Update 30Jun23
add 6.3
[ci skip]
diff --git a/CHANGES.md b/CHANGES.md
index a83b5ed..08ffeef 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -1,48 +1,46 @@
# **Linux Kernel CVE Changes**
-## Last Update - 30Jun23 00:04
+## Last Update - 30Jun23 08:42
### **New CVEs Added:**
-[CVE-2023-1206](cves/CVE-2023-1206)
-[CVE-2023-2860](cves/CVE-2023-2860)
-[CVE-2023-3090](cves/CVE-2023-3090)
-[CVE-2023-3338](cves/CVE-2023-3338)
-[CVE-2023-3355](cves/CVE-2023-3355)
-[CVE-2023-3389](cves/CVE-2023-3389)
-[CVE-2023-3390](cves/CVE-2023-3390)
-[CVE-2023-33951](cves/CVE-2023-33951)
-[CVE-2023-33952](cves/CVE-2023-33952)
-[CVE-2023-3397](cves/CVE-2023-3397)
-[CVE-2023-3439](cves/CVE-2023-3439)
+[CVE-2023-2163](cves/CVE-2023-2163)
### **New Versions Checked:**
-[4.14.320](streams/4.14)
-[4.19.288](streams/4.19)
-[5.10.186](streams/5.10)
-[5.15.119](streams/5.15)
-[5.4.249](streams/5.4)
-[6.1.36](streams/6.1)
+[6.3.10](streams/6.3)
### **Updated CVEs:**
-[CVE-2015-3339](cves/CVE-2015-3339)
-[CVE-2017-5715](cves/CVE-2017-5715)
+[CVE-2017-5753](cves/CVE-2017-5753)
+[CVE-2022-48425](cves/CVE-2022-48425)
+[CVE-2023-1380](cves/CVE-2023-1380)
+[CVE-2023-2002](cves/CVE-2023-2002)
[CVE-2023-2124](cves/CVE-2023-2124)
-[CVE-2023-34255](cves/CVE-2023-34255)
-[CVE-2023-3220](cves/CVE-2023-3220)
+[CVE-2023-2156](cves/CVE-2023-2156)
+[CVE-2023-2248](cves/CVE-2023-2248)
+[CVE-2023-2269](cves/CVE-2023-2269)
+[CVE-2023-2598](cves/CVE-2023-2598)
+[CVE-2023-3090](cves/CVE-2023-3090)
+[CVE-2023-3141](cves/CVE-2023-3141)
+[CVE-2023-31436](cves/CVE-2023-31436)
+[CVE-2023-3212](cves/CVE-2023-3212)
+[CVE-2023-32233](cves/CVE-2023-32233)
+[CVE-2023-32250](cves/CVE-2023-32250)
+[CVE-2023-32254](cves/CVE-2023-32254)
[CVE-2023-3268](cves/CVE-2023-3268)
[CVE-2023-3312](cves/CVE-2023-3312)
-[CVE-2023-3357](cves/CVE-2023-3357)
-[CVE-2023-3358](cves/CVE-2023-3358)
-[CVE-2023-3359](cves/CVE-2023-3359)
+[CVE-2023-3390](cves/CVE-2023-3390)
+[CVE-2023-33951](cves/CVE-2023-33951)
+[CVE-2023-33952](cves/CVE-2023-33952)
+[CVE-2023-34255](cves/CVE-2023-34255)
+[CVE-2023-34256](cves/CVE-2023-34256)
+[CVE-2023-35788](cves/CVE-2023-35788)
[CVE-2023-35823](cves/CVE-2023-35823)
[CVE-2023-35824](cves/CVE-2023-35824)
[CVE-2023-35826](cves/CVE-2023-35826)
-[CVE-2023-35827](cves/CVE-2023-35827)
[CVE-2023-35828](cves/CVE-2023-35828)
[CVE-2023-35829](cves/CVE-2023-35829)
diff --git a/data/3.12/3.12_CVEs.txt b/data/3.12/3.12_CVEs.txt
index 72291c6..ceefaac 100644
--- a/data/3.12/3.12_CVEs.txt
+++ b/data/3.12/3.12_CVEs.txt
@@ -1256,6 +1256,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
CVE-2023-2269: Fix not seen in stream
diff --git a/data/3.12/3.12_security.txt b/data/3.12/3.12_security.txt
index 20bf0c8..e8cf09f 100644
--- a/data/3.12/3.12_security.txt
+++ b/data/3.12/3.12_security.txt
@@ -1394,6 +1394,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
CVE-2023-2269: (unk) dm ioctl: fix nested locking in table_clear() to remove deadlock concern
diff --git a/data/3.14/3.14_CVEs.txt b/data/3.14/3.14_CVEs.txt
index 5448469..d321ef1 100644
--- a/data/3.14/3.14_CVEs.txt
+++ b/data/3.14/3.14_CVEs.txt
@@ -1225,6 +1225,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
CVE-2023-2269: Fix not seen in stream
diff --git a/data/3.14/3.14_security.txt b/data/3.14/3.14_security.txt
index 19f1218..2af6361 100644
--- a/data/3.14/3.14_security.txt
+++ b/data/3.14/3.14_security.txt
@@ -1359,6 +1359,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
CVE-2023-2269: (unk) dm ioctl: fix nested locking in table_clear() to remove deadlock concern
diff --git a/data/3.16/3.16_CVEs.txt b/data/3.16/3.16_CVEs.txt
index 19399ee..914a699 100644
--- a/data/3.16/3.16_CVEs.txt
+++ b/data/3.16/3.16_CVEs.txt
@@ -1213,6 +1213,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
CVE-2023-2269: Fix not seen in stream
diff --git a/data/3.16/3.16_security.txt b/data/3.16/3.16_security.txt
index 476767b..7e84fb5 100644
--- a/data/3.16/3.16_security.txt
+++ b/data/3.16/3.16_security.txt
@@ -1319,6 +1319,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
CVE-2023-2269: (unk) dm ioctl: fix nested locking in table_clear() to remove deadlock concern
diff --git a/data/3.18/3.18_CVEs.txt b/data/3.18/3.18_CVEs.txt
index 0271a59..ae9aef5 100644
--- a/data/3.18/3.18_CVEs.txt
+++ b/data/3.18/3.18_CVEs.txt
@@ -1200,6 +1200,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
CVE-2023-2269: Fix not seen in stream
diff --git a/data/3.18/3.18_security.txt b/data/3.18/3.18_security.txt
index 5d52cf0..3c5c41b 100644
--- a/data/3.18/3.18_security.txt
+++ b/data/3.18/3.18_security.txt
@@ -1434,6 +1434,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
CVE-2023-2269: (unk) dm ioctl: fix nested locking in table_clear() to remove deadlock concern
diff --git a/data/3.2/3.2_CVEs.txt b/data/3.2/3.2_CVEs.txt
index 7c71e34..6ac8f9c 100644
--- a/data/3.2/3.2_CVEs.txt
+++ b/data/3.2/3.2_CVEs.txt
@@ -1225,6 +1225,7 @@
CVE-2023-2007: Fix not seen in stream
CVE-2023-20941: Fix unknown
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2269: Fix not seen in stream
CVE-2023-22995: Fix not seen in stream
diff --git a/data/3.2/3.2_security.txt b/data/3.2/3.2_security.txt
index 08aadc2..83e7b0a 100644
--- a/data/3.2/3.2_security.txt
+++ b/data/3.2/3.2_security.txt
@@ -1383,6 +1383,7 @@
CVE-2023-2007: (unk) scsi: dpt_i2o: Remove obsolete driver
CVE-2023-20941: (unk)
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2269: (unk) dm ioctl: fix nested locking in table_clear() to remove deadlock concern
CVE-2023-22995: (unk) usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core
diff --git a/data/4.1/4.1_CVEs.txt b/data/4.1/4.1_CVEs.txt
index 23f3290..ac43f01 100644
--- a/data/4.1/4.1_CVEs.txt
+++ b/data/4.1/4.1_CVEs.txt
@@ -1165,6 +1165,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
CVE-2023-2269: Fix not seen in stream
diff --git a/data/4.1/4.1_security.txt b/data/4.1/4.1_security.txt
index 0777bee..c146af7 100644
--- a/data/4.1/4.1_security.txt
+++ b/data/4.1/4.1_security.txt
@@ -1263,6 +1263,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
CVE-2023-2269: (unk) dm ioctl: fix nested locking in table_clear() to remove deadlock concern
diff --git a/data/4.10/4.10_CVEs.txt b/data/4.10/4.10_CVEs.txt
index 4c08442..6d1a77b 100644
--- a/data/4.10/4.10_CVEs.txt
+++ b/data/4.10/4.10_CVEs.txt
@@ -1074,6 +1074,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
diff --git a/data/4.10/4.10_security.txt b/data/4.10/4.10_security.txt
index dbea405..be8593f 100644
--- a/data/4.10/4.10_security.txt
+++ b/data/4.10/4.10_security.txt
@@ -1108,6 +1108,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/4.11/4.11_CVEs.txt b/data/4.11/4.11_CVEs.txt
index 3c487c0..d574bbb 100644
--- a/data/4.11/4.11_CVEs.txt
+++ b/data/4.11/4.11_CVEs.txt
@@ -1046,6 +1046,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
diff --git a/data/4.11/4.11_security.txt b/data/4.11/4.11_security.txt
index 90eebb8..e98baf4 100644
--- a/data/4.11/4.11_security.txt
+++ b/data/4.11/4.11_security.txt
@@ -1068,6 +1068,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/4.12/4.12_CVEs.txt b/data/4.12/4.12_CVEs.txt
index 7ca50b9..f78483d 100644
--- a/data/4.12/4.12_CVEs.txt
+++ b/data/4.12/4.12_CVEs.txt
@@ -1033,6 +1033,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
diff --git a/data/4.12/4.12_security.txt b/data/4.12/4.12_security.txt
index 4be9346..2f11230 100644
--- a/data/4.12/4.12_security.txt
+++ b/data/4.12/4.12_security.txt
@@ -1059,6 +1059,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/4.13/4.13_CVEs.txt b/data/4.13/4.13_CVEs.txt
index f1e0a2d..6bc14a3 100644
--- a/data/4.13/4.13_CVEs.txt
+++ b/data/4.13/4.13_CVEs.txt
@@ -1017,6 +1017,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
diff --git a/data/4.13/4.13_security.txt b/data/4.13/4.13_security.txt
index 2ca2c62..f05b2b0 100644
--- a/data/4.13/4.13_security.txt
+++ b/data/4.13/4.13_security.txt
@@ -1045,6 +1045,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/4.14/4.14_CVEs.txt b/data/4.14/4.14_CVEs.txt
index baf764f..a798b27 100644
--- a/data/4.14/4.14_CVEs.txt
+++ b/data/4.14/4.14_CVEs.txt
@@ -987,6 +987,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fixed with 4.14.306
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2194: Fixed with 4.14.312
CVE-2023-2248: Fixed with 4.14.314
diff --git a/data/4.14/4.14_security.txt b/data/4.14/4.14_security.txt
index 52e0128..4f0789e 100644
--- a/data/4.14/4.14_security.txt
+++ b/data/4.14/4.14_security.txt
@@ -1545,6 +1545,7 @@
CVE-2023-2007: (unk) scsi: dpt_i2o: Remove obsolete driver
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-22995: (unk) usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core
CVE-2023-23000: (unk) phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function
diff --git a/data/4.15/4.15_CVEs.txt b/data/4.15/4.15_CVEs.txt
index 2d7eb87..b32a706 100644
--- a/data/4.15/4.15_CVEs.txt
+++ b/data/4.15/4.15_CVEs.txt
@@ -939,6 +939,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/4.15/4.15_security.txt b/data/4.15/4.15_security.txt
index fd5625f..bf3fe9a 100644
--- a/data/4.15/4.15_security.txt
+++ b/data/4.15/4.15_security.txt
@@ -971,6 +971,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/4.16/4.16_CVEs.txt b/data/4.16/4.16_CVEs.txt
index e23e05e..c2b517b 100644
--- a/data/4.16/4.16_CVEs.txt
+++ b/data/4.16/4.16_CVEs.txt
@@ -919,6 +919,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/4.16/4.16_security.txt b/data/4.16/4.16_security.txt
index cf08db7..b12077f 100644
--- a/data/4.16/4.16_security.txt
+++ b/data/4.16/4.16_security.txt
@@ -951,6 +951,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/4.17/4.17_CVEs.txt b/data/4.17/4.17_CVEs.txt
index b6377a0..9fdeb6e 100644
--- a/data/4.17/4.17_CVEs.txt
+++ b/data/4.17/4.17_CVEs.txt
@@ -901,6 +901,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/4.17/4.17_security.txt b/data/4.17/4.17_security.txt
index c341bc8..d03781c 100644
--- a/data/4.17/4.17_security.txt
+++ b/data/4.17/4.17_security.txt
@@ -933,6 +933,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/4.18/4.18_CVEs.txt b/data/4.18/4.18_CVEs.txt
index 8e72e34..8240f90 100644
--- a/data/4.18/4.18_CVEs.txt
+++ b/data/4.18/4.18_CVEs.txt
@@ -879,6 +879,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/4.18/4.18_security.txt b/data/4.18/4.18_security.txt
index c8e5637..c9dcbd1 100644
--- a/data/4.18/4.18_security.txt
+++ b/data/4.18/4.18_security.txt
@@ -911,6 +911,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/4.19/4.19_CVEs.txt b/data/4.19/4.19_CVEs.txt
index 4e809b3..32afc2a 100644
--- a/data/4.19/4.19_CVEs.txt
+++ b/data/4.19/4.19_CVEs.txt
@@ -858,6 +858,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fixed with 4.19.273
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fixed with 4.19.280
diff --git a/data/4.19/4.19_security.txt b/data/4.19/4.19_security.txt
index ba0ab67..72e0dbe 100644
--- a/data/4.19/4.19_security.txt
+++ b/data/4.19/4.19_security.txt
@@ -1350,6 +1350,7 @@
CVE-2023-2007: (unk) scsi: dpt_i2o: Remove obsolete driver
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-22995: (unk) usb: dwc3: dwc3-qcom: Add missing platform_device_put() in dwc3_qcom_acpi_register_core
diff --git a/data/4.20/4.20_CVEs.txt b/data/4.20/4.20_CVEs.txt
index 716e6d7..4dddf26 100644
--- a/data/4.20/4.20_CVEs.txt
+++ b/data/4.20/4.20_CVEs.txt
@@ -853,6 +853,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/4.20/4.20_security.txt b/data/4.20/4.20_security.txt
index ede3c44..6831bb6 100644
--- a/data/4.20/4.20_security.txt
+++ b/data/4.20/4.20_security.txt
@@ -885,6 +885,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/4.3/4.3_CVEs.txt b/data/4.3/4.3_CVEs.txt
index 2da90f8..43e13c3 100644
--- a/data/4.3/4.3_CVEs.txt
+++ b/data/4.3/4.3_CVEs.txt
@@ -1165,6 +1165,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
diff --git a/data/4.3/4.3_security.txt b/data/4.3/4.3_security.txt
index 23a0b6b..d97fa78 100644
--- a/data/4.3/4.3_security.txt
+++ b/data/4.3/4.3_security.txt
@@ -1181,6 +1181,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/4.4/4.4_CVEs.txt b/data/4.4/4.4_CVEs.txt
index cb27699..5994983 100644
--- a/data/4.4/4.4_CVEs.txt
+++ b/data/4.4/4.4_CVEs.txt
@@ -288,7 +288,7 @@
CVE-2017-5551: Fixed with 4.4.45
CVE-2017-5669: Fixed with 4.4.53
CVE-2017-5715: Fix not seen in stream
-CVE-2017-5753: Fix not seen in stream
+CVE-2017-5753: Fixed with 4.4.112
CVE-2017-5754: Fixed with 4.4.144
CVE-2017-5897: Fixed with 4.4.50
CVE-2017-5967: Fix not seen in stream
@@ -1146,6 +1146,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
diff --git a/data/4.4/4.4_security.txt b/data/4.4/4.4_security.txt
index cd20094..83d5404 100644
--- a/data/4.4/4.4_security.txt
+++ b/data/4.4/4.4_security.txt
@@ -468,6 +468,7 @@
CVE-2017-1000410: 0ae86454c435e554d01c51535c3cd4312577cc74 Bluetooth: Prevent stack info leak from the EFS element.
CVE-2017-13216: b4106c55b574fe37900b02ddf89cbe4b9d971392 staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl
CVE-2017-17741: eb91461daa77eb0ddb4c24aa427051f3669ba1f3 KVM: Fix stack-out-of-bounds read in write_mmio
+ CVE-2017-5753: caae411b6ee026c7f43d67932e9b5008cf623293 x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]
CVE-2018-5332: 10d06ed9a1899fcc1ecb7a1573f0f95b92dc470c RDS: Heap OOB write in rds_message_alloc_sgs()
CVE-2018-5333: 44496521c6bd65a3c525b490c762875a075cf73b RDS: null pointer dereference in rds_atomic_free_op
@@ -1285,7 +1286,6 @@
CVE-2017-18261: (unk) clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled
CVE-2017-18552: (unk) RDS: validate the requested traces user input against max supported
CVE-2017-5715: (unk) x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]
- CVE-2017-5753: (unk) x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]
CVE-2017-5967: (unk) time: Remove CONFIG_TIMER_STATS
CVE-2017-8065: (unk) crypto: ccm - move cbcmac input off the stack
CVE-2017-8797: (unk) nfsd: fix undefined behavior in nfsd4_layout_verify
@@ -1631,6 +1631,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/4.5/4.5_CVEs.txt b/data/4.5/4.5_CVEs.txt
index 0ffd9a7..47d1536 100644
--- a/data/4.5/4.5_CVEs.txt
+++ b/data/4.5/4.5_CVEs.txt
@@ -1129,6 +1129,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
diff --git a/data/4.5/4.5_security.txt b/data/4.5/4.5_security.txt
index 8f751b7..e19ce77 100644
--- a/data/4.5/4.5_security.txt
+++ b/data/4.5/4.5_security.txt
@@ -1145,6 +1145,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/4.6/4.6_CVEs.txt b/data/4.6/4.6_CVEs.txt
index fddf90b..e590e61 100644
--- a/data/4.6/4.6_CVEs.txt
+++ b/data/4.6/4.6_CVEs.txt
@@ -1102,6 +1102,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
diff --git a/data/4.6/4.6_security.txt b/data/4.6/4.6_security.txt
index 43869af..07e55b9 100644
--- a/data/4.6/4.6_security.txt
+++ b/data/4.6/4.6_security.txt
@@ -1120,6 +1120,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/4.7/4.7_CVEs.txt b/data/4.7/4.7_CVEs.txt
index bcfd705..d8cee46 100644
--- a/data/4.7/4.7_CVEs.txt
+++ b/data/4.7/4.7_CVEs.txt
@@ -1085,6 +1085,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
diff --git a/data/4.7/4.7_security.txt b/data/4.7/4.7_security.txt
index 38d6f41..40eb317 100644
--- a/data/4.7/4.7_security.txt
+++ b/data/4.7/4.7_security.txt
@@ -1105,6 +1105,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/4.8/4.8_CVEs.txt b/data/4.8/4.8_CVEs.txt
index 4813fa8..35ca09c 100644
--- a/data/4.8/4.8_CVEs.txt
+++ b/data/4.8/4.8_CVEs.txt
@@ -1089,6 +1089,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
diff --git a/data/4.8/4.8_security.txt b/data/4.8/4.8_security.txt
index 835a9be..5fe8c72 100644
--- a/data/4.8/4.8_security.txt
+++ b/data/4.8/4.8_security.txt
@@ -1119,6 +1119,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/4.9/4.9_CVEs.txt b/data/4.9/4.9_CVEs.txt
index 233b22c..516385d 100644
--- a/data/4.9/4.9_CVEs.txt
+++ b/data/4.9/4.9_CVEs.txt
@@ -1090,6 +1090,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
CVE-2023-2248: Fix not seen in stream
diff --git a/data/4.9/4.9_security.txt b/data/4.9/4.9_security.txt
index b5aed0b..71e4506 100644
--- a/data/4.9/4.9_security.txt
+++ b/data/4.9/4.9_security.txt
@@ -1641,6 +1641,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
CVE-2023-2248: (unk) net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/5.0/5.0_CVEs.txt b/data/5.0/5.0_CVEs.txt
index 298c21d..390b055 100644
--- a/data/5.0/5.0_CVEs.txt
+++ b/data/5.0/5.0_CVEs.txt
@@ -832,6 +832,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/5.0/5.0_security.txt b/data/5.0/5.0_security.txt
index 8767b89..cd85dd1 100644
--- a/data/5.0/5.0_security.txt
+++ b/data/5.0/5.0_security.txt
@@ -880,6 +880,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/5.1/5.1_CVEs.txt b/data/5.1/5.1_CVEs.txt
index 6336cd7..1e6028d 100644
--- a/data/5.1/5.1_CVEs.txt
+++ b/data/5.1/5.1_CVEs.txt
@@ -810,6 +810,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/5.1/5.1_security.txt b/data/5.1/5.1_security.txt
index 7271d61..cf83a39 100644
--- a/data/5.1/5.1_security.txt
+++ b/data/5.1/5.1_security.txt
@@ -846,6 +846,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/5.10/5.10_CVEs.txt b/data/5.10/5.10_CVEs.txt
index 9e4eca2..8eb33cc 100644
--- a/data/5.10/5.10_CVEs.txt
+++ b/data/5.10/5.10_CVEs.txt
@@ -547,6 +547,7 @@
CVE-2023-2124: Fixed with 5.10.184
CVE-2023-2156: Fixed with 5.10.179
CVE-2023-2162: Fixed with 5.10.168
+CVE-2023-2163: Fixed with 5.10.179
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fixed with 5.10.135
CVE-2023-2194: Fixed with 5.10.177
diff --git a/data/5.10/5.10_security.txt b/data/5.10/5.10_security.txt
index 5012981..5e9d059 100644
--- a/data/5.10/5.10_security.txt
+++ b/data/5.10/5.10_security.txt
@@ -710,6 +710,7 @@
CVEs fixed in 5.10.179:
CVE-2023-2156: c972851d3848647f57cd8d5625c48663410c3f96 net: rpl: fix rpl header size calculation
+ CVE-2023-2163: b1281d008845ae9a4de9ef7510dcc1667557a67a bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2248: ddcf35deb8f2a1d9addc74b586cf4c5a1f5d6020 net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
CVE-2023-2513: 05cf34a2b6414a1172552d16159b3e17e9da36a3 ext4: fix use-after-free in ext4_xattr_set_entry
CVE-2023-31436: ddcf35deb8f2a1d9addc74b586cf4c5a1f5d6020 net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/5.11/5.11_CVEs.txt b/data/5.11/5.11_CVEs.txt
index ba6926a..0547d1c 100644
--- a/data/5.11/5.11_CVEs.txt
+++ b/data/5.11/5.11_CVEs.txt
@@ -537,6 +537,7 @@
CVE-2023-2124: Fix not seen in stream
CVE-2023-2156: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/5.11/5.11_security.txt b/data/5.11/5.11_security.txt
index 8bc19d1..d454f03 100644
--- a/data/5.11/5.11_security.txt
+++ b/data/5.11/5.11_security.txt
@@ -577,6 +577,7 @@
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2156: (unk) net: rpl: fix rpl header size calculation
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/5.12/5.12_CVEs.txt b/data/5.12/5.12_CVEs.txt
index ee91319..43e5500 100644
--- a/data/5.12/5.12_CVEs.txt
+++ b/data/5.12/5.12_CVEs.txt
@@ -489,6 +489,7 @@
CVE-2023-2124: Fix not seen in stream
CVE-2023-2156: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2166: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
diff --git a/data/5.12/5.12_security.txt b/data/5.12/5.12_security.txt
index 11dfdf4..a1ba321 100644
--- a/data/5.12/5.12_security.txt
+++ b/data/5.12/5.12_security.txt
@@ -522,6 +522,7 @@
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2156: (unk) net: rpl: fix rpl header size calculation
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2166: (unk) can: af_can: fix NULL pointer dereference in can_rcv_filter
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
diff --git a/data/5.13/5.13_CVEs.txt b/data/5.13/5.13_CVEs.txt
index 1a09d35..923c47c 100644
--- a/data/5.13/5.13_CVEs.txt
+++ b/data/5.13/5.13_CVEs.txt
@@ -457,6 +457,7 @@
CVE-2023-2124: Fix not seen in stream
CVE-2023-2156: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2166: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
diff --git a/data/5.13/5.13_security.txt b/data/5.13/5.13_security.txt
index e7452f1..2483ee4 100644
--- a/data/5.13/5.13_security.txt
+++ b/data/5.13/5.13_security.txt
@@ -490,6 +490,7 @@
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2156: (unk) net: rpl: fix rpl header size calculation
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2166: (unk) can: af_can: fix NULL pointer dereference in can_rcv_filter
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
diff --git a/data/5.14/5.14_CVEs.txt b/data/5.14/5.14_CVEs.txt
index 0d163c2..a5da811 100644
--- a/data/5.14/5.14_CVEs.txt
+++ b/data/5.14/5.14_CVEs.txt
@@ -432,6 +432,7 @@
CVE-2023-2124: Fix not seen in stream
CVE-2023-2156: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2166: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
diff --git a/data/5.14/5.14_security.txt b/data/5.14/5.14_security.txt
index 97c2516..d70b841 100644
--- a/data/5.14/5.14_security.txt
+++ b/data/5.14/5.14_security.txt
@@ -466,6 +466,7 @@
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2156: (unk) net: rpl: fix rpl header size calculation
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2166: (unk) can: af_can: fix NULL pointer dereference in can_rcv_filter
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
diff --git a/data/5.15/5.15_CVEs.txt b/data/5.15/5.15_CVEs.txt
index e43b126..f5444f7 100644
--- a/data/5.15/5.15_CVEs.txt
+++ b/data/5.15/5.15_CVEs.txt
@@ -417,6 +417,7 @@
CVE-2023-2124: Fixed with 5.15.117
CVE-2023-2156: Fixed with 5.15.109
CVE-2023-2162: Fixed with 5.15.93
+CVE-2023-2163: Fixed with 5.15.109
CVE-2023-2166: Fixed with 5.15.83
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fixed with 5.15.59
diff --git a/data/5.15/5.15_security.txt b/data/5.15/5.15_security.txt
index 64ca571..f0f130c 100644
--- a/data/5.15/5.15_security.txt
+++ b/data/5.15/5.15_security.txt
@@ -520,6 +520,7 @@
CVEs fixed in 5.15.109:
CVE-2023-2156: 4eee0d9d3c1117aa4a1c9f4c7f29287107e7c084 net: rpl: fix rpl header size calculation
+ CVE-2023-2163: e722ea6dae2cc042d1bb7090e2ef8456dd5a0e57 bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2248: 1ffc0e8105510cb826cb9d27ed1820a1131c82d4 net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
CVE-2023-31436: 1ffc0e8105510cb826cb9d27ed1820a1131c82d4 net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/5.16/5.16_CVEs.txt b/data/5.16/5.16_CVEs.txt
index 6ea0018..27cead9 100644
--- a/data/5.16/5.16_CVEs.txt
+++ b/data/5.16/5.16_CVEs.txt
@@ -384,6 +384,7 @@
CVE-2023-2124: Fix not seen in stream
CVE-2023-2156: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2166: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
diff --git a/data/5.16/5.16_security.txt b/data/5.16/5.16_security.txt
index f8ce709..1134ded 100644
--- a/data/5.16/5.16_security.txt
+++ b/data/5.16/5.16_security.txt
@@ -425,6 +425,7 @@
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2156: (unk) net: rpl: fix rpl header size calculation
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2166: (unk) can: af_can: fix NULL pointer dereference in can_rcv_filter
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
diff --git a/data/5.17/5.17_CVEs.txt b/data/5.17/5.17_CVEs.txt
index c72aa7c..1ded095 100644
--- a/data/5.17/5.17_CVEs.txt
+++ b/data/5.17/5.17_CVEs.txt
@@ -329,6 +329,7 @@
CVE-2023-2124: Fix not seen in stream
CVE-2023-2156: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2166: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
diff --git a/data/5.17/5.17_security.txt b/data/5.17/5.17_security.txt
index a2660f3..b0c59dd 100644
--- a/data/5.17/5.17_security.txt
+++ b/data/5.17/5.17_security.txt
@@ -365,6 +365,7 @@
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2156: (unk) net: rpl: fix rpl header size calculation
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2166: (unk) can: af_can: fix NULL pointer dereference in can_rcv_filter
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
diff --git a/data/5.18/5.18_CVEs.txt b/data/5.18/5.18_CVEs.txt
index 7ead6c1..49fe2d6 100644
--- a/data/5.18/5.18_CVEs.txt
+++ b/data/5.18/5.18_CVEs.txt
@@ -280,6 +280,7 @@
CVE-2023-2124: Fix not seen in stream
CVE-2023-2156: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2166: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fixed with 5.18.16
diff --git a/data/5.18/5.18_security.txt b/data/5.18/5.18_security.txt
index d71a1ec..b69b025 100644
--- a/data/5.18/5.18_security.txt
+++ b/data/5.18/5.18_security.txt
@@ -320,6 +320,7 @@
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2156: (unk) net: rpl: fix rpl header size calculation
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2166: (unk) can: af_can: fix NULL pointer dereference in can_rcv_filter
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/5.19/5.19_CVEs.txt b/data/5.19/5.19_CVEs.txt
index f6cfd98..a9a9f91 100644
--- a/data/5.19/5.19_CVEs.txt
+++ b/data/5.19/5.19_CVEs.txt
@@ -237,6 +237,7 @@
CVE-2023-2124: Fix not seen in stream
CVE-2023-2156: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2166: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
diff --git a/data/5.19/5.19_security.txt b/data/5.19/5.19_security.txt
index c0628ac..b2d96c5 100644
--- a/data/5.19/5.19_security.txt
+++ b/data/5.19/5.19_security.txt
@@ -268,6 +268,7 @@
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2156: (unk) net: rpl: fix rpl header size calculation
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2166: (unk) can: af_can: fix NULL pointer dereference in can_rcv_filter
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
diff --git a/data/5.2/5.2_CVEs.txt b/data/5.2/5.2_CVEs.txt
index 1632ed6..ff23b38 100644
--- a/data/5.2/5.2_CVEs.txt
+++ b/data/5.2/5.2_CVEs.txt
@@ -773,6 +773,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/5.2/5.2_security.txt b/data/5.2/5.2_security.txt
index 00f6e08..ec0cda2 100644
--- a/data/5.2/5.2_security.txt
+++ b/data/5.2/5.2_security.txt
@@ -811,6 +811,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/5.3/5.3_CVEs.txt b/data/5.3/5.3_CVEs.txt
index 771c09f..194f87e 100644
--- a/data/5.3/5.3_CVEs.txt
+++ b/data/5.3/5.3_CVEs.txt
@@ -746,6 +746,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/5.3/5.3_security.txt b/data/5.3/5.3_security.txt
index ede87e6..0f06079 100644
--- a/data/5.3/5.3_security.txt
+++ b/data/5.3/5.3_security.txt
@@ -782,6 +782,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/5.4/5.4_CVEs.txt b/data/5.4/5.4_CVEs.txt
index 80cc9db..d95b0c6 100644
--- a/data/5.4/5.4_CVEs.txt
+++ b/data/5.4/5.4_CVEs.txt
@@ -675,6 +675,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fixed with 5.4.249
CVE-2023-2162: Fixed with 5.4.232
+CVE-2023-2163: Fixed with 5.4.242
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fixed with 5.4.209
CVE-2023-2194: Fixed with 5.4.240
diff --git a/data/5.4/5.4_security.txt b/data/5.4/5.4_security.txt
index ccc496f..026801e 100644
--- a/data/5.4/5.4_security.txt
+++ b/data/5.4/5.4_security.txt
@@ -911,6 +911,7 @@
CVE-2023-1859: fcd084e199b9a38490bfedd97885bbaba14475e5 9p/xen : Fix use after free bug in xen_9pfs_front_remove due to race condition
CVEs fixed in 5.4.242:
+ CVE-2023-2163: 0f0a291cc5208dcc6436974246e8c18106e3c3d2 bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2248: 35dceaeab97c9e5f3fda3b10ce7f8110df0feecd net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
CVE-2023-2513: 5a62248c58556c395c604d4161d53afae16b6fad ext4: fix use-after-free in ext4_xattr_set_entry
CVE-2023-31436: 35dceaeab97c9e5f3fda3b10ce7f8110df0feecd net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/5.5/5.5_CVEs.txt b/data/5.5/5.5_CVEs.txt
index 82cf2be..6702d1c 100644
--- a/data/5.5/5.5_CVEs.txt
+++ b/data/5.5/5.5_CVEs.txt
@@ -636,6 +636,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/5.5/5.5_security.txt b/data/5.5/5.5_security.txt
index 2ecbb67..2e222fc 100644
--- a/data/5.5/5.5_security.txt
+++ b/data/5.5/5.5_security.txt
@@ -670,6 +670,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/5.6/5.6_CVEs.txt b/data/5.6/5.6_CVEs.txt
index abb7499..1554182 100644
--- a/data/5.6/5.6_CVEs.txt
+++ b/data/5.6/5.6_CVEs.txt
@@ -613,6 +613,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/5.6/5.6_security.txt b/data/5.6/5.6_security.txt
index 7489e1b..c142179 100644
--- a/data/5.6/5.6_security.txt
+++ b/data/5.6/5.6_security.txt
@@ -647,6 +647,7 @@
CVE-2023-20941: (unk)
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/5.7/5.7_CVEs.txt b/data/5.7/5.7_CVEs.txt
index 87aede5..5f82076 100644
--- a/data/5.7/5.7_CVEs.txt
+++ b/data/5.7/5.7_CVEs.txt
@@ -609,6 +609,7 @@
CVE-2023-2124: Fix not seen in stream
CVE-2023-2156: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/5.7/5.7_security.txt b/data/5.7/5.7_security.txt
index 3706396..25fe640 100644
--- a/data/5.7/5.7_security.txt
+++ b/data/5.7/5.7_security.txt
@@ -643,6 +643,7 @@
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2156: (unk) net: rpl: fix rpl header size calculation
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/5.8/5.8_CVEs.txt b/data/5.8/5.8_CVEs.txt
index df9bda6..80a7eb4 100644
--- a/data/5.8/5.8_CVEs.txt
+++ b/data/5.8/5.8_CVEs.txt
@@ -593,6 +593,7 @@
CVE-2023-2124: Fix not seen in stream
CVE-2023-2156: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/5.8/5.8_security.txt b/data/5.8/5.8_security.txt
index 35d40f4..5d499ee 100644
--- a/data/5.8/5.8_security.txt
+++ b/data/5.8/5.8_security.txt
@@ -627,6 +627,7 @@
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2156: (unk) net: rpl: fix rpl header size calculation
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/5.9/5.9_CVEs.txt b/data/5.9/5.9_CVEs.txt
index 9826045..ce6bbc4 100644
--- a/data/5.9/5.9_CVEs.txt
+++ b/data/5.9/5.9_CVEs.txt
@@ -566,6 +566,7 @@
CVE-2023-2124: Fix not seen in stream
CVE-2023-2156: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2176: Fix not seen in stream
CVE-2023-2177: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/5.9/5.9_security.txt b/data/5.9/5.9_security.txt
index e323e35..39dabb9 100644
--- a/data/5.9/5.9_security.txt
+++ b/data/5.9/5.9_security.txt
@@ -596,6 +596,7 @@
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2156: (unk) net: rpl: fix rpl header size calculation
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2177: (unk) sctp: leave the err path free in sctp_stream_init to sctp_stream_free
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
diff --git a/data/6.0/6.0_CVEs.txt b/data/6.0/6.0_CVEs.txt
index bfd322c..ca0b8fc 100644
--- a/data/6.0/6.0_CVEs.txt
+++ b/data/6.0/6.0_CVEs.txt
@@ -198,6 +198,7 @@
CVE-2023-2124: Fix not seen in stream
CVE-2023-2156: Fix not seen in stream
CVE-2023-2162: Fix not seen in stream
+CVE-2023-2163: Fix not seen in stream
CVE-2023-2166: Fixed with 6.0.13
CVE-2023-2176: Fix not seen in stream
CVE-2023-2194: Fix not seen in stream
diff --git a/data/6.0/6.0_security.txt b/data/6.0/6.0_security.txt
index d844979..4f906dd 100644
--- a/data/6.0/6.0_security.txt
+++ b/data/6.0/6.0_security.txt
@@ -244,6 +244,7 @@
CVE-2023-2124: (unk) xfs: verify buffer contents when we skip log replay
CVE-2023-2156: (unk) net: rpl: fix rpl header size calculation
CVE-2023-2162: (unk) scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
+ CVE-2023-2163: (unk) bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2176: (unk) RDMA/core: Refactor rdma_bind_addr
CVE-2023-2194: (unk) i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()
CVE-2023-2235: (unk) perf: Fix check before add_event_to_groups() in perf_group_detach()
diff --git a/data/6.1/6.1_CVEs.txt b/data/6.1/6.1_CVEs.txt
index a37b25c..ddc79be 100644
--- a/data/6.1/6.1_CVEs.txt
+++ b/data/6.1/6.1_CVEs.txt
@@ -144,6 +144,7 @@
CVE-2023-2124: Fixed with 6.1.33
CVE-2023-2156: Fixed with 6.1.26
CVE-2023-2162: Fixed with 6.1.11
+CVE-2023-2163: Fixed with 6.1.26
CVE-2023-2166: Fixed with 6.1
CVE-2023-2176: Fix not seen in stream
CVE-2023-2194: Fixed with 6.1.22
diff --git a/data/6.1/6.1_security.txt b/data/6.1/6.1_security.txt
index 0ceb112..aff948e 100644
--- a/data/6.1/6.1_security.txt
+++ b/data/6.1/6.1_security.txt
@@ -127,6 +127,7 @@
CVEs fixed in 6.1.26:
CVE-2023-2156: 9a0b96d03c59ba560b074cdb9b6233493fd5492d net: rpl: fix rpl header size calculation
+ CVE-2023-2163: 89603f4c9154e818b9ead1abe08545a053c66ded bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2248: ce729b06dc33b01f8a6ac84da5ef54154326bf7e net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
CVE-2023-31436: ce729b06dc33b01f8a6ac84da5ef54154326bf7e net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/6.2/6.2_CVEs.txt b/data/6.2/6.2_CVEs.txt
index 36e4a89..4f24f75 100644
--- a/data/6.2/6.2_CVEs.txt
+++ b/data/6.2/6.2_CVEs.txt
@@ -104,6 +104,7 @@
CVE-2023-20941: Fix unknown
CVE-2023-2124: Fix not seen in stream
CVE-2023-2156: Fixed with 6.2.13
+CVE-2023-2163: Fixed with 6.2.13
CVE-2023-2176: Fix not seen in stream
CVE-2023-2194: Fixed with 6.2.9
CVE-2023-2235: Fixed with 6.2.8
diff --git a/data/6.2/6.2_security.txt b/data/6.2/6.2_security.txt
index ad6a4ae..84fcd00 100644
--- a/data/6.2/6.2_security.txt
+++ b/data/6.2/6.2_security.txt
@@ -54,6 +54,7 @@
CVEs fixed in 6.2.13:
CVE-2023-2156: 191642f5cfb38c0e44fb4783a37530bae15b8f8e net: rpl: fix rpl header size calculation
+ CVE-2023-2163: 71035a0508c04827b91a5bfeb2c9ef374f321e65 bpf: Fix incorrect verifier pruning due to missing register precision taints
CVE-2023-2248: 420d014b19ff119e210ecc075ff611fe7844690c net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
CVE-2023-31436: 420d014b19ff119e210ecc075ff611fe7844690c net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
diff --git a/data/6.3/6.3_CVEs.txt b/data/6.3/6.3_CVEs.txt
new file mode 100644
index 0000000..ab1e927
--- /dev/null
+++ b/data/6.3/6.3_CVEs.txt
@@ -0,0 +1,122 @@
+CVE-2005-3660: Fix unknown
+CVE-2007-3719: Fix unknown
+CVE-2008-2544: Fix unknown
+CVE-2008-4609: Fix unknown
+CVE-2010-4563: Fix unknown
+CVE-2010-5321: Fix unknown
+CVE-2011-4916: Fix unknown
+CVE-2011-4917: Fix unknown
+CVE-2012-4542: Fix unknown
+CVE-2013-7445: Fix unknown
+CVE-2015-2877: Fix unknown
+CVE-2016-8660: Fix unknown
+CVE-2017-13693: Fix unknown
+CVE-2017-13694: Fix unknown
+CVE-2018-1121: Fix unknown
+CVE-2018-12928: Fix unknown
+CVE-2018-12929: Fix unknown
+CVE-2018-12930: Fix unknown
+CVE-2018-12931: Fix unknown
+CVE-2018-17977: Fix unknown
+CVE-2019-12456: Fix unknown
+CVE-2019-15239: Fix not seen in stream
+CVE-2019-15290: Fix unknown
+CVE-2019-15902: Fix not seen in stream
+CVE-2019-16089: Fix unknown
+CVE-2019-19378: Fix unknown
+CVE-2019-19814: Fix unknown
+CVE-2019-20794: Fix unknown
+CVE-2020-0347: Fix unknown
+CVE-2020-10708: Fix unknown
+CVE-2020-11725: Fix unknown
+CVE-2020-14304: Fix unknown
+CVE-2020-15802: Fix unknown
+CVE-2020-24502: Fix unknown
+CVE-2020-24503: Fix unknown
+CVE-2020-25220: Fix not seen in stream
+CVE-2020-26140: Fix unknown
+CVE-2020-26142: Fix unknown
+CVE-2020-26143: Fix unknown
+CVE-2020-26556: Fix unknown
+CVE-2020-26557: Fix unknown
+CVE-2020-26559: Fix unknown
+CVE-2020-26560: Fix unknown
+CVE-2020-35501: Fix unknown
+CVE-2021-0399: Fix unknown
+CVE-2021-26934: Fix unknown
+CVE-2021-3542: Fix unknown
+CVE-2021-3714: Fix unknown
+CVE-2021-3847: Fix unknown
+CVE-2021-3864: Fix unknown
+CVE-2021-3892: Fix unknown
+CVE-2021-39800: Fix unknown
+CVE-2021-39801: Fix unknown
+CVE-2022-0400: Fix unknown
+CVE-2022-1116: Fix unknown
+CVE-2022-1247: Fix unknown
+CVE-2022-2209: Fix unknown
+CVE-2022-23825: Fix unknown
+CVE-2022-25265: Fix unknown
+CVE-2022-26878: Fix unknown
+CVE-2022-2961: Fix unknown
+CVE-2022-3238: Fix unknown
+CVE-2022-3544: Fix unknown
+CVE-2022-36402: Fix unknown
+CVE-2022-3642: Fix unknown
+CVE-2022-38096: Fix unknown
+CVE-2022-41848: Fix unknown
+CVE-2022-44032: Fix unknown
+CVE-2022-44033: Fix unknown
+CVE-2022-44034: Fix unknown
+CVE-2022-4543: Fix unknown
+CVE-2022-45884: Fix unknown
+CVE-2022-45885: Fix unknown
+CVE-2022-45886: Fix unknown
+CVE-2022-45887: Fix unknown
+CVE-2022-45919: Fix unknown
+CVE-2022-48425: Fixed with 6.3.4
+CVE-2023-0160: Fix unknown
+CVE-2023-1192: Fix unknown
+CVE-2023-1193: Fix unknown
+CVE-2023-1194: Fix unknown
+CVE-2023-1206: Fix unknown
+CVE-2023-1380: Fixed with 6.3.1
+CVE-2023-2002: Fixed with 6.3.1
+CVE-2023-20941: Fix unknown
+CVE-2023-2124: Fixed with 6.3.7
+CVE-2023-2156: Fixed with 6.3
+CVE-2023-2163: Fixed with 6.3
+CVE-2023-2248: Fixed with 6.3
+CVE-2023-2269: Fixed with 6.3.2
+CVE-2023-23039: Fix unknown
+CVE-2023-2598: Fixed with 6.3.2
+CVE-2023-26242: Fix unknown
+CVE-2023-2898: Fix unknown
+CVE-2023-3090: Fixed with 6.3.4
+CVE-2023-31081: Fix unknown
+CVE-2023-31082: Fix unknown
+CVE-2023-31083: Fix unknown
+CVE-2023-31084: Fix not seen in stream
+CVE-2023-31085: Fix unknown
+CVE-2023-3141: Fixed with 6.3.4
+CVE-2023-31436: Fixed with 6.3
+CVE-2023-3212: Fixed with 6.3.7
+CVE-2023-32233: Fixed with 6.3.2
+CVE-2023-32250: Fixed with 6.3.2
+CVE-2023-32254: Fixed with 6.3.2
+CVE-2023-3268: Fixed with 6.3.2
+CVE-2023-3312: Fixed with 6.3.2
+CVE-2023-33250: Fix unknown
+CVE-2023-3390: Fixed with 6.3.9
+CVE-2023-33951: Fixed with 6.3-rc1
+CVE-2023-33952: Fixed with 6.3-rc1
+CVE-2023-3397: Fix unknown
+CVE-2023-34255: Fixed with 6.3.7
+CVE-2023-34256: Fixed with 6.3.3
+CVE-2023-35788: Fixed with 6.3.7
+CVE-2023-35823: Fixed with 6.3.2
+CVE-2023-35824: Fixed with 6.3.2
+CVE-2023-35826: Fixed with 6.3.2
+CVE-2023-35827: Fix unknown
+CVE-2023-35828: Fixed with 6.3.2
+CVE-2023-35829: Fixed with 6.3.2
diff --git a/data/6.3/6.3_security.txt b/data/6.3/6.3_security.txt
new file mode 100644
index 0000000..579fddb
--- /dev/null
+++ b/data/6.3/6.3_security.txt
@@ -0,0 +1,140 @@
+
+CVEs fixed in 6.3:
+ CVE-2023-2156: 4e006c7a6dac0ead4c1bf606000aa90a372fc253 net: rpl: fix rpl header size calculation
+ CVE-2023-2163: 71b547f561247897a0a14f3082730156c0533fed bpf: Fix incorrect verifier pruning due to missing register precision taints
+ CVE-2023-2248: 3037933448f60f9acb705997eae62013ecb81e0d net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
+ CVE-2023-31436: 3037933448f60f9acb705997eae62013ecb81e0d net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
+
+CVEs fixed in 6.3-rc1:
+ CVE-2023-33951: a950b989ea29ab3b38ea7f6e3d2540700a3c54e8 drm/vmwgfx: Do not drop the reference to the handle too soon
+ CVE-2023-33952: a950b989ea29ab3b38ea7f6e3d2540700a3c54e8 drm/vmwgfx: Do not drop the reference to the handle too soon
+
+CVEs fixed in 6.3.1:
+ CVE-2023-1380: 21bee3e649d87f78fe8aef6ae02edd3d6f310fd0 wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()
+ CVE-2023-2002: dd30f9da333748488d96b7cb3c5a17bbaf86b32d bluetooth: Perform careful capability checks in hci_sock_ioctl()
+
+CVEs fixed in 6.3.2:
+ CVE-2023-2269: a554e6ec3626d4c11f55d7eef8d6aa93fb211c24 dm ioctl: fix nested locking in table_clear() to remove deadlock concern
+ CVE-2023-2598: 3a0a9211d7d0138d55aecd209b05e6d4a9eec383 io_uring/rsrc: check for nonconsecutive pages
+ CVE-2023-32233: f8486683ffa30456e0be4290282a44c4459a3287 netfilter: nf_tables: deactivate anonymous set from preparation phase
+ CVE-2023-32250: 02f41d88f15d6b7d523e52cc3f87488f57e9265b ksmbd: fix racy issue from session setup and logoff
+ CVE-2023-32254: 39366b47a59d46af15ac57beb0996268bf911f6a ksmbd: fix racy issue under cocurrent smb2 tree disconnect
+ CVE-2023-3268: 35ca4fb494c0c9f226fbcfa1c1688e6cc1e5062e relayfs: fix out-of-bounds access in relay_file_read
+ CVE-2023-3312: d9bad836cf156ee87d577f0bd1ed01501b31a253 cpufreq: qcom-cpufreq-hw: fix double IO unmap and resource release on exit
+ CVE-2023-35823: 3a60e51489a3ec61565f5bc53f726ac9ccc6083c media: saa7134: fix use after free bug in saa7134_finidev due to race condition
+ CVE-2023-35824: d730bc84064364cafdb20c6ee7fda2cd7416407a media: dm1105: Fix use after free bug in dm1105_remove due to race condition
+ CVE-2023-35826: 565c863bd982584aa4393f7bdb345dbccb3ad488 media: cedrus: fix use after free bug in cedrus_remove due to race condition
+ CVE-2023-35828: 231598b40a070a6bf780c0df1ff5ae3e57102900 usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition
+ CVE-2023-35829: 2115e94838adc9d1e7b75043c9f26abcc910f6fb media: rkvdec: fix use after free bug in rkvdec_remove
+
+CVEs fixed in 6.3.3:
+ CVE-2023-34256: be7b6374a2ee8a59c1ff5addcbe25ebc1b4efd9f ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum
+
+CVEs fixed in 6.3.4:
+ CVE-2022-48425: e6f4b1c32d6d6047958d7700d12fed6d91f441e7 fs/ntfs3: Validate MFT flags before replaying logs
+ CVE-2023-3090: 3cd16c6a6a6b68bba02fbbc54b9906f44640ffde ipvlan:Fix out-of-bounds caused by unclear skb->cb
+ CVE-2023-3141: 76fec5f01c9c70e11b85fdeb3f2707589c9238ca memstick: r592: Fix UAF bug in r592_remove due to race condition
+
+CVEs fixed in 6.3.7:
+ CVE-2023-2124: 69ebe82c73f4f9f4b49ed3b35ce347af20716d0a xfs: verify buffer contents when we skip log replay
+ CVE-2023-3212: 14c454764a37b194dc916c07488ce7339c82bc4f gfs2: Don't deref jdesc in evict
+ CVE-2023-34255: 69ebe82c73f4f9f4b49ed3b35ce347af20716d0a xfs: verify buffer contents when we skip log replay
+ CVE-2023-35788: 900fab73a9cd3dd6a3a69f89980f8f3c9a738d5a net/sched: flower: fix possible OOB write in fl_set_geneve_opt()
+
+CVEs fixed in 6.3.9:
+ CVE-2023-3390: bdace3b1a51887211d3e49417a18fdbd315a313b netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
+
+Outstanding CVEs:
+ CVE-2005-3660: (unk)
+ CVE-2007-3719: (unk)
+ CVE-2008-2544: (unk)
+ CVE-2008-4609: (unk)
+ CVE-2010-4563: (unk)
+ CVE-2010-5321: (unk)
+ CVE-2011-4916: (unk)
+ CVE-2011-4917: (unk)
+ CVE-2012-4542: (unk)
+ CVE-2013-7445: (unk)
+ CVE-2015-2877: (unk)
+ CVE-2016-8660: (unk)
+ CVE-2017-13693: (unk)
+ CVE-2017-13694: (unk)
+ CVE-2018-1121: (unk)
+ CVE-2018-12928: (unk)
+ CVE-2018-12929: (unk)
+ CVE-2018-12930: (unk)
+ CVE-2018-12931: (unk)
+ CVE-2018-17977: (unk)
+ CVE-2019-12456: (unk)
+ CVE-2019-15239: (unk) unknown
+ CVE-2019-15290: (unk)
+ CVE-2019-15902: (unk) unknown
+ CVE-2019-16089: (unk)
+ CVE-2019-19378: (unk)
+ CVE-2019-19814: (unk)
+ CVE-2019-20794: (unk)
+ CVE-2020-0347: (unk)
+ CVE-2020-10708: (unk)
+ CVE-2020-11725: (unk)
+ CVE-2020-14304: (unk)
+ CVE-2020-15802: (unk)
+ CVE-2020-24502: (unk)
+ CVE-2020-24503: (unk)
+ CVE-2020-25220: (unk)
+ CVE-2020-26140: (unk)
+ CVE-2020-26142: (unk)
+ CVE-2020-26143: (unk)
+ CVE-2020-26556: (unk)
+ CVE-2020-26557: (unk)
+ CVE-2020-26559: (unk)
+ CVE-2020-26560: (unk)
+ CVE-2020-35501: (unk)
+ CVE-2021-0399: (unk)
+ CVE-2021-26934: (unk)
+ CVE-2021-3542: (unk)
+ CVE-2021-3714: (unk)
+ CVE-2021-3847: (unk)
+ CVE-2021-3864: (unk)
+ CVE-2021-3892: (unk)
+ CVE-2021-39800: (unk)
+ CVE-2021-39801: (unk)
+ CVE-2022-0400: (unk)
+ CVE-2022-1116: (unk)
+ CVE-2022-1247: (unk)
+ CVE-2022-2209: (unk)
+ CVE-2022-23825: (unk)
+ CVE-2022-25265: (unk)
+ CVE-2022-26878: (unk)
+ CVE-2022-2961: (unk)
+ CVE-2022-3238: (unk)
+ CVE-2022-3544: (unk)
+ CVE-2022-36402: (unk)
+ CVE-2022-3642: (unk)
+ CVE-2022-38096: (unk)
+ CVE-2022-41848: (unk)
+ CVE-2022-44032: (unk)
+ CVE-2022-44033: (unk)
+ CVE-2022-44034: (unk)
+ CVE-2022-4543: (unk)
+ CVE-2022-45884: (unk)
+ CVE-2022-45885: (unk)
+ CVE-2022-45886: (unk)
+ CVE-2022-45887: (unk)
+ CVE-2022-45919: (unk)
+ CVE-2023-0160: (unk)
+ CVE-2023-1192: (unk)
+ CVE-2023-1193: (unk)
+ CVE-2023-1194: (unk)
+ CVE-2023-1206: (unk)
+ CVE-2023-20941: (unk)
+ CVE-2023-23039: (unk)
+ CVE-2023-26242: (unk)
+ CVE-2023-2898: (unk)
+ CVE-2023-31081: (unk)
+ CVE-2023-31082: (unk)
+ CVE-2023-31083: (unk)
+ CVE-2023-31084: (unk) media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()
+ CVE-2023-31085: (unk)
+ CVE-2023-33250: (unk)
+ CVE-2023-3397: (unk)
+ CVE-2023-35827: (unk)
diff --git a/data/CVEs.txt b/data/CVEs.txt
index 1ea24c8..2647e55 100644
--- a/data/CVEs.txt
+++ b/data/CVEs.txt
@@ -2351,6 +2351,7 @@
CVE-2023-2124: 50d5c8d8e938e3c4c0d21db9fc7d64282dc7be20 - 22ed903eee23a5b174e240f1cdfa9acf393a5210 (v3.12-rc1 to v6.4-rc1)
CVE-2023-2156: 8610c7c6e3bd647ff98d21c8bc0580e77bc2f8b3 - 4e006c7a6dac0ead4c1bf606000aa90a372fc253 (v5.7-rc1 to v6.3)
CVE-2023-2162: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3 (v2.6.12-rc2 to v6.2-rc6)
+CVE-2023-2163: (n/a) - 71b547f561247897a0a14f3082730156c0533fed (unk to v6.3)
CVE-2023-2166: 4e096a18867a5a989b510f6999d9c6b6622e8f7b - 0acc442309a0a1b01bcdaa135e56e6398a49439c (v5.12-rc1-dontuse to v6.1)
CVE-2023-2176: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 - 8d037973d48c026224ab285e6a06985ccac6f7bf (v2.6.12-rc2 to v6.3-rc1)
CVE-2023-2177: 5bbbbe32a43199c2b9ea5ea66fab6241c64beb51 - 181d8d2066c000ba0a0e6940a7ad80f1a0e68e9d (v4.15-rc1 to v5.19)
diff --git a/data/cmts.json b/data/cmts.json
index 7e39eed..89aa8af 100644
--- a/data/cmts.json
+++ b/data/cmts.json
@@ -1516,6 +1516,7 @@
"717adfdaf14704fd3ec7fa2c04520c0723247eac": "v4.18-rc5",
"717d50e4971b81b96c0199c91cdf0039a8cb181a": "v2.6.24-rc1",
"71b3c126e61177eb693423f2e18a1914205b165e": "v4.5-rc1",
+ "71b547f561247897a0a14f3082730156c0533fed": "v6.3",
"71bb99a02b32b4cc4265118e85f6035ca72923f0": "v3.19-rc3",
"71ebd71921e451f0f942ddfe85d01e31ddc6eb88": "v4.12-rc1",
"720db068634c91553a8e1d9a0fcd8c7050e06d2b": "v5.1-rc1",
diff --git a/data/kernel_cves.json b/data/kernel_cves.json
index 8d82856..d4aa04d 100644
--- a/data/kernel_cves.json
+++ b/data/kernel_cves.json
@@ -30557,7 +30557,7 @@
"cwe": "Information Leak / Disclosure",
"fixes": "99c6fa2511d8a683e61468be91b83f85452115fa",
"last_affected_version": "4.14.13",
- "last_modified": "2023-05-05",
+ "last_modified": "2023-06-30",
"name": "Spectre",
"nvd_text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"ref_urls": {
@@ -79541,8 +79541,8 @@
"score": 7.8
},
"fixes": "98bea253aa28ad8be2ce565a9ca21beb4a9419e5",
- "last_affected_version": "6.1.32",
- "last_modified": "2023-06-24",
+ "last_affected_version": "6.3.3",
+ "last_modified": "2023-06-30",
"nvd_text": "In the Linux kernel through 6.2.7, fs/ntfs3/inode.c has an invalid kfree because it does not validate MFT flags before replaying logs.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2022-48425",
@@ -80570,8 +80570,8 @@
"score": 7.1
},
"fixes": "0da40e018fd034d87c9460123fa7f897b69fdee7",
- "last_affected_version": "6.2.13",
- "last_modified": "2023-05-19",
+ "last_affected_version": "6.3.0",
+ "last_modified": "2023-06-30",
"nvd_text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-1380",
@@ -81093,8 +81093,8 @@
"score": 6.8
},
"fixes": "25c150ac103a4ebeed0319994c742a90634ddf18",
- "last_affected_version": "6.2.13",
- "last_modified": "2023-06-24",
+ "last_affected_version": "6.3.0",
+ "last_modified": "2023-06-30",
"nvd_text": "A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2002",
@@ -81410,8 +81410,8 @@
"score": 7.8
},
"fixes": "22ed903eee23a5b174e240f1cdfa9acf393a5210",
- "last_affected_version": "6.1.32",
- "last_modified": "2023-06-29",
+ "last_affected_version": "6.3.6",
+ "last_modified": "2023-06-30",
"nvd_text": "An out-of-bounds memory access flaw was found in the Linux kernel\u2019s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2124",
@@ -81439,8 +81439,8 @@
"score": 7.5
},
"fixes": "4e006c7a6dac0ead4c1bf606000aa90a372fc253",
- "last_affected_version": "6.2.12",
- "last_modified": "2023-06-04",
+ "last_affected_version": "6.2",
+ "last_modified": "2023-06-30",
"nvd_text": "A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2156",
@@ -81480,6 +81480,22 @@
"Ubuntu": "https://ubuntu.com/security/CVE-2023-2162"
}
},
+ "CVE-2023-2163": {
+ "affected_versions": "unk to v6.3",
+ "breaks": "",
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints",
+ "fixes": "71b547f561247897a0a14f3082730156c0533fed",
+ "last_affected_version": "6.2",
+ "last_modified": "2023-06-30",
+ "ref_urls": {
+ "Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2163",
+ "ExploitDB": "https://www.exploit-db.com/search?cve=2023-2163",
+ "NVD": "https://nvd.nist.gov/vuln/detail/CVE-2023-2163",
+ "Red Hat": "https://access.redhat.com/security/cve/CVE-2023-2163",
+ "SUSE": "https://www.suse.com/security/cve/CVE-2023-2163",
+ "Ubuntu": "https://ubuntu.com/security/CVE-2023-2163"
+ }
+ },
"CVE-2023-2166": {
"affected_versions": "v5.12-rc1-dontuse to v6.1",
"breaks": "4e096a18867a5a989b510f6999d9c6b6622e8f7b",
@@ -81658,8 +81674,8 @@
"breaks": "3015f3d2a3cd9614294025849d3ed89fd2f3a7f5",
"cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg",
"fixes": "3037933448f60f9acb705997eae62013ecb81e0d",
- "last_affected_version": "6.2.12",
- "last_modified": "2023-05-12",
+ "last_affected_version": "6.2",
+ "last_modified": "2023-06-30",
"nvd_text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it was the duplicate of CVE-2023-31436.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2248",
@@ -81688,8 +81704,8 @@
"score": 5.5
},
"fixes": "3d32aaa7e66d5c1479a3c31d6c2c5d45dd0d3b89",
- "last_affected_version": "6.2.14",
- "last_modified": "2023-05-19",
+ "last_affected_version": "6.3.1",
+ "last_modified": "2023-06-30",
"nvd_text": "A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2269",
@@ -82283,6 +82299,7 @@
"CVE-2023-2598": {
"affected_versions": "v6.3-rc1 to v6.4-rc1",
"breaks": "57bebf807e2abcf87d96b9de1266104ee2d8fc2f",
+ "cmt_msg": "io_uring/rsrc: check for nonconsecutive pages",
"cvss3": {
"Attack Complexity": "Low",
"Attack Vector": "Local",
@@ -82296,7 +82313,8 @@
"score": 7.8
},
"fixes": "776617db78c6d208780e7c69d4d68d1fa82913de",
- "last_modified": "2023-06-24",
+ "last_affected_version": "6.3.1",
+ "last_modified": "2023-06-30",
"nvd_text": "A flaw was found in the fixed buffer registration code for io_uring (io_sqe_buffer_register in io_uring/rsrc.c) in the Linux kernel that allows out-of-bounds access to physical memory beyond the end of the buffer. This flaw enables full local privilege escalation.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-2598",
@@ -82859,7 +82877,7 @@
"breaks": "",
"cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb",
"fixes": "90cbed5247439a966b645b34eb0a2e037836ea8e",
- "last_affected_version": "6.1.29",
+ "last_affected_version": "6.3.3",
"last_modified": "2023-06-30",
"nvd_text": "A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.\n\nThe out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if\u00a0CONFIG_IPVLAN is enabled.\n\n\nWe recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.\n\n",
"ref_urls": {
@@ -83054,8 +83072,8 @@
"score": 7.1
},
"fixes": "63264422785021704c39b38f65a78ab9e4a186d7",
- "last_affected_version": "6.1.29",
- "last_modified": "2023-06-24",
+ "last_affected_version": "6.3.3",
+ "last_modified": "2023-06-30",
"nvd_text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3141",
@@ -83083,8 +83101,8 @@
"score": 7.8
},
"fixes": "3037933448f60f9acb705997eae62013ecb81e0d",
- "last_affected_version": "6.2.12",
- "last_modified": "2023-05-12",
+ "last_affected_version": "6.2",
+ "last_modified": "2023-06-30",
"nvd_text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-31436",
@@ -83158,8 +83176,8 @@
"breaks": "16615be18cadf53ee6f8a4f0bdd647f0753421b1",
"cmt_msg": "gfs2: Don't deref jdesc in evict",
"fixes": "504a10d9e46bc37b23d0a1ae2f28973c8516e636",
- "last_affected_version": "6.1.32",
- "last_modified": "2023-06-24",
+ "last_affected_version": "6.3.6",
+ "last_modified": "2023-06-30",
"nvd_text": "A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-3212",
@@ -83216,8 +83234,8 @@
"score": 7.8
},
"fixes": "c1592a89942e9678f7d9c8030efa777c0d57edab",
- "last_affected_version": "6.2.14",
- "last_modified": "2023-05-19",
+ "last_affected_version": "6.3.1",
+ "last_modified": "2023-06-30",
"nvd_text": "In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32233",
@@ -83233,8 +83251,8 @@
"breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"cmt_msg": "ksmbd: fix racy issue from session setup and logoff",
"fixes": "f5c779b7ddbda30866cf2a27c63e34158f858c73",
- "last_affected_version": "6.2.15",
- "last_modified": "2023-05-25",
+ "last_affected_version": "6.3.1",
+ "last_modified": "2023-06-30",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32250",
"ExploitDB": "https://www.exploit-db.com/search?cve=2023-32250",
@@ -83249,8 +83267,8 @@
"breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect",
"fixes": "30210947a343b6b3ca13adc9bfc88e1543e16dd5",
- "last_affected_version": "6.2.14",
- "last_modified": "2023-05-25",
+ "last_affected_version": "6.3.1",
+ "last_modified": "2023-06-30",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-32254",
"ExploitDB": "https://www.exploit-db.com/search?cve=2023-32254",
@@ -83306,7 +83324,7 @@
"score": 7.1
},
"fixes": "43ec16f1450f4936025a9bdf1a273affdb9732c1",
- "last_affected_version": "6.2.14",
+ "last_affected_version": "6.3.1",
"last_modified": "2023-06-30",
"nvd_text": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.",
"ref_urls": {
@@ -83335,7 +83353,7 @@
"score": 7.5
},
"fixes": "ba5e770c9698782bc203bbf5cf3b36a77720bdbe",
- "last_affected_version": "6.2.14",
+ "last_affected_version": "6.3.1",
"last_modified": "2023-06-30",
"nvd_text": "A vulnerability was found in drivers/cpufreq/qcom-cpufreq-hw.c in cpufreq subsystem in the Linux Kernel. This flaw, during device unbind will lead to double release problem leading to denial of service.",
"ref_urls": {
@@ -83554,7 +83572,7 @@
"breaks": "",
"cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE",
"fixes": "1240eb93f0616b21c675416516ff3d74798fdc97",
- "last_affected_version": "6.1.34",
+ "last_affected_version": "6.3.8",
"last_modified": "2023-06-30",
"nvd_text": "A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit\u00a01240eb93f0616b21c675416516ff3d74798fdc97.",
"ref_urls": {
@@ -83571,8 +83589,8 @@
"breaks": "",
"cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon",
"fixes": "9ef8d83e8e25d5f1811b3a38eb1484f85f64296c",
- "last_affected_version": "6.1",
- "last_modified": "2023-06-29",
+ "last_affected_version": "None",
+ "last_modified": "2023-06-30",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-33951",
"ExploitDB": "https://www.exploit-db.com/search?cve=2023-33951",
@@ -83587,8 +83605,8 @@
"breaks": "",
"cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon",
"fixes": "9ef8d83e8e25d5f1811b3a38eb1484f85f64296c",
- "last_affected_version": "6.1",
- "last_modified": "2023-06-29",
+ "last_affected_version": "None",
+ "last_modified": "2023-06-30",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-33952",
"ExploitDB": "https://www.exploit-db.com/search?cve=2023-33952",
@@ -83617,8 +83635,8 @@
"breaks": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"cmt_msg": "xfs: verify buffer contents when we skip log replay",
"fixes": "22ed903eee23a5b174e240f1cdfa9acf393a5210",
- "last_affected_version": "6.1.32",
- "last_modified": "2023-06-29",
+ "last_affected_version": "6.3.6",
+ "last_modified": "2023-06-30",
"nvd_text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-2124. Reason: This candidate is a duplicate of CVE-2023-2124. Notes: All CVE users should reference CVE-2023-2124 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-34255",
@@ -83647,8 +83665,8 @@
"score": 5.5
},
"fixes": "4f04351888a83e595571de672e0a4a8b74f4fb31",
- "last_affected_version": "6.2.15",
- "last_modified": "2023-06-24",
+ "last_affected_version": "6.3.2",
+ "last_modified": "2023-06-30",
"nvd_text": "** DISPUTED ** An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated \"When modifying the block device while it is mounted by the filesystem\" access.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-34256",
@@ -83693,8 +83711,8 @@
"score": 7.8
},
"fixes": "4d56304e5827c8cc8cc18c75343d283af7c4825c",
- "last_affected_version": "6.1.32",
- "last_modified": "2023-06-24",
+ "last_affected_version": "6.3.6",
+ "last_modified": "2023-06-30",
"nvd_text": "An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.",
"ref_urls": {
"Debian": "https://security-tracker.debian.org/tracker/CVE-2023-35788",
@@ -83722,7 +83740,7 @@
"score": 7.0
},
"fixes": "30cf57da176cca80f11df0d9b7f71581fe601389",
- "last_affected_version": "6.2.14",
+ "last_affected_version": "6.3.1",
"last_modified": "2023-06-30",
"nvd_text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c.",
"ref_urls": {
@@ -83751,7 +83769,7 @@
"score": 7.0
},
"fixes": "5abda7a16698d4d1f47af1168d8fa2c640116b4a",
- "last_affected_version": "6.2.14",
+ "last_affected_version": "6.3.1",
"last_modified": "2023-06-30",
"nvd_text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.",
"ref_urls": {
@@ -83780,7 +83798,7 @@
"score": 7.0
},
"fixes": "50d0a7aea4809cef87979d4669911276aa23b71f",
- "last_affected_version": "6.2.14",
+ "last_affected_version": "6.3.1",
"last_modified": "2023-06-30",
"nvd_text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in cedrus_remove in drivers/staging/media/sunxi/cedrus/cedrus.c.",
"ref_urls": {
@@ -83836,7 +83854,7 @@
"score": 7.0
},
"fixes": "2b947f8769be8b8181dc795fd292d3e7120f5204",
- "last_affected_version": "6.2.14",
+ "last_affected_version": "6.3.1",
"last_modified": "2023-06-30",
"nvd_text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c.",
"ref_urls": {
@@ -83865,7 +83883,7 @@
"score": 7.0
},
"fixes": "3228cec23b8b29215e18090c6ba635840190993d",
- "last_affected_version": "6.2.14",
+ "last_affected_version": "6.3.1",
"last_modified": "2023-06-30",
"nvd_text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c.",
"ref_urls": {
diff --git a/data/stream_data.json b/data/stream_data.json
index 7c00583..8c75f79 100644
--- a/data/stream_data.json
+++ b/data/stream_data.json
@@ -3962,6 +3962,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -7301,6 +7304,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -10659,6 +10665,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -13957,6 +13966,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -17089,6 +17101,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -21649,6 +21664,9 @@
"CVE-2020-26142": {
"cmt_msg": ""
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-1076": {
"cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid"
},
@@ -24555,6 +24573,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -27552,6 +27573,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -31592,6 +31616,9 @@
"CVE-2020-26142": {
"cmt_msg": ""
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-1076": {
"cmt_msg": "tun: tun_chr_open(): correctly initialize socket uid"
},
@@ -34401,6 +34428,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -38736,6 +38766,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-2162": {
"cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
},
@@ -42854,6 +42887,9 @@
"CVE-2016-8655": {
"cmt_msg": "packet: fix race condition in packet_set_ring"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -47640,6 +47676,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-2162": {
"cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
},
@@ -52040,6 +52079,9 @@
"CVE-2010-4563": {
"cmt_msg": ""
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-2162": {
"cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
},
@@ -52635,6 +52677,10 @@
"cmt_msg": "net: rpl: fix rpl header size calculation",
"cmt_id": "191642f5cfb38c0e44fb4783a37530bae15b8f8e"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints",
+ "cmt_id": "71035a0508c04827b91a5bfeb2c9ef374f321e65"
+ },
"CVE-2023-31436": {
"cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg",
"cmt_id": "420d014b19ff119e210ecc075ff611fe7844690c"
@@ -53409,6 +53455,10 @@
"cmt_msg": "net: rpl: fix rpl header size calculation",
"cmt_id": "9a0b96d03c59ba560b074cdb9b6233493fd5492d"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints",
+ "cmt_id": "89603f4c9154e818b9ead1abe08545a053c66ded"
+ },
"CVE-2023-31436": {
"cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg",
"cmt_id": "ce729b06dc33b01f8a6ac84da5ef54154326bf7e"
@@ -54476,6 +54526,9 @@
"CVE-2023-35788": {
"cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-33203": {
"cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition"
},
@@ -57733,6 +57786,9 @@
"CVE-2016-8655": {
"cmt_msg": "packet: fix race condition in packet_set_ring"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -59663,25 +59719,29 @@
}
},
"4.4.112": {
- "CVE-2017-13216": {
- "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl",
- "cmt_id": "b4106c55b574fe37900b02ddf89cbe4b9d971392"
- },
"CVE-2017-17741": {
"cmt_msg": "KVM: Fix stack-out-of-bounds read in write_mmio",
"cmt_id": "eb91461daa77eb0ddb4c24aa427051f3669ba1f3"
},
- "CVE-2018-5333": {
- "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op",
- "cmt_id": "44496521c6bd65a3c525b490c762875a075cf73b"
+ "CVE-2017-5753": {
+ "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]",
+ "cmt_id": "caae411b6ee026c7f43d67932e9b5008cf623293"
},
"CVE-2017-1000410": {
"cmt_msg": "Bluetooth: Prevent stack info leak from the EFS element.",
"cmt_id": "0ae86454c435e554d01c51535c3cd4312577cc74"
},
+ "CVE-2018-5333": {
+ "cmt_msg": "RDS: null pointer dereference in rds_atomic_free_op",
+ "cmt_id": "44496521c6bd65a3c525b490c762875a075cf73b"
+ },
"CVE-2018-5332": {
"cmt_msg": "RDS: Heap OOB write in rds_message_alloc_sgs()",
"cmt_id": "10d06ed9a1899fcc1ecb7a1573f0f95b92dc470c"
+ },
+ "CVE-2017-13216": {
+ "cmt_msg": "staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl",
+ "cmt_id": "b4106c55b574fe37900b02ddf89cbe4b9d971392"
}
},
"4.4.113": {
@@ -62253,9 +62313,6 @@
"CVE-2022-3061": {
"cmt_msg": "video: fbdev: i740fb: Error out if 'pixclock' equals zero"
},
- "CVE-2017-5753": {
- "cmt_msg": "x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]"
- },
"CVE-2022-3344": {
"cmt_msg": "KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use"
},
@@ -62943,6 +63000,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-2162": {
"cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
},
@@ -66057,6 +66117,9 @@
"CVE-2016-8655": {
"cmt_msg": "packet: fix race condition in packet_set_ring"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -69572,6 +69635,9 @@
"CVE-2016-8655": {
"cmt_msg": "packet: fix race condition in packet_set_ring"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -73713,6 +73779,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -76058,6 +76127,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-2162": {
"cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
},
@@ -79504,6 +79576,9 @@
"CVE-2016-8655": {
"cmt_msg": "packet: fix race condition in packet_set_ring"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -81889,6 +81964,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-2162": {
"cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
},
@@ -83970,6 +84048,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-2162": {
"cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
},
@@ -84546,6 +84627,9 @@
"CVE-2023-0179": {
"cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2022-21125": {
"cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS"
},
@@ -90324,6 +90408,9 @@
"CVE-2019-15223": {
"cmt_msg": "ALSA: line6: Assure canceling delayed work at disconnection"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2017-18552": {
"cmt_msg": "RDS: validate the requested traces user input against max supported"
},
@@ -94015,6 +94102,9 @@
"CVE-2019-15217": {
"cmt_msg": "media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -97402,6 +97492,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2020-14331": {
"cmt_msg": "vgacon: Fix for missing check in scrollback handling"
},
@@ -100332,6 +100425,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-2162": {
"cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
},
@@ -103060,6 +103156,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-2162": {
"cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
},
@@ -105690,6 +105789,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-2162": {
"cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
},
@@ -106404,6 +106506,9 @@
"CVE-2023-0179": {
"cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2022-21125": {
"cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS"
},
@@ -108118,6 +108223,9 @@
"CVE-2023-0179": {
"cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2022-21125": {
"cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS"
},
@@ -111598,6 +111706,10 @@
"cmt_msg": "net: rpl: fix rpl header size calculation",
"cmt_id": "c972851d3848647f57cd8d5625c48663410c3f96"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints",
+ "cmt_id": "b1281d008845ae9a4de9ef7510dcc1667557a67a"
+ },
"CVE-2023-31436": {
"cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg",
"cmt_id": "ddcf35deb8f2a1d9addc74b586cf4c5a1f5d6020"
@@ -112512,6 +112624,9 @@
"CVE-2023-0179": {
"cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2022-21125": {
"cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS"
},
@@ -114538,6 +114653,9 @@
"CVE-2023-0179": {
"cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits"
},
+ "CVE-2022-39190": {
+ "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
+ },
"CVE-2022-21125": {
"cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS"
},
@@ -115399,8 +115517,8 @@
"CVE-2010-4563": {
"cmt_msg": ""
},
- "CVE-2022-39190": {
- "cmt_msg": "netfilter: nf_tables: disallow binding to already bound chain"
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
},
"CVE-2023-2162": {
"cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
@@ -116118,6 +116236,9 @@
"CVE-2022-47929": {
"cmt_msg": "net: sched: disallow noqueue for qdisc classes"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2021-3864": {
"cmt_msg": ""
},
@@ -117197,6 +117318,9 @@
"CVE-2023-0179": {
"cmt_msg": "netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2022-21125": {
"cmt_msg": "x86/speculation/mmio: Reuse SRBDS mitigation for SBDS"
},
@@ -120109,6 +120233,10 @@
"cmt_msg": "net: rpl: fix rpl header size calculation",
"cmt_id": "4eee0d9d3c1117aa4a1c9f4c7f29287107e7c084"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints",
+ "cmt_id": "e722ea6dae2cc042d1bb7090e2ef8456dd5a0e57"
+ },
"CVE-2023-31436": {
"cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg",
"cmt_id": "1ffc0e8105510cb826cb9d27ed1820a1131c82d4"
@@ -122949,6 +123077,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-2162": {
"cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
},
@@ -125964,6 +126095,10 @@
}
},
"5.4.242": {
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints",
+ "cmt_id": "0f0a291cc5208dcc6436974246e8c18106e3c3d2"
+ },
"CVE-2023-31436": {
"cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg",
"cmt_id": "35dceaeab97c9e5f3fda3b10ce7f8110df0feecd"
@@ -127440,6 +127575,9 @@
"CVE-2023-2860": {
"cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data."
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-33203": {
"cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition"
},
@@ -128459,6 +128597,9 @@
"CVE-2023-2860": {
"cmt_msg": "ipv6: sr: fix out-of-bounds read when setting HMAC data."
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-33203": {
"cmt_msg": "net: qcom/emac: Fix use after free bug in emac_remove due to race condition"
},
@@ -130943,6 +131084,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-2162": {
"cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
},
@@ -133077,6 +133221,9 @@
"CVE-2023-1249": {
"cmt_msg": "coredump: Use the vma snapshot in fill_files_note"
},
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints"
+ },
"CVE-2023-2162": {
"cmt_msg": "scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress"
},
@@ -133420,5 +133567,420 @@
"cmt_msg": "x86/speculation: Restore speculation related MSRs during S3 resume"
}
}
+ },
+ "6.3": {
+ "6.3": {
+ "CVE-2023-2156": {
+ "cmt_msg": "net: rpl: fix rpl header size calculation",
+ "cmt_id": "4e006c7a6dac0ead4c1bf606000aa90a372fc253"
+ },
+ "CVE-2023-2163": {
+ "cmt_msg": "bpf: Fix incorrect verifier pruning due to missing register precision taints",
+ "cmt_id": "71b547f561247897a0a14f3082730156c0533fed"
+ },
+ "CVE-2023-31436": {
+ "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg",
+ "cmt_id": "3037933448f60f9acb705997eae62013ecb81e0d"
+ },
+ "CVE-2023-2248": {
+ "cmt_msg": "net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg",
+ "cmt_id": "3037933448f60f9acb705997eae62013ecb81e0d"
+ }
+ },
+ "6.3-rc1": {
+ "CVE-2023-33952": {
+ "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon",
+ "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8"
+ },
+ "CVE-2023-33951": {
+ "cmt_msg": "drm/vmwgfx: Do not drop the reference to the handle too soon",
+ "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8"
+ }
+ },
+ "6.3.1": {
+ "CVE-2023-1380": {
+ "cmt_msg": "wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()",
+ "cmt_id": "21bee3e649d87f78fe8aef6ae02edd3d6f310fd0"
+ },
+ "CVE-2023-2002": {
+ "cmt_msg": "bluetooth: Perform careful capability checks in hci_sock_ioctl()",
+ "cmt_id": "dd30f9da333748488d96b7cb3c5a17bbaf86b32d"
+ }
+ },
+ "6.3.2": {
+ "CVE-2023-35829": {
+ "cmt_msg": "media: rkvdec: fix use after free bug in rkvdec_remove",
+ "cmt_id": "2115e94838adc9d1e7b75043c9f26abcc910f6fb"
+ },
+ "CVE-2023-35828": {
+ "cmt_msg": "usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition",
+ "cmt_id": "231598b40a070a6bf780c0df1ff5ae3e57102900"
+ },
+ "CVE-2023-2598": {
+ "cmt_msg": "io_uring/rsrc: check for nonconsecutive pages",
+ "cmt_id": "3a0a9211d7d0138d55aecd209b05e6d4a9eec383"
+ },
+ "CVE-2023-32233": {
+ "cmt_msg": "netfilter: nf_tables: deactivate anonymous set from preparation phase",
+ "cmt_id": "f8486683ffa30456e0be4290282a44c4459a3287"
+ },
+ "CVE-2023-32254": {
+ "cmt_msg": "ksmbd: fix racy issue under cocurrent smb2 tree disconnect",
+ "cmt_id": "39366b47a59d46af15ac57beb0996268bf911f6a"
+ },
+ "CVE-2023-35824": {
+ "cmt_msg": "media: dm1105: Fix use after free bug in dm1105_remove due to race condition",
+ "cmt_id": "d730bc84064364cafdb20c6ee7fda2cd7416407a"
+ },
+ "CVE-2023-3268": {
+ "cmt_msg": "relayfs: fix out-of-bounds access in relay_file_read",
+ "cmt_id": "35ca4fb494c0c9f226fbcfa1c1688e6cc1e5062e"
+ },
+ "CVE-2023-3312": {
+ "cmt_msg": "cpufreq: qcom-cpufreq-hw: fix double IO unmap and resource release on exit",
+ "cmt_id": "d9bad836cf156ee87d577f0bd1ed01501b31a253"
+ },
+ "CVE-2023-35826": {
+ "cmt_msg": "media: cedrus: fix use after free bug in cedrus_remove due to race condition",
+ "cmt_id": "565c863bd982584aa4393f7bdb345dbccb3ad488"
+ },
+ "CVE-2023-2269": {
+ "cmt_msg": "dm ioctl: fix nested locking in table_clear() to remove deadlock concern",
+ "cmt_id": "a554e6ec3626d4c11f55d7eef8d6aa93fb211c24"
+ },
+ "CVE-2023-32250": {
+ "cmt_msg": "ksmbd: fix racy issue from session setup and logoff",
+ "cmt_id": "02f41d88f15d6b7d523e52cc3f87488f57e9265b"
+ },
+ "CVE-2023-35823": {
+ "cmt_msg": "media: saa7134: fix use after free bug in saa7134_finidev due to race condition",
+ "cmt_id": "3a60e51489a3ec61565f5bc53f726ac9ccc6083c"
+ }
+ },
+ "6.3.3": {
+ "CVE-2023-34256": {
+ "cmt_msg": "ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum",
+ "cmt_id": "be7b6374a2ee8a59c1ff5addcbe25ebc1b4efd9f"
+ }
+ },
+ "6.3.4": {
+ "CVE-2023-3090": {
+ "cmt_msg": "ipvlan:Fix out-of-bounds caused by unclear skb->cb",
+ "cmt_id": "3cd16c6a6a6b68bba02fbbc54b9906f44640ffde"
+ },
+ "CVE-2023-3141": {
+ "cmt_msg": "memstick: r592: Fix UAF bug in r592_remove due to race condition",
+ "cmt_id": "76fec5f01c9c70e11b85fdeb3f2707589c9238ca"
+ },
+ "CVE-2022-48425": {
+ "cmt_msg": "fs/ntfs3: Validate MFT flags before replaying logs",
+ "cmt_id": "e6f4b1c32d6d6047958d7700d12fed6d91f441e7"
+ }
+ },
+ "6.3.7": {
+ "CVE-2023-35788": {
+ "cmt_msg": "net/sched: flower: fix possible OOB write in fl_set_geneve_opt()",
+ "cmt_id": "900fab73a9cd3dd6a3a69f89980f8f3c9a738d5a"
+ },
+ "CVE-2023-34255": {
+ "cmt_msg": "xfs: verify buffer contents when we skip log replay",
+ "cmt_id": "69ebe82c73f4f9f4b49ed3b35ce347af20716d0a"
+ },
+ "CVE-2023-2124": {
+ "cmt_msg": "xfs: verify buffer contents when we skip log replay",
+ "cmt_id": "69ebe82c73f4f9f4b49ed3b35ce347af20716d0a"
+ },
+ "CVE-2023-3212": {
+ "cmt_msg": "gfs2: Don't deref jdesc in evict",
+ "cmt_id": "14c454764a37b194dc916c07488ce7339c82bc4f"
+ }
+ },
+ "6.3.9": {
+ "CVE-2023-3390": {
+ "cmt_msg": "netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE",
+ "cmt_id": "bdace3b1a51887211d3e49417a18fdbd315a313b"
+ }
+ },
+ "outstanding": {
+ "CVE-2023-0160": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-26556": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-26557": {
+ "cmt_msg": ""
+ },
+ "CVE-2019-20794": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-26559": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-35501": {
+ "cmt_msg": ""
+ },
+ "CVE-2018-1121": {
+ "cmt_msg": ""
+ },
+ "CVE-2019-19378": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-24503": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-24502": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-11725": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-23825": {
+ "cmt_msg": ""
+ },
+ "CVE-2023-3397": {
+ "cmt_msg": ""
+ },
+ "CVE-2021-3864": {
+ "cmt_msg": ""
+ },
+ "CVE-2019-19814": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-2209": {
+ "cmt_msg": ""
+ },
+ "CVE-2021-26934": {
+ "cmt_msg": ""
+ },
+ "CVE-2016-8660": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-15802": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-36402": {
+ "cmt_msg": ""
+ },
+ "CVE-2008-2544": {
+ "cmt_msg": ""
+ },
+ "CVE-2023-2898": {
+ "cmt_msg": ""
+ },
+ "CVE-2019-15239": {
+ "cmt_msg": "unknown"
+ },
+ "CVE-2007-3719": {
+ "cmt_msg": ""
+ },
+ "CVE-2023-20941": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-45919": {
+ "cmt_msg": ""
+ },
+ "CVE-2010-4563": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-26140": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-26143": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-26142": {
+ "cmt_msg": ""
+ },
+ "CVE-2023-26242": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-1247": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-10708": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-4543": {
+ "cmt_msg": ""
+ },
+ "CVE-2017-13693": {
+ "cmt_msg": ""
+ },
+ "CVE-2021-0399": {
+ "cmt_msg": ""
+ },
+ "CVE-2017-13694": {
+ "cmt_msg": ""
+ },
+ "CVE-2012-4542": {
+ "cmt_msg": ""
+ },
+ "CVE-2013-7445": {
+ "cmt_msg": ""
+ },
+ "CVE-2005-3660": {
+ "cmt_msg": ""
+ },
+ "CVE-2023-31085": {
+ "cmt_msg": ""
+ },
+ "CVE-2023-31084": {
+ "cmt_msg": "media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*()"
+ },
+ "CVE-2023-31083": {
+ "cmt_msg": ""
+ },
+ "CVE-2023-31082": {
+ "cmt_msg": ""
+ },
+ "CVE-2023-31081": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-38096": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-3544": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-3238": {
+ "cmt_msg": ""
+ },
+ "CVE-2008-4609": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-14304": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-0347": {
+ "cmt_msg": ""
+ },
+ "CVE-2021-3714": {
+ "cmt_msg": ""
+ },
+ "CVE-2019-12456": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-26560": {
+ "cmt_msg": ""
+ },
+ "CVE-2021-3892": {
+ "cmt_msg": ""
+ },
+ "CVE-2023-1206": {
+ "cmt_msg": ""
+ },
+ "CVE-2023-35827": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-3642": {
+ "cmt_msg": ""
+ },
+ "CVE-2011-4917": {
+ "cmt_msg": ""
+ },
+ "CVE-2019-15902": {
+ "cmt_msg": "unknown"
+ },
+ "CVE-2019-15290": {
+ "cmt_msg": ""
+ },
+ "CVE-2018-17977": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-26878": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-41848": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-1116": {
+ "cmt_msg": ""
+ },
+ "CVE-2010-5321": {
+ "cmt_msg": ""
+ },
+ "CVE-2018-12930": {
+ "cmt_msg": ""
+ },
+ "CVE-2018-12931": {
+ "cmt_msg": ""
+ },
+ "CVE-2023-33250": {
+ "cmt_msg": ""
+ },
+ "CVE-2021-39801": {
+ "cmt_msg": ""
+ },
+ "CVE-2021-39800": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-45885": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-45884": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-45887": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-45886": {
+ "cmt_msg": ""
+ },
+ "CVE-2021-3542": {
+ "cmt_msg": ""
+ },
+ "CVE-2018-12929": {
+ "cmt_msg": ""
+ },
+ "CVE-2018-12928": {
+ "cmt_msg": ""
+ },
+ "CVE-2020-25220": {
+ "cmt_msg": ""
+ },
+ "CVE-2015-2877": {
+ "cmt_msg": ""
+ },
+ "CVE-2023-1194": {
+ "cmt_msg": ""
+ },
+ "CVE-2023-1193": {
+ "cmt_msg": ""
+ },
+ "CVE-2023-1192": {
+ "cmt_msg": ""
+ },
+ "CVE-2019-16089": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-0400": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-44034": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-44033": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-44032": {
+ "cmt_msg": ""
+ },
+ "CVE-2021-3847": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-2961": {
+ "cmt_msg": ""
+ },
+ "CVE-2022-25265": {
+ "cmt_msg": ""
+ },
+ "CVE-2011-4916": {
+ "cmt_msg": ""
+ },
+ "CVE-2023-23039": {
+ "cmt_msg": ""
+ }
+ }
}
}
\ No newline at end of file
diff --git a/data/stream_fixes.json b/data/stream_fixes.json
index 744741b..c555429 100644
--- a/data/stream_fixes.json
+++ b/data/stream_fixes.json
@@ -11631,6 +11631,10 @@
"4.14": {
"cmt_id": "9298e868dddd820829f814cd25a0f28c92036af7",
"fixed_version": "4.14.14"
+ },
+ "4.4": {
+ "cmt_id": "caae411b6ee026c7f43d67932e9b5008cf623293",
+ "fixed_version": "4.4.112"
}
},
"CVE-2017-5754": {
@@ -36201,6 +36205,10 @@
"6.1": {
"cmt_id": "a8eaa9a06addbd9cb0238cb1c729921ecbb6504c",
"fixed_version": "6.1.33"
+ },
+ "6.3": {
+ "cmt_id": "e6f4b1c32d6d6047958d7700d12fed6d91f441e7",
+ "fixed_version": "6.3.4"
}
},
"CVE-2023-0045": {
@@ -36793,6 +36801,10 @@
"6.2": {
"cmt_id": "228186629ea970cc78b7d7d5f593f2d32fddf9f6",
"fixed_version": "6.2.14"
+ },
+ "6.3": {
+ "cmt_id": "21bee3e649d87f78fe8aef6ae02edd3d6f310fd0",
+ "fixed_version": "6.3.1"
}
},
"CVE-2023-1382": {
@@ -37209,6 +37221,10 @@
"6.2": {
"cmt_id": "727b3ea80f3fdda6c686806ce3579face0415c76",
"fixed_version": "6.2.14"
+ },
+ "6.3": {
+ "cmt_id": "dd30f9da333748488d96b7cb3c5a17bbaf86b32d",
+ "fixed_version": "6.3.1"
}
},
"CVE-2023-2006": {
@@ -37317,6 +37333,10 @@
"6.1": {
"cmt_id": "a2961463d74f5c86a8dda3b41c484c28ccc4c289",
"fixed_version": "6.1.33"
+ },
+ "6.3": {
+ "cmt_id": "69ebe82c73f4f9f4b49ed3b35ce347af20716d0a",
+ "fixed_version": "6.3.7"
}
},
"CVE-2023-2156": {
@@ -37335,6 +37355,10 @@
"6.2": {
"cmt_id": "191642f5cfb38c0e44fb4783a37530bae15b8f8e",
"fixed_version": "6.2.13"
+ },
+ "6.3": {
+ "cmt_id": "4e006c7a6dac0ead4c1bf606000aa90a372fc253",
+ "fixed_version": "6.3"
}
},
"CVE-2023-2162": {
@@ -37363,6 +37387,32 @@
"fixed_version": "6.1.11"
}
},
+ "CVE-2023-2163": {
+ "5.10": {
+ "cmt_id": "b1281d008845ae9a4de9ef7510dcc1667557a67a",
+ "fixed_version": "5.10.179"
+ },
+ "5.15": {
+ "cmt_id": "e722ea6dae2cc042d1bb7090e2ef8456dd5a0e57",
+ "fixed_version": "5.15.109"
+ },
+ "5.4": {
+ "cmt_id": "0f0a291cc5208dcc6436974246e8c18106e3c3d2",
+ "fixed_version": "5.4.242"
+ },
+ "6.1": {
+ "cmt_id": "89603f4c9154e818b9ead1abe08545a053c66ded",
+ "fixed_version": "6.1.26"
+ },
+ "6.2": {
+ "cmt_id": "71035a0508c04827b91a5bfeb2c9ef374f321e65",
+ "fixed_version": "6.2.13"
+ },
+ "6.3": {
+ "cmt_id": "71b547f561247897a0a14f3082730156c0533fed",
+ "fixed_version": "6.3"
+ }
+ },
"CVE-2023-2166": {
"5.15": {
"cmt_id": "c142cba37de29f740a3852f01f59876af8ae462a",
@@ -37473,6 +37523,10 @@
"6.2": {
"cmt_id": "420d014b19ff119e210ecc075ff611fe7844690c",
"fixed_version": "6.2.13"
+ },
+ "6.3": {
+ "cmt_id": "3037933448f60f9acb705997eae62013ecb81e0d",
+ "fixed_version": "6.3"
}
},
"CVE-2023-2269": {
@@ -37503,6 +37557,10 @@
"6.2": {
"cmt_id": "243093d536fe3cc78b450f1beb8d584505ea3193",
"fixed_version": "6.2.15"
+ },
+ "6.3": {
+ "cmt_id": "a554e6ec3626d4c11f55d7eef8d6aa93fb211c24",
+ "fixed_version": "6.3.2"
}
},
"CVE-2023-22996": {
@@ -37765,6 +37823,12 @@
"fixed_version": "5.4.242"
}
},
+ "CVE-2023-2598": {
+ "6.3": {
+ "cmt_id": "3a0a9211d7d0138d55aecd209b05e6d4a9eec383",
+ "fixed_version": "6.3.2"
+ }
+ },
"CVE-2023-26544": {
"5.15": {
"cmt_id": "9c8471a17f1f15b18cb7b96cba86e6f9bd6aae1c",
@@ -38143,6 +38207,10 @@
"6.1": {
"cmt_id": "610a433810b277b3b77389733c07d22e8af68de2",
"fixed_version": "6.1.30"
+ },
+ "6.3": {
+ "cmt_id": "3cd16c6a6a6b68bba02fbbc54b9906f44640ffde",
+ "fixed_version": "6.3.4"
}
},
"CVE-2023-3111": {
@@ -38191,6 +38259,10 @@
"6.1": {
"cmt_id": "9a342d4eb9fb8e52f7d1afe088a79513f3f9a9a5",
"fixed_version": "6.1.30"
+ },
+ "6.3": {
+ "cmt_id": "76fec5f01c9c70e11b85fdeb3f2707589c9238ca",
+ "fixed_version": "6.3.4"
}
},
"CVE-2023-31436": {
@@ -38221,6 +38293,10 @@
"6.2": {
"cmt_id": "420d014b19ff119e210ecc075ff611fe7844690c",
"fixed_version": "6.2.13"
+ },
+ "6.3": {
+ "cmt_id": "3037933448f60f9acb705997eae62013ecb81e0d",
+ "fixed_version": "6.3"
}
},
"CVE-2023-3159": {
@@ -38291,6 +38367,10 @@
"6.1": {
"cmt_id": "5ae4a618a1558d2b536fdd5d42e53d3e2d73870c",
"fixed_version": "6.1.33"
+ },
+ "6.3": {
+ "cmt_id": "14c454764a37b194dc916c07488ce7339c82bc4f",
+ "fixed_version": "6.3.7"
}
},
"CVE-2023-3220": {
@@ -38347,6 +38427,10 @@
"6.2": {
"cmt_id": "6b0801dcc1aa4373d28ac8ee396788d2e715c495",
"fixed_version": "6.2.15"
+ },
+ "6.3": {
+ "cmt_id": "f8486683ffa30456e0be4290282a44c4459a3287",
+ "fixed_version": "6.3.2"
}
},
"CVE-2023-32250": {
@@ -38357,6 +38441,10 @@
"6.2": {
"cmt_id": "d270631c21e68fb8016d6e231d022d7023a2df6f",
"fixed_version": "6.2.16"
+ },
+ "6.3": {
+ "cmt_id": "02f41d88f15d6b7d523e52cc3f87488f57e9265b",
+ "fixed_version": "6.3.2"
}
},
"CVE-2023-32254": {
@@ -38367,6 +38455,10 @@
"6.2": {
"cmt_id": "dc1c17716c099c90948ebb83e2170dd75a3be6b6",
"fixed_version": "6.2.15"
+ },
+ "6.3": {
+ "cmt_id": "39366b47a59d46af15ac57beb0996268bf911f6a",
+ "fixed_version": "6.3.2"
}
},
"CVE-2023-32269": {
@@ -38419,12 +38511,20 @@
"6.2": {
"cmt_id": "c86ec32b864d5247602c71986e0494d12f6c4d70",
"fixed_version": "6.2.15"
+ },
+ "6.3": {
+ "cmt_id": "35ca4fb494c0c9f226fbcfa1c1688e6cc1e5062e",
+ "fixed_version": "6.3.2"
}
},
"CVE-2023-3312": {
"6.2": {
"cmt_id": "0dac12ab5780e293b8dc24e513f5c2bf9f93c524",
"fixed_version": "6.2.15"
+ },
+ "6.3": {
+ "cmt_id": "d9bad836cf156ee87d577f0bd1ed01501b31a253",
+ "fixed_version": "6.3.2"
}
},
"CVE-2023-3317": {
@@ -38571,6 +38671,10 @@
"6.1": {
"cmt_id": "4aaa3b730d16c13cc3feaa127bfca1af201d969d",
"fixed_version": "6.1.35"
+ },
+ "6.3": {
+ "cmt_id": "bdace3b1a51887211d3e49417a18fdbd315a313b",
+ "fixed_version": "6.3.9"
}
},
"CVE-2023-33951": {
@@ -38581,6 +38685,10 @@
"6.2": {
"cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8",
"fixed_version": "6.2"
+ },
+ "6.3": {
+ "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8",
+ "fixed_version": "6.3-rc1"
}
},
"CVE-2023-33952": {
@@ -38591,6 +38699,10 @@
"6.2": {
"cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8",
"fixed_version": "6.2"
+ },
+ "6.3": {
+ "cmt_id": "a950b989ea29ab3b38ea7f6e3d2540700a3c54e8",
+ "fixed_version": "6.3-rc1"
}
},
"CVE-2023-34255": {
@@ -38609,6 +38721,10 @@
"6.1": {
"cmt_id": "a2961463d74f5c86a8dda3b41c484c28ccc4c289",
"fixed_version": "6.1.33"
+ },
+ "6.3": {
+ "cmt_id": "69ebe82c73f4f9f4b49ed3b35ce347af20716d0a",
+ "fixed_version": "6.3.7"
}
},
"CVE-2023-34256": {
@@ -38639,6 +38755,10 @@
"6.2": {
"cmt_id": "c06f5f1ecab83772b1e06ea5dcfe5ebb5927a43f",
"fixed_version": "6.2.16"
+ },
+ "6.3": {
+ "cmt_id": "be7b6374a2ee8a59c1ff5addcbe25ebc1b4efd9f",
+ "fixed_version": "6.3.3"
}
},
"CVE-2023-3439": {
@@ -38667,6 +38787,10 @@
"6.1": {
"cmt_id": "eac615ed3c6d91f1196f16f0a0599fff479cb220",
"fixed_version": "6.1.33"
+ },
+ "6.3": {
+ "cmt_id": "900fab73a9cd3dd6a3a69f89980f8f3c9a738d5a",
+ "fixed_version": "6.3.7"
}
},
"CVE-2023-35823": {
@@ -38693,6 +38817,10 @@
"6.2": {
"cmt_id": "efccd54c41887e66a03bf7af860ff5eb77c47fcf",
"fixed_version": "6.2.15"
+ },
+ "6.3": {
+ "cmt_id": "3a60e51489a3ec61565f5bc53f726ac9ccc6083c",
+ "fixed_version": "6.3.2"
}
},
"CVE-2023-35824": {
@@ -38723,6 +38851,10 @@
"6.2": {
"cmt_id": "ad998076d42b394ca22e41e91c59a6056be6098d",
"fixed_version": "6.2.15"
+ },
+ "6.3": {
+ "cmt_id": "d730bc84064364cafdb20c6ee7fda2cd7416407a",
+ "fixed_version": "6.3.2"
}
},
"CVE-2023-35826": {
@@ -38733,6 +38865,10 @@
"6.2": {
"cmt_id": "a858e35c62966761cc2bed2e4123cf68d7df546c",
"fixed_version": "6.2.15"
+ },
+ "6.3": {
+ "cmt_id": "565c863bd982584aa4393f7bdb345dbccb3ad488",
+ "fixed_version": "6.3.2"
}
},
"CVE-2023-35828": {
@@ -38759,6 +38895,10 @@
"6.2": {
"cmt_id": "1029639643c326396ce8e07a9f52ce7165c021c3",
"fixed_version": "6.2.15"
+ },
+ "6.3": {
+ "cmt_id": "231598b40a070a6bf780c0df1ff5ae3e57102900",
+ "fixed_version": "6.3.2"
}
},
"CVE-2023-35829": {
@@ -38777,6 +38917,10 @@
"6.2": {
"cmt_id": "26f55569eeb045db9fceda0a5523521c2e76d8aa",
"fixed_version": "6.2.15"
+ },
+ "6.3": {
+ "cmt_id": "2115e94838adc9d1e7b75043c9f26abcc910f6fb",
+ "fixed_version": "6.3.2"
}
}
}
\ No newline at end of file