summaryrefslogtreecommitdiffstats
path: root/active
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2024-04-10 22:00:29 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2024-04-10 22:00:29 +0200
commit36b6da22cc336b7572fb13260eb9c77e5155f1bd (patch)
tree34c71238a933f8c06e45d786d0fc96f2f782ea8a /active
parent688f5248fc745b1897b7d556a57760a334f7ad42 (diff)
Retire several CVEs
Diffstat (limited to 'active')
-rw-r--r--active/CVE-2021-4718116
-rw-r--r--active/CVE-2021-4718417
-rw-r--r--active/CVE-2021-4718516
-rw-r--r--active/CVE-2021-4718917
-rw-r--r--active/CVE-2021-4719017
-rw-r--r--active/CVE-2021-4719217
-rw-r--r--active/CVE-2021-4719417
-rw-r--r--active/CVE-2021-4719517
-rw-r--r--active/CVE-2021-4719617
-rw-r--r--active/CVE-2021-4719718
-rw-r--r--active/CVE-2021-4720316
-rw-r--r--active/CVE-2021-4720616
-rw-r--r--active/CVE-2021-4720716
-rw-r--r--active/CVE-2021-4720917
-rw-r--r--active/CVE-2021-4721016
-rw-r--r--active/CVE-2021-4721317
-rw-r--r--active/CVE-2021-4721417
-rw-r--r--active/CVE-2021-4721517
-rw-r--r--active/CVE-2021-4721616
-rw-r--r--active/CVE-2021-4721717
-rw-r--r--active/CVE-2021-4721817
-rw-r--r--active/CVE-2023-5263616
-rw-r--r--active/CVE-2024-2666616
-rw-r--r--active/CVE-2024-2667416
-rw-r--r--active/CVE-2024-2668216
-rw-r--r--active/CVE-2024-2668316
-rw-r--r--active/CVE-2024-2669016
-rw-r--r--active/CVE-2024-2669216
-rw-r--r--active/CVE-2024-2669316
-rw-r--r--active/CVE-2024-2669416
-rw-r--r--active/CVE-2024-2670316
-rw-r--r--active/CVE-2024-2670516
-rw-r--r--active/CVE-2024-2670817
-rw-r--r--active/CVE-2024-2670916
-rw-r--r--active/CVE-2024-2671116
-rw-r--r--active/CVE-2024-2671316
-rw-r--r--active/CVE-2024-2671616
-rw-r--r--active/CVE-2024-2672116
-rw-r--r--active/CVE-2024-2672416
-rw-r--r--active/CVE-2024-2672516
-rw-r--r--active/CVE-2024-2672816
-rw-r--r--active/CVE-2024-2672917
-rw-r--r--active/CVE-2024-2673016
-rw-r--r--active/CVE-2024-2673216
-rw-r--r--active/CVE-2024-2673416
-rw-r--r--active/CVE-2024-2673816
-rw-r--r--active/CVE-2024-2674616
-rw-r--r--active/CVE-2024-2675516
-rw-r--r--active/CVE-2024-2676216
-rw-r--r--active/CVE-2024-2678416
-rw-r--r--active/CVE-2024-2678616
-rw-r--r--active/CVE-2024-2679416
-rw-r--r--active/CVE-2024-2679616
-rw-r--r--active/CVE-2024-2679716
-rw-r--r--active/CVE-2024-2680616
55 files changed, 0 insertions, 897 deletions
diff --git a/active/CVE-2021-47181 b/active/CVE-2021-47181
deleted file mode 100644
index 2df2af3c..00000000
--- a/active/CVE-2021-47181
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: usb: musb: tusb6010: check return value after calling platform_get_resource()
-References:
-Notes:
- carnil> First introducing commit could not be determined.
-Bugs:
-upstream: released (5.16-rc1) [14651496a3de6807a17c310f63c894ea0c5d858e]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.82) [679eee466d0f9ffa60a2b0c6ec19be5128927f04]
-4.19-upstream-stable: released (4.19.218) [f87a79c04a33ab4e5be598c7b0867e6ef193d702]
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: released (4.19.232-1)
diff --git a/active/CVE-2021-47184 b/active/CVE-2021-47184
deleted file mode 100644
index 20645aad..00000000
--- a/active/CVE-2021-47184
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: i40e: Fix NULL ptr dereference on VSI filter sync
-References:
-Notes:
- carnil> Introduced in 41c445ff0f48 ("i40e: main driver core"). Vulnerable versions:
- carnil> 3.12-rc1.
-Bugs:
-upstream: released (5.16-rc2) [37d9e304acd903a445df8208b8a13d707902dea6]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.82) [f866513ead4370402428ef724b03c3312295c178]
-4.19-upstream-stable: released (4.19.218) [87c421ab4a43433cb009fea44bbbc77f46913e1d]
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: released (4.19.232-1)
diff --git a/active/CVE-2021-47185 b/active/CVE-2021-47185
deleted file mode 100644
index 4fc16d9f..00000000
--- a/active/CVE-2021-47185
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
-References:
-Notes:
- carnil> First introducing commit could not be determined.
-Bugs:
-upstream: released (5.16-rc1) [3968ddcf05fb4b9409cd1859feb06a5b0550a1c1]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.82) [77e9fed33056f2a88eba9dd4d2d5412f0c7d1f41]
-4.19-upstream-stable: released (4.19.218) [4f300f47dbcf9c3d4b2ea76c8554c8f360400725]
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: released (4.19.232-1)
diff --git a/active/CVE-2021-47189 b/active/CVE-2021-47189
deleted file mode 100644
index 3318156e..00000000
--- a/active/CVE-2021-47189
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: btrfs: fix memory ordering between normal and ordered work functions
-References:
-Notes:
- carnil> Introduced in 08a9ff326418 ("btrfs: Added btrfs_workqueue_struct implemented
- carnil> ordered execution based on kernel workqueue"). Vulnerable versions: 3.15-rc1.
-Bugs:
-upstream: released (5.16-rc2) [45da9c1767ac31857df572f0a909fbe88fd5a7e9]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.82) [6adbc07ebcaf8bead08b21687d49e0fc94400987]
-4.19-upstream-stable: released (4.19.218) [ed058d735a70f4b063323f1a7bb33cda0f987513]
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: released (4.19.232-1)
diff --git a/active/CVE-2021-47190 b/active/CVE-2021-47190
deleted file mode 100644
index 94d0f85e..00000000
--- a/active/CVE-2021-47190
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: perf bpf: Avoid memory leak from perf_env__insert_btf()
-References:
-Notes:
- carnil> Introduced in 3792cb2ff43b1b19 ("perf bpf: Save BTF in a rbtree in perf_env").
- carnil> Vulnerable versions: 5.1-rc2.
-Bugs:
-upstream: released (5.16-rc1) [4924b1f7c46711762fd0e65c135ccfbcfd6ded1f]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.82) [11589d3144bc4e272e0aae46ce8156162e99babc]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47192 b/active/CVE-2021-47192
deleted file mode 100644
index 2687b952..00000000
--- a/active/CVE-2021-47192
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: scsi: core: sysfs: Fix hang when device state is set via sysfs
-References:
-Notes:
- carnil> Introduced in f0f82e2476f6 ("scsi: core: Fix capacity set to zero after
- carnil> offlinining device"). Vulnerable versions: 5.4.143 5.10.61 5.13.13 5.14-rc5.
-Bugs:
-upstream: released (5.16-rc2) [4edd8cd4e86dd3047e5294bbefcc0a08f66a430f]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.82) [a792e0128d232251edb5fdf42fb0f9fbb0b44a73]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47194 b/active/CVE-2021-47194
deleted file mode 100644
index 671ea959..00000000
--- a/active/CVE-2021-47194
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
-References:
-Notes:
- carnil> Introduced in ac800140c20e ("cfg80211: .stop_ap when interface is going down").
- carnil> Vulnerable versions: 3.6-rc1.
-Bugs:
-upstream: released (5.16-rc2) [563fbefed46ae4c1f70cffb8eb54c02df480b2c2]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.82) [7b97b5776daa0b39dbdadfea176f9cc0646d4a66]
-4.19-upstream-stable: released (4.19.218) [b8a045e2a9b234cfbc06cf36923886164358ddec]
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: released (4.19.232-1)
diff --git a/active/CVE-2021-47195 b/active/CVE-2021-47195
deleted file mode 100644
index 7c14bc83..00000000
--- a/active/CVE-2021-47195
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: spi: fix use-after-free of the add_lock mutex
-References:
-Notes:
- carnil> Introduced in 6098475d4cb4 ("spi: Fix deadlock when adding SPI controllers on
- carnil> SPI buses"). Vulnerable versions: 5.14.15 5.15-rc6.
-Bugs:
-upstream: released (5.16-rc2) [6c53b45c71b4920b5e62f0ea8079a1da382b9434]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47196 b/active/CVE-2021-47196
deleted file mode 100644
index a99a1a99..00000000
--- a/active/CVE-2021-47196
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: RDMA/core: Set send and receive CQ before forwarding to the driver
-References:
-Notes:
- carnil> Introduced in 514aee660df4 ("RDMA: Globally allocate and release QP memory").
- carnil> Vulnerable versions: 5.15-rc1.
-Bugs:
-upstream: released (5.16-rc2) [6cd7397d01c4a3e09757840299e4f114f0aa5fa0]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47197 b/active/CVE-2021-47197
deleted file mode 100644
index 08d5f4aa..00000000
--- a/active/CVE-2021-47197
+++ /dev/null
@@ -1,18 +0,0 @@
-Description: net/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove()
-References:
-Notes:
- carnil> Introduced in 94b960b9deff ("net/mlx5e: Fix memory leak in
- carnil> mlx5_core_destroy_cq() error path"). Vulnerable versions: 5.10.75 5.14.14
- carnil> 5.15-rc6.
-Bugs:
-upstream: released (5.16-rc2) [76ded29d3fcda4928da8849ffc446ea46871c1c2]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.82) [471c492890557bd58f73314bb4ad85d5a8fd5026]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47203 b/active/CVE-2021-47203
deleted file mode 100644
index 6c4e03d6..00000000
--- a/active/CVE-2021-47203
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
-References:
-Notes:
- carnil> First introducing commit could not be determined.
-Bugs:
-upstream: released (5.16-rc1) [99154581b05c8fb22607afb7c3d66c1bace6aa5d]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.82) [c097bd5a59162156d9c2077a2f58732ffbaa9fca]
-4.19-upstream-stable: released (4.19.218) [b291d147d0268e93ad866f8bc820ea14497abc9b]
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: released (4.19.232-1)
diff --git a/active/CVE-2021-47206 b/active/CVE-2021-47206
deleted file mode 100644
index 4e6412c2..00000000
--- a/active/CVE-2021-47206
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: usb: host: ohci-tmio: check return value after calling platform_get_resource()
-References:
-Notes:
- carnil> First introducing commit could not be determined.
-Bugs:
-upstream: released (5.16-rc1) [9eff2b2e59fda25051ab36cd1cb5014661df657b]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.82) [2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100]
-4.19-upstream-stable: released (4.19.218) [951b8239fd24678b56c995c5c0456ab12e059d19]
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: released (4.19.232-1)
diff --git a/active/CVE-2021-47207 b/active/CVE-2021-47207
deleted file mode 100644
index d14bf7fc..00000000
--- a/active/CVE-2021-47207
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: ALSA: gus: fix null pointer dereference on pointer block
-References:
-Notes:
- carnil> First introducing commit could not be determined.
-Bugs:
-upstream: released (5.16-rc1) [a0d21bb3279476c777434c40d969ea88ca64f9aa]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.82) [1ac6cd87d8ddd36c43620f82c4d65b058f725f0f]
-4.19-upstream-stable: released (4.19.218) [ab4c1ebc40f699f48346f634d7b72b9c5193f315]
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: released (4.19.232-1)
diff --git a/active/CVE-2021-47209 b/active/CVE-2021-47209
deleted file mode 100644
index c78e1f34..00000000
--- a/active/CVE-2021-47209
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: sched/fair: Prevent dead task groups from regaining cfs_rq's
-References:
-Notes:
- carnil> Introduced in a7b359fc6a37 ("sched/fair: Correctly insert cfs_rq's to list on
- carnil> unthrottle"). Vulnerable versions: 5.13-rc7.
-Bugs:
-upstream: released (5.16-rc1) [b027789e5e50494c2325cc70c8642e7fd6059479]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47210 b/active/CVE-2021-47210
deleted file mode 100644
index 0ec158c1..00000000
--- a/active/CVE-2021-47210
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: usb: typec: tipd: Remove WARN_ON in tps6598x_block_read
-References:
-Notes:
- carnil> First introducing commit could not be determined.
-Bugs:
-upstream: released (5.16-rc1) [b7a0a63f3fed57d413bb857de164ea9c3984bc4e]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.82) [eff8b7628410cb2eb562ca0d5d1f12e27063733e]
-4.19-upstream-stable: released (4.19.218) [2a897d384513ba7f7ef05611338b9a6ec6aeac00]
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: released (4.19.232-1)
diff --git a/active/CVE-2021-47213 b/active/CVE-2021-47213
deleted file mode 100644
index 5a8a8ff9..00000000
--- a/active/CVE-2021-47213
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: NFSD: Fix exposure in nfsd4_decode_bitmap()
-References:
-Notes:
- carnil> Introduced in d1c263a031e8 ("NFSD: Replace READ* macros in
- carnil> nfsd4_decode_fattr()"). Vulnerable versions: 5.11-rc1.
-Bugs:
-upstream: released (5.16-rc2) [c0019b7db1d7ac62c711cda6b357a659d46428fe]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47214 b/active/CVE-2021-47214
deleted file mode 100644
index 9ab08fd4..00000000
--- a/active/CVE-2021-47214
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: hugetlb, userfaultfd: fix reservation restore on userfaultfd error
-References:
-Notes:
- carnil> Introduced in c7b1850dfb41 ("hugetlb: don't pass page cache pages to
- carnil> restore_reserve_on_error"). Vulnerable versions: 5.13.13 5.14-rc7.
-Bugs:
-upstream: released (5.16-rc2) [cc30042df6fcc82ea18acf0dace831503e60a0b7]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47215 b/active/CVE-2021-47215
deleted file mode 100644
index 41588e26..00000000
--- a/active/CVE-2021-47215
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: net/mlx5e: kTLS, Fix crash in RX resync flow
-References:
-Notes:
- carnil> Introduced in e9ce991bce5b ("net/mlx5e: kTLS, Add resiliency to RX resync
- carnil> failures"). Vulnerable versions: 5.13-rc1.
-Bugs:
-upstream: released (5.16-rc2) [cc4a9cc03faa6d8db1a6954bb536f2c1e63bdff6]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-47216 b/active/CVE-2021-47216
deleted file mode 100644
index 28b20595..00000000
--- a/active/CVE-2021-47216
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: scsi: advansys: Fix kernel pointer leak
-References:
-Notes:
- carnil> First introducing commit could not be determined.
-Bugs:
-upstream: released (5.16-rc1) [d4996c6eac4c81b8872043e9391563f67f13e406]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.82) [055eced3edf5b675d12189081303f6285ef26511]
-4.19-upstream-stable: released (4.19.218) [f5a0ba4a9b5e70e7b2f767636d26523f9d1ac59d]
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: released (4.19.232-1)
diff --git a/active/CVE-2021-47217 b/active/CVE-2021-47217
deleted file mode 100644
index c6daf117..00000000
--- a/active/CVE-2021-47217
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails
-References:
-Notes:
- carnil> Introduced in 93286261de1b ("x86/hyperv: Reenlightenment notifications
- carnil> support"). Vulnerable versions: 4.16-rc1.
-Bugs:
-upstream: released (5.16-rc2) [daf972118c517b91f74ff1731417feb4270625a4]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.82) [9c177eee116cf888276d3748cb176e72562cfd5c]
-4.19-upstream-stable: released (4.19.218) [b20ec58f8a6f4fef32cc71480ddf824584e24743]
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: released (4.19.232-1)
diff --git a/active/CVE-2021-47218 b/active/CVE-2021-47218
deleted file mode 100644
index 985bb306..00000000
--- a/active/CVE-2021-47218
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: selinux: fix NULL-pointer dereference when hashtab allocation fails
-References:
-Notes:
- carnil> Introduced in 03414a49ad5f ("selinux: do not allocate hashtabs dynamically").
- carnil> Vulnerable versions: 5.8-rc1.
-Bugs:
-upstream: released (5.16-rc3) [dc27f3c5d10c58069672215787a96b4fae01818b]
-6.8-upstream-stable: N/A "Fixed before branching point"
-6.7-upstream-stable: N/A "Fixed before branching point"
-6.6-upstream-stable: N/A "Fixed before branching point"
-6.1-upstream-stable: N/A "Fixed before branching point"
-5.10-upstream-stable: released (5.10.82) [b17dd53cac769dd13031b0ca34f90cc65e523fab]
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (5.15.5-1)
-6.1-bookworm-security: N/A "Fixed before branching point"
-5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2023-52636 b/active/CVE-2023-52636
deleted file mode 100644
index d957fbf4..00000000
--- a/active/CVE-2023-52636
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: libceph: just wait for more data to be available on the socket
-References:
-Notes:
- carnil> Introduced in d396f89db39a ("libceph: add sparse read support to msgr1").
- carnil> Vulnerable versions: 6.6-rc1.
-Bugs:
-upstream: released (6.8-rc4) [8e46a2d068c92a905d01cbb018b00d66991585ab]
-6.7-upstream-stable: released (6.7.5) [bd9442e553ab8bf74b8be3b3c0a43bf4af4dc9b8]
-6.6-upstream-stable: released (6.6.17) [da9c33a70f095d5d55c36d0bfeba969e31de08ae]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26666 b/active/CVE-2024-26666
deleted file mode 100644
index ccaf7809..00000000
--- a/active/CVE-2024-26666
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: wifi: mac80211: fix RCU use in TDLS fast-xmit
-References:
-Notes:
- carnil> Introduced in 8cc07265b691 ("wifi: mac80211: handle TDLS data frames with
- carnil> MLO"). Vulnerable versions: 6.5-rc1.
-Bugs:
-upstream: released (6.8-rc4) [9480adfe4e0f0319b9da04b44e4eebd5ad07e0cd]
-6.7-upstream-stable: released (6.7.5) [c255c3b653c6e8b52ac658c305e2fece2825f7ad]
-6.6-upstream-stable: released (6.6.17) [fc3432ae8232ff4025e7c55012dd88db0e3d18eb]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26674 b/active/CVE-2024-26674
deleted file mode 100644
index 0d0f2b3d..00000000
--- a/active/CVE-2024-26674
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups
-References:
-Notes:
- carnil> Introduced in b19b74bc99b1 ("x86/mm: Rework address range check in get_user()
- carnil> and put_user()"). Vulnerable versions: 6.4-rc1.
-Bugs:
-upstream: released (6.8-rc4) [8eed4e00a370b37b4e5985ed983dccedd555ea9d]
-6.7-upstream-stable: released (6.7.5) [2da241c5ed78d0978228a1150735539fe1a60eca]
-6.6-upstream-stable: released (6.6.17) [2aed1b6c33afd8599d01c6532bbecb829480a674]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26682 b/active/CVE-2024-26682
deleted file mode 100644
index cab217df..00000000
--- a/active/CVE-2024-26682
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: wifi: mac80211: improve CSA/ECSA connection refusal
-References:
-Notes:
- carnil> Introduced in c09c4f31998b ("wifi: mac80211: don't connect to an AP while it's
- carnil> in a CSA process"). Vulnerable versions: 6.7-rc1.
-Bugs:
-upstream: released (6.8-rc4) [35e2385dbe787936c793d70755a5177d267a40aa]
-6.7-upstream-stable: released (6.7.5) [ea88bde8e3fefbe4268f6991375dd629895a090a]
-6.6-upstream-stable: N/A "Vulnerable code not present"
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26683 b/active/CVE-2024-26683
deleted file mode 100644
index 7d9a4977..00000000
--- a/active/CVE-2024-26683
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: wifi: cfg80211: detect stuck ECSA element in probe resp
-References:
-Notes:
- carnil> Introduced in c09c4f31998b ("wifi: mac80211: don't connect to an AP while it's
- carnil> in a CSA process"). Vulnerable versions: 6.7-rc1.
-Bugs:
-upstream: released (6.8-rc4) [177fbbcb4ed6b306c1626a277fac3fb1c495a4c7]
-6.7-upstream-stable: released (6.7.5) [ce112c941c2b172afba3e913a90c380647d53975]
-6.6-upstream-stable: N/A "Vulnerable code not present"
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26690 b/active/CVE-2024-26690
deleted file mode 100644
index cc209b98..00000000
--- a/active/CVE-2024-26690
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: net: stmmac: protect updates of 64-bit statistics counters
-References:
-Notes:
- carnil> Introduced in 133466c3bbe1 ("net: stmmac: use per-queue 64 bit statistics where
- carnil> necessary"). Vulnerable versions: 6.6-rc1.
-Bugs:
-upstream: released (6.8-rc4) [38cc3c6dcc09dc3a1800b5ec22aef643ca11eab8]
-6.7-upstream-stable: released (6.7.6) [e6af0f082a4b87b99ad033003be2a904a1791b3f]
-6.6-upstream-stable: released (6.6.18) [9680b2ab54ba8d72581100e8c45471306101836e]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26692 b/active/CVE-2024-26692
deleted file mode 100644
index 62deb7d5..00000000
--- a/active/CVE-2024-26692
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: smb: Fix regression in writes when non-standard maximum write size negotiated
-References:
-Notes:
- carnil> Introduced in d08089f649a0 ("cifs: Change the I/O paths to use an iterator
- carnil> rather than a page list"). Vulnerable versions: 6.3-rc1.
-Bugs:
-upstream: released (6.8-rc5) [4860abb91f3d7fbaf8147d54782149bb1fc45892]
-6.7-upstream-stable: released (6.7.6) [63c35afd50e28b49c5b75542045a8c42b696dab9]
-6.6-upstream-stable: released (6.6.18) [4145ccff546ea868428b3e0fe6818c6261b574a9]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26693 b/active/CVE-2024-26693
deleted file mode 100644
index f696d570..00000000
--- a/active/CVE-2024-26693
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: wifi: iwlwifi: mvm: fix a crash when we run out of stations
-References:
-Notes:
- carnil> Introduced in 57974a55d995 ("wifi: iwlwifi: mvm: refactor
- carnil> iwl_mvm_mac_sta_state_common()"). Vulnerable versions: 6.4-rc1.
-Bugs:
-upstream: released (6.8-rc5) [b7198383ef2debe748118996f627452281cf27d7]
-6.7-upstream-stable: released (6.7.6) [c12f0f4d4caf23b1bfdc2602b6b70d56bdcd6aa7]
-6.6-upstream-stable: released (6.6.18) [00f4eb31b8193f6070ce24df636883f9c104ca95]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26694 b/active/CVE-2024-26694
deleted file mode 100644
index d5926976..00000000
--- a/active/CVE-2024-26694
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: wifi: iwlwifi: fix double-free bug
-References:
-Notes:
- carnil> Introduced in 5e31b3df86ec ("wifi: iwlwifi: dbg: print pc register data once fw
- carnil> dump occurred"). Vulnerable versions: 6.4-rc1.
-Bugs:
-upstream: released (6.8-rc4) [353d321f63f7dbfc9ef58498cc732c9fe886a596]
-6.7-upstream-stable: released (6.7.6) [d24eb9a27bea8fe5237fa71be274391d9d51eff2]
-6.6-upstream-stable: released (6.6.18) [ab9d4bb9a1892439b3123fc52b19e32b9cdf80ad]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26703 b/active/CVE-2024-26703
deleted file mode 100644
index 6e1bbae5..00000000
--- a/active/CVE-2024-26703
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: tracing/timerlat: Move hrtimer_init to timerlat_fd open()
-References:
-Notes:
- carnil> Introduced in e88ed227f639 ("tracing/timerlat: Add user-space interface").
- carnil> Vulnerable versions: 6.5-rc1.
-Bugs:
-upstream: released (6.8-rc3) [1389358bb008e7625942846e9f03554319b7fecc]
-6.7-upstream-stable: released (6.7.6) [2354d29986ebd138f89c2b73fecf8237e0a4ad6b]
-6.6-upstream-stable: released (6.6.18) [5f703935fdb559642d85b2088442ee55a557ae6d]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26705 b/active/CVE-2024-26705
deleted file mode 100644
index 8818f6bf..00000000
--- a/active/CVE-2024-26705
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: parisc: BTLB: Fix crash when setting up BTLB at CPU bringup
-References:
-Notes:
- carnil> Introduced in e5ef93d02d6c ("parisc: BTLB: Initialize BTLB tables at CPU
- carnil> startup"). Vulnerable versions: 6.6-rc2.
-Bugs:
-upstream: released (6.8-rc3) [913b9d443a0180cf0de3548f1ab3149378998486]
-6.7-upstream-stable: released (6.7.6) [aa52be55276614d33f22fbe7da36c40d6432d10b]
-6.6-upstream-stable: released (6.6.18) [54944f45470af5965fb9c28cf962ec30f38a8f5b]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26708 b/active/CVE-2024-26708
deleted file mode 100644
index bd6e39ea..00000000
--- a/active/CVE-2024-26708
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: mptcp: really cope with fastopen race
-References:
-Notes:
- carnil> Introduced in 1e777f39b4d7 ("mptcp: add MSG_FASTOPEN sendmsg flag support")
- carnil> 4fd19a307016 ("mptcp: fix inconsistent state on fastopen race"). Vulnerable
- carnil> versions: 6.2-rc1 6.6.10 6.7-rc7.
-Bugs:
-upstream: released (6.8-rc5) [337cebbd850f94147cee05252778f8f78b8c337f]
-6.7-upstream-stable: released (6.7.6) [e158fb9679d15a2317ec13b4f6301bd26265df2f]
-6.6-upstream-stable: released (6.6.18) [4bfe217e075d04e63c092df9d40c608e598c2ef2]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26709 b/active/CVE-2024-26709
deleted file mode 100644
index 4bd0840a..00000000
--- a/active/CVE-2024-26709
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: powerpc/iommu: Fix the missing iommu_group_put() during platform domain attach
-References:
-Notes:
- carnil> Introduced in a8ca9fc9134c ("powerpc/iommu: Do not do platform domain attach
- carnil> atctions after probe"). Vulnerable versions: 6.7-rc1.
-Bugs:
-upstream: released (6.8-rc5) [0846dd77c8349ec92ca0079c9c71d130f34cb192]
-6.7-upstream-stable: released (6.7.6) [c90fdea9cac9eb419fc266e75d625cb60c8f7f6c]
-6.6-upstream-stable: N/A "Vulnerable code not present"
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26711 b/active/CVE-2024-26711
deleted file mode 100644
index f4dd309a..00000000
--- a/active/CVE-2024-26711
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: iio: adc: ad4130: zero-initialize clock init data
-References:
-Notes:
- carnil> Introduced in 62094060cf3a ("iio: adc: ad4130: add AD4130 driver"). Vulnerable
- carnil> versions: 6.2-rc1.
-Bugs:
-upstream: released (6.8-rc5) [a22b0a2be69a36511cb5b37d948b651ddf7debf3]
-6.7-upstream-stable: released (6.7.6) [02876e2df02f8b17a593d77a0a7879a8109b27e1]
-6.6-upstream-stable: released (6.6.18) [0e0dab37750926d4fb0144edb1c1ea0612fea273]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26713 b/active/CVE-2024-26713
deleted file mode 100644
index f8fea6f1..00000000
--- a/active/CVE-2024-26713
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add
-References:
-Notes:
- carnil> Introduced in a940904443e4 ("powerpc/iommu: Add iommu_ops to report
- carnil> capabilities and allow blocking domains"). Vulnerable versions: 6.4-rc1.
-Bugs:
-upstream: released (6.8-rc5) [ed8b94f6e0acd652ce69bd69d678a0c769172df8]
-6.7-upstream-stable: released (6.7.6) [d4f762d6403f7419de90d7749fa83dd92ffb0e1d]
-6.6-upstream-stable: released (6.6.18) [9978d5b744e0227afe19e3bcb4c5f75442dde753]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26716 b/active/CVE-2024-26716
deleted file mode 100644
index f5338e59..00000000
--- a/active/CVE-2024-26716
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: usb: core: Prevent null pointer dereference in update_port_device_state
-References:
-Notes:
- carnil> Introduced in 83cb2604f641 ("usb: core: add sysfs entry for usb device state").
- carnil> Vulnerable versions: 6.5-rc1.
-Bugs:
-upstream: released (6.8-rc3) [12783c0b9e2c7915a50d5ec829630ff2da50472c]
-6.7-upstream-stable: released (6.7.6) [465b545d1d7ef282192ddd4439b08279bdb13f6f]
-6.6-upstream-stable: released (6.6.18) [ed85777c640cf9e6920bb1b60ed8cd48e1f4d873]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26721 b/active/CVE-2024-26721
deleted file mode 100644
index f5b5d06d..00000000
--- a/active/CVE-2024-26721
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: drm/i915/dsc: Fix the macro that calculates DSCC_/DSCA_ PPS reg address
-References:
-Notes:
- carnil> Introduced in bd077259d0a9 ("drm/i915/vdsc: Add function to read any PPS
- carnil> register"). Vulnerable versions: 6.7-rc1.
-Bugs:
-upstream: released (6.8-rc5) [962ac2dce56bb3aad1f82a4bbe3ada57a020287c]
-6.7-upstream-stable: released (6.7.6) [ff5999fb03f467e1e7159f0ddb199c787f7512b9]
-6.6-upstream-stable: N/A "Vulnerable code not present"
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26724 b/active/CVE-2024-26724
deleted file mode 100644
index 5fab05ee..00000000
--- a/active/CVE-2024-26724
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: net/mlx5: DPLL, Fix possible use after free after delayed work timer triggers
-References:
-Notes:
- carnil> Introduced in 496fd0a26bbf ("mlx5: Implement SyncE support using DPLL
- carnil> infrastructure"). Vulnerable versions: 6.7-rc1.
-Bugs:
-upstream: released (6.8-rc5) [aa1eec2f546f2afa8c98ec41e5d8ee488165d685]
-6.7-upstream-stable: released (6.7.6) [1596126ea50228f0ed96697bae4e9368fda02c56]
-6.6-upstream-stable: N/A "Vulnerable code not present"
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26725 b/active/CVE-2024-26725
deleted file mode 100644
index 5697928c..00000000
--- a/active/CVE-2024-26725
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: dpll: fix possible deadlock during netlink dump operation
-References:
-Notes:
- carnil> Introduced in 9d71b54b65b1 ("dpll: netlink: Add DPLL framework base
- carnil> functions"). Vulnerable versions: 6.7-rc1.
-Bugs:
-upstream: released (6.8-rc5) [53c0441dd2c44ee93fddb5473885fd41e4bc2361]
-6.7-upstream-stable: released (6.7.6) [087739cbd0d0b87b6cec2c0799436ac66e24acc8]
-6.6-upstream-stable: N/A "Vulnerable code not present"
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26728 b/active/CVE-2024-26728
deleted file mode 100644
index a26b153a..00000000
--- a/active/CVE-2024-26728
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: drm/amd/display: fix null-pointer dereference on edid reading
-References:
-Notes:
- carnil> Introduced in 0e859faf8670 ("drm/amd/display: Remove unwanted drm edid
- carnil> references"). Vulnerable versions: 6.7-rc1.
-Bugs:
-upstream: released (6.8-rc6) [9671761792156f2339627918bafcd713a8a6f777]
-6.7-upstream-stable: released (6.7.7) [2d392f7268a1a9bfbd98c831f0f4c964e59aa145]
-6.6-upstream-stable: N/A "Vulnerable code not present"
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26729 b/active/CVE-2024-26729
deleted file mode 100644
index 10445ddb..00000000
--- a/active/CVE-2024-26729
+++ /dev/null
@@ -1,17 +0,0 @@
-Description: drm/amd/display: Fix potential null pointer dereference in dc_dmub_srv
-References:
-Notes:
- carnil> Introduced in 028bac583449 ("drm/amd/display: decouple dmcub execution to
- carnil> reduce lock granularity")
- carnil> 65138eb72e1f ("drm/amd/display: Add DCN35 DMUB"). Vulnerable versions: 6.7-rc1.
-Bugs:
-upstream: released (6.8-rc6) [d2b48f340d9e4a8fbeb1cdc84cd8da6ad143a907]
-6.7-upstream-stable: released (6.7.7) [351080ba3414c96afff0f1338b4aeb2983195b80]
-6.6-upstream-stable: N/A "Vulnerable code not present"
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26730 b/active/CVE-2024-26730
deleted file mode 100644
index b4da1117..00000000
--- a/active/CVE-2024-26730
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: hwmon: (nct6775) Fix access to temperature configuration registers
-References:
-Notes:
- carnil> Introduced in b7f1f7b2523a ("hwmon: (nct6775) Additional TEMP registers for
- carnil> nct6799"). Vulnerable versions: 6.6-rc1.
-Bugs:
-upstream: released (6.8-rc6) [d56e460e19ea8382f813eb489730248ec8d7eb73]
-6.7-upstream-stable: released (6.7.7) [c196387820c9214c5ceaff56d77303c82514b8b1]
-6.6-upstream-stable: released (6.6.19) [f006c45a3ea424f8f6c8e4b9283bc245ce2a4d0f]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26732 b/active/CVE-2024-26732
deleted file mode 100644
index e022b501..00000000
--- a/active/CVE-2024-26732
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: net: implement lockless setsockopt(SO_PEEK_OFF)
-References:
-Notes:
- carnil> Introduced in 859051dd165e ("bpf: Implement cgroup sockaddr hooks for unix
- carnil> sockets"). Vulnerable versions: 6.7-rc1.
-Bugs:
-upstream: released (6.8-rc6) [56667da7399eb19af857e30f41bea89aa6fa812c]
-6.7-upstream-stable: released (6.7.7) [897f75e2cde8a5f9f7529b55249af1fa4248c83b]
-6.6-upstream-stable: N/A "Vulnerable code not present"
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26734 b/active/CVE-2024-26734
deleted file mode 100644
index 05dcf1e4..00000000
--- a/active/CVE-2024-26734
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: devlink: fix possible use-after-free and memory leaks in devlink_init()
-References:
-Notes:
- carnil> Introduced in 687125b5799c ("devlink: split out core code"). Vulnerable
- carnil> versions: 6.3-rc1.
-Bugs:
-upstream: released (6.8-rc6) [def689fc26b9a9622d2e2cb0c4933dd3b1c8071c]
-6.7-upstream-stable: released (6.7.7) [e91d3561e28d7665f4f837880501dc8755f635a9]
-6.6-upstream-stable: released (6.6.19) [919092bd5482b7070ae66d1daef73b600738f3a2]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26738 b/active/CVE-2024-26738
deleted file mode 100644
index 4c8b8f93..00000000
--- a/active/CVE-2024-26738
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller
-References:
-Notes:
- carnil> Introduced in a940904443e4 ("powerpc/iommu: Add iommu_ops to report
- carnil> capabilities and allow blocking domains"). Vulnerable versions: 6.4-rc1.
-Bugs:
-upstream: released (6.8-rc6) [a5c57fd2e9bd1c8ea8613a8f94fd0be5eccbf321]
-6.7-upstream-stable: released (6.7.7) [46e36ebd5e00a148b67ed77c1d31675996f77c25]
-6.6-upstream-stable: released (6.6.19) [b8315b2e25b4e68e42fcb74630f824b9a5067765]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26746 b/active/CVE-2024-26746
deleted file mode 100644
index 4c264661..00000000
--- a/active/CVE-2024-26746
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: dmaengine: idxd: Ensure safe user copy of completion record
-References:
-Notes:
- carnil> Introduced in c2f156bf168f ("dmaengine: idxd: create kmem cache for event log
- carnil> fault items"). Vulnerable versions: 6.4-rc1.
-Bugs:
-upstream: released (6.8-rc7) [d3ea125df37dc37972d581b74a5d3785c3f283ab]
-6.7-upstream-stable: released (6.7.9) [bb71e040323175e18c233a9afef32ba14fa64eb7]
-6.6-upstream-stable: released (6.6.21) [5e3022ea42e490a36ec6f2cfa6fc603deb0bace4]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.9-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26755 b/active/CVE-2024-26755
deleted file mode 100644
index 16908f87..00000000
--- a/active/CVE-2024-26755
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: md: Don't suspend the array for interrupted reshape
-References:
-Notes:
- carnil> Introduced in bc08041b32ab ("md: suspend array in md_start_sync() if array need
- carnil> reconfiguration"). Vulnerable versions: 6.7-rc1.
-Bugs:
-upstream: released (6.8-rc6) [9e46c70e829bddc24e04f963471e9983a11598b7]
-6.7-upstream-stable: released (6.7.7) [60d6130d0ac1d883ed93c2a1e10aadb60967fd48]
-6.6-upstream-stable: N/A "Vulnerable code not present"
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26762 b/active/CVE-2024-26762
deleted file mode 100644
index 0ffef89e..00000000
--- a/active/CVE-2024-26762
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: cxl/pci: Skip to handle RAS errors if CXL.mem device is detached
-References:
-Notes:
- carnil> Introduced in 6ac07883dbb5 ("cxl/pci: Add RCH downstream port error logging").
- carnil> Vulnerable versions: 6.7-rc1.
-Bugs:
-upstream: released (6.8-rc6) [eef5c7b28dbecd6b141987a96db6c54e49828102]
-6.7-upstream-stable: released (6.7.7) [21e5e84f3f63fdf44e49642a6e45cd895e921a84]
-6.6-upstream-stable: N/A "Vulnerable code not present"
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.7-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26784 b/active/CVE-2024-26784
deleted file mode 100644
index c7d9909c..00000000
--- a/active/CVE-2024-26784
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal
-References:
-Notes:
- carnil> Introduced in 2af23ceb8624 ("pmdomain: arm: Add the SCMI performance domain").
- carnil> Vulnerable versions: 6.7-rc1.
-Bugs:
-upstream: released (6.8-rc7) [eb5555d422d0fc325e1574a7353d3c616f82d8b5]
-6.7-upstream-stable: released (6.7.9) [f6aaf131e4d4a9a26040ecc018eb70ab8b3d355d]
-6.6-upstream-stable: N/A "Vulnerable code not present"
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.9-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26786 b/active/CVE-2024-26786
deleted file mode 100644
index 150270ce..00000000
--- a/active/CVE-2024-26786
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: iommufd: Fix iopt_access_list_id overwrite bug
-References:
-Notes:
- carnil> Introduced in 9227da7816dd ("iommufd: Add iommufd_access_change_ioas(_id)
- carnil> helpers"). Vulnerable versions: 6.6-rc1.
-Bugs:
-upstream: released (6.8-rc7) [aeb004c0cd6958e910123a1607634401009c9539]
-6.7-upstream-stable: released (6.7.9) [9526a46cc0c378d381560279bea9aa34c84298a0]
-6.6-upstream-stable: released (6.6.21) [f1fb745ee0a6fe43f1d84ec369c7e6af2310fda9]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.9-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26794 b/active/CVE-2024-26794
deleted file mode 100644
index 102aa26f..00000000
--- a/active/CVE-2024-26794
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: btrfs: fix race between ordered extent completion and fiemap
-References:
-Notes:
- carnil> Introduced in b0ad381fa769 ("btrfs: fix deadlock with fiemap and extent
- carnil> locking"). Vulnerable versions: 6.6.24 6.7.12 6.8-rc6.
-Bugs:
-upstream: released (6.8-rc7) [a1a4a9ca77f143c00fce69c1239887ff8b813bec]
-6.7-upstream-stable: released (6.7.9) [31d07a757c6d3430e03cc22799921569999b9a12]
-6.6-upstream-stable: released (6.6.21) [d43f8e58f10a44df8c08e7f7076f3288352cd168]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.9-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26796 b/active/CVE-2024-26796
deleted file mode 100644
index ed7b29aa..00000000
--- a/active/CVE-2024-26796
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: drivers: perf: ctr_get_width function for legacy is not defined
-References:
-Notes:
- carnil> Introduced in cc4c07c89aad ("drivers: perf: Implement perf event mmap support
- carnil> in the SBI backend"). Vulnerable versions: 6.6-rc1.
-Bugs:
-upstream: released (6.8-rc7) [682dc133f83e0194796e6ea72eb642df1c03dfbe]
-6.7-upstream-stable: released (6.7.9) [e4f50e85de5a6b21dfdc0d7ca435eba4f62935c3]
-6.6-upstream-stable: released (6.6.21) [e0d17ee872cf8d0f51cc561329b8e1a0aa792bbb]
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.9-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26797 b/active/CVE-2024-26797
deleted file mode 100644
index fedc128c..00000000
--- a/active/CVE-2024-26797
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: drm/amd/display: Prevent potential buffer overflow in map_hw_resources
-References:
-Notes:
- carnil> Introduced in 7966f319c66d ("drm/amd/display: Introduce DML2"). Vulnerable
- carnil> versions: 6.7-rc1.
-Bugs:
-upstream: released (6.8-rc7) [0f8ca019544a252d1afb468ce840c6dcbac73af4]
-6.7-upstream-stable: released (6.7.9) [50a6302cf881f67f1410461a68fe9eabd00ff31d]
-6.6-upstream-stable: N/A "Vulnerable code not present"
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.9-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2024-26806 b/active/CVE-2024-26806
deleted file mode 100644
index dcc826f3..00000000
--- a/active/CVE-2024-26806
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks
-References:
-Notes:
- carnil> Introduced in 0578a6dbfe75 ("spi: spi-cadence-quadspi: add runtime pm
- carnil> support"). Vulnerable versions: 6.7-rc1.
-Bugs:
-upstream: released (6.8-rc7) [959043afe53ae80633e810416cee6076da6e91c6]
-6.7-upstream-stable: released (6.7.9) [041562ebc4759c9932b59a06527f8753b86da365]
-6.6-upstream-stable: N/A "Vulnerable code not present"
-6.1-upstream-stable: N/A "Vulnerable code not present"
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.7.9-1)
-6.1-bookworm-security: N/A "Vulnerable code not present"
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy