From d3196ff44478ba2ff7631bae6e138c760e34d293 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 2 May 2025 16:02:30 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/53xxx/CVE-2023-53114.json | 136 +++++++++++++++++++++++++++- 2023/53xxx/CVE-2023-53115.json | 103 ++++++++++++++++++++- 2023/53xxx/CVE-2023-53116.json | 158 ++++++++++++++++++++++++++++++++- 2023/53xxx/CVE-2023-53117.json | 148 +++++++++++++++++++++++++++++- 2023/53xxx/CVE-2023-53118.json | 132 ++++++++++++++++++++++++++- 5 files changed, 657 insertions(+), 20 deletions(-) diff --git a/2023/53xxx/CVE-2023-53114.json b/2023/53xxx/CVE-2023-53114.json index a9f11cd97b5..420797275e6 100644 --- a/2023/53xxx/CVE-2023-53114.json +++ b/2023/53xxx/CVE-2023-53114.json @@ -1,18 +1,146 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-53114", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix kernel crash during reboot when adapter is in recovery mode\n\nIf the driver detects during probe that firmware is in recovery\nmode then i40e_init_recovery_mode() is called and the rest of\nprobe function is skipped including pci_set_drvdata(). Subsequent\ni40e_shutdown() called during shutdown/reboot dereferences NULL\npointer as pci_get_drvdata() returns NULL.\n\nTo fix call pci_set_drvdata() also during entering to recovery mode.\n\nReproducer:\n1) Lets have i40e NIC with firmware in recovery mode\n2) Run reboot\n\nResult:\n[ 139.084698] i40e: Intel(R) Ethernet Connection XL710 Network Driver\n[ 139.090959] i40e: Copyright (c) 2013 - 2019 Intel Corporation.\n[ 139.108438] i40e 0000:02:00.0: Firmware recovery mode detected. Limiting functionality.\n[ 139.116439] i40e 0000:02:00.0: Refer to the Intel(R) Ethernet Adapters and Devices User Guide for details on firmware recovery mode.\n[ 139.129499] i40e 0000:02:00.0: fw 8.3.64775 api 1.13 nvm 8.30 0x8000b78d 1.3106.0 [8086:1583] [15d9:084a]\n[ 139.215932] i40e 0000:02:00.0 enp2s0f0: renamed from eth0\n[ 139.223292] i40e 0000:02:00.1: Firmware recovery mode detected. Limiting functionality.\n[ 139.231292] i40e 0000:02:00.1: Refer to the Intel(R) Ethernet Adapters and Devices User Guide for details on firmware recovery mode.\n[ 139.244406] i40e 0000:02:00.1: fw 8.3.64775 api 1.13 nvm 8.30 0x8000b78d 1.3106.0 [8086:1583] [15d9:084a]\n[ 139.329209] i40e 0000:02:00.1 enp2s0f1: renamed from eth0\n...\n[ 156.311376] BUG: kernel NULL pointer dereference, address: 00000000000006c2\n[ 156.318330] #PF: supervisor write access in kernel mode\n[ 156.323546] #PF: error_code(0x0002) - not-present page\n[ 156.328679] PGD 0 P4D 0\n[ 156.331210] Oops: 0002 [#1] PREEMPT SMP NOPTI\n[ 156.335567] CPU: 26 PID: 15119 Comm: reboot Tainted: G E 6.2.0+ #1\n[ 156.343126] Hardware name: Abacus electric, s.r.o. - servis@abacus.cz Super Server/H12SSW-iN, BIOS 2.4 04/13/2022\n[ 156.353369] RIP: 0010:i40e_shutdown+0x15/0x130 [i40e]\n[ 156.358430] Code: c1 fc ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 55 48 89 fd 53 48 8b 9f 48 01 00 00 80 8b c2 06 00 00 04 f0 80 8b c0 06 00 00 08 48 8d bb 08 08 00\n[ 156.377168] RSP: 0018:ffffb223c8447d90 EFLAGS: 00010282\n[ 156.382384] RAX: ffffffffc073ee70 RBX: 0000000000000000 RCX: 0000000000000001\n[ 156.389510] RDX: 0000000080000001 RSI: 0000000000000246 RDI: ffff95db49988000\n[ 156.396634] RBP: ffff95db49988000 R08: ffffffffffffffff R09: ffffffff8bd17d40\n[ 156.403759] R10: 0000000000000001 R11: ffffffff8a5e3d28 R12: ffff95db49988000\n[ 156.410882] R13: ffffffff89a6fe17 R14: ffff95db49988150 R15: 0000000000000000\n[ 156.418007] FS: 00007fe7c0cc3980(0000) GS:ffff95ea8ee80000(0000) knlGS:0000000000000000\n[ 156.426083] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 156.431819] CR2: 00000000000006c2 CR3: 00000003092fc005 CR4: 0000000000770ee0\n[ 156.438944] PKRU: 55555554\n[ 156.441647] Call Trace:\n[ 156.444096] \n[ 156.446199] pci_device_shutdown+0x38/0x60\n[ 156.450297] device_shutdown+0x163/0x210\n[ 156.454215] kernel_restart+0x12/0x70\n[ 156.457872] __do_sys_reboot+0x1ab/0x230\n[ 156.461789] ? vfs_writev+0xa6/0x1a0\n[ 156.465362] ? __pfx_file_free_rcu+0x10/0x10\n[ 156.469635] ? __call_rcu_common.constprop.85+0x109/0x5a0\n[ 156.475034] do_syscall_64+0x3e/0x90\n[ 156.478611] entry_SYSCALL_64_after_hwframe+0x72/0xdc\n[ 156.483658] RIP: 0033:0x7fe7bff37ab7" } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "4ff0ee1af016976acb6a525e68ec9a5a85d7abdc", + "version_value": "6e18f66b704bd725196508c1db93bf7338cdc8de" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.2", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.2", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.4.238", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.10.176", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.104", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.21", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.2.8", + "lessThanOrEqual": "6.2.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.3", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/6e18f66b704bd725196508c1db93bf7338cdc8de", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/6e18f66b704bd725196508c1db93bf7338cdc8de" + }, + { + "url": "https://git.kernel.org/stable/c/3cbecb1c9085a00155639404f7addbcbfc987ba3", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/3cbecb1c9085a00155639404f7addbcbfc987ba3" + }, + { + "url": "https://git.kernel.org/stable/c/4ff82695266576a0b4f1077a7100b2451e476df4", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/4ff82695266576a0b4f1077a7100b2451e476df4" + }, + { + "url": "https://git.kernel.org/stable/c/c703362a66ea971905b9dc153fc54d1b6ac05423", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c703362a66ea971905b9dc153fc54d1b6ac05423" + }, + { + "url": "https://git.kernel.org/stable/c/b3826fb3ea14646b3d4e6309bfc384b349f36eb6", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/b3826fb3ea14646b3d4e6309bfc384b349f36eb6" + }, + { + "url": "https://git.kernel.org/stable/c/7e4f8a0c495413a50413e8c9f1032ce1bc633bae", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7e4f8a0c495413a50413e8c9f1032ce1bc633bae" + } + ] + }, + "generator": { + "engine": "bippy-1.1.0" } } \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53115.json b/2023/53xxx/CVE-2023-53115.json index a9e53c99212..c4516e2d860 100644 --- a/2023/53xxx/CVE-2023-53115.json +++ b/2023/53xxx/CVE-2023-53115.json @@ -1,18 +1,113 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-53115", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Fix memory leaks in mpi3mr_init_ioc()\n\nDon't allocate memory again when IOC is being reinitialized." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "fe6db615156573d3f6a37564b8a590cb03bbaf25", + "version_value": "5aab9342f12f980b64617a034d121efbbf09100a" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.17", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.17", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.21", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.2.8", + "lessThanOrEqual": "6.2.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.3", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/5aab9342f12f980b64617a034d121efbbf09100a", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/5aab9342f12f980b64617a034d121efbbf09100a" + }, + { + "url": "https://git.kernel.org/stable/c/7277b4eec2f25a0653646ba95b1f25fa16be1d6c", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7277b4eec2f25a0653646ba95b1f25fa16be1d6c" + }, + { + "url": "https://git.kernel.org/stable/c/c798304470cab88723d895726d17fcb96472e0e9", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/c798304470cab88723d895726d17fcb96472e0e9" + } + ] + }, + "generator": { + "engine": "bippy-1.1.0" } } \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53116.json b/2023/53xxx/CVE-2023-53116.json index cdca99e4cfe..1c456468aeb 100644 --- a/2023/53xxx/CVE-2023-53116.json +++ b/2023/53xxx/CVE-2023-53116.json @@ -1,18 +1,168 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-53116", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: avoid potential UAF in nvmet_req_complete()\n\nAn nvme target ->queue_response() operation implementation may free the\nrequest passed as argument. Such implementation potentially could result\nin a use after free of the request pointer when percpu_ref_put() is\ncalled in nvmet_req_complete().\n\nAvoid such problem by using a local variable to save the sq pointer\nbefore calling __nvmet_req_complete(), thus avoiding dereferencing the\nreq pointer after that function call." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "a07b4970f464f13640e28e16dad6cfa33647cc99", + "version_value": "e5d99b29012bbf0e86929403209723b2806500c1" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "4.8", + "status": "affected" + }, + { + "version": "0", + "lessThan": "4.8", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "4.14.311", + "lessThanOrEqual": "4.14.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "4.19.279", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.4.238", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.10.176", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.104", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.21", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.2.8", + "lessThanOrEqual": "6.2.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.3", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/e5d99b29012bbf0e86929403209723b2806500c1", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/e5d99b29012bbf0e86929403209723b2806500c1" + }, + { + "url": "https://git.kernel.org/stable/c/fafcb4b26393870c45462f9af6a48e581dbbcf7e", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/fafcb4b26393870c45462f9af6a48e581dbbcf7e" + }, + { + "url": "https://git.kernel.org/stable/c/04c394208831d5e0d5cfee46722eb0f033cd4083", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/04c394208831d5e0d5cfee46722eb0f033cd4083" + }, + { + "url": "https://git.kernel.org/stable/c/a6317235da8aa7cb97529ebc8121cc2a4c4c437a", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a6317235da8aa7cb97529ebc8121cc2a4c4c437a" + }, + { + "url": "https://git.kernel.org/stable/c/f1d5888a5efe345b63c430b256e95acb0a475642", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/f1d5888a5efe345b63c430b256e95acb0a475642" + }, + { + "url": "https://git.kernel.org/stable/c/bcd535f07c58342302a2cd2bdd8894fe0872c8a9", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/bcd535f07c58342302a2cd2bdd8894fe0872c8a9" + }, + { + "url": "https://git.kernel.org/stable/c/8ed9813871038b25a934b21ab76b5b7dbf44fc3a", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/8ed9813871038b25a934b21ab76b5b7dbf44fc3a" + }, + { + "url": "https://git.kernel.org/stable/c/6173a77b7e9d3e202bdb9897b23f2a8afe7bf286", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/6173a77b7e9d3e202bdb9897b23f2a8afe7bf286" + } + ] + }, + "generator": { + "engine": "bippy-1.1.0" } } \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53117.json b/2023/53xxx/CVE-2023-53117.json index 4f26344b01a..d6388d095e9 100644 --- a/2023/53xxx/CVE-2023-53117.json +++ b/2023/53xxx/CVE-2023-53117.json @@ -1,18 +1,158 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-53117", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: prevent out-of-bounds array speculation when closing a file descriptor\n\nGoogle-Bug-Id: 114199369" } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", + "version_value": "f31cd5da636682caea424fa1c22679016cbfc16b" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "4.14.310", + "lessThanOrEqual": "4.14.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "4.19.278", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.4.237", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.10.175", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.103", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.1.20", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.2.7", + "lessThanOrEqual": "6.2.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "6.3", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/f31cd5da636682caea424fa1c22679016cbfc16b", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/f31cd5da636682caea424fa1c22679016cbfc16b" + }, + { + "url": "https://git.kernel.org/stable/c/3d5d9501b634fd268eb56428cda92cd317752d69", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/3d5d9501b634fd268eb56428cda92cd317752d69" + }, + { + "url": "https://git.kernel.org/stable/c/6631c8da02cfad96c53b217cf647b511c7f34faf", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/6631c8da02cfad96c53b217cf647b511c7f34faf" + }, + { + "url": "https://git.kernel.org/stable/c/a759905de9cd6ec9ca08ceadf0920272772ed830", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/a759905de9cd6ec9ca08ceadf0920272772ed830" + }, + { + "url": "https://git.kernel.org/stable/c/f8cd8754a03a3748384ee438c572423643c9c315", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/f8cd8754a03a3748384ee438c572423643c9c315" + }, + { + "url": "https://git.kernel.org/stable/c/cec08b7d1ebcd3138d4658b3868ce26aeb1e8e06", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/cec08b7d1ebcd3138d4658b3868ce26aeb1e8e06" + }, + { + "url": "https://git.kernel.org/stable/c/eea8e4e056a5ffbeb539a13854c017d5d62c756a", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/eea8e4e056a5ffbeb539a13854c017d5d62c756a" + }, + { + "url": "https://git.kernel.org/stable/c/609d54441493c99f21c1823dfd66fa7f4c512ff4", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/609d54441493c99f21c1823dfd66fa7f4c512ff4" + } + ] + }, + "generator": { + "engine": "bippy-1.1.0" } } \ No newline at end of file diff --git a/2023/53xxx/CVE-2023-53118.json b/2023/53xxx/CVE-2023-53118.json index 0b935e6627f..008c8ecf1e0 100644 --- a/2023/53xxx/CVE-2023-53118.json +++ b/2023/53xxx/CVE-2023-53118.json @@ -1,18 +1,142 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-53118", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix a procfs host directory removal regression\n\nscsi_proc_hostdir_rm() decreases a reference counter and hence must only be\ncalled once per host that is removed. This change does not require a\nscsi_add_host_with_dma() change since scsi_add_host_with_dma() will return\n0 (success) if scsi_proc_host_add() is called." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "891a3cba425cf483d96facca55aebd6ff1da4338", + "version_value": "88c3d3bb6469cea929ac68fd326bdcbefcdfdd83" + }, + { + "version_affected": "<", + "version_name": "6b223e32d66ca9db1f252f433514783d8b22a8e1", + "version_value": "68c665bb185037e7eb66fb792c61da9d7151e99c" + }, + { + "version_affected": "<", + "version_name": "e471e928de97b00f297ad1015cc14f9459765713", + "version_value": "2a764d55e938743efa7c2cba7305633bcf227f09" + }, + { + "version_affected": "<", + "version_name": "17e98a5ede81b7696bec421f7afa2dfe467f5e6b", + "version_value": "7e0ae8667fcdd99d1756922e1140cac75f5fa279" + }, + { + "version_affected": "<", + "version_name": "1ec363599f8346d5a8d08c71a0d9860d6c420ec0", + "version_value": "73f030d4ef6d1ad17f824a0a2eb637ef7a9c7d51" + }, + { + "version_affected": "<", + "version_name": "fc663711b94468f4e1427ebe289c9f05669699c9", + "version_value": "be03df3d4bfe7e8866d4aa43d62e648ffe884f5f" + }, + { + "version_affected": "<", + "version_name": "5.4.237", + "version_value": "5.4.238" + }, + { + "version_affected": "<", + "version_name": "5.10.175", + "version_value": "5.10.176" + }, + { + "version_affected": "<", + "version_name": "5.15.103", + "version_value": "5.15.104" + }, + { + "version_affected": "<", + "version_name": "6.1.20", + "version_value": "6.1.21" + }, + { + "version_affected": "<", + "version_name": "6.2.7", + "version_value": "6.2.8" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/88c3d3bb6469cea929ac68fd326bdcbefcdfdd83", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/88c3d3bb6469cea929ac68fd326bdcbefcdfdd83" + }, + { + "url": "https://git.kernel.org/stable/c/68c665bb185037e7eb66fb792c61da9d7151e99c", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/68c665bb185037e7eb66fb792c61da9d7151e99c" + }, + { + "url": "https://git.kernel.org/stable/c/2a764d55e938743efa7c2cba7305633bcf227f09", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/2a764d55e938743efa7c2cba7305633bcf227f09" + }, + { + "url": "https://git.kernel.org/stable/c/7e0ae8667fcdd99d1756922e1140cac75f5fa279", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/7e0ae8667fcdd99d1756922e1140cac75f5fa279" + }, + { + "url": "https://git.kernel.org/stable/c/73f030d4ef6d1ad17f824a0a2eb637ef7a9c7d51", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/73f030d4ef6d1ad17f824a0a2eb637ef7a9c7d51" + }, + { + "url": "https://git.kernel.org/stable/c/be03df3d4bfe7e8866d4aa43d62e648ffe884f5f", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/be03df3d4bfe7e8866d4aa43d62e648ffe884f5f" + } + ] + }, + "generator": { + "engine": "bippy-1.1.0" } } \ No newline at end of file