42xxx/CVE-2024-42120.json index d1d3a8c1314..833e2ab5735 100644 --- a/2024/42xxx/CVE-2024-42120.json +++ b/2024/42xxx/CVE-2024-42120.json @@ -51,31 +51,31 @@ "version": "5.10.222", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.163", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.98", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.39", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.9.9", "lessThanOrEqual": "6.9.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -131,6 +131,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/44xxx/CVE-2024-44935.json b/2024/44xxx/CVE-2024-44935.json index 2a5918870c8..a1bca37e313 100644 --- a/2024/44xxx/CVE-2024-44935.json +++ b/2024/44xxx/CVE-2024-44935.json @@ -55,43 +55,43 @@ "version": "0", "lessThan": "5.0", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.282", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.224", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.165", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.105", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.46", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.5", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -152,6 +152,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/44xxx/CVE-2024-44936.json b/2024/44xxx/CVE-2024-44936.json index 6ce73fd2ef8..152fe0add06 100644 --- a/2024/44xxx/CVE-2024-44936.json +++ b/2024/44xxx/CVE-2024-44936.json @@ -55,13 +55,13 @@ "version": "0", "lessThan": "6.9", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.5", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/44xxx/CVE-2024-44937.json b/2024/44xxx/CVE-2024-44937.json index 87bd3914ee8..eb12a9f4444 100644 --- a/2024/44xxx/CVE-2024-44937.json +++ b/2024/44xxx/CVE-2024-44937.json @@ -55,13 +55,13 @@ "version": "0", "lessThan": "6.8", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.5", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/44xxx/CVE-2024-44938.json b/2024/44xxx/CVE-2024-44938.json index e8ddd0cdd6b..0174764b804 100644 --- a/2024/44xxx/CVE-2024-44938.json +++ b/2024/44xxx/CVE-2024-44938.json @@ -51,19 +51,19 @@ "version": "6.1.107", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.47", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.6", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -109,6 +109,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/44xxx/CVE-2024-44939.json b/2024/44xxx/CVE-2024-44939.json index 94db3820a36..372b1550a9c 100644 --- a/2024/44xxx/CVE-2024-44939.json +++ b/2024/44xxx/CVE-2024-44939.json @@ -51,19 +51,19 @@ "version": "6.1.107", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.47", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.6", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -109,6 +109,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/44xxx/CVE-2024-44940.json b/2024/44xxx/CVE-2024-44940.json index b130c03172b..98e464c4530 100644 --- a/2024/44xxx/CVE-2024-44940.json +++ b/2024/44xxx/CVE-2024-44940.json @@ -51,19 +51,19 @@ "version": "6.1.107", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.47", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.6", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -109,6 +109,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/44xxx/CVE-2024-44941.json b/2024/44xxx/CVE-2024-44941.json index b6541c65ed7..e663abae49e 100644 --- a/2024/44xxx/CVE-2024-44941.json +++ b/2024/44xxx/CVE-2024-44941.json @@ -51,13 +51,13 @@ "version": "6.6.47", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.6", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -98,6 +98,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/44xxx/CVE-2024-44942.json b/2024/44xxx/CVE-2024-44942.json index 43ca1c19283..6cb0e84d089 100644 --- a/2024/44xxx/CVE-2024-44942.json +++ b/2024/44xxx/CVE-2024-44942.json @@ -51,13 +51,13 @@ "version": "6.6.47", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.6", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -98,6 +98,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/44xxx/CVE-2024-44943.json b/2024/44xxx/CVE-2024-44943.json index cf59329b74e..91fe14cce47 100644 --- a/2024/44xxx/CVE-2024-44943.json +++ b/2024/44xxx/CVE-2024-44943.json @@ -55,13 +55,13 @@ "version": "0", "lessThan": "6.6", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.47", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10", @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/44xxx/CVE-2024-44944.json b/2024/44xxx/CVE-2024-44944.json index 39024e6373c..b327be22d61 100644 --- a/2024/44xxx/CVE-2024-44944.json +++ b/2024/44xxx/CVE-2024-44944.json @@ -60,49 +60,49 @@ "version": "0", "lessThan": "5.1", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.320", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.282", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.224", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.165", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.103", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.44", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.3", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -173,6 +173,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/44xxx/CVE-2024-44945.json b/2024/44xxx/CVE-2024-44945.json index 694563175e6..d6189ec6803 100644 --- a/2024/44xxx/CVE-2024-44945.json +++ b/2024/44xxx/CVE-2024-44945.json @@ -55,13 +55,13 @@ "version": "0", "lessThan": "6.10", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.7", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -97,6 +97,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/44xxx/CVE-2024-44946.json b/2024/44xxx/CVE-2024-44946.json index fcaa1d1f370..5a2cfb4e560 100644 --- a/2024/44xxx/CVE-2024-44946.json +++ b/2024/44xxx/CVE-2024-44946.json @@ -55,49 +55,49 @@ "version": "0", "lessThan": "4.6", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.321", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.283", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.225", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.166", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.107", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.48", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.7", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -163,6 +163,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/44xxx/CVE-2024-44947.json b/2024/44xxx/CVE-2024-44947.json index b90d8f608c2..cc10ed033cc 100644 --- a/2024/44xxx/CVE-2024-44947.json +++ b/2024/44xxx/CVE-2024-44947.json @@ -55,49 +55,49 @@ "version": "0", "lessThan": "2.6.36", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.321", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.283", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.225", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.166", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.107", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.48", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.7", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -163,6 +163,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/44xxx/CVE-2024-44948.json b/2024/44xxx/CVE-2024-44948.json index 00000affdc9..63ab52b9f7d 100644 --- a/2024/44xxx/CVE-2024-44948.json +++ b/2024/44xxx/CVE-2024-44948.json @@ -55,49 +55,49 @@ "version": "0", "lessThan": "2.6.22", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "4.19.320", "lessThanOrEqual": "4.19.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.4.282", "lessThanOrEqual": "5.4.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.10.224", "lessThanOrEqual": "5.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "5.15.165", "lessThanOrEqual": "5.15.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.1.105", "lessThanOrEqual": "6.1.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.6.46", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.5", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -163,6 +163,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file diff --git a/2024/44xxx/CVE-2024-44949.json b/2024/44xxx/CVE-2024-44949.json index df6665d5a12..a899aa26677 100644 --- a/2024/44xxx/CVE-2024-44949.json +++ b/2024/44xxx/CVE-2024-44949.json @@ -51,13 +51,13 @@ "version": "6.6.46", "lessThanOrEqual": "6.6.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.10.5", "lessThanOrEqual": "6.10.*", "status": "unaffected", - "versionType": "custom" + "versionType": "semver" }, { "version": "6.11", @@ -98,6 +98,6 @@ ] }, "generator": { - "engine": "bippy-c9c4e1df01b2" + "engine": "bippy-9e1c9544281a" } } \ No newline at end of file