diff --git a/2022/2xxx/CVE-2022-2196.json b/2022/2xxx/CVE-2022-2196.json index 7cd26c61796..8be884542d7 100644 --- a/2022/2xxx/CVE-2022-2196.json +++ b/2022/2xxx/CVE-2022-2196.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a" + "value": "A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks.\u00a0L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB\u00a0after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit\u00a02e7eab81425a\n" } ] }, @@ -40,8 +40,9 @@ "version": { "version_data": [ { - "version_value": "0", - "version_affected": "=" + "version_affected": "<", + "version_name": "0", + "version_value": "2e7eab81425a" } ] } @@ -63,6 +64,11 @@ "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5", "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2022/3xxx/CVE-2022-3424.json b/2022/3xxx/CVE-2022-3424.json index 630875db128..c02050d3ff4 100644 --- a/2022/3xxx/CVE-2022-3424.json +++ b/2022/3xxx/CVE-2022-3424.json @@ -68,6 +68,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230406-0005/", "url": "https://security.netapp.com/advisory/ntap-20230406-0005/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2022/3xxx/CVE-2022-3707.json b/2022/3xxx/CVE-2022-3707.json index c13b9411c4f..234305b3257 100644 --- a/2022/3xxx/CVE-2022-3707.json +++ b/2022/3xxx/CVE-2022-3707.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/", "url": "https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2022/4xxx/CVE-2022-4129.json b/2022/4xxx/CVE-2022-4129.json index 50dcf34514f..47274cd7df8 100644 --- a/2022/4xxx/CVE-2022-4129.json +++ b/2022/4xxx/CVE-2022-4129.json @@ -54,21 +54,6 @@ }, "references": { "reference_data": [ - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/", - "refsource": "MISC", - "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/", - "refsource": "MISC", - "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/", - "refsource": "MISC", - "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/" - }, { "url": "https://lore.kernel.org/all/20221114191619.124659-1-jakub%40cloudflare.com/t", "refsource": "MISC", @@ -78,6 +63,26 @@ "url": "https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t", "refsource": "MISC", "name": "https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] } diff --git a/2022/4xxx/CVE-2022-4379.json b/2022/4xxx/CVE-2022-4379.json index 07ef0dba8f2..7cc9b23037c 100644 --- a/2022/4xxx/CVE-2022-4379.json +++ b/2022/4xxx/CVE-2022-4379.json @@ -69,15 +69,20 @@ "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/", + "refsource": "MISC", + "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/" }, { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", "refsource": "MISC", - "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/" + "name": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] } diff --git a/2023/0xxx/CVE-2023-0045.json b/2023/0xxx/CVE-2023-0045.json index 192d2a8b862..02d17bd01e9 100644 --- a/2023/0xxx/CVE-2023-0045.json +++ b/2023/0xxx/CVE-2023-0045.json @@ -59,6 +59,11 @@ "url": "https://git.kernel.org/tip/a664ec9158eeddd75121d39c9a0758016097fa96", "refsource": "MISC", "name": "https://git.kernel.org/tip/a664ec9158eeddd75121d39c9a0758016097fa96" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/0xxx/CVE-2023-0458.json b/2023/0xxx/CVE-2023-0458.json index cf3e7f4b8d1..76bdce82803 100644 --- a/2023/0xxx/CVE-2023-0458.json +++ b/2023/0xxx/CVE-2023-0458.json @@ -64,6 +64,11 @@ "url": "https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11", "refsource": "MISC", "name": "https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/0xxx/CVE-2023-0461.json b/2023/0xxx/CVE-2023-0461.json index 3d400f05e17..b3207bcdc86 100644 --- a/2023/0xxx/CVE-2023-0461.json +++ b/2023/0xxx/CVE-2023-0461.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c" + "value": "There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS\u00a0or CONFIG_XFRM_ESPINTCP\u00a0has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data\u00a0of a struct inet_connection_sock.\n\nWhen CONFIG_TLS\u00a0is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt\u00a0TCP_ULP\u00a0operation does not require any privilege.\n\nWe recommend upgrading past commit\u00a02c02d41d71f90a5168391b6a5f2954112ba2307c" } ] }, @@ -64,6 +64,11 @@ "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c", "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1073.json b/2023/1xxx/CVE-2023-1073.json index 69dc54b684c..835a3445f0f 100644 --- a/2023/1xxx/CVE-2023-1073.json +++ b/2023/1xxx/CVE-2023-1073.json @@ -58,6 +58,11 @@ "refsource": "MISC", "name": "https://www.openwall.com/lists/osssecurity/2023/01/17/3", "url": "https://www.openwall.com/lists/osssecurity/2023/01/17/3" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1074.json b/2023/1xxx/CVE-2023-1074.json index f0686210832..8b446d68521 100644 --- a/2023/1xxx/CVE-2023-1074.json +++ b/2023/1xxx/CVE-2023-1074.json @@ -58,6 +58,11 @@ "refsource": "MISC", "name": "https://www.openwall.com/lists/oss-security/2023/01/23/1", "url": "https://www.openwall.com/lists/oss-security/2023/01/23/1" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1076.json b/2023/1xxx/CVE-2023-1076.json index c7fdbf5f9e6..1f561cb7b4c 100644 --- a/2023/1xxx/CVE-2023-1076.json +++ b/2023/1xxx/CVE-2023-1076.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=a096ccca6e503a5c575717ff8a36ace27510ab0a", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=a096ccca6e503a5c575717ff8a36ace27510ab0a" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1077.json b/2023/1xxx/CVE-2023-1077.json index 0b735fa9cfd..e41e275d4ff 100644 --- a/2023/1xxx/CVE-2023-1077.json +++ b/2023/1xxx/CVE-2023-1077.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1078.json b/2023/1xxx/CVE-2023-1078.json index 9a8c201b70b..896247e41d2 100644 --- a/2023/1xxx/CVE-2023-1078.json +++ b/2023/1xxx/CVE-2023-1078.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=f753a68980cf4b59a80fe677619da2b1804f526d", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=f753a68980cf4b59a80fe677619da2b1804f526d" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1079.json b/2023/1xxx/CVE-2023-1079.json index 037e23d6ee0..910013fde8b 100644 --- a/2023/1xxx/CVE-2023-1079.json +++ b/2023/1xxx/CVE-2023-1079.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1118.json b/2023/1xxx/CVE-2023-1118.json index 3fea8fd2a6d..fd055d7c576 100644 --- a/2023/1xxx/CVE-2023-1118.json +++ b/2023/1xxx/CVE-2023-1118.json @@ -53,6 +53,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230413-0003/", "url": "https://security.netapp.com/advisory/ntap-20230413-0003/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1281.json b/2023/1xxx/CVE-2023-1281.json index 67af5c813b5..b0f7ac7c7a3 100644 --- a/2023/1xxx/CVE-2023-1281.json +++ b/2023/1xxx/CVE-2023-1281.json @@ -74,6 +74,11 @@ "url": "https://security.netapp.com/advisory/ntap-20230427-0004/", "refsource": "MISC", "name": "https://security.netapp.com/advisory/ntap-20230427-0004/" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1513.json b/2023/1xxx/CVE-2023-1513.json index a3d7bebd067..2691700682f 100644 --- a/2023/1xxx/CVE-2023-1513.json +++ b/2023/1xxx/CVE-2023-1513.json @@ -58,6 +58,11 @@ "refsource": "MISC", "name": "https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952", "url": "https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1611.json b/2023/1xxx/CVE-2023-1611.json index 1f191a53859..f418f7aac27 100644 --- a/2023/1xxx/CVE-2023-1611.json +++ b/2023/1xxx/CVE-2023-1611.json @@ -63,6 +63,11 @@ "refsource": "FEDORA", "name": "FEDORA-2023-d525cf5272", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5QCM6XO4HSPLGR3DFYWFRIA3GCBIHZR4/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1670.json b/2023/1xxx/CVE-2023-1670.json index 1ba0bc66ee5..2f93f7d1ded 100644 --- a/2023/1xxx/CVE-2023-1670.json +++ b/2023/1xxx/CVE-2023-1670.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://lore.kernel.org/all/20230316161526.1568982-1-zyytlz.wz@163.com/", "url": "https://lore.kernel.org/all/20230316161526.1568982-1-zyytlz.wz@163.com/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1829.json b/2023/1xxx/CVE-2023-1829.json index 38811b6f116..5e9e81f379c 100644 --- a/2023/1xxx/CVE-2023-1829.json +++ b/2023/1xxx/CVE-2023-1829.json @@ -64,6 +64,11 @@ "url": "https://kernel.dance/#8c710f75256bb3cf05ac7b1672c82b92c43f3d28", "refsource": "MISC", "name": "https://kernel.dance/#8c710f75256bb3cf05ac7b1672c82b92c43f3d28" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1855.json b/2023/1xxx/CVE-2023-1855.json index 60c0416ba32..99116c27076 100644 --- a/2023/1xxx/CVE-2023-1855.json +++ b/2023/1xxx/CVE-2023-1855.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://lore.kernel.org/all/20230318122758.2140868-1-linux@roeck-us.net/", "url": "https://lore.kernel.org/all/20230318122758.2140868-1-linux@roeck-us.net/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1872.json b/2023/1xxx/CVE-2023-1872.json index c7a621b3a03..57e43409f5b 100644 --- a/2023/1xxx/CVE-2023-1872.json +++ b/2023/1xxx/CVE-2023-1872.json @@ -64,6 +64,11 @@ "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=da24142b1ef9fd5d36b76e36bab328a5b27523e8", "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=da24142b1ef9fd5d36b76e36bab328a5b27523e8" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1989.json b/2023/1xxx/CVE-2023-1989.json index 54848757295..522dfefdbc6 100644 --- a/2023/1xxx/CVE-2023-1989.json +++ b/2023/1xxx/CVE-2023-1989.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1990.json b/2023/1xxx/CVE-2023-1990.json index 1d74ef3b2a4..f170aff32d4 100644 --- a/2023/1xxx/CVE-2023-1990.json +++ b/2023/1xxx/CVE-2023-1990.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://lore.kernel.org/all/20230312160837.2040857-1-zyytlz.wz@163.com/", "url": "https://lore.kernel.org/all/20230312160837.2040857-1-zyytlz.wz@163.com/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/1xxx/CVE-2023-1998.json b/2023/1xxx/CVE-2023-1998.json index e10d91cef47..d97079a69f1 100644 --- a/2023/1xxx/CVE-2023-1998.json +++ b/2023/1xxx/CVE-2023-1998.json @@ -69,6 +69,11 @@ "url": "https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d", "refsource": "MISC", "name": "https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html", + "refsource": "MISC", + "name": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/22xxx/CVE-2023-22998.json b/2023/22xxx/CVE-2023-22998.json index e799bce4e9f..f4328f6cf82 100644 --- a/2023/22xxx/CVE-2023-22998.json +++ b/2023/22xxx/CVE-2023-22998.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.3", "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.3" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] } diff --git a/2023/23xxx/CVE-2023-23004.json b/2023/23xxx/CVE-2023-23004.json index b241feac99d..00752f8798a 100644 --- a/2023/23xxx/CVE-2023-23004.json +++ b/2023/23xxx/CVE-2023-23004.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/torvalds/linux/commit/15342f930ebebcfe36f2415049736a77d7d2e045", "url": "https://github.com/torvalds/linux/commit/15342f930ebebcfe36f2415049736a77d7d2e045" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] } diff --git a/2023/23xxx/CVE-2023-23559.json b/2023/23xxx/CVE-2023-23559.json index b6b436eb9d9..1fe61b00228 100644 --- a/2023/23xxx/CVE-2023-23559.json +++ b/2023/23xxx/CVE-2023-23559.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230302-0003/", "url": "https://security.netapp.com/advisory/ntap-20230302-0003/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] } diff --git a/2023/25xxx/CVE-2023-25012.json b/2023/25xxx/CVE-2023-25012.json index 2c1f716563f..881e07b2116 100644 --- a/2023/25xxx/CVE-2023-25012.json +++ b/2023/25xxx/CVE-2023-25012.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[oss-security] 20230202 Re: Linux Kernel: hid: Use-After-Free in bigben_set_led()", "url": "http://www.openwall.com/lists/oss-security/2023/02/02/1" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] } diff --git a/2023/26xxx/CVE-2023-26545.json b/2023/26xxx/CVE-2023-26545.json index 6d68b052f6f..1fdc8eb6d27 100644 --- a/2023/26xxx/CVE-2023-26545.json +++ b/2023/26xxx/CVE-2023-26545.json @@ -71,6 +71,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230316-0009/", "url": "https://security.netapp.com/advisory/ntap-20230316-0009/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] } diff --git a/2023/28xxx/CVE-2023-28328.json b/2023/28xxx/CVE-2023-28328.json index bd9fd6792f4..d5b8a5ff4d2 100644 --- a/2023/28xxx/CVE-2023-28328.json +++ b/2023/28xxx/CVE-2023-28328.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2177389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177389" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/28xxx/CVE-2023-28466.json b/2023/28xxx/CVE-2023-28466.json index dadef533421..077909687b1 100644 --- a/2023/28xxx/CVE-2023-28466.json +++ b/2023/28xxx/CVE-2023-28466.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230427-0006/", "url": "https://security.netapp.com/advisory/ntap-20230427-0006/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] } diff --git a/2023/2xxx/CVE-2023-2162.json b/2023/2xxx/CVE-2023-2162.json index 8c82c215f06..f7f6ffb8c5b 100644 --- a/2023/2xxx/CVE-2023-2162.json +++ b/2023/2xxx/CVE-2023-2162.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.spinics.net/lists/linux-scsi/msg181542.html", "url": "https://www.spinics.net/lists/linux-scsi/msg181542.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/2xxx/CVE-2023-2194.json b/2023/2xxx/CVE-2023-2194.json index f292f9ae1c3..fbcd27fcebe 100644 --- a/2023/2xxx/CVE-2023-2194.json +++ b/2023/2xxx/CVE-2023-2194.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://github.com/torvalds/linux/commit/92fbb6d1296f", "url": "https://github.com/torvalds/linux/commit/92fbb6d1296f" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }, diff --git a/2023/30xxx/CVE-2023-30456.json b/2023/30xxx/CVE-2023-30456.json index ff3bbd6f655..3d65f8dee85 100644 --- a/2023/30xxx/CVE-2023-30456.json +++ b/2023/30xxx/CVE-2023-30456.json @@ -61,6 +61,11 @@ "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8", "refsource": "MISC", "name": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html" } ] }