{
    "CVE-2007-4559": {
        "cve": "CVE-2007-4559",
        "cvss_v2": 6.8,
        "cvss_v3": 9.8,
        "description": "Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2007-4559",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2019-12900": {
        "cve": "CVE-2019-12900",
        "cvss_v2": 7.5,
        "cvss_v3": 9.8,
        "description": "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2019-12900",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2019-13631": {
        "cve": "CVE-2019-13631",
        "cvss_v2": 4.6,
        "cvss_v3": 6.8,
        "description": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2019-13631",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://patchwork.kernel.org/patch/11040813/"
        ]
    },
    "CVE-2019-15505": {
        "cve": "CVE-2019-15505",
        "cvss_v2": 10,
        "cvss_v3": 9.8,
        "description": "drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2019-15505",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://lore.kernel.org/linux-media/",
            "https://lore.kernel.org/linux-media/20190821104408.w7krumcglxo6fz5q%40gofer.mess.org/",
            "https://lore.kernel.org/lkml/",
            "https://lore.kernel.org/lkml/b9b256cb-95f2-5fa1-9956-5a602a017c11%40gmail.com/"
        ]
    },
    "CVE-2019-17543": {
        "cve": "CVE-2019-17543",
        "cvss_v2": 6.8,
        "cvss_v3": 8.1,
        "description": "LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states \"only a few specific / uncommon usages of the API are at risk.\"",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2019-17543",
        "selected_patch": {
            "url": "https://github.com/lz4/lz4/pull/756",
            "patch_url": "https://github.com/lz4/lz4/pull/756.patch",
            "filename": "CVE-2019-17543-https___github_com_lz4_lz4_pull_756_patch.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2019-17543/CVE-2019-17543-https___github_com_lz4_lz4_pull_756_patch.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/lz4/lz4/pull/756",
                "patch_url": "https://github.com/lz4/lz4/pull/756.patch",
                "filename": "CVE-2019-17543-https___github_com_lz4_lz4_pull_756_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2019-17543/CVE-2019-17543-https___github_com_lz4_lz4_pull_756_patch.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/lz4/lz4/pull/760",
                "patch_url": "https://github.com/lz4/lz4/pull/760.patch",
                "filename": "CVE-2019-17543-https___github_com_lz4_lz4_pull_760_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2019-17543/CVE-2019-17543-https___github_com_lz4_lz4_pull_760_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/lz4/lz4/pull/756",
            "https://github.com/lz4/lz4/pull/760"
        ]
    },
    "CVE-2019-25162": {
        "cve": "CVE-2019-25162",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: Fix a potential use after free\n\nFree the adap structure only after we are done using it.\nThis patch just moves the put_device() down a bit to avoid the\nuse after free.\n\n[wsa: added comment to the code, added Fixes tag]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2019-25162",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87",
            "patch_url": "https://git.kernel.org/stable/p/871a1e94929a27bf6e2cd99523865c840bbc2d87",
            "filename": "CVE-2019-25162-871a1e94929a27bf6e2cd99523865c840bbc2d87.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2019-25162/CVE-2019-25162-871a1e94929a27bf6e2cd99523865c840bbc2d87.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d",
                "patch_url": "https://git.kernel.org/stable/p/12b0606000d0828630c033bf0c74c748464fe87d",
                "filename": "CVE-2019-25162-12b0606000d0828630c033bf0c74c748464fe87d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2019-25162/CVE-2019-25162-12b0606000d0828630c033bf0c74c748464fe87d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829",
                "patch_url": "https://git.kernel.org/stable/p/23a191b132cd87f746c62f3dc27da33683d85829",
                "filename": "CVE-2019-25162-23a191b132cd87f746c62f3dc27da33683d85829.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2019-25162/CVE-2019-25162-23a191b132cd87f746c62f3dc27da33683d85829.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7",
                "patch_url": "https://git.kernel.org/stable/p/35927d7509ab9bf41896b7e44f639504eae08af7",
                "filename": "CVE-2019-25162-35927d7509ab9bf41896b7e44f639504eae08af7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2019-25162/CVE-2019-25162-35927d7509ab9bf41896b7e44f639504eae08af7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9",
                "patch_url": "https://git.kernel.org/stable/p/81cb31756888bb062e92d2dca21cd629d77a46a9",
                "filename": "CVE-2019-25162-81cb31756888bb062e92d2dca21cd629d77a46a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2019-25162/CVE-2019-25162-81cb31756888bb062e92d2dca21cd629d77a46a9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87",
                "patch_url": "https://git.kernel.org/stable/p/871a1e94929a27bf6e2cd99523865c840bbc2d87",
                "filename": "CVE-2019-25162-871a1e94929a27bf6e2cd99523865c840bbc2d87.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2019-25162/CVE-2019-25162-871a1e94929a27bf6e2cd99523865c840bbc2d87.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf",
                "patch_url": "https://git.kernel.org/stable/p/e4c72c06c367758a14f227c847f9d623f1994ecf",
                "filename": "CVE-2019-25162-e4c72c06c367758a14f227c847f9d623f1994ecf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2019-25162/CVE-2019-25162-e4c72c06c367758a14f227c847f9d623f1994ecf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a",
                "patch_url": "https://git.kernel.org/stable/p/e6412ba3b6508bdf9c074d310bf4144afa6aec1a",
                "filename": "CVE-2019-25162-e6412ba3b6508bdf9c074d310bf4144afa6aec1a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2019-25162/CVE-2019-25162-e6412ba3b6508bdf9c074d310bf4144afa6aec1a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4",
                "patch_url": "https://git.kernel.org/stable/p/e8e1a046cf87c8b1363e5de835114f2779e2aaf4",
                "filename": "CVE-2019-25162-e8e1a046cf87c8b1363e5de835114f2779e2aaf4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2019-25162/CVE-2019-25162-e8e1a046cf87c8b1363e5de835114f2779e2aaf4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d",
            "https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829",
            "https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7",
            "https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9",
            "https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87",
            "https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf",
            "https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a",
            "https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4",
            "https://www.cve.org/CVERecord?id=CVE-2019-25162\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-25162\nhttps://lore.kernel.org/linux-cve-announce/2024022602-CVE-2019-25162-70ae@gregkh/"
        ]
    },
    "CVE-2020-11023": {
        "cve": "CVE-2020-11023",
        "cvss_v2": 4.3,
        "cvss_v3": 6.9,
        "description": "In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2020-11023",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2020-12762": {
        "cve": "CVE-2020-12762",
        "cvss_v2": 6.8,
        "cvss_v3": 7.8,
        "description": "json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2020-12762",
        "selected_patch": {
            "url": "https://github.com/json-c/json-c/pull/592",
            "patch_url": "https://github.com/json-c/json-c/pull/592.patch",
            "filename": "CVE-2020-12762-https___github_com_json_c_json_c_pull_592_patch.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2020-12762/CVE-2020-12762-https___github_com_json_c_json_c_pull_592_patch.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/json-c/json-c/pull/592",
                "patch_url": "https://github.com/json-c/json-c/pull/592.patch",
                "filename": "CVE-2020-12762-https___github_com_json_c_json_c_pull_592_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2020-12762/CVE-2020-12762-https___github_com_json_c_json_c_pull_592_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/json-c/json-c/pull/592"
        ]
    },
    "CVE-2020-15778": {
        "cve": "CVE-2020-15778",
        "cvss_v2": 6.8,
        "cvss_v3": 7.4,
        "description": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2020-15778",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2020-22217": {
        "cve": "CVE-2020-22217",
        "cvss_v2": null,
        "cvss_v3": 5.9,
        "description": "Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2020-22217",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2020-24736": {
        "cve": "CVE-2020-24736",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "Buffer Overflow vulnerability found in SQLite3 v.3.27.1 and before allows a local attacker to cause a denial of service via a crafted script.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2020-24736",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2020-25656": {
        "cve": "CVE-2020-25656",
        "cvss_v2": 1.9,
        "cvss_v3": 4.1,
        "description": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2020-25656",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2020-26555": {
        "cve": "CVE-2020-26555",
        "cvss_v2": 4.8,
        "cvss_v3": 5.4,
        "description": "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2020-26555",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2020-36777": {
        "cve": "CVE-2020-36777",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvbdev: Fix memory leak in dvb_media_device_free()\n\ndvb_media_device_free() is leaking memory. Free `dvbdev->adapter->conn`\nbefore setting it to NULL, as documented in include/media/media-device.h:\n\"The media_entity instance itself must be freed explicitly by the driver\nif required.\"",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2020-36777",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/43263fd43083e412311fa764cd04a727b0c6a749",
            "patch_url": "https://git.kernel.org/stable/p/43263fd43083e412311fa764cd04a727b0c6a749",
            "filename": "CVE-2020-36777-43263fd43083e412311fa764cd04a727b0c6a749.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2020-36777/CVE-2020-36777-43263fd43083e412311fa764cd04a727b0c6a749.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/06854b943e0571ccbd7ad0a529babed1a98ff275",
                "patch_url": "https://git.kernel.org/stable/p/06854b943e0571ccbd7ad0a529babed1a98ff275",
                "filename": "CVE-2020-36777-06854b943e0571ccbd7ad0a529babed1a98ff275.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2020-36777/CVE-2020-36777-06854b943e0571ccbd7ad0a529babed1a98ff275.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/32168ca1f123316848fffb85d059860adf3c409f",
                "patch_url": "https://git.kernel.org/stable/p/32168ca1f123316848fffb85d059860adf3c409f",
                "filename": "CVE-2020-36777-32168ca1f123316848fffb85d059860adf3c409f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2020-36777/CVE-2020-36777-32168ca1f123316848fffb85d059860adf3c409f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/43263fd43083e412311fa764cd04a727b0c6a749",
                "patch_url": "https://git.kernel.org/stable/p/43263fd43083e412311fa764cd04a727b0c6a749",
                "filename": "CVE-2020-36777-43263fd43083e412311fa764cd04a727b0c6a749.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2020-36777/CVE-2020-36777-43263fd43083e412311fa764cd04a727b0c6a749.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9185b3b1c143b8da409c19ac5a785aa18d67a81b",
                "patch_url": "https://git.kernel.org/stable/p/9185b3b1c143b8da409c19ac5a785aa18d67a81b",
                "filename": "CVE-2020-36777-9185b3b1c143b8da409c19ac5a785aa18d67a81b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2020-36777/CVE-2020-36777-9185b3b1c143b8da409c19ac5a785aa18d67a81b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ad15e214fcd73694ea51967d86055f47b802066",
                "patch_url": "https://git.kernel.org/stable/p/9ad15e214fcd73694ea51967d86055f47b802066",
                "filename": "CVE-2020-36777-9ad15e214fcd73694ea51967d86055f47b802066.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2020-36777/CVE-2020-36777-9ad15e214fcd73694ea51967d86055f47b802066.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bf9a40ae8d722f281a2721779595d6df1c33a0bf",
                "patch_url": "https://git.kernel.org/stable/p/bf9a40ae8d722f281a2721779595d6df1c33a0bf",
                "filename": "CVE-2020-36777-bf9a40ae8d722f281a2721779595d6df1c33a0bf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2020-36777/CVE-2020-36777-bf9a40ae8d722f281a2721779595d6df1c33a0bf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cd89f79be5d553c78202f686e8e4caa5fbe94e98",
                "patch_url": "https://git.kernel.org/stable/p/cd89f79be5d553c78202f686e8e4caa5fbe94e98",
                "filename": "CVE-2020-36777-cd89f79be5d553c78202f686e8e4caa5fbe94e98.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2020-36777/CVE-2020-36777-cd89f79be5d553c78202f686e8e4caa5fbe94e98.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cede24d13be6c2a62be6d7ceea63c2719b0cfa82",
                "patch_url": "https://git.kernel.org/stable/p/cede24d13be6c2a62be6d7ceea63c2719b0cfa82",
                "filename": "CVE-2020-36777-cede24d13be6c2a62be6d7ceea63c2719b0cfa82.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2020-36777/CVE-2020-36777-cede24d13be6c2a62be6d7ceea63c2719b0cfa82.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/06854b943e0571ccbd7ad0a529babed1a98ff275",
            "https://git.kernel.org/stable/c/32168ca1f123316848fffb85d059860adf3c409f",
            "https://git.kernel.org/stable/c/43263fd43083e412311fa764cd04a727b0c6a749",
            "https://git.kernel.org/stable/c/9185b3b1c143b8da409c19ac5a785aa18d67a81b",
            "https://git.kernel.org/stable/c/9ad15e214fcd73694ea51967d86055f47b802066",
            "https://git.kernel.org/stable/c/bf9a40ae8d722f281a2721779595d6df1c33a0bf",
            "https://git.kernel.org/stable/c/cd89f79be5d553c78202f686e8e4caa5fbe94e98",
            "https://git.kernel.org/stable/c/cede24d13be6c2a62be6d7ceea63c2719b0cfa82",
            "https://www.cve.org/CVERecord?id=CVE-2020-36777\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-36777\nhttps://lore.kernel.org/linux-cve-announce/20240227184057.2368370-2-gregkh@linuxfoundation.org/T/#u"
        ]
    },
    "CVE-2021-33631": {
        "cve": "CVE-2021-33631",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-33631",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5c099c4fdc438014d5893629e70a8ba934433ee8",
            "filename": "CVE-2021-33631-5c099c4fdc438014d5893629e70a8ba934433ee8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-33631/CVE-2021-33631-5c099c4fdc438014d5893629e70a8ba934433ee8.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5c099c4fdc438014d5893629e70a8ba934433ee8",
                "filename": "CVE-2021-33631-5c099c4fdc438014d5893629e70a8ba934433ee8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-33631/CVE-2021-33631-5c099c4fdc438014d5893629e70a8ba934433ee8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8"
        ]
    },
    "CVE-2021-3750": {
        "cve": "CVE-2021-3750",
        "cvss_v2": 4.6,
        "cvss_v3": 8.2,
        "description": "A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code within the context of the QEMU process on the host. This flaw affects QEMU versions before 7.0.0.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-3750",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2021-3753": {
        "cve": "CVE-2021-3753",
        "cvss_v2": 1.9,
        "cvss_v3": 4.7,
        "description": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-3753",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7",
            "patch_url": "https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7.patch",
            "filename": "CVE-2021-3753-2287a51ba822384834dafc1c798453375d1107c7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-3753/CVE-2021-3753-2287a51ba822384834dafc1c798453375d1107c7.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7",
                "patch_url": "https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7.patch",
                "filename": "CVE-2021-3753-2287a51ba822384834dafc1c798453375d1107c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-3753/CVE-2021-3753-2287a51ba822384834dafc1c798453375d1107c7.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7"
        ]
    },
    "CVE-2021-40153": {
        "cve": "CVE-2021-40153",
        "cvss_v2": 5.8,
        "cvss_v3": 8.1,
        "description": "squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-40153",
        "selected_patch": {
            "url": "https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646",
            "patch_url": "https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646.patch",
            "filename": "CVE-2021-40153-79b5a555058eef4e1e7ff220c344d39f8cd09646.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-40153/CVE-2021-40153-79b5a555058eef4e1e7ff220c344d39f8cd09646.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646",
                "patch_url": "https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646.patch",
                "filename": "CVE-2021-40153-79b5a555058eef4e1e7ff220c344d39f8cd09646.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-40153/CVE-2021-40153-79b5a555058eef4e1e7ff220c344d39f8cd09646.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646"
        ]
    },
    "CVE-2021-41072": {
        "cve": "CVE-2021-41072",
        "cvss_v2": 5.8,
        "cvss_v3": 8.1,
        "description": "squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-41072",
        "selected_patch": {
            "url": "https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd",
            "patch_url": "https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd.patch",
            "filename": "CVE-2021-41072-e0485802ec72996c20026da320650d8362f555bd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-41072/CVE-2021-41072-e0485802ec72996c20026da320650d8362f555bd.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd",
                "patch_url": "https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd.patch",
                "filename": "CVE-2021-41072-e0485802ec72996c20026da320650d8362f555bd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-41072/CVE-2021-41072-e0485802ec72996c20026da320650d8362f555bd.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd"
        ]
    },
    "CVE-2021-4204": {
        "cve": "CVE-2021-4204",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "An out-of-bounds (OOB) memory access flaw was found in the Linux kernel's eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-4204",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2021-43618": {
        "cve": "CVE-2021-43618",
        "cvss_v2": 5,
        "cvss_v3": 7.5,
        "description": "GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-43618",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2021-43975": {
        "cve": "CVE-2021-43975",
        "cvss_v2": 4.6,
        "cvss_v3": 6.7,
        "description": "In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-43975",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/patch/?id=b922f622592af76b57cbc566eaeccda0b31a3496",
            "filename": "CVE-2021-43975-b922f622592af76b57cbc566eaeccda0b31a3496.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-43975/CVE-2021-43975-b922f622592af76b57cbc566eaeccda0b31a3496.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/patch/?id=b922f622592af76b57cbc566eaeccda0b31a3496",
                "filename": "CVE-2021-43975-b922f622592af76b57cbc566eaeccda0b31a3496.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-43975/CVE-2021-43975-b922f622592af76b57cbc566eaeccda0b31a3496.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496",
            "https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify%40kernel.org/T/",
            "https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/",
            "https://www.cve.org/CVERecord?id=CVE-2021-43975\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-43975\nhttps://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496"
        ]
    },
    "CVE-2021-46909": {
        "cve": "CVE-2021-46909",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: footbridge: fix PCI interrupt mapping\n\nSince commit 30fdfb929e82 (\"PCI: Add a call to pci_assign_irq() in\npci_device_probe()\"), the PCI code will call the IRQ mapping function\nwhenever a PCI driver is probed. If these are marked as __init, this\ncauses an oops if a PCI driver is loaded or bound after the kernel has\ninitialised.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-46909",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1fc087fdb98d556b416c82ed6e3964a30885f47a",
            "patch_url": "https://git.kernel.org/stable/p/1fc087fdb98d556b416c82ed6e3964a30885f47a",
            "filename": "CVE-2021-46909-1fc087fdb98d556b416c82ed6e3964a30885f47a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46909/CVE-2021-46909-1fc087fdb98d556b416c82ed6e3964a30885f47a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1fc087fdb98d556b416c82ed6e3964a30885f47a",
                "patch_url": "https://git.kernel.org/stable/p/1fc087fdb98d556b416c82ed6e3964a30885f47a",
                "filename": "CVE-2021-46909-1fc087fdb98d556b416c82ed6e3964a30885f47a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46909/CVE-2021-46909-1fc087fdb98d556b416c82ed6e3964a30885f47a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2643da6aa57920d9159a1a579fb04f89a2b0d29a",
                "patch_url": "https://git.kernel.org/stable/p/2643da6aa57920d9159a1a579fb04f89a2b0d29a",
                "filename": "CVE-2021-46909-2643da6aa57920d9159a1a579fb04f89a2b0d29a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46909/CVE-2021-46909-2643da6aa57920d9159a1a579fb04f89a2b0d29a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/30e3b4f256b4e366a61658c294f6a21b8626dda7",
                "patch_url": "https://git.kernel.org/stable/p/30e3b4f256b4e366a61658c294f6a21b8626dda7",
                "filename": "CVE-2021-46909-30e3b4f256b4e366a61658c294f6a21b8626dda7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46909/CVE-2021-46909-30e3b4f256b4e366a61658c294f6a21b8626dda7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf",
                "patch_url": "https://git.kernel.org/stable/p/532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf",
                "filename": "CVE-2021-46909-532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46909/CVE-2021-46909-532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/871b569a3e67f570df9f5ba195444dc7c621293b",
                "patch_url": "https://git.kernel.org/stable/p/871b569a3e67f570df9f5ba195444dc7c621293b",
                "filename": "CVE-2021-46909-871b569a3e67f570df9f5ba195444dc7c621293b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46909/CVE-2021-46909-871b569a3e67f570df9f5ba195444dc7c621293b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c3efce8cc9807339633ee30e39882f4c8626ee1d",
                "patch_url": "https://git.kernel.org/stable/p/c3efce8cc9807339633ee30e39882f4c8626ee1d",
                "filename": "CVE-2021-46909-c3efce8cc9807339633ee30e39882f4c8626ee1d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46909/CVE-2021-46909-c3efce8cc9807339633ee30e39882f4c8626ee1d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1fc087fdb98d556b416c82ed6e3964a30885f47a",
            "https://git.kernel.org/stable/c/2643da6aa57920d9159a1a579fb04f89a2b0d29a",
            "https://git.kernel.org/stable/c/30e3b4f256b4e366a61658c294f6a21b8626dda7",
            "https://git.kernel.org/stable/c/532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf",
            "https://git.kernel.org/stable/c/871b569a3e67f570df9f5ba195444dc7c621293b",
            "https://git.kernel.org/stable/c/c3efce8cc9807339633ee30e39882f4c8626ee1d",
            "https://www.cve.org/CVERecord?id=CVE-2021-46909\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-46909\nhttps://git.kernel.org/stable/c/1fc087fdb98d556b416c82ed6e3964a30885f47a\nhttps://git.kernel.org/stable/c/2643da6aa57920d9159a1a579fb04f89a2b0d29a\nhttps://git.kernel.org/stable/c/30e3b4f256b4e366a61658c294f6a21b8626dda7\nhttps://git.kernel.org/stable/c/532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf\nhttps://git.kernel.org/stable/c/871b569a3e67f570df9f5ba195444dc7c621293b\nhttps://git.kernel.org/stable/c/c3efce8cc9807339633ee30e39882f4c8626ee1d"
        ]
    },
    "CVE-2021-46934": {
        "cve": "CVE-2021-46934",
        "cvss_v2": null,
        "cvss_v3": 3.3,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: validate user data in compat ioctl\n\nWrong user data may cause warning in i2c_transfer(), ex: zero msgs.\nUserspace should not be able to trigger warnings, so this patch adds\nvalidation checks for user data in compact ioctl to prevent reported\nwarnings",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-46934",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/bb436283e25aaf1533ce061605d23a9564447bdf",
            "patch_url": "https://git.kernel.org/stable/p/bb436283e25aaf1533ce061605d23a9564447bdf",
            "filename": "CVE-2021-46934-bb436283e25aaf1533ce061605d23a9564447bdf.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46934/CVE-2021-46934-bb436283e25aaf1533ce061605d23a9564447bdf.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/407c8708fb1bf2d4afc5337ef50635cf540c364b",
                "patch_url": "https://git.kernel.org/stable/p/407c8708fb1bf2d4afc5337ef50635cf540c364b",
                "filename": "CVE-2021-46934-407c8708fb1bf2d4afc5337ef50635cf540c364b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46934/CVE-2021-46934-407c8708fb1bf2d4afc5337ef50635cf540c364b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8d31cbab4c295d7010ebb729e9d02d0e9cece18f",
                "patch_url": "https://git.kernel.org/stable/p/8d31cbab4c295d7010ebb729e9d02d0e9cece18f",
                "filename": "CVE-2021-46934-8d31cbab4c295d7010ebb729e9d02d0e9cece18f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46934/CVE-2021-46934-8d31cbab4c295d7010ebb729e9d02d0e9cece18f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9e4a3f47eff476097e0c7faac04d1831fc70237d",
                "patch_url": "https://git.kernel.org/stable/p/9e4a3f47eff476097e0c7faac04d1831fc70237d",
                "filename": "CVE-2021-46934-9e4a3f47eff476097e0c7faac04d1831fc70237d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46934/CVE-2021-46934-9e4a3f47eff476097e0c7faac04d1831fc70237d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bb436283e25aaf1533ce061605d23a9564447bdf",
                "patch_url": "https://git.kernel.org/stable/p/bb436283e25aaf1533ce061605d23a9564447bdf",
                "filename": "CVE-2021-46934-bb436283e25aaf1533ce061605d23a9564447bdf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46934/CVE-2021-46934-bb436283e25aaf1533ce061605d23a9564447bdf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f68599581067e8a5a8901ba9eb270b4519690e26",
                "patch_url": "https://git.kernel.org/stable/p/f68599581067e8a5a8901ba9eb270b4519690e26",
                "filename": "CVE-2021-46934-f68599581067e8a5a8901ba9eb270b4519690e26.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46934/CVE-2021-46934-f68599581067e8a5a8901ba9eb270b4519690e26.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/407c8708fb1bf2d4afc5337ef50635cf540c364b",
            "https://git.kernel.org/stable/c/8d31cbab4c295d7010ebb729e9d02d0e9cece18f",
            "https://git.kernel.org/stable/c/9e4a3f47eff476097e0c7faac04d1831fc70237d",
            "https://git.kernel.org/stable/c/bb436283e25aaf1533ce061605d23a9564447bdf",
            "https://git.kernel.org/stable/c/f68599581067e8a5a8901ba9eb270b4519690e26",
            "https://www.cve.org/CVERecord?id=CVE-2021-46934\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-46934\nhttps://lore.kernel.org/linux-cve-announce/2024022750-CVE-2021-46934-79c8@gregkh/T/#u"
        ]
    },
    "CVE-2021-46939": {
        "cve": "CVE-2021-46939",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Restructure trace_clock_global() to never block\n\nIt was reported that a fix to the ring buffer recursion detection would\ncause a hung machine when performing suspend / resume testing. The\nfollowing backtrace was extracted from debugging that case:\n\nCall Trace:\n trace_clock_global+0x91/0xa0\n __rb_reserve_next+0x237/0x460\n ring_buffer_lock_reserve+0x12a/0x3f0\n trace_buffer_lock_reserve+0x10/0x50\n __trace_graph_return+0x1f/0x80\n trace_graph_return+0xb7/0xf0\n ? trace_clock_global+0x91/0xa0\n ftrace_return_to_handler+0x8b/0xf0\n ? pv_hash+0xa0/0xa0\n return_to_handler+0x15/0x30\n ? ftrace_graph_caller+0xa0/0xa0\n ? trace_clock_global+0x91/0xa0\n ? __rb_reserve_next+0x237/0x460\n ? ring_buffer_lock_reserve+0x12a/0x3f0\n ? trace_event_buffer_lock_reserve+0x3c/0x120\n ? trace_event_buffer_reserve+0x6b/0xc0\n ? trace_event_raw_event_device_pm_callback_start+0x125/0x2d0\n ? dpm_run_callback+0x3b/0xc0\n ? pm_ops_is_empty+0x50/0x50\n ? platform_get_irq_byname_optional+0x90/0x90\n ? trace_device_pm_callback_start+0x82/0xd0\n ? dpm_run_callback+0x49/0xc0\n\nWith the following RIP:\n\nRIP: 0010:native_queued_spin_lock_slowpath+0x69/0x200\n\nSince the fix to the recursion detection would allow a single recursion to\nhappen while tracing, this lead to the trace_clock_global() taking a spin\nlock and then trying to take it again:\n\nring_buffer_lock_reserve() {\n  trace_clock_global() {\n    arch_spin_lock() {\n      queued_spin_lock_slowpath() {\n        /* lock taken */\n        (something else gets traced by function graph tracer)\n          ring_buffer_lock_reserve() {\n            trace_clock_global() {\n              arch_spin_lock() {\n                queued_spin_lock_slowpath() {\n                /* DEAD LOCK! */\n\nTracing should *never* block, as it can lead to strange lockups like the\nabove.\n\nRestructure the trace_clock_global() code to instead of simply taking a\nlock to update the recorded \"prev_time\" simply use it, as two events\nhappening on two different CPUs that calls this at the same time, really\ndoesn't matter which one goes first. Use a trylock to grab the lock for\nupdating the prev_time, and if it fails, simply try again the next time.\nIf it failed to be taken, that means something else is already updating\nit.\n\n\nBugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=212761",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-46939",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2a1bd74b8186d7938bf004f5603f25b84785f63e",
            "patch_url": "https://git.kernel.org/stable/p/2a1bd74b8186d7938bf004f5603f25b84785f63e",
            "filename": "CVE-2021-46939-2a1bd74b8186d7938bf004f5603f25b84785f63e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46939/CVE-2021-46939-2a1bd74b8186d7938bf004f5603f25b84785f63e.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1fca00920327be96f3318224f502e4d5460f9545",
                "patch_url": "https://git.kernel.org/stable/p/1fca00920327be96f3318224f502e4d5460f9545",
                "filename": "CVE-2021-46939-1fca00920327be96f3318224f502e4d5460f9545.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46939/CVE-2021-46939-1fca00920327be96f3318224f502e4d5460f9545.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2a1bd74b8186d7938bf004f5603f25b84785f63e",
                "patch_url": "https://git.kernel.org/stable/p/2a1bd74b8186d7938bf004f5603f25b84785f63e",
                "filename": "CVE-2021-46939-2a1bd74b8186d7938bf004f5603f25b84785f63e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46939/CVE-2021-46939-2a1bd74b8186d7938bf004f5603f25b84785f63e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6e2418576228eeb12e7ba82edb8f9500623942ff",
                "patch_url": "https://git.kernel.org/stable/p/6e2418576228eeb12e7ba82edb8f9500623942ff",
                "filename": "CVE-2021-46939-6e2418576228eeb12e7ba82edb8f9500623942ff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46939/CVE-2021-46939-6e2418576228eeb12e7ba82edb8f9500623942ff.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/859b47a43f5a0e5b9a92b621dc6ceaad39fb5c8b",
                "patch_url": "https://git.kernel.org/stable/p/859b47a43f5a0e5b9a92b621dc6ceaad39fb5c8b",
                "filename": "CVE-2021-46939-859b47a43f5a0e5b9a92b621dc6ceaad39fb5c8b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46939/CVE-2021-46939-859b47a43f5a0e5b9a92b621dc6ceaad39fb5c8b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/91ca6f6a91f679c8645d7f3307e03ce86ad518c4",
                "patch_url": "https://git.kernel.org/stable/p/91ca6f6a91f679c8645d7f3307e03ce86ad518c4",
                "filename": "CVE-2021-46939-91ca6f6a91f679c8645d7f3307e03ce86ad518c4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46939/CVE-2021-46939-91ca6f6a91f679c8645d7f3307e03ce86ad518c4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a33614d52e97fc8077eb0b292189ca7d964cc534",
                "patch_url": "https://git.kernel.org/stable/p/a33614d52e97fc8077eb0b292189ca7d964cc534",
                "filename": "CVE-2021-46939-a33614d52e97fc8077eb0b292189ca7d964cc534.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46939/CVE-2021-46939-a33614d52e97fc8077eb0b292189ca7d964cc534.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aafe104aa9096827a429bc1358f8260ee565b7cc",
                "patch_url": "https://git.kernel.org/stable/p/aafe104aa9096827a429bc1358f8260ee565b7cc",
                "filename": "CVE-2021-46939-aafe104aa9096827a429bc1358f8260ee565b7cc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46939/CVE-2021-46939-aafe104aa9096827a429bc1358f8260ee565b7cc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c64da3294a7d59a4bf6874c664c13be892f15f44",
                "patch_url": "https://git.kernel.org/stable/p/c64da3294a7d59a4bf6874c664c13be892f15f44",
                "filename": "CVE-2021-46939-c64da3294a7d59a4bf6874c664c13be892f15f44.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46939/CVE-2021-46939-c64da3294a7d59a4bf6874c664c13be892f15f44.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d43d56dbf452ccecc1ec735cd4b6840118005d7c",
                "patch_url": "https://git.kernel.org/stable/p/d43d56dbf452ccecc1ec735cd4b6840118005d7c",
                "filename": "CVE-2021-46939-d43d56dbf452ccecc1ec735cd4b6840118005d7c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46939/CVE-2021-46939-d43d56dbf452ccecc1ec735cd4b6840118005d7c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://bugzilla.kernel.org/show_bug.cgi?id=212761",
            "https://git.kernel.org/stable/c/1fca00920327be96f3318224f502e4d5460f9545",
            "https://git.kernel.org/stable/c/2a1bd74b8186d7938bf004f5603f25b84785f63e",
            "https://git.kernel.org/stable/c/6e2418576228eeb12e7ba82edb8f9500623942ff",
            "https://git.kernel.org/stable/c/859b47a43f5a0e5b9a92b621dc6ceaad39fb5c8b",
            "https://git.kernel.org/stable/c/91ca6f6a91f679c8645d7f3307e03ce86ad518c4",
            "https://git.kernel.org/stable/c/a33614d52e97fc8077eb0b292189ca7d964cc534",
            "https://git.kernel.org/stable/c/aafe104aa9096827a429bc1358f8260ee565b7cc",
            "https://git.kernel.org/stable/c/c64da3294a7d59a4bf6874c664c13be892f15f44",
            "https://git.kernel.org/stable/c/d43d56dbf452ccecc1ec735cd4b6840118005d7c",
            "https://www.cve.org/CVERecord?id=CVE-2021-46939\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-46939\nhttps://lore.kernel.org/linux-cve-announce/20240227184057.2368370-4-gregkh@linuxfoundation.org/T/#u"
        ]
    },
    "CVE-2021-46972": {
        "cve": "CVE-2021-46972",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\novl: fix leaked dentry\n\nSince commit 6815f479ca90 (\"ovl: use only uppermetacopy state in\novl_lookup()\"), overlayfs doesn't put temporary dentry when there is a\nmetacopy error, which leads to dentry leaks when shutting down the related\nsuperblock:\n\n  overlayfs: refusing to follow metacopy origin for (/file0)\n  ...\n  BUG: Dentry (____ptrval____){i=3f33,n=file3}  still in use (1) [unmount of overlay overlay]\n  ...\n  WARNING: CPU: 1 PID: 432 at umount_check.cold+0x107/0x14d\n  CPU: 1 PID: 432 Comm: unmount-overlay Not tainted 5.12.0-rc5 #1\n  ...\n  RIP: 0010:umount_check.cold+0x107/0x14d\n  ...\n  Call Trace:\n   d_walk+0x28c/0x950\n   ? dentry_lru_isolate+0x2b0/0x2b0\n   ? __kasan_slab_free+0x12/0x20\n   do_one_tree+0x33/0x60\n   shrink_dcache_for_umount+0x78/0x1d0\n   generic_shutdown_super+0x70/0x440\n   kill_anon_super+0x3e/0x70\n   deactivate_locked_super+0xc4/0x160\n   deactivate_super+0xfa/0x140\n   cleanup_mnt+0x22e/0x370\n   __cleanup_mnt+0x1a/0x30\n   task_work_run+0x139/0x210\n   do_exit+0xb0c/0x2820\n   ? __kasan_check_read+0x1d/0x30\n   ? find_held_lock+0x35/0x160\n   ? lock_release+0x1b6/0x660\n   ? mm_update_next_owner+0xa20/0xa20\n   ? reacquire_held_locks+0x3f0/0x3f0\n   ? __sanitizer_cov_trace_const_cmp4+0x22/0x30\n   do_group_exit+0x135/0x380\n   __do_sys_exit_group.isra.0+0x20/0x20\n   __x64_sys_exit_group+0x3c/0x50\n   do_syscall_64+0x45/0x70\n   entry_SYSCALL_64_after_hwframe+0x44/0xae\n  ...\n  VFS: Busy inodes after unmount of overlay. Self-destruct in 5 seconds.  Have a nice day...\n\nThis fix has been tested with a syzkaller reproducer.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-46972",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/d587cfaef72b1b6f4b2774827123bce91f497cc8",
            "patch_url": "https://git.kernel.org/stable/p/d587cfaef72b1b6f4b2774827123bce91f497cc8",
            "filename": "CVE-2021-46972-d587cfaef72b1b6f4b2774827123bce91f497cc8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46972/CVE-2021-46972-d587cfaef72b1b6f4b2774827123bce91f497cc8.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/71d58457a8afc650da5d3292a7f7029317654d95",
                "patch_url": "https://git.kernel.org/stable/p/71d58457a8afc650da5d3292a7f7029317654d95",
                "filename": "CVE-2021-46972-71d58457a8afc650da5d3292a7f7029317654d95.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46972/CVE-2021-46972-71d58457a8afc650da5d3292a7f7029317654d95.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf3e3330bc5719fa9d658e3e2f596bde89344a94",
                "patch_url": "https://git.kernel.org/stable/p/cf3e3330bc5719fa9d658e3e2f596bde89344a94",
                "filename": "CVE-2021-46972-cf3e3330bc5719fa9d658e3e2f596bde89344a94.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46972/CVE-2021-46972-cf3e3330bc5719fa9d658e3e2f596bde89344a94.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d587cfaef72b1b6f4b2774827123bce91f497cc8",
                "patch_url": "https://git.kernel.org/stable/p/d587cfaef72b1b6f4b2774827123bce91f497cc8",
                "filename": "CVE-2021-46972-d587cfaef72b1b6f4b2774827123bce91f497cc8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46972/CVE-2021-46972-d587cfaef72b1b6f4b2774827123bce91f497cc8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eaab1d45cdb4bb0c846bd23c3d666d5b90af7b41",
                "patch_url": "https://git.kernel.org/stable/p/eaab1d45cdb4bb0c846bd23c3d666d5b90af7b41",
                "filename": "CVE-2021-46972-eaab1d45cdb4bb0c846bd23c3d666d5b90af7b41.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46972/CVE-2021-46972-eaab1d45cdb4bb0c846bd23c3d666d5b90af7b41.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/71d58457a8afc650da5d3292a7f7029317654d95",
            "https://git.kernel.org/stable/c/cf3e3330bc5719fa9d658e3e2f596bde89344a94",
            "https://git.kernel.org/stable/c/d587cfaef72b1b6f4b2774827123bce91f497cc8",
            "https://git.kernel.org/stable/c/eaab1d45cdb4bb0c846bd23c3d666d5b90af7b41",
            "https://www.cve.org/CVERecord?id=CVE-2021-46972\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-46972\nhttps://lore.kernel.org/linux-cve-announce/2024022721-CVE-2021-46972-2ec2@gregkh/T/#u"
        ]
    },
    "CVE-2021-46984": {
        "cve": "CVE-2021-46984",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nkyber: fix out of bounds access when preempted\n\n__blk_mq_sched_bio_merge() gets the ctx and hctx for the current CPU and\npasses the hctx to ->bio_merge(). kyber_bio_merge() then gets the ctx\nfor the current CPU again and uses that to get the corresponding Kyber\ncontext in the passed hctx. However, the thread may be preempted between\nthe two calls to blk_mq_get_ctx(), and the ctx returned the second time\nmay no longer correspond to the passed hctx. This \"works\" accidentally\nmost of the time, but it can cause us to read garbage if the second ctx\ncame from an hctx with more ctx's than the first one (i.e., if\nctx->index_hw[hctx->type] > hctx->nr_ctx).\n\nThis manifested as this UBSAN array index out of bounds error reported\nby Jakub:\n\nUBSAN: array-index-out-of-bounds in ../kernel/locking/qspinlock.c:130:9\nindex 13106 is out of range for type 'long unsigned int [128]'\nCall Trace:\n dump_stack+0xa4/0xe5\n ubsan_epilogue+0x5/0x40\n __ubsan_handle_out_of_bounds.cold.13+0x2a/0x34\n queued_spin_lock_slowpath+0x476/0x480\n do_raw_spin_lock+0x1c2/0x1d0\n kyber_bio_merge+0x112/0x180\n blk_mq_submit_bio+0x1f5/0x1100\n submit_bio_noacct+0x7b0/0x870\n submit_bio+0xc2/0x3a0\n btrfs_map_bio+0x4f0/0x9d0\n btrfs_submit_data_bio+0x24e/0x310\n submit_one_bio+0x7f/0xb0\n submit_extent_page+0xc4/0x440\n __extent_writepage_io+0x2b8/0x5e0\n __extent_writepage+0x28d/0x6e0\n extent_write_cache_pages+0x4d7/0x7a0\n extent_writepages+0xa2/0x110\n do_writepages+0x8f/0x180\n __writeback_single_inode+0x99/0x7f0\n writeback_sb_inodes+0x34e/0x790\n __writeback_inodes_wb+0x9e/0x120\n wb_writeback+0x4d2/0x660\n wb_workfn+0x64d/0xa10\n process_one_work+0x53a/0xa80\n worker_thread+0x69/0x5b0\n kthread+0x20b/0x240\n ret_from_fork+0x1f/0x30\n\nOnly Kyber uses the hctx, so fix it by passing the request_queue to\n->bio_merge() instead. BFQ and mq-deadline just use that, and Kyber can\nmap the queues itself to avoid the mismatch.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-46984",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0b6b4b90b74c27bea968c214d820ba4254b903a5",
            "patch_url": "https://git.kernel.org/stable/p/0b6b4b90b74c27bea968c214d820ba4254b903a5",
            "filename": "CVE-2021-46984-0b6b4b90b74c27bea968c214d820ba4254b903a5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46984/CVE-2021-46984-0b6b4b90b74c27bea968c214d820ba4254b903a5.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0b6b4b90b74c27bea968c214d820ba4254b903a5",
                "patch_url": "https://git.kernel.org/stable/p/0b6b4b90b74c27bea968c214d820ba4254b903a5",
                "filename": "CVE-2021-46984-0b6b4b90b74c27bea968c214d820ba4254b903a5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46984/CVE-2021-46984-0b6b4b90b74c27bea968c214d820ba4254b903a5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2ef3c76540c49167a0bc3d5f80d00fd1fc4586df",
                "patch_url": "https://git.kernel.org/stable/p/2ef3c76540c49167a0bc3d5f80d00fd1fc4586df",
                "filename": "CVE-2021-46984-2ef3c76540c49167a0bc3d5f80d00fd1fc4586df.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46984/CVE-2021-46984-2ef3c76540c49167a0bc3d5f80d00fd1fc4586df.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/54dbe2d2c1fcabf650c7a8b747601da355cd7f9f",
                "patch_url": "https://git.kernel.org/stable/p/54dbe2d2c1fcabf650c7a8b747601da355cd7f9f",
                "filename": "CVE-2021-46984-54dbe2d2c1fcabf650c7a8b747601da355cd7f9f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46984/CVE-2021-46984-54dbe2d2c1fcabf650c7a8b747601da355cd7f9f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a287cd84e047045f5a4d4da793414e848de627c6",
                "patch_url": "https://git.kernel.org/stable/p/a287cd84e047045f5a4d4da793414e848de627c6",
                "filename": "CVE-2021-46984-a287cd84e047045f5a4d4da793414e848de627c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46984/CVE-2021-46984-a287cd84e047045f5a4d4da793414e848de627c6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/efed9a3337e341bd0989161b97453b52567bc59d",
                "patch_url": "https://git.kernel.org/stable/p/efed9a3337e341bd0989161b97453b52567bc59d",
                "filename": "CVE-2021-46984-efed9a3337e341bd0989161b97453b52567bc59d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-46984/CVE-2021-46984-efed9a3337e341bd0989161b97453b52567bc59d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0b6b4b90b74c27bea968c214d820ba4254b903a5",
            "https://git.kernel.org/stable/c/2ef3c76540c49167a0bc3d5f80d00fd1fc4586df",
            "https://git.kernel.org/stable/c/54dbe2d2c1fcabf650c7a8b747601da355cd7f9f",
            "https://git.kernel.org/stable/c/a287cd84e047045f5a4d4da793414e848de627c6",
            "https://git.kernel.org/stable/c/efed9a3337e341bd0989161b97453b52567bc59d",
            "https://www.cve.org/CVERecord?id=CVE-2021-46984\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-46984\nhttps://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46984-e55e@gregkh/T/#u"
        ]
    },
    "CVE-2021-47013": {
        "cve": "CVE-2021-47013",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send\n\nIn emac_mac_tx_buf_send, it calls emac_tx_fill_tpd(..,skb,..).\nIf some error happens in emac_tx_fill_tpd(), the skb will be freed via\ndev_kfree_skb(skb) in error branch of emac_tx_fill_tpd().\nBut the freed skb is still used via skb->len by netdev_sent_queue(,skb->len).\n\nAs i observed that emac_tx_fill_tpd() haven't modified the value of skb->len,\nthus my patch assigns skb->len to 'len' before the possible free and\nuse 'len' instead of skb->len later.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47013",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834",
            "patch_url": "https://git.kernel.org/stable/p/16d8c44be52e3650917736d45f5904384a9da834",
            "filename": "CVE-2021-47013-16d8c44be52e3650917736d45f5904384a9da834.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47013/CVE-2021-47013-16d8c44be52e3650917736d45f5904384a9da834.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834",
                "patch_url": "https://git.kernel.org/stable/p/16d8c44be52e3650917736d45f5904384a9da834",
                "filename": "CVE-2021-47013-16d8c44be52e3650917736d45f5904384a9da834.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47013/CVE-2021-47013-16d8c44be52e3650917736d45f5904384a9da834.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d",
                "patch_url": "https://git.kernel.org/stable/p/55fcdd1258faaecca74b91b88cc0921f9edd775d",
                "filename": "CVE-2021-47013-55fcdd1258faaecca74b91b88cc0921f9edd775d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47013/CVE-2021-47013-55fcdd1258faaecca74b91b88cc0921f9edd775d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57",
                "patch_url": "https://git.kernel.org/stable/p/6d72e7c767acbbdd44ebc7d89c6690b405b32b57",
                "filename": "CVE-2021-47013-6d72e7c767acbbdd44ebc7d89c6690b405b32b57.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47013/CVE-2021-47013-6d72e7c767acbbdd44ebc7d89c6690b405b32b57.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7",
                "patch_url": "https://git.kernel.org/stable/p/8c06f34785068b87e2b560534c77c163d6c6dca7",
                "filename": "CVE-2021-47013-8c06f34785068b87e2b560534c77c163d6c6dca7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47013/CVE-2021-47013-8c06f34785068b87e2b560534c77c163d6c6dca7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d",
                "patch_url": "https://git.kernel.org/stable/p/9dc373f74097edd0e35f3393d6248eda8d1ba99d",
                "filename": "CVE-2021-47013-9dc373f74097edd0e35f3393d6248eda8d1ba99d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47013/CVE-2021-47013-9dc373f74097edd0e35f3393d6248eda8d1ba99d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955",
                "patch_url": "https://git.kernel.org/stable/p/c7f75d11fe72913d2619f97b2334b083cd7bb955",
                "filename": "CVE-2021-47013-c7f75d11fe72913d2619f97b2334b083cd7bb955.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47013/CVE-2021-47013-c7f75d11fe72913d2619f97b2334b083cd7bb955.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322",
                "patch_url": "https://git.kernel.org/stable/p/dc1b438a35773d030be0ee80d9c635c3e558a322",
                "filename": "CVE-2021-47013-dc1b438a35773d030be0ee80d9c635c3e558a322.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47013/CVE-2021-47013-dc1b438a35773d030be0ee80d9c635c3e558a322.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b",
                "patch_url": "https://git.kernel.org/stable/p/e407495ba6788a67d1bd41714158c079e340879b",
                "filename": "CVE-2021-47013-e407495ba6788a67d1bd41714158c079e340879b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47013/CVE-2021-47013-e407495ba6788a67d1bd41714158c079e340879b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834",
            "https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d",
            "https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57",
            "https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7",
            "https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d",
            "https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955",
            "https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322",
            "https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b",
            "https://www.cve.org/CVERecord?id=CVE-2021-47013\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47013\nhttps://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47013-034a@gregkh/T/#u"
        ]
    },
    "CVE-2021-47018": {
        "cve": "CVE-2021-47018",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/64: Fix the definition of the fixmap area\n\nAt the time being, the fixmap area is defined at the top of\nthe address space or just below KASAN.\n\nThis definition is not valid for PPC64.\n\nFor PPC64, use the top of the I/O space.\n\nBecause of circular dependencies, it is not possible to include\nasm/fixmap.h in asm/book3s/64/pgtable.h , so define a fixed size\nAREA at the top of the I/O space for fixmap and ensure during\nbuild that the size is big enough.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47018",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd",
            "patch_url": "https://git.kernel.org/stable/p/4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd",
            "filename": "CVE-2021-47018-4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47018/CVE-2021-47018-4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd",
                "patch_url": "https://git.kernel.org/stable/p/4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd",
                "filename": "CVE-2021-47018-4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47018/CVE-2021-47018-4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ccba66d4d2aff9a3909aa77d57ea8b7cc166f3c",
                "patch_url": "https://git.kernel.org/stable/p/9ccba66d4d2aff9a3909aa77d57ea8b7cc166f3c",
                "filename": "CVE-2021-47018-9ccba66d4d2aff9a3909aa77d57ea8b7cc166f3c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47018/CVE-2021-47018-9ccba66d4d2aff9a3909aa77d57ea8b7cc166f3c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a84df7c80bdac598d6ac9268ae578da6928883e8",
                "patch_url": "https://git.kernel.org/stable/p/a84df7c80bdac598d6ac9268ae578da6928883e8",
                "filename": "CVE-2021-47018-a84df7c80bdac598d6ac9268ae578da6928883e8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47018/CVE-2021-47018-a84df7c80bdac598d6ac9268ae578da6928883e8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/abb07dc5e8b61ab7b1dde20dd73aa01a3aeb183f",
                "patch_url": "https://git.kernel.org/stable/p/abb07dc5e8b61ab7b1dde20dd73aa01a3aeb183f",
                "filename": "CVE-2021-47018-abb07dc5e8b61ab7b1dde20dd73aa01a3aeb183f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47018/CVE-2021-47018-abb07dc5e8b61ab7b1dde20dd73aa01a3aeb183f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd",
            "https://git.kernel.org/stable/c/9ccba66d4d2aff9a3909aa77d57ea8b7cc166f3c",
            "https://git.kernel.org/stable/c/a84df7c80bdac598d6ac9268ae578da6928883e8",
            "https://git.kernel.org/stable/c/abb07dc5e8b61ab7b1dde20dd73aa01a3aeb183f",
            "https://www.cve.org/CVERecord?id=CVE-2021-47018\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47018\nhttps://git.kernel.org/stable/c/4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd\nhttps://git.kernel.org/stable/c/9ccba66d4d2aff9a3909aa77d57ea8b7cc166f3c\nhttps://git.kernel.org/stable/c/a84df7c80bdac598d6ac9268ae578da6928883e8\nhttps://git.kernel.org/stable/c/abb07dc5e8b61ab7b1dde20dd73aa01a3aeb183f"
        ]
    },
    "CVE-2021-47055": {
        "cve": "CVE-2021-47055",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: require write permissions for locking and badblock ioctls\n\nMEMLOCK, MEMUNLOCK and OTPLOCK modify protection bits. Thus require\nwrite permission. Depending on the hardware MEMLOCK might even be\nwrite-once, e.g. for SPI-NOR flashes with their WP# tied to GND. OTPLOCK\nis always write-once.\n\nMEMSETBADBLOCK modifies the bad block table.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47055",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/077259f5e777c3c8821f6b41dee709fcda27306b",
            "patch_url": "https://git.kernel.org/stable/p/077259f5e777c3c8821f6b41dee709fcda27306b",
            "filename": "CVE-2021-47055-077259f5e777c3c8821f6b41dee709fcda27306b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47055/CVE-2021-47055-077259f5e777c3c8821f6b41dee709fcda27306b.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/077259f5e777c3c8821f6b41dee709fcda27306b",
                "patch_url": "https://git.kernel.org/stable/p/077259f5e777c3c8821f6b41dee709fcda27306b",
                "filename": "CVE-2021-47055-077259f5e777c3c8821f6b41dee709fcda27306b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47055/CVE-2021-47055-077259f5e777c3c8821f6b41dee709fcda27306b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1e97743fd180981bef5f01402342bb54bf1c6366",
                "patch_url": "https://git.kernel.org/stable/p/1e97743fd180981bef5f01402342bb54bf1c6366",
                "filename": "CVE-2021-47055-1e97743fd180981bef5f01402342bb54bf1c6366.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47055/CVE-2021-47055-1e97743fd180981bef5f01402342bb54bf1c6366.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5880afefe0cb9b2d5e801816acd58bfe91a96981",
                "patch_url": "https://git.kernel.org/stable/p/5880afefe0cb9b2d5e801816acd58bfe91a96981",
                "filename": "CVE-2021-47055-5880afefe0cb9b2d5e801816acd58bfe91a96981.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47055/CVE-2021-47055-5880afefe0cb9b2d5e801816acd58bfe91a96981.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/75ed985bd6c8ac1d4e673e93ea9d96c9908c1d37",
                "patch_url": "https://git.kernel.org/stable/p/75ed985bd6c8ac1d4e673e93ea9d96c9908c1d37",
                "filename": "CVE-2021-47055-75ed985bd6c8ac1d4e673e93ea9d96c9908c1d37.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47055/CVE-2021-47055-75ed985bd6c8ac1d4e673e93ea9d96c9908c1d37.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7b6552719c0ccbbea29dde4be141da54fdb5877e",
                "patch_url": "https://git.kernel.org/stable/p/7b6552719c0ccbbea29dde4be141da54fdb5877e",
                "filename": "CVE-2021-47055-7b6552719c0ccbbea29dde4be141da54fdb5877e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47055/CVE-2021-47055-7b6552719c0ccbbea29dde4be141da54fdb5877e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9625b00cac6630479c0ff4b9fafa88bee636e1f0",
                "patch_url": "https://git.kernel.org/stable/p/9625b00cac6630479c0ff4b9fafa88bee636e1f0",
                "filename": "CVE-2021-47055-9625b00cac6630479c0ff4b9fafa88bee636e1f0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47055/CVE-2021-47055-9625b00cac6630479c0ff4b9fafa88bee636e1f0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a08799d3e8c8088640956237c183f83463c39668",
                "patch_url": "https://git.kernel.org/stable/p/a08799d3e8c8088640956237c183f83463c39668",
                "filename": "CVE-2021-47055-a08799d3e8c8088640956237c183f83463c39668.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47055/CVE-2021-47055-a08799d3e8c8088640956237c183f83463c39668.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f4d28d8b9b0e7c4ae04214b8d7e0b0466ec6bcaf",
                "patch_url": "https://git.kernel.org/stable/p/f4d28d8b9b0e7c4ae04214b8d7e0b0466ec6bcaf",
                "filename": "CVE-2021-47055-f4d28d8b9b0e7c4ae04214b8d7e0b0466ec6bcaf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47055/CVE-2021-47055-f4d28d8b9b0e7c4ae04214b8d7e0b0466ec6bcaf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f73b29819c6314c0ba8b7d5892dfb03487424bee",
                "patch_url": "https://git.kernel.org/stable/p/f73b29819c6314c0ba8b7d5892dfb03487424bee",
                "filename": "CVE-2021-47055-f73b29819c6314c0ba8b7d5892dfb03487424bee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47055/CVE-2021-47055-f73b29819c6314c0ba8b7d5892dfb03487424bee.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/077259f5e777c3c8821f6b41dee709fcda27306b",
            "https://git.kernel.org/stable/c/1e97743fd180981bef5f01402342bb54bf1c6366",
            "https://git.kernel.org/stable/c/5880afefe0cb9b2d5e801816acd58bfe91a96981",
            "https://git.kernel.org/stable/c/75ed985bd6c8ac1d4e673e93ea9d96c9908c1d37",
            "https://git.kernel.org/stable/c/7b6552719c0ccbbea29dde4be141da54fdb5877e",
            "https://git.kernel.org/stable/c/9625b00cac6630479c0ff4b9fafa88bee636e1f0",
            "https://git.kernel.org/stable/c/a08799d3e8c8088640956237c183f83463c39668",
            "https://git.kernel.org/stable/c/f4d28d8b9b0e7c4ae04214b8d7e0b0466ec6bcaf",
            "https://git.kernel.org/stable/c/f73b29819c6314c0ba8b7d5892dfb03487424bee",
            "https://www.cve.org/CVERecord?id=CVE-2021-47055\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47055\nhttps://lore.kernel.org/linux-cve-announce/2024022950-CVE-2021-47055-6927@gregkh/T/#u"
        ]
    },
    "CVE-2021-47069": {
        "cve": "CVE-2021-47069",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry\n\ndo_mq_timedreceive calls wq_sleep with a stack local address.  The\nsender (do_mq_timedsend) uses this address to later call pipelined_send.\n\nThis leads to a very hard to trigger race where a do_mq_timedreceive\ncall might return and leave do_mq_timedsend to rely on an invalid\naddress, causing the following crash:\n\n  RIP: 0010:wake_q_add_safe+0x13/0x60\n  Call Trace:\n   __x64_sys_mq_timedsend+0x2a9/0x490\n   do_syscall_64+0x80/0x680\n   entry_SYSCALL_64_after_hwframe+0x44/0xa9\n  RIP: 0033:0x7f5928e40343\n\nThe race occurs as:\n\n1. do_mq_timedreceive calls wq_sleep with the address of `struct\n   ext_wait_queue` on function stack (aliased as `ewq_addr` here) - it\n   holds a valid `struct ext_wait_queue *` as long as the stack has not\n   been overwritten.\n\n2. `ewq_addr` gets added to info->e_wait_q[RECV].list in wq_add, and\n   do_mq_timedsend receives it via wq_get_first_waiter(info, RECV) to call\n   __pipelined_op.\n\n3. Sender calls __pipelined_op::smp_store_release(&this->state,\n   STATE_READY).  Here is where the race window begins.  (`this` is\n   `ewq_addr`.)\n\n4. If the receiver wakes up now in do_mq_timedreceive::wq_sleep, it\n   will see `state == STATE_READY` and break.\n\n5. do_mq_timedreceive returns, and `ewq_addr` is no longer guaranteed\n   to be a `struct ext_wait_queue *` since it was on do_mq_timedreceive's\n   stack.  (Although the address may not get overwritten until another\n   function happens to touch it, which means it can persist around for an\n   indefinite time.)\n\n6. do_mq_timedsend::__pipelined_op() still believes `ewq_addr` is a\n   `struct ext_wait_queue *`, and uses it to find a task_struct to pass to\n   the wake_q_add_safe call.  In the lucky case where nothing has\n   overwritten `ewq_addr` yet, `ewq_addr->task` is the right task_struct.\n   In the unlucky case, __pipelined_op::wake_q_add_safe gets handed a\n   bogus address as the receiver's task_struct causing the crash.\n\ndo_mq_timedsend::__pipelined_op() should not dereference `this` after\nsetting STATE_READY, as the receiver counterpart is now free to return.\nChange __pipelined_op to call wake_q_add_safe on the receiver's\ntask_struct returned by get_task_struct, instead of dereferencing `this`\nwhich sits on the receiver's stack.\n\nAs Manfred pointed out, the race potentially also exists in\nipc/msg.c::expunge_all and ipc/sem.c::wake_up_sem_queue_prepare.  Fix\nthose in the same way.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47069",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4528c0c323085e645b8765913b4a7fd42cf49b65",
            "patch_url": "https://git.kernel.org/stable/p/4528c0c323085e645b8765913b4a7fd42cf49b65",
            "filename": "CVE-2021-47069-4528c0c323085e645b8765913b4a7fd42cf49b65.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47069/CVE-2021-47069-4528c0c323085e645b8765913b4a7fd42cf49b65.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4528c0c323085e645b8765913b4a7fd42cf49b65",
                "patch_url": "https://git.kernel.org/stable/p/4528c0c323085e645b8765913b4a7fd42cf49b65",
                "filename": "CVE-2021-47069-4528c0c323085e645b8765913b4a7fd42cf49b65.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47069/CVE-2021-47069-4528c0c323085e645b8765913b4a7fd42cf49b65.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/807fa14536b26803b858da878b643be72952a097",
                "patch_url": "https://git.kernel.org/stable/p/807fa14536b26803b858da878b643be72952a097",
                "filename": "CVE-2021-47069-807fa14536b26803b858da878b643be72952a097.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47069/CVE-2021-47069-807fa14536b26803b858da878b643be72952a097.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a11ddb37bf367e6b5239b95ca759e5389bb46048",
                "patch_url": "https://git.kernel.org/stable/p/a11ddb37bf367e6b5239b95ca759e5389bb46048",
                "filename": "CVE-2021-47069-a11ddb37bf367e6b5239b95ca759e5389bb46048.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47069/CVE-2021-47069-a11ddb37bf367e6b5239b95ca759e5389bb46048.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4528c0c323085e645b8765913b4a7fd42cf49b65",
            "https://git.kernel.org/stable/c/807fa14536b26803b858da878b643be72952a097",
            "https://git.kernel.org/stable/c/a11ddb37bf367e6b5239b95ca759e5389bb46048",
            "https://www.cve.org/CVERecord?id=CVE-2021-47069\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47069\nhttps://lore.kernel.org/linux-cve-announce/2024030141-CVE-2021-47069-5797@gregkh/T/#u"
        ]
    },
    "CVE-2021-47073": {
        "cve": "CVE-2021-47073",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios\n\ninit_dell_smbios_wmi() only registers the dell_smbios_wmi_driver on systems\nwhere the Dell WMI interface is supported. While exit_dell_smbios_wmi()\nunregisters it unconditionally, this leads to the following oops:\n\n[  175.722921] ------------[ cut here ]------------\n[  175.722925] Unexpected driver unregister!\n[  175.722939] WARNING: CPU: 1 PID: 3630 at drivers/base/driver.c:194 driver_unregister+0x38/0x40\n...\n[  175.723089] Call Trace:\n[  175.723094]  cleanup_module+0x5/0xedd [dell_smbios]\n...\n[  175.723148] ---[ end trace 064c34e1ad49509d ]---\n\nMake the unregister happen on the same condition the register happens\nto fix this.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47073",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/75cfc833da4a2111106d4c134e93e0c7f41e35e7",
            "patch_url": "https://git.kernel.org/stable/p/75cfc833da4a2111106d4c134e93e0c7f41e35e7",
            "filename": "CVE-2021-47073-75cfc833da4a2111106d4c134e93e0c7f41e35e7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47073/CVE-2021-47073-75cfc833da4a2111106d4c134e93e0c7f41e35e7.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0cf036a0d325200e6c27b90908e51195bbc557b1",
                "patch_url": "https://git.kernel.org/stable/p/0cf036a0d325200e6c27b90908e51195bbc557b1",
                "filename": "CVE-2021-47073-0cf036a0d325200e6c27b90908e51195bbc557b1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47073/CVE-2021-47073-0cf036a0d325200e6c27b90908e51195bbc557b1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3a53587423d25c87af4b4126a806a0575104b45e",
                "patch_url": "https://git.kernel.org/stable/p/3a53587423d25c87af4b4126a806a0575104b45e",
                "filename": "CVE-2021-47073-3a53587423d25c87af4b4126a806a0575104b45e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47073/CVE-2021-47073-3a53587423d25c87af4b4126a806a0575104b45e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6fa78a6b9a3beb676a010dc489c1257f7e432525",
                "patch_url": "https://git.kernel.org/stable/p/6fa78a6b9a3beb676a010dc489c1257f7e432525",
                "filename": "CVE-2021-47073-6fa78a6b9a3beb676a010dc489c1257f7e432525.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47073/CVE-2021-47073-6fa78a6b9a3beb676a010dc489c1257f7e432525.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/75cfc833da4a2111106d4c134e93e0c7f41e35e7",
                "patch_url": "https://git.kernel.org/stable/p/75cfc833da4a2111106d4c134e93e0c7f41e35e7",
                "filename": "CVE-2021-47073-75cfc833da4a2111106d4c134e93e0c7f41e35e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47073/CVE-2021-47073-75cfc833da4a2111106d4c134e93e0c7f41e35e7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8d746ea7c687bab060a2c05a35c449302406cd52",
                "patch_url": "https://git.kernel.org/stable/p/8d746ea7c687bab060a2c05a35c449302406cd52",
                "filename": "CVE-2021-47073-8d746ea7c687bab060a2c05a35c449302406cd52.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47073/CVE-2021-47073-8d746ea7c687bab060a2c05a35c449302406cd52.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0cf036a0d325200e6c27b90908e51195bbc557b1",
            "https://git.kernel.org/stable/c/3a53587423d25c87af4b4126a806a0575104b45e",
            "https://git.kernel.org/stable/c/6fa78a6b9a3beb676a010dc489c1257f7e432525",
            "https://git.kernel.org/stable/c/75cfc833da4a2111106d4c134e93e0c7f41e35e7",
            "https://git.kernel.org/stable/c/8d746ea7c687bab060a2c05a35c449302406cd52",
            "https://www.cve.org/CVERecord?id=CVE-2021-47073\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47073\nhttps://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47073-704a@gregkh/T/#u"
        ]
    },
    "CVE-2021-47097": {
        "cve": "CVE-2021-47097",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: elantech - fix stack out of bound access in elantech_change_report_id()\n\nThe array param[] in elantech_change_report_id() must be at least 3\nbytes, because elantech_read_reg_params() is calling ps2_command() with\nPSMOUSE_CMD_GETINFO, that is going to access 3 bytes from param[], but\nit's defined in the stack as an array of 2 bytes, therefore we have a\npotential stack out-of-bounds access here, also confirmed by KASAN:\n\n[    6.512374] BUG: KASAN: stack-out-of-bounds in __ps2_command+0x372/0x7e0\n[    6.512397] Read of size 1 at addr ffff8881024d77c2 by task kworker/2:1/118\n\n[    6.512416] CPU: 2 PID: 118 Comm: kworker/2:1 Not tainted 5.13.0-22-generic #22+arighi20211110\n[    6.512428] Hardware name: LENOVO 20T8000QGE/20T8000QGE, BIOS R1AET32W (1.08 ) 08/14/2020\n[    6.512436] Workqueue: events_long serio_handle_event\n[    6.512453] Call Trace:\n[    6.512462]  show_stack+0x52/0x58\n[    6.512474]  dump_stack+0xa1/0xd3\n[    6.512487]  print_address_description.constprop.0+0x1d/0x140\n[    6.512502]  ? __ps2_command+0x372/0x7e0\n[    6.512516]  __kasan_report.cold+0x7d/0x112\n[    6.512527]  ? _raw_write_lock_irq+0x20/0xd0\n[    6.512539]  ? __ps2_command+0x372/0x7e0\n[    6.512552]  kasan_report+0x3c/0x50\n[    6.512564]  __asan_load1+0x6a/0x70\n[    6.512575]  __ps2_command+0x372/0x7e0\n[    6.512589]  ? ps2_drain+0x240/0x240\n[    6.512601]  ? dev_printk_emit+0xa2/0xd3\n[    6.512612]  ? dev_vprintk_emit+0xc5/0xc5\n[    6.512621]  ? __kasan_check_write+0x14/0x20\n[    6.512634]  ? mutex_lock+0x8f/0xe0\n[    6.512643]  ? __mutex_lock_slowpath+0x20/0x20\n[    6.512655]  ps2_command+0x52/0x90\n[    6.512670]  elantech_ps2_command+0x4f/0xc0 [psmouse]\n[    6.512734]  elantech_change_report_id+0x1e6/0x256 [psmouse]\n[    6.512799]  ? elantech_report_trackpoint.constprop.0.cold+0xd/0xd [psmouse]\n[    6.512863]  ? ps2_command+0x7f/0x90\n[    6.512877]  elantech_query_info.cold+0x6bd/0x9ed [psmouse]\n[    6.512943]  ? elantech_setup_ps2+0x460/0x460 [psmouse]\n[    6.513005]  ? psmouse_reset+0x69/0xb0 [psmouse]\n[    6.513064]  ? psmouse_attr_set_helper+0x2a0/0x2a0 [psmouse]\n[    6.513122]  ? phys_pmd_init+0x30e/0x521\n[    6.513137]  elantech_init+0x8a/0x200 [psmouse]\n[    6.513200]  ? elantech_init_ps2+0xf0/0xf0 [psmouse]\n[    6.513249]  ? elantech_query_info+0x440/0x440 [psmouse]\n[    6.513296]  ? synaptics_send_cmd+0x60/0x60 [psmouse]\n[    6.513342]  ? elantech_query_info+0x440/0x440 [psmouse]\n[    6.513388]  ? psmouse_try_protocol+0x11e/0x170 [psmouse]\n[    6.513432]  psmouse_extensions+0x65d/0x6e0 [psmouse]\n[    6.513476]  ? psmouse_try_protocol+0x170/0x170 [psmouse]\n[    6.513519]  ? mutex_unlock+0x22/0x40\n[    6.513526]  ? ps2_command+0x7f/0x90\n[    6.513536]  ? psmouse_probe+0xa3/0xf0 [psmouse]\n[    6.513580]  psmouse_switch_protocol+0x27d/0x2e0 [psmouse]\n[    6.513624]  psmouse_connect+0x272/0x530 [psmouse]\n[    6.513669]  serio_driver_probe+0x55/0x70\n[    6.513679]  really_probe+0x190/0x720\n[    6.513689]  driver_probe_device+0x160/0x1f0\n[    6.513697]  device_driver_attach+0x119/0x130\n[    6.513705]  ? device_driver_attach+0x130/0x130\n[    6.513713]  __driver_attach+0xe7/0x1a0\n[    6.513720]  ? device_driver_attach+0x130/0x130\n[    6.513728]  bus_for_each_dev+0xfb/0x150\n[    6.513738]  ? subsys_dev_iter_exit+0x10/0x10\n[    6.513748]  ? _raw_write_unlock_bh+0x30/0x30\n[    6.513757]  driver_attach+0x2d/0x40\n[    6.513764]  serio_handle_event+0x199/0x3d0\n[    6.513775]  process_one_work+0x471/0x740\n[    6.513785]  worker_thread+0x2d2/0x790\n[    6.513794]  ? process_one_work+0x740/0x740\n[    6.513802]  kthread+0x1b4/0x1e0\n[    6.513809]  ? set_kthread_struct+0x80/0x80\n[    6.513816]  ret_from_fork+0x22/0x30\n\n[    6.513832] The buggy address belongs to the page:\n[    6.513838] page:00000000bc35e189 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d7\n[    6.513847] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff)\n[    6.513860] raw: 0\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47097",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1d72d9f960ccf1052a0630a68c3d358791dbdaaa",
            "patch_url": "https://git.kernel.org/stable/p/1d72d9f960ccf1052a0630a68c3d358791dbdaaa",
            "filename": "CVE-2021-47097-1d72d9f960ccf1052a0630a68c3d358791dbdaaa.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47097/CVE-2021-47097-1d72d9f960ccf1052a0630a68c3d358791dbdaaa.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1d72d9f960ccf1052a0630a68c3d358791dbdaaa",
                "patch_url": "https://git.kernel.org/stable/p/1d72d9f960ccf1052a0630a68c3d358791dbdaaa",
                "filename": "CVE-2021-47097-1d72d9f960ccf1052a0630a68c3d358791dbdaaa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47097/CVE-2021-47097-1d72d9f960ccf1052a0630a68c3d358791dbdaaa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/676c572439e58b7ee6b7ca3f1e5595382921045c",
                "patch_url": "https://git.kernel.org/stable/p/676c572439e58b7ee6b7ca3f1e5595382921045c",
                "filename": "CVE-2021-47097-676c572439e58b7ee6b7ca3f1e5595382921045c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47097/CVE-2021-47097-676c572439e58b7ee6b7ca3f1e5595382921045c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a7f95328c6f0afffdc4555f16e3bbab8bbf0d9be",
                "patch_url": "https://git.kernel.org/stable/p/a7f95328c6f0afffdc4555f16e3bbab8bbf0d9be",
                "filename": "CVE-2021-47097-a7f95328c6f0afffdc4555f16e3bbab8bbf0d9be.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47097/CVE-2021-47097-a7f95328c6f0afffdc4555f16e3bbab8bbf0d9be.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dfd5b60b5342b6b505a104e48f08ad9b9bdbbd7b",
                "patch_url": "https://git.kernel.org/stable/p/dfd5b60b5342b6b505a104e48f08ad9b9bdbbd7b",
                "filename": "CVE-2021-47097-dfd5b60b5342b6b505a104e48f08ad9b9bdbbd7b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47097/CVE-2021-47097-dfd5b60b5342b6b505a104e48f08ad9b9bdbbd7b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1d72d9f960ccf1052a0630a68c3d358791dbdaaa",
            "https://git.kernel.org/stable/c/676c572439e58b7ee6b7ca3f1e5595382921045c",
            "https://git.kernel.org/stable/c/a7f95328c6f0afffdc4555f16e3bbab8bbf0d9be",
            "https://git.kernel.org/stable/c/dfd5b60b5342b6b505a104e48f08ad9b9bdbbd7b",
            "https://www.cve.org/CVERecord?id=CVE-2021-47097\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47097\nhttps://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47097-e7f4@gregkh/T"
        ]
    },
    "CVE-2021-47101": {
        "cve": "CVE-2021-47101",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nasix: fix uninit-value in asix_mdio_read()\n\nasix_read_cmd() may read less than sizeof(smsr) bytes and in this case\nsmsr will be uninitialized.\n\nFail log:\nBUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]\nBUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497\nBUG: KMSAN: uninit-value in asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497\n asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]\n asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497\n asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47101",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/8035b1a2a37a29d8c717ef84fca8fe7278bc9f03",
            "patch_url": "https://git.kernel.org/stable/p/8035b1a2a37a29d8c717ef84fca8fe7278bc9f03",
            "filename": "CVE-2021-47101-8035b1a2a37a29d8c717ef84fca8fe7278bc9f03.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47101/CVE-2021-47101-8035b1a2a37a29d8c717ef84fca8fe7278bc9f03.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/8035b1a2a37a29d8c717ef84fca8fe7278bc9f03",
                "patch_url": "https://git.kernel.org/stable/p/8035b1a2a37a29d8c717ef84fca8fe7278bc9f03",
                "filename": "CVE-2021-47101-8035b1a2a37a29d8c717ef84fca8fe7278bc9f03.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47101/CVE-2021-47101-8035b1a2a37a29d8c717ef84fca8fe7278bc9f03.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d259f621c85949f30cc578cac813b82bb5169f56",
                "patch_url": "https://git.kernel.org/stable/p/d259f621c85949f30cc578cac813b82bb5169f56",
                "filename": "CVE-2021-47101-d259f621c85949f30cc578cac813b82bb5169f56.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47101/CVE-2021-47101-d259f621c85949f30cc578cac813b82bb5169f56.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/8035b1a2a37a29d8c717ef84fca8fe7278bc9f03",
            "https://git.kernel.org/stable/c/d259f621c85949f30cc578cac813b82bb5169f56",
            "https://www.cve.org/CVERecord?id=CVE-2021-47101\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47101\nhttps://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47101-f3fa@gregkh/T"
        ]
    },
    "CVE-2021-47118": {
        "cve": "CVE-2021-47118",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: take a reference when initializing `cad_pid`\n\nDuring boot, kernel_init_freeable() initializes `cad_pid` to the init\ntask's struct pid.  Later on, we may change `cad_pid` via a sysctl, and\nwhen this happens proc_do_cad_pid() will increment the refcount on the\nnew pid via get_pid(), and will decrement the refcount on the old pid\nvia put_pid().  As we never called get_pid() when we initialized\n`cad_pid`, we decrement a reference we never incremented, can therefore\nfree the init task's struct pid early.  As there can be dangling\nreferences to the struct pid, we can later encounter a use-after-free\n(e.g.  when delivering signals).\n\nThis was spotted when fuzzing v5.13-rc3 with Syzkaller, but seems to\nhave been around since the conversion of `cad_pid` to struct pid in\ncommit 9ec52099e4b8 (\"[PATCH] replace cad_pid by a struct pid\") from the\npre-KASAN stone age of v2.6.19.\n\nFix this by getting a reference to the init task's struct pid when we\nassign it to `cad_pid`.\n\nFull KASAN splat below.\n\n   ==================================================================\n   BUG: KASAN: use-after-free in ns_of_pid include/linux/pid.h:153 [inline]\n   BUG: KASAN: use-after-free in task_active_pid_ns+0xc0/0xc8 kernel/pid.c:509\n   Read of size 4 at addr ffff23794dda0004 by task syz-executor.0/273\n\n   CPU: 1 PID: 273 Comm: syz-executor.0 Not tainted 5.12.0-00001-g9aef892b2d15 #1\n   Hardware name: linux,dummy-virt (DT)\n   Call trace:\n    ns_of_pid include/linux/pid.h:153 [inline]\n    task_active_pid_ns+0xc0/0xc8 kernel/pid.c:509\n    do_notify_parent+0x308/0xe60 kernel/signal.c:1950\n    exit_notify kernel/exit.c:682 [inline]\n    do_exit+0x2334/0x2bd0 kernel/exit.c:845\n    do_group_exit+0x108/0x2c8 kernel/exit.c:922\n    get_signal+0x4e4/0x2a88 kernel/signal.c:2781\n    do_signal arch/arm64/kernel/signal.c:882 [inline]\n    do_notify_resume+0x300/0x970 arch/arm64/kernel/signal.c:936\n    work_pending+0xc/0x2dc\n\n   Allocated by task 0:\n    slab_post_alloc_hook+0x50/0x5c0 mm/slab.h:516\n    slab_alloc_node mm/slub.c:2907 [inline]\n    slab_alloc mm/slub.c:2915 [inline]\n    kmem_cache_alloc+0x1f4/0x4c0 mm/slub.c:2920\n    alloc_pid+0xdc/0xc00 kernel/pid.c:180\n    copy_process+0x2794/0x5e18 kernel/fork.c:2129\n    kernel_clone+0x194/0x13c8 kernel/fork.c:2500\n    kernel_thread+0xd4/0x110 kernel/fork.c:2552\n    rest_init+0x44/0x4a0 init/main.c:687\n    arch_call_rest_init+0x1c/0x28\n    start_kernel+0x520/0x554 init/main.c:1064\n    0x0\n\n   Freed by task 270:\n    slab_free_hook mm/slub.c:1562 [inline]\n    slab_free_freelist_hook+0x98/0x260 mm/slub.c:1600\n    slab_free mm/slub.c:3161 [inline]\n    kmem_cache_free+0x224/0x8e0 mm/slub.c:3177\n    put_pid.part.4+0xe0/0x1a8 kernel/pid.c:114\n    put_pid+0x30/0x48 kernel/pid.c:109\n    proc_do_cad_pid+0x190/0x1b0 kernel/sysctl.c:1401\n    proc_sys_call_handler+0x338/0x4b0 fs/proc/proc_sysctl.c:591\n    proc_sys_write+0x34/0x48 fs/proc/proc_sysctl.c:617\n    call_write_iter include/linux/fs.h:1977 [inline]\n    new_sync_write+0x3ac/0x510 fs/read_write.c:518\n    vfs_write fs/read_write.c:605 [inline]\n    vfs_write+0x9c4/0x1018 fs/read_write.c:585\n    ksys_write+0x124/0x240 fs/read_write.c:658\n    __do_sys_write fs/read_write.c:670 [inline]\n    __se_sys_write fs/read_write.c:667 [inline]\n    __arm64_sys_write+0x78/0xb0 fs/read_write.c:667\n    __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline]\n    invoke_syscall arch/arm64/kernel/syscall.c:49 [inline]\n    el0_svc_common.constprop.1+0x16c/0x388 arch/arm64/kernel/syscall.c:129\n    do_el0_svc+0xf8/0x150 arch/arm64/kernel/syscall.c:168\n    el0_svc+0x28/0x38 arch/arm64/kernel/entry-common.c:416\n    el0_sync_handler+0x134/0x180 arch/arm64/kernel/entry-common.c:432\n    el0_sync+0x154/0x180 arch/arm64/kernel/entry.S:701\n\n   The buggy address belongs to the object at ffff23794dda0000\n    which belongs to the cache pid of size 224\n   The buggy address is located 4 bytes inside of\n    224-byte region [ff\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47118",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff",
            "patch_url": "https://git.kernel.org/stable/p/2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff",
            "filename": "CVE-2021-47118-2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47118/CVE-2021-47118-2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0711f0d7050b9e07c44bc159bbc64ac0a1022c7f",
                "patch_url": "https://git.kernel.org/stable/p/0711f0d7050b9e07c44bc159bbc64ac0a1022c7f",
                "filename": "CVE-2021-47118-0711f0d7050b9e07c44bc159bbc64ac0a1022c7f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47118/CVE-2021-47118-0711f0d7050b9e07c44bc159bbc64ac0a1022c7f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff",
                "patch_url": "https://git.kernel.org/stable/p/2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff",
                "filename": "CVE-2021-47118-2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47118/CVE-2021-47118-2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4dbd8808a591b49b717862e6e0081bcf14a87788",
                "patch_url": "https://git.kernel.org/stable/p/4dbd8808a591b49b717862e6e0081bcf14a87788",
                "filename": "CVE-2021-47118-4dbd8808a591b49b717862e6e0081bcf14a87788.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47118/CVE-2021-47118-4dbd8808a591b49b717862e6e0081bcf14a87788.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7178be006d495ffb741c329012da289b62dddfe6",
                "patch_url": "https://git.kernel.org/stable/p/7178be006d495ffb741c329012da289b62dddfe6",
                "filename": "CVE-2021-47118-7178be006d495ffb741c329012da289b62dddfe6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47118/CVE-2021-47118-7178be006d495ffb741c329012da289b62dddfe6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/764c2e892d1fe895392aff62fb353fdce43bb529",
                "patch_url": "https://git.kernel.org/stable/p/764c2e892d1fe895392aff62fb353fdce43bb529",
                "filename": "CVE-2021-47118-764c2e892d1fe895392aff62fb353fdce43bb529.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47118/CVE-2021-47118-764c2e892d1fe895392aff62fb353fdce43bb529.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b8ff869f20152fbe66b6c2e2715d26a2f9897cca",
                "patch_url": "https://git.kernel.org/stable/p/b8ff869f20152fbe66b6c2e2715d26a2f9897cca",
                "filename": "CVE-2021-47118-b8ff869f20152fbe66b6c2e2715d26a2f9897cca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47118/CVE-2021-47118-b8ff869f20152fbe66b6c2e2715d26a2f9897cca.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d106f05432e60f9f62d456ef017687f5c73cb414",
                "patch_url": "https://git.kernel.org/stable/p/d106f05432e60f9f62d456ef017687f5c73cb414",
                "filename": "CVE-2021-47118-d106f05432e60f9f62d456ef017687f5c73cb414.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47118/CVE-2021-47118-d106f05432e60f9f62d456ef017687f5c73cb414.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f86c80515a8a3703e0ca2e56deb50fc2879c5ea4",
                "patch_url": "https://git.kernel.org/stable/p/f86c80515a8a3703e0ca2e56deb50fc2879c5ea4",
                "filename": "CVE-2021-47118-f86c80515a8a3703e0ca2e56deb50fc2879c5ea4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47118/CVE-2021-47118-f86c80515a8a3703e0ca2e56deb50fc2879c5ea4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0711f0d7050b9e07c44bc159bbc64ac0a1022c7f",
            "https://git.kernel.org/stable/c/2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff",
            "https://git.kernel.org/stable/c/4dbd8808a591b49b717862e6e0081bcf14a87788",
            "https://git.kernel.org/stable/c/7178be006d495ffb741c329012da289b62dddfe6",
            "https://git.kernel.org/stable/c/764c2e892d1fe895392aff62fb353fdce43bb529",
            "https://git.kernel.org/stable/c/b8ff869f20152fbe66b6c2e2715d26a2f9897cca",
            "https://git.kernel.org/stable/c/d106f05432e60f9f62d456ef017687f5c73cb414",
            "https://git.kernel.org/stable/c/f86c80515a8a3703e0ca2e56deb50fc2879c5ea4",
            "https://www.cve.org/CVERecord?id=CVE-2021-47118\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47118\nhttps://lore.kernel.org/linux-cve-announce/2024031509-CVE-2021-47118-faf2@gregkh/T/#u"
        ]
    },
    "CVE-2021-47153": {
        "cve": "CVE-2021-47153",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: i801: Don't generate an interrupt on bus reset\n\nNow that the i2c-i801 driver supports interrupts, setting the KILL bit\nin a attempt to recover from a timed out transaction triggers an\ninterrupt. Unfortunately, the interrupt handler (i801_isr) is not\nprepared for this situation and will try to process the interrupt as\nif it was signaling the end of a successful transaction. In the case\nof a block transaction, this can result in an out-of-range memory\naccess.\n\nThis condition was reproduced several times by syzbot:\nhttps://syzkaller.appspot.com/bug?extid=ed71512d469895b5b34e\nhttps://syzkaller.appspot.com/bug?extid=8c8dedc0ba9e03f6c79e\nhttps://syzkaller.appspot.com/bug?extid=c8ff0b6d6c73d81b610e\nhttps://syzkaller.appspot.com/bug?extid=33f6c360821c399d69eb\nhttps://syzkaller.appspot.com/bug?extid=be15dc0b1933f04b043a\nhttps://syzkaller.appspot.com/bug?extid=b4d3fd1dfd53e90afd79\n\nSo disable interrupts while trying to reset the bus. Interrupts will\nbe enabled again for the following transaction.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47153",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/e4d8716c3dcec47f1557024add24e1f3c09eb24b",
            "patch_url": "https://git.kernel.org/stable/p/e4d8716c3dcec47f1557024add24e1f3c09eb24b",
            "filename": "CVE-2021-47153-e4d8716c3dcec47f1557024add24e1f3c09eb24b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47153/CVE-2021-47153-e4d8716c3dcec47f1557024add24e1f3c09eb24b.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/04cc05e3716ae31b17ecdab7bc55c8170def1b8b",
                "patch_url": "https://git.kernel.org/stable/p/04cc05e3716ae31b17ecdab7bc55c8170def1b8b",
                "filename": "CVE-2021-47153-04cc05e3716ae31b17ecdab7bc55c8170def1b8b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47153/CVE-2021-47153-04cc05e3716ae31b17ecdab7bc55c8170def1b8b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3",
                "patch_url": "https://git.kernel.org/stable/p/09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3",
                "filename": "CVE-2021-47153-09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47153/CVE-2021-47153-09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1f583d3813f204449037cd2acbfc09168171362a",
                "patch_url": "https://git.kernel.org/stable/p/1f583d3813f204449037cd2acbfc09168171362a",
                "filename": "CVE-2021-47153-1f583d3813f204449037cd2acbfc09168171362a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47153/CVE-2021-47153-1f583d3813f204449037cd2acbfc09168171362a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b523feb7e8e44652f92f3babb953a976e7ccbbef",
                "patch_url": "https://git.kernel.org/stable/p/b523feb7e8e44652f92f3babb953a976e7ccbbef",
                "filename": "CVE-2021-47153-b523feb7e8e44652f92f3babb953a976e7ccbbef.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47153/CVE-2021-47153-b523feb7e8e44652f92f3babb953a976e7ccbbef.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c70e1ba2e7e65255a0ce004f531dd90dada97a8c",
                "patch_url": "https://git.kernel.org/stable/p/c70e1ba2e7e65255a0ce004f531dd90dada97a8c",
                "filename": "CVE-2021-47153-c70e1ba2e7e65255a0ce004f531dd90dada97a8c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47153/CVE-2021-47153-c70e1ba2e7e65255a0ce004f531dd90dada97a8c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dfa8929e117b0228a7765f5c3f5988a4a028f3c6",
                "patch_url": "https://git.kernel.org/stable/p/dfa8929e117b0228a7765f5c3f5988a4a028f3c6",
                "filename": "CVE-2021-47153-dfa8929e117b0228a7765f5c3f5988a4a028f3c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47153/CVE-2021-47153-dfa8929e117b0228a7765f5c3f5988a4a028f3c6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e4d8716c3dcec47f1557024add24e1f3c09eb24b",
                "patch_url": "https://git.kernel.org/stable/p/e4d8716c3dcec47f1557024add24e1f3c09eb24b",
                "filename": "CVE-2021-47153-e4d8716c3dcec47f1557024add24e1f3c09eb24b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47153/CVE-2021-47153-e4d8716c3dcec47f1557024add24e1f3c09eb24b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f9469082126cebb7337db3992d143f5e4edfe629",
                "patch_url": "https://git.kernel.org/stable/p/f9469082126cebb7337db3992d143f5e4edfe629",
                "filename": "CVE-2021-47153-f9469082126cebb7337db3992d143f5e4edfe629.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47153/CVE-2021-47153-f9469082126cebb7337db3992d143f5e4edfe629.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/04cc05e3716ae31b17ecdab7bc55c8170def1b8b",
            "https://git.kernel.org/stable/c/09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3",
            "https://git.kernel.org/stable/c/1f583d3813f204449037cd2acbfc09168171362a",
            "https://git.kernel.org/stable/c/b523feb7e8e44652f92f3babb953a976e7ccbbef",
            "https://git.kernel.org/stable/c/c70e1ba2e7e65255a0ce004f531dd90dada97a8c",
            "https://git.kernel.org/stable/c/dfa8929e117b0228a7765f5c3f5988a4a028f3c6",
            "https://git.kernel.org/stable/c/e4d8716c3dcec47f1557024add24e1f3c09eb24b",
            "https://git.kernel.org/stable/c/f9469082126cebb7337db3992d143f5e4edfe629",
            "https://www.cve.org/CVERecord?id=CVE-2021-47153\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47153\nhttps://lore.kernel.org/linux-cve-announce/2024032501-CVE-2021-47153-8c75@gregkh/T"
        ]
    },
    "CVE-2021-47171": {
        "cve": "CVE-2021-47171",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: fix memory leak in smsc75xx_bind\n\nSyzbot reported memory leak in smsc75xx_bind().\nThe problem was is non-freed memory in case of\nerrors after memory allocation.\n\nbacktrace:\n  [<ffffffff84245b62>] kmalloc include/linux/slab.h:556 [inline]\n  [<ffffffff84245b62>] kzalloc include/linux/slab.h:686 [inline]\n  [<ffffffff84245b62>] smsc75xx_bind+0x7a/0x334 drivers/net/usb/smsc75xx.c:1460\n  [<ffffffff82b5b2e6>] usbnet_probe+0x3b6/0xc30 drivers/net/usb/usbnet.c:1728",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47171",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc",
            "patch_url": "https://git.kernel.org/stable/p/9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc",
            "filename": "CVE-2021-47171-9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47171/CVE-2021-47171-9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/200dbfcad8011e50c3cec269ed7b980836eeb1fa",
                "patch_url": "https://git.kernel.org/stable/p/200dbfcad8011e50c3cec269ed7b980836eeb1fa",
                "filename": "CVE-2021-47171-200dbfcad8011e50c3cec269ed7b980836eeb1fa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47171/CVE-2021-47171-200dbfcad8011e50c3cec269ed7b980836eeb1fa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/22c840596af0c09068b6cf948616e6496e59e07f",
                "patch_url": "https://git.kernel.org/stable/p/22c840596af0c09068b6cf948616e6496e59e07f",
                "filename": "CVE-2021-47171-22c840596af0c09068b6cf948616e6496e59e07f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47171/CVE-2021-47171-22c840596af0c09068b6cf948616e6496e59e07f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/46a8b29c6306d8bbfd92b614ef65a47c900d8e70",
                "patch_url": "https://git.kernel.org/stable/p/46a8b29c6306d8bbfd92b614ef65a47c900d8e70",
                "filename": "CVE-2021-47171-46a8b29c6306d8bbfd92b614ef65a47c900d8e70.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47171/CVE-2021-47171-46a8b29c6306d8bbfd92b614ef65a47c900d8e70.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/635ac38b36255d3cfb8312cf7c471334f4d537e0",
                "patch_url": "https://git.kernel.org/stable/p/635ac38b36255d3cfb8312cf7c471334f4d537e0",
                "filename": "CVE-2021-47171-635ac38b36255d3cfb8312cf7c471334f4d537e0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47171/CVE-2021-47171-635ac38b36255d3cfb8312cf7c471334f4d537e0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/70c886ac93f87ae7214a0c69151a28a8075dd95b",
                "patch_url": "https://git.kernel.org/stable/p/70c886ac93f87ae7214a0c69151a28a8075dd95b",
                "filename": "CVE-2021-47171-70c886ac93f87ae7214a0c69151a28a8075dd95b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47171/CVE-2021-47171-70c886ac93f87ae7214a0c69151a28a8075dd95b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9e6a3eccb28779710cbbafc4f4258d92509c6d07",
                "patch_url": "https://git.kernel.org/stable/p/9e6a3eccb28779710cbbafc4f4258d92509c6d07",
                "filename": "CVE-2021-47171-9e6a3eccb28779710cbbafc4f4258d92509c6d07.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47171/CVE-2021-47171-9e6a3eccb28779710cbbafc4f4258d92509c6d07.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc",
                "patch_url": "https://git.kernel.org/stable/p/9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc",
                "filename": "CVE-2021-47171-9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47171/CVE-2021-47171-9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b95fb96e6339e34694dd578fb6bde3575b01af17",
                "patch_url": "https://git.kernel.org/stable/p/b95fb96e6339e34694dd578fb6bde3575b01af17",
                "filename": "CVE-2021-47171-b95fb96e6339e34694dd578fb6bde3575b01af17.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47171/CVE-2021-47171-b95fb96e6339e34694dd578fb6bde3575b01af17.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/200dbfcad8011e50c3cec269ed7b980836eeb1fa",
            "https://git.kernel.org/stable/c/22c840596af0c09068b6cf948616e6496e59e07f",
            "https://git.kernel.org/stable/c/46a8b29c6306d8bbfd92b614ef65a47c900d8e70",
            "https://git.kernel.org/stable/c/635ac38b36255d3cfb8312cf7c471334f4d537e0",
            "https://git.kernel.org/stable/c/70c886ac93f87ae7214a0c69151a28a8075dd95b",
            "https://git.kernel.org/stable/c/9e6a3eccb28779710cbbafc4f4258d92509c6d07",
            "https://git.kernel.org/stable/c/9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc",
            "https://git.kernel.org/stable/c/b95fb96e6339e34694dd578fb6bde3575b01af17",
            "https://www.cve.org/CVERecord?id=CVE-2021-47171\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47171\nhttps://lore.kernel.org/linux-cve-announce/2024032536-CVE-2021-47171-f223@gregkh/T"
        ]
    },
    "CVE-2021-47185": {
        "cve": "CVE-2021-47185",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: tty_buffer: Fix the softlockup issue in flush_to_ldisc\n\nWhen running ltp testcase(ltp/testcases/kernel/pty/pty04.c) with arm64, there is a soft lockup,\nwhich look like this one:\n\n  Workqueue: events_unbound flush_to_ldisc\n  Call trace:\n   dump_backtrace+0x0/0x1ec\n   show_stack+0x24/0x30\n   dump_stack+0xd0/0x128\n   panic+0x15c/0x374\n   watchdog_timer_fn+0x2b8/0x304\n   __run_hrtimer+0x88/0x2c0\n   __hrtimer_run_queues+0xa4/0x120\n   hrtimer_interrupt+0xfc/0x270\n   arch_timer_handler_phys+0x40/0x50\n   handle_percpu_devid_irq+0x94/0x220\n   __handle_domain_irq+0x88/0xf0\n   gic_handle_irq+0x84/0xfc\n   el1_irq+0xc8/0x180\n   slip_unesc+0x80/0x214 [slip]\n   tty_ldisc_receive_buf+0x64/0x80\n   tty_port_default_receive_buf+0x50/0x90\n   flush_to_ldisc+0xbc/0x110\n   process_one_work+0x1d4/0x4b0\n   worker_thread+0x180/0x430\n   kthread+0x11c/0x120\n\nIn the testcase pty04, The first process call the write syscall to send\ndata to the pty master. At the same time, the workqueue will do the\nflush_to_ldisc to pop data in a loop until there is no more data left.\nWhen the sender and workqueue running in different core, the sender sends\ndata fastly in full time which will result in workqueue doing work in loop\nfor a long time and occuring softlockup in flush_to_ldisc with kernel\nconfigured without preempt. So I add need_resched check and cond_resched\nin the flush_to_ldisc loop to avoid it.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47185",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0380f643f3a7a61b0845cdc738959c2ad5735d61",
            "patch_url": "https://git.kernel.org/stable/p/0380f643f3a7a61b0845cdc738959c2ad5735d61",
            "filename": "CVE-2021-47185-0380f643f3a7a61b0845cdc738959c2ad5735d61.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47185/CVE-2021-47185-0380f643f3a7a61b0845cdc738959c2ad5735d61.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0380f643f3a7a61b0845cdc738959c2ad5735d61",
                "patch_url": "https://git.kernel.org/stable/p/0380f643f3a7a61b0845cdc738959c2ad5735d61",
                "filename": "CVE-2021-47185-0380f643f3a7a61b0845cdc738959c2ad5735d61.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47185/CVE-2021-47185-0380f643f3a7a61b0845cdc738959c2ad5735d61.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3968ddcf05fb4b9409cd1859feb06a5b0550a1c1",
                "patch_url": "https://git.kernel.org/stable/p/3968ddcf05fb4b9409cd1859feb06a5b0550a1c1",
                "filename": "CVE-2021-47185-3968ddcf05fb4b9409cd1859feb06a5b0550a1c1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47185/CVE-2021-47185-3968ddcf05fb4b9409cd1859feb06a5b0550a1c1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4c1623651a0936ee197859824cdae6ebbd04d3ed",
                "patch_url": "https://git.kernel.org/stable/p/4c1623651a0936ee197859824cdae6ebbd04d3ed",
                "filename": "CVE-2021-47185-4c1623651a0936ee197859824cdae6ebbd04d3ed.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47185/CVE-2021-47185-4c1623651a0936ee197859824cdae6ebbd04d3ed.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f300f47dbcf9c3d4b2ea76c8554c8f360400725",
                "patch_url": "https://git.kernel.org/stable/p/4f300f47dbcf9c3d4b2ea76c8554c8f360400725",
                "filename": "CVE-2021-47185-4f300f47dbcf9c3d4b2ea76c8554c8f360400725.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47185/CVE-2021-47185-4f300f47dbcf9c3d4b2ea76c8554c8f360400725.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5c34486f04700f1ba04907231dce0cc2705c2d7d",
                "patch_url": "https://git.kernel.org/stable/p/5c34486f04700f1ba04907231dce0cc2705c2d7d",
                "filename": "CVE-2021-47185-5c34486f04700f1ba04907231dce0cc2705c2d7d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47185/CVE-2021-47185-5c34486f04700f1ba04907231dce0cc2705c2d7d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/77e9fed33056f2a88eba9dd4d2d5412f0c7d1f41",
                "patch_url": "https://git.kernel.org/stable/p/77e9fed33056f2a88eba9dd4d2d5412f0c7d1f41",
                "filename": "CVE-2021-47185-77e9fed33056f2a88eba9dd4d2d5412f0c7d1f41.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47185/CVE-2021-47185-77e9fed33056f2a88eba9dd4d2d5412f0c7d1f41.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b1ffc16ec05ae40d82b6e373322d62e9d6b54fbc",
                "patch_url": "https://git.kernel.org/stable/p/b1ffc16ec05ae40d82b6e373322d62e9d6b54fbc",
                "filename": "CVE-2021-47185-b1ffc16ec05ae40d82b6e373322d62e9d6b54fbc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47185/CVE-2021-47185-b1ffc16ec05ae40d82b6e373322d62e9d6b54fbc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d491c84df5c469dd9621863b6a770b3428137063",
                "patch_url": "https://git.kernel.org/stable/p/d491c84df5c469dd9621863b6a770b3428137063",
                "filename": "CVE-2021-47185-d491c84df5c469dd9621863b6a770b3428137063.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47185/CVE-2021-47185-d491c84df5c469dd9621863b6a770b3428137063.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0380f643f3a7a61b0845cdc738959c2ad5735d61",
            "https://git.kernel.org/stable/c/3968ddcf05fb4b9409cd1859feb06a5b0550a1c1",
            "https://git.kernel.org/stable/c/4c1623651a0936ee197859824cdae6ebbd04d3ed",
            "https://git.kernel.org/stable/c/4f300f47dbcf9c3d4b2ea76c8554c8f360400725",
            "https://git.kernel.org/stable/c/5c34486f04700f1ba04907231dce0cc2705c2d7d",
            "https://git.kernel.org/stable/c/77e9fed33056f2a88eba9dd4d2d5412f0c7d1f41",
            "https://git.kernel.org/stable/c/b1ffc16ec05ae40d82b6e373322d62e9d6b54fbc",
            "https://git.kernel.org/stable/c/d491c84df5c469dd9621863b6a770b3428137063",
            "https://www.cve.org/CVERecord?id=CVE-2021-47185\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47185\nhttps://lore.kernel.org/linux-cve-announce/2024041033-CVE-2021-47185-c363@gregkh/T"
        ]
    },
    "CVE-2021-47236": {
        "cve": "CVE-2021-47236",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: cdc_eem: fix tx fixup skb leak\n\nwhen usbnet transmit a skb, eem fixup it in eem_tx_fixup(),\nif skb_copy_expand() failed, it return NULL,\nusbnet_start_xmit() will have no chance to free original skb.\n\nfix it by free orginal skb in eem_tx_fixup() first,\nthen check skb clone status, if failed, return NULL to usbnet.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47236",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/f4e6a7f19c82f39b1803e91c54718f0d7143767d",
            "patch_url": "https://git.kernel.org/stable/p/f4e6a7f19c82f39b1803e91c54718f0d7143767d",
            "filename": "CVE-2021-47236-f4e6a7f19c82f39b1803e91c54718f0d7143767d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47236/CVE-2021-47236-f4e6a7f19c82f39b1803e91c54718f0d7143767d.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/05b2b9f7d24b5663d9b47427fe1555bdafd3ea02",
                "patch_url": "https://git.kernel.org/stable/p/05b2b9f7d24b5663d9b47427fe1555bdafd3ea02",
                "filename": "CVE-2021-47236-05b2b9f7d24b5663d9b47427fe1555bdafd3ea02.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47236/CVE-2021-47236-05b2b9f7d24b5663d9b47427fe1555bdafd3ea02.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/14184ec5c958b589ba934da7363a2877879204df",
                "patch_url": "https://git.kernel.org/stable/p/14184ec5c958b589ba934da7363a2877879204df",
                "filename": "CVE-2021-47236-14184ec5c958b589ba934da7363a2877879204df.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47236/CVE-2021-47236-14184ec5c958b589ba934da7363a2877879204df.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1bcacd6088d61c0ac6a990d87975600a81f3247e",
                "patch_url": "https://git.kernel.org/stable/p/1bcacd6088d61c0ac6a990d87975600a81f3247e",
                "filename": "CVE-2021-47236-1bcacd6088d61c0ac6a990d87975600a81f3247e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47236/CVE-2021-47236-1bcacd6088d61c0ac6a990d87975600a81f3247e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/81de2ed06df8b5451e050fe6a318af3263dbff3f",
                "patch_url": "https://git.kernel.org/stable/p/81de2ed06df8b5451e050fe6a318af3263dbff3f",
                "filename": "CVE-2021-47236-81de2ed06df8b5451e050fe6a318af3263dbff3f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47236/CVE-2021-47236-81de2ed06df8b5451e050fe6a318af3263dbff3f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88",
                "patch_url": "https://git.kernel.org/stable/p/b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88",
                "filename": "CVE-2021-47236-b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47236/CVE-2021-47236-b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7",
                "patch_url": "https://git.kernel.org/stable/p/c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7",
                "filename": "CVE-2021-47236-c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47236/CVE-2021-47236-c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f12554b0ff639e74612cc01b3b4a049e098d2d65",
                "patch_url": "https://git.kernel.org/stable/p/f12554b0ff639e74612cc01b3b4a049e098d2d65",
                "filename": "CVE-2021-47236-f12554b0ff639e74612cc01b3b4a049e098d2d65.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47236/CVE-2021-47236-f12554b0ff639e74612cc01b3b4a049e098d2d65.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f4e6a7f19c82f39b1803e91c54718f0d7143767d",
                "patch_url": "https://git.kernel.org/stable/p/f4e6a7f19c82f39b1803e91c54718f0d7143767d",
                "filename": "CVE-2021-47236-f4e6a7f19c82f39b1803e91c54718f0d7143767d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47236/CVE-2021-47236-f4e6a7f19c82f39b1803e91c54718f0d7143767d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/05b2b9f7d24b5663d9b47427fe1555bdafd3ea02",
            "https://git.kernel.org/stable/c/14184ec5c958b589ba934da7363a2877879204df",
            "https://git.kernel.org/stable/c/1bcacd6088d61c0ac6a990d87975600a81f3247e",
            "https://git.kernel.org/stable/c/81de2ed06df8b5451e050fe6a318af3263dbff3f",
            "https://git.kernel.org/stable/c/b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88",
            "https://git.kernel.org/stable/c/c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7",
            "https://git.kernel.org/stable/c/f12554b0ff639e74612cc01b3b4a049e098d2d65",
            "https://git.kernel.org/stable/c/f4e6a7f19c82f39b1803e91c54718f0d7143767d"
        ]
    },
    "CVE-2021-47257": {
        "cve": "CVE-2021-47257",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ieee802154: fix null deref in parse dev addr\n\nFix a logic error that could result in a null deref if the user sets\nthe mode incorrectly for the given addr type.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47257",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9fdd04918a452980631ecc499317881c1d120b70",
            "patch_url": "https://git.kernel.org/stable/p/9fdd04918a452980631ecc499317881c1d120b70",
            "filename": "CVE-2021-47257-9fdd04918a452980631ecc499317881c1d120b70.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47257/CVE-2021-47257-9fdd04918a452980631ecc499317881c1d120b70.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1f95741981c899c4724647291fec5faa3c777185",
                "patch_url": "https://git.kernel.org/stable/p/1f95741981c899c4724647291fec5faa3c777185",
                "filename": "CVE-2021-47257-1f95741981c899c4724647291fec5faa3c777185.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47257/CVE-2021-47257-1f95741981c899c4724647291fec5faa3c777185.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5f728ec65485625e30f46e5b4917ff023ad29ea0",
                "patch_url": "https://git.kernel.org/stable/p/5f728ec65485625e30f46e5b4917ff023ad29ea0",
                "filename": "CVE-2021-47257-5f728ec65485625e30f46e5b4917ff023ad29ea0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47257/CVE-2021-47257-5f728ec65485625e30f46e5b4917ff023ad29ea0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9fdd04918a452980631ecc499317881c1d120b70",
                "patch_url": "https://git.kernel.org/stable/p/9fdd04918a452980631ecc499317881c1d120b70",
                "filename": "CVE-2021-47257-9fdd04918a452980631ecc499317881c1d120b70.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47257/CVE-2021-47257-9fdd04918a452980631ecc499317881c1d120b70.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c6998ccfefa652bac3f9b236821e392af43efa1e",
                "patch_url": "https://git.kernel.org/stable/p/c6998ccfefa652bac3f9b236821e392af43efa1e",
                "filename": "CVE-2021-47257-c6998ccfefa652bac3f9b236821e392af43efa1e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47257/CVE-2021-47257-c6998ccfefa652bac3f9b236821e392af43efa1e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c7836de2cadd88bc2f20f2c5a3d4ef4c73aef627",
                "patch_url": "https://git.kernel.org/stable/p/c7836de2cadd88bc2f20f2c5a3d4ef4c73aef627",
                "filename": "CVE-2021-47257-c7836de2cadd88bc2f20f2c5a3d4ef4c73aef627.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47257/CVE-2021-47257-c7836de2cadd88bc2f20f2c5a3d4ef4c73aef627.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d0f47648b87b6d5f204cb7f3cbce6d36dab85a67",
                "patch_url": "https://git.kernel.org/stable/p/d0f47648b87b6d5f204cb7f3cbce6d36dab85a67",
                "filename": "CVE-2021-47257-d0f47648b87b6d5f204cb7f3cbce6d36dab85a67.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47257/CVE-2021-47257-d0f47648b87b6d5f204cb7f3cbce6d36dab85a67.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fdd51e34f45311ab6e48d2147cbc2904731b9993",
                "patch_url": "https://git.kernel.org/stable/p/fdd51e34f45311ab6e48d2147cbc2904731b9993",
                "filename": "CVE-2021-47257-fdd51e34f45311ab6e48d2147cbc2904731b9993.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47257/CVE-2021-47257-fdd51e34f45311ab6e48d2147cbc2904731b9993.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1f95741981c899c4724647291fec5faa3c777185",
            "https://git.kernel.org/stable/c/5f728ec65485625e30f46e5b4917ff023ad29ea0",
            "https://git.kernel.org/stable/c/9fdd04918a452980631ecc499317881c1d120b70",
            "https://git.kernel.org/stable/c/c6998ccfefa652bac3f9b236821e392af43efa1e",
            "https://git.kernel.org/stable/c/c7836de2cadd88bc2f20f2c5a3d4ef4c73aef627",
            "https://git.kernel.org/stable/c/d0f47648b87b6d5f204cb7f3cbce6d36dab85a67",
            "https://git.kernel.org/stable/c/fdd51e34f45311ab6e48d2147cbc2904731b9993",
            "https://www.cve.org/CVERecord?id=CVE-2021-47257\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47257\nhttps://lore.kernel.org/linux-cve-announce/2024052146-CVE-2021-47257-1d1c@gregkh/T"
        ]
    },
    "CVE-2021-47284": {
        "cve": "CVE-2021-47284",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: mISDN: netjet: Fix crash in nj_probe:\n\n'nj_setup' in netjet.c might fail with -EIO and in this case\n'card->irq' is initialized and is bigger than zero. A subsequent call to\n'nj_release' will free the irq that has not been requested.\n\nFix this bug by deleting the previous assignment to 'card->irq' and just\nkeep the assignment before 'request_irq'.\n\nThe KASAN's log reveals it:\n\n[    3.354615 ] WARNING: CPU: 0 PID: 1 at kernel/irq/manage.c:1826\nfree_irq+0x100/0x480\n[    3.355112 ] Modules linked in:\n[    3.355310 ] CPU: 0 PID: 1 Comm: swapper/0 Not tainted\n5.13.0-rc1-00144-g25a1298726e #13\n[    3.355816 ] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\nrel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[    3.356552 ] RIP: 0010:free_irq+0x100/0x480\n[    3.356820 ] Code: 6e 08 74 6f 4d 89 f4 e8 5e ac 09 00 4d 8b 74 24 18\n4d 85 f6 75 e3 e8 4f ac 09 00 8b 75 c8 48 c7 c7 78 c1 2e 85 e8 e0 cf f5\nff <0f> 0b 48 8b 75 c0 4c 89 ff e8 72 33 0b 03 48 8b 43 40 4c 8b a0 80\n[    3.358012 ] RSP: 0000:ffffc90000017b48 EFLAGS: 00010082\n[    3.358357 ] RAX: 0000000000000000 RBX: ffff888104dc8000 RCX:\n0000000000000000\n[    3.358814 ] RDX: ffff8881003c8000 RSI: ffffffff8124a9e6 RDI:\n00000000ffffffff\n[    3.359272 ] RBP: ffffc90000017b88 R08: 0000000000000000 R09:\n0000000000000000\n[    3.359732 ] R10: ffffc900000179f0 R11: 0000000000001d04 R12:\n0000000000000000\n[    3.360195 ] R13: ffff888107dc6000 R14: ffff888107dc6928 R15:\nffff888104dc80a8\n[    3.360652 ] FS:  0000000000000000(0000) GS:ffff88817bc00000(0000)\nknlGS:0000000000000000\n[    3.361170 ] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[    3.361538 ] CR2: 0000000000000000 CR3: 000000000582e000 CR4:\n00000000000006f0\n[    3.362003 ] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[    3.362175 ] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[    3.362175 ] Call Trace:\n[    3.362175 ]  nj_release+0x51/0x1e0\n[    3.362175 ]  nj_probe+0x450/0x950\n[    3.362175 ]  ? pci_device_remove+0x110/0x110\n[    3.362175 ]  local_pci_probe+0x45/0xa0\n[    3.362175 ]  pci_device_probe+0x12b/0x1d0\n[    3.362175 ]  really_probe+0x2a9/0x610\n[    3.362175 ]  driver_probe_device+0x90/0x1d0\n[    3.362175 ]  ? mutex_lock_nested+0x1b/0x20\n[    3.362175 ]  device_driver_attach+0x68/0x70\n[    3.362175 ]  __driver_attach+0x124/0x1b0\n[    3.362175 ]  ? device_driver_attach+0x70/0x70\n[    3.362175 ]  bus_for_each_dev+0xbb/0x110\n[    3.362175 ]  ? rdinit_setup+0x45/0x45\n[    3.362175 ]  driver_attach+0x27/0x30\n[    3.362175 ]  bus_add_driver+0x1eb/0x2a0\n[    3.362175 ]  driver_register+0xa9/0x180\n[    3.362175 ]  __pci_register_driver+0x82/0x90\n[    3.362175 ]  ? w6692_init+0x38/0x38\n[    3.362175 ]  nj_init+0x36/0x38\n[    3.362175 ]  do_one_initcall+0x7f/0x3d0\n[    3.362175 ]  ? rdinit_setup+0x45/0x45\n[    3.362175 ]  ? rcu_read_lock_sched_held+0x4f/0x80\n[    3.362175 ]  kernel_init_freeable+0x2aa/0x301\n[    3.362175 ]  ? rest_init+0x2c0/0x2c0\n[    3.362175 ]  kernel_init+0x18/0x190\n[    3.362175 ]  ? rest_init+0x2c0/0x2c0\n[    3.362175 ]  ? rest_init+0x2c0/0x2c0\n[    3.362175 ]  ret_from_fork+0x1f/0x30\n[    3.362175 ] Kernel panic - not syncing: panic_on_warn set ...\n[    3.362175 ] CPU: 0 PID: 1 Comm: swapper/0 Not tainted\n5.13.0-rc1-00144-g25a1298726e #13\n[    3.362175 ] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\nrel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[    3.362175 ] Call Trace:\n[    3.362175 ]  dump_stack+0xba/0xf5\n[    3.362175 ]  ? free_irq+0x100/0x480\n[    3.362175 ]  panic+0x15a/0x3f2\n[    3.362175 ]  ? __warn+0xf2/0x150\n[    3.362175 ]  ? free_irq+0x100/0x480\n[    3.362175 ]  __warn+0x108/0x150\n[    3.362175 ]  ? free_irq+0x100/0x480\n[    3.362175 ]  report_bug+0x119/0x1c0\n[    3.362175 ]  handle_bug+0x3b/0x80\n[    3.362175 ]  exc_invalid_op+0x18/0x70\n[    3.362175 ]  asm_exc_invalid_op+0x12/0x20\n[    3.362175 ] RIP: 0010:free_irq+0x100\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47284",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4c1fcb6ec964b44edbf84235134582a5ffae1521",
            "patch_url": "https://git.kernel.org/stable/p/4c1fcb6ec964b44edbf84235134582a5ffae1521",
            "filename": "CVE-2021-47284-4c1fcb6ec964b44edbf84235134582a5ffae1521.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47284/CVE-2021-47284-4c1fcb6ec964b44edbf84235134582a5ffae1521.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/143fc7220961220eecc04669e5909af8847bf8c8",
                "patch_url": "https://git.kernel.org/stable/p/143fc7220961220eecc04669e5909af8847bf8c8",
                "filename": "CVE-2021-47284-143fc7220961220eecc04669e5909af8847bf8c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47284/CVE-2021-47284-143fc7220961220eecc04669e5909af8847bf8c8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4c1fcb6ec964b44edbf84235134582a5ffae1521",
                "patch_url": "https://git.kernel.org/stable/p/4c1fcb6ec964b44edbf84235134582a5ffae1521",
                "filename": "CVE-2021-47284-4c1fcb6ec964b44edbf84235134582a5ffae1521.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47284/CVE-2021-47284-4c1fcb6ec964b44edbf84235134582a5ffae1521.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6249193e03709ea625e10706ecaf17fea0427d3d",
                "patch_url": "https://git.kernel.org/stable/p/6249193e03709ea625e10706ecaf17fea0427d3d",
                "filename": "CVE-2021-47284-6249193e03709ea625e10706ecaf17fea0427d3d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47284/CVE-2021-47284-6249193e03709ea625e10706ecaf17fea0427d3d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/958cb1078ca60d214826fd90a0961a447fade59a",
                "patch_url": "https://git.kernel.org/stable/p/958cb1078ca60d214826fd90a0961a447fade59a",
                "filename": "CVE-2021-47284-958cb1078ca60d214826fd90a0961a447fade59a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47284/CVE-2021-47284-958cb1078ca60d214826fd90a0961a447fade59a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9d7d4649dc1c53acf76df260fd519db698ed20d7",
                "patch_url": "https://git.kernel.org/stable/p/9d7d4649dc1c53acf76df260fd519db698ed20d7",
                "filename": "CVE-2021-47284-9d7d4649dc1c53acf76df260fd519db698ed20d7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47284/CVE-2021-47284-9d7d4649dc1c53acf76df260fd519db698ed20d7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9f6f852550d0e1b7735651228116ae9d300f69b3",
                "patch_url": "https://git.kernel.org/stable/p/9f6f852550d0e1b7735651228116ae9d300f69b3",
                "filename": "CVE-2021-47284-9f6f852550d0e1b7735651228116ae9d300f69b3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47284/CVE-2021-47284-9f6f852550d0e1b7735651228116ae9d300f69b3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a0a37e4454ca1c0b424edc2c9c2487c2c46a1be6",
                "patch_url": "https://git.kernel.org/stable/p/a0a37e4454ca1c0b424edc2c9c2487c2c46a1be6",
                "filename": "CVE-2021-47284-a0a37e4454ca1c0b424edc2c9c2487c2c46a1be6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47284/CVE-2021-47284-a0a37e4454ca1c0b424edc2c9c2487c2c46a1be6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bf78e25bd3f487208e042c67c8a31706c2dba265",
                "patch_url": "https://git.kernel.org/stable/p/bf78e25bd3f487208e042c67c8a31706c2dba265",
                "filename": "CVE-2021-47284-bf78e25bd3f487208e042c67c8a31706c2dba265.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47284/CVE-2021-47284-bf78e25bd3f487208e042c67c8a31706c2dba265.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/143fc7220961220eecc04669e5909af8847bf8c8",
            "https://git.kernel.org/stable/c/4c1fcb6ec964b44edbf84235134582a5ffae1521",
            "https://git.kernel.org/stable/c/6249193e03709ea625e10706ecaf17fea0427d3d",
            "https://git.kernel.org/stable/c/958cb1078ca60d214826fd90a0961a447fade59a",
            "https://git.kernel.org/stable/c/9d7d4649dc1c53acf76df260fd519db698ed20d7",
            "https://git.kernel.org/stable/c/9f6f852550d0e1b7735651228116ae9d300f69b3",
            "https://git.kernel.org/stable/c/a0a37e4454ca1c0b424edc2c9c2487c2c46a1be6",
            "https://git.kernel.org/stable/c/bf78e25bd3f487208e042c67c8a31706c2dba265",
            "https://www.cve.org/CVERecord?id=CVE-2021-47284\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47284\nhttps://lore.kernel.org/linux-cve-announce/2024052154-CVE-2021-47284-c8f5@gregkh/T"
        ]
    },
    "CVE-2021-47287": {
        "cve": "CVE-2021-47287",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndriver core: auxiliary bus: Fix memory leak when driver_register() fail\n\nIf driver_register() returns with error we need to free the memory\nallocated for auxdrv->driver.name before returning from\n__auxiliary_driver_register()",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47287",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3",
            "patch_url": "https://git.kernel.org/stable/p/4afa0c22eed33cfe0c590742387f0d16f32412f3",
            "filename": "CVE-2021-47287-4afa0c22eed33cfe0c590742387f0d16f32412f3.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47287/CVE-2021-47287-4afa0c22eed33cfe0c590742387f0d16f32412f3.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3",
                "patch_url": "https://git.kernel.org/stable/p/4afa0c22eed33cfe0c590742387f0d16f32412f3",
                "filename": "CVE-2021-47287-4afa0c22eed33cfe0c590742387f0d16f32412f3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47287/CVE-2021-47287-4afa0c22eed33cfe0c590742387f0d16f32412f3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ce5b3de58fc21303722df46551f7eb9a91afb409",
                "patch_url": "https://git.kernel.org/stable/p/ce5b3de58fc21303722df46551f7eb9a91afb409",
                "filename": "CVE-2021-47287-ce5b3de58fc21303722df46551f7eb9a91afb409.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47287/CVE-2021-47287-ce5b3de58fc21303722df46551f7eb9a91afb409.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3",
            "https://git.kernel.org/stable/c/ce5b3de58fc21303722df46551f7eb9a91afb409",
            "https://www.cve.org/CVERecord?id=CVE-2021-47287\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47287\nhttps://lore.kernel.org/linux-cve-announce/2024052121-CVE-2021-47287-6345@gregkh/T"
        ]
    },
    "CVE-2021-47289": {
        "cve": "CVE-2021-47289",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: fix NULL pointer dereference\n\nCommit 71f642833284 (\"ACPI: utils: Fix reference counting in\nfor_each_acpi_dev_match()\") started doing \"acpi_dev_put()\" on a pointer\nthat was possibly NULL.  That fails miserably, because that helper\ninline function is not set up to handle that case.\n\nJust make acpi_dev_put() silently accept a NULL pointer, rather than\ncalling down to put_device() with an invalid offset off that NULL\npointer.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47289",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/fc68f42aa737dc15e7665a4101d4168aadb8e4c4",
            "patch_url": "https://git.kernel.org/stable/p/fc68f42aa737dc15e7665a4101d4168aadb8e4c4",
            "filename": "CVE-2021-47289-fc68f42aa737dc15e7665a4101d4168aadb8e4c4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47289/CVE-2021-47289-fc68f42aa737dc15e7665a4101d4168aadb8e4c4.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/38f54217b423c0101d03a00feec6fb8ec608b12e",
                "patch_url": "https://git.kernel.org/stable/p/38f54217b423c0101d03a00feec6fb8ec608b12e",
                "filename": "CVE-2021-47289-38f54217b423c0101d03a00feec6fb8ec608b12e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47289/CVE-2021-47289-38f54217b423c0101d03a00feec6fb8ec608b12e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cae3fa3d8165761f3000f523b11cfa1cd35206bc",
                "patch_url": "https://git.kernel.org/stable/p/cae3fa3d8165761f3000f523b11cfa1cd35206bc",
                "filename": "CVE-2021-47289-cae3fa3d8165761f3000f523b11cfa1cd35206bc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47289/CVE-2021-47289-cae3fa3d8165761f3000f523b11cfa1cd35206bc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ccf23a0888077a25a0793a746c3941db2a7562e4",
                "patch_url": "https://git.kernel.org/stable/p/ccf23a0888077a25a0793a746c3941db2a7562e4",
                "filename": "CVE-2021-47289-ccf23a0888077a25a0793a746c3941db2a7562e4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47289/CVE-2021-47289-ccf23a0888077a25a0793a746c3941db2a7562e4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fc68f42aa737dc15e7665a4101d4168aadb8e4c4",
                "patch_url": "https://git.kernel.org/stable/p/fc68f42aa737dc15e7665a4101d4168aadb8e4c4",
                "filename": "CVE-2021-47289-fc68f42aa737dc15e7665a4101d4168aadb8e4c4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47289/CVE-2021-47289-fc68f42aa737dc15e7665a4101d4168aadb8e4c4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/38f54217b423c0101d03a00feec6fb8ec608b12e",
            "https://git.kernel.org/stable/c/cae3fa3d8165761f3000f523b11cfa1cd35206bc",
            "https://git.kernel.org/stable/c/ccf23a0888077a25a0793a746c3941db2a7562e4",
            "https://git.kernel.org/stable/c/fc68f42aa737dc15e7665a4101d4168aadb8e4c4",
            "https://www.cve.org/CVERecord?id=CVE-2021-47289\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47289\nhttps://lore.kernel.org/linux-cve-announce/2024052122-CVE-2021-47289-7cbb@gregkh/T"
        ]
    },
    "CVE-2021-47304": {
        "cve": "CVE-2021-47304",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix tcp_init_transfer() to not reset icsk_ca_initialized\n\nThis commit fixes a bug (found by syzkaller) that could cause spurious\ndouble-initializations for congestion control modules, which could cause\nmemory leaks or other problems for congestion control modules (like CDG)\nthat allocate memory in their init functions.\n\nThe buggy scenario constructed by syzkaller was something like:\n\n(1) create a TCP socket\n(2) initiate a TFO connect via sendto()\n(3) while socket is in TCP_SYN_SENT, call setsockopt(TCP_CONGESTION),\n    which calls:\n       tcp_set_congestion_control() ->\n         tcp_reinit_congestion_control() ->\n           tcp_init_congestion_control()\n(4) receive ACK, connection is established, call tcp_init_transfer(),\n    set icsk_ca_initialized=0 (without first calling cc->release()),\n    call tcp_init_congestion_control() again.\n\nNote that in this sequence tcp_init_congestion_control() is called\ntwice without a cc->release() call in between. Thus, for CC modules\nthat allocate memory in their init() function, e.g, CDG, a memory leak\nmay occur. The syzkaller tool managed to find a reproducer that\ntriggered such a leak in CDG.\n\nThe bug was introduced when that commit 8919a9b31eb4 (\"tcp: Only init\ncongestion control if not initialized already\")\nintroduced icsk_ca_initialized and set icsk_ca_initialized to 0 in\ntcp_init_transfer(), missing the possibility for a sequence like the\none above, where a process could call setsockopt(TCP_CONGESTION) in\nstate TCP_SYN_SENT (i.e. after the connect() or TFO open sendmsg()),\nwhich would call tcp_init_congestion_control(). It did not intend to\nreset any initialization that the user had already explicitly made;\nit just missed the possibility of that particular sequence (which\nsyzkaller managed to find).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47304",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ad4ba3404931745a5977ad12db4f0c34080e52f7",
            "patch_url": "https://git.kernel.org/stable/p/ad4ba3404931745a5977ad12db4f0c34080e52f7",
            "filename": "CVE-2021-47304-ad4ba3404931745a5977ad12db4f0c34080e52f7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47304/CVE-2021-47304-ad4ba3404931745a5977ad12db4f0c34080e52f7.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/ad4ba3404931745a5977ad12db4f0c34080e52f7",
                "patch_url": "https://git.kernel.org/stable/p/ad4ba3404931745a5977ad12db4f0c34080e52f7",
                "filename": "CVE-2021-47304-ad4ba3404931745a5977ad12db4f0c34080e52f7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47304/CVE-2021-47304-ad4ba3404931745a5977ad12db4f0c34080e52f7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/be5d1b61a2ad28c7e57fe8bfa277373e8ecffcdc",
                "patch_url": "https://git.kernel.org/stable/p/be5d1b61a2ad28c7e57fe8bfa277373e8ecffcdc",
                "filename": "CVE-2021-47304-be5d1b61a2ad28c7e57fe8bfa277373e8ecffcdc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47304/CVE-2021-47304-be5d1b61a2ad28c7e57fe8bfa277373e8ecffcdc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fe77b85828ca9ddc42977b79de9e40d18545b4fe",
                "patch_url": "https://git.kernel.org/stable/p/fe77b85828ca9ddc42977b79de9e40d18545b4fe",
                "filename": "CVE-2021-47304-fe77b85828ca9ddc42977b79de9e40d18545b4fe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47304/CVE-2021-47304-fe77b85828ca9ddc42977b79de9e40d18545b4fe.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/ad4ba3404931745a5977ad12db4f0c34080e52f7",
            "https://git.kernel.org/stable/c/be5d1b61a2ad28c7e57fe8bfa277373e8ecffcdc",
            "https://git.kernel.org/stable/c/fe77b85828ca9ddc42977b79de9e40d18545b4fe",
            "https://www.cve.org/CVERecord?id=CVE-2021-47304\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47304\nhttps://lore.kernel.org/linux-cve-announce/2024052126-CVE-2021-47304-fc16@gregkh/T"
        ]
    },
    "CVE-2021-47310": {
        "cve": "CVE-2021-47310",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ti: fix UAF in tlan_remove_one\n\npriv is netdev private data and it cannot be\nused after free_netdev() call. Using priv after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47310",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/a0a817b2d308fac090a05cbbe80988e073ac5193",
            "patch_url": "https://git.kernel.org/stable/p/a0a817b2d308fac090a05cbbe80988e073ac5193",
            "filename": "CVE-2021-47310-a0a817b2d308fac090a05cbbe80988e073ac5193.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47310/CVE-2021-47310-a0a817b2d308fac090a05cbbe80988e073ac5193.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0336f8ffece62f882ab3012820965a786a983f70",
                "patch_url": "https://git.kernel.org/stable/p/0336f8ffece62f882ab3012820965a786a983f70",
                "filename": "CVE-2021-47310-0336f8ffece62f882ab3012820965a786a983f70.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47310/CVE-2021-47310-0336f8ffece62f882ab3012820965a786a983f70.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0538b0ab7d2c396e385694228c7cdcd2d2c514e9",
                "patch_url": "https://git.kernel.org/stable/p/0538b0ab7d2c396e385694228c7cdcd2d2c514e9",
                "filename": "CVE-2021-47310-0538b0ab7d2c396e385694228c7cdcd2d2c514e9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47310/CVE-2021-47310-0538b0ab7d2c396e385694228c7cdcd2d2c514e9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/93efab0ef2a607fff9166d447c4035f98b5db342",
                "patch_url": "https://git.kernel.org/stable/p/93efab0ef2a607fff9166d447c4035f98b5db342",
                "filename": "CVE-2021-47310-93efab0ef2a607fff9166d447c4035f98b5db342.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47310/CVE-2021-47310-93efab0ef2a607fff9166d447c4035f98b5db342.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a0a817b2d308fac090a05cbbe80988e073ac5193",
                "patch_url": "https://git.kernel.org/stable/p/a0a817b2d308fac090a05cbbe80988e073ac5193",
                "filename": "CVE-2021-47310-a0a817b2d308fac090a05cbbe80988e073ac5193.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47310/CVE-2021-47310-a0a817b2d308fac090a05cbbe80988e073ac5193.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a18a8d9cfbb112ad72e625372849adc3986fd6bf",
                "patch_url": "https://git.kernel.org/stable/p/a18a8d9cfbb112ad72e625372849adc3986fd6bf",
                "filename": "CVE-2021-47310-a18a8d9cfbb112ad72e625372849adc3986fd6bf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47310/CVE-2021-47310-a18a8d9cfbb112ad72e625372849adc3986fd6bf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7e5563f2a7862a9e4796abb9908b092f677e3c1",
                "patch_url": "https://git.kernel.org/stable/p/b7e5563f2a7862a9e4796abb9908b092f677e3c1",
                "filename": "CVE-2021-47310-b7e5563f2a7862a9e4796abb9908b092f677e3c1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47310/CVE-2021-47310-b7e5563f2a7862a9e4796abb9908b092f677e3c1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c263ae8c7e4c482387de5e6c89e213f8173fe8b6",
                "patch_url": "https://git.kernel.org/stable/p/c263ae8c7e4c482387de5e6c89e213f8173fe8b6",
                "filename": "CVE-2021-47310-c263ae8c7e4c482387de5e6c89e213f8173fe8b6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47310/CVE-2021-47310-c263ae8c7e4c482387de5e6c89e213f8173fe8b6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f2a062fcfe1d6f1b0a86fa76ae21c277d65f4405",
                "patch_url": "https://git.kernel.org/stable/p/f2a062fcfe1d6f1b0a86fa76ae21c277d65f4405",
                "filename": "CVE-2021-47310-f2a062fcfe1d6f1b0a86fa76ae21c277d65f4405.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47310/CVE-2021-47310-f2a062fcfe1d6f1b0a86fa76ae21c277d65f4405.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0336f8ffece62f882ab3012820965a786a983f70",
            "https://git.kernel.org/stable/c/0538b0ab7d2c396e385694228c7cdcd2d2c514e9",
            "https://git.kernel.org/stable/c/93efab0ef2a607fff9166d447c4035f98b5db342",
            "https://git.kernel.org/stable/c/a0a817b2d308fac090a05cbbe80988e073ac5193",
            "https://git.kernel.org/stable/c/a18a8d9cfbb112ad72e625372849adc3986fd6bf",
            "https://git.kernel.org/stable/c/b7e5563f2a7862a9e4796abb9908b092f677e3c1",
            "https://git.kernel.org/stable/c/c263ae8c7e4c482387de5e6c89e213f8173fe8b6",
            "https://git.kernel.org/stable/c/f2a062fcfe1d6f1b0a86fa76ae21c277d65f4405",
            "https://www.cve.org/CVERecord?id=CVE-2021-47310\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47310\nhttps://lore.kernel.org/linux-cve-announce/2024052128-CVE-2021-47310-a59d@gregkh/T"
        ]
    },
    "CVE-2021-47311": {
        "cve": "CVE-2021-47311",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qcom/emac: fix UAF in emac_remove\n\nadpt is netdev private data and it cannot be\nused after free_netdev() call. Using adpt after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47311",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2b70ca92847c619d6264c7372ef74fcbfd1e048c",
            "patch_url": "https://git.kernel.org/stable/p/2b70ca92847c619d6264c7372ef74fcbfd1e048c",
            "filename": "CVE-2021-47311-2b70ca92847c619d6264c7372ef74fcbfd1e048c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47311/CVE-2021-47311-2b70ca92847c619d6264c7372ef74fcbfd1e048c.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/11e9d163d631198bb3eb41a677a61b499516c0f7",
                "patch_url": "https://git.kernel.org/stable/p/11e9d163d631198bb3eb41a677a61b499516c0f7",
                "filename": "CVE-2021-47311-11e9d163d631198bb3eb41a677a61b499516c0f7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47311/CVE-2021-47311-11e9d163d631198bb3eb41a677a61b499516c0f7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2b70ca92847c619d6264c7372ef74fcbfd1e048c",
                "patch_url": "https://git.kernel.org/stable/p/2b70ca92847c619d6264c7372ef74fcbfd1e048c",
                "filename": "CVE-2021-47311-2b70ca92847c619d6264c7372ef74fcbfd1e048c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47311/CVE-2021-47311-2b70ca92847c619d6264c7372ef74fcbfd1e048c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4d04a42b926e682140776e54188f4a44f1f01a81",
                "patch_url": "https://git.kernel.org/stable/p/4d04a42b926e682140776e54188f4a44f1f01a81",
                "filename": "CVE-2021-47311-4d04a42b926e682140776e54188f4a44f1f01a81.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47311/CVE-2021-47311-4d04a42b926e682140776e54188f4a44f1f01a81.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8a225a6e07a57a1538d53637cb3d82bd3e477839",
                "patch_url": "https://git.kernel.org/stable/p/8a225a6e07a57a1538d53637cb3d82bd3e477839",
                "filename": "CVE-2021-47311-8a225a6e07a57a1538d53637cb3d82bd3e477839.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47311/CVE-2021-47311-8a225a6e07a57a1538d53637cb3d82bd3e477839.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ad297cd2db8953e2202970e9504cab247b6c7cb4",
                "patch_url": "https://git.kernel.org/stable/p/ad297cd2db8953e2202970e9504cab247b6c7cb4",
                "filename": "CVE-2021-47311-ad297cd2db8953e2202970e9504cab247b6c7cb4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47311/CVE-2021-47311-ad297cd2db8953e2202970e9504cab247b6c7cb4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b1e091331920f8fbfc747dcbd16263fcd71abb2d",
                "patch_url": "https://git.kernel.org/stable/p/b1e091331920f8fbfc747dcbd16263fcd71abb2d",
                "filename": "CVE-2021-47311-b1e091331920f8fbfc747dcbd16263fcd71abb2d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47311/CVE-2021-47311-b1e091331920f8fbfc747dcbd16263fcd71abb2d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b560521eca03d0a2db6093a5a632cbdd0a0cf833",
                "patch_url": "https://git.kernel.org/stable/p/b560521eca03d0a2db6093a5a632cbdd0a0cf833",
                "filename": "CVE-2021-47311-b560521eca03d0a2db6093a5a632cbdd0a0cf833.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47311/CVE-2021-47311-b560521eca03d0a2db6093a5a632cbdd0a0cf833.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/11e9d163d631198bb3eb41a677a61b499516c0f7",
            "https://git.kernel.org/stable/c/2b70ca92847c619d6264c7372ef74fcbfd1e048c",
            "https://git.kernel.org/stable/c/4d04a42b926e682140776e54188f4a44f1f01a81",
            "https://git.kernel.org/stable/c/8a225a6e07a57a1538d53637cb3d82bd3e477839",
            "https://git.kernel.org/stable/c/ad297cd2db8953e2202970e9504cab247b6c7cb4",
            "https://git.kernel.org/stable/c/b1e091331920f8fbfc747dcbd16263fcd71abb2d",
            "https://git.kernel.org/stable/c/b560521eca03d0a2db6093a5a632cbdd0a0cf833",
            "https://www.cve.org/CVERecord?id=CVE-2021-47311\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47311\nhttps://lore.kernel.org/linux-cve-announce/2024052129-CVE-2021-47311-47f4@gregkh/T"
        ]
    },
    "CVE-2021-47321": {
        "cve": "CVE-2021-47321",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free by calling del_timer_sync()\n\nThis driver's remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver's remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47321",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ecd620e0fb1ff7f78fdb593379b2e6938c99707a",
            "patch_url": "https://git.kernel.org/stable/p/ecd620e0fb1ff7f78fdb593379b2e6938c99707a",
            "filename": "CVE-2021-47321-ecd620e0fb1ff7f78fdb593379b2e6938c99707a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47321/CVE-2021-47321-ecd620e0fb1ff7f78fdb593379b2e6938c99707a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1a053c4d716898a53c2e31c574a70ea0c37044a3",
                "patch_url": "https://git.kernel.org/stable/p/1a053c4d716898a53c2e31c574a70ea0c37044a3",
                "filename": "CVE-2021-47321-1a053c4d716898a53c2e31c574a70ea0c37044a3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47321/CVE-2021-47321-1a053c4d716898a53c2e31c574a70ea0c37044a3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4c05dac488a660fe2925c047ecb119e7afaaeb1e",
                "patch_url": "https://git.kernel.org/stable/p/4c05dac488a660fe2925c047ecb119e7afaaeb1e",
                "filename": "CVE-2021-47321-4c05dac488a660fe2925c047ecb119e7afaaeb1e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47321/CVE-2021-47321-4c05dac488a660fe2925c047ecb119e7afaaeb1e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/58606882ad8ec6c39e0f40344b922921ef94ab4d",
                "patch_url": "https://git.kernel.org/stable/p/58606882ad8ec6c39e0f40344b922921ef94ab4d",
                "filename": "CVE-2021-47321-58606882ad8ec6c39e0f40344b922921ef94ab4d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47321/CVE-2021-47321-58606882ad8ec6c39e0f40344b922921ef94ab4d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4",
                "patch_url": "https://git.kernel.org/stable/p/66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4",
                "filename": "CVE-2021-47321-66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47321/CVE-2021-47321-66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8bec568d7518b1504a602ed5376bb322e4dbb270",
                "patch_url": "https://git.kernel.org/stable/p/8bec568d7518b1504a602ed5376bb322e4dbb270",
                "filename": "CVE-2021-47321-8bec568d7518b1504a602ed5376bb322e4dbb270.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47321/CVE-2021-47321-8bec568d7518b1504a602ed5376bb322e4dbb270.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ca96b8ea5e74956071154bdb456778cc3027e79f",
                "patch_url": "https://git.kernel.org/stable/p/ca96b8ea5e74956071154bdb456778cc3027e79f",
                "filename": "CVE-2021-47321-ca96b8ea5e74956071154bdb456778cc3027e79f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47321/CVE-2021-47321-ca96b8ea5e74956071154bdb456778cc3027e79f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d0212f095ab56672f6f36aabc605bda205e1e0bf",
                "patch_url": "https://git.kernel.org/stable/p/d0212f095ab56672f6f36aabc605bda205e1e0bf",
                "filename": "CVE-2021-47321-d0212f095ab56672f6f36aabc605bda205e1e0bf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47321/CVE-2021-47321-d0212f095ab56672f6f36aabc605bda205e1e0bf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/db222f1477ad5692cd454709b714949807e5d111",
                "patch_url": "https://git.kernel.org/stable/p/db222f1477ad5692cd454709b714949807e5d111",
                "filename": "CVE-2021-47321-db222f1477ad5692cd454709b714949807e5d111.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47321/CVE-2021-47321-db222f1477ad5692cd454709b714949807e5d111.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ecd620e0fb1ff7f78fdb593379b2e6938c99707a",
                "patch_url": "https://git.kernel.org/stable/p/ecd620e0fb1ff7f78fdb593379b2e6938c99707a",
                "filename": "CVE-2021-47321-ecd620e0fb1ff7f78fdb593379b2e6938c99707a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47321/CVE-2021-47321-ecd620e0fb1ff7f78fdb593379b2e6938c99707a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1a053c4d716898a53c2e31c574a70ea0c37044a3",
            "https://git.kernel.org/stable/c/4c05dac488a660fe2925c047ecb119e7afaaeb1e",
            "https://git.kernel.org/stable/c/58606882ad8ec6c39e0f40344b922921ef94ab4d",
            "https://git.kernel.org/stable/c/66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4",
            "https://git.kernel.org/stable/c/8bec568d7518b1504a602ed5376bb322e4dbb270",
            "https://git.kernel.org/stable/c/ca96b8ea5e74956071154bdb456778cc3027e79f",
            "https://git.kernel.org/stable/c/d0212f095ab56672f6f36aabc605bda205e1e0bf",
            "https://git.kernel.org/stable/c/db222f1477ad5692cd454709b714949807e5d111",
            "https://git.kernel.org/stable/c/ecd620e0fb1ff7f78fdb593379b2e6938c99707a",
            "https://www.cve.org/CVERecord?id=CVE-2021-47321\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47321\nhttps://lore.kernel.org/linux-cve-announce/2024052132-CVE-2021-47321-1b9b@gregkh/T"
        ]
    },
    "CVE-2021-47338": {
        "cve": "CVE-2021-47338",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbmem: Do not delete the mode that is still in use\n\nThe execution of fb_delete_videomode() is not based on the result of the\nprevious fbcon_mode_deleted(). As a result, the mode is directly deleted,\nregardless of whether it is still in use, which may cause UAF.\n\n==================================================================\nBUG: KASAN: use-after-free in fb_mode_is_equal+0x36e/0x5e0 \\\ndrivers/video/fbdev/core/modedb.c:924\nRead of size 4 at addr ffff88807e0ddb1c by task syz-executor.0/18962\n\nCPU: 2 PID: 18962 Comm: syz-executor.0 Not tainted 5.10.45-rc1+ #3\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ...\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x137/0x1be lib/dump_stack.c:118\n print_address_description+0x6c/0x640 mm/kasan/report.c:385\n __kasan_report mm/kasan/report.c:545 [inline]\n kasan_report+0x13d/0x1e0 mm/kasan/report.c:562\n fb_mode_is_equal+0x36e/0x5e0 drivers/video/fbdev/core/modedb.c:924\n fbcon_mode_deleted+0x16a/0x220 drivers/video/fbdev/core/fbcon.c:2746\n fb_set_var+0x1e1/0xdb0 drivers/video/fbdev/core/fbmem.c:975\n do_fb_ioctl+0x4d9/0x6e0 drivers/video/fbdev/core/fbmem.c:1108\n vfs_ioctl fs/ioctl.c:48 [inline]\n __do_sys_ioctl fs/ioctl.c:753 [inline]\n __se_sys_ioctl+0xfb/0x170 fs/ioctl.c:739\n do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nFreed by task 18960:\n kasan_save_stack mm/kasan/common.c:48 [inline]\n kasan_set_track+0x3d/0x70 mm/kasan/common.c:56\n kasan_set_free_info+0x17/0x30 mm/kasan/generic.c:355\n __kasan_slab_free+0x108/0x140 mm/kasan/common.c:422\n slab_free_hook mm/slub.c:1541 [inline]\n slab_free_freelist_hook+0xd6/0x1a0 mm/slub.c:1574\n slab_free mm/slub.c:3139 [inline]\n kfree+0xca/0x3d0 mm/slub.c:4121\n fb_delete_videomode+0x56a/0x820 drivers/video/fbdev/core/modedb.c:1104\n fb_set_var+0x1f3/0xdb0 drivers/video/fbdev/core/fbmem.c:978\n do_fb_ioctl+0x4d9/0x6e0 drivers/video/fbdev/core/fbmem.c:1108\n vfs_ioctl fs/ioctl.c:48 [inline]\n __do_sys_ioctl fs/ioctl.c:753 [inline]\n __se_sys_ioctl+0xfb/0x170 fs/ioctl.c:739\n do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46\n entry_SYSCALL_64_after_hwframe+0x44/0xa9",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47338",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/359311b85ebec7c07c3a08ae2f3def946cad33fa",
            "patch_url": "https://git.kernel.org/stable/p/359311b85ebec7c07c3a08ae2f3def946cad33fa",
            "filename": "CVE-2021-47338-359311b85ebec7c07c3a08ae2f3def946cad33fa.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47338/CVE-2021-47338-359311b85ebec7c07c3a08ae2f3def946cad33fa.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/087bff9acd2ec6db3f61aceb3224bde90fe0f7f8",
                "patch_url": "https://git.kernel.org/stable/p/087bff9acd2ec6db3f61aceb3224bde90fe0f7f8",
                "filename": "CVE-2021-47338-087bff9acd2ec6db3f61aceb3224bde90fe0f7f8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47338/CVE-2021-47338-087bff9acd2ec6db3f61aceb3224bde90fe0f7f8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0af778269a522c988ef0b4188556aba97fb420cc",
                "patch_url": "https://git.kernel.org/stable/p/0af778269a522c988ef0b4188556aba97fb420cc",
                "filename": "CVE-2021-47338-0af778269a522c988ef0b4188556aba97fb420cc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47338/CVE-2021-47338-0af778269a522c988ef0b4188556aba97fb420cc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/359311b85ebec7c07c3a08ae2f3def946cad33fa",
                "patch_url": "https://git.kernel.org/stable/p/359311b85ebec7c07c3a08ae2f3def946cad33fa",
                "filename": "CVE-2021-47338-359311b85ebec7c07c3a08ae2f3def946cad33fa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47338/CVE-2021-47338-359311b85ebec7c07c3a08ae2f3def946cad33fa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d6e76469157d8f240e5dec6f8411aa8d306b1126",
                "patch_url": "https://git.kernel.org/stable/p/d6e76469157d8f240e5dec6f8411aa8d306b1126",
                "filename": "CVE-2021-47338-d6e76469157d8f240e5dec6f8411aa8d306b1126.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47338/CVE-2021-47338-d6e76469157d8f240e5dec6f8411aa8d306b1126.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f193509afc7ff37a46862610c93b896044d5b693",
                "patch_url": "https://git.kernel.org/stable/p/f193509afc7ff37a46862610c93b896044d5b693",
                "filename": "CVE-2021-47338-f193509afc7ff37a46862610c93b896044d5b693.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47338/CVE-2021-47338-f193509afc7ff37a46862610c93b896044d5b693.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/087bff9acd2ec6db3f61aceb3224bde90fe0f7f8",
            "https://git.kernel.org/stable/c/0af778269a522c988ef0b4188556aba97fb420cc",
            "https://git.kernel.org/stable/c/359311b85ebec7c07c3a08ae2f3def946cad33fa",
            "https://git.kernel.org/stable/c/d6e76469157d8f240e5dec6f8411aa8d306b1126",
            "https://git.kernel.org/stable/c/f193509afc7ff37a46862610c93b896044d5b693",
            "https://www.cve.org/CVERecord?id=CVE-2021-47338\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47338\nhttps://lore.kernel.org/linux-cve-announce/2024052137-CVE-2021-47338-cd10@gregkh/T"
        ]
    },
    "CVE-2021-47352": {
        "cve": "CVE-2021-47352",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-net: Add validation for used length\n\nThis adds validation for used length (might come\nfrom an untrusted device) to avoid data corruption\nor loss.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47352",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292",
            "patch_url": "https://git.kernel.org/stable/p/ba710baa1cc1b17a0483f7befe03e696efd17292",
            "filename": "CVE-2021-47352-ba710baa1cc1b17a0483f7befe03e696efd17292.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47352/CVE-2021-47352-ba710baa1cc1b17a0483f7befe03e696efd17292.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3133e01514c3c498f2b01ff210ee6134b70c663c",
                "patch_url": "https://git.kernel.org/stable/p/3133e01514c3c498f2b01ff210ee6134b70c663c",
                "filename": "CVE-2021-47352-3133e01514c3c498f2b01ff210ee6134b70c663c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47352/CVE-2021-47352-3133e01514c3c498f2b01ff210ee6134b70c663c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ad993a95c508417acdeb15244109e009e50d8758",
                "patch_url": "https://git.kernel.org/stable/p/ad993a95c508417acdeb15244109e009e50d8758",
                "filename": "CVE-2021-47352-ad993a95c508417acdeb15244109e009e50d8758.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47352/CVE-2021-47352-ad993a95c508417acdeb15244109e009e50d8758.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292",
                "patch_url": "https://git.kernel.org/stable/p/ba710baa1cc1b17a0483f7befe03e696efd17292",
                "filename": "CVE-2021-47352-ba710baa1cc1b17a0483f7befe03e696efd17292.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47352/CVE-2021-47352-ba710baa1cc1b17a0483f7befe03e696efd17292.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c1b40d1959517ff2ea473d40eeab4691d6d62462",
                "patch_url": "https://git.kernel.org/stable/p/c1b40d1959517ff2ea473d40eeab4691d6d62462",
                "filename": "CVE-2021-47352-c1b40d1959517ff2ea473d40eeab4691d6d62462.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47352/CVE-2021-47352-c1b40d1959517ff2ea473d40eeab4691d6d62462.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c92298d228f61589dd21657af2bea95fc866b813",
                "patch_url": "https://git.kernel.org/stable/p/c92298d228f61589dd21657af2bea95fc866b813",
                "filename": "CVE-2021-47352-c92298d228f61589dd21657af2bea95fc866b813.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47352/CVE-2021-47352-c92298d228f61589dd21657af2bea95fc866b813.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3133e01514c3c498f2b01ff210ee6134b70c663c",
            "https://git.kernel.org/stable/c/ad993a95c508417acdeb15244109e009e50d8758",
            "https://git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292",
            "https://git.kernel.org/stable/c/c1b40d1959517ff2ea473d40eeab4691d6d62462",
            "https://git.kernel.org/stable/c/c92298d228f61589dd21657af2bea95fc866b813",
            "https://www.cve.org/CVERecord?id=CVE-2021-47352\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47352\nhttps://lore.kernel.org/linux-cve-announce/2024052141-CVE-2021-47352-df50@gregkh/T"
        ]
    },
    "CVE-2021-47353": {
        "cve": "CVE-2021-47353",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nudf: Fix NULL pointer dereference in udf_symlink function\n\nIn function udf_symlink, epos.bh is assigned with the value returned\nby udf_tgetblk. The function udf_tgetblk is defined in udf/misc.c\nand returns the value of sb_getblk function that could be NULL.\nThen, epos.bh is used without any check, causing a possible\nNULL pointer dereference when sb_getblk fails.\n\nThis fix adds a check to validate the value of epos.bh.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47353",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3638705ecd5ad2785e996f820121c0ad15ce64b5",
            "patch_url": "https://git.kernel.org/stable/p/3638705ecd5ad2785e996f820121c0ad15ce64b5",
            "filename": "CVE-2021-47353-3638705ecd5ad2785e996f820121c0ad15ce64b5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47353/CVE-2021-47353-3638705ecd5ad2785e996f820121c0ad15ce64b5.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/21bf1414580c36ffc8d8de043beb3508cf812238",
                "patch_url": "https://git.kernel.org/stable/p/21bf1414580c36ffc8d8de043beb3508cf812238",
                "filename": "CVE-2021-47353-21bf1414580c36ffc8d8de043beb3508cf812238.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47353/CVE-2021-47353-21bf1414580c36ffc8d8de043beb3508cf812238.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f3d9ddd32a28803baa547e6274983b67d5e287c",
                "patch_url": "https://git.kernel.org/stable/p/2f3d9ddd32a28803baa547e6274983b67d5e287c",
                "filename": "CVE-2021-47353-2f3d9ddd32a28803baa547e6274983b67d5e287c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47353/CVE-2021-47353-2f3d9ddd32a28803baa547e6274983b67d5e287c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3638705ecd5ad2785e996f820121c0ad15ce64b5",
                "patch_url": "https://git.kernel.org/stable/p/3638705ecd5ad2785e996f820121c0ad15ce64b5",
                "filename": "CVE-2021-47353-3638705ecd5ad2785e996f820121c0ad15ce64b5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47353/CVE-2021-47353-3638705ecd5ad2785e996f820121c0ad15ce64b5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/371566f63cbd0bb6fbb25b8fe9d5798268d35af9",
                "patch_url": "https://git.kernel.org/stable/p/371566f63cbd0bb6fbb25b8fe9d5798268d35af9",
                "filename": "CVE-2021-47353-371566f63cbd0bb6fbb25b8fe9d5798268d35af9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47353/CVE-2021-47353-371566f63cbd0bb6fbb25b8fe9d5798268d35af9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5150877e4d99f85057a458daac7cd7c01005d5c6",
                "patch_url": "https://git.kernel.org/stable/p/5150877e4d99f85057a458daac7cd7c01005d5c6",
                "filename": "CVE-2021-47353-5150877e4d99f85057a458daac7cd7c01005d5c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47353/CVE-2021-47353-5150877e4d99f85057a458daac7cd7c01005d5c6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/80d505aee6398cf8beb72475c7edcf1733c1c68b",
                "patch_url": "https://git.kernel.org/stable/p/80d505aee6398cf8beb72475c7edcf1733c1c68b",
                "filename": "CVE-2021-47353-80d505aee6398cf8beb72475c7edcf1733c1c68b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47353/CVE-2021-47353-80d505aee6398cf8beb72475c7edcf1733c1c68b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aebed6b19e51a34003d998da5ebb1dfdd2cb1d02",
                "patch_url": "https://git.kernel.org/stable/p/aebed6b19e51a34003d998da5ebb1dfdd2cb1d02",
                "filename": "CVE-2021-47353-aebed6b19e51a34003d998da5ebb1dfdd2cb1d02.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47353/CVE-2021-47353-aebed6b19e51a34003d998da5ebb1dfdd2cb1d02.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/baea588a42d675e35daeaddd10fbc9700550bc4d",
                "patch_url": "https://git.kernel.org/stable/p/baea588a42d675e35daeaddd10fbc9700550bc4d",
                "filename": "CVE-2021-47353-baea588a42d675e35daeaddd10fbc9700550bc4d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47353/CVE-2021-47353-baea588a42d675e35daeaddd10fbc9700550bc4d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fa236c2b2d4436d9f19ee4e5d5924e90ffd7bb43",
                "patch_url": "https://git.kernel.org/stable/p/fa236c2b2d4436d9f19ee4e5d5924e90ffd7bb43",
                "filename": "CVE-2021-47353-fa236c2b2d4436d9f19ee4e5d5924e90ffd7bb43.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47353/CVE-2021-47353-fa236c2b2d4436d9f19ee4e5d5924e90ffd7bb43.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/21bf1414580c36ffc8d8de043beb3508cf812238",
            "https://git.kernel.org/stable/c/2f3d9ddd32a28803baa547e6274983b67d5e287c",
            "https://git.kernel.org/stable/c/3638705ecd5ad2785e996f820121c0ad15ce64b5",
            "https://git.kernel.org/stable/c/371566f63cbd0bb6fbb25b8fe9d5798268d35af9",
            "https://git.kernel.org/stable/c/5150877e4d99f85057a458daac7cd7c01005d5c6",
            "https://git.kernel.org/stable/c/80d505aee6398cf8beb72475c7edcf1733c1c68b",
            "https://git.kernel.org/stable/c/aebed6b19e51a34003d998da5ebb1dfdd2cb1d02",
            "https://git.kernel.org/stable/c/baea588a42d675e35daeaddd10fbc9700550bc4d",
            "https://git.kernel.org/stable/c/fa236c2b2d4436d9f19ee4e5d5924e90ffd7bb43",
            "https://www.cve.org/CVERecord?id=CVE-2021-47353\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47353\nhttps://lore.kernel.org/linux-cve-announce/2024052141-CVE-2021-47353-8d3a@gregkh/T"
        ]
    },
    "CVE-2021-47356": {
        "cve": "CVE-2021-47356",
        "cvss_v2": null,
        "cvss_v3": 7.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmISDN: fix possible use-after-free in HFC_cleanup()\n\nThis module's remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver's remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47356",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/5f2818185da0fe82a932f0856633038b66faf124",
            "patch_url": "https://git.kernel.org/stable/p/5f2818185da0fe82a932f0856633038b66faf124",
            "filename": "CVE-2021-47356-5f2818185da0fe82a932f0856633038b66faf124.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47356/CVE-2021-47356-5f2818185da0fe82a932f0856633038b66faf124.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/009fc857c5f6fda81f2f7dd851b2d54193a8e733",
                "patch_url": "https://git.kernel.org/stable/p/009fc857c5f6fda81f2f7dd851b2d54193a8e733",
                "filename": "CVE-2021-47356-009fc857c5f6fda81f2f7dd851b2d54193a8e733.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47356/CVE-2021-47356-009fc857c5f6fda81f2f7dd851b2d54193a8e733.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3ecd228c636ee17c14662729737fa07242a93cb0",
                "patch_url": "https://git.kernel.org/stable/p/3ecd228c636ee17c14662729737fa07242a93cb0",
                "filename": "CVE-2021-47356-3ecd228c636ee17c14662729737fa07242a93cb0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47356/CVE-2021-47356-3ecd228c636ee17c14662729737fa07242a93cb0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/49331c07ef0f8fdfa42b30ba6a83a657b29d7fbe",
                "patch_url": "https://git.kernel.org/stable/p/49331c07ef0f8fdfa42b30ba6a83a657b29d7fbe",
                "filename": "CVE-2021-47356-49331c07ef0f8fdfa42b30ba6a83a657b29d7fbe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47356/CVE-2021-47356-49331c07ef0f8fdfa42b30ba6a83a657b29d7fbe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/54ff3202928952a100c477248e65ac6db01258a7",
                "patch_url": "https://git.kernel.org/stable/p/54ff3202928952a100c477248e65ac6db01258a7",
                "filename": "CVE-2021-47356-54ff3202928952a100c477248e65ac6db01258a7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47356/CVE-2021-47356-54ff3202928952a100c477248e65ac6db01258a7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5f2818185da0fe82a932f0856633038b66faf124",
                "patch_url": "https://git.kernel.org/stable/p/5f2818185da0fe82a932f0856633038b66faf124",
                "filename": "CVE-2021-47356-5f2818185da0fe82a932f0856633038b66faf124.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47356/CVE-2021-47356-5f2818185da0fe82a932f0856633038b66faf124.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/61370ff07e0acc657559a8fac02551dfeb9d3020",
                "patch_url": "https://git.kernel.org/stable/p/61370ff07e0acc657559a8fac02551dfeb9d3020",
                "filename": "CVE-2021-47356-61370ff07e0acc657559a8fac02551dfeb9d3020.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47356/CVE-2021-47356-61370ff07e0acc657559a8fac02551dfeb9d3020.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7867ddc5f3de7f289aee63233afc0df4b62834c5",
                "patch_url": "https://git.kernel.org/stable/p/7867ddc5f3de7f289aee63233afc0df4b62834c5",
                "filename": "CVE-2021-47356-7867ddc5f3de7f289aee63233afc0df4b62834c5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47356/CVE-2021-47356-7867ddc5f3de7f289aee63233afc0df4b62834c5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7ee9ae1e0cf55a037c4a99af2acc5d78cb7802d",
                "patch_url": "https://git.kernel.org/stable/p/b7ee9ae1e0cf55a037c4a99af2acc5d78cb7802d",
                "filename": "CVE-2021-47356-b7ee9ae1e0cf55a037c4a99af2acc5d78cb7802d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47356/CVE-2021-47356-b7ee9ae1e0cf55a037c4a99af2acc5d78cb7802d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ed7c3739d0a07e2ec3ccbffe7e93cea01c438cda",
                "patch_url": "https://git.kernel.org/stable/p/ed7c3739d0a07e2ec3ccbffe7e93cea01c438cda",
                "filename": "CVE-2021-47356-ed7c3739d0a07e2ec3ccbffe7e93cea01c438cda.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47356/CVE-2021-47356-ed7c3739d0a07e2ec3ccbffe7e93cea01c438cda.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/009fc857c5f6fda81f2f7dd851b2d54193a8e733",
            "https://git.kernel.org/stable/c/3ecd228c636ee17c14662729737fa07242a93cb0",
            "https://git.kernel.org/stable/c/49331c07ef0f8fdfa42b30ba6a83a657b29d7fbe",
            "https://git.kernel.org/stable/c/54ff3202928952a100c477248e65ac6db01258a7",
            "https://git.kernel.org/stable/c/5f2818185da0fe82a932f0856633038b66faf124",
            "https://git.kernel.org/stable/c/61370ff07e0acc657559a8fac02551dfeb9d3020",
            "https://git.kernel.org/stable/c/7867ddc5f3de7f289aee63233afc0df4b62834c5",
            "https://git.kernel.org/stable/c/b7ee9ae1e0cf55a037c4a99af2acc5d78cb7802d",
            "https://git.kernel.org/stable/c/ed7c3739d0a07e2ec3ccbffe7e93cea01c438cda",
            "https://www.cve.org/CVERecord?id=CVE-2021-47356\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47356\nhttps://lore.kernel.org/linux-cve-announce/2024052142-CVE-2021-47356-a3d4@gregkh/T"
        ]
    },
    "CVE-2021-47373": {
        "cve": "CVE-2021-47373",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v3-its: Fix potential VPE leak on error\n\nIn its_vpe_irq_domain_alloc, when its_vpe_init() returns an error,\nthere is an off-by-one in the number of VPEs to be freed.\n\nFix it by simply passing the number of VPEs allocated, which is the\nindex of the loop iterating over the VPEs.\n\n[maz: fixed commit message]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47373",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/280bef512933b2dda01d681d8cbe499b98fc5bdd",
            "patch_url": "https://git.kernel.org/stable/p/280bef512933b2dda01d681d8cbe499b98fc5bdd",
            "filename": "CVE-2021-47373-280bef512933b2dda01d681d8cbe499b98fc5bdd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47373/CVE-2021-47373-280bef512933b2dda01d681d8cbe499b98fc5bdd.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/280bef512933b2dda01d681d8cbe499b98fc5bdd",
                "patch_url": "https://git.kernel.org/stable/p/280bef512933b2dda01d681d8cbe499b98fc5bdd",
                "filename": "CVE-2021-47373-280bef512933b2dda01d681d8cbe499b98fc5bdd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47373/CVE-2021-47373-280bef512933b2dda01d681d8cbe499b98fc5bdd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/42d3711c23781045e7a5cd28536c774b9a66d20b",
                "patch_url": "https://git.kernel.org/stable/p/42d3711c23781045e7a5cd28536c774b9a66d20b",
                "filename": "CVE-2021-47373-42d3711c23781045e7a5cd28536c774b9a66d20b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47373/CVE-2021-47373-42d3711c23781045e7a5cd28536c774b9a66d20b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/568662e37f927e3dc3e475f3ff7cf4ab7719c5e7",
                "patch_url": "https://git.kernel.org/stable/p/568662e37f927e3dc3e475f3ff7cf4ab7719c5e7",
                "filename": "CVE-2021-47373-568662e37f927e3dc3e475f3ff7cf4ab7719c5e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47373/CVE-2021-47373-568662e37f927e3dc3e475f3ff7cf4ab7719c5e7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5701e8bff314c155e7afdc467b1e0389d86853d0",
                "patch_url": "https://git.kernel.org/stable/p/5701e8bff314c155e7afdc467b1e0389d86853d0",
                "filename": "CVE-2021-47373-5701e8bff314c155e7afdc467b1e0389d86853d0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47373/CVE-2021-47373-5701e8bff314c155e7afdc467b1e0389d86853d0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7d39992d45acd6f2d6b2f62389c55b61fb3d486b",
                "patch_url": "https://git.kernel.org/stable/p/7d39992d45acd6f2d6b2f62389c55b61fb3d486b",
                "filename": "CVE-2021-47373-7d39992d45acd6f2d6b2f62389c55b61fb3d486b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47373/CVE-2021-47373-7d39992d45acd6f2d6b2f62389c55b61fb3d486b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e0c1c2e5da19685a20557a50f10c6aa4fa26aa84",
                "patch_url": "https://git.kernel.org/stable/p/e0c1c2e5da19685a20557a50f10c6aa4fa26aa84",
                "filename": "CVE-2021-47373-e0c1c2e5da19685a20557a50f10c6aa4fa26aa84.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47373/CVE-2021-47373-e0c1c2e5da19685a20557a50f10c6aa4fa26aa84.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/280bef512933b2dda01d681d8cbe499b98fc5bdd",
            "https://git.kernel.org/stable/c/42d3711c23781045e7a5cd28536c774b9a66d20b",
            "https://git.kernel.org/stable/c/568662e37f927e3dc3e475f3ff7cf4ab7719c5e7",
            "https://git.kernel.org/stable/c/5701e8bff314c155e7afdc467b1e0389d86853d0",
            "https://git.kernel.org/stable/c/7d39992d45acd6f2d6b2f62389c55b61fb3d486b",
            "https://git.kernel.org/stable/c/e0c1c2e5da19685a20557a50f10c6aa4fa26aa84"
        ]
    },
    "CVE-2021-47383": {
        "cve": "CVE-2021-47383",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: Fix out-of-bound vmalloc access in imageblit\n\nThis issue happens when a userspace program does an ioctl\nFBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct\ncontaining only the fields xres, yres, and bits_per_pixel\nwith values.\n\nIf this struct is the same as the previous ioctl, the\nvc_resize() detects it and doesn't call the resize_screen(),\nleaving the fb_var_screeninfo incomplete. And this leads to\nthe updatescrollmode() calculates a wrong value to\nfbcon_display->vrows, which makes the real_y() return a\nwrong value of y, and that value, eventually, causes\nthe imageblit to access an out-of-bound address value.\n\nTo solve this issue I made the resize_screen() be called\neven if the screen does not need any resizing, so it will\n\"fix and fill\" the fb_var_screeninfo independently.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47383",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/7e71fcedfda6f7de18f850a6b36e78d78b04476f",
            "patch_url": "https://git.kernel.org/stable/p/7e71fcedfda6f7de18f850a6b36e78d78b04476f",
            "filename": "CVE-2021-47383-7e71fcedfda6f7de18f850a6b36e78d78b04476f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47383/CVE-2021-47383-7e71fcedfda6f7de18f850a6b36e78d78b04476f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/067c694d06040db6f0c65281bb358452ca6d85b9",
                "patch_url": "https://git.kernel.org/stable/p/067c694d06040db6f0c65281bb358452ca6d85b9",
                "filename": "CVE-2021-47383-067c694d06040db6f0c65281bb358452ca6d85b9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47383/CVE-2021-47383-067c694d06040db6f0c65281bb358452ca6d85b9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3b0c406124719b625b1aba431659f5cdc24a982c",
                "patch_url": "https://git.kernel.org/stable/p/3b0c406124719b625b1aba431659f5cdc24a982c",
                "filename": "CVE-2021-47383-3b0c406124719b625b1aba431659f5cdc24a982c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47383/CVE-2021-47383-3b0c406124719b625b1aba431659f5cdc24a982c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/699d926585daa6ec44be556cdc1ab89e5d54557b",
                "patch_url": "https://git.kernel.org/stable/p/699d926585daa6ec44be556cdc1ab89e5d54557b",
                "filename": "CVE-2021-47383-699d926585daa6ec44be556cdc1ab89e5d54557b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47383/CVE-2021-47383-699d926585daa6ec44be556cdc1ab89e5d54557b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/70aed03b1d5a5df974f456cdc8eedb213c94bb8b",
                "patch_url": "https://git.kernel.org/stable/p/70aed03b1d5a5df974f456cdc8eedb213c94bb8b",
                "filename": "CVE-2021-47383-70aed03b1d5a5df974f456cdc8eedb213c94bb8b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47383/CVE-2021-47383-70aed03b1d5a5df974f456cdc8eedb213c94bb8b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7e71fcedfda6f7de18f850a6b36e78d78b04476f",
                "patch_url": "https://git.kernel.org/stable/p/7e71fcedfda6f7de18f850a6b36e78d78b04476f",
                "filename": "CVE-2021-47383-7e71fcedfda6f7de18f850a6b36e78d78b04476f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47383/CVE-2021-47383-7e71fcedfda6f7de18f850a6b36e78d78b04476f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/883f7897a25e3ce14a7f274ca4c73f49ac84002a",
                "patch_url": "https://git.kernel.org/stable/p/883f7897a25e3ce14a7f274ca4c73f49ac84002a",
                "filename": "CVE-2021-47383-883f7897a25e3ce14a7f274ca4c73f49ac84002a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47383/CVE-2021-47383-883f7897a25e3ce14a7f274ca4c73f49ac84002a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8a6a240f52e14356386030d8958ae8b1761d2325",
                "patch_url": "https://git.kernel.org/stable/p/8a6a240f52e14356386030d8958ae8b1761d2325",
                "filename": "CVE-2021-47383-8a6a240f52e14356386030d8958ae8b1761d2325.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47383/CVE-2021-47383-8a6a240f52e14356386030d8958ae8b1761d2325.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d570c48dd37dbe8fc6875d4461d01a9554ae2560",
                "patch_url": "https://git.kernel.org/stable/p/d570c48dd37dbe8fc6875d4461d01a9554ae2560",
                "filename": "CVE-2021-47383-d570c48dd37dbe8fc6875d4461d01a9554ae2560.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47383/CVE-2021-47383-d570c48dd37dbe8fc6875d4461d01a9554ae2560.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/067c694d06040db6f0c65281bb358452ca6d85b9",
            "https://git.kernel.org/stable/c/3b0c406124719b625b1aba431659f5cdc24a982c",
            "https://git.kernel.org/stable/c/699d926585daa6ec44be556cdc1ab89e5d54557b",
            "https://git.kernel.org/stable/c/70aed03b1d5a5df974f456cdc8eedb213c94bb8b",
            "https://git.kernel.org/stable/c/7e71fcedfda6f7de18f850a6b36e78d78b04476f",
            "https://git.kernel.org/stable/c/883f7897a25e3ce14a7f274ca4c73f49ac84002a",
            "https://git.kernel.org/stable/c/8a6a240f52e14356386030d8958ae8b1761d2325",
            "https://git.kernel.org/stable/c/d570c48dd37dbe8fc6875d4461d01a9554ae2560",
            "https://www.cve.org/CVERecord?id=CVE-2021-47383\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47383\nhttps://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47383-a8f4@gregkh/T"
        ]
    },
    "CVE-2021-47384": {
        "cve": "CVE-2021-47384",
        "cvss_v2": null,
        "cvss_v3": 5.3,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field\n\nIf driver read tmp value sufficient for\n(tmp & 0x08) && (!(tmp & 0x80)) && ((tmp & 0x7) == ((tmp >> 4) & 0x7))\nfrom device then Null pointer dereference occurs.\n(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)\nAlso lm75[] does not serve a purpose anymore after switching to\ndevm_i2c_new_dummy_device() in w83791d_detect_subclients().\n\nThe patch fixes possible NULL pointer dereference by removing lm75[].\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[groeck: Dropped unnecessary continuation lines, fixed multi-line alignments]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47384",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6cb01fe630eaffc5a2c3f7364436caddba286623",
            "patch_url": "https://git.kernel.org/stable/p/6cb01fe630eaffc5a2c3f7364436caddba286623",
            "filename": "CVE-2021-47384-6cb01fe630eaffc5a2c3f7364436caddba286623.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47384/CVE-2021-47384-6cb01fe630eaffc5a2c3f7364436caddba286623.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/6cb01fe630eaffc5a2c3f7364436caddba286623",
                "patch_url": "https://git.kernel.org/stable/p/6cb01fe630eaffc5a2c3f7364436caddba286623",
                "filename": "CVE-2021-47384-6cb01fe630eaffc5a2c3f7364436caddba286623.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47384/CVE-2021-47384-6cb01fe630eaffc5a2c3f7364436caddba286623.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/746011193f44f97f8784edcf8327c587946745fc",
                "patch_url": "https://git.kernel.org/stable/p/746011193f44f97f8784edcf8327c587946745fc",
                "filename": "CVE-2021-47384-746011193f44f97f8784edcf8327c587946745fc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47384/CVE-2021-47384-746011193f44f97f8784edcf8327c587946745fc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7c4fd5de39f273626a2b0f3a446d2cc85cd47616",
                "patch_url": "https://git.kernel.org/stable/p/7c4fd5de39f273626a2b0f3a446d2cc85cd47616",
                "filename": "CVE-2021-47384-7c4fd5de39f273626a2b0f3a446d2cc85cd47616.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47384/CVE-2021-47384-7c4fd5de39f273626a2b0f3a446d2cc85cd47616.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dd4d747ef05addab887dc8ff0d6ab9860bbcd783",
                "patch_url": "https://git.kernel.org/stable/p/dd4d747ef05addab887dc8ff0d6ab9860bbcd783",
                "filename": "CVE-2021-47384-dd4d747ef05addab887dc8ff0d6ab9860bbcd783.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47384/CVE-2021-47384-dd4d747ef05addab887dc8ff0d6ab9860bbcd783.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/6cb01fe630eaffc5a2c3f7364436caddba286623",
            "https://git.kernel.org/stable/c/746011193f44f97f8784edcf8327c587946745fc",
            "https://git.kernel.org/stable/c/7c4fd5de39f273626a2b0f3a446d2cc85cd47616",
            "https://git.kernel.org/stable/c/dd4d747ef05addab887dc8ff0d6ab9860bbcd783",
            "https://www.cve.org/CVERecord?id=CVE-2021-47384\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47384\nhttps://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47384-f311@gregkh/T"
        ]
    },
    "CVE-2021-47385": {
        "cve": "CVE-2021-47385",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field\n\nIf driver read val value sufficient for\n(val & 0x08) && (!(val & 0x80)) && ((val & 0x7) == ((val >> 4) & 0x7))\nfrom device then Null pointer dereference occurs.\n(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)\nAlso lm75[] does not serve a purpose anymore after switching to\ndevm_i2c_new_dummy_device() in w83791d_detect_subclients().\n\nThe patch fixes possible NULL pointer dereference by removing lm75[].\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[groeck: Dropped unnecessary continuation lines, fixed multipline alignment]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47385",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/200ced5ba724d8bbf29dfac4ed1e17a39ccaccd1",
            "patch_url": "https://git.kernel.org/stable/p/200ced5ba724d8bbf29dfac4ed1e17a39ccaccd1",
            "filename": "CVE-2021-47385-200ced5ba724d8bbf29dfac4ed1e17a39ccaccd1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47385/CVE-2021-47385-200ced5ba724d8bbf29dfac4ed1e17a39ccaccd1.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0f36b88173f028e372668ae040ab1a496834d278",
                "patch_url": "https://git.kernel.org/stable/p/0f36b88173f028e372668ae040ab1a496834d278",
                "filename": "CVE-2021-47385-0f36b88173f028e372668ae040ab1a496834d278.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47385/CVE-2021-47385-0f36b88173f028e372668ae040ab1a496834d278.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1499bb2c3a87a2efea0065adab2bd66badee61c3",
                "patch_url": "https://git.kernel.org/stable/p/1499bb2c3a87a2efea0065adab2bd66badee61c3",
                "filename": "CVE-2021-47385-1499bb2c3a87a2efea0065adab2bd66badee61c3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47385/CVE-2021-47385-1499bb2c3a87a2efea0065adab2bd66badee61c3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/200ced5ba724d8bbf29dfac4ed1e17a39ccaccd1",
                "patch_url": "https://git.kernel.org/stable/p/200ced5ba724d8bbf29dfac4ed1e17a39ccaccd1",
                "filename": "CVE-2021-47385-200ced5ba724d8bbf29dfac4ed1e17a39ccaccd1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47385/CVE-2021-47385-200ced5ba724d8bbf29dfac4ed1e17a39ccaccd1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/24af1fe376e22c42238a4a604d31e46c486876c3",
                "patch_url": "https://git.kernel.org/stable/p/24af1fe376e22c42238a4a604d31e46c486876c3",
                "filename": "CVE-2021-47385-24af1fe376e22c42238a4a604d31e46c486876c3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47385/CVE-2021-47385-24af1fe376e22c42238a4a604d31e46c486876c3.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0f36b88173f028e372668ae040ab1a496834d278",
            "https://git.kernel.org/stable/c/1499bb2c3a87a2efea0065adab2bd66badee61c3",
            "https://git.kernel.org/stable/c/200ced5ba724d8bbf29dfac4ed1e17a39ccaccd1",
            "https://git.kernel.org/stable/c/24af1fe376e22c42238a4a604d31e46c486876c3",
            "https://www.cve.org/CVERecord?id=CVE-2021-47385\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47385\nhttps://lore.kernel.org/linux-cve-announce/2024052144-CVE-2021-47385-a7e7@gregkh/T"
        ]
    },
    "CVE-2021-47386": {
        "cve": "CVE-2021-47386",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field\n\nIf driver read val value sufficient for\n(val & 0x08) && (!(val & 0x80)) && ((val & 0x7) == ((val >> 4) & 0x7))\nfrom device then Null pointer dereference occurs.\n(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)\nAlso lm75[] does not serve a purpose anymore after switching to\ndevm_i2c_new_dummy_device() in w83791d_detect_subclients().\n\nThe patch fixes possible NULL pointer dereference by removing lm75[].\n\nFound by Linux Driver Verification project (linuxtesting.org).\n\n[groeck: Dropped unnecessary continuation lines, fixed multi-line alignment]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47386",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/44d3c480e4e2a75bf6296a18b4356157991ccd80",
            "patch_url": "https://git.kernel.org/stable/p/44d3c480e4e2a75bf6296a18b4356157991ccd80",
            "filename": "CVE-2021-47386-44d3c480e4e2a75bf6296a18b4356157991ccd80.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47386/CVE-2021-47386-44d3c480e4e2a75bf6296a18b4356157991ccd80.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/16887ae4e3defd2c4e7913b6c539f33eaf4eac5c",
                "patch_url": "https://git.kernel.org/stable/p/16887ae4e3defd2c4e7913b6c539f33eaf4eac5c",
                "filename": "CVE-2021-47386-16887ae4e3defd2c4e7913b6c539f33eaf4eac5c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47386/CVE-2021-47386-16887ae4e3defd2c4e7913b6c539f33eaf4eac5c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/44d3c480e4e2a75bf6296a18b4356157991ccd80",
                "patch_url": "https://git.kernel.org/stable/p/44d3c480e4e2a75bf6296a18b4356157991ccd80",
                "filename": "CVE-2021-47386-44d3c480e4e2a75bf6296a18b4356157991ccd80.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47386/CVE-2021-47386-44d3c480e4e2a75bf6296a18b4356157991ccd80.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/516d9055039017a20a698103be2b556b4c976bb8",
                "patch_url": "https://git.kernel.org/stable/p/516d9055039017a20a698103be2b556b4c976bb8",
                "filename": "CVE-2021-47386-516d9055039017a20a698103be2b556b4c976bb8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47386/CVE-2021-47386-516d9055039017a20a698103be2b556b4c976bb8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/943c15ac1b84d378da26bba41c83c67e16499ac4",
                "patch_url": "https://git.kernel.org/stable/p/943c15ac1b84d378da26bba41c83c67e16499ac4",
                "filename": "CVE-2021-47386-943c15ac1b84d378da26bba41c83c67e16499ac4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47386/CVE-2021-47386-943c15ac1b84d378da26bba41c83c67e16499ac4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/16887ae4e3defd2c4e7913b6c539f33eaf4eac5c",
            "https://git.kernel.org/stable/c/44d3c480e4e2a75bf6296a18b4356157991ccd80",
            "https://git.kernel.org/stable/c/516d9055039017a20a698103be2b556b4c976bb8",
            "https://git.kernel.org/stable/c/943c15ac1b84d378da26bba41c83c67e16499ac4",
            "https://www.cve.org/CVERecord?id=CVE-2021-47386\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47386\nhttps://lore.kernel.org/linux-cve-announce/2024052145-CVE-2021-47386-2701@gregkh/T"
        ]
    },
    "CVE-2021-47393": {
        "cve": "CVE-2021-47393",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs\n\nFan speed minimum can be enforced from sysfs. For example, setting\ncurrent fan speed to 20 is used to enforce fan speed to be at 100%\nspeed, 19 - to be not below 90% speed, etcetera. This feature provides\nability to limit fan speed according to some system wise\nconsiderations, like absence of some replaceable units or high system\nambient temperature.\n\nRequest for changing fan minimum speed is configuration request and can\nbe set only through 'sysfs' write procedure. In this situation value of\nargument 'state' is above nominal fan speed maximum.\n\nReturn non-zero code in this case to avoid\nthermal_cooling_device_stats_update() call, because in this case\nstatistics update violates thermal statistics table range.\nThe issues is observed in case kernel is configured with option\nCONFIG_THERMAL_STATISTICS.\n\nHere is the trace from KASAN:\n[  159.506659] BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x7d/0xb0\n[  159.516016] Read of size 4 at addr ffff888116163840 by task hw-management.s/7444\n[  159.545625] Call Trace:\n[  159.548366]  dump_stack+0x92/0xc1\n[  159.552084]  ? thermal_cooling_device_stats_update+0x7d/0xb0\n[  159.635869]  thermal_zone_device_update+0x345/0x780\n[  159.688711]  thermal_zone_device_set_mode+0x7d/0xc0\n[  159.694174]  mlxsw_thermal_modules_init+0x48f/0x590 [mlxsw_core]\n[  159.700972]  ? mlxsw_thermal_set_cur_state+0x5a0/0x5a0 [mlxsw_core]\n[  159.731827]  mlxsw_thermal_init+0x763/0x880 [mlxsw_core]\n[  160.070233] RIP: 0033:0x7fd995909970\n[  160.074239] Code: 73 01 c3 48 8b 0d 28 d5 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 99 2d 2c 00 00 75 10 b8 01 00 00 00 0f 05 <48> 3d 01 f0 ff ..\n[  160.095242] RSP: 002b:00007fff54f5d938 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[  160.103722] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 00007fd995909970\n[  160.111710] RDX: 0000000000000013 RSI: 0000000001906008 RDI: 0000000000000001\n[  160.119699] RBP: 0000000001906008 R08: 00007fd995bc9760 R09: 00007fd996210700\n[  160.127687] R10: 0000000000000073 R11: 0000000000000246 R12: 0000000000000013\n[  160.135673] R13: 0000000000000001 R14: 00007fd995bc8600 R15: 0000000000000013\n[  160.143671]\n[  160.145338] Allocated by task 2924:\n[  160.149242]  kasan_save_stack+0x19/0x40\n[  160.153541]  __kasan_kmalloc+0x7f/0xa0\n[  160.157743]  __kmalloc+0x1a2/0x2b0\n[  160.161552]  thermal_cooling_device_setup_sysfs+0xf9/0x1a0\n[  160.167687]  __thermal_cooling_device_register+0x1b5/0x500\n[  160.173833]  devm_thermal_of_cooling_device_register+0x60/0xa0\n[  160.180356]  mlxreg_fan_probe+0x474/0x5e0 [mlxreg_fan]\n[  160.248140]\n[  160.249807] The buggy address belongs to the object at ffff888116163400\n[  160.249807]  which belongs to the cache kmalloc-1k of size 1024\n[  160.263814] The buggy address is located 64 bytes to the right of\n[  160.263814]  1024-byte region [ffff888116163400, ffff888116163800)\n[  160.277536] The buggy address belongs to the page:\n[  160.282898] page:0000000012275840 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888116167000 pfn:0x116160\n[  160.294872] head:0000000012275840 order:3 compound_mapcount:0 compound_pincount:0\n[  160.303251] flags: 0x200000000010200(slab|head|node=0|zone=2)\n[  160.309694] raw: 0200000000010200 ffffea00046f7208 ffffea0004928208 ffff88810004dbc0\n[  160.318367] raw: ffff888116167000 00000000000a0006 00000001ffffffff 0000000000000000\n[  160.327033] page dumped because: kasan: bad access detected\n[  160.333270]\n[  160.334937] Memory state around the buggy address:\n[  160.356469] >ffff888116163800: fc ..",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47393",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/aa85fb7bde558bb2e364e85976b14b259c8b6fe8",
            "patch_url": "https://git.kernel.org/stable/p/aa85fb7bde558bb2e364e85976b14b259c8b6fe8",
            "filename": "CVE-2021-47393-aa85fb7bde558bb2e364e85976b14b259c8b6fe8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47393/CVE-2021-47393-aa85fb7bde558bb2e364e85976b14b259c8b6fe8.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/5c6e0bce647d9cb32a17d58ffa669b3421fcc6ca",
                "patch_url": "https://git.kernel.org/stable/p/5c6e0bce647d9cb32a17d58ffa669b3421fcc6ca",
                "filename": "CVE-2021-47393-5c6e0bce647d9cb32a17d58ffa669b3421fcc6ca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47393/CVE-2021-47393-5c6e0bce647d9cb32a17d58ffa669b3421fcc6ca.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/76bbb482d33bfcd7e9070ecf594c9ec73e01c930",
                "patch_url": "https://git.kernel.org/stable/p/76bbb482d33bfcd7e9070ecf594c9ec73e01c930",
                "filename": "CVE-2021-47393-76bbb482d33bfcd7e9070ecf594c9ec73e01c930.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47393/CVE-2021-47393-76bbb482d33bfcd7e9070ecf594c9ec73e01c930.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a6c42ae1530f94724d3c42cf91fe3d3c5e394f8a",
                "patch_url": "https://git.kernel.org/stable/p/a6c42ae1530f94724d3c42cf91fe3d3c5e394f8a",
                "filename": "CVE-2021-47393-a6c42ae1530f94724d3c42cf91fe3d3c5e394f8a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47393/CVE-2021-47393-a6c42ae1530f94724d3c42cf91fe3d3c5e394f8a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aa85fb7bde558bb2e364e85976b14b259c8b6fe8",
                "patch_url": "https://git.kernel.org/stable/p/aa85fb7bde558bb2e364e85976b14b259c8b6fe8",
                "filename": "CVE-2021-47393-aa85fb7bde558bb2e364e85976b14b259c8b6fe8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47393/CVE-2021-47393-aa85fb7bde558bb2e364e85976b14b259c8b6fe8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e6fab7af6ba1bc77c78713a83876f60ca7a4a064",
                "patch_url": "https://git.kernel.org/stable/p/e6fab7af6ba1bc77c78713a83876f60ca7a4a064",
                "filename": "CVE-2021-47393-e6fab7af6ba1bc77c78713a83876f60ca7a4a064.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47393/CVE-2021-47393-e6fab7af6ba1bc77c78713a83876f60ca7a4a064.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/5c6e0bce647d9cb32a17d58ffa669b3421fcc6ca",
            "https://git.kernel.org/stable/c/76bbb482d33bfcd7e9070ecf594c9ec73e01c930",
            "https://git.kernel.org/stable/c/a6c42ae1530f94724d3c42cf91fe3d3c5e394f8a",
            "https://git.kernel.org/stable/c/aa85fb7bde558bb2e364e85976b14b259c8b6fe8",
            "https://git.kernel.org/stable/c/e6fab7af6ba1bc77c78713a83876f60ca7a4a064",
            "https://www.cve.org/CVERecord?id=CVE-2021-47393\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47393\nhttps://lore.kernel.org/linux-cve-announce/2024052147-CVE-2021-47393-ea1c@gregkh/T"
        ]
    },
    "CVE-2021-47408": {
        "cve": "CVE-2021-47408",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: conntrack: serialize hash resizes and cleanups\n\nSyzbot was able to trigger the following warning [1]\n\nNo repro found by syzbot yet but I was able to trigger similar issue\nby having 2 scripts running in parallel, changing conntrack hash sizes,\nand:\n\nfor j in `seq 1 1000` ; do unshare -n /bin/true >/dev/null ; done\n\nIt would take more than 5 minutes for net_namespace structures\nto be cleaned up.\n\nThis is because nf_ct_iterate_cleanup() has to restart everytime\na resize happened.\n\nBy adding a mutex, we can serialize hash resizes and cleanups\nand also make get_next_corpse() faster by skipping over empty\nbuckets.\n\nEven without resizes in the picture, this patch considerably\nspeeds up network namespace dismantles.\n\n[1]\nINFO: task syz-executor.0:8312 can't die for more than 144 seconds.\ntask:syz-executor.0  state:R  running task     stack:25672 pid: 8312 ppid:  6573 flags:0x00004006\nCall Trace:\n context_switch kernel/sched/core.c:4955 [inline]\n __schedule+0x940/0x26f0 kernel/sched/core.c:6236\n preempt_schedule_common+0x45/0xc0 kernel/sched/core.c:6408\n preempt_schedule_thunk+0x16/0x18 arch/x86/entry/thunk_64.S:35\n __local_bh_enable_ip+0x109/0x120 kernel/softirq.c:390\n local_bh_enable include/linux/bottom_half.h:32 [inline]\n get_next_corpse net/netfilter/nf_conntrack_core.c:2252 [inline]\n nf_ct_iterate_cleanup+0x15a/0x450 net/netfilter/nf_conntrack_core.c:2275\n nf_conntrack_cleanup_net_list+0x14c/0x4f0 net/netfilter/nf_conntrack_core.c:2469\n ops_exit_list+0x10d/0x160 net/core/net_namespace.c:171\n setup_net+0x639/0xa30 net/core/net_namespace.c:349\n copy_net_ns+0x319/0x760 net/core/net_namespace.c:470\n create_new_namespaces+0x3f6/0xb20 kernel/nsproxy.c:110\n unshare_nsproxy_namespaces+0xc1/0x1f0 kernel/nsproxy.c:226\n ksys_unshare+0x445/0x920 kernel/fork.c:3128\n __do_sys_unshare kernel/fork.c:3202 [inline]\n __se_sys_unshare kernel/fork.c:3200 [inline]\n __x64_sys_unshare+0x2d/0x40 kernel/fork.c:3200\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f63da68e739\nRSP: 002b:00007f63d7c05188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110\nRAX: ffffffffffffffda RBX: 00007f63da792f80 RCX: 00007f63da68e739\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000\nRBP: 00007f63da6e8cc4 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f63da792f80\nR13: 00007fff50b75d3f R14: 00007f63d7c05300 R15: 0000000000022000\n\nShowing all locks held in the system:\n1 lock held by khungtaskd/27:\n #0: ffffffff8b980020 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6446\n2 locks held by kworker/u4:2/153:\n #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline]\n #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: arch_atomic_long_set include/linux/atomic/atomic-long.h:41 [inline]\n #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: atomic_long_set include/linux/atomic/atomic-instrumented.h:1198 [inline]\n #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:634 [inline]\n #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:661 [inline]\n #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x896/0x1690 kernel/workqueue.c:2268\n #1: ffffc9000140fdb0 ((kfence_timer).work){+.+.}-{0:0}, at: process_one_work+0x8ca/0x1690 kernel/workqueue.c:2272\n1 lock held by systemd-udevd/2970:\n1 lock held by in:imklog/6258:\n #0: ffff88807f970ff0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990\n3 locks held by kworker/1:6/8158:\n1 lock held by syz-executor.0/8312:\n2 locks held by kworker/u4:13/9320:\n1 lock held by\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47408",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/7ea6f5848281182ce0cff6cafdcf3fbdeb8ca7e1",
            "patch_url": "https://git.kernel.org/stable/p/7ea6f5848281182ce0cff6cafdcf3fbdeb8ca7e1",
            "filename": "CVE-2021-47408-7ea6f5848281182ce0cff6cafdcf3fbdeb8ca7e1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47408/CVE-2021-47408-7ea6f5848281182ce0cff6cafdcf3fbdeb8ca7e1.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/7ea6f5848281182ce0cff6cafdcf3fbdeb8ca7e1",
                "patch_url": "https://git.kernel.org/stable/p/7ea6f5848281182ce0cff6cafdcf3fbdeb8ca7e1",
                "filename": "CVE-2021-47408-7ea6f5848281182ce0cff6cafdcf3fbdeb8ca7e1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47408/CVE-2021-47408-7ea6f5848281182ce0cff6cafdcf3fbdeb8ca7e1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e2d192301a0df8160d1555b66ae8611e8050e424",
                "patch_url": "https://git.kernel.org/stable/p/e2d192301a0df8160d1555b66ae8611e8050e424",
                "filename": "CVE-2021-47408-e2d192301a0df8160d1555b66ae8611e8050e424.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47408/CVE-2021-47408-e2d192301a0df8160d1555b66ae8611e8050e424.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e9edc188fc76499b0b9bd60364084037f6d03773",
                "patch_url": "https://git.kernel.org/stable/p/e9edc188fc76499b0b9bd60364084037f6d03773",
                "filename": "CVE-2021-47408-e9edc188fc76499b0b9bd60364084037f6d03773.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47408/CVE-2021-47408-e9edc188fc76499b0b9bd60364084037f6d03773.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/7ea6f5848281182ce0cff6cafdcf3fbdeb8ca7e1",
            "https://git.kernel.org/stable/c/e2d192301a0df8160d1555b66ae8611e8050e424",
            "https://git.kernel.org/stable/c/e9edc188fc76499b0b9bd60364084037f6d03773",
            "https://www.cve.org/CVERecord?id=CVE-2021-47408\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47408\nhttps://lore.kernel.org/linux-cve-announce/2024052151-CVE-2021-47408-ad88@gregkh/T"
        ]
    },
    "CVE-2021-47412": {
        "cve": "CVE-2021-47412",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: don't call rq_qos_ops->done_bio if the bio isn't tracked\n\nrq_qos framework is only applied on request based driver, so:\n\n1) rq_qos_done_bio() needn't to be called for bio based driver\n\n2) rq_qos_done_bio() needn't to be called for bio which isn't tracked,\nsuch as bios ended from error handling code.\n\nEspecially in bio_endio():\n\n1) request queue is referred via bio->bi_bdev->bd_disk->queue, which\nmay be gone since request queue refcount may not be held in above two\ncases\n\n2) q->rq_qos may be freed in blk_cleanup_queue() when calling into\n__rq_qos_done_bio()\n\nFix the potential kernel panic by not calling rq_qos_ops->done_bio if\nthe bio isn't tracked. This way is safe because both ioc_rqos_done_bio()\nand blkcg_iolatency_done_bio() are nop if the bio isn't tracked.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47412",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/db60edbfff332a6a5477c367af8125f034570989",
            "patch_url": "https://git.kernel.org/stable/p/db60edbfff332a6a5477c367af8125f034570989",
            "filename": "CVE-2021-47412-db60edbfff332a6a5477c367af8125f034570989.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47412/CVE-2021-47412-db60edbfff332a6a5477c367af8125f034570989.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/004b8f8a691205a93d9e80d98b786b2b97424d6e",
                "patch_url": "https://git.kernel.org/stable/p/004b8f8a691205a93d9e80d98b786b2b97424d6e",
                "filename": "CVE-2021-47412-004b8f8a691205a93d9e80d98b786b2b97424d6e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47412/CVE-2021-47412-004b8f8a691205a93d9e80d98b786b2b97424d6e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a647a524a46736786c95cdb553a070322ca096e3",
                "patch_url": "https://git.kernel.org/stable/p/a647a524a46736786c95cdb553a070322ca096e3",
                "filename": "CVE-2021-47412-a647a524a46736786c95cdb553a070322ca096e3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47412/CVE-2021-47412-a647a524a46736786c95cdb553a070322ca096e3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/db60edbfff332a6a5477c367af8125f034570989",
                "patch_url": "https://git.kernel.org/stable/p/db60edbfff332a6a5477c367af8125f034570989",
                "filename": "CVE-2021-47412-db60edbfff332a6a5477c367af8125f034570989.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47412/CVE-2021-47412-db60edbfff332a6a5477c367af8125f034570989.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/004b8f8a691205a93d9e80d98b786b2b97424d6e",
            "https://git.kernel.org/stable/c/a647a524a46736786c95cdb553a070322ca096e3",
            "https://git.kernel.org/stable/c/db60edbfff332a6a5477c367af8125f034570989",
            "https://www.cve.org/CVERecord?id=CVE-2021-47412\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47412\nhttps://lore.kernel.org/linux-cve-announce/2024052152-CVE-2021-47412-b362@gregkh/T"
        ]
    },
    "CVE-2021-47432": {
        "cve": "CVE-2021-47432",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nlib/generic-radix-tree.c: Don't overflow in peek()\n\nWhen we started spreading new inode numbers throughout most of the 64\nbit inode space, that triggered some corner case bugs, in particular\nsome integer overflows related to the radix tree code. Oops.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47432",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/784d01f9bbc282abb0c5ade5beb98a87f50343ac",
            "patch_url": "https://git.kernel.org/stable/p/784d01f9bbc282abb0c5ade5beb98a87f50343ac",
            "filename": "CVE-2021-47432-784d01f9bbc282abb0c5ade5beb98a87f50343ac.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47432/CVE-2021-47432-784d01f9bbc282abb0c5ade5beb98a87f50343ac.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/784d01f9bbc282abb0c5ade5beb98a87f50343ac",
                "patch_url": "https://git.kernel.org/stable/p/784d01f9bbc282abb0c5ade5beb98a87f50343ac",
                "filename": "CVE-2021-47432-784d01f9bbc282abb0c5ade5beb98a87f50343ac.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47432/CVE-2021-47432-784d01f9bbc282abb0c5ade5beb98a87f50343ac.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9492261ff2460252cf2d8de89cdf854c7e2b28a0",
                "patch_url": "https://git.kernel.org/stable/p/9492261ff2460252cf2d8de89cdf854c7e2b28a0",
                "filename": "CVE-2021-47432-9492261ff2460252cf2d8de89cdf854c7e2b28a0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47432/CVE-2021-47432-9492261ff2460252cf2d8de89cdf854c7e2b28a0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aa7f1827953100cdde0795289a80c6c077bfe437",
                "patch_url": "https://git.kernel.org/stable/p/aa7f1827953100cdde0795289a80c6c077bfe437",
                "filename": "CVE-2021-47432-aa7f1827953100cdde0795289a80c6c077bfe437.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47432/CVE-2021-47432-aa7f1827953100cdde0795289a80c6c077bfe437.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ec298b958cb0c40d70c68079da933c8f31c5134c",
                "patch_url": "https://git.kernel.org/stable/p/ec298b958cb0c40d70c68079da933c8f31c5134c",
                "filename": "CVE-2021-47432-ec298b958cb0c40d70c68079da933c8f31c5134c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47432/CVE-2021-47432-ec298b958cb0c40d70c68079da933c8f31c5134c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/784d01f9bbc282abb0c5ade5beb98a87f50343ac",
            "https://git.kernel.org/stable/c/9492261ff2460252cf2d8de89cdf854c7e2b28a0",
            "https://git.kernel.org/stable/c/aa7f1827953100cdde0795289a80c6c077bfe437",
            "https://git.kernel.org/stable/c/ec298b958cb0c40d70c68079da933c8f31c5134c",
            "https://www.cve.org/CVERecord?id=CVE-2021-47432\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47432\nhttps://lore.kernel.org/linux-cve-announce/2024052143-CVE-2021-47432-5e69@gregkh/T"
        ]
    },
    "CVE-2021-47441": {
        "cve": "CVE-2021-47441",
        "cvss_v2": null,
        "cvss_v3": 7.3,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: thermal: Fix out-of-bounds memory accesses\n\nCurrently, mlxsw allows cooling states to be set above the maximum\ncooling state supported by the driver:\n\n # cat /sys/class/thermal/thermal_zone2/cdev0/type\n mlxsw_fan\n # cat /sys/class/thermal/thermal_zone2/cdev0/max_state\n 10\n # echo 18 > /sys/class/thermal/thermal_zone2/cdev0/cur_state\n # echo $?\n 0\n\nThis results in out-of-bounds memory accesses when thermal state\ntransition statistics are enabled (CONFIG_THERMAL_STATISTICS=y), as the\ntransition table is accessed with a too large index (state) [1].\n\nAccording to the thermal maintainer, it is the responsibility of the\ndriver to reject such operations [2].\n\nTherefore, return an error when the state to be set exceeds the maximum\ncooling state supported by the driver.\n\nTo avoid dead code, as suggested by the thermal maintainer [3],\npartially revert commit a421ce088ac8 (\"mlxsw: core: Extend cooling\ndevice with cooling levels\") that tried to interpret these invalid\ncooling states (above the maximum) in a special way. The cooling levels\narray is not removed in order to prevent the fans going below 20% PWM,\nwhich would cause them to get stuck at 0% PWM.\n\n[1]\nBUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x271/0x290\nRead of size 4 at addr ffff8881052f7bf8 by task kworker/0:0/5\n\nCPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122\nHardware name: Mellanox Technologies Ltd. \"MSN2410-CB2FO\"/\"SA000874\", BIOS 4.6.5 03/08/2016\nWorkqueue: events_freezable_power_ thermal_zone_device_check\nCall Trace:\n dump_stack_lvl+0x8b/0xb3\n print_address_description.constprop.0+0x1f/0x140\n kasan_report.cold+0x7f/0x11b\n thermal_cooling_device_stats_update+0x271/0x290\n __thermal_cdev_update+0x15e/0x4e0\n thermal_cdev_update+0x9f/0xe0\n step_wise_throttle+0x770/0xee0\n thermal_zone_device_update+0x3f6/0xdf0\n process_one_work+0xa42/0x1770\n worker_thread+0x62f/0x13e0\n kthread+0x3ee/0x4e0\n ret_from_fork+0x1f/0x30\n\nAllocated by task 1:\n kasan_save_stack+0x1b/0x40\n __kasan_kmalloc+0x7c/0x90\n thermal_cooling_device_setup_sysfs+0x153/0x2c0\n __thermal_cooling_device_register.part.0+0x25b/0x9c0\n thermal_cooling_device_register+0xb3/0x100\n mlxsw_thermal_init+0x5c5/0x7e0\n __mlxsw_core_bus_device_register+0xcb3/0x19c0\n mlxsw_core_bus_device_register+0x56/0xb0\n mlxsw_pci_probe+0x54f/0x710\n local_pci_probe+0xc6/0x170\n pci_device_probe+0x2b2/0x4d0\n really_probe+0x293/0xd10\n __driver_probe_device+0x2af/0x440\n driver_probe_device+0x51/0x1e0\n __driver_attach+0x21b/0x530\n bus_for_each_dev+0x14c/0x1d0\n bus_add_driver+0x3ac/0x650\n driver_register+0x241/0x3d0\n mlxsw_sp_module_init+0xa2/0x174\n do_one_initcall+0xee/0x5f0\n kernel_init_freeable+0x45a/0x4de\n kernel_init+0x1f/0x210\n ret_from_fork+0x1f/0x30\n\nThe buggy address belongs to the object at ffff8881052f7800\n which belongs to the cache kmalloc-1k of size 1024\nThe buggy address is located 1016 bytes inside of\n 1024-byte region [ffff8881052f7800, ffff8881052f7c00)\nThe buggy address belongs to the page:\npage:0000000052355272 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f0\nhead:0000000052355272 order:3 compound_mapcount:0 compound_pincount:0\nflags: 0x200000000010200(slab|head|node=0|zone=2)\nraw: 0200000000010200 ffffea0005034800 0000000300000003 ffff888100041dc0\nraw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc\n ffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n>ffff8881052f7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n                                                                ^\n ffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ffff8881052f7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n\n[2] https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67-\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47441",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/e59d839743b50cb1d3f42a786bea48cc5621d254",
            "patch_url": "https://git.kernel.org/stable/p/e59d839743b50cb1d3f42a786bea48cc5621d254",
            "filename": "CVE-2021-47441-e59d839743b50cb1d3f42a786bea48cc5621d254.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47441/CVE-2021-47441-e59d839743b50cb1d3f42a786bea48cc5621d254.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/332fdf951df8b870e3da86b122ae304e2aabe88c",
                "patch_url": "https://git.kernel.org/stable/p/332fdf951df8b870e3da86b122ae304e2aabe88c",
                "filename": "CVE-2021-47441-332fdf951df8b870e3da86b122ae304e2aabe88c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47441/CVE-2021-47441-332fdf951df8b870e3da86b122ae304e2aabe88c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ae0993739e14a102d506aa09e11b0065f3144f10",
                "patch_url": "https://git.kernel.org/stable/p/ae0993739e14a102d506aa09e11b0065f3144f10",
                "filename": "CVE-2021-47441-ae0993739e14a102d506aa09e11b0065f3144f10.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47441/CVE-2021-47441-ae0993739e14a102d506aa09e11b0065f3144f10.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/df8e58716afb3bee2b59de66b1ba1033f2e26303",
                "patch_url": "https://git.kernel.org/stable/p/df8e58716afb3bee2b59de66b1ba1033f2e26303",
                "filename": "CVE-2021-47441-df8e58716afb3bee2b59de66b1ba1033f2e26303.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47441/CVE-2021-47441-df8e58716afb3bee2b59de66b1ba1033f2e26303.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e59d839743b50cb1d3f42a786bea48cc5621d254",
                "patch_url": "https://git.kernel.org/stable/p/e59d839743b50cb1d3f42a786bea48cc5621d254",
                "filename": "CVE-2021-47441-e59d839743b50cb1d3f42a786bea48cc5621d254.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47441/CVE-2021-47441-e59d839743b50cb1d3f42a786bea48cc5621d254.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/332fdf951df8b870e3da86b122ae304e2aabe88c",
            "https://git.kernel.org/stable/c/ae0993739e14a102d506aa09e11b0065f3144f10",
            "https://git.kernel.org/stable/c/df8e58716afb3bee2b59de66b1ba1033f2e26303",
            "https://git.kernel.org/stable/c/e59d839743b50cb1d3f42a786bea48cc5621d254",
            "https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67-"
        ]
    },
    "CVE-2021-47455": {
        "cve": "CVE-2021-47455",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: Fix possible memory leak in ptp_clock_register()\n\nI got memory leak as follows when doing fault injection test:\n\nunreferenced object 0xffff88800906c618 (size 8):\n  comm \"i2c-idt82p33931\", pid 4421, jiffies 4294948083 (age 13.188s)\n  hex dump (first 8 bytes):\n    70 74 70 30 00 00 00 00                          ptp0....\n  backtrace:\n    [<00000000312ed458>] __kmalloc_track_caller+0x19f/0x3a0\n    [<0000000079f6e2ff>] kvasprintf+0xb5/0x150\n    [<0000000026aae54f>] kvasprintf_const+0x60/0x190\n    [<00000000f323a5f7>] kobject_set_name_vargs+0x56/0x150\n    [<000000004e35abdd>] dev_set_name+0xc0/0x100\n    [<00000000f20cfe25>] ptp_clock_register+0x9f4/0xd30 [ptp]\n    [<000000008bb9f0de>] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33]\n\nWhen posix_clock_register() returns an error, the name allocated\nin dev_set_name() will be leaked, the put_device() should be used\nto give up the device reference, then the name will be freed in\nkobject_cleanup() and other memory will be freed in ptp_clock_release().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47455",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4225fea1cb28370086e17e82c0f69bec2779dca0",
            "patch_url": "https://git.kernel.org/stable/p/4225fea1cb28370086e17e82c0f69bec2779dca0",
            "filename": "CVE-2021-47455-4225fea1cb28370086e17e82c0f69bec2779dca0.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47455/CVE-2021-47455-4225fea1cb28370086e17e82c0f69bec2779dca0.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4225fea1cb28370086e17e82c0f69bec2779dca0",
                "patch_url": "https://git.kernel.org/stable/p/4225fea1cb28370086e17e82c0f69bec2779dca0",
                "filename": "CVE-2021-47455-4225fea1cb28370086e17e82c0f69bec2779dca0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47455/CVE-2021-47455-4225fea1cb28370086e17e82c0f69bec2779dca0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/95c0a0c5ec8839f8f21672be786e87a100319ca8",
                "patch_url": "https://git.kernel.org/stable/p/95c0a0c5ec8839f8f21672be786e87a100319ca8",
                "filename": "CVE-2021-47455-95c0a0c5ec8839f8f21672be786e87a100319ca8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47455/CVE-2021-47455-95c0a0c5ec8839f8f21672be786e87a100319ca8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f1c96d8085588e1b997a96214b409ac3be20b524",
                "patch_url": "https://git.kernel.org/stable/p/f1c96d8085588e1b997a96214b409ac3be20b524",
                "filename": "CVE-2021-47455-f1c96d8085588e1b997a96214b409ac3be20b524.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47455/CVE-2021-47455-f1c96d8085588e1b997a96214b409ac3be20b524.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4225fea1cb28370086e17e82c0f69bec2779dca0",
            "https://git.kernel.org/stable/c/95c0a0c5ec8839f8f21672be786e87a100319ca8",
            "https://git.kernel.org/stable/c/f1c96d8085588e1b997a96214b409ac3be20b524",
            "https://www.cve.org/CVERecord?id=CVE-2021-47455\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47455\nhttps://lore.kernel.org/linux-cve-announce/2024052244-CVE-2021-47455-c4a1@gregkh/T"
        ]
    },
    "CVE-2021-47456": {
        "cve": "CVE-2021-47456",
        "cvss_v2": null,
        "cvss_v3": 8.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: peak_pci: peak_pci_remove(): fix UAF\n\nWhen remove the module peek_pci, referencing 'chan' again after\nreleasing 'dev' will cause UAF.\n\nFix this by releasing 'dev' later.\n\nThe following log reveals it:\n\n[   35.961814 ] BUG: KASAN: use-after-free in peak_pci_remove+0x16f/0x270 [peak_pci]\n[   35.963414 ] Read of size 8 at addr ffff888136998ee8 by task modprobe/5537\n[   35.965513 ] Call Trace:\n[   35.965718 ]  dump_stack_lvl+0xa8/0xd1\n[   35.966028 ]  print_address_description+0x87/0x3b0\n[   35.966420 ]  kasan_report+0x172/0x1c0\n[   35.966725 ]  ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[   35.967137 ]  ? trace_irq_enable_rcuidle+0x10/0x170\n[   35.967529 ]  ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[   35.967945 ]  __asan_report_load8_noabort+0x14/0x20\n[   35.968346 ]  peak_pci_remove+0x16f/0x270 [peak_pci]\n[   35.968752 ]  pci_device_remove+0xa9/0x250",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47456",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/34914971bb3244db4ce2be44e9438a9b30c56250",
            "patch_url": "https://git.kernel.org/stable/p/34914971bb3244db4ce2be44e9438a9b30c56250",
            "filename": "CVE-2021-47456-34914971bb3244db4ce2be44e9438a9b30c56250.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47456/CVE-2021-47456-34914971bb3244db4ce2be44e9438a9b30c56250.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0e5afdc2315b0737edcf55bede4ee1640d2d464d",
                "patch_url": "https://git.kernel.org/stable/p/0e5afdc2315b0737edcf55bede4ee1640d2d464d",
                "filename": "CVE-2021-47456-0e5afdc2315b0737edcf55bede4ee1640d2d464d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47456/CVE-2021-47456-0e5afdc2315b0737edcf55bede4ee1640d2d464d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1248582e47a9f7ce0ecd156c39fc61f8b6aa3699",
                "patch_url": "https://git.kernel.org/stable/p/1248582e47a9f7ce0ecd156c39fc61f8b6aa3699",
                "filename": "CVE-2021-47456-1248582e47a9f7ce0ecd156c39fc61f8b6aa3699.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47456/CVE-2021-47456-1248582e47a9f7ce0ecd156c39fc61f8b6aa3699.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1c616528ba4aeb1125a06b407572ab7b56acae38",
                "patch_url": "https://git.kernel.org/stable/p/1c616528ba4aeb1125a06b407572ab7b56acae38",
                "filename": "CVE-2021-47456-1c616528ba4aeb1125a06b407572ab7b56acae38.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47456/CVE-2021-47456-1c616528ba4aeb1125a06b407572ab7b56acae38.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/28f28e4bc3a5e0051faa963f10b778ab38c1db69",
                "patch_url": "https://git.kernel.org/stable/p/28f28e4bc3a5e0051faa963f10b778ab38c1db69",
                "filename": "CVE-2021-47456-28f28e4bc3a5e0051faa963f10b778ab38c1db69.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47456/CVE-2021-47456-28f28e4bc3a5e0051faa963f10b778ab38c1db69.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/34914971bb3244db4ce2be44e9438a9b30c56250",
                "patch_url": "https://git.kernel.org/stable/p/34914971bb3244db4ce2be44e9438a9b30c56250",
                "filename": "CVE-2021-47456-34914971bb3244db4ce2be44e9438a9b30c56250.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47456/CVE-2021-47456-34914971bb3244db4ce2be44e9438a9b30c56250.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/447d44cd2f67a20b596ede3ca3cd67086dfd9ca9",
                "patch_url": "https://git.kernel.org/stable/p/447d44cd2f67a20b596ede3ca3cd67086dfd9ca9",
                "filename": "CVE-2021-47456-447d44cd2f67a20b596ede3ca3cd67086dfd9ca9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47456/CVE-2021-47456-447d44cd2f67a20b596ede3ca3cd67086dfd9ca9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/949fe9b35570361bc6ee2652f89a0561b26eec98",
                "patch_url": "https://git.kernel.org/stable/p/949fe9b35570361bc6ee2652f89a0561b26eec98",
                "filename": "CVE-2021-47456-949fe9b35570361bc6ee2652f89a0561b26eec98.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47456/CVE-2021-47456-949fe9b35570361bc6ee2652f89a0561b26eec98.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/adbda14730aacce41c0d3596415aa39ad63eafd9",
                "patch_url": "https://git.kernel.org/stable/p/adbda14730aacce41c0d3596415aa39ad63eafd9",
                "filename": "CVE-2021-47456-adbda14730aacce41c0d3596415aa39ad63eafd9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47456/CVE-2021-47456-adbda14730aacce41c0d3596415aa39ad63eafd9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0e5afdc2315b0737edcf55bede4ee1640d2d464d",
            "https://git.kernel.org/stable/c/1248582e47a9f7ce0ecd156c39fc61f8b6aa3699",
            "https://git.kernel.org/stable/c/1c616528ba4aeb1125a06b407572ab7b56acae38",
            "https://git.kernel.org/stable/c/28f28e4bc3a5e0051faa963f10b778ab38c1db69",
            "https://git.kernel.org/stable/c/34914971bb3244db4ce2be44e9438a9b30c56250",
            "https://git.kernel.org/stable/c/447d44cd2f67a20b596ede3ca3cd67086dfd9ca9",
            "https://git.kernel.org/stable/c/949fe9b35570361bc6ee2652f89a0561b26eec98",
            "https://git.kernel.org/stable/c/adbda14730aacce41c0d3596415aa39ad63eafd9",
            "https://www.cve.org/CVERecord?id=CVE-2021-47456\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47456\nhttps://lore.kernel.org/linux-cve-announce/2024052244-CVE-2021-47456-dc47@gregkh/T"
        ]
    },
    "CVE-2021-47461": {
        "cve": "CVE-2021-47461",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nuserfaultfd: fix a race between writeprotect and exit_mmap()\n\nA race is possible when a process exits, its VMAs are removed by\nexit_mmap() and at the same time userfaultfd_writeprotect() is called.\n\nThe race was detected by KASAN on a development kernel, but it appears\nto be possible on vanilla kernels as well.\n\nUse mmget_not_zero() to prevent the race as done in other userfaultfd\noperations.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47461",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3cda4bfffd4f755645577aaa9e96a606657b4525",
            "patch_url": "https://git.kernel.org/stable/p/3cda4bfffd4f755645577aaa9e96a606657b4525",
            "filename": "CVE-2021-47461-3cda4bfffd4f755645577aaa9e96a606657b4525.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47461/CVE-2021-47461-3cda4bfffd4f755645577aaa9e96a606657b4525.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/149958ecd0627a9f1e9c678c25c665400054cd6a",
                "patch_url": "https://git.kernel.org/stable/p/149958ecd0627a9f1e9c678c25c665400054cd6a",
                "filename": "CVE-2021-47461-149958ecd0627a9f1e9c678c25c665400054cd6a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47461/CVE-2021-47461-149958ecd0627a9f1e9c678c25c665400054cd6a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3cda4bfffd4f755645577aaa9e96a606657b4525",
                "patch_url": "https://git.kernel.org/stable/p/3cda4bfffd4f755645577aaa9e96a606657b4525",
                "filename": "CVE-2021-47461-3cda4bfffd4f755645577aaa9e96a606657b4525.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47461/CVE-2021-47461-3cda4bfffd4f755645577aaa9e96a606657b4525.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cb185d5f1ebf900f4ae3bf84cee212e6dd035aca",
                "patch_url": "https://git.kernel.org/stable/p/cb185d5f1ebf900f4ae3bf84cee212e6dd035aca",
                "filename": "CVE-2021-47461-cb185d5f1ebf900f4ae3bf84cee212e6dd035aca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47461/CVE-2021-47461-cb185d5f1ebf900f4ae3bf84cee212e6dd035aca.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/149958ecd0627a9f1e9c678c25c665400054cd6a",
            "https://git.kernel.org/stable/c/3cda4bfffd4f755645577aaa9e96a606657b4525",
            "https://git.kernel.org/stable/c/cb185d5f1ebf900f4ae3bf84cee212e6dd035aca",
            "https://www.cve.org/CVERecord?id=CVE-2021-47461\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47461\nhttps://lore.kernel.org/linux-cve-announce/2024052225-CVE-2021-47461-a472@gregkh/T"
        ]
    },
    "CVE-2021-47466": {
        "cve": "CVE-2021-47466",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm, slub: fix potential memoryleak in kmem_cache_open()\n\nIn error path, the random_seq of slub cache might be leaked.  Fix this\nby using __kmem_cache_release() to release all the relevant resources.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47466",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/42b81946e3ac9ea0372ba16e05160dc11e02694f",
            "patch_url": "https://git.kernel.org/stable/p/42b81946e3ac9ea0372ba16e05160dc11e02694f",
            "filename": "CVE-2021-47466-42b81946e3ac9ea0372ba16e05160dc11e02694f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47466/CVE-2021-47466-42b81946e3ac9ea0372ba16e05160dc11e02694f.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/42b81946e3ac9ea0372ba16e05160dc11e02694f",
                "patch_url": "https://git.kernel.org/stable/p/42b81946e3ac9ea0372ba16e05160dc11e02694f",
                "filename": "CVE-2021-47466-42b81946e3ac9ea0372ba16e05160dc11e02694f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47466/CVE-2021-47466-42b81946e3ac9ea0372ba16e05160dc11e02694f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f5d1c29cfab5cb0ab885059818751bdef32e2bb",
                "patch_url": "https://git.kernel.org/stable/p/4f5d1c29cfab5cb0ab885059818751bdef32e2bb",
                "filename": "CVE-2021-47466-4f5d1c29cfab5cb0ab885059818751bdef32e2bb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47466/CVE-2021-47466-4f5d1c29cfab5cb0ab885059818751bdef32e2bb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/568f906340b43120abd6fcc67c37396482f85930",
                "patch_url": "https://git.kernel.org/stable/p/568f906340b43120abd6fcc67c37396482f85930",
                "filename": "CVE-2021-47466-568f906340b43120abd6fcc67c37396482f85930.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47466/CVE-2021-47466-568f906340b43120abd6fcc67c37396482f85930.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9037c57681d25e4dcc442d940d6dbe24dd31f461",
                "patch_url": "https://git.kernel.org/stable/p/9037c57681d25e4dcc442d940d6dbe24dd31f461",
                "filename": "CVE-2021-47466-9037c57681d25e4dcc442d940d6dbe24dd31f461.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47466/CVE-2021-47466-9037c57681d25e4dcc442d940d6dbe24dd31f461.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/42b81946e3ac9ea0372ba16e05160dc11e02694f",
            "https://git.kernel.org/stable/c/4f5d1c29cfab5cb0ab885059818751bdef32e2bb",
            "https://git.kernel.org/stable/c/568f906340b43120abd6fcc67c37396482f85930",
            "https://git.kernel.org/stable/c/9037c57681d25e4dcc442d940d6dbe24dd31f461",
            "https://www.cve.org/CVERecord?id=CVE-2021-47466\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47466\nhttps://lore.kernel.org/linux-cve-announce/2024052227-CVE-2021-47466-ff03@gregkh/T"
        ]
    },
    "CVE-2021-47468": {
        "cve": "CVE-2021-47468",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: mISDN: Fix sleeping function called from invalid context\n\nThe driver can call card->isac.release() function from an atomic\ncontext.\n\nFix this by calling this function after releasing the lock.\n\nThe following log reveals it:\n\n[   44.168226 ] BUG: sleeping function called from invalid context at kernel/workqueue.c:3018\n[   44.168941 ] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 5475, name: modprobe\n[   44.169574 ] INFO: lockdep is turned off.\n[   44.169899 ] irq event stamp: 0\n[   44.170160 ] hardirqs last  enabled at (0): [<0000000000000000>] 0x0\n[   44.170627 ] hardirqs last disabled at (0): [<ffffffff814209ed>] copy_process+0x132d/0x3e00\n[   44.171240 ] softirqs last  enabled at (0): [<ffffffff81420a1a>] copy_process+0x135a/0x3e00\n[   44.171852 ] softirqs last disabled at (0): [<0000000000000000>] 0x0\n[   44.172318 ] Preemption disabled at:\n[   44.172320 ] [<ffffffffa009b0a9>] nj_release+0x69/0x500 [netjet]\n[   44.174441 ] Call Trace:\n[   44.174630 ]  dump_stack_lvl+0xa8/0xd1\n[   44.174912 ]  dump_stack+0x15/0x17\n[   44.175166 ]  ___might_sleep+0x3a2/0x510\n[   44.175459 ]  ? nj_release+0x69/0x500 [netjet]\n[   44.175791 ]  __might_sleep+0x82/0xe0\n[   44.176063 ]  ? start_flush_work+0x20/0x7b0\n[   44.176375 ]  start_flush_work+0x33/0x7b0\n[   44.176672 ]  ? trace_irq_enable_rcuidle+0x85/0x170\n[   44.177034 ]  ? kasan_quarantine_put+0xaa/0x1f0\n[   44.177372 ]  ? kasan_quarantine_put+0xaa/0x1f0\n[   44.177711 ]  __flush_work+0x11a/0x1a0\n[   44.177991 ]  ? flush_work+0x20/0x20\n[   44.178257 ]  ? lock_release+0x13c/0x8f0\n[   44.178550 ]  ? __kasan_check_write+0x14/0x20\n[   44.178872 ]  ? do_raw_spin_lock+0x148/0x360\n[   44.179187 ]  ? read_lock_is_recursive+0x20/0x20\n[   44.179530 ]  ? __kasan_check_read+0x11/0x20\n[   44.179846 ]  ? do_raw_spin_unlock+0x55/0x900\n[   44.180168 ]  ? ____kasan_slab_free+0x116/0x140\n[   44.180505 ]  ? _raw_spin_unlock_irqrestore+0x41/0x60\n[   44.180878 ]  ? skb_queue_purge+0x1a3/0x1c0\n[   44.181189 ]  ? kfree+0x13e/0x290\n[   44.181438 ]  flush_work+0x17/0x20\n[   44.181695 ]  mISDN_freedchannel+0xe8/0x100\n[   44.182006 ]  isac_release+0x210/0x260 [mISDNipac]\n[   44.182366 ]  nj_release+0xf6/0x500 [netjet]\n[   44.182685 ]  nj_remove+0x48/0x70 [netjet]\n[   44.182989 ]  pci_device_remove+0xa9/0x250",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47468",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/37e4f57b22cc5ebb3f80cf0f74fdeb487f082367",
            "patch_url": "https://git.kernel.org/stable/p/37e4f57b22cc5ebb3f80cf0f74fdeb487f082367",
            "filename": "CVE-2021-47468-37e4f57b22cc5ebb3f80cf0f74fdeb487f082367.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47468/CVE-2021-47468-37e4f57b22cc5ebb3f80cf0f74fdeb487f082367.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/37e4f57b22cc5ebb3f80cf0f74fdeb487f082367",
                "patch_url": "https://git.kernel.org/stable/p/37e4f57b22cc5ebb3f80cf0f74fdeb487f082367",
                "filename": "CVE-2021-47468-37e4f57b22cc5ebb3f80cf0f74fdeb487f082367.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47468/CVE-2021-47468-37e4f57b22cc5ebb3f80cf0f74fdeb487f082367.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4054b869dc263228d30a4755800b78f0f2ba0c89",
                "patch_url": "https://git.kernel.org/stable/p/4054b869dc263228d30a4755800b78f0f2ba0c89",
                "filename": "CVE-2021-47468-4054b869dc263228d30a4755800b78f0f2ba0c89.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47468/CVE-2021-47468-4054b869dc263228d30a4755800b78f0f2ba0c89.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6510e80a0b81b5d814e3aea6297ba42f5e76f73c",
                "patch_url": "https://git.kernel.org/stable/p/6510e80a0b81b5d814e3aea6297ba42f5e76f73c",
                "filename": "CVE-2021-47468-6510e80a0b81b5d814e3aea6297ba42f5e76f73c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47468/CVE-2021-47468-6510e80a0b81b5d814e3aea6297ba42f5e76f73c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6f95c97e0f9d6eb39c3f2cb45e8fa4268d1b372b",
                "patch_url": "https://git.kernel.org/stable/p/6f95c97e0f9d6eb39c3f2cb45e8fa4268d1b372b",
                "filename": "CVE-2021-47468-6f95c97e0f9d6eb39c3f2cb45e8fa4268d1b372b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47468/CVE-2021-47468-6f95c97e0f9d6eb39c3f2cb45e8fa4268d1b372b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9f591cbdbed3d7822b2bdba89b34a6d7b434317d",
                "patch_url": "https://git.kernel.org/stable/p/9f591cbdbed3d7822b2bdba89b34a6d7b434317d",
                "filename": "CVE-2021-47468-9f591cbdbed3d7822b2bdba89b34a6d7b434317d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47468/CVE-2021-47468-9f591cbdbed3d7822b2bdba89b34a6d7b434317d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a5b34409d3fc52114c828be4adbc30744fa3258b",
                "patch_url": "https://git.kernel.org/stable/p/a5b34409d3fc52114c828be4adbc30744fa3258b",
                "filename": "CVE-2021-47468-a5b34409d3fc52114c828be4adbc30744fa3258b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47468/CVE-2021-47468-a5b34409d3fc52114c828be4adbc30744fa3258b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ef269a8808cb1759245a98a7fe16fceaebad894c",
                "patch_url": "https://git.kernel.org/stable/p/ef269a8808cb1759245a98a7fe16fceaebad894c",
                "filename": "CVE-2021-47468-ef269a8808cb1759245a98a7fe16fceaebad894c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47468/CVE-2021-47468-ef269a8808cb1759245a98a7fe16fceaebad894c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f5966ba53013149bcf94e1536644a958dd00a026",
                "patch_url": "https://git.kernel.org/stable/p/f5966ba53013149bcf94e1536644a958dd00a026",
                "filename": "CVE-2021-47468-f5966ba53013149bcf94e1536644a958dd00a026.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47468/CVE-2021-47468-f5966ba53013149bcf94e1536644a958dd00a026.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/37e4f57b22cc5ebb3f80cf0f74fdeb487f082367",
            "https://git.kernel.org/stable/c/4054b869dc263228d30a4755800b78f0f2ba0c89",
            "https://git.kernel.org/stable/c/6510e80a0b81b5d814e3aea6297ba42f5e76f73c",
            "https://git.kernel.org/stable/c/6f95c97e0f9d6eb39c3f2cb45e8fa4268d1b372b",
            "https://git.kernel.org/stable/c/9f591cbdbed3d7822b2bdba89b34a6d7b434317d",
            "https://git.kernel.org/stable/c/a5b34409d3fc52114c828be4adbc30744fa3258b",
            "https://git.kernel.org/stable/c/ef269a8808cb1759245a98a7fe16fceaebad894c",
            "https://git.kernel.org/stable/c/f5966ba53013149bcf94e1536644a958dd00a026",
            "https://www.cve.org/CVERecord?id=CVE-2021-47468\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47468\nhttps://lore.kernel.org/linux-cve-announce/2024052227-CVE-2021-47468-6c1b@gregkh/T"
        ]
    },
    "CVE-2021-47491": {
        "cve": "CVE-2021-47491",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: khugepaged: skip huge page collapse for special files\n\nThe read-only THP for filesystems will collapse THP for files opened\nreadonly and mapped with VM_EXEC.  The intended usecase is to avoid TLB\nmisses for large text segments.  But it doesn't restrict the file types\nso a THP could be collapsed for a non-regular file, for example, block\ndevice, if it is opened readonly and mapped with EXEC permission.  This\nmay cause bugs, like [1] and [2].\n\nThis is definitely not the intended usecase, so just collapse THP for\nregular files in order to close the attack surface.\n\n[shy828301@gmail.com: fix vm_file check [3]]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47491",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6d67b2a73b8e3a079c355bab3c1aef7d85a044b8",
            "patch_url": "https://git.kernel.org/stable/p/6d67b2a73b8e3a079c355bab3c1aef7d85a044b8",
            "filename": "CVE-2021-47491-6d67b2a73b8e3a079c355bab3c1aef7d85a044b8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47491/CVE-2021-47491-6d67b2a73b8e3a079c355bab3c1aef7d85a044b8.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/5fcb6fce74ffa614d964667110cf1a516c48c6d9",
                "patch_url": "https://git.kernel.org/stable/p/5fcb6fce74ffa614d964667110cf1a516c48c6d9",
                "filename": "CVE-2021-47491-5fcb6fce74ffa614d964667110cf1a516c48c6d9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47491/CVE-2021-47491-5fcb6fce74ffa614d964667110cf1a516c48c6d9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6d67b2a73b8e3a079c355bab3c1aef7d85a044b8",
                "patch_url": "https://git.kernel.org/stable/p/6d67b2a73b8e3a079c355bab3c1aef7d85a044b8",
                "filename": "CVE-2021-47491-6d67b2a73b8e3a079c355bab3c1aef7d85a044b8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47491/CVE-2021-47491-6d67b2a73b8e3a079c355bab3c1aef7d85a044b8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a4aeaa06d45e90f9b279f0b09de84bd00006e733",
                "patch_url": "https://git.kernel.org/stable/p/a4aeaa06d45e90f9b279f0b09de84bd00006e733",
                "filename": "CVE-2021-47491-a4aeaa06d45e90f9b279f0b09de84bd00006e733.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47491/CVE-2021-47491-a4aeaa06d45e90f9b279f0b09de84bd00006e733.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/5fcb6fce74ffa614d964667110cf1a516c48c6d9",
            "https://git.kernel.org/stable/c/6d67b2a73b8e3a079c355bab3c1aef7d85a044b8",
            "https://git.kernel.org/stable/c/a4aeaa06d45e90f9b279f0b09de84bd00006e733",
            "https://www.cve.org/CVERecord?id=CVE-2021-47491\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47491\nhttps://lore.kernel.org/linux-cve-announce/2024052241-CVE-2021-47491-437d@gregkh/T"
        ]
    },
    "CVE-2021-47495": {
        "cve": "CVE-2021-47495",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: sanity check for maxpacket\n\nmaxpacket of 0 makes no sense and oopses as we need to divide\nby it. Give up.\n\nV2: fixed typo in log and stylistic issues",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47495",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/002d82227c0abe29118cf80f7e2f396b22d448ed",
            "patch_url": "https://git.kernel.org/stable/p/002d82227c0abe29118cf80f7e2f396b22d448ed",
            "filename": "CVE-2021-47495-002d82227c0abe29118cf80f7e2f396b22d448ed.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47495/CVE-2021-47495-002d82227c0abe29118cf80f7e2f396b22d448ed.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/002d82227c0abe29118cf80f7e2f396b22d448ed",
                "patch_url": "https://git.kernel.org/stable/p/002d82227c0abe29118cf80f7e2f396b22d448ed",
                "filename": "CVE-2021-47495-002d82227c0abe29118cf80f7e2f396b22d448ed.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47495/CVE-2021-47495-002d82227c0abe29118cf80f7e2f396b22d448ed.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/397430b50a363d8b7bdda00522123f82df6adc5e",
                "patch_url": "https://git.kernel.org/stable/p/397430b50a363d8b7bdda00522123f82df6adc5e",
                "filename": "CVE-2021-47495-397430b50a363d8b7bdda00522123f82df6adc5e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47495/CVE-2021-47495-397430b50a363d8b7bdda00522123f82df6adc5e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/492140e45d2bf27c1014243f8616a9b612144e20",
                "patch_url": "https://git.kernel.org/stable/p/492140e45d2bf27c1014243f8616a9b612144e20",
                "filename": "CVE-2021-47495-492140e45d2bf27c1014243f8616a9b612144e20.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47495/CVE-2021-47495-492140e45d2bf27c1014243f8616a9b612144e20.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/524f333e98138d909a0a0c574a9ff6737dce2767",
                "patch_url": "https://git.kernel.org/stable/p/524f333e98138d909a0a0c574a9ff6737dce2767",
                "filename": "CVE-2021-47495-524f333e98138d909a0a0c574a9ff6737dce2767.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47495/CVE-2021-47495-524f333e98138d909a0a0c574a9ff6737dce2767.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/693ecbe8f799405f8775719deedb1f76265d375a",
                "patch_url": "https://git.kernel.org/stable/p/693ecbe8f799405f8775719deedb1f76265d375a",
                "filename": "CVE-2021-47495-693ecbe8f799405f8775719deedb1f76265d375a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47495/CVE-2021-47495-693ecbe8f799405f8775719deedb1f76265d375a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/74b3b27cf9fecce00cd8918b7882fd81191d0aa4",
                "patch_url": "https://git.kernel.org/stable/p/74b3b27cf9fecce00cd8918b7882fd81191d0aa4",
                "filename": "CVE-2021-47495-74b3b27cf9fecce00cd8918b7882fd81191d0aa4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47495/CVE-2021-47495-74b3b27cf9fecce00cd8918b7882fd81191d0aa4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7e8b6a4f18edee070213cb6a77118e8a412253c5",
                "patch_url": "https://git.kernel.org/stable/p/7e8b6a4f18edee070213cb6a77118e8a412253c5",
                "filename": "CVE-2021-47495-7e8b6a4f18edee070213cb6a77118e8a412253c5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47495/CVE-2021-47495-7e8b6a4f18edee070213cb6a77118e8a412253c5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b9eba0a4a527e04d712f0e0401e5391ef124b33e",
                "patch_url": "https://git.kernel.org/stable/p/b9eba0a4a527e04d712f0e0401e5391ef124b33e",
                "filename": "CVE-2021-47495-b9eba0a4a527e04d712f0e0401e5391ef124b33e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47495/CVE-2021-47495-b9eba0a4a527e04d712f0e0401e5391ef124b33e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/002d82227c0abe29118cf80f7e2f396b22d448ed",
            "https://git.kernel.org/stable/c/397430b50a363d8b7bdda00522123f82df6adc5e",
            "https://git.kernel.org/stable/c/492140e45d2bf27c1014243f8616a9b612144e20",
            "https://git.kernel.org/stable/c/524f333e98138d909a0a0c574a9ff6737dce2767",
            "https://git.kernel.org/stable/c/693ecbe8f799405f8775719deedb1f76265d375a",
            "https://git.kernel.org/stable/c/74b3b27cf9fecce00cd8918b7882fd81191d0aa4",
            "https://git.kernel.org/stable/c/7e8b6a4f18edee070213cb6a77118e8a412253c5",
            "https://git.kernel.org/stable/c/b9eba0a4a527e04d712f0e0401e5391ef124b33e",
            "https://www.cve.org/CVERecord?id=CVE-2021-47495\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47495\nhttps://lore.kernel.org/linux-cve-announce/2024052242-CVE-2021-47495-a5f8@gregkh/T"
        ]
    },
    "CVE-2021-47497": {
        "cve": "CVE-2021-47497",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmem: Fix shift-out-of-bound (UBSAN) with byte size cells\n\nIf a cell has 'nbits' equal to a multiple of BITS_PER_BYTE the logic\n\n *p &= GENMASK((cell->nbits%BITS_PER_BYTE) - 1, 0);\n\nwill become undefined behavior because nbits modulo BITS_PER_BYTE is 0, and we\nsubtract one from that making a large number that is then shifted more than the\nnumber of bits that fit into an unsigned long.\n\nUBSAN reports this problem:\n\n UBSAN: shift-out-of-bounds in drivers/nvmem/core.c:1386:8\n shift exponent 64 is too large for 64-bit type 'unsigned long'\n CPU: 6 PID: 7 Comm: kworker/u16:0 Not tainted 5.15.0-rc3+ #9\n Hardware name: Google Lazor (rev3+) with KB Backlight (DT)\n Workqueue: events_unbound deferred_probe_work_func\n Call trace:\n  dump_backtrace+0x0/0x170\n  show_stack+0x24/0x30\n  dump_stack_lvl+0x64/0x7c\n  dump_stack+0x18/0x38\n  ubsan_epilogue+0x10/0x54\n  __ubsan_handle_shift_out_of_bounds+0x180/0x194\n  __nvmem_cell_read+0x1ec/0x21c\n  nvmem_cell_read+0x58/0x94\n  nvmem_cell_read_variable_common+0x4c/0xb0\n  nvmem_cell_read_variable_le_u32+0x40/0x100\n  a6xx_gpu_init+0x170/0x2f4\n  adreno_bind+0x174/0x284\n  component_bind_all+0xf0/0x264\n  msm_drm_bind+0x1d8/0x7a0\n  try_to_bring_up_master+0x164/0x1ac\n  __component_add+0xbc/0x13c\n  component_add+0x20/0x2c\n  dp_display_probe+0x340/0x384\n  platform_probe+0xc0/0x100\n  really_probe+0x110/0x304\n  __driver_probe_device+0xb8/0x120\n  driver_probe_device+0x4c/0xfc\n  __device_attach_driver+0xb0/0x128\n  bus_for_each_drv+0x90/0xdc\n  __device_attach+0xc8/0x174\n  device_initial_probe+0x20/0x2c\n  bus_probe_device+0x40/0xa4\n  deferred_probe_work_func+0x7c/0xb8\n  process_one_work+0x128/0x21c\n  process_scheduled_works+0x40/0x54\n  worker_thread+0x1ec/0x2a8\n  kthread+0x138/0x158\n  ret_from_fork+0x10/0x20\n\nFix it by making sure there are any bits to mask out.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47497",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/eb0fc8e7170e61eaf65d28dee4a8baf4e86b19ca",
            "patch_url": "https://git.kernel.org/stable/p/eb0fc8e7170e61eaf65d28dee4a8baf4e86b19ca",
            "filename": "CVE-2021-47497-eb0fc8e7170e61eaf65d28dee4a8baf4e86b19ca.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47497/CVE-2021-47497-eb0fc8e7170e61eaf65d28dee4a8baf4e86b19ca.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0594f1d048d8dc338eb9a240021b1d00ae1eb082",
                "patch_url": "https://git.kernel.org/stable/p/0594f1d048d8dc338eb9a240021b1d00ae1eb082",
                "filename": "CVE-2021-47497-0594f1d048d8dc338eb9a240021b1d00ae1eb082.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47497/CVE-2021-47497-0594f1d048d8dc338eb9a240021b1d00ae1eb082.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0e822e5413da1af28cca350cb1cb42b6133bdcae",
                "patch_url": "https://git.kernel.org/stable/p/0e822e5413da1af28cca350cb1cb42b6133bdcae",
                "filename": "CVE-2021-47497-0e822e5413da1af28cca350cb1cb42b6133bdcae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47497/CVE-2021-47497-0e822e5413da1af28cca350cb1cb42b6133bdcae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2df6c023050205c4d04ffc121bc549f65cb8d1df",
                "patch_url": "https://git.kernel.org/stable/p/2df6c023050205c4d04ffc121bc549f65cb8d1df",
                "filename": "CVE-2021-47497-2df6c023050205c4d04ffc121bc549f65cb8d1df.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47497/CVE-2021-47497-2df6c023050205c4d04ffc121bc549f65cb8d1df.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/57e48886401b14cd351423fabfec2cfd18df4f66",
                "patch_url": "https://git.kernel.org/stable/p/57e48886401b14cd351423fabfec2cfd18df4f66",
                "filename": "CVE-2021-47497-57e48886401b14cd351423fabfec2cfd18df4f66.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47497/CVE-2021-47497-57e48886401b14cd351423fabfec2cfd18df4f66.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5d388fa01fa6eb310ac023a363a6cb216d9d8fe9",
                "patch_url": "https://git.kernel.org/stable/p/5d388fa01fa6eb310ac023a363a6cb216d9d8fe9",
                "filename": "CVE-2021-47497-5d388fa01fa6eb310ac023a363a6cb216d9d8fe9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47497/CVE-2021-47497-5d388fa01fa6eb310ac023a363a6cb216d9d8fe9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/60df06bbdf497e37ed25ad40572c362e5b0998df",
                "patch_url": "https://git.kernel.org/stable/p/60df06bbdf497e37ed25ad40572c362e5b0998df",
                "filename": "CVE-2021-47497-60df06bbdf497e37ed25ad40572c362e5b0998df.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47497/CVE-2021-47497-60df06bbdf497e37ed25ad40572c362e5b0998df.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/abcb8d33e4d2215ccde5ab5ccf9f730a59d79d97",
                "patch_url": "https://git.kernel.org/stable/p/abcb8d33e4d2215ccde5ab5ccf9f730a59d79d97",
                "filename": "CVE-2021-47497-abcb8d33e4d2215ccde5ab5ccf9f730a59d79d97.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47497/CVE-2021-47497-abcb8d33e4d2215ccde5ab5ccf9f730a59d79d97.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eb0fc8e7170e61eaf65d28dee4a8baf4e86b19ca",
                "patch_url": "https://git.kernel.org/stable/p/eb0fc8e7170e61eaf65d28dee4a8baf4e86b19ca",
                "filename": "CVE-2021-47497-eb0fc8e7170e61eaf65d28dee4a8baf4e86b19ca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47497/CVE-2021-47497-eb0fc8e7170e61eaf65d28dee4a8baf4e86b19ca.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0594f1d048d8dc338eb9a240021b1d00ae1eb082",
            "https://git.kernel.org/stable/c/0e822e5413da1af28cca350cb1cb42b6133bdcae",
            "https://git.kernel.org/stable/c/2df6c023050205c4d04ffc121bc549f65cb8d1df",
            "https://git.kernel.org/stable/c/57e48886401b14cd351423fabfec2cfd18df4f66",
            "https://git.kernel.org/stable/c/5d388fa01fa6eb310ac023a363a6cb216d9d8fe9",
            "https://git.kernel.org/stable/c/60df06bbdf497e37ed25ad40572c362e5b0998df",
            "https://git.kernel.org/stable/c/abcb8d33e4d2215ccde5ab5ccf9f730a59d79d97",
            "https://git.kernel.org/stable/c/eb0fc8e7170e61eaf65d28dee4a8baf4e86b19ca",
            "https://www.cve.org/CVERecord?id=CVE-2021-47497\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47497\nhttps://lore.kernel.org/linux-cve-announce/2024052242-CVE-2021-47497-449e@gregkh/T"
        ]
    },
    "CVE-2021-47527": {
        "cve": "CVE-2021-47527",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: core: fix transmit-buffer reset and memleak\n\nCommit 761ed4a94582 (\"tty: serial_core: convert uart_close to use\ntty_port_close\") converted serial core to use tty_port_close() but\nfailed to notice that the transmit buffer still needs to be freed on\nfinal close.\n\nNot freeing the transmit buffer means that the buffer is no longer\ncleared on next open so that any ioctl() waiting for the buffer to drain\nmight wait indefinitely (e.g. on termios changes) or that stale data can\nend up being transmitted in case tx is restarted.\n\nFurthermore, the buffer of any port that has been opened would leak on\ndriver unbind.\n\nNote that the port lock is held when clearing the buffer pointer due to\nthe ldisc race worked around by commit a5ba1d95e46e (\"uart: fix race\nbetween uart_put_char() and uart_shutdown()\").\n\nAlso note that the tty-port shutdown() callback is not called for\nconsole ports so it is not strictly necessary to free the buffer page\nafter releasing the lock (cf. d72402145ace (\"tty/serial: do not free\ntrasnmit buffer page under port lock\")).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47527",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/011f6c92b5bf6e1fbfdedc8b5232f64c1c493206",
            "patch_url": "https://git.kernel.org/stable/p/011f6c92b5bf6e1fbfdedc8b5232f64c1c493206",
            "filename": "CVE-2021-47527-011f6c92b5bf6e1fbfdedc8b5232f64c1c493206.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47527/CVE-2021-47527-011f6c92b5bf6e1fbfdedc8b5232f64c1c493206.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/00de977f9e0aa9760d9a79d1e41ff780f74e3424",
                "patch_url": "https://git.kernel.org/stable/p/00de977f9e0aa9760d9a79d1e41ff780f74e3424",
                "filename": "CVE-2021-47527-00de977f9e0aa9760d9a79d1e41ff780f74e3424.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47527/CVE-2021-47527-00de977f9e0aa9760d9a79d1e41ff780f74e3424.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/011f6c92b5bf6e1fbfdedc8b5232f64c1c493206",
                "patch_url": "https://git.kernel.org/stable/p/011f6c92b5bf6e1fbfdedc8b5232f64c1c493206",
                "filename": "CVE-2021-47527-011f6c92b5bf6e1fbfdedc8b5232f64c1c493206.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47527/CVE-2021-47527-011f6c92b5bf6e1fbfdedc8b5232f64c1c493206.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1179b168fa3f3a6aae3bd140000455a0e58457db",
                "patch_url": "https://git.kernel.org/stable/p/1179b168fa3f3a6aae3bd140000455a0e58457db",
                "filename": "CVE-2021-47527-1179b168fa3f3a6aae3bd140000455a0e58457db.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47527/CVE-2021-47527-1179b168fa3f3a6aae3bd140000455a0e58457db.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/64e491c1634b73d3bddc081d08620bdc92ab2c12",
                "patch_url": "https://git.kernel.org/stable/p/64e491c1634b73d3bddc081d08620bdc92ab2c12",
                "filename": "CVE-2021-47527-64e491c1634b73d3bddc081d08620bdc92ab2c12.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47527/CVE-2021-47527-64e491c1634b73d3bddc081d08620bdc92ab2c12.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c5da8aa441053958594f94254592bb41264bdfbf",
                "patch_url": "https://git.kernel.org/stable/p/c5da8aa441053958594f94254592bb41264bdfbf",
                "filename": "CVE-2021-47527-c5da8aa441053958594f94254592bb41264bdfbf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47527/CVE-2021-47527-c5da8aa441053958594f94254592bb41264bdfbf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e1722acf4f0d4d67b60f57e08ce16f8b66cd4b8f",
                "patch_url": "https://git.kernel.org/stable/p/e1722acf4f0d4d67b60f57e08ce16f8b66cd4b8f",
                "filename": "CVE-2021-47527-e1722acf4f0d4d67b60f57e08ce16f8b66cd4b8f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47527/CVE-2021-47527-e1722acf4f0d4d67b60f57e08ce16f8b66cd4b8f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e74d9663fd57640fc3394abb5c76fa95b9cc2f2e",
                "patch_url": "https://git.kernel.org/stable/p/e74d9663fd57640fc3394abb5c76fa95b9cc2f2e",
                "filename": "CVE-2021-47527-e74d9663fd57640fc3394abb5c76fa95b9cc2f2e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47527/CVE-2021-47527-e74d9663fd57640fc3394abb5c76fa95b9cc2f2e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/00de977f9e0aa9760d9a79d1e41ff780f74e3424",
            "https://git.kernel.org/stable/c/011f6c92b5bf6e1fbfdedc8b5232f64c1c493206",
            "https://git.kernel.org/stable/c/1179b168fa3f3a6aae3bd140000455a0e58457db",
            "https://git.kernel.org/stable/c/64e491c1634b73d3bddc081d08620bdc92ab2c12",
            "https://git.kernel.org/stable/c/c5da8aa441053958594f94254592bb41264bdfbf",
            "https://git.kernel.org/stable/c/e1722acf4f0d4d67b60f57e08ce16f8b66cd4b8f",
            "https://git.kernel.org/stable/c/e74d9663fd57640fc3394abb5c76fa95b9cc2f2e",
            "https://www.cve.org/CVERecord?id=CVE-2021-47527\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47527\nhttps://lore.kernel.org/linux-cve-announce/2024052435-CVE-2021-47527-e6f5@gregkh/T"
        ]
    },
    "CVE-2021-47548": {
        "cve": "CVE-2021-47548",
        "cvss_v2": null,
        "cvss_v3": 9.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()\n\nThe if statement:\n  if (port >= DSAF_GE_NUM)\n        return;\n\nlimits the value of port less than DSAF_GE_NUM (i.e., 8).\nHowever, if the value of port is 6 or 7, an array overflow could occur:\n  port_rst_off = dsaf_dev->mac_cb[port]->port_rst_off;\n\nbecause the length of dsaf_dev->mac_cb is DSAF_MAX_PORT_NUM (i.e., 6).\n\nTo fix this possible array overflow, we first check port and if it is\ngreater than or equal to DSAF_MAX_PORT_NUM, the function returns.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47548",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/dd07f8971b81ad98cc754b179b331b57f35aa1ff",
            "patch_url": "https://git.kernel.org/stable/p/dd07f8971b81ad98cc754b179b331b57f35aa1ff",
            "filename": "CVE-2021-47548-dd07f8971b81ad98cc754b179b331b57f35aa1ff.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47548/CVE-2021-47548-dd07f8971b81ad98cc754b179b331b57f35aa1ff.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/22519eff7df2d88adcc2568d86046ce1e2b52803",
                "patch_url": "https://git.kernel.org/stable/p/22519eff7df2d88adcc2568d86046ce1e2b52803",
                "filename": "CVE-2021-47548-22519eff7df2d88adcc2568d86046ce1e2b52803.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47548/CVE-2021-47548-22519eff7df2d88adcc2568d86046ce1e2b52803.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/948968f8747650447c8f21c9fdba0e1973be040b",
                "patch_url": "https://git.kernel.org/stable/p/948968f8747650447c8f21c9fdba0e1973be040b",
                "filename": "CVE-2021-47548-948968f8747650447c8f21c9fdba0e1973be040b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47548/CVE-2021-47548-948968f8747650447c8f21c9fdba0e1973be040b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/99bb25cb6753beaf2c2bc37927c2ecc0ceff3f6d",
                "patch_url": "https://git.kernel.org/stable/p/99bb25cb6753beaf2c2bc37927c2ecc0ceff3f6d",
                "filename": "CVE-2021-47548-99bb25cb6753beaf2c2bc37927c2ecc0ceff3f6d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47548/CVE-2021-47548-99bb25cb6753beaf2c2bc37927c2ecc0ceff3f6d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a66998e0fbf213d47d02813b9679426129d0d114",
                "patch_url": "https://git.kernel.org/stable/p/a66998e0fbf213d47d02813b9679426129d0d114",
                "filename": "CVE-2021-47548-a66998e0fbf213d47d02813b9679426129d0d114.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47548/CVE-2021-47548-a66998e0fbf213d47d02813b9679426129d0d114.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/abbd5faa0748d0aa95d5191d56ff7a17a6275bd1",
                "patch_url": "https://git.kernel.org/stable/p/abbd5faa0748d0aa95d5191d56ff7a17a6275bd1",
                "filename": "CVE-2021-47548-abbd5faa0748d0aa95d5191d56ff7a17a6275bd1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47548/CVE-2021-47548-abbd5faa0748d0aa95d5191d56ff7a17a6275bd1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dd07f8971b81ad98cc754b179b331b57f35aa1ff",
                "patch_url": "https://git.kernel.org/stable/p/dd07f8971b81ad98cc754b179b331b57f35aa1ff",
                "filename": "CVE-2021-47548-dd07f8971b81ad98cc754b179b331b57f35aa1ff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47548/CVE-2021-47548-dd07f8971b81ad98cc754b179b331b57f35aa1ff.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fc7ffa7f10b9454a86369405d9814bf141b30627",
                "patch_url": "https://git.kernel.org/stable/p/fc7ffa7f10b9454a86369405d9814bf141b30627",
                "filename": "CVE-2021-47548-fc7ffa7f10b9454a86369405d9814bf141b30627.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47548/CVE-2021-47548-fc7ffa7f10b9454a86369405d9814bf141b30627.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/22519eff7df2d88adcc2568d86046ce1e2b52803",
            "https://git.kernel.org/stable/c/948968f8747650447c8f21c9fdba0e1973be040b",
            "https://git.kernel.org/stable/c/99bb25cb6753beaf2c2bc37927c2ecc0ceff3f6d",
            "https://git.kernel.org/stable/c/a66998e0fbf213d47d02813b9679426129d0d114",
            "https://git.kernel.org/stable/c/abbd5faa0748d0aa95d5191d56ff7a17a6275bd1",
            "https://git.kernel.org/stable/c/dd07f8971b81ad98cc754b179b331b57f35aa1ff",
            "https://git.kernel.org/stable/c/fc7ffa7f10b9454a86369405d9814bf141b30627",
            "https://www.cve.org/CVERecord?id=CVE-2021-47548\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47548\nhttps://lore.kernel.org/linux-cve-announce/2024052441-CVE-2021-47548-e9c0@gregkh/T"
        ]
    },
    "CVE-2021-47560": {
        "cve": "CVE-2021-47560",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum: Protect driver from buggy firmware\n\nWhen processing port up/down events generated by the device's firmware,\nthe driver protects itself from events reported for non-existent local\nports, but not the CPU port (local port 0), which exists, but lacks a\nnetdev.\n\nThis can result in a NULL pointer dereference when calling\nnetif_carrier_{on,off}().\n\nFix this by bailing early when processing an event reported for the CPU\nport. Problem was only observed when running on top of a buggy emulator.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47560",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047",
            "patch_url": "https://git.kernel.org/stable/p/63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047",
            "filename": "CVE-2021-47560-63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47560/CVE-2021-47560-63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047",
                "patch_url": "https://git.kernel.org/stable/p/63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047",
                "filename": "CVE-2021-47560-63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47560/CVE-2021-47560-63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/90d0736876c50ecde1a3275636a06b9ddb1cace9",
                "patch_url": "https://git.kernel.org/stable/p/90d0736876c50ecde1a3275636a06b9ddb1cace9",
                "filename": "CVE-2021-47560-90d0736876c50ecde1a3275636a06b9ddb1cace9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47560/CVE-2021-47560-90d0736876c50ecde1a3275636a06b9ddb1cace9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/da4d70199e5d82da664a80077508d6c18f5e76df",
                "patch_url": "https://git.kernel.org/stable/p/da4d70199e5d82da664a80077508d6c18f5e76df",
                "filename": "CVE-2021-47560-da4d70199e5d82da664a80077508d6c18f5e76df.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47560/CVE-2021-47560-da4d70199e5d82da664a80077508d6c18f5e76df.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047",
            "https://git.kernel.org/stable/c/90d0736876c50ecde1a3275636a06b9ddb1cace9",
            "https://git.kernel.org/stable/c/da4d70199e5d82da664a80077508d6c18f5e76df",
            "https://www.cve.org/CVERecord?id=CVE-2021-47560\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47560\nhttps://lore.kernel.org/linux-cve-announce/2024052451-CVE-2021-47560-4a52@gregkh/T"
        ]
    },
    "CVE-2021-47579": {
        "cve": "CVE-2021-47579",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\novl: fix warning in ovl_create_real()\n\nSyzbot triggered the following warning in ovl_workdir_create() ->\novl_create_real():\n\n\tif (!err && WARN_ON(!newdentry->d_inode)) {\n\nThe reason is that the cgroup2 filesystem returns from mkdir without\ninstantiating the new dentry.\n\nWeird filesystems such as this will be rejected by overlayfs at a later\nstage during setup, but to prevent such a warning, call ovl_mkdir_real()\ndirectly from ovl_workdir_create() and reject this case early.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47579",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6859985a2fbda5d1586bf44538853e1be69e85f7",
            "patch_url": "https://git.kernel.org/stable/p/6859985a2fbda5d1586bf44538853e1be69e85f7",
            "filename": "CVE-2021-47579-6859985a2fbda5d1586bf44538853e1be69e85f7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47579/CVE-2021-47579-6859985a2fbda5d1586bf44538853e1be69e85f7.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1f5573cfe7a7056e80a92c7a037a3e69f3a13d1c",
                "patch_url": "https://git.kernel.org/stable/p/1f5573cfe7a7056e80a92c7a037a3e69f3a13d1c",
                "filename": "CVE-2021-47579-1f5573cfe7a7056e80a92c7a037a3e69f3a13d1c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47579/CVE-2021-47579-1f5573cfe7a7056e80a92c7a037a3e69f3a13d1c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/445d2dc63e5871d218f21b8f62ab29ac72f2e6b8",
                "patch_url": "https://git.kernel.org/stable/p/445d2dc63e5871d218f21b8f62ab29ac72f2e6b8",
                "filename": "CVE-2021-47579-445d2dc63e5871d218f21b8f62ab29ac72f2e6b8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47579/CVE-2021-47579-445d2dc63e5871d218f21b8f62ab29ac72f2e6b8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6859985a2fbda5d1586bf44538853e1be69e85f7",
                "patch_url": "https://git.kernel.org/stable/p/6859985a2fbda5d1586bf44538853e1be69e85f7",
                "filename": "CVE-2021-47579-6859985a2fbda5d1586bf44538853e1be69e85f7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47579/CVE-2021-47579-6859985a2fbda5d1586bf44538853e1be69e85f7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d2ccdd4e4efab06178608a34d7bfb20a54104c02",
                "patch_url": "https://git.kernel.org/stable/p/d2ccdd4e4efab06178608a34d7bfb20a54104c02",
                "filename": "CVE-2021-47579-d2ccdd4e4efab06178608a34d7bfb20a54104c02.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47579/CVE-2021-47579-d2ccdd4e4efab06178608a34d7bfb20a54104c02.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f9f300a92297be8250547347fd52216ef0177ae0",
                "patch_url": "https://git.kernel.org/stable/p/f9f300a92297be8250547347fd52216ef0177ae0",
                "filename": "CVE-2021-47579-f9f300a92297be8250547347fd52216ef0177ae0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47579/CVE-2021-47579-f9f300a92297be8250547347fd52216ef0177ae0.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1f5573cfe7a7056e80a92c7a037a3e69f3a13d1c",
            "https://git.kernel.org/stable/c/445d2dc63e5871d218f21b8f62ab29ac72f2e6b8",
            "https://git.kernel.org/stable/c/6859985a2fbda5d1586bf44538853e1be69e85f7",
            "https://git.kernel.org/stable/c/d2ccdd4e4efab06178608a34d7bfb20a54104c02",
            "https://git.kernel.org/stable/c/f9f300a92297be8250547347fd52216ef0177ae0",
            "https://www.cve.org/CVERecord?id=CVE-2021-47579\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47579\nhttps://lore.kernel.org/linux-cve-announce/2024061915-CVE-2021-47579-4f78@gregkh/T"
        ]
    },
    "CVE-2021-47582": {
        "cve": "CVE-2021-47582",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Make do_proc_control() and do_proc_bulk() killable\n\nThe USBDEVFS_CONTROL and USBDEVFS_BULK ioctls invoke\nusb_start_wait_urb(), which contains an uninterruptible wait with a\nuser-specified timeout value.  If timeout value is very large and the\ndevice being accessed does not respond in a reasonable amount of time,\nthe kernel will complain about \"Task X blocked for more than N\nseconds\", as found in testing by syzbot:\n\nINFO: task syz-executor.0:8700 blocked for more than 143 seconds.\n      Not tainted 5.14.0-rc7-syzkaller #0\n\"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:syz-executor.0  state:D stack:23192 pid: 8700 ppid:  8455 flags:0x00004004\nCall Trace:\n context_switch kernel/sched/core.c:4681 [inline]\n __schedule+0xc07/0x11f0 kernel/sched/core.c:5938\n schedule+0x14b/0x210 kernel/sched/core.c:6017\n schedule_timeout+0x98/0x2f0 kernel/time/timer.c:1857\n do_wait_for_common+0x2da/0x480 kernel/sched/completion.c:85\n __wait_for_common kernel/sched/completion.c:106 [inline]\n wait_for_common kernel/sched/completion.c:117 [inline]\n wait_for_completion_timeout+0x46/0x60 kernel/sched/completion.c:157\n usb_start_wait_urb+0x167/0x550 drivers/usb/core/message.c:63\n do_proc_bulk+0x978/0x1080 drivers/usb/core/devio.c:1236\n proc_bulk drivers/usb/core/devio.c:1273 [inline]\n usbdev_do_ioctl drivers/usb/core/devio.c:2547 [inline]\n usbdev_ioctl+0x3441/0x6b10 drivers/usb/core/devio.c:2713\n...\n\nTo fix this problem, this patch replaces usbfs's calls to\nusb_control_msg() and usb_bulk_msg() with special-purpose code that\ndoes essentially the same thing (as recommended in the comment for\nusb_start_wait_urb()), except that it always uses a killable wait and\nit uses GFP_KERNEL rather than GFP_NOIO.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47582",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/403716741c6c2c510dce44e88f085a740f535de6",
            "patch_url": "https://git.kernel.org/stable/p/403716741c6c2c510dce44e88f085a740f535de6",
            "filename": "CVE-2021-47582-403716741c6c2c510dce44e88f085a740f535de6.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47582/CVE-2021-47582-403716741c6c2c510dce44e88f085a740f535de6.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/403716741c6c2c510dce44e88f085a740f535de6",
                "patch_url": "https://git.kernel.org/stable/p/403716741c6c2c510dce44e88f085a740f535de6",
                "filename": "CVE-2021-47582-403716741c6c2c510dce44e88f085a740f535de6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47582/CVE-2021-47582-403716741c6c2c510dce44e88f085a740f535de6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ae8709b296d80c7f45aa1f35c0e7659ad69edce1",
                "patch_url": "https://git.kernel.org/stable/p/ae8709b296d80c7f45aa1f35c0e7659ad69edce1",
                "filename": "CVE-2021-47582-ae8709b296d80c7f45aa1f35c0e7659ad69edce1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47582/CVE-2021-47582-ae8709b296d80c7f45aa1f35c0e7659ad69edce1.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/403716741c6c2c510dce44e88f085a740f535de6",
            "https://git.kernel.org/stable/c/ae8709b296d80c7f45aa1f35c0e7659ad69edce1",
            "https://www.cve.org/CVERecord?id=CVE-2021-47582\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47582\nhttps://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47582-69aa@gregkh/T"
        ]
    },
    "CVE-2021-47609": {
        "cve": "CVE-2021-47609",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Fix string overflow in SCPI genpd driver\n\nWithout the bound checks for scpi_pd->name, it could result in the buffer\noverflow when copying the SCPI device name from the corresponding device\ntree node as the name string is set at maximum size of 30.\n\nLet us fix it by using devm_kasprintf so that the string buffer is\nallocated dynamically.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47609",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4694b1ec425a2d20d6f8ca3db594829fdf5f2672",
            "patch_url": "https://git.kernel.org/stable/p/4694b1ec425a2d20d6f8ca3db594829fdf5f2672",
            "filename": "CVE-2021-47609-4694b1ec425a2d20d6f8ca3db594829fdf5f2672.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47609/CVE-2021-47609-4694b1ec425a2d20d6f8ca3db594829fdf5f2672.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4694b1ec425a2d20d6f8ca3db594829fdf5f2672",
                "patch_url": "https://git.kernel.org/stable/p/4694b1ec425a2d20d6f8ca3db594829fdf5f2672",
                "filename": "CVE-2021-47609-4694b1ec425a2d20d6f8ca3db594829fdf5f2672.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47609/CVE-2021-47609-4694b1ec425a2d20d6f8ca3db594829fdf5f2672.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/639901b9429a3195e0fead981ed74b51f5f31538",
                "patch_url": "https://git.kernel.org/stable/p/639901b9429a3195e0fead981ed74b51f5f31538",
                "filename": "CVE-2021-47609-639901b9429a3195e0fead981ed74b51f5f31538.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47609/CVE-2021-47609-639901b9429a3195e0fead981ed74b51f5f31538.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7e8645ca2c0046f7cd2f0f7d569fc036c8abaedb",
                "patch_url": "https://git.kernel.org/stable/p/7e8645ca2c0046f7cd2f0f7d569fc036c8abaedb",
                "filename": "CVE-2021-47609-7e8645ca2c0046f7cd2f0f7d569fc036c8abaedb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47609/CVE-2021-47609-7e8645ca2c0046f7cd2f0f7d569fc036c8abaedb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/802a1a8501563714a5fe8824f4ed27fec04a0719",
                "patch_url": "https://git.kernel.org/stable/p/802a1a8501563714a5fe8824f4ed27fec04a0719",
                "filename": "CVE-2021-47609-802a1a8501563714a5fe8824f4ed27fec04a0719.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47609/CVE-2021-47609-802a1a8501563714a5fe8824f4ed27fec04a0719.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/865ed67ab955428b9aa771d8b4f1e4fb7fd08945",
                "patch_url": "https://git.kernel.org/stable/p/865ed67ab955428b9aa771d8b4f1e4fb7fd08945",
                "filename": "CVE-2021-47609-865ed67ab955428b9aa771d8b4f1e4fb7fd08945.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47609/CVE-2021-47609-865ed67ab955428b9aa771d8b4f1e4fb7fd08945.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/976389cbb16cee46847e5d06250a3a0b5506781e",
                "patch_url": "https://git.kernel.org/stable/p/976389cbb16cee46847e5d06250a3a0b5506781e",
                "filename": "CVE-2021-47609-976389cbb16cee46847e5d06250a3a0b5506781e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47609/CVE-2021-47609-976389cbb16cee46847e5d06250a3a0b5506781e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f0f484714f35d24ffa0ecb4afe3df1c5b225411d",
                "patch_url": "https://git.kernel.org/stable/p/f0f484714f35d24ffa0ecb4afe3df1c5b225411d",
                "filename": "CVE-2021-47609-f0f484714f35d24ffa0ecb4afe3df1c5b225411d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47609/CVE-2021-47609-f0f484714f35d24ffa0ecb4afe3df1c5b225411d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4694b1ec425a2d20d6f8ca3db594829fdf5f2672",
            "https://git.kernel.org/stable/c/639901b9429a3195e0fead981ed74b51f5f31538",
            "https://git.kernel.org/stable/c/7e8645ca2c0046f7cd2f0f7d569fc036c8abaedb",
            "https://git.kernel.org/stable/c/802a1a8501563714a5fe8824f4ed27fec04a0719",
            "https://git.kernel.org/stable/c/865ed67ab955428b9aa771d8b4f1e4fb7fd08945",
            "https://git.kernel.org/stable/c/976389cbb16cee46847e5d06250a3a0b5506781e",
            "https://git.kernel.org/stable/c/f0f484714f35d24ffa0ecb4afe3df1c5b225411d",
            "https://www.cve.org/CVERecord?id=CVE-2021-47609\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47609\nhttps://lore.kernel.org/linux-cve-announce/2024061907-CVE-2021-47609-5ebf@gregkh/T"
        ]
    },
    "CVE-2021-47624": {
        "cve": "CVE-2021-47624",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change\n\nThe refcount leak issues take place in an error handling path. When the\n3rd argument buf doesn't match with \"offline\", \"online\" or \"remove\", the\nfunction simply returns -EINVAL and forgets to decrease the reference\ncount of a rpc_xprt object and a rpc_xprt_switch object increased by\nrpc_sysfs_xprt_kobj_get_xprt() and\nrpc_sysfs_xprt_kobj_get_xprt_switch(), causing reference count leaks of\nboth unused objects.\n\nFix this issue by jumping to the error handling path labelled with\nout_put when buf matches none of \"offline\", \"online\" or \"remove\".",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47624",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/776d794f28c95051bc70405a7b1fa40115658a18",
            "patch_url": "https://git.kernel.org/stable/p/776d794f28c95051bc70405a7b1fa40115658a18",
            "filename": "CVE-2021-47624-776d794f28c95051bc70405a7b1fa40115658a18.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47624/CVE-2021-47624-776d794f28c95051bc70405a7b1fa40115658a18.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4b22aa42bd4d2d630ef1854c139275c3532937cb",
                "patch_url": "https://git.kernel.org/stable/p/4b22aa42bd4d2d630ef1854c139275c3532937cb",
                "filename": "CVE-2021-47624-4b22aa42bd4d2d630ef1854c139275c3532937cb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47624/CVE-2021-47624-4b22aa42bd4d2d630ef1854c139275c3532937cb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5f6024c05a2c0fdd180b29395aaf686d25af3a0f",
                "patch_url": "https://git.kernel.org/stable/p/5f6024c05a2c0fdd180b29395aaf686d25af3a0f",
                "filename": "CVE-2021-47624-5f6024c05a2c0fdd180b29395aaf686d25af3a0f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47624/CVE-2021-47624-5f6024c05a2c0fdd180b29395aaf686d25af3a0f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/776d794f28c95051bc70405a7b1fa40115658a18",
                "patch_url": "https://git.kernel.org/stable/p/776d794f28c95051bc70405a7b1fa40115658a18",
                "filename": "CVE-2021-47624-776d794f28c95051bc70405a7b1fa40115658a18.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47624/CVE-2021-47624-776d794f28c95051bc70405a7b1fa40115658a18.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4b22aa42bd4d2d630ef1854c139275c3532937cb",
            "https://git.kernel.org/stable/c/5f6024c05a2c0fdd180b29395aaf686d25af3a0f",
            "https://git.kernel.org/stable/c/776d794f28c95051bc70405a7b1fa40115658a18",
            "https://www.cve.org/CVERecord?id=CVE-2021-47624\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47624\nhttps://lore.kernel.org/linux-cve-announce/2024071646-CVE-2021-47624-86cd@gregkh/T"
        ]
    },
    "CVE-2021-47670": {
        "cve": "CVE-2021-47670",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: peak_usb: fix use after free bugs\n\nAfter calling peak_usb_netif_rx_ni(skb), dereferencing skb is unsafe.\nEspecially, the can_frame cf which aliases skb memory is accessed\nafter the peak_usb_netif_rx_ni().\n\nReordering the lines solves the issue.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2021-47670",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/5408824636fa0dfedb9ecb0d94abd573131bfbbe",
            "patch_url": "https://git.kernel.org/stable/p/5408824636fa0dfedb9ecb0d94abd573131bfbbe",
            "filename": "CVE-2021-47670-5408824636fa0dfedb9ecb0d94abd573131bfbbe.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47670/CVE-2021-47670-5408824636fa0dfedb9ecb0d94abd573131bfbbe.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/50aca891d7a554db0901b245167cd653d73aaa71",
                "patch_url": "https://git.kernel.org/stable/p/50aca891d7a554db0901b245167cd653d73aaa71",
                "filename": "CVE-2021-47670-50aca891d7a554db0901b245167cd653d73aaa71.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47670/CVE-2021-47670-50aca891d7a554db0901b245167cd653d73aaa71.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5408824636fa0dfedb9ecb0d94abd573131bfbbe",
                "patch_url": "https://git.kernel.org/stable/p/5408824636fa0dfedb9ecb0d94abd573131bfbbe",
                "filename": "CVE-2021-47670-5408824636fa0dfedb9ecb0d94abd573131bfbbe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47670/CVE-2021-47670-5408824636fa0dfedb9ecb0d94abd573131bfbbe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ddd1416f44130377798c1430b76503513b7497c2",
                "patch_url": "https://git.kernel.org/stable/p/ddd1416f44130377798c1430b76503513b7497c2",
                "filename": "CVE-2021-47670-ddd1416f44130377798c1430b76503513b7497c2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47670/CVE-2021-47670-ddd1416f44130377798c1430b76503513b7497c2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ec939c13c3fff2114479769c8380b7f1a54feca9",
                "patch_url": "https://git.kernel.org/stable/p/ec939c13c3fff2114479769c8380b7f1a54feca9",
                "filename": "CVE-2021-47670-ec939c13c3fff2114479769c8380b7f1a54feca9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2021-47670/CVE-2021-47670-ec939c13c3fff2114479769c8380b7f1a54feca9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/50aca891d7a554db0901b245167cd653d73aaa71",
            "https://git.kernel.org/stable/c/5408824636fa0dfedb9ecb0d94abd573131bfbbe",
            "https://git.kernel.org/stable/c/ddd1416f44130377798c1430b76503513b7497c2",
            "https://git.kernel.org/stable/c/ec939c13c3fff2114479769c8380b7f1a54feca9",
            "https://www.cve.org/CVERecord?id=CVE-2021-47670\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-47670\nhttps://lore.kernel.org/linux-cve-announce/2025041734-CVE-2021-47670-2b77@gregkh/T"
        ]
    },
    "CVE-2022-0500": {
        "cve": "CVE-2022-0500",
        "cvss_v2": 7.2,
        "cvss_v3": 7.8,
        "description": "A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel\u2019s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-0500",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=20b2aff4bc15bda809f994761d5719827d66c0b4",
            "filename": "CVE-2022-0500-20b2aff4bc15bda809f994761d5719827d66c0b4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-0500/CVE-2022-0500-20b2aff4bc15bda809f994761d5719827d66c0b4.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=20b2aff4bc15bda809f994761d5719827d66c0b4",
                "filename": "CVE-2022-0500-20b2aff4bc15bda809f994761d5719827d66c0b4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-0500/CVE-2022-0500-20b2aff4bc15bda809f994761d5719827d66c0b4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20",
                "filename": "CVE-2022-0500-216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-0500/CVE-2022-0500-216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821",
                "filename": "CVE-2022-0500-34d3a78c681e8e7844b43d1a2f4671a04249c821.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-0500/CVE-2022-0500-34d3a78c681e8e7844b43d1a2f4671a04249c821.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3c4807322660d4290ac9062c034aed6b87243861",
                "filename": "CVE-2022-0500-3c4807322660d4290ac9062c034aed6b87243861.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-0500/CVE-2022-0500-3c4807322660d4290ac9062c034aed6b87243861.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=48946bd6a5d695c50b34546864b79c1f910a33c1",
                "filename": "CVE-2022-0500-48946bd6a5d695c50b34546864b79c1f910a33c1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-0500/CVE-2022-0500-48946bd6a5d695c50b34546864b79c1f910a33c1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841",
                "filename": "CVE-2022-0500-c25b2ae136039ffa820c26138ed4a5e5f3ab3841.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-0500/CVE-2022-0500-c25b2ae136039ffa820c26138ed4a5e5f3ab3841.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57",
                "filename": "CVE-2022-0500-cf9f2f8d62eca810afbd1ee6cc0800202b000e57.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-0500/CVE-2022-0500-cf9f2f8d62eca810afbd1ee6cc0800202b000e57.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57",
            "https://www.cve.org/CVERecord?id=CVE-2022-0500\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-0500\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57"
        ]
    },
    "CVE-2022-23222": {
        "cve": "CVE-2022-23222",
        "cvss_v2": 7.2,
        "cvss_v3": 7.8,
        "description": "kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-23222",
        "selected_patch": {
            "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=64620e0a1e712a778095bd35cbb277dc2259281f",
            "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=64620e0a1e712a778095bd35cbb277dc2259281f",
            "filename": "CVE-2022-23222-64620e0a1e712a778095bd35cbb277dc2259281f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-23222/CVE-2022-23222-64620e0a1e712a778095bd35cbb277dc2259281f.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=64620e0a1e712a778095bd35cbb277dc2259281f",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=64620e0a1e712a778095bd35cbb277dc2259281f",
                "filename": "CVE-2022-23222-64620e0a1e712a778095bd35cbb277dc2259281f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-23222/CVE-2022-23222-64620e0a1e712a778095bd35cbb277dc2259281f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=64620e0a1e712a778095bd35cbb277dc2259281f"
        ]
    },
    "CVE-2022-28388": {
        "cve": "CVE-2022-28388",
        "cvss_v2": 2.1,
        "cvss_v3": 5.5,
        "description": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-28388",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2",
            "patch_url": "https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2.patch",
            "filename": "CVE-2022-28388-3d3925ff6433f98992685a9679613a2cc97f3ce2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-28388/CVE-2022-28388-3d3925ff6433f98992685a9679613a2cc97f3ce2.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2",
                "patch_url": "https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2.patch",
                "filename": "CVE-2022-28388-3d3925ff6433f98992685a9679613a2cc97f3ce2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-28388/CVE-2022-28388-3d3925ff6433f98992685a9679613a2cc97f3ce2.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2"
        ]
    },
    "CVE-2022-31084": {
        "cve": "CVE-2022-31084",
        "cvss_v2": 6.8,
        "cvss_v3": 8.1,
        "description": "LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 There are cases where LAM instantiates objects from arbitrary classes. An attacker can inject the first constructor argument. This can lead to code execution if non-LAM classes are instantiated that execute code during object creation. This issue has been fixed in version 8.0.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-31084",
        "selected_patch": {
            "url": "https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4",
            "patch_url": "https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4.patch",
            "filename": "CVE-2022-31084-f1d5d04952f39a1b4ea203d3964fa88e1429dfd4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-31084/CVE-2022-31084-f1d5d04952f39a1b4ea203d3964fa88e1429dfd4.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4",
                "patch_url": "https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4.patch",
                "filename": "CVE-2022-31084-f1d5d04952f39a1b4ea203d3964fa88e1429dfd4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-31084/CVE-2022-31084-f1d5d04952f39a1b4ea203d3964fa88e1429dfd4.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/LDAPAccountManager/lam/commit/f1d5d04952f39a1b4ea203d3964fa88e1429dfd4"
        ]
    },
    "CVE-2022-3545": {
        "cve": "CVE-2022-3545",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-3545",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/patch/?id=02e1a114fdb71e59ee6770294166c30d437bf86a",
            "filename": "CVE-2022-3545-02e1a114fdb71e59ee6770294166c30d437bf86a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-3545/CVE-2022-3545-02e1a114fdb71e59ee6770294166c30d437bf86a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/patch/?id=02e1a114fdb71e59ee6770294166c30d437bf86a",
                "filename": "CVE-2022-3545-02e1a114fdb71e59ee6770294166c30d437bf86a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-3545/CVE-2022-3545-02e1a114fdb71e59ee6770294166c30d437bf86a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a",
            "https://www.cve.org/CVERecord?id=CVE-2022-3545\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-3545\nhttps://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a"
        ]
    },
    "CVE-2022-3565": {
        "cve": "CVE-2022-3565",
        "cvss_v2": null,
        "cvss_v3": 4.6,
        "description": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-3565",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=2568a7e0832ee30b0a351016d03062ab4e0e0a3f",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/patch/?id=2568a7e0832ee30b0a351016d03062ab4e0e0a3f",
            "filename": "CVE-2022-3565-2568a7e0832ee30b0a351016d03062ab4e0e0a3f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-3565/CVE-2022-3565-2568a7e0832ee30b0a351016d03062ab4e0e0a3f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=2568a7e0832ee30b0a351016d03062ab4e0e0a3f",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/patch/?id=2568a7e0832ee30b0a351016d03062ab4e0e0a3f",
                "filename": "CVE-2022-3565-2568a7e0832ee30b0a351016d03062ab4e0e0a3f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-3565/CVE-2022-3565-2568a7e0832ee30b0a351016d03062ab4e0e0a3f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=2568a7e0832ee30b0a351016d03062ab4e0e0a3f"
        ]
    },
    "CVE-2022-3594": {
        "cve": "CVE-2022-3594",
        "cvss_v2": null,
        "cvss_v3": 5.3,
        "description": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-3594",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/patch/?id=93e2be344a7db169b7119de21ac1bf253b8c6907",
            "filename": "CVE-2022-3594-93e2be344a7db169b7119de21ac1bf253b8c6907.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-3594/CVE-2022-3594-93e2be344a7db169b7119de21ac1bf253b8c6907.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/patch/?id=93e2be344a7db169b7119de21ac1bf253b8c6907",
                "filename": "CVE-2022-3594-93e2be344a7db169b7119de21ac1bf253b8c6907.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-3594/CVE-2022-3594-93e2be344a7db169b7119de21ac1bf253b8c6907.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907",
            "https://www.cve.org/CVERecord?id=CVE-2022-3594\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-3594\nhttps://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907"
        ]
    },
    "CVE-2022-3640": {
        "cve": "CVE-2022-3640",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-3640",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/patch/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979",
            "filename": "CVE-2022-3640-42cf46dea905a80f6de218e837ba4d4cc33d6979.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-3640/CVE-2022-3640-42cf46dea905a80f6de218e837ba4d4cc33d6979.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/patch/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979",
                "filename": "CVE-2022-3640-42cf46dea905a80f6de218e837ba4d4cc33d6979.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-3640/CVE-2022-3640-42cf46dea905a80f6de218e837ba4d4cc33d6979.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979",
            "https://www.cve.org/CVERecord?id=CVE-2022-3640\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-3640\nhttps://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979"
        ]
    },
    "CVE-2022-36402": {
        "cve": "CVE-2022-36402",
        "cvss_v2": null,
        "cvss_v3": 6.3,
        "description": "An integer overflow vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-36402",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2022-38096": {
        "cve": "CVE-2022-38096",
        "cvss_v2": null,
        "cvss_v3": 6.3,
        "description": "A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-38096",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2022-38457": {
        "cve": "CVE-2022-38457",
        "cvss_v2": null,
        "cvss_v3": 6.3,
        "description": "A use-after-free(UAF) vulnerability was found in function 'vmw_cmd_res_check' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-38457",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2022-40133": {
        "cve": "CVE-2022-40133",
        "cvss_v2": null,
        "cvss_v3": 6.3,
        "description": "A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf_tie_context' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-40133",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2022-40284": {
        "cve": "CVE-2022-40284",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-40284",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2022-40982": {
        "cve": "CVE-2022-40982",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-40982",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2022-41858": {
        "cve": "CVE-2022-41858",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-41858",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798",
            "patch_url": "https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798.patch",
            "filename": "CVE-2022-41858-ec4eb8a86ade4d22633e1da2a7d85a846b7d1798.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-41858/CVE-2022-41858-ec4eb8a86ade4d22633e1da2a7d85a846b7d1798.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798",
                "patch_url": "https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798.patch",
                "filename": "CVE-2022-41858-ec4eb8a86ade4d22633e1da2a7d85a846b7d1798.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-41858/CVE-2022-41858-ec4eb8a86ade4d22633e1da2a7d85a846b7d1798.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798"
        ]
    },
    "CVE-2022-42895": {
        "cve": "CVE-2022-42895",
        "cvss_v2": null,
        "cvss_v3": 5.1,
        "description": "There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely.\nWe recommend upgrading past commit\u00a0 https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url \n\n",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-42895",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e",
            "patch_url": "https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e.patch",
            "filename": "CVE-2022-42895-b1a2cd50c0357f243b7435a732b4e62ba3157a2e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-42895/CVE-2022-42895-b1a2cd50c0357f243b7435a732b4e62ba3157a2e.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e",
                "patch_url": "https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e.patch",
                "filename": "CVE-2022-42895-b1a2cd50c0357f243b7435a732b4e62ba3157a2e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-42895/CVE-2022-42895-b1a2cd50c0357f243b7435a732b4e62ba3157a2e.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e"
        ]
    },
    "CVE-2022-42896": {
        "cve": "CVE-2022-42896",
        "cvss_v2": null,
        "cvss_v3": 8,
        "description": "There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth.\u00a0A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim.\n\nWe recommend upgrading past commit\u00a0  https://www.google.com/url  https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url \n\n",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-42896",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4",
            "patch_url": "https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4.patch",
            "filename": "CVE-2022-42896-711f8c3fb3db61897080468586b970c87c61d9e4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-42896/CVE-2022-42896-711f8c3fb3db61897080468586b970c87c61d9e4.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4",
                "patch_url": "https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4.patch",
                "filename": "CVE-2022-42896-711f8c3fb3db61897080468586b970c87c61d9e4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-42896/CVE-2022-42896-711f8c3fb3db61897080468586b970c87c61d9e4.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4"
        ]
    },
    "CVE-2022-45869": {
        "cve": "CVE-2022-45869",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-45869",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15",
            "filename": "CVE-2022-45869-47b0c2e4c220f2251fd8dcfbb44479819c715e15.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-45869/CVE-2022-45869-47b0c2e4c220f2251fd8dcfbb44479819c715e15.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15",
                "filename": "CVE-2022-45869-47b0c2e4c220f2251fd8dcfbb44479819c715e15.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-45869/CVE-2022-45869-47b0c2e4c220f2251fd8dcfbb44479819c715e15.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15"
        ]
    },
    "CVE-2022-45884": {
        "cve": "CVE-2022-45884",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-45884",
        "selected_patch": {
            "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=627bb528b086b4136315c25d6a447a98ea9448d3",
            "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=627bb528b086b4136315c25d6a447a98ea9448d3",
            "filename": "CVE-2022-45884-627bb528b086b4136315c25d6a447a98ea9448d3.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-45884/CVE-2022-45884-627bb528b086b4136315c25d6a447a98ea9448d3.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=627bb528b086b4136315c25d6a447a98ea9448d3",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=627bb528b086b4136315c25d6a447a98ea9448d3",
                "filename": "CVE-2022-45884-627bb528b086b4136315c25d6a447a98ea9448d3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-45884/CVE-2022-45884-627bb528b086b4136315c25d6a447a98ea9448d3.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=627bb528b086b4136315c25d6a447a98ea9448d3",
            "https://lore.kernel.org/linux-media/",
            "https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/",
            "https://lore.kernel.org/linux-media/20221115131822.6640-4-imv4bel%40gmail.com/",
            "https://www.cve.org/CVERecord?id=CVE-2022-45884\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-45884\nhttps://lore.kernel.org/linux-media/20221117045925.14297-4-imv4bel@gmail.com/"
        ]
    },
    "CVE-2022-45886": {
        "cve": "CVE-2022-45886",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-45886",
        "selected_patch": {
            "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4172385b0c9ac366dcab78eda48c26814b87ed1a",
            "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=4172385b0c9ac366dcab78eda48c26814b87ed1a",
            "filename": "CVE-2022-45886-4172385b0c9ac366dcab78eda48c26814b87ed1a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-45886/CVE-2022-45886-4172385b0c9ac366dcab78eda48c26814b87ed1a.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4172385b0c9ac366dcab78eda48c26814b87ed1a",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=4172385b0c9ac366dcab78eda48c26814b87ed1a",
                "filename": "CVE-2022-45886-4172385b0c9ac366dcab78eda48c26814b87ed1a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-45886/CVE-2022-45886-4172385b0c9ac366dcab78eda48c26814b87ed1a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4172385b0c9ac366dcab78eda48c26814b87ed1a",
            "https://lore.kernel.org/linux-media/",
            "https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/",
            "https://lore.kernel.org/linux-media/20221115131822.6640-3-imv4bel%40gmail.com/",
            "https://www.cve.org/CVERecord?id=CVE-2022-45886\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-45886\nhttps://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel@gmail.com/\nhttps://lore.kernel.org/linux-media/20221115131822.6640-3-imv4bel@gmail.com/"
        ]
    },
    "CVE-2022-45887": {
        "cve": "CVE-2022-45887",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-45887",
        "selected_patch": {
            "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=517a281338322ff8293f988771c98aaa7205e457",
            "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=517a281338322ff8293f988771c98aaa7205e457",
            "filename": "CVE-2022-45887-517a281338322ff8293f988771c98aaa7205e457.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-45887/CVE-2022-45887-517a281338322ff8293f988771c98aaa7205e457.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=517a281338322ff8293f988771c98aaa7205e457",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=517a281338322ff8293f988771c98aaa7205e457",
                "filename": "CVE-2022-45887-517a281338322ff8293f988771c98aaa7205e457.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-45887/CVE-2022-45887-517a281338322ff8293f988771c98aaa7205e457.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=517a281338322ff8293f988771c98aaa7205e457",
            "https://lore.kernel.org/linux-media/",
            "https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/",
            "https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel%40gmail.com/",
            "https://www.cve.org/CVERecord?id=CVE-2022-45887\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-45887\nhttps://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel@gmail.com/\nhttps://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel@gmail.com/"
        ]
    },
    "CVE-2022-45919": {
        "cve": "CVE-2022-45919",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-45919",
        "selected_patch": {
            "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=280a8ab81733da8bc442253c700a52c4c0886ffd",
            "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=280a8ab81733da8bc442253c700a52c4c0886ffd",
            "filename": "CVE-2022-45919-280a8ab81733da8bc442253c700a52c4c0886ffd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-45919/CVE-2022-45919-280a8ab81733da8bc442253c700a52c4c0886ffd.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=280a8ab81733da8bc442253c700a52c4c0886ffd",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=280a8ab81733da8bc442253c700a52c4c0886ffd",
                "filename": "CVE-2022-45919-280a8ab81733da8bc442253c700a52c4c0886ffd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-45919/CVE-2022-45919-280a8ab81733da8bc442253c700a52c4c0886ffd.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=280a8ab81733da8bc442253c700a52c4c0886ffd",
            "https://lore.kernel.org/linux-media/20221121063308.GA33821%40ubuntu/T/#u",
            "https://lore.kernel.org/linux-media/20221121063308.GA33821@ubuntu/T/#u",
            "https://www.cve.org/CVERecord?id=CVE-2022-45919\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-45919\nhttps://lore.kernel.org/linux-media/20221121063308.GA33821@ubuntu/T/#u"
        ]
    },
    "CVE-2022-45934": {
        "cve": "CVE-2022-45934",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-45934",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=ae4569813a6e931258db627cdfe50dfb4f917d5d",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/patch/?id=ae4569813a6e931258db627cdfe50dfb4f917d5d",
            "filename": "CVE-2022-45934-ae4569813a6e931258db627cdfe50dfb4f917d5d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-45934/CVE-2022-45934-ae4569813a6e931258db627cdfe50dfb4f917d5d.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=ae4569813a6e931258db627cdfe50dfb4f917d5d",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/patch/?id=ae4569813a6e931258db627cdfe50dfb4f917d5d",
                "filename": "CVE-2022-45934-ae4569813a6e931258db627cdfe50dfb4f917d5d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-45934/CVE-2022-45934-ae4569813a6e931258db627cdfe50dfb4f917d5d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=ae4569813a6e931258db627cdfe50dfb4f917d5d",
            "https://www.cve.org/CVERecord?id=CVE-2022-45934\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-45934\nhttps://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=ae4569813a6e931258db627cdfe50dfb4f917d5d"
        ]
    },
    "CVE-2022-46329": {
        "cve": "CVE-2022-46329",
        "cvss_v2": null,
        "cvss_v3": 8.2,
        "description": "Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-46329",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2022-4744": {
        "cve": "CVE-2022-4744",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A double-free flaw was found in the Linux kernel\u2019s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-4744",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/patch/?id=158b515f703e",
            "filename": "CVE-2022-4744-158b515f703e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-4744/CVE-2022-4744-158b515f703e.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/patch/?id=158b515f703e",
                "filename": "CVE-2022-4744-158b515f703e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-4744/CVE-2022-4744-158b515f703e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e",
            "https://www.cve.org/CVERecord?id=CVE-2022-4744\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-4744\nhttps://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e"
        ]
    },
    "CVE-2022-48619": {
        "cve": "CVE-2022-48619",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "An issue was discovered in drivers/input/input.c in the Linux kernel before 5.17.10. An attacker can cause a denial of service (panic) because input_set_capability mishandles the situation in which an event code falls outside of a bitmap.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48619",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc",
            "patch_url": "https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc.patch",
            "filename": "CVE-2022-48619-409353cbe9fe48f6bc196114c442b1cff05a39bc.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48619/CVE-2022-48619-409353cbe9fe48f6bc196114c442b1cff05a39bc.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc",
                "patch_url": "https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc.patch",
                "filename": "CVE-2022-48619-409353cbe9fe48f6bc196114c442b1cff05a39bc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48619/CVE-2022-48619-409353cbe9fe48f6bc196114c442b1cff05a39bc.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10",
            "https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc",
            "https://www.cve.org/CVERecord?id=CVE-2022-48619\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48619\nhttps://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10\nhttps://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc"
        ]
    },
    "CVE-2022-48624": {
        "cve": "CVE-2022-48624",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "close_altfile in filename.c in less before 606 omits shell_quote calls for LESSCLOSE.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48624",
        "selected_patch": {
            "url": "https://github.com/gwsw/less/commit/c6ac6de49698be84d264a0c4c0c40bb870b10144",
            "patch_url": "https://github.com/gwsw/less/commit/c6ac6de49698be84d264a0c4c0c40bb870b10144.patch",
            "filename": "CVE-2022-48624-c6ac6de49698be84d264a0c4c0c40bb870b10144.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48624/CVE-2022-48624-c6ac6de49698be84d264a0c4c0c40bb870b10144.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/gwsw/less/commit/c6ac6de49698be84d264a0c4c0c40bb870b10144",
                "patch_url": "https://github.com/gwsw/less/commit/c6ac6de49698be84d264a0c4c0c40bb870b10144.patch",
                "filename": "CVE-2022-48624-c6ac6de49698be84d264a0c4c0c40bb870b10144.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48624/CVE-2022-48624-c6ac6de49698be84d264a0c4c0c40bb870b10144.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/gwsw/less/commit/c6ac6de49698be84d264a0c4c0c40bb870b10144"
        ]
    },
    "CVE-2022-48627": {
        "cve": "CVE-2022-48627",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: fix memory overlapping when deleting chars in the buffer\n\nA memory overlapping copy occurs when deleting a long line. This memory\noverlapping copy can cause data corruption when scr_memcpyw is optimized\nto memcpy because memcpy does not ensure its behavior if the destination\nbuffer overlaps with the source buffer. The line buffer is not always\nbroken, because the memcpy utilizes the hardware acceleration, whose\nresult is not deterministic.\n\nFix this problem by using replacing the scr_memcpyw with scr_memmovew.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48627",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/815be99d934e3292906536275f2b8d5131cdf52c",
            "patch_url": "https://git.kernel.org/stable/p/815be99d934e3292906536275f2b8d5131cdf52c",
            "filename": "CVE-2022-48627-815be99d934e3292906536275f2b8d5131cdf52c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48627/CVE-2022-48627-815be99d934e3292906536275f2b8d5131cdf52c.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265",
                "patch_url": "https://git.kernel.org/stable/p/14d2cc21ca622310babf373e3a8f0b40acfe8265",
                "filename": "CVE-2022-48627-14d2cc21ca622310babf373e3a8f0b40acfe8265.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48627/CVE-2022-48627-14d2cc21ca622310babf373e3a8f0b40acfe8265.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc",
                "patch_url": "https://git.kernel.org/stable/p/39cdb68c64d84e71a4a717000b6e5de208ee60cc",
                "filename": "CVE-2022-48627-39cdb68c64d84e71a4a717000b6e5de208ee60cc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48627/CVE-2022-48627-39cdb68c64d84e71a4a717000b6e5de208ee60cc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244",
                "patch_url": "https://git.kernel.org/stable/p/57964a5710252bc82fe22d9fa98c180c58c20244",
                "filename": "CVE-2022-48627-57964a5710252bc82fe22d9fa98c180c58c20244.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48627/CVE-2022-48627-57964a5710252bc82fe22d9fa98c180c58c20244.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/815be99d934e3292906536275f2b8d5131cdf52c",
                "patch_url": "https://git.kernel.org/stable/p/815be99d934e3292906536275f2b8d5131cdf52c",
                "filename": "CVE-2022-48627-815be99d934e3292906536275f2b8d5131cdf52c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48627/CVE-2022-48627-815be99d934e3292906536275f2b8d5131cdf52c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926",
                "patch_url": "https://git.kernel.org/stable/p/bfee93c9a6c395f9aa62268f1cedf64999844926",
                "filename": "CVE-2022-48627-bfee93c9a6c395f9aa62268f1cedf64999844926.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48627/CVE-2022-48627-bfee93c9a6c395f9aa62268f1cedf64999844926.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c8686c014b5e872ba7e334f33ca553f14446fc29",
                "patch_url": "https://git.kernel.org/stable/p/c8686c014b5e872ba7e334f33ca553f14446fc29",
                "filename": "CVE-2022-48627-c8686c014b5e872ba7e334f33ca553f14446fc29.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48627/CVE-2022-48627-c8686c014b5e872ba7e334f33ca553f14446fc29.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265",
            "https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc",
            "https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244",
            "https://git.kernel.org/stable/c/815be99d934e3292906536275f2b8d5131cdf52c",
            "https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926",
            "https://git.kernel.org/stable/c/c8686c014b5e872ba7e334f33ca553f14446fc29",
            "https://www.cve.org/CVERecord?id=CVE-2022-48627\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48627\nhttps://lore.kernel.org/linux-cve-announce/2024030252-CVE-2022-48627-c7bf@gregkh/T/#u"
        ]
    },
    "CVE-2022-48632": {
        "cve": "CVE-2022-48632",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()\n\nmemcpy() is called in a loop while 'operation->length' upper bound\nis not checked and 'data_idx' also increments.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48632",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/48ee0a864d1af02eea98fc825cc230d61517a71e",
            "patch_url": "https://git.kernel.org/stable/p/48ee0a864d1af02eea98fc825cc230d61517a71e",
            "filename": "CVE-2022-48632-48ee0a864d1af02eea98fc825cc230d61517a71e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48632/CVE-2022-48632-48ee0a864d1af02eea98fc825cc230d61517a71e.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3b5ab5fbe69ebbee5692c72b05071a43fc0655d8",
                "patch_url": "https://git.kernel.org/stable/p/3b5ab5fbe69ebbee5692c72b05071a43fc0655d8",
                "filename": "CVE-2022-48632-3b5ab5fbe69ebbee5692c72b05071a43fc0655d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48632/CVE-2022-48632-3b5ab5fbe69ebbee5692c72b05071a43fc0655d8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/48ee0a864d1af02eea98fc825cc230d61517a71e",
                "patch_url": "https://git.kernel.org/stable/p/48ee0a864d1af02eea98fc825cc230d61517a71e",
                "filename": "CVE-2022-48632-48ee0a864d1af02eea98fc825cc230d61517a71e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48632/CVE-2022-48632-48ee0a864d1af02eea98fc825cc230d61517a71e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dc2a0c587006f29b724069740c48654b9dcaebd2",
                "patch_url": "https://git.kernel.org/stable/p/dc2a0c587006f29b724069740c48654b9dcaebd2",
                "filename": "CVE-2022-48632-dc2a0c587006f29b724069740c48654b9dcaebd2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48632/CVE-2022-48632-dc2a0c587006f29b724069740c48654b9dcaebd2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/de24aceb07d426b6f1c59f33889d6a964770547b",
                "patch_url": "https://git.kernel.org/stable/p/de24aceb07d426b6f1c59f33889d6a964770547b",
                "filename": "CVE-2022-48632-de24aceb07d426b6f1c59f33889d6a964770547b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48632/CVE-2022-48632-de24aceb07d426b6f1c59f33889d6a964770547b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3b5ab5fbe69ebbee5692c72b05071a43fc0655d8",
            "https://git.kernel.org/stable/c/48ee0a864d1af02eea98fc825cc230d61517a71e",
            "https://git.kernel.org/stable/c/dc2a0c587006f29b724069740c48654b9dcaebd2",
            "https://git.kernel.org/stable/c/de24aceb07d426b6f1c59f33889d6a964770547b",
            "https://www.cve.org/CVERecord?id=CVE-2022-48632\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48632\nhttps://lore.kernel.org/linux-cve-announce/2024042854-CVE-2022-48632-465f@gregkh/T"
        ]
    },
    "CVE-2022-48669": {
        "cve": "CVE-2022-48669",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries: Fix potential memleak in papr_get_attr()\n\n`buf` is allocated in papr_get_attr(), and krealloc() of `buf`\ncould fail. We need to free the original `buf` in the case of failure.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48669",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1699fb915b9f61794d559b55114c09a390aaf234",
            "patch_url": "https://git.kernel.org/stable/p/1699fb915b9f61794d559b55114c09a390aaf234",
            "filename": "CVE-2022-48669-1699fb915b9f61794d559b55114c09a390aaf234.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48669/CVE-2022-48669-1699fb915b9f61794d559b55114c09a390aaf234.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1699fb915b9f61794d559b55114c09a390aaf234",
                "patch_url": "https://git.kernel.org/stable/p/1699fb915b9f61794d559b55114c09a390aaf234",
                "filename": "CVE-2022-48669-1699fb915b9f61794d559b55114c09a390aaf234.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48669/CVE-2022-48669-1699fb915b9f61794d559b55114c09a390aaf234.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7f7d39fe3d80d6143404940b2413010cf6527029",
                "patch_url": "https://git.kernel.org/stable/p/7f7d39fe3d80d6143404940b2413010cf6527029",
                "filename": "CVE-2022-48669-7f7d39fe3d80d6143404940b2413010cf6527029.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48669/CVE-2022-48669-7f7d39fe3d80d6143404940b2413010cf6527029.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a3f22feb2220a945d1c3282e34199e8bcdc5afc4",
                "patch_url": "https://git.kernel.org/stable/p/a3f22feb2220a945d1c3282e34199e8bcdc5afc4",
                "filename": "CVE-2022-48669-a3f22feb2220a945d1c3282e34199e8bcdc5afc4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48669/CVE-2022-48669-a3f22feb2220a945d1c3282e34199e8bcdc5afc4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cda9c0d556283e2d4adaa9960b2dc19b16156bae",
                "patch_url": "https://git.kernel.org/stable/p/cda9c0d556283e2d4adaa9960b2dc19b16156bae",
                "filename": "CVE-2022-48669-cda9c0d556283e2d4adaa9960b2dc19b16156bae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48669/CVE-2022-48669-cda9c0d556283e2d4adaa9960b2dc19b16156bae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d0647c3e81eff62b66d46fd4e475318cb8cb3610",
                "patch_url": "https://git.kernel.org/stable/p/d0647c3e81eff62b66d46fd4e475318cb8cb3610",
                "filename": "CVE-2022-48669-d0647c3e81eff62b66d46fd4e475318cb8cb3610.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48669/CVE-2022-48669-d0647c3e81eff62b66d46fd4e475318cb8cb3610.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1699fb915b9f61794d559b55114c09a390aaf234",
            "https://git.kernel.org/stable/c/7f7d39fe3d80d6143404940b2413010cf6527029",
            "https://git.kernel.org/stable/c/a3f22feb2220a945d1c3282e34199e8bcdc5afc4",
            "https://git.kernel.org/stable/c/cda9c0d556283e2d4adaa9960b2dc19b16156bae",
            "https://git.kernel.org/stable/c/d0647c3e81eff62b66d46fd4e475318cb8cb3610",
            "https://www.cve.org/CVERecord?id=CVE-2022-48669\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48669\nhttps://lore.kernel.org/linux-cve-announce/2024050131-CVE-2022-48669-15cf@gregkh/T"
        ]
    },
    "CVE-2022-48743": {
        "cve": "CVE-2022-48743",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: amd-xgbe: Fix skb data length underflow\n\nThere will be BUG_ON() triggered in include/linux/skbuff.h leading to\nintermittent kernel panic, when the skb length underflow is detected.\n\nFix this by dropping the packet if such length underflows are seen\nbecause of inconsistencies in the hardware descriptors.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48743",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576",
            "patch_url": "https://git.kernel.org/stable/p/9892742f035f7aa7dcd2bb0750effa486db89576",
            "filename": "CVE-2022-48743-9892742f035f7aa7dcd2bb0750effa486db89576.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48743/CVE-2022-48743-9892742f035f7aa7dcd2bb0750effa486db89576.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26",
                "patch_url": "https://git.kernel.org/stable/p/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26",
                "filename": "CVE-2022-48743-34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48743/CVE-2022-48743-34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e",
                "patch_url": "https://git.kernel.org/stable/p/4d3fcfe8464838b3920bc2b939d888e0b792934e",
                "filename": "CVE-2022-48743-4d3fcfe8464838b3920bc2b939d888e0b792934e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48743/CVE-2022-48743-4d3fcfe8464838b3920bc2b939d888e0b792934e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee",
                "patch_url": "https://git.kernel.org/stable/p/5aac9108a180fc06e28d4e7fb00247ce603b72ee",
                "filename": "CVE-2022-48743-5aac9108a180fc06e28d4e7fb00247ce603b72ee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48743/CVE-2022-48743-5aac9108a180fc06e28d4e7fb00247ce603b72ee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d",
                "patch_url": "https://git.kernel.org/stable/p/617f9934bb37993b9813832516f318ba874bcb7d",
                "filename": "CVE-2022-48743-617f9934bb37993b9813832516f318ba874bcb7d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48743/CVE-2022-48743-617f9934bb37993b9813832516f318ba874bcb7d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576",
                "patch_url": "https://git.kernel.org/stable/p/9892742f035f7aa7dcd2bb0750effa486db89576",
                "filename": "CVE-2022-48743-9892742f035f7aa7dcd2bb0750effa486db89576.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48743/CVE-2022-48743-9892742f035f7aa7dcd2bb0750effa486db89576.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e",
                "patch_url": "https://git.kernel.org/stable/p/9924c80bd484340191e586110ca22bff23a49f2e",
                "filename": "CVE-2022-48743-9924c80bd484340191e586110ca22bff23a49f2e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48743/CVE-2022-48743-9924c80bd484340191e586110ca22bff23a49f2e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce",
                "patch_url": "https://git.kernel.org/stable/p/db6fd92316a254be2097556f01bccecf560e53ce",
                "filename": "CVE-2022-48743-db6fd92316a254be2097556f01bccecf560e53ce.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48743/CVE-2022-48743-db6fd92316a254be2097556f01bccecf560e53ce.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5",
                "patch_url": "https://git.kernel.org/stable/p/e8f73f620fee5f52653ed2da360121e4446575c5",
                "filename": "CVE-2022-48743-e8f73f620fee5f52653ed2da360121e4446575c5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48743/CVE-2022-48743-e8f73f620fee5f52653ed2da360121e4446575c5.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26",
            "https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e",
            "https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee",
            "https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d",
            "https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576",
            "https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e",
            "https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce",
            "https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5",
            "https://www.cve.org/CVERecord?id=CVE-2022-48743\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48743\nhttps://lore.kernel.org/linux-cve-announce/2024062003-CVE-2022-48743-ee30@gregkh/T"
        ]
    },
    "CVE-2022-48747": {
        "cve": "CVE-2022-48747",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: Fix wrong offset in bio_truncate()\n\nbio_truncate() clears the buffer outside of last block of bdev, however\ncurrent bio_truncate() is using the wrong offset of page. So it can\nreturn the uninitialized data.\n\nThis happened when both of truncated/corrupted FS and userspace (via\nbdev) are trying to read the last of bdev.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48747",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4633a79ff8bc82770486a063a08b55e5162521d8",
            "patch_url": "https://git.kernel.org/stable/p/4633a79ff8bc82770486a063a08b55e5162521d8",
            "filename": "CVE-2022-48747-4633a79ff8bc82770486a063a08b55e5162521d8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48747/CVE-2022-48747-4633a79ff8bc82770486a063a08b55e5162521d8.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3ee859e384d453d6ac68bfd5971f630d9fa46ad3",
                "patch_url": "https://git.kernel.org/stable/p/3ee859e384d453d6ac68bfd5971f630d9fa46ad3",
                "filename": "CVE-2022-48747-3ee859e384d453d6ac68bfd5971f630d9fa46ad3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48747/CVE-2022-48747-3ee859e384d453d6ac68bfd5971f630d9fa46ad3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4633a79ff8bc82770486a063a08b55e5162521d8",
                "patch_url": "https://git.kernel.org/stable/p/4633a79ff8bc82770486a063a08b55e5162521d8",
                "filename": "CVE-2022-48747-4633a79ff8bc82770486a063a08b55e5162521d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48747/CVE-2022-48747-4633a79ff8bc82770486a063a08b55e5162521d8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6cbf4c731d7812518cd857c2cfc3da9fd120f6ae",
                "patch_url": "https://git.kernel.org/stable/p/6cbf4c731d7812518cd857c2cfc3da9fd120f6ae",
                "filename": "CVE-2022-48747-6cbf4c731d7812518cd857c2cfc3da9fd120f6ae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48747/CVE-2022-48747-6cbf4c731d7812518cd857c2cfc3da9fd120f6ae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/941d5180c430ce5b0f7a3622ef9b76077bfa3d82",
                "patch_url": "https://git.kernel.org/stable/p/941d5180c430ce5b0f7a3622ef9b76077bfa3d82",
                "filename": "CVE-2022-48747-941d5180c430ce5b0f7a3622ef9b76077bfa3d82.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48747/CVE-2022-48747-941d5180c430ce5b0f7a3622ef9b76077bfa3d82.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b63e120189fd92aff00096d11e2fc5253f60248b",
                "patch_url": "https://git.kernel.org/stable/p/b63e120189fd92aff00096d11e2fc5253f60248b",
                "filename": "CVE-2022-48747-b63e120189fd92aff00096d11e2fc5253f60248b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48747/CVE-2022-48747-b63e120189fd92aff00096d11e2fc5253f60248b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3ee859e384d453d6ac68bfd5971f630d9fa46ad3",
            "https://git.kernel.org/stable/c/4633a79ff8bc82770486a063a08b55e5162521d8",
            "https://git.kernel.org/stable/c/6cbf4c731d7812518cd857c2cfc3da9fd120f6ae",
            "https://git.kernel.org/stable/c/941d5180c430ce5b0f7a3622ef9b76077bfa3d82",
            "https://git.kernel.org/stable/c/b63e120189fd92aff00096d11e2fc5253f60248b",
            "https://www.cve.org/CVERecord?id=CVE-2022-48747\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48747\nhttps://lore.kernel.org/linux-cve-announce/2024062004-CVE-2022-48747-c63f@gregkh/T"
        ]
    },
    "CVE-2022-48754": {
        "cve": "CVE-2022-48754",
        "cvss_v2": null,
        "cvss_v3": 8.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nphylib: fix potential use-after-free\n\nCommit bafbdd527d56 (\"phylib: Add device reset GPIO support\") added call\nto phy_device_reset(phydev) after the put_device() call in phy_detach().\n\nThe comment before the put_device() call says that the phydev might go\naway with put_device().\n\nFix potential use-after-free by calling phy_device_reset() before\nput_device().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48754",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/aefaccd19379d6c4620269a162bfb88ff687f289",
            "patch_url": "https://git.kernel.org/stable/p/aefaccd19379d6c4620269a162bfb88ff687f289",
            "filename": "CVE-2022-48754-aefaccd19379d6c4620269a162bfb88ff687f289.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48754/CVE-2022-48754-aefaccd19379d6c4620269a162bfb88ff687f289.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/67d271760b037ce0806d687ee6057edc8afd4205",
                "patch_url": "https://git.kernel.org/stable/p/67d271760b037ce0806d687ee6057edc8afd4205",
                "filename": "CVE-2022-48754-67d271760b037ce0806d687ee6057edc8afd4205.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48754/CVE-2022-48754-67d271760b037ce0806d687ee6057edc8afd4205.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aefaccd19379d6c4620269a162bfb88ff687f289",
                "patch_url": "https://git.kernel.org/stable/p/aefaccd19379d6c4620269a162bfb88ff687f289",
                "filename": "CVE-2022-48754-aefaccd19379d6c4620269a162bfb88ff687f289.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48754/CVE-2022-48754-aefaccd19379d6c4620269a162bfb88ff687f289.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bd024e36f68174b1793906c39ca16cee0c9295c2",
                "patch_url": "https://git.kernel.org/stable/p/bd024e36f68174b1793906c39ca16cee0c9295c2",
                "filename": "CVE-2022-48754-bd024e36f68174b1793906c39ca16cee0c9295c2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48754/CVE-2022-48754-bd024e36f68174b1793906c39ca16cee0c9295c2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cb2fab10fc5e7a3aa1bb0a68a3abdcf3e37852af",
                "patch_url": "https://git.kernel.org/stable/p/cb2fab10fc5e7a3aa1bb0a68a3abdcf3e37852af",
                "filename": "CVE-2022-48754-cb2fab10fc5e7a3aa1bb0a68a3abdcf3e37852af.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48754/CVE-2022-48754-cb2fab10fc5e7a3aa1bb0a68a3abdcf3e37852af.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cbda1b16687580d5beee38273f6241ae3725960c",
                "patch_url": "https://git.kernel.org/stable/p/cbda1b16687580d5beee38273f6241ae3725960c",
                "filename": "CVE-2022-48754-cbda1b16687580d5beee38273f6241ae3725960c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48754/CVE-2022-48754-cbda1b16687580d5beee38273f6241ae3725960c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f39027cbada43b33566c312e6be3db654ca3ad17",
                "patch_url": "https://git.kernel.org/stable/p/f39027cbada43b33566c312e6be3db654ca3ad17",
                "filename": "CVE-2022-48754-f39027cbada43b33566c312e6be3db654ca3ad17.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48754/CVE-2022-48754-f39027cbada43b33566c312e6be3db654ca3ad17.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/67d271760b037ce0806d687ee6057edc8afd4205",
            "https://git.kernel.org/stable/c/aefaccd19379d6c4620269a162bfb88ff687f289",
            "https://git.kernel.org/stable/c/bd024e36f68174b1793906c39ca16cee0c9295c2",
            "https://git.kernel.org/stable/c/cb2fab10fc5e7a3aa1bb0a68a3abdcf3e37852af",
            "https://git.kernel.org/stable/c/cbda1b16687580d5beee38273f6241ae3725960c",
            "https://git.kernel.org/stable/c/f39027cbada43b33566c312e6be3db654ca3ad17",
            "https://www.cve.org/CVERecord?id=CVE-2022-48754\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48754\nhttps://lore.kernel.org/linux-cve-announce/2024062006-CVE-2022-48754-4012@gregkh/T"
        ]
    },
    "CVE-2022-48757": {
        "cve": "CVE-2022-48757",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix information leakage in /proc/net/ptype\n\nIn one net namespace, after creating a packet socket without binding\nit to a device, users in other net namespaces can observe the new\n`packet_type` added by this packet socket by reading `/proc/net/ptype`\nfile. This is minor information leakage as packet socket is\nnamespace aware.\n\nAdd a net pointer in `packet_type` to keep the net namespace of\nof corresponding packet socket. In `ptype_seq_show`, this net pointer\nmust be checked when it is not NULL.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48757",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/e43669c77cb3a742b7d84ecdc7c68c4167a7709b",
            "patch_url": "https://git.kernel.org/stable/p/e43669c77cb3a742b7d84ecdc7c68c4167a7709b",
            "filename": "CVE-2022-48757-e43669c77cb3a742b7d84ecdc7c68c4167a7709b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48757/CVE-2022-48757-e43669c77cb3a742b7d84ecdc7c68c4167a7709b.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/47934e06b65637c88a762d9c98329ae6e3238888",
                "patch_url": "https://git.kernel.org/stable/p/47934e06b65637c88a762d9c98329ae6e3238888",
                "filename": "CVE-2022-48757-47934e06b65637c88a762d9c98329ae6e3238888.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48757/CVE-2022-48757-47934e06b65637c88a762d9c98329ae6e3238888.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/839ec7039513a4f84bfbaff953a9393471176bee",
                "patch_url": "https://git.kernel.org/stable/p/839ec7039513a4f84bfbaff953a9393471176bee",
                "filename": "CVE-2022-48757-839ec7039513a4f84bfbaff953a9393471176bee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48757/CVE-2022-48757-839ec7039513a4f84bfbaff953a9393471176bee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8f88c78d24f6f346919007cd459fd7e51a8c7779",
                "patch_url": "https://git.kernel.org/stable/p/8f88c78d24f6f346919007cd459fd7e51a8c7779",
                "filename": "CVE-2022-48757-8f88c78d24f6f346919007cd459fd7e51a8c7779.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48757/CVE-2022-48757-8f88c78d24f6f346919007cd459fd7e51a8c7779.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b67ad6170c0ea87391bb253f35d1f78857736e54",
                "patch_url": "https://git.kernel.org/stable/p/b67ad6170c0ea87391bb253f35d1f78857736e54",
                "filename": "CVE-2022-48757-b67ad6170c0ea87391bb253f35d1f78857736e54.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48757/CVE-2022-48757-b67ad6170c0ea87391bb253f35d1f78857736e54.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/be1ca30331c7923c6f376610c1bd6059be9b1908",
                "patch_url": "https://git.kernel.org/stable/p/be1ca30331c7923c6f376610c1bd6059be9b1908",
                "filename": "CVE-2022-48757-be1ca30331c7923c6f376610c1bd6059be9b1908.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48757/CVE-2022-48757-be1ca30331c7923c6f376610c1bd6059be9b1908.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c38023032a598ec6263e008d62c7f02def72d5c7",
                "patch_url": "https://git.kernel.org/stable/p/c38023032a598ec6263e008d62c7f02def72d5c7",
                "filename": "CVE-2022-48757-c38023032a598ec6263e008d62c7f02def72d5c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48757/CVE-2022-48757-c38023032a598ec6263e008d62c7f02def72d5c7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/db044d97460ea792110eb8b971e82569ded536c6",
                "patch_url": "https://git.kernel.org/stable/p/db044d97460ea792110eb8b971e82569ded536c6",
                "filename": "CVE-2022-48757-db044d97460ea792110eb8b971e82569ded536c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48757/CVE-2022-48757-db044d97460ea792110eb8b971e82569ded536c6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e372ecd455b6ebc7720f52bf4b5f5d44d02f2092",
                "patch_url": "https://git.kernel.org/stable/p/e372ecd455b6ebc7720f52bf4b5f5d44d02f2092",
                "filename": "CVE-2022-48757-e372ecd455b6ebc7720f52bf4b5f5d44d02f2092.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48757/CVE-2022-48757-e372ecd455b6ebc7720f52bf4b5f5d44d02f2092.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e43669c77cb3a742b7d84ecdc7c68c4167a7709b",
                "patch_url": "https://git.kernel.org/stable/p/e43669c77cb3a742b7d84ecdc7c68c4167a7709b",
                "filename": "CVE-2022-48757-e43669c77cb3a742b7d84ecdc7c68c4167a7709b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48757/CVE-2022-48757-e43669c77cb3a742b7d84ecdc7c68c4167a7709b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/47934e06b65637c88a762d9c98329ae6e3238888",
            "https://git.kernel.org/stable/c/839ec7039513a4f84bfbaff953a9393471176bee",
            "https://git.kernel.org/stable/c/8f88c78d24f6f346919007cd459fd7e51a8c7779",
            "https://git.kernel.org/stable/c/b67ad6170c0ea87391bb253f35d1f78857736e54",
            "https://git.kernel.org/stable/c/be1ca30331c7923c6f376610c1bd6059be9b1908",
            "https://git.kernel.org/stable/c/c38023032a598ec6263e008d62c7f02def72d5c7",
            "https://git.kernel.org/stable/c/db044d97460ea792110eb8b971e82569ded536c6",
            "https://git.kernel.org/stable/c/e372ecd455b6ebc7720f52bf4b5f5d44d02f2092",
            "https://git.kernel.org/stable/c/e43669c77cb3a742b7d84ecdc7c68c4167a7709b",
            "https://www.cve.org/CVERecord?id=CVE-2022-48757\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48757\nhttps://lore.kernel.org/linux-cve-announce/2024062007-CVE-2022-48757-c816@gregkh/T"
        ]
    },
    "CVE-2022-48760": {
        "cve": "CVE-2022-48760",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix hang in usb_kill_urb by adding memory barriers\n\nThe syzbot fuzzer has identified a bug in which processes hang waiting\nfor usb_kill_urb() to return.  It turns out the issue is not unlinking\nthe URB; that works just fine.  Rather, the problem arises when the\nwakeup notification that the URB has completed is not received.\n\nThe reason is memory-access ordering on SMP systems.  In outline form,\nusb_kill_urb() and __usb_hcd_giveback_urb() operating concurrently on\ndifferent CPUs perform the following actions:\n\nCPU 0\t\t\t\t\tCPU 1\n----------------------------\t\t---------------------------------\nusb_kill_urb():\t\t\t\t__usb_hcd_giveback_urb():\n  ...\t\t\t\t\t  ...\n  atomic_inc(&urb->reject);\t\t  atomic_dec(&urb->use_count);\n  ...\t\t\t\t\t  ...\n  wait_event(usb_kill_urb_queue,\n\tatomic_read(&urb->use_count) == 0);\n\t\t\t\t\t  if (atomic_read(&urb->reject))\n\t\t\t\t\t\twake_up(&usb_kill_urb_queue);\n\nConfining your attention to urb->reject and urb->use_count, you can\nsee that the overall pattern of accesses on CPU 0 is:\n\n\twrite urb->reject, then read urb->use_count;\n\nwhereas the overall pattern of accesses on CPU 1 is:\n\n\twrite urb->use_count, then read urb->reject.\n\nThis pattern is referred to in memory-model circles as SB (for \"Store\nBuffering\"), and it is well known that without suitable enforcement of\nthe desired order of accesses -- in the form of memory barriers -- it\nis entirely possible for one or both CPUs to execute their reads ahead\nof their writes.  The end result will be that sometimes CPU 0 sees the\nold un-decremented value of urb->use_count while CPU 1 sees the old\nun-incremented value of urb->reject.  Consequently CPU 0 ends up on\nthe wait queue and never gets woken up, leading to the observed hang\nin usb_kill_urb().\n\nThe same pattern of accesses occurs in usb_poison_urb() and the\nfailure pathway of usb_hcd_submit_urb().\n\nThe problem is fixed by adding suitable memory barriers.  To provide\nproper memory-access ordering in the SB pattern, a full barrier is\nrequired on both CPUs.  The atomic_inc() and atomic_dec() accesses\nthemselves don't provide any memory ordering, but since they are\npresent, we can use the optimized smp_mb__after_atomic() memory\nbarrier in the various routines to obtain the desired effect.\n\nThis patch adds the necessary memory barriers.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48760",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/26fbe9772b8c459687930511444ce443011f86bf",
            "patch_url": "https://git.kernel.org/stable/p/26fbe9772b8c459687930511444ce443011f86bf",
            "filename": "CVE-2022-48760-26fbe9772b8c459687930511444ce443011f86bf.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48760/CVE-2022-48760-26fbe9772b8c459687930511444ce443011f86bf.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/26fbe9772b8c459687930511444ce443011f86bf",
                "patch_url": "https://git.kernel.org/stable/p/26fbe9772b8c459687930511444ce443011f86bf",
                "filename": "CVE-2022-48760-26fbe9772b8c459687930511444ce443011f86bf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48760/CVE-2022-48760-26fbe9772b8c459687930511444ce443011f86bf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/546ba238535d925254e0b3f12012a5c55801e2f3",
                "patch_url": "https://git.kernel.org/stable/p/546ba238535d925254e0b3f12012a5c55801e2f3",
                "filename": "CVE-2022-48760-546ba238535d925254e0b3f12012a5c55801e2f3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48760/CVE-2022-48760-546ba238535d925254e0b3f12012a5c55801e2f3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5904dfd3ddaff3bf4a41c3baf0a8e8f31ed4599b",
                "patch_url": "https://git.kernel.org/stable/p/5904dfd3ddaff3bf4a41c3baf0a8e8f31ed4599b",
                "filename": "CVE-2022-48760-5904dfd3ddaff3bf4a41c3baf0a8e8f31ed4599b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48760/CVE-2022-48760-5904dfd3ddaff3bf4a41c3baf0a8e8f31ed4599b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5f138ef224dffd15d5e5c5b095859719e0038427",
                "patch_url": "https://git.kernel.org/stable/p/5f138ef224dffd15d5e5c5b095859719e0038427",
                "filename": "CVE-2022-48760-5f138ef224dffd15d5e5c5b095859719e0038427.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48760/CVE-2022-48760-5f138ef224dffd15d5e5c5b095859719e0038427.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9340226388c66a7e090ebb00e91ed64a753b6c26",
                "patch_url": "https://git.kernel.org/stable/p/9340226388c66a7e090ebb00e91ed64a753b6c26",
                "filename": "CVE-2022-48760-9340226388c66a7e090ebb00e91ed64a753b6c26.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48760/CVE-2022-48760-9340226388c66a7e090ebb00e91ed64a753b6c26.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9c61fce322ac2ef7fecf025285353570d60e41d6",
                "patch_url": "https://git.kernel.org/stable/p/9c61fce322ac2ef7fecf025285353570d60e41d6",
                "filename": "CVE-2022-48760-9c61fce322ac2ef7fecf025285353570d60e41d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48760/CVE-2022-48760-9c61fce322ac2ef7fecf025285353570d60e41d6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b50f5ca60475710bbc9a3af32fbfc17b1e69c2f0",
                "patch_url": "https://git.kernel.org/stable/p/b50f5ca60475710bbc9a3af32fbfc17b1e69c2f0",
                "filename": "CVE-2022-48760-b50f5ca60475710bbc9a3af32fbfc17b1e69c2f0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48760/CVE-2022-48760-b50f5ca60475710bbc9a3af32fbfc17b1e69c2f0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c9a18f7c5b071dce5e6939568829d40994866ab0",
                "patch_url": "https://git.kernel.org/stable/p/c9a18f7c5b071dce5e6939568829d40994866ab0",
                "filename": "CVE-2022-48760-c9a18f7c5b071dce5e6939568829d40994866ab0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48760/CVE-2022-48760-c9a18f7c5b071dce5e6939568829d40994866ab0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e3b131e30e612ff0e32de6c1cb4f69f89db29193",
                "patch_url": "https://git.kernel.org/stable/p/e3b131e30e612ff0e32de6c1cb4f69f89db29193",
                "filename": "CVE-2022-48760-e3b131e30e612ff0e32de6c1cb4f69f89db29193.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48760/CVE-2022-48760-e3b131e30e612ff0e32de6c1cb4f69f89db29193.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/26fbe9772b8c459687930511444ce443011f86bf",
            "https://git.kernel.org/stable/c/546ba238535d925254e0b3f12012a5c55801e2f3",
            "https://git.kernel.org/stable/c/5904dfd3ddaff3bf4a41c3baf0a8e8f31ed4599b",
            "https://git.kernel.org/stable/c/5f138ef224dffd15d5e5c5b095859719e0038427",
            "https://git.kernel.org/stable/c/9340226388c66a7e090ebb00e91ed64a753b6c26",
            "https://git.kernel.org/stable/c/9c61fce322ac2ef7fecf025285353570d60e41d6",
            "https://git.kernel.org/stable/c/b50f5ca60475710bbc9a3af32fbfc17b1e69c2f0",
            "https://git.kernel.org/stable/c/c9a18f7c5b071dce5e6939568829d40994866ab0",
            "https://git.kernel.org/stable/c/e3b131e30e612ff0e32de6c1cb4f69f89db29193",
            "https://www.cve.org/CVERecord?id=CVE-2022-48760\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48760\nhttps://lore.kernel.org/linux-cve-announce/2024062008-CVE-2022-48760-b80e@gregkh/T"
        ]
    },
    "CVE-2022-48773": {
        "cve": "CVE-2022-48773",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nxprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create\n\nIf there are failures then we must not leave the non-NULL pointers with\nthe error value, otherwise `rpcrdma_ep_destroy` gets confused and tries\nfree them, resulting in an Oops.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48773",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2526d4d8b209dc5ac1fbeb468149774888b2a141",
            "patch_url": "https://git.kernel.org/stable/p/2526d4d8b209dc5ac1fbeb468149774888b2a141",
            "filename": "CVE-2022-48773-2526d4d8b209dc5ac1fbeb468149774888b2a141.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48773/CVE-2022-48773-2526d4d8b209dc5ac1fbeb468149774888b2a141.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1e7433fb95ccc01629a5edaa4ced0cd8c98d0ae0",
                "patch_url": "https://git.kernel.org/stable/p/1e7433fb95ccc01629a5edaa4ced0cd8c98d0ae0",
                "filename": "CVE-2022-48773-1e7433fb95ccc01629a5edaa4ced0cd8c98d0ae0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48773/CVE-2022-48773-1e7433fb95ccc01629a5edaa4ced0cd8c98d0ae0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2526d4d8b209dc5ac1fbeb468149774888b2a141",
                "patch_url": "https://git.kernel.org/stable/p/2526d4d8b209dc5ac1fbeb468149774888b2a141",
                "filename": "CVE-2022-48773-2526d4d8b209dc5ac1fbeb468149774888b2a141.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48773/CVE-2022-48773-2526d4d8b209dc5ac1fbeb468149774888b2a141.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9921c866dc369577c3ebb9adf2383b01b58c18de",
                "patch_url": "https://git.kernel.org/stable/p/9921c866dc369577c3ebb9adf2383b01b58c18de",
                "filename": "CVE-2022-48773-9921c866dc369577c3ebb9adf2383b01b58c18de.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48773/CVE-2022-48773-9921c866dc369577c3ebb9adf2383b01b58c18de.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a9c10b5b3b67b3750a10c8b089b2e05f5e176e33",
                "patch_url": "https://git.kernel.org/stable/p/a9c10b5b3b67b3750a10c8b089b2e05f5e176e33",
                "filename": "CVE-2022-48773-a9c10b5b3b67b3750a10c8b089b2e05f5e176e33.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48773/CVE-2022-48773-a9c10b5b3b67b3750a10c8b089b2e05f5e176e33.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1e7433fb95ccc01629a5edaa4ced0cd8c98d0ae0",
            "https://git.kernel.org/stable/c/2526d4d8b209dc5ac1fbeb468149774888b2a141",
            "https://git.kernel.org/stable/c/9921c866dc369577c3ebb9adf2383b01b58c18de",
            "https://git.kernel.org/stable/c/a9c10b5b3b67b3750a10c8b089b2e05f5e176e33",
            "https://www.cve.org/CVERecord?id=CVE-2022-48773\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48773\nhttps://lore.kernel.org/linux-cve-announce/2024071628-CVE-2022-48773-9563@gregkh/T"
        ]
    },
    "CVE-2022-48804": {
        "cve": "CVE-2022-48804",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt_ioctl: fix array_index_nospec in vt_setactivate\n\narray_index_nospec ensures that an out-of-bounds value is set to zero\non the transient path. Decreasing the value by one afterwards causes\na transient integer underflow. vsa.console should be decreased first\nand then sanitized with array_index_nospec.\n\nKasper Acknowledgements: Jakob Koschel, Brian Johannesmeyer, Kaveh\nRazavi, Herbert Bos, Cristiano Giuffrida from the VUSec group at VU\nAmsterdam.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48804",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/170325aba4608bde3e7d21c9c19b7bc266ac0885",
            "patch_url": "https://git.kernel.org/stable/p/170325aba4608bde3e7d21c9c19b7bc266ac0885",
            "filename": "CVE-2022-48804-170325aba4608bde3e7d21c9c19b7bc266ac0885.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48804/CVE-2022-48804-170325aba4608bde3e7d21c9c19b7bc266ac0885.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/170325aba4608bde3e7d21c9c19b7bc266ac0885",
                "patch_url": "https://git.kernel.org/stable/p/170325aba4608bde3e7d21c9c19b7bc266ac0885",
                "filename": "CVE-2022-48804-170325aba4608bde3e7d21c9c19b7bc266ac0885.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48804/CVE-2022-48804-170325aba4608bde3e7d21c9c19b7bc266ac0885.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2a45a6bd1e6d651770aafff57ab3e1d3bb0b42e0",
                "patch_url": "https://git.kernel.org/stable/p/2a45a6bd1e6d651770aafff57ab3e1d3bb0b42e0",
                "filename": "CVE-2022-48804-2a45a6bd1e6d651770aafff57ab3e1d3bb0b42e0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48804/CVE-2022-48804-2a45a6bd1e6d651770aafff57ab3e1d3bb0b42e0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/61cc70d9e8ef5b042d4ed87994d20100ec8896d9",
                "patch_url": "https://git.kernel.org/stable/p/61cc70d9e8ef5b042d4ed87994d20100ec8896d9",
                "filename": "CVE-2022-48804-61cc70d9e8ef5b042d4ed87994d20100ec8896d9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48804/CVE-2022-48804-61cc70d9e8ef5b042d4ed87994d20100ec8896d9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6550bdf52846f85a2a3726a5aa0c7c4399f2fc02",
                "patch_url": "https://git.kernel.org/stable/p/6550bdf52846f85a2a3726a5aa0c7c4399f2fc02",
                "filename": "CVE-2022-48804-6550bdf52846f85a2a3726a5aa0c7c4399f2fc02.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48804/CVE-2022-48804-6550bdf52846f85a2a3726a5aa0c7c4399f2fc02.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/778302ca09498b448620edd372dc908bebf80bdf",
                "patch_url": "https://git.kernel.org/stable/p/778302ca09498b448620edd372dc908bebf80bdf",
                "filename": "CVE-2022-48804-778302ca09498b448620edd372dc908bebf80bdf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48804/CVE-2022-48804-778302ca09498b448620edd372dc908bebf80bdf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/830c5aa302ec16b4ee641aec769462c37f802c90",
                "patch_url": "https://git.kernel.org/stable/p/830c5aa302ec16b4ee641aec769462c37f802c90",
                "filename": "CVE-2022-48804-830c5aa302ec16b4ee641aec769462c37f802c90.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48804/CVE-2022-48804-830c5aa302ec16b4ee641aec769462c37f802c90.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ae3d57411562260ee3f4fd5e875f410002341104",
                "patch_url": "https://git.kernel.org/stable/p/ae3d57411562260ee3f4fd5e875f410002341104",
                "filename": "CVE-2022-48804-ae3d57411562260ee3f4fd5e875f410002341104.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48804/CVE-2022-48804-ae3d57411562260ee3f4fd5e875f410002341104.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ffe54289b02e9c732d6f04c8ebbe3b2d90d32118",
                "patch_url": "https://git.kernel.org/stable/p/ffe54289b02e9c732d6f04c8ebbe3b2d90d32118",
                "filename": "CVE-2022-48804-ffe54289b02e9c732d6f04c8ebbe3b2d90d32118.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48804/CVE-2022-48804-ffe54289b02e9c732d6f04c8ebbe3b2d90d32118.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/170325aba4608bde3e7d21c9c19b7bc266ac0885",
            "https://git.kernel.org/stable/c/2a45a6bd1e6d651770aafff57ab3e1d3bb0b42e0",
            "https://git.kernel.org/stable/c/61cc70d9e8ef5b042d4ed87994d20100ec8896d9",
            "https://git.kernel.org/stable/c/6550bdf52846f85a2a3726a5aa0c7c4399f2fc02",
            "https://git.kernel.org/stable/c/778302ca09498b448620edd372dc908bebf80bdf",
            "https://git.kernel.org/stable/c/830c5aa302ec16b4ee641aec769462c37f802c90",
            "https://git.kernel.org/stable/c/ae3d57411562260ee3f4fd5e875f410002341104",
            "https://git.kernel.org/stable/c/ffe54289b02e9c732d6f04c8ebbe3b2d90d32118",
            "https://www.cve.org/CVERecord?id=CVE-2022-48804\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48804\nhttps://lore.kernel.org/linux-cve-announce/2024071645-CVE-2022-48804-f191@gregkh/T"
        ]
    },
    "CVE-2022-48836": {
        "cve": "CVE-2022-48836",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: aiptek - properly check endpoint type\n\nSyzbot reported warning in usb_submit_urb() which is caused by wrong\nendpoint type. There was a check for the number of endpoints, but not\nfor the type of endpoint.\n\nFix it by replacing old desc.bNumEndpoints check with\nusb_find_common_endpoints() helper for finding endpoints\n\nFail log:\n\nusb 5-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 2 PID: 48 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 2 PID: 48 Comm: kworker/2:2 Not tainted 5.17.0-rc6-syzkaller-00226-g07ebd38a0da2 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nWorkqueue: usb_hub_wq hub_event\n...\nCall Trace:\n <TASK>\n aiptek_open+0xd5/0x130 drivers/input/tablet/aiptek.c:830\n input_open_device+0x1bb/0x320 drivers/input/input.c:629\n kbd_connect+0xfe/0x160 drivers/tty/vt/keyboard.c:1593",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48836",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/35069e654bcab567ff8b9f0e68e1caf82c15dcd7",
            "patch_url": "https://git.kernel.org/stable/p/35069e654bcab567ff8b9f0e68e1caf82c15dcd7",
            "filename": "CVE-2022-48836-35069e654bcab567ff8b9f0e68e1caf82c15dcd7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48836/CVE-2022-48836-35069e654bcab567ff8b9f0e68e1caf82c15dcd7.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/35069e654bcab567ff8b9f0e68e1caf82c15dcd7",
                "patch_url": "https://git.kernel.org/stable/p/35069e654bcab567ff8b9f0e68e1caf82c15dcd7",
                "filename": "CVE-2022-48836-35069e654bcab567ff8b9f0e68e1caf82c15dcd7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48836/CVE-2022-48836-35069e654bcab567ff8b9f0e68e1caf82c15dcd7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5600f6986628dde8881734090588474f54a540a8",
                "patch_url": "https://git.kernel.org/stable/p/5600f6986628dde8881734090588474f54a540a8",
                "filename": "CVE-2022-48836-5600f6986628dde8881734090588474f54a540a8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48836/CVE-2022-48836-5600f6986628dde8881734090588474f54a540a8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/57277a8b5d881e02051ba9d7f6cb3f915c229821",
                "patch_url": "https://git.kernel.org/stable/p/57277a8b5d881e02051ba9d7f6cb3f915c229821",
                "filename": "CVE-2022-48836-57277a8b5d881e02051ba9d7f6cb3f915c229821.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48836/CVE-2022-48836-57277a8b5d881e02051ba9d7f6cb3f915c229821.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6de20111cd0bb7da9b2294073ba00c7d2a6c1c4f",
                "patch_url": "https://git.kernel.org/stable/p/6de20111cd0bb7da9b2294073ba00c7d2a6c1c4f",
                "filename": "CVE-2022-48836-6de20111cd0bb7da9b2294073ba00c7d2a6c1c4f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48836/CVE-2022-48836-6de20111cd0bb7da9b2294073ba00c7d2a6c1c4f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e732b0412f8c603d1e998f3bff41b5e7d5c3914c",
                "patch_url": "https://git.kernel.org/stable/p/e732b0412f8c603d1e998f3bff41b5e7d5c3914c",
                "filename": "CVE-2022-48836-e732b0412f8c603d1e998f3bff41b5e7d5c3914c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48836/CVE-2022-48836-e732b0412f8c603d1e998f3bff41b5e7d5c3914c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e762f57ff255af28236cd02ca9fc5c7e5a089d31",
                "patch_url": "https://git.kernel.org/stable/p/e762f57ff255af28236cd02ca9fc5c7e5a089d31",
                "filename": "CVE-2022-48836-e762f57ff255af28236cd02ca9fc5c7e5a089d31.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48836/CVE-2022-48836-e762f57ff255af28236cd02ca9fc5c7e5a089d31.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f0d43d22d24182b94d7eb78a2bf6ae7e2b33204a",
                "patch_url": "https://git.kernel.org/stable/p/f0d43d22d24182b94d7eb78a2bf6ae7e2b33204a",
                "filename": "CVE-2022-48836-f0d43d22d24182b94d7eb78a2bf6ae7e2b33204a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48836/CVE-2022-48836-f0d43d22d24182b94d7eb78a2bf6ae7e2b33204a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fc8033a55e2796d21e370260a784ac9fbb8305a6",
                "patch_url": "https://git.kernel.org/stable/p/fc8033a55e2796d21e370260a784ac9fbb8305a6",
                "filename": "CVE-2022-48836-fc8033a55e2796d21e370260a784ac9fbb8305a6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48836/CVE-2022-48836-fc8033a55e2796d21e370260a784ac9fbb8305a6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/35069e654bcab567ff8b9f0e68e1caf82c15dcd7",
            "https://git.kernel.org/stable/c/5600f6986628dde8881734090588474f54a540a8",
            "https://git.kernel.org/stable/c/57277a8b5d881e02051ba9d7f6cb3f915c229821",
            "https://git.kernel.org/stable/c/6de20111cd0bb7da9b2294073ba00c7d2a6c1c4f",
            "https://git.kernel.org/stable/c/e732b0412f8c603d1e998f3bff41b5e7d5c3914c",
            "https://git.kernel.org/stable/c/e762f57ff255af28236cd02ca9fc5c7e5a089d31",
            "https://git.kernel.org/stable/c/f0d43d22d24182b94d7eb78a2bf6ae7e2b33204a",
            "https://git.kernel.org/stable/c/fc8033a55e2796d21e370260a784ac9fbb8305a6",
            "https://www.cve.org/CVERecord?id=CVE-2022-48836\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48836\nhttps://lore.kernel.org/linux-cve-announce/2024071620-CVE-2022-48836-fb3d@gregkh/T"
        ]
    },
    "CVE-2022-48866": {
        "cve": "CVE-2022-48866",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts\n\nSyzbot reported an slab-out-of-bounds Read in thrustmaster_probe() bug.\nThe root case is in missing validation check of actual number of endpoints.\n\nCode should not blindly access usb_host_interface::endpoint array, since\nit may contain less endpoints than code expects.\n\nFix it by adding missing validaion check and print an error if\nnumber of endpoints do not match expected number",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48866",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3ffbe85cda7f523dad896bae08cecd8db8b555ab",
            "patch_url": "https://git.kernel.org/stable/p/3ffbe85cda7f523dad896bae08cecd8db8b555ab",
            "filename": "CVE-2022-48866-3ffbe85cda7f523dad896bae08cecd8db8b555ab.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48866/CVE-2022-48866-3ffbe85cda7f523dad896bae08cecd8db8b555ab.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3ffbe85cda7f523dad896bae08cecd8db8b555ab",
                "patch_url": "https://git.kernel.org/stable/p/3ffbe85cda7f523dad896bae08cecd8db8b555ab",
                "filename": "CVE-2022-48866-3ffbe85cda7f523dad896bae08cecd8db8b555ab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48866/CVE-2022-48866-3ffbe85cda7f523dad896bae08cecd8db8b555ab.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/56185434e1e50acecee56d8f5850135009b87947",
                "patch_url": "https://git.kernel.org/stable/p/56185434e1e50acecee56d8f5850135009b87947",
                "filename": "CVE-2022-48866-56185434e1e50acecee56d8f5850135009b87947.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48866/CVE-2022-48866-56185434e1e50acecee56d8f5850135009b87947.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fc3ef2e3297b3c0e2006b5d7b3d66965e3392036",
                "patch_url": "https://git.kernel.org/stable/p/fc3ef2e3297b3c0e2006b5d7b3d66965e3392036",
                "filename": "CVE-2022-48866-fc3ef2e3297b3c0e2006b5d7b3d66965e3392036.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48866/CVE-2022-48866-fc3ef2e3297b3c0e2006b5d7b3d66965e3392036.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3ffbe85cda7f523dad896bae08cecd8db8b555ab",
            "https://git.kernel.org/stable/c/56185434e1e50acecee56d8f5850135009b87947",
            "https://git.kernel.org/stable/c/fc3ef2e3297b3c0e2006b5d7b3d66965e3392036",
            "https://www.cve.org/CVERecord?id=CVE-2022-48866\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48866\nhttps://lore.kernel.org/linux-cve-announce/2024071629-CVE-2022-48866-93bd@gregkh/T"
        ]
    },
    "CVE-2022-48919": {
        "cve": "CVE-2022-48919",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix double free race when mount fails in cifs_get_root()\n\nWhen cifs_get_root() fails during cifs_smb3_do_mount() we call\ndeactivate_locked_super() which eventually will call delayed_free() which\nwill free the context.\nIn this situation we should not proceed to enter the out: section in\ncifs_smb3_do_mount() and free the same resources a second time.\n\n[Thu Feb 10 12:59:06 2022] BUG: KASAN: use-after-free in rcu_cblist_dequeue+0x32/0x60\n[Thu Feb 10 12:59:06 2022] Read of size 8 at addr ffff888364f4d110 by task swapper/1/0\n\n[Thu Feb 10 12:59:06 2022] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G           OE     5.17.0-rc3+ #4\n[Thu Feb 10 12:59:06 2022] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.0 12/17/2019\n[Thu Feb 10 12:59:06 2022] Call Trace:\n[Thu Feb 10 12:59:06 2022]  <IRQ>\n[Thu Feb 10 12:59:06 2022]  dump_stack_lvl+0x5d/0x78\n[Thu Feb 10 12:59:06 2022]  print_address_description.constprop.0+0x24/0x150\n[Thu Feb 10 12:59:06 2022]  ? rcu_cblist_dequeue+0x32/0x60\n[Thu Feb 10 12:59:06 2022]  kasan_report.cold+0x7d/0x117\n[Thu Feb 10 12:59:06 2022]  ? rcu_cblist_dequeue+0x32/0x60\n[Thu Feb 10 12:59:06 2022]  __asan_load8+0x86/0xa0\n[Thu Feb 10 12:59:06 2022]  rcu_cblist_dequeue+0x32/0x60\n[Thu Feb 10 12:59:06 2022]  rcu_core+0x547/0xca0\n[Thu Feb 10 12:59:06 2022]  ? call_rcu+0x3c0/0x3c0\n[Thu Feb 10 12:59:06 2022]  ? __this_cpu_preempt_check+0x13/0x20\n[Thu Feb 10 12:59:06 2022]  ? lock_is_held_type+0xea/0x140\n[Thu Feb 10 12:59:06 2022]  rcu_core_si+0xe/0x10\n[Thu Feb 10 12:59:06 2022]  __do_softirq+0x1d4/0x67b\n[Thu Feb 10 12:59:06 2022]  __irq_exit_rcu+0x100/0x150\n[Thu Feb 10 12:59:06 2022]  irq_exit_rcu+0xe/0x30\n[Thu Feb 10 12:59:06 2022]  sysvec_hyperv_stimer0+0x9d/0xc0\n...\n[Thu Feb 10 12:59:07 2022] Freed by task 58179:\n[Thu Feb 10 12:59:07 2022]  kasan_save_stack+0x26/0x50\n[Thu Feb 10 12:59:07 2022]  kasan_set_track+0x25/0x30\n[Thu Feb 10 12:59:07 2022]  kasan_set_free_info+0x24/0x40\n[Thu Feb 10 12:59:07 2022]  ____kasan_slab_free+0x137/0x170\n[Thu Feb 10 12:59:07 2022]  __kasan_slab_free+0x12/0x20\n[Thu Feb 10 12:59:07 2022]  slab_free_freelist_hook+0xb3/0x1d0\n[Thu Feb 10 12:59:07 2022]  kfree+0xcd/0x520\n[Thu Feb 10 12:59:07 2022]  cifs_smb3_do_mount+0x149/0xbe0 [cifs]\n[Thu Feb 10 12:59:07 2022]  smb3_get_tree+0x1a0/0x2e0 [cifs]\n[Thu Feb 10 12:59:07 2022]  vfs_get_tree+0x52/0x140\n[Thu Feb 10 12:59:07 2022]  path_mount+0x635/0x10c0\n[Thu Feb 10 12:59:07 2022]  __x64_sys_mount+0x1bf/0x210\n[Thu Feb 10 12:59:07 2022]  do_syscall_64+0x5c/0xc0\n[Thu Feb 10 12:59:07 2022]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n[Thu Feb 10 12:59:07 2022] Last potentially related work creation:\n[Thu Feb 10 12:59:07 2022]  kasan_save_stack+0x26/0x50\n[Thu Feb 10 12:59:07 2022]  __kasan_record_aux_stack+0xb6/0xc0\n[Thu Feb 10 12:59:07 2022]  kasan_record_aux_stack_noalloc+0xb/0x10\n[Thu Feb 10 12:59:07 2022]  call_rcu+0x76/0x3c0\n[Thu Feb 10 12:59:07 2022]  cifs_umount+0xce/0xe0 [cifs]\n[Thu Feb 10 12:59:07 2022]  cifs_kill_sb+0xc8/0xe0 [cifs]\n[Thu Feb 10 12:59:07 2022]  deactivate_locked_super+0x5d/0xd0\n[Thu Feb 10 12:59:07 2022]  cifs_smb3_do_mount+0xab9/0xbe0 [cifs]\n[Thu Feb 10 12:59:07 2022]  smb3_get_tree+0x1a0/0x2e0 [cifs]\n[Thu Feb 10 12:59:07 2022]  vfs_get_tree+0x52/0x140\n[Thu Feb 10 12:59:07 2022]  path_mount+0x635/0x10c0\n[Thu Feb 10 12:59:07 2022]  __x64_sys_mount+0x1bf/0x210\n[Thu Feb 10 12:59:07 2022]  do_syscall_64+0x5c/0xc0\n[Thu Feb 10 12:59:07 2022]  entry_SYSCALL_64_after_hwframe+0x44/0xae",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48919",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/563431c1f3c8f2230e4a9c445fa23758742bc4f0",
            "patch_url": "https://git.kernel.org/stable/p/563431c1f3c8f2230e4a9c445fa23758742bc4f0",
            "filename": "CVE-2022-48919-563431c1f3c8f2230e4a9c445fa23758742bc4f0.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48919/CVE-2022-48919-563431c1f3c8f2230e4a9c445fa23758742bc4f0.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/147a0e71ccf96df9fc8c2ac500829d8e423ef02c",
                "patch_url": "https://git.kernel.org/stable/p/147a0e71ccf96df9fc8c2ac500829d8e423ef02c",
                "filename": "CVE-2022-48919-147a0e71ccf96df9fc8c2ac500829d8e423ef02c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48919/CVE-2022-48919-147a0e71ccf96df9fc8c2ac500829d8e423ef02c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2fe0e281f7ad0a62259649764228227dd6b2561d",
                "patch_url": "https://git.kernel.org/stable/p/2fe0e281f7ad0a62259649764228227dd6b2561d",
                "filename": "CVE-2022-48919-2fe0e281f7ad0a62259649764228227dd6b2561d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48919/CVE-2022-48919-2fe0e281f7ad0a62259649764228227dd6b2561d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3d6cc9898efdfb062efb74dc18cfc700e082f5d5",
                "patch_url": "https://git.kernel.org/stable/p/3d6cc9898efdfb062efb74dc18cfc700e082f5d5",
                "filename": "CVE-2022-48919-3d6cc9898efdfb062efb74dc18cfc700e082f5d5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48919/CVE-2022-48919-3d6cc9898efdfb062efb74dc18cfc700e082f5d5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/546d60859ecf13380fcabcbeace53a5971493a2b",
                "patch_url": "https://git.kernel.org/stable/p/546d60859ecf13380fcabcbeace53a5971493a2b",
                "filename": "CVE-2022-48919-546d60859ecf13380fcabcbeace53a5971493a2b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48919/CVE-2022-48919-546d60859ecf13380fcabcbeace53a5971493a2b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/563431c1f3c8f2230e4a9c445fa23758742bc4f0",
                "patch_url": "https://git.kernel.org/stable/p/563431c1f3c8f2230e4a9c445fa23758742bc4f0",
                "filename": "CVE-2022-48919-563431c1f3c8f2230e4a9c445fa23758742bc4f0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48919/CVE-2022-48919-563431c1f3c8f2230e4a9c445fa23758742bc4f0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/da834d6c1147c7519a9e55b510a03b7055104749",
                "patch_url": "https://git.kernel.org/stable/p/da834d6c1147c7519a9e55b510a03b7055104749",
                "filename": "CVE-2022-48919-da834d6c1147c7519a9e55b510a03b7055104749.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48919/CVE-2022-48919-da834d6c1147c7519a9e55b510a03b7055104749.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/df9db1a2af37f39ad1653c7b9b0d275d72d0bc67",
                "patch_url": "https://git.kernel.org/stable/p/df9db1a2af37f39ad1653c7b9b0d275d72d0bc67",
                "filename": "CVE-2022-48919-df9db1a2af37f39ad1653c7b9b0d275d72d0bc67.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48919/CVE-2022-48919-df9db1a2af37f39ad1653c7b9b0d275d72d0bc67.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e208668ef7ba23efcbf76a8200cab8deee501c4d",
                "patch_url": "https://git.kernel.org/stable/p/e208668ef7ba23efcbf76a8200cab8deee501c4d",
                "filename": "CVE-2022-48919-e208668ef7ba23efcbf76a8200cab8deee501c4d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48919/CVE-2022-48919-e208668ef7ba23efcbf76a8200cab8deee501c4d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/147a0e71ccf96df9fc8c2ac500829d8e423ef02c",
            "https://git.kernel.org/stable/c/2fe0e281f7ad0a62259649764228227dd6b2561d",
            "https://git.kernel.org/stable/c/3d6cc9898efdfb062efb74dc18cfc700e082f5d5",
            "https://git.kernel.org/stable/c/546d60859ecf13380fcabcbeace53a5971493a2b",
            "https://git.kernel.org/stable/c/563431c1f3c8f2230e4a9c445fa23758742bc4f0",
            "https://git.kernel.org/stable/c/da834d6c1147c7519a9e55b510a03b7055104749",
            "https://git.kernel.org/stable/c/df9db1a2af37f39ad1653c7b9b0d275d72d0bc67",
            "https://git.kernel.org/stable/c/e208668ef7ba23efcbf76a8200cab8deee501c4d",
            "https://www.cve.org/CVERecord?id=CVE-2022-48919\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48919\nhttps://lore.kernel.org/linux-cve-announce/2024082218-CVE-2022-48919-9bf1@gregkh/T"
        ]
    },
    "CVE-2022-48936": {
        "cve": "CVE-2022-48936",
        "cvss_v2": null,
        "cvss_v3": "0.0",
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48936",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/dac2490d9ee0b89dffc72f1172b8bbeb60eaec39",
            "patch_url": "https://git.kernel.org/stable/p/dac2490d9ee0b89dffc72f1172b8bbeb60eaec39",
            "filename": "CVE-2022-48936-dac2490d9ee0b89dffc72f1172b8bbeb60eaec39.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48936/CVE-2022-48936-dac2490d9ee0b89dffc72f1172b8bbeb60eaec39.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2b3cdd70ea5f5a694f95ea1788393fb3b83071ea",
                "patch_url": "https://git.kernel.org/stable/p/2b3cdd70ea5f5a694f95ea1788393fb3b83071ea",
                "filename": "CVE-2022-48936-2b3cdd70ea5f5a694f95ea1788393fb3b83071ea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48936/CVE-2022-48936-2b3cdd70ea5f5a694f95ea1788393fb3b83071ea.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/45d006c2c7ed7baf1fa258fa7b5bc9923d3a983e",
                "patch_url": "https://git.kernel.org/stable/p/45d006c2c7ed7baf1fa258fa7b5bc9923d3a983e",
                "filename": "CVE-2022-48936-45d006c2c7ed7baf1fa258fa7b5bc9923d3a983e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48936/CVE-2022-48936-45d006c2c7ed7baf1fa258fa7b5bc9923d3a983e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7840e559799a08a8588ee6de27516a991cb2e5e7",
                "patch_url": "https://git.kernel.org/stable/p/7840e559799a08a8588ee6de27516a991cb2e5e7",
                "filename": "CVE-2022-48936-7840e559799a08a8588ee6de27516a991cb2e5e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48936/CVE-2022-48936-7840e559799a08a8588ee6de27516a991cb2e5e7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/899e56a1ad435261812355550ae869d8be3df395",
                "patch_url": "https://git.kernel.org/stable/p/899e56a1ad435261812355550ae869d8be3df395",
                "filename": "CVE-2022-48936-899e56a1ad435261812355550ae869d8be3df395.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48936/CVE-2022-48936-899e56a1ad435261812355550ae869d8be3df395.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a739963f43269297c3f438b776194542e2a97499",
                "patch_url": "https://git.kernel.org/stable/p/a739963f43269297c3f438b776194542e2a97499",
                "filename": "CVE-2022-48936-a739963f43269297c3f438b776194542e2a97499.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48936/CVE-2022-48936-a739963f43269297c3f438b776194542e2a97499.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cc20cced0598d9a5ff91ae4ab147b3b5e99ee819",
                "patch_url": "https://git.kernel.org/stable/p/cc20cced0598d9a5ff91ae4ab147b3b5e99ee819",
                "filename": "CVE-2022-48936-cc20cced0598d9a5ff91ae4ab147b3b5e99ee819.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48936/CVE-2022-48936-cc20cced0598d9a5ff91ae4ab147b3b5e99ee819.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dac2490d9ee0b89dffc72f1172b8bbeb60eaec39",
                "patch_url": "https://git.kernel.org/stable/p/dac2490d9ee0b89dffc72f1172b8bbeb60eaec39",
                "filename": "CVE-2022-48936-dac2490d9ee0b89dffc72f1172b8bbeb60eaec39.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48936/CVE-2022-48936-dac2490d9ee0b89dffc72f1172b8bbeb60eaec39.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e9ffbe63f6f32f526a461756309b61c395168d73",
                "patch_url": "https://git.kernel.org/stable/p/e9ffbe63f6f32f526a461756309b61c395168d73",
                "filename": "CVE-2022-48936-e9ffbe63f6f32f526a461756309b61c395168d73.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48936/CVE-2022-48936-e9ffbe63f6f32f526a461756309b61c395168d73.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2b3cdd70ea5f5a694f95ea1788393fb3b83071ea",
            "https://git.kernel.org/stable/c/45d006c2c7ed7baf1fa258fa7b5bc9923d3a983e",
            "https://git.kernel.org/stable/c/7840e559799a08a8588ee6de27516a991cb2e5e7",
            "https://git.kernel.org/stable/c/899e56a1ad435261812355550ae869d8be3df395",
            "https://git.kernel.org/stable/c/a739963f43269297c3f438b776194542e2a97499",
            "https://git.kernel.org/stable/c/cc20cced0598d9a5ff91ae4ab147b3b5e99ee819",
            "https://git.kernel.org/stable/c/dac2490d9ee0b89dffc72f1172b8bbeb60eaec39",
            "https://git.kernel.org/stable/c/e9ffbe63f6f32f526a461756309b61c395168d73",
            "https://www.cve.org/CVERecord?id=CVE-2022-48936\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48936\nhttps://lore.kernel.org/linux-cve-announce/2024082224-CVE-2022-48936-9302@gregkh/T"
        ]
    },
    "CVE-2022-48988": {
        "cve": "CVE-2022-48988",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemcg: fix possible use-after-free in memcg_write_event_control()\n\nmemcg_write_event_control() accesses the dentry->d_name of the specified\ncontrol fd to route the write call.  As a cgroup interface file can't be\nrenamed, it's safe to access d_name as long as the specified file is a\nregular cgroup file.  Also, as these cgroup interface files can't be\nremoved before the directory, it's safe to access the parent too.\n\nPrior to 347c4a874710 (\"memcg: remove cgroup_event->cft\"), there was a\ncall to __file_cft() which verified that the specified file is a regular\ncgroupfs file before further accesses.  The cftype pointer returned from\n__file_cft() was no longer necessary and the commit inadvertently dropped\nthe file type check with it allowing any file to slip through.  With the\ninvarients broken, the d_name and parent accesses can now race against\nrenames and removals of arbitrary files and cause use-after-free's.\n\nFix the bug by resurrecting the file type check in __file_cft().  Now that\ncgroupfs is implemented through kernfs, checking the file operations needs\nto go through a layer of indirection.  Instead, let's check the superblock\nand dentry type.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-48988",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/f1f7f36cf682fa59db15e2089039a2eeb58ff2ad",
            "patch_url": "https://git.kernel.org/stable/p/f1f7f36cf682fa59db15e2089039a2eeb58ff2ad",
            "filename": "CVE-2022-48988-f1f7f36cf682fa59db15e2089039a2eeb58ff2ad.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48988/CVE-2022-48988-f1f7f36cf682fa59db15e2089039a2eeb58ff2ad.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0ed074317b835caa6c03bcfa8f133365324673dc",
                "patch_url": "https://git.kernel.org/stable/p/0ed074317b835caa6c03bcfa8f133365324673dc",
                "filename": "CVE-2022-48988-0ed074317b835caa6c03bcfa8f133365324673dc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48988/CVE-2022-48988-0ed074317b835caa6c03bcfa8f133365324673dc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/35963b31821920908e397146502066f6b032c917",
                "patch_url": "https://git.kernel.org/stable/p/35963b31821920908e397146502066f6b032c917",
                "filename": "CVE-2022-48988-35963b31821920908e397146502066f6b032c917.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48988/CVE-2022-48988-35963b31821920908e397146502066f6b032c917.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4a7ba45b1a435e7097ca0f79a847d0949d0eb088",
                "patch_url": "https://git.kernel.org/stable/p/4a7ba45b1a435e7097ca0f79a847d0949d0eb088",
                "filename": "CVE-2022-48988-4a7ba45b1a435e7097ca0f79a847d0949d0eb088.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48988/CVE-2022-48988-4a7ba45b1a435e7097ca0f79a847d0949d0eb088.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aad8bbd17a1d586005feb9226c2e9cfce1432e13",
                "patch_url": "https://git.kernel.org/stable/p/aad8bbd17a1d586005feb9226c2e9cfce1432e13",
                "filename": "CVE-2022-48988-aad8bbd17a1d586005feb9226c2e9cfce1432e13.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48988/CVE-2022-48988-aad8bbd17a1d586005feb9226c2e9cfce1432e13.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b77600e26fd48727a95ffd50ba1e937efb548125",
                "patch_url": "https://git.kernel.org/stable/p/b77600e26fd48727a95ffd50ba1e937efb548125",
                "filename": "CVE-2022-48988-b77600e26fd48727a95ffd50ba1e937efb548125.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48988/CVE-2022-48988-b77600e26fd48727a95ffd50ba1e937efb548125.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e1ae97624ecf400ea56c238bff23e5cd139df0b8",
                "patch_url": "https://git.kernel.org/stable/p/e1ae97624ecf400ea56c238bff23e5cd139df0b8",
                "filename": "CVE-2022-48988-e1ae97624ecf400ea56c238bff23e5cd139df0b8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48988/CVE-2022-48988-e1ae97624ecf400ea56c238bff23e5cd139df0b8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f1f7f36cf682fa59db15e2089039a2eeb58ff2ad",
                "patch_url": "https://git.kernel.org/stable/p/f1f7f36cf682fa59db15e2089039a2eeb58ff2ad",
                "filename": "CVE-2022-48988-f1f7f36cf682fa59db15e2089039a2eeb58ff2ad.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-48988/CVE-2022-48988-f1f7f36cf682fa59db15e2089039a2eeb58ff2ad.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0ed074317b835caa6c03bcfa8f133365324673dc",
            "https://git.kernel.org/stable/c/35963b31821920908e397146502066f6b032c917",
            "https://git.kernel.org/stable/c/4a7ba45b1a435e7097ca0f79a847d0949d0eb088",
            "https://git.kernel.org/stable/c/aad8bbd17a1d586005feb9226c2e9cfce1432e13",
            "https://git.kernel.org/stable/c/b77600e26fd48727a95ffd50ba1e937efb548125",
            "https://git.kernel.org/stable/c/e1ae97624ecf400ea56c238bff23e5cd139df0b8",
            "https://git.kernel.org/stable/c/f1f7f36cf682fa59db15e2089039a2eeb58ff2ad",
            "https://www.cve.org/CVERecord?id=CVE-2022-48988\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-48988\nhttps://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48988-188f@gregkh/T"
        ]
    },
    "CVE-2022-49011": {
        "cve": "CVE-2022-49011",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new()\n\nAs comment of pci_get_domain_bus_and_slot() says, it returns\na pci device with refcount increment, when finish using it,\nthe caller must decrement the reference count by calling\npci_dev_put(). So call it after using to avoid refcount leak.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-49011",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0dd1da5a15eeecb2fe4cf131b3216fb455af783c",
            "patch_url": "https://git.kernel.org/stable/p/0dd1da5a15eeecb2fe4cf131b3216fb455af783c",
            "filename": "CVE-2022-49011-0dd1da5a15eeecb2fe4cf131b3216fb455af783c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49011/CVE-2022-49011-0dd1da5a15eeecb2fe4cf131b3216fb455af783c.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0dd1da5a15eeecb2fe4cf131b3216fb455af783c",
                "patch_url": "https://git.kernel.org/stable/p/0dd1da5a15eeecb2fe4cf131b3216fb455af783c",
                "filename": "CVE-2022-49011-0dd1da5a15eeecb2fe4cf131b3216fb455af783c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49011/CVE-2022-49011-0dd1da5a15eeecb2fe4cf131b3216fb455af783c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f74cffc7c85f770b1b1833dccb03b8cde3be102",
                "patch_url": "https://git.kernel.org/stable/p/2f74cffc7c85f770b1b1833dccb03b8cde3be102",
                "filename": "CVE-2022-49011-2f74cffc7c85f770b1b1833dccb03b8cde3be102.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49011/CVE-2022-49011-2f74cffc7c85f770b1b1833dccb03b8cde3be102.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6e035d5a2a6b907cfce9a80c5f442c2e459cd34e",
                "patch_url": "https://git.kernel.org/stable/p/6e035d5a2a6b907cfce9a80c5f442c2e459cd34e",
                "filename": "CVE-2022-49011-6e035d5a2a6b907cfce9a80c5f442c2e459cd34e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49011/CVE-2022-49011-6e035d5a2a6b907cfce9a80c5f442c2e459cd34e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7dec14537c5906b8bf40fd6fd6d9c3850f8df11d",
                "patch_url": "https://git.kernel.org/stable/p/7dec14537c5906b8bf40fd6fd6d9c3850f8df11d",
                "filename": "CVE-2022-49011-7dec14537c5906b8bf40fd6fd6d9c3850f8df11d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49011/CVE-2022-49011-7dec14537c5906b8bf40fd6fd6d9c3850f8df11d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bb75a0d1223d43f97089841aecb28a9b4de687a9",
                "patch_url": "https://git.kernel.org/stable/p/bb75a0d1223d43f97089841aecb28a9b4de687a9",
                "filename": "CVE-2022-49011-bb75a0d1223d43f97089841aecb28a9b4de687a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49011/CVE-2022-49011-bb75a0d1223d43f97089841aecb28a9b4de687a9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c40db1e5f316792b557d2be37e447c20d9ac4635",
                "patch_url": "https://git.kernel.org/stable/p/c40db1e5f316792b557d2be37e447c20d9ac4635",
                "filename": "CVE-2022-49011-c40db1e5f316792b557d2be37e447c20d9ac4635.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49011/CVE-2022-49011-c40db1e5f316792b557d2be37e447c20d9ac4635.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ea5844f946b1ec5c0b7c115cd7684f34fd48021b",
                "patch_url": "https://git.kernel.org/stable/p/ea5844f946b1ec5c0b7c115cd7684f34fd48021b",
                "filename": "CVE-2022-49011-ea5844f946b1ec5c0b7c115cd7684f34fd48021b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49011/CVE-2022-49011-ea5844f946b1ec5c0b7c115cd7684f34fd48021b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f598da27acbeee414679cacd14294db3e273e3d2",
                "patch_url": "https://git.kernel.org/stable/p/f598da27acbeee414679cacd14294db3e273e3d2",
                "filename": "CVE-2022-49011-f598da27acbeee414679cacd14294db3e273e3d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49011/CVE-2022-49011-f598da27acbeee414679cacd14294db3e273e3d2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0dd1da5a15eeecb2fe4cf131b3216fb455af783c",
            "https://git.kernel.org/stable/c/2f74cffc7c85f770b1b1833dccb03b8cde3be102",
            "https://git.kernel.org/stable/c/6e035d5a2a6b907cfce9a80c5f442c2e459cd34e",
            "https://git.kernel.org/stable/c/7dec14537c5906b8bf40fd6fd6d9c3850f8df11d",
            "https://git.kernel.org/stable/c/bb75a0d1223d43f97089841aecb28a9b4de687a9",
            "https://git.kernel.org/stable/c/c40db1e5f316792b557d2be37e447c20d9ac4635",
            "https://git.kernel.org/stable/c/ea5844f946b1ec5c0b7c115cd7684f34fd48021b",
            "https://git.kernel.org/stable/c/f598da27acbeee414679cacd14294db3e273e3d2",
            "https://www.cve.org/CVERecord?id=CVE-2022-49011\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-49011\nhttps://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49011-069a@gregkh/T"
        ]
    },
    "CVE-2022-4904": {
        "cve": "CVE-2022-4904",
        "cvss_v2": null,
        "cvss_v3": 8.6,
        "description": "A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-4904",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2022-49043": {
        "cve": "CVE-2022-49043",
        "cvss_v2": null,
        "cvss_v3": 8.1,
        "description": "xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-49043",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2022-49058": {
        "cve": "CVE-2022-49058",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: potential buffer overflow in handling symlinks\n\nSmatch printed a warning:\n\tarch/x86/crypto/poly1305_glue.c:198 poly1305_update_arch() error:\n\t__memcpy() 'dctx->buf' too small (16 vs u32max)\n\nIt's caused because Smatch marks 'link_len' as untrusted since it comes\nfrom sscanf(). Add a check to ensure that 'link_len' is not larger than\nthe size of the 'link_str' buffer.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-49058",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1316c28569a80ab3596eeab05bf5e01991e7e739",
            "patch_url": "https://git.kernel.org/stable/p/1316c28569a80ab3596eeab05bf5e01991e7e739",
            "filename": "CVE-2022-49058-1316c28569a80ab3596eeab05bf5e01991e7e739.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49058/CVE-2022-49058-1316c28569a80ab3596eeab05bf5e01991e7e739.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1316c28569a80ab3596eeab05bf5e01991e7e739",
                "patch_url": "https://git.kernel.org/stable/p/1316c28569a80ab3596eeab05bf5e01991e7e739",
                "filename": "CVE-2022-49058-1316c28569a80ab3596eeab05bf5e01991e7e739.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49058/CVE-2022-49058-1316c28569a80ab3596eeab05bf5e01991e7e739.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/22d658c6c5affed10c8907e67160cef0b6c92186",
                "patch_url": "https://git.kernel.org/stable/p/22d658c6c5affed10c8907e67160cef0b6c92186",
                "filename": "CVE-2022-49058-22d658c6c5affed10c8907e67160cef0b6c92186.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49058/CVE-2022-49058-22d658c6c5affed10c8907e67160cef0b6c92186.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3e582749e742e662a8e9bb37cffac62dccaaa1e2",
                "patch_url": "https://git.kernel.org/stable/p/3e582749e742e662a8e9bb37cffac62dccaaa1e2",
                "filename": "CVE-2022-49058-3e582749e742e662a8e9bb37cffac62dccaaa1e2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49058/CVE-2022-49058-3e582749e742e662a8e9bb37cffac62dccaaa1e2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4e166a41180be2f1e66bbb6d46448e80a9a5ec05",
                "patch_url": "https://git.kernel.org/stable/p/4e166a41180be2f1e66bbb6d46448e80a9a5ec05",
                "filename": "CVE-2022-49058-4e166a41180be2f1e66bbb6d46448e80a9a5ec05.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49058/CVE-2022-49058-4e166a41180be2f1e66bbb6d46448e80a9a5ec05.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/515e7ba11ef043d6febe69389949c8ef5f25e9d0",
                "patch_url": "https://git.kernel.org/stable/p/515e7ba11ef043d6febe69389949c8ef5f25e9d0",
                "filename": "CVE-2022-49058-515e7ba11ef043d6febe69389949c8ef5f25e9d0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49058/CVE-2022-49058-515e7ba11ef043d6febe69389949c8ef5f25e9d0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/64c4a37ac04eeb43c42d272f6e6c8c12bfcf4304",
                "patch_url": "https://git.kernel.org/stable/p/64c4a37ac04eeb43c42d272f6e6c8c12bfcf4304",
                "filename": "CVE-2022-49058-64c4a37ac04eeb43c42d272f6e6c8c12bfcf4304.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49058/CVE-2022-49058-64c4a37ac04eeb43c42d272f6e6c8c12bfcf4304.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9901b07ba42b39266b34a888e48d7306fd707bee",
                "patch_url": "https://git.kernel.org/stable/p/9901b07ba42b39266b34a888e48d7306fd707bee",
                "filename": "CVE-2022-49058-9901b07ba42b39266b34a888e48d7306fd707bee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49058/CVE-2022-49058-9901b07ba42b39266b34a888e48d7306fd707bee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eb5f51756944735ac70cd8bb38637cc202e29c91",
                "patch_url": "https://git.kernel.org/stable/p/eb5f51756944735ac70cd8bb38637cc202e29c91",
                "filename": "CVE-2022-49058-eb5f51756944735ac70cd8bb38637cc202e29c91.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49058/CVE-2022-49058-eb5f51756944735ac70cd8bb38637cc202e29c91.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1316c28569a80ab3596eeab05bf5e01991e7e739",
            "https://git.kernel.org/stable/c/22d658c6c5affed10c8907e67160cef0b6c92186",
            "https://git.kernel.org/stable/c/3e582749e742e662a8e9bb37cffac62dccaaa1e2",
            "https://git.kernel.org/stable/c/4e166a41180be2f1e66bbb6d46448e80a9a5ec05",
            "https://git.kernel.org/stable/c/515e7ba11ef043d6febe69389949c8ef5f25e9d0",
            "https://git.kernel.org/stable/c/64c4a37ac04eeb43c42d272f6e6c8c12bfcf4304",
            "https://git.kernel.org/stable/c/9901b07ba42b39266b34a888e48d7306fd707bee",
            "https://git.kernel.org/stable/c/eb5f51756944735ac70cd8bb38637cc202e29c91",
            "https://www.cve.org/CVERecord?id=CVE-2022-49058\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-49058\nhttps://lore.kernel.org/linux-cve-announce/2025022653-CVE-2022-49058-5df2@gregkh/T"
        ]
    },
    "CVE-2022-49111": {
        "cve": "CVE-2022-49111",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix use after free in hci_send_acl\n\nThis fixes the following trace caused by receiving\nHCI_EV_DISCONN_PHY_LINK_COMPLETE which does call hci_conn_del without\nfirst checking if conn->type is in fact AMP_LINK and in case it is\ndo properly cleanup upper layers with hci_disconn_cfm:\n\n ==================================================================\n    BUG: KASAN: use-after-free in hci_send_acl+0xaba/0xc50\n    Read of size 8 at addr ffff88800e404818 by task bluetoothd/142\n\n    CPU: 0 PID: 142 Comm: bluetoothd Not tainted\n    5.17.0-rc5-00006-gda4022eeac1a #7\n    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n    rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n    Call Trace:\n     <TASK>\n     dump_stack_lvl+0x45/0x59\n     print_address_description.constprop.0+0x1f/0x150\n     kasan_report.cold+0x7f/0x11b\n     hci_send_acl+0xaba/0xc50\n     l2cap_do_send+0x23f/0x3d0\n     l2cap_chan_send+0xc06/0x2cc0\n     l2cap_sock_sendmsg+0x201/0x2b0\n     sock_sendmsg+0xdc/0x110\n     sock_write_iter+0x20f/0x370\n     do_iter_readv_writev+0x343/0x690\n     do_iter_write+0x132/0x640\n     vfs_writev+0x198/0x570\n     do_writev+0x202/0x280\n     do_syscall_64+0x38/0x90\n     entry_SYSCALL_64_after_hwframe+0x44/0xae\n    RSP: 002b:00007ffce8a099b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000014\n    Code: 0f 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3\n    0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 14 00 00 00 0f 05\n    <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10\n    RDX: 0000000000000001 RSI: 00007ffce8a099e0 RDI: 0000000000000015\n    RAX: ffffffffffffffda RBX: 00007ffce8a099e0 RCX: 00007f788fc3cf77\n    R10: 00007ffce8af7080 R11: 0000000000000246 R12: 000055e4ccf75580\n    RBP: 0000000000000015 R08: 0000000000000002 R09: 0000000000000001\n    </TASK>\n    R13: 000055e4ccf754a0 R14: 000055e4ccf75cd0 R15: 000055e4ccf4a6b0\n\n    Allocated by task 45:\n        kasan_save_stack+0x1e/0x40\n        __kasan_kmalloc+0x81/0xa0\n        hci_chan_create+0x9a/0x2f0\n        l2cap_conn_add.part.0+0x1a/0xdc0\n        l2cap_connect_cfm+0x236/0x1000\n        le_conn_complete_evt+0x15a7/0x1db0\n        hci_le_conn_complete_evt+0x226/0x2c0\n        hci_le_meta_evt+0x247/0x450\n        hci_event_packet+0x61b/0xe90\n        hci_rx_work+0x4d5/0xc50\n        process_one_work+0x8fb/0x15a0\n        worker_thread+0x576/0x1240\n        kthread+0x29d/0x340\n        ret_from_fork+0x1f/0x30\n\n    Freed by task 45:\n        kasan_save_stack+0x1e/0x40\n        kasan_set_track+0x21/0x30\n        kasan_set_free_info+0x20/0x30\n        __kasan_slab_free+0xfb/0x130\n        kfree+0xac/0x350\n        hci_conn_cleanup+0x101/0x6a0\n        hci_conn_del+0x27e/0x6c0\n        hci_disconn_phylink_complete_evt+0xe0/0x120\n        hci_event_packet+0x812/0xe90\n        hci_rx_work+0x4d5/0xc50\n        process_one_work+0x8fb/0x15a0\n        worker_thread+0x576/0x1240\n        kthread+0x29d/0x340\n        ret_from_fork+0x1f/0x30\n\n    The buggy address belongs to the object at ffff88800c0f0500\n    The buggy address is located 24 bytes inside of\n    which belongs to the cache kmalloc-128 of size 128\n    The buggy address belongs to the page:\n    128-byte region [ffff88800c0f0500, ffff88800c0f0580)\n    flags: 0x100000000000200(slab|node=0|zone=1)\n    page:00000000fe45cd86 refcount:1 mapcount:0\n    mapping:0000000000000000 index:0x0 pfn:0xc0f0\n    raw: 0000000000000000 0000000080100010 00000001ffffffff\n    0000000000000000\n    raw: 0100000000000200 ffffea00003a2c80 dead000000000004\n    ffff8880078418c0\n    page dumped because: kasan: bad access detected\n    ffff88800c0f0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc\n    Memory state around the buggy address:\n    >ffff88800c0f0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n    ffff88800c0f0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n    ffff88800c0f0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n                   \n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-49111",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2cc803804ec9a296b3156855d6c8c4ca1c6b84be",
            "patch_url": "https://git.kernel.org/stable/p/2cc803804ec9a296b3156855d6c8c4ca1c6b84be",
            "filename": "CVE-2022-49111-2cc803804ec9a296b3156855d6c8c4ca1c6b84be.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49111/CVE-2022-49111-2cc803804ec9a296b3156855d6c8c4ca1c6b84be.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2cc803804ec9a296b3156855d6c8c4ca1c6b84be",
                "patch_url": "https://git.kernel.org/stable/p/2cc803804ec9a296b3156855d6c8c4ca1c6b84be",
                "filename": "CVE-2022-49111-2cc803804ec9a296b3156855d6c8c4ca1c6b84be.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49111/CVE-2022-49111-2cc803804ec9a296b3156855d6c8c4ca1c6b84be.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3803d896ddd97c7c16689a5381c0960040727647",
                "patch_url": "https://git.kernel.org/stable/p/3803d896ddd97c7c16689a5381c0960040727647",
                "filename": "CVE-2022-49111-3803d896ddd97c7c16689a5381c0960040727647.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49111/CVE-2022-49111-3803d896ddd97c7c16689a5381c0960040727647.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4da302b90b96c309987eb9b37c8547f939f042d2",
                "patch_url": "https://git.kernel.org/stable/p/4da302b90b96c309987eb9b37c8547f939f042d2",
                "filename": "CVE-2022-49111-4da302b90b96c309987eb9b37c8547f939f042d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49111/CVE-2022-49111-4da302b90b96c309987eb9b37c8547f939f042d2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/643a6c26bd32e339d00ad97b8822b6db009e803c",
                "patch_url": "https://git.kernel.org/stable/p/643a6c26bd32e339d00ad97b8822b6db009e803c",
                "filename": "CVE-2022-49111-643a6c26bd32e339d00ad97b8822b6db009e803c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49111/CVE-2022-49111-643a6c26bd32e339d00ad97b8822b6db009e803c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/684e505406abaeabe0058e9776f9210bf2747953",
                "patch_url": "https://git.kernel.org/stable/p/684e505406abaeabe0058e9776f9210bf2747953",
                "filename": "CVE-2022-49111-684e505406abaeabe0058e9776f9210bf2747953.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49111/CVE-2022-49111-684e505406abaeabe0058e9776f9210bf2747953.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b3c2ea1fd444b3bb7b82bfd2c3a45418f85c2502",
                "patch_url": "https://git.kernel.org/stable/p/b3c2ea1fd444b3bb7b82bfd2c3a45418f85c2502",
                "filename": "CVE-2022-49111-b3c2ea1fd444b3bb7b82bfd2c3a45418f85c2502.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49111/CVE-2022-49111-b3c2ea1fd444b3bb7b82bfd2c3a45418f85c2502.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c41de54b0a963e59e4dd04c029a4a6d73f45ef9c",
                "patch_url": "https://git.kernel.org/stable/p/c41de54b0a963e59e4dd04c029a4a6d73f45ef9c",
                "filename": "CVE-2022-49111-c41de54b0a963e59e4dd04c029a4a6d73f45ef9c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49111/CVE-2022-49111-c41de54b0a963e59e4dd04c029a4a6d73f45ef9c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d404765dffdbd8dcd14758695d0c96c52fb2e624",
                "patch_url": "https://git.kernel.org/stable/p/d404765dffdbd8dcd14758695d0c96c52fb2e624",
                "filename": "CVE-2022-49111-d404765dffdbd8dcd14758695d0c96c52fb2e624.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49111/CVE-2022-49111-d404765dffdbd8dcd14758695d0c96c52fb2e624.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f63d24baff787e13b723d86fe036f84bdbc35045",
                "patch_url": "https://git.kernel.org/stable/p/f63d24baff787e13b723d86fe036f84bdbc35045",
                "filename": "CVE-2022-49111-f63d24baff787e13b723d86fe036f84bdbc35045.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49111/CVE-2022-49111-f63d24baff787e13b723d86fe036f84bdbc35045.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2cc803804ec9a296b3156855d6c8c4ca1c6b84be",
            "https://git.kernel.org/stable/c/3803d896ddd97c7c16689a5381c0960040727647",
            "https://git.kernel.org/stable/c/4da302b90b96c309987eb9b37c8547f939f042d2",
            "https://git.kernel.org/stable/c/643a6c26bd32e339d00ad97b8822b6db009e803c",
            "https://git.kernel.org/stable/c/684e505406abaeabe0058e9776f9210bf2747953",
            "https://git.kernel.org/stable/c/b3c2ea1fd444b3bb7b82bfd2c3a45418f85c2502",
            "https://git.kernel.org/stable/c/c41de54b0a963e59e4dd04c029a4a6d73f45ef9c",
            "https://git.kernel.org/stable/c/d404765dffdbd8dcd14758695d0c96c52fb2e624",
            "https://git.kernel.org/stable/c/f63d24baff787e13b723d86fe036f84bdbc35045",
            "https://www.cve.org/CVERecord?id=CVE-2022-49111\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-49111\nhttps://lore.kernel.org/linux-cve-announce/2025022602-CVE-2022-49111-8795@gregkh/T"
        ]
    },
    "CVE-2022-49136": {
        "cve": "CVE-2022-49136",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set\n\nhci_cmd_sync_queue shall return an error if HCI_UNREGISTER flag has\nbeen set as that means hci_unregister_dev has been called so it will\nlikely cause a uaf after the timeout as the hdev will be freed.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-49136",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0b94f2651f56b9e4aa5f012b0d7eb57308c773cf",
            "patch_url": "https://git.kernel.org/stable/p/0b94f2651f56b9e4aa5f012b0d7eb57308c773cf",
            "filename": "CVE-2022-49136-0b94f2651f56b9e4aa5f012b0d7eb57308c773cf.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49136/CVE-2022-49136-0b94f2651f56b9e4aa5f012b0d7eb57308c773cf.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0b94f2651f56b9e4aa5f012b0d7eb57308c773cf",
                "patch_url": "https://git.kernel.org/stable/p/0b94f2651f56b9e4aa5f012b0d7eb57308c773cf",
                "filename": "CVE-2022-49136-0b94f2651f56b9e4aa5f012b0d7eb57308c773cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49136/CVE-2022-49136-0b94f2651f56b9e4aa5f012b0d7eb57308c773cf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1c69ef84a808676cceb69210addf5df45b741323",
                "patch_url": "https://git.kernel.org/stable/p/1c69ef84a808676cceb69210addf5df45b741323",
                "filename": "CVE-2022-49136-1c69ef84a808676cceb69210addf5df45b741323.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49136/CVE-2022-49136-1c69ef84a808676cceb69210addf5df45b741323.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0b94f2651f56b9e4aa5f012b0d7eb57308c773cf",
            "https://git.kernel.org/stable/c/1c69ef84a808676cceb69210addf5df45b741323",
            "https://www.cve.org/CVERecord?id=CVE-2022-49136\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-49136\nhttps://lore.kernel.org/linux-cve-announce/2025022606-CVE-2022-49136-033c@gregkh/T"
        ]
    },
    "CVE-2022-49395": {
        "cve": "CVE-2022-49395",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\num: Fix out-of-bounds read in LDT setup\n\nsyscall_stub_data() expects the data_count parameter to be the number of\nlongs, not bytes.\n\n ==================================================================\n BUG: KASAN: stack-out-of-bounds in syscall_stub_data+0x70/0xe0\n Read of size 128 at addr 000000006411f6f0 by task swapper/1\n\n CPU: 0 PID: 1 Comm: swapper Not tainted 5.18.0+ #18\n Call Trace:\n  show_stack.cold+0x166/0x2a7\n  __dump_stack+0x3a/0x43\n  dump_stack_lvl+0x1f/0x27\n  print_report.cold+0xdb/0xf81\n  kasan_report+0x119/0x1f0\n  kasan_check_range+0x3a3/0x440\n  memcpy+0x52/0x140\n  syscall_stub_data+0x70/0xe0\n  write_ldt_entry+0xac/0x190\n  init_new_ldt+0x515/0x960\n  init_new_context+0x2c4/0x4d0\n  mm_init.constprop.0+0x5ed/0x760\n  mm_alloc+0x118/0x170\n  0x60033f48\n  do_one_initcall+0x1d7/0x860\n  0x60003e7b\n  kernel_init+0x6e/0x3d4\n  new_thread_handler+0x1e7/0x2c0\n\n The buggy address belongs to stack of task swapper/1\n  and is located at offset 64 in frame:\n  init_new_ldt+0x0/0x960\n\n This frame has 2 objects:\n  [32, 40) 'addr'\n  [64, 80) 'desc'\n ==================================================================",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-49395",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/10995a382271254bd276627ec74136da4a23c4a6",
            "patch_url": "https://git.kernel.org/stable/p/10995a382271254bd276627ec74136da4a23c4a6",
            "filename": "CVE-2022-49395-10995a382271254bd276627ec74136da4a23c4a6.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49395/CVE-2022-49395-10995a382271254bd276627ec74136da4a23c4a6.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/10995a382271254bd276627ec74136da4a23c4a6",
                "patch_url": "https://git.kernel.org/stable/p/10995a382271254bd276627ec74136da4a23c4a6",
                "filename": "CVE-2022-49395-10995a382271254bd276627ec74136da4a23c4a6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49395/CVE-2022-49395-10995a382271254bd276627ec74136da4a23c4a6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/24ca648bf5f72ed8878cf09b5d4431935779681e",
                "patch_url": "https://git.kernel.org/stable/p/24ca648bf5f72ed8878cf09b5d4431935779681e",
                "filename": "CVE-2022-49395-24ca648bf5f72ed8878cf09b5d4431935779681e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49395/CVE-2022-49395-24ca648bf5f72ed8878cf09b5d4431935779681e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2a4a62a14be1947fa945c5c11ebf67326381a568",
                "patch_url": "https://git.kernel.org/stable/p/2a4a62a14be1947fa945c5c11ebf67326381a568",
                "filename": "CVE-2022-49395-2a4a62a14be1947fa945c5c11ebf67326381a568.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49395/CVE-2022-49395-2a4a62a14be1947fa945c5c11ebf67326381a568.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3549ab4b962cf619e8c55484a0d870a34b3f845f",
                "patch_url": "https://git.kernel.org/stable/p/3549ab4b962cf619e8c55484a0d870a34b3f845f",
                "filename": "CVE-2022-49395-3549ab4b962cf619e8c55484a0d870a34b3f845f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49395/CVE-2022-49395-3549ab4b962cf619e8c55484a0d870a34b3f845f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/668ca34a428d6ffc0f99a1a6a9b661a288d4183b",
                "patch_url": "https://git.kernel.org/stable/p/668ca34a428d6ffc0f99a1a6a9b661a288d4183b",
                "filename": "CVE-2022-49395-668ca34a428d6ffc0f99a1a6a9b661a288d4183b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49395/CVE-2022-49395-668ca34a428d6ffc0f99a1a6a9b661a288d4183b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/91e5ba2af2d729d5126aefd5aa3eadc69b8426e5",
                "patch_url": "https://git.kernel.org/stable/p/91e5ba2af2d729d5126aefd5aa3eadc69b8426e5",
                "filename": "CVE-2022-49395-91e5ba2af2d729d5126aefd5aa3eadc69b8426e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49395/CVE-2022-49395-91e5ba2af2d729d5126aefd5aa3eadc69b8426e5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9caad70819aef3431abaf73ba5163b55b161aba0",
                "patch_url": "https://git.kernel.org/stable/p/9caad70819aef3431abaf73ba5163b55b161aba0",
                "filename": "CVE-2022-49395-9caad70819aef3431abaf73ba5163b55b161aba0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49395/CVE-2022-49395-9caad70819aef3431abaf73ba5163b55b161aba0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf0dabc37446c5ee538ae7b4c467ab0e53fa5463",
                "patch_url": "https://git.kernel.org/stable/p/cf0dabc37446c5ee538ae7b4c467ab0e53fa5463",
                "filename": "CVE-2022-49395-cf0dabc37446c5ee538ae7b4c467ab0e53fa5463.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49395/CVE-2022-49395-cf0dabc37446c5ee538ae7b4c467ab0e53fa5463.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ef1dc929a1e5fa1b2d842256db9fb8710d3be910",
                "patch_url": "https://git.kernel.org/stable/p/ef1dc929a1e5fa1b2d842256db9fb8710d3be910",
                "filename": "CVE-2022-49395-ef1dc929a1e5fa1b2d842256db9fb8710d3be910.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49395/CVE-2022-49395-ef1dc929a1e5fa1b2d842256db9fb8710d3be910.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/10995a382271254bd276627ec74136da4a23c4a6",
            "https://git.kernel.org/stable/c/24ca648bf5f72ed8878cf09b5d4431935779681e",
            "https://git.kernel.org/stable/c/2a4a62a14be1947fa945c5c11ebf67326381a568",
            "https://git.kernel.org/stable/c/3549ab4b962cf619e8c55484a0d870a34b3f845f",
            "https://git.kernel.org/stable/c/668ca34a428d6ffc0f99a1a6a9b661a288d4183b",
            "https://git.kernel.org/stable/c/91e5ba2af2d729d5126aefd5aa3eadc69b8426e5",
            "https://git.kernel.org/stable/c/9caad70819aef3431abaf73ba5163b55b161aba0",
            "https://git.kernel.org/stable/c/cf0dabc37446c5ee538ae7b4c467ab0e53fa5463",
            "https://git.kernel.org/stable/c/ef1dc929a1e5fa1b2d842256db9fb8710d3be910",
            "https://www.cve.org/CVERecord?id=CVE-2022-49395\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-49395\nhttps://lore.kernel.org/linux-cve-announce/2025022650-CVE-2022-49395-7419@gregkh/T"
        ]
    },
    "CVE-2022-49401": {
        "cve": "CVE-2022-49401",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/page_owner: use strscpy() instead of strlcpy()\n\ncurrent->comm[] is not a string (no guarantee for a zero byte in it).\n\nstrlcpy(s1, s2, l) is calling strlen(s2), potentially\ncausing out-of-bound access, as reported by syzbot:\n\ndetected buffer overflow in __fortify_strlen\n------------[ cut here ]------------\nkernel BUG at lib/string_helpers.c:980!\ninvalid opcode: 0000 [#1] PREEMPT SMP KASAN\nCPU: 0 PID: 4087 Comm: dhcpcd-run-hooks Not tainted 5.18.0-rc3-syzkaller-01537-g20b87e7c29df #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:fortify_panic+0x18/0x1a lib/string_helpers.c:980\nCode: 8c e8 c5 ba e1 fa e9 23 0f bf fa e8 0b 5d 8c f8 eb db 55 48 89 fd e8 e0 49 40 f8 48 89 ee 48 c7 c7 80 f5 26 8a e8 99 09 f1 ff <0f> 0b e8 ca 49 40 f8 48 8b 54 24 18 4c 89 f1 48 c7 c7 00 00 27 8a\nRSP: 0018:ffffc900000074a8 EFLAGS: 00010286\n\nRAX: 000000000000002c RBX: ffff88801226b728 RCX: 0000000000000000\nRDX: ffff8880198e0000 RSI: ffffffff81600458 RDI: fffff52000000e87\nRBP: ffffffff89da2aa0 R08: 000000000000002c R09: 0000000000000000\nR10: ffffffff815fae2e R11: 0000000000000000 R12: ffff88801226b700\nR13: ffff8880198e0830 R14: 0000000000000000 R15: 0000000000000000\nFS:  0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f5876ad6ff8 CR3: 000000001a48c000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600\nCall Trace:\n <IRQ>\n __fortify_strlen include/linux/fortify-string.h:128 [inline]\n strlcpy include/linux/fortify-string.h:143 [inline]\n __set_page_owner_handle+0x2b1/0x3e0 mm/page_owner.c:171\n __set_page_owner+0x3e/0x50 mm/page_owner.c:190\n prep_new_page mm/page_alloc.c:2441 [inline]\n get_page_from_freelist+0xba2/0x3e00 mm/page_alloc.c:4182\n __alloc_pages+0x1b2/0x500 mm/page_alloc.c:5408\n alloc_pages+0x1aa/0x310 mm/mempolicy.c:2272\n alloc_slab_page mm/slub.c:1799 [inline]\n allocate_slab+0x26c/0x3c0 mm/slub.c:1944\n new_slab mm/slub.c:2004 [inline]\n ___slab_alloc+0x8df/0xf20 mm/slub.c:3005\n __slab_alloc.constprop.0+0x4d/0xa0 mm/slub.c:3092\n slab_alloc_node mm/slub.c:3183 [inline]\n slab_alloc mm/slub.c:3225 [inline]\n __kmem_cache_alloc_lru mm/slub.c:3232 [inline]\n kmem_cache_alloc+0x360/0x3b0 mm/slub.c:3242\n dst_alloc+0x146/0x1f0 net/core/dst.c:92",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-49401",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/5cd9900a1ac8b0a4ff3cd97d4d77b7711be435bf",
            "patch_url": "https://git.kernel.org/stable/p/5cd9900a1ac8b0a4ff3cd97d4d77b7711be435bf",
            "filename": "CVE-2022-49401-5cd9900a1ac8b0a4ff3cd97d4d77b7711be435bf.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49401/CVE-2022-49401-5cd9900a1ac8b0a4ff3cd97d4d77b7711be435bf.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/5cd9900a1ac8b0a4ff3cd97d4d77b7711be435bf",
                "patch_url": "https://git.kernel.org/stable/p/5cd9900a1ac8b0a4ff3cd97d4d77b7711be435bf",
                "filename": "CVE-2022-49401-5cd9900a1ac8b0a4ff3cd97d4d77b7711be435bf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49401/CVE-2022-49401-5cd9900a1ac8b0a4ff3cd97d4d77b7711be435bf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cd8c1fd8cdd14158f2d8bea2d1bfe8015dccfa3a",
                "patch_url": "https://git.kernel.org/stable/p/cd8c1fd8cdd14158f2d8bea2d1bfe8015dccfa3a",
                "filename": "CVE-2022-49401-cd8c1fd8cdd14158f2d8bea2d1bfe8015dccfa3a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49401/CVE-2022-49401-cd8c1fd8cdd14158f2d8bea2d1bfe8015dccfa3a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/5cd9900a1ac8b0a4ff3cd97d4d77b7711be435bf",
            "https://git.kernel.org/stable/c/cd8c1fd8cdd14158f2d8bea2d1bfe8015dccfa3a",
            "https://www.cve.org/CVERecord?id=CVE-2022-49401\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-49401\nhttps://lore.kernel.org/linux-cve-announce/2025022651-CVE-2022-49401-2fa3@gregkh/T"
        ]
    },
    "CVE-2022-49788": {
        "cve": "CVE-2022-49788",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()\n\n`struct vmci_event_qp` allocated by qp_notify_peer() contains padding,\nwhich may carry uninitialized data to the userspace, as observed by\nKMSAN:\n\n  BUG: KMSAN: kernel-infoleak in instrument_copy_to_user ./include/linux/instrumented.h:121\n   instrument_copy_to_user ./include/linux/instrumented.h:121\n   _copy_to_user+0x5f/0xb0 lib/usercopy.c:33\n   copy_to_user ./include/linux/uaccess.h:169\n   vmci_host_do_receive_datagram drivers/misc/vmw_vmci/vmci_host.c:431\n   vmci_host_unlocked_ioctl+0x33d/0x43d0 drivers/misc/vmw_vmci/vmci_host.c:925\n   vfs_ioctl fs/ioctl.c:51\n  ...\n\n  Uninit was stored to memory at:\n   kmemdup+0x74/0xb0 mm/util.c:131\n   dg_dispatch_as_host drivers/misc/vmw_vmci/vmci_datagram.c:271\n   vmci_datagram_dispatch+0x4f8/0xfc0 drivers/misc/vmw_vmci/vmci_datagram.c:339\n   qp_notify_peer+0x19a/0x290 drivers/misc/vmw_vmci/vmci_queue_pair.c:1479\n   qp_broker_attach drivers/misc/vmw_vmci/vmci_queue_pair.c:1662\n   qp_broker_alloc+0x2977/0x2f30 drivers/misc/vmw_vmci/vmci_queue_pair.c:1750\n   vmci_qp_broker_alloc+0x96/0xd0 drivers/misc/vmw_vmci/vmci_queue_pair.c:1940\n   vmci_host_do_alloc_queuepair drivers/misc/vmw_vmci/vmci_host.c:488\n   vmci_host_unlocked_ioctl+0x24fd/0x43d0 drivers/misc/vmw_vmci/vmci_host.c:927\n  ...\n\n  Local variable ev created at:\n   qp_notify_peer+0x54/0x290 drivers/misc/vmw_vmci/vmci_queue_pair.c:1456\n   qp_broker_attach drivers/misc/vmw_vmci/vmci_queue_pair.c:1662\n   qp_broker_alloc+0x2977/0x2f30 drivers/misc/vmw_vmci/vmci_queue_pair.c:1750\n\n  Bytes 28-31 of 48 are uninitialized\n  Memory access of size 48 starts at ffff888035155e00\n  Data copied to user address 0000000020000100\n\nUse memset() to prevent the infoleaks.\n\nAlso speculatively fix qp_notify_peer_local(), which may suffer from the\nsame problem.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-49788",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/76c50d77b928a33e5290aaa9fdc10e88254ff8c7",
            "patch_url": "https://git.kernel.org/stable/p/76c50d77b928a33e5290aaa9fdc10e88254ff8c7",
            "filename": "CVE-2022-49788-76c50d77b928a33e5290aaa9fdc10e88254ff8c7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49788/CVE-2022-49788-76c50d77b928a33e5290aaa9fdc10e88254ff8c7.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/5a275528025ae4bc7e2232866856dfebf84b2fad",
                "patch_url": "https://git.kernel.org/stable/p/5a275528025ae4bc7e2232866856dfebf84b2fad",
                "filename": "CVE-2022-49788-5a275528025ae4bc7e2232866856dfebf84b2fad.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49788/CVE-2022-49788-5a275528025ae4bc7e2232866856dfebf84b2fad.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/62634b43d3c4e1bf62fd540196f7081bf0885c0a",
                "patch_url": "https://git.kernel.org/stable/p/62634b43d3c4e1bf62fd540196f7081bf0885c0a",
                "filename": "CVE-2022-49788-62634b43d3c4e1bf62fd540196f7081bf0885c0a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49788/CVE-2022-49788-62634b43d3c4e1bf62fd540196f7081bf0885c0a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/76c50d77b928a33e5290aaa9fdc10e88254ff8c7",
                "patch_url": "https://git.kernel.org/stable/p/76c50d77b928a33e5290aaa9fdc10e88254ff8c7",
                "filename": "CVE-2022-49788-76c50d77b928a33e5290aaa9fdc10e88254ff8c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49788/CVE-2022-49788-76c50d77b928a33e5290aaa9fdc10e88254ff8c7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7ccf7229b96fadc3a185d1391f814a604c7ef609",
                "patch_url": "https://git.kernel.org/stable/p/7ccf7229b96fadc3a185d1391f814a604c7ef609",
                "filename": "CVE-2022-49788-7ccf7229b96fadc3a185d1391f814a604c7ef609.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49788/CVE-2022-49788-7ccf7229b96fadc3a185d1391f814a604c7ef609.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8e2f33c598370bcf828bab4d667d1d38bcd3c57d",
                "patch_url": "https://git.kernel.org/stable/p/8e2f33c598370bcf828bab4d667d1d38bcd3c57d",
                "filename": "CVE-2022-49788-8e2f33c598370bcf828bab4d667d1d38bcd3c57d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49788/CVE-2022-49788-8e2f33c598370bcf828bab4d667d1d38bcd3c57d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e5b0d06d9b10f5f43101bd6598b076c347f9295f",
                "patch_url": "https://git.kernel.org/stable/p/e5b0d06d9b10f5f43101bd6598b076c347f9295f",
                "filename": "CVE-2022-49788-e5b0d06d9b10f5f43101bd6598b076c347f9295f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49788/CVE-2022-49788-e5b0d06d9b10f5f43101bd6598b076c347f9295f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e7061dd1fef2dfb6458cd521aef27aa66f510d31",
                "patch_url": "https://git.kernel.org/stable/p/e7061dd1fef2dfb6458cd521aef27aa66f510d31",
                "filename": "CVE-2022-49788-e7061dd1fef2dfb6458cd521aef27aa66f510d31.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49788/CVE-2022-49788-e7061dd1fef2dfb6458cd521aef27aa66f510d31.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f04586c2315cfd03d72ad0395705435e7ed07b1a",
                "patch_url": "https://git.kernel.org/stable/p/f04586c2315cfd03d72ad0395705435e7ed07b1a",
                "filename": "CVE-2022-49788-f04586c2315cfd03d72ad0395705435e7ed07b1a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49788/CVE-2022-49788-f04586c2315cfd03d72ad0395705435e7ed07b1a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/5a275528025ae4bc7e2232866856dfebf84b2fad",
            "https://git.kernel.org/stable/c/62634b43d3c4e1bf62fd540196f7081bf0885c0a",
            "https://git.kernel.org/stable/c/76c50d77b928a33e5290aaa9fdc10e88254ff8c7",
            "https://git.kernel.org/stable/c/7ccf7229b96fadc3a185d1391f814a604c7ef609",
            "https://git.kernel.org/stable/c/8e2f33c598370bcf828bab4d667d1d38bcd3c57d",
            "https://git.kernel.org/stable/c/e5b0d06d9b10f5f43101bd6598b076c347f9295f",
            "https://git.kernel.org/stable/c/e7061dd1fef2dfb6458cd521aef27aa66f510d31",
            "https://git.kernel.org/stable/c/f04586c2315cfd03d72ad0395705435e7ed07b1a",
            "https://www.cve.org/CVERecord?id=CVE-2022-49788\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-49788\nhttps://lore.kernel.org/linux-cve-announce/2025050121-CVE-2022-49788-6e84@gregkh/T"
        ]
    },
    "CVE-2022-49846": {
        "cve": "CVE-2022-49846",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nudf: Fix a slab-out-of-bounds write bug in udf_find_entry()\n\nSyzbot reported a slab-out-of-bounds Write bug:\n\nloop0: detected capacity change from 0 to 2048\n==================================================================\nBUG: KASAN: slab-out-of-bounds in udf_find_entry+0x8a5/0x14f0\nfs/udf/namei.c:253\nWrite of size 105 at addr ffff8880123ff896 by task syz-executor323/3610\n\nCPU: 0 PID: 3610 Comm: syz-executor323 Not tainted\n6.1.0-rc2-syzkaller-00105-gb229b6ca5abb #0\nHardware name: Google Compute Engine/Google Compute Engine, BIOS\nGoogle 10/11/2022\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106\n print_address_description+0x74/0x340 mm/kasan/report.c:284\n print_report+0x107/0x1f0 mm/kasan/report.c:395\n kasan_report+0xcd/0x100 mm/kasan/report.c:495\n kasan_check_range+0x2a7/0x2e0 mm/kasan/generic.c:189\n memcpy+0x3c/0x60 mm/kasan/shadow.c:66\n udf_find_entry+0x8a5/0x14f0 fs/udf/namei.c:253\n udf_lookup+0xef/0x340 fs/udf/namei.c:309\n lookup_open fs/namei.c:3391 [inline]\n open_last_lookups fs/namei.c:3481 [inline]\n path_openat+0x10e6/0x2df0 fs/namei.c:3710\n do_filp_open+0x264/0x4f0 fs/namei.c:3740\n do_sys_openat2+0x124/0x4e0 fs/open.c:1310\n do_sys_open fs/open.c:1326 [inline]\n __do_sys_creat fs/open.c:1402 [inline]\n __se_sys_creat fs/open.c:1396 [inline]\n __x64_sys_creat+0x11f/0x160 fs/open.c:1396\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\nRIP: 0033:0x7ffab0d164d9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89\nf7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01\nf0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007ffe1a7e6bb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000055\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ffab0d164d9\nRDX: 00007ffab0d164d9 RSI: 0000000000000000 RDI: 0000000020000180\nRBP: 00007ffab0cd5a10 R08: 0000000000000000 R09: 0000000000000000\nR10: 00005555573552c0 R11: 0000000000000246 R12: 00007ffab0cd5aa0\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n </TASK>\n\nAllocated by task 3610:\n kasan_save_stack mm/kasan/common.c:45 [inline]\n kasan_set_track+0x3d/0x60 mm/kasan/common.c:52\n ____kasan_kmalloc mm/kasan/common.c:371 [inline]\n __kasan_kmalloc+0x97/0xb0 mm/kasan/common.c:380\n kmalloc include/linux/slab.h:576 [inline]\n udf_find_entry+0x7b6/0x14f0 fs/udf/namei.c:243\n udf_lookup+0xef/0x340 fs/udf/namei.c:309\n lookup_open fs/namei.c:3391 [inline]\n open_last_lookups fs/namei.c:3481 [inline]\n path_openat+0x10e6/0x2df0 fs/namei.c:3710\n do_filp_open+0x264/0x4f0 fs/namei.c:3740\n do_sys_openat2+0x124/0x4e0 fs/open.c:1310\n do_sys_open fs/open.c:1326 [inline]\n __do_sys_creat fs/open.c:1402 [inline]\n __se_sys_creat fs/open.c:1396 [inline]\n __x64_sys_creat+0x11f/0x160 fs/open.c:1396\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe buggy address belongs to the object at ffff8880123ff800\n which belongs to the cache kmalloc-256 of size 256\nThe buggy address is located 150 bytes inside of\n 256-byte region [ffff8880123ff800, ffff8880123ff900)\n\nThe buggy address belongs to the physical page:\npage:ffffea000048ff80 refcount:1 mapcount:0 mapping:0000000000000000\nindex:0x0 pfn:0x123fe\nhead:ffffea000048ff80 order:1 compound_mapcount:0 compound_pincount:0\nflags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000010200 ffffea00004b8500 dead000000000003 ffff888012041b40\nraw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as allocated\npage last allocated via order 0, migratetype Unmovable, gfp_mask 0x0(),\npid 1, tgid 1 (swapper/0), ts 1841222404, free_ts 0\n create_dummy_stack mm/page_owner.c:\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-49846",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/583fdd98d94acba1e7225e5cc29063aef0741030",
            "patch_url": "https://git.kernel.org/stable/p/583fdd98d94acba1e7225e5cc29063aef0741030",
            "filename": "CVE-2022-49846-583fdd98d94acba1e7225e5cc29063aef0741030.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49846/CVE-2022-49846-583fdd98d94acba1e7225e5cc29063aef0741030.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/03f9582a6a2ebd25a440896475c968428c4b63e7",
                "patch_url": "https://git.kernel.org/stable/p/03f9582a6a2ebd25a440896475c968428c4b63e7",
                "filename": "CVE-2022-49846-03f9582a6a2ebd25a440896475c968428c4b63e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49846/CVE-2022-49846-03f9582a6a2ebd25a440896475c968428c4b63e7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/583fdd98d94acba1e7225e5cc29063aef0741030",
                "patch_url": "https://git.kernel.org/stable/p/583fdd98d94acba1e7225e5cc29063aef0741030",
                "filename": "CVE-2022-49846-583fdd98d94acba1e7225e5cc29063aef0741030.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49846/CVE-2022-49846-583fdd98d94acba1e7225e5cc29063aef0741030.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7a6051d734f1ed0031e2216f9a538621235c11a4",
                "patch_url": "https://git.kernel.org/stable/p/7a6051d734f1ed0031e2216f9a538621235c11a4",
                "filename": "CVE-2022-49846-7a6051d734f1ed0031e2216f9a538621235c11a4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49846/CVE-2022-49846-7a6051d734f1ed0031e2216f9a538621235c11a4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ac79001b8e603226fab17240a79cb9ef679d3cd9",
                "patch_url": "https://git.kernel.org/stable/p/ac79001b8e603226fab17240a79cb9ef679d3cd9",
                "filename": "CVE-2022-49846-ac79001b8e603226fab17240a79cb9ef679d3cd9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49846/CVE-2022-49846-ac79001b8e603226fab17240a79cb9ef679d3cd9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c736ed8541605e3a25075bb1cbf8f38cb3083238",
                "patch_url": "https://git.kernel.org/stable/p/c736ed8541605e3a25075bb1cbf8f38cb3083238",
                "filename": "CVE-2022-49846-c736ed8541605e3a25075bb1cbf8f38cb3083238.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49846/CVE-2022-49846-c736ed8541605e3a25075bb1cbf8f38cb3083238.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c8af247de385ce49afabc3bf1cf4fd455c94bfe8",
                "patch_url": "https://git.kernel.org/stable/p/c8af247de385ce49afabc3bf1cf4fd455c94bfe8",
                "filename": "CVE-2022-49846-c8af247de385ce49afabc3bf1cf4fd455c94bfe8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49846/CVE-2022-49846-c8af247de385ce49afabc3bf1cf4fd455c94bfe8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d8971f410739a864c537e0ac29344a7b6c450232",
                "patch_url": "https://git.kernel.org/stable/p/d8971f410739a864c537e0ac29344a7b6c450232",
                "filename": "CVE-2022-49846-d8971f410739a864c537e0ac29344a7b6c450232.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49846/CVE-2022-49846-d8971f410739a864c537e0ac29344a7b6c450232.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f1517721c408631f09d54c743aa70cb07fd3eebd",
                "patch_url": "https://git.kernel.org/stable/p/f1517721c408631f09d54c743aa70cb07fd3eebd",
                "filename": "CVE-2022-49846-f1517721c408631f09d54c743aa70cb07fd3eebd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49846/CVE-2022-49846-f1517721c408631f09d54c743aa70cb07fd3eebd.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/03f9582a6a2ebd25a440896475c968428c4b63e7",
            "https://git.kernel.org/stable/c/583fdd98d94acba1e7225e5cc29063aef0741030",
            "https://git.kernel.org/stable/c/7a6051d734f1ed0031e2216f9a538621235c11a4",
            "https://git.kernel.org/stable/c/ac79001b8e603226fab17240a79cb9ef679d3cd9",
            "https://git.kernel.org/stable/c/c736ed8541605e3a25075bb1cbf8f38cb3083238",
            "https://git.kernel.org/stable/c/c8af247de385ce49afabc3bf1cf4fd455c94bfe8",
            "https://git.kernel.org/stable/c/d8971f410739a864c537e0ac29344a7b6c450232",
            "https://git.kernel.org/stable/c/f1517721c408631f09d54c743aa70cb07fd3eebd",
            "https://www.cve.org/CVERecord?id=CVE-2022-49846\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-49846\nhttps://lore.kernel.org/linux-cve-announce/2025050142-CVE-2022-49846-728c@gregkh/T"
        ]
    },
    "CVE-2022-49977": {
        "cve": "CVE-2022-49977",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead\n\nftrace_startup does not remove ops from ftrace_ops_list when\nftrace_startup_enable fails:\n\nregister_ftrace_function\n  ftrace_startup\n    __register_ftrace_function\n      ...\n      add_ftrace_ops(&ftrace_ops_list, ops)\n      ...\n    ...\n    ftrace_startup_enable // if ftrace failed to modify, ftrace_disabled is set to 1\n    ...\n  return 0 // ops is in the ftrace_ops_list.\n\nWhen ftrace_disabled = 1, unregister_ftrace_function simply returns without doing anything:\nunregister_ftrace_function\n  ftrace_shutdown\n    if (unlikely(ftrace_disabled))\n            return -ENODEV;  // return here, __unregister_ftrace_function is not executed,\n                             // as a result, ops is still in the ftrace_ops_list\n    __unregister_ftrace_function\n    ...\n\nIf ops is dynamically allocated, it will be free later, in this case,\nis_ftrace_trampoline accesses NULL pointer:\n\nis_ftrace_trampoline\n  ftrace_ops_trampoline\n    do_for_each_ftrace_op(op, ftrace_ops_list) // OOPS! op may be NULL!\n\nSyzkaller reports as follows:\n[ 1203.506103] BUG: kernel NULL pointer dereference, address: 000000000000010b\n[ 1203.508039] #PF: supervisor read access in kernel mode\n[ 1203.508798] #PF: error_code(0x0000) - not-present page\n[ 1203.509558] PGD 800000011660b067 P4D 800000011660b067 PUD 130fb8067 PMD 0\n[ 1203.510560] Oops: 0000 [#1] SMP KASAN PTI\n[ 1203.511189] CPU: 6 PID: 29532 Comm: syz-executor.2 Tainted: G    B   W         5.10.0 #8\n[ 1203.512324] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[ 1203.513895] RIP: 0010:is_ftrace_trampoline+0x26/0xb0\n[ 1203.514644] Code: ff eb d3 90 41 55 41 54 49 89 fc 55 53 e8 f2 00 fd ff 48 8b 1d 3b 35 5d 03 e8 e6 00 fd ff 48 8d bb 90 00 00 00 e8 2a 81 26 00 <48> 8b ab 90 00 00 00 48 85 ed 74 1d e8 c9 00 fd ff 48 8d bb 98 00\n[ 1203.518838] RSP: 0018:ffffc900012cf960 EFLAGS: 00010246\n[ 1203.520092] RAX: 0000000000000000 RBX: 000000000000007b RCX: ffffffff8a331866\n[ 1203.521469] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000010b\n[ 1203.522583] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff8df18b07\n[ 1203.523550] R10: fffffbfff1be3160 R11: 0000000000000001 R12: 0000000000478399\n[ 1203.524596] R13: 0000000000000000 R14: ffff888145088000 R15: 0000000000000008\n[ 1203.525634] FS:  00007f429f5f4700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000\n[ 1203.526801] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 1203.527626] CR2: 000000000000010b CR3: 0000000170e1e001 CR4: 00000000003706e0\n[ 1203.528611] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 1203.529605] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n\nTherefore, when ftrace_startup_enable fails, we need to rollback registration\nprocess and remove ops from ftrace_ops_list.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-49977",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4c34a2a6c9927c239dd2e295a03d49b37b618d2c",
            "patch_url": "https://git.kernel.org/stable/p/4c34a2a6c9927c239dd2e295a03d49b37b618d2c",
            "filename": "CVE-2022-49977-4c34a2a6c9927c239dd2e295a03d49b37b618d2c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49977/CVE-2022-49977-4c34a2a6c9927c239dd2e295a03d49b37b618d2c.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4c34a2a6c9927c239dd2e295a03d49b37b618d2c",
                "patch_url": "https://git.kernel.org/stable/p/4c34a2a6c9927c239dd2e295a03d49b37b618d2c",
                "filename": "CVE-2022-49977-4c34a2a6c9927c239dd2e295a03d49b37b618d2c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49977/CVE-2022-49977-4c34a2a6c9927c239dd2e295a03d49b37b618d2c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8569b4ada1e0b9bfaa125bd0c0967918b6560fa2",
                "patch_url": "https://git.kernel.org/stable/p/8569b4ada1e0b9bfaa125bd0c0967918b6560fa2",
                "filename": "CVE-2022-49977-8569b4ada1e0b9bfaa125bd0c0967918b6560fa2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49977/CVE-2022-49977-8569b4ada1e0b9bfaa125bd0c0967918b6560fa2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/934e49f7d696afdae9f979abe3f308408184e17b",
                "patch_url": "https://git.kernel.org/stable/p/934e49f7d696afdae9f979abe3f308408184e17b",
                "filename": "CVE-2022-49977-934e49f7d696afdae9f979abe3f308408184e17b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49977/CVE-2022-49977-934e49f7d696afdae9f979abe3f308408184e17b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c3b0f72e805f0801f05fa2aa52011c4bfc694c44",
                "patch_url": "https://git.kernel.org/stable/p/c3b0f72e805f0801f05fa2aa52011c4bfc694c44",
                "filename": "CVE-2022-49977-c3b0f72e805f0801f05fa2aa52011c4bfc694c44.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49977/CVE-2022-49977-c3b0f72e805f0801f05fa2aa52011c4bfc694c44.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d81bd6671f45fde4c3ac7fd7733c6e3082ae9d8e",
                "patch_url": "https://git.kernel.org/stable/p/d81bd6671f45fde4c3ac7fd7733c6e3082ae9d8e",
                "filename": "CVE-2022-49977-d81bd6671f45fde4c3ac7fd7733c6e3082ae9d8e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49977/CVE-2022-49977-d81bd6671f45fde4c3ac7fd7733c6e3082ae9d8e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dbd8c8fc60480e3faa3ae7e27ebe03371ecd1b77",
                "patch_url": "https://git.kernel.org/stable/p/dbd8c8fc60480e3faa3ae7e27ebe03371ecd1b77",
                "filename": "CVE-2022-49977-dbd8c8fc60480e3faa3ae7e27ebe03371ecd1b77.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49977/CVE-2022-49977-dbd8c8fc60480e3faa3ae7e27ebe03371ecd1b77.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ddffe882d74ef43a3494f0ab0c24baf076c45f96",
                "patch_url": "https://git.kernel.org/stable/p/ddffe882d74ef43a3494f0ab0c24baf076c45f96",
                "filename": "CVE-2022-49977-ddffe882d74ef43a3494f0ab0c24baf076c45f96.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49977/CVE-2022-49977-ddffe882d74ef43a3494f0ab0c24baf076c45f96.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e4ae97295984ff1b9b340ed18ae1b066f36b7835",
                "patch_url": "https://git.kernel.org/stable/p/e4ae97295984ff1b9b340ed18ae1b066f36b7835",
                "filename": "CVE-2022-49977-e4ae97295984ff1b9b340ed18ae1b066f36b7835.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49977/CVE-2022-49977-e4ae97295984ff1b9b340ed18ae1b066f36b7835.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4c34a2a6c9927c239dd2e295a03d49b37b618d2c",
            "https://git.kernel.org/stable/c/8569b4ada1e0b9bfaa125bd0c0967918b6560fa2",
            "https://git.kernel.org/stable/c/934e49f7d696afdae9f979abe3f308408184e17b",
            "https://git.kernel.org/stable/c/c3b0f72e805f0801f05fa2aa52011c4bfc694c44",
            "https://git.kernel.org/stable/c/d81bd6671f45fde4c3ac7fd7733c6e3082ae9d8e",
            "https://git.kernel.org/stable/c/dbd8c8fc60480e3faa3ae7e27ebe03371ecd1b77",
            "https://git.kernel.org/stable/c/ddffe882d74ef43a3494f0ab0c24baf076c45f96",
            "https://git.kernel.org/stable/c/e4ae97295984ff1b9b340ed18ae1b066f36b7835",
            "https://www.cve.org/CVERecord?id=CVE-2022-49977\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-49977\nhttps://lore.kernel.org/linux-cve-announce/2025061819-CVE-2022-49977-3826@gregkh/T"
        ]
    },
    "CVE-2022-49985": {
        "cve": "CVE-2022-49985",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Don't use tnum_range on array range checking for poke descriptors\n\nHsin-Wei reported a KASAN splat triggered by their BPF runtime fuzzer which\nis based on a customized syzkaller:\n\n  BUG: KASAN: slab-out-of-bounds in bpf_int_jit_compile+0x1257/0x13f0\n  Read of size 8 at addr ffff888004e90b58 by task syz-executor.0/1489\n  CPU: 1 PID: 1489 Comm: syz-executor.0 Not tainted 5.19.0 #1\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n  1.13.0-1ubuntu1.1 04/01/2014\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x9c/0xc9\n   print_address_description.constprop.0+0x1f/0x1f0\n   ? bpf_int_jit_compile+0x1257/0x13f0\n   kasan_report.cold+0xeb/0x197\n   ? kvmalloc_node+0x170/0x200\n   ? bpf_int_jit_compile+0x1257/0x13f0\n   bpf_int_jit_compile+0x1257/0x13f0\n   ? arch_prepare_bpf_dispatcher+0xd0/0xd0\n   ? rcu_read_lock_sched_held+0x43/0x70\n   bpf_prog_select_runtime+0x3e8/0x640\n   ? bpf_obj_name_cpy+0x149/0x1b0\n   bpf_prog_load+0x102f/0x2220\n   ? __bpf_prog_put.constprop.0+0x220/0x220\n   ? find_held_lock+0x2c/0x110\n   ? __might_fault+0xd6/0x180\n   ? lock_downgrade+0x6e0/0x6e0\n   ? lock_is_held_type+0xa6/0x120\n   ? __might_fault+0x147/0x180\n   __sys_bpf+0x137b/0x6070\n   ? bpf_perf_link_attach+0x530/0x530\n   ? new_sync_read+0x600/0x600\n   ? __fget_files+0x255/0x450\n   ? lock_downgrade+0x6e0/0x6e0\n   ? fput+0x30/0x1a0\n   ? ksys_write+0x1a8/0x260\n   __x64_sys_bpf+0x7a/0xc0\n   ? syscall_enter_from_user_mode+0x21/0x70\n   do_syscall_64+0x3b/0x90\n   entry_SYSCALL_64_after_hwframe+0x63/0xcd\n  RIP: 0033:0x7f917c4e2c2d\n\nThe problem here is that a range of tnum_range(0, map->max_entries - 1) has\nlimited ability to represent the concrete tight range with the tnum as the\nset of resulting states from value + mask can result in a superset of the\nactual intended range, and as such a tnum_in(range, reg->var_off) check may\nyield true when it shouldn't, for example tnum_range(0, 2) would result in\n00XX -> v = 0000, m = 0011 such that the intended set of {0, 1, 2} is here\nrepresented by a less precise superset of {0, 1, 2, 3}. As the register is\nknown const scalar, really just use the concrete reg->var_off.value for the\nupper index check.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-49985",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4f672112f8665102a5842c170be1713f8ff95919",
            "patch_url": "https://git.kernel.org/stable/p/4f672112f8665102a5842c170be1713f8ff95919",
            "filename": "CVE-2022-49985-4f672112f8665102a5842c170be1713f8ff95919.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49985/CVE-2022-49985-4f672112f8665102a5842c170be1713f8ff95919.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4f672112f8665102a5842c170be1713f8ff95919",
                "patch_url": "https://git.kernel.org/stable/p/4f672112f8665102a5842c170be1713f8ff95919",
                "filename": "CVE-2022-49985-4f672112f8665102a5842c170be1713f8ff95919.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49985/CVE-2022-49985-4f672112f8665102a5842c170be1713f8ff95919.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a36df92c7ff7ecde2fb362241d0ab024dddd0597",
                "patch_url": "https://git.kernel.org/stable/p/a36df92c7ff7ecde2fb362241d0ab024dddd0597",
                "filename": "CVE-2022-49985-a36df92c7ff7ecde2fb362241d0ab024dddd0597.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49985/CVE-2022-49985-a36df92c7ff7ecde2fb362241d0ab024dddd0597.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a657182a5c5150cdfacb6640aad1d2712571a409",
                "patch_url": "https://git.kernel.org/stable/p/a657182a5c5150cdfacb6640aad1d2712571a409",
                "filename": "CVE-2022-49985-a657182a5c5150cdfacb6640aad1d2712571a409.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49985/CVE-2022-49985-a657182a5c5150cdfacb6640aad1d2712571a409.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e8979807178434db8ceaa84dfcd44363e71e50bb",
                "patch_url": "https://git.kernel.org/stable/p/e8979807178434db8ceaa84dfcd44363e71e50bb",
                "filename": "CVE-2022-49985-e8979807178434db8ceaa84dfcd44363e71e50bb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49985/CVE-2022-49985-e8979807178434db8ceaa84dfcd44363e71e50bb.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4f672112f8665102a5842c170be1713f8ff95919",
            "https://git.kernel.org/stable/c/a36df92c7ff7ecde2fb362241d0ab024dddd0597",
            "https://git.kernel.org/stable/c/a657182a5c5150cdfacb6640aad1d2712571a409",
            "https://git.kernel.org/stable/c/e8979807178434db8ceaa84dfcd44363e71e50bb",
            "https://www.cve.org/CVERecord?id=CVE-2022-49985\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-49985\nhttps://lore.kernel.org/linux-cve-announce/2025061822-CVE-2022-49985-3e41@gregkh/T"
        ]
    },
    "CVE-2022-49995": {
        "cve": "CVE-2022-49995",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwriteback: avoid use-after-free after removing device\n\nWhen a disk is removed, bdi_unregister gets called to stop further\nwriteback and wait for associated delayed work to complete.  However,\nwb_inode_writeback_end() may schedule bandwidth estimation dwork after\nthis has completed, which can result in the timer attempting to access the\njust freed bdi_writeback.\n\nFix this by checking if the bdi_writeback is alive, similar to when\nscheduling writeback work.\n\nSince this requires wb->work_lock, and wb_inode_writeback_end() may get\ncalled from interrupt, switch wb->work_lock to an irqsafe lock.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-49995",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9a6c710f3bc10bc9cc23e1c080b53245b7f9d5b7",
            "patch_url": "https://git.kernel.org/stable/p/9a6c710f3bc10bc9cc23e1c080b53245b7f9d5b7",
            "filename": "CVE-2022-49995-9a6c710f3bc10bc9cc23e1c080b53245b7f9d5b7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49995/CVE-2022-49995-9a6c710f3bc10bc9cc23e1c080b53245b7f9d5b7.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/9a6c710f3bc10bc9cc23e1c080b53245b7f9d5b7",
                "patch_url": "https://git.kernel.org/stable/p/9a6c710f3bc10bc9cc23e1c080b53245b7f9d5b7",
                "filename": "CVE-2022-49995-9a6c710f3bc10bc9cc23e1c080b53245b7f9d5b7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49995/CVE-2022-49995-9a6c710f3bc10bc9cc23e1c080b53245b7f9d5b7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f87904c075515f3e1d8f4a7115869d3b914674fd",
                "patch_url": "https://git.kernel.org/stable/p/f87904c075515f3e1d8f4a7115869d3b914674fd",
                "filename": "CVE-2022-49995-f87904c075515f3e1d8f4a7115869d3b914674fd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49995/CVE-2022-49995-f87904c075515f3e1d8f4a7115869d3b914674fd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f96b9f7c1676923bce871e728bb49c0dfa5013cc",
                "patch_url": "https://git.kernel.org/stable/p/f96b9f7c1676923bce871e728bb49c0dfa5013cc",
                "filename": "CVE-2022-49995-f96b9f7c1676923bce871e728bb49c0dfa5013cc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-49995/CVE-2022-49995-f96b9f7c1676923bce871e728bb49c0dfa5013cc.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/9a6c710f3bc10bc9cc23e1c080b53245b7f9d5b7",
            "https://git.kernel.org/stable/c/f87904c075515f3e1d8f4a7115869d3b914674fd",
            "https://git.kernel.org/stable/c/f96b9f7c1676923bce871e728bb49c0dfa5013cc",
            "https://www.cve.org/CVERecord?id=CVE-2022-49995\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-49995\nhttps://lore.kernel.org/linux-cve-announce/2025061826-CVE-2022-49995-2d74@gregkh/T"
        ]
    },
    "CVE-2022-50020": {
        "cve": "CVE-2022-50020",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid resizing to a partial cluster size\n\nThis patch avoids an attempt to resize the filesystem to an\nunaligned cluster boundary.  An online resize to a size that is not\nintegral to cluster size results in the last iteration attempting to\ngrow the fs by a negative amount, which trips a BUG_ON and leaves the fs\nwith a corrupted in-memory superblock.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-50020",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/80288883294c5b4ed18bae0d8bd9c4a12f297074",
            "patch_url": "https://git.kernel.org/stable/p/80288883294c5b4ed18bae0d8bd9c4a12f297074",
            "filename": "CVE-2022-50020-80288883294c5b4ed18bae0d8bd9c4a12f297074.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50020/CVE-2022-50020-80288883294c5b4ed18bae0d8bd9c4a12f297074.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0082e99a9074ff88eff729c70c93454c8588d8e1",
                "patch_url": "https://git.kernel.org/stable/p/0082e99a9074ff88eff729c70c93454c8588d8e1",
                "filename": "CVE-2022-50020-0082e99a9074ff88eff729c70c93454c8588d8e1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50020/CVE-2022-50020-0082e99a9074ff88eff729c70c93454c8588d8e1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/53f62a4201be1cfc1e3c971e566888b182c3ffb0",
                "patch_url": "https://git.kernel.org/stable/p/53f62a4201be1cfc1e3c971e566888b182c3ffb0",
                "filename": "CVE-2022-50020-53f62a4201be1cfc1e3c971e566888b182c3ffb0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50020/CVE-2022-50020-53f62a4201be1cfc1e3c971e566888b182c3ffb0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/69cb8e9d8cd97cdf5e293b26d70a9dee3e35e6bd",
                "patch_url": "https://git.kernel.org/stable/p/69cb8e9d8cd97cdf5e293b26d70a9dee3e35e6bd",
                "filename": "CVE-2022-50020-69cb8e9d8cd97cdf5e293b26d70a9dee3e35e6bd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50020/CVE-2022-50020-69cb8e9d8cd97cdf5e293b26d70a9dee3e35e6bd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/72b850a2a996f72541172e7cf686d54a2b29bcd8",
                "patch_url": "https://git.kernel.org/stable/p/72b850a2a996f72541172e7cf686d54a2b29bcd8",
                "filename": "CVE-2022-50020-72b850a2a996f72541172e7cf686d54a2b29bcd8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50020/CVE-2022-50020-72b850a2a996f72541172e7cf686d54a2b29bcd8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7bdfb01fc5f6b3696728aeb527c50386e0ee09a1",
                "patch_url": "https://git.kernel.org/stable/p/7bdfb01fc5f6b3696728aeb527c50386e0ee09a1",
                "filename": "CVE-2022-50020-7bdfb01fc5f6b3696728aeb527c50386e0ee09a1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50020/CVE-2022-50020-7bdfb01fc5f6b3696728aeb527c50386e0ee09a1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/80288883294c5b4ed18bae0d8bd9c4a12f297074",
                "patch_url": "https://git.kernel.org/stable/p/80288883294c5b4ed18bae0d8bd9c4a12f297074",
                "filename": "CVE-2022-50020-80288883294c5b4ed18bae0d8bd9c4a12f297074.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50020/CVE-2022-50020-80288883294c5b4ed18bae0d8bd9c4a12f297074.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/952b3dc02baaae6a69c71c0aca23e06741182d9a",
                "patch_url": "https://git.kernel.org/stable/p/952b3dc02baaae6a69c71c0aca23e06741182d9a",
                "filename": "CVE-2022-50020-952b3dc02baaae6a69c71c0aca23e06741182d9a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50020/CVE-2022-50020-952b3dc02baaae6a69c71c0aca23e06741182d9a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a6805b3dcf5cd41f2ae3a03dca43411135b99849",
                "patch_url": "https://git.kernel.org/stable/p/a6805b3dcf5cd41f2ae3a03dca43411135b99849",
                "filename": "CVE-2022-50020-a6805b3dcf5cd41f2ae3a03dca43411135b99849.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50020/CVE-2022-50020-a6805b3dcf5cd41f2ae3a03dca43411135b99849.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0082e99a9074ff88eff729c70c93454c8588d8e1",
            "https://git.kernel.org/stable/c/53f62a4201be1cfc1e3c971e566888b182c3ffb0",
            "https://git.kernel.org/stable/c/69cb8e9d8cd97cdf5e293b26d70a9dee3e35e6bd",
            "https://git.kernel.org/stable/c/72b850a2a996f72541172e7cf686d54a2b29bcd8",
            "https://git.kernel.org/stable/c/7bdfb01fc5f6b3696728aeb527c50386e0ee09a1",
            "https://git.kernel.org/stable/c/80288883294c5b4ed18bae0d8bd9c4a12f297074",
            "https://git.kernel.org/stable/c/952b3dc02baaae6a69c71c0aca23e06741182d9a",
            "https://git.kernel.org/stable/c/a6805b3dcf5cd41f2ae3a03dca43411135b99849",
            "https://www.cve.org/CVERecord?id=CVE-2022-50020\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-50020\nhttps://lore.kernel.org/linux-cve-announce/2025061835-CVE-2022-50020-6f27@gregkh/T"
        ]
    },
    "CVE-2022-50083": {
        "cve": "CVE-2022-50083",
        "cvss_v2": null,
        "cvss_v3": null,
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-50083",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0e69cf833161b29b2e25dcbf2f2b4e70d75b15cf",
            "patch_url": "https://git.kernel.org/stable/p/0e69cf833161b29b2e25dcbf2f2b4e70d75b15cf",
            "filename": "CVE-2022-50083-0e69cf833161b29b2e25dcbf2f2b4e70d75b15cf.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50083/CVE-2022-50083-0e69cf833161b29b2e25dcbf2f2b4e70d75b15cf.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0e69cf833161b29b2e25dcbf2f2b4e70d75b15cf",
                "patch_url": "https://git.kernel.org/stable/p/0e69cf833161b29b2e25dcbf2f2b4e70d75b15cf",
                "filename": "CVE-2022-50083-0e69cf833161b29b2e25dcbf2f2b4e70d75b15cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50083/CVE-2022-50083-0e69cf833161b29b2e25dcbf2f2b4e70d75b15cf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/179b14152dcb6a24c3415200603aebca70ff13af",
                "patch_url": "https://git.kernel.org/stable/p/179b14152dcb6a24c3415200603aebca70ff13af",
                "filename": "CVE-2022-50083-179b14152dcb6a24c3415200603aebca70ff13af.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50083/CVE-2022-50083-179b14152dcb6a24c3415200603aebca70ff13af.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/214c68423fd632646c68f3ec8b3c2602cf8273f3",
                "patch_url": "https://git.kernel.org/stable/p/214c68423fd632646c68f3ec8b3c2602cf8273f3",
                "filename": "CVE-2022-50083-214c68423fd632646c68f3ec8b3c2602cf8273f3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50083/CVE-2022-50083-214c68423fd632646c68f3ec8b3c2602cf8273f3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2da44a2927a71bff2bc66cefa8cfbd2ace702536",
                "patch_url": "https://git.kernel.org/stable/p/2da44a2927a71bff2bc66cefa8cfbd2ace702536",
                "filename": "CVE-2022-50083-2da44a2927a71bff2bc66cefa8cfbd2ace702536.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50083/CVE-2022-50083-2da44a2927a71bff2bc66cefa8cfbd2ace702536.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/37d82aa78346866552d573e8badc0aa8db8f1eea",
                "patch_url": "https://git.kernel.org/stable/p/37d82aa78346866552d573e8badc0aa8db8f1eea",
                "filename": "CVE-2022-50083-37d82aa78346866552d573e8badc0aa8db8f1eea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50083/CVE-2022-50083-37d82aa78346866552d573e8badc0aa8db8f1eea.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4cdc284ffadd6a989f24107ee7f09be43b748fbb",
                "patch_url": "https://git.kernel.org/stable/p/4cdc284ffadd6a989f24107ee7f09be43b748fbb",
                "filename": "CVE-2022-50083-4cdc284ffadd6a989f24107ee7f09be43b748fbb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50083/CVE-2022-50083-4cdc284ffadd6a989f24107ee7f09be43b748fbb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/748d17d47687e178f8e38938447fa4636c071c41",
                "patch_url": "https://git.kernel.org/stable/p/748d17d47687e178f8e38938447fa4636c071c41",
                "filename": "CVE-2022-50083-748d17d47687e178f8e38938447fa4636c071c41.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50083/CVE-2022-50083-748d17d47687e178f8e38938447fa4636c071c41.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e6321fda51e5b4dd7ec295afb84cbf63c2634c7b",
                "patch_url": "https://git.kernel.org/stable/p/e6321fda51e5b4dd7ec295afb84cbf63c2634c7b",
                "filename": "CVE-2022-50083-e6321fda51e5b4dd7ec295afb84cbf63c2634c7b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50083/CVE-2022-50083-e6321fda51e5b4dd7ec295afb84cbf63c2634c7b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f217b1ccb178475192e6a516fab7230f51ddae94",
                "patch_url": "https://git.kernel.org/stable/p/f217b1ccb178475192e6a516fab7230f51ddae94",
                "filename": "CVE-2022-50083-f217b1ccb178475192e6a516fab7230f51ddae94.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50083/CVE-2022-50083-f217b1ccb178475192e6a516fab7230f51ddae94.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0e69cf833161b29b2e25dcbf2f2b4e70d75b15cf",
            "https://git.kernel.org/stable/c/179b14152dcb6a24c3415200603aebca70ff13af",
            "https://git.kernel.org/stable/c/214c68423fd632646c68f3ec8b3c2602cf8273f3",
            "https://git.kernel.org/stable/c/2da44a2927a71bff2bc66cefa8cfbd2ace702536",
            "https://git.kernel.org/stable/c/37d82aa78346866552d573e8badc0aa8db8f1eea",
            "https://git.kernel.org/stable/c/4cdc284ffadd6a989f24107ee7f09be43b748fbb",
            "https://git.kernel.org/stable/c/748d17d47687e178f8e38938447fa4636c071c41",
            "https://git.kernel.org/stable/c/e6321fda51e5b4dd7ec295afb84cbf63c2634c7b",
            "https://git.kernel.org/stable/c/f217b1ccb178475192e6a516fab7230f51ddae94"
        ]
    },
    "CVE-2022-50087": {
        "cve": "CVE-2022-50087",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails\n\nWhen scpi probe fails, at any point, we need to ensure that the scpi_info\nis not set and will remain NULL until the probe succeeds. If it is not\ntaken care, then it could result use-after-free as the value is exported\nvia get_scpi_ops() and could refer to a memory allocated via devm_kzalloc()\nbut freed when the probe fails.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-50087",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/5aa558232edc30468d1f35108826dd5b3ffe978f",
            "patch_url": "https://git.kernel.org/stable/p/5aa558232edc30468d1f35108826dd5b3ffe978f",
            "filename": "CVE-2022-50087-5aa558232edc30468d1f35108826dd5b3ffe978f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50087/CVE-2022-50087-5aa558232edc30468d1f35108826dd5b3ffe978f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/08272646cd7c310642c39b7f54348fddd7987643",
                "patch_url": "https://git.kernel.org/stable/p/08272646cd7c310642c39b7f54348fddd7987643",
                "filename": "CVE-2022-50087-08272646cd7c310642c39b7f54348fddd7987643.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50087/CVE-2022-50087-08272646cd7c310642c39b7f54348fddd7987643.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0c29e149b6bb498778ed8a1c9597b51acfba7856",
                "patch_url": "https://git.kernel.org/stable/p/0c29e149b6bb498778ed8a1c9597b51acfba7856",
                "filename": "CVE-2022-50087-0c29e149b6bb498778ed8a1c9597b51acfba7856.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50087/CVE-2022-50087-0c29e149b6bb498778ed8a1c9597b51acfba7856.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/18048cba444a7c41dbf42c180d6b46606fc24c51",
                "patch_url": "https://git.kernel.org/stable/p/18048cba444a7c41dbf42c180d6b46606fc24c51",
                "filename": "CVE-2022-50087-18048cba444a7c41dbf42c180d6b46606fc24c51.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50087/CVE-2022-50087-18048cba444a7c41dbf42c180d6b46606fc24c51.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f2d7b46d6b53c07f44a4f8f8f4438888f0e9e87",
                "patch_url": "https://git.kernel.org/stable/p/4f2d7b46d6b53c07f44a4f8f8f4438888f0e9e87",
                "filename": "CVE-2022-50087-4f2d7b46d6b53c07f44a4f8f8f4438888f0e9e87.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50087/CVE-2022-50087-4f2d7b46d6b53c07f44a4f8f8f4438888f0e9e87.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5aa558232edc30468d1f35108826dd5b3ffe978f",
                "patch_url": "https://git.kernel.org/stable/p/5aa558232edc30468d1f35108826dd5b3ffe978f",
                "filename": "CVE-2022-50087-5aa558232edc30468d1f35108826dd5b3ffe978f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50087/CVE-2022-50087-5aa558232edc30468d1f35108826dd5b3ffe978f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/689640efc0a2c4e07e6f88affe6d42cd40cc3f85",
                "patch_url": "https://git.kernel.org/stable/p/689640efc0a2c4e07e6f88affe6d42cd40cc3f85",
                "filename": "CVE-2022-50087-689640efc0a2c4e07e6f88affe6d42cd40cc3f85.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50087/CVE-2022-50087-689640efc0a2c4e07e6f88affe6d42cd40cc3f85.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/87c4896d5dd7fd9927c814cf3c6289f41de3b562",
                "patch_url": "https://git.kernel.org/stable/p/87c4896d5dd7fd9927c814cf3c6289f41de3b562",
                "filename": "CVE-2022-50087-87c4896d5dd7fd9927c814cf3c6289f41de3b562.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50087/CVE-2022-50087-87c4896d5dd7fd9927c814cf3c6289f41de3b562.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/08272646cd7c310642c39b7f54348fddd7987643",
            "https://git.kernel.org/stable/c/0c29e149b6bb498778ed8a1c9597b51acfba7856",
            "https://git.kernel.org/stable/c/18048cba444a7c41dbf42c180d6b46606fc24c51",
            "https://git.kernel.org/stable/c/4f2d7b46d6b53c07f44a4f8f8f4438888f0e9e87",
            "https://git.kernel.org/stable/c/5aa558232edc30468d1f35108826dd5b3ffe978f",
            "https://git.kernel.org/stable/c/689640efc0a2c4e07e6f88affe6d42cd40cc3f85",
            "https://git.kernel.org/stable/c/87c4896d5dd7fd9927c814cf3c6289f41de3b562",
            "https://www.cve.org/CVERecord?id=CVE-2022-50087\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-50087\nhttps://lore.kernel.org/linux-cve-announce/2025061859-CVE-2022-50087-53b1@gregkh/T"
        ]
    },
    "CVE-2022-50228": {
        "cve": "CVE-2022-50228",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0\n\nDon't BUG/WARN on interrupt injection due to GIF being cleared,\nsince it's trivial for userspace to force the situation via\nKVM_SET_VCPU_EVENTS (even if having at least a WARN there would be correct\nfor KVM internally generated injections).\n\n  kernel BUG at arch/x86/kvm/svm/svm.c:3386!\n  invalid opcode: 0000 [#1] SMP\n  CPU: 15 PID: 926 Comm: smm_test Not tainted 5.17.0-rc3+ #264\n  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n  RIP: 0010:svm_inject_irq+0xab/0xb0 [kvm_amd]\n  Code: <0f> 0b 0f 1f 00 0f 1f 44 00 00 80 3d ac b3 01 00 00 55 48 89 f5 53\n  RSP: 0018:ffffc90000b37d88 EFLAGS: 00010246\n  RAX: 0000000000000000 RBX: ffff88810a234ac0 RCX: 0000000000000006\n  RDX: 0000000000000000 RSI: ffffc90000b37df7 RDI: ffff88810a234ac0\n  RBP: ffffc90000b37df7 R08: ffff88810a1fa410 R09: 0000000000000000\n  R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000\n  R13: ffff888109571000 R14: ffff88810a234ac0 R15: 0000000000000000\n  FS:  0000000001821380(0000) GS:ffff88846fdc0000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f74fc550008 CR3: 000000010a6fe000 CR4: 0000000000350ea0\n  Call Trace:\n   <TASK>\n   inject_pending_event+0x2f7/0x4c0 [kvm]\n   kvm_arch_vcpu_ioctl_run+0x791/0x17a0 [kvm]\n   kvm_vcpu_ioctl+0x26d/0x650 [kvm]\n   __x64_sys_ioctl+0x82/0xb0\n   do_syscall_64+0x3b/0xc0\n   entry_SYSCALL_64_after_hwframe+0x44/0xae\n   </TASK>",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-50228",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2eee1dba70f57148fc7f8252613bfae6bd4b04e3",
            "patch_url": "https://git.kernel.org/stable/p/2eee1dba70f57148fc7f8252613bfae6bd4b04e3",
            "filename": "CVE-2022-50228-2eee1dba70f57148fc7f8252613bfae6bd4b04e3.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50228/CVE-2022-50228-2eee1dba70f57148fc7f8252613bfae6bd4b04e3.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2c49adeb020995236e63722ef6d0bee14372f471",
                "patch_url": "https://git.kernel.org/stable/p/2c49adeb020995236e63722ef6d0bee14372f471",
                "filename": "CVE-2022-50228-2c49adeb020995236e63722ef6d0bee14372f471.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50228/CVE-2022-50228-2c49adeb020995236e63722ef6d0bee14372f471.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2eee1dba70f57148fc7f8252613bfae6bd4b04e3",
                "patch_url": "https://git.kernel.org/stable/p/2eee1dba70f57148fc7f8252613bfae6bd4b04e3",
                "filename": "CVE-2022-50228-2eee1dba70f57148fc7f8252613bfae6bd4b04e3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50228/CVE-2022-50228-2eee1dba70f57148fc7f8252613bfae6bd4b04e3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3d4e2d884da6312df7c9b85fbf671de49204ead6",
                "patch_url": "https://git.kernel.org/stable/p/3d4e2d884da6312df7c9b85fbf671de49204ead6",
                "filename": "CVE-2022-50228-3d4e2d884da6312df7c9b85fbf671de49204ead6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50228/CVE-2022-50228-3d4e2d884da6312df7c9b85fbf671de49204ead6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/68e1313bb8809e8addcd9431f2bfea0e8ddbca80",
                "patch_url": "https://git.kernel.org/stable/p/68e1313bb8809e8addcd9431f2bfea0e8ddbca80",
                "filename": "CVE-2022-50228-68e1313bb8809e8addcd9431f2bfea0e8ddbca80.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50228/CVE-2022-50228-68e1313bb8809e8addcd9431f2bfea0e8ddbca80.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6afe88fbb40eac3291a8728688d61fdc745d8008",
                "patch_url": "https://git.kernel.org/stable/p/6afe88fbb40eac3291a8728688d61fdc745d8008",
                "filename": "CVE-2022-50228-6afe88fbb40eac3291a8728688d61fdc745d8008.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50228/CVE-2022-50228-6afe88fbb40eac3291a8728688d61fdc745d8008.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6fcbab82ccbcde915644085f73d3487938bda42d",
                "patch_url": "https://git.kernel.org/stable/p/6fcbab82ccbcde915644085f73d3487938bda42d",
                "filename": "CVE-2022-50228-6fcbab82ccbcde915644085f73d3487938bda42d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50228/CVE-2022-50228-6fcbab82ccbcde915644085f73d3487938bda42d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8bb683490278005b4caf61e22b0828a04d282e86",
                "patch_url": "https://git.kernel.org/stable/p/8bb683490278005b4caf61e22b0828a04d282e86",
                "filename": "CVE-2022-50228-8bb683490278005b4caf61e22b0828a04d282e86.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50228/CVE-2022-50228-8bb683490278005b4caf61e22b0828a04d282e86.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c3396c1c8b87510f2ac2a674948156577559d42d",
                "patch_url": "https://git.kernel.org/stable/p/c3396c1c8b87510f2ac2a674948156577559d42d",
                "filename": "CVE-2022-50228-c3396c1c8b87510f2ac2a674948156577559d42d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50228/CVE-2022-50228-c3396c1c8b87510f2ac2a674948156577559d42d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f17c31c48e5cde9895a491d91c424eeeada3e134",
                "patch_url": "https://git.kernel.org/stable/p/f17c31c48e5cde9895a491d91c424eeeada3e134",
                "filename": "CVE-2022-50228-f17c31c48e5cde9895a491d91c424eeeada3e134.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50228/CVE-2022-50228-f17c31c48e5cde9895a491d91c424eeeada3e134.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2c49adeb020995236e63722ef6d0bee14372f471",
            "https://git.kernel.org/stable/c/2eee1dba70f57148fc7f8252613bfae6bd4b04e3",
            "https://git.kernel.org/stable/c/3d4e2d884da6312df7c9b85fbf671de49204ead6",
            "https://git.kernel.org/stable/c/68e1313bb8809e8addcd9431f2bfea0e8ddbca80",
            "https://git.kernel.org/stable/c/6afe88fbb40eac3291a8728688d61fdc745d8008",
            "https://git.kernel.org/stable/c/6fcbab82ccbcde915644085f73d3487938bda42d",
            "https://git.kernel.org/stable/c/8bb683490278005b4caf61e22b0828a04d282e86",
            "https://git.kernel.org/stable/c/c3396c1c8b87510f2ac2a674948156577559d42d",
            "https://git.kernel.org/stable/c/f17c31c48e5cde9895a491d91c424eeeada3e134",
            "https://www.cve.org/CVERecord?id=CVE-2022-50228\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-50228\nhttps://lore.kernel.org/linux-cve-announce/2025061849-CVE-2022-50228-3904@gregkh/T"
        ]
    },
    "CVE-2022-50367": {
        "cve": "CVE-2022-50367",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: fix UAF/GPF bug in nilfs_mdt_destroy\n\nIn alloc_inode, inode_init_always() could return -ENOMEM if\nsecurity_inode_alloc() fails, which causes inode->i_private\nuninitialized. Then nilfs_is_metadata_file_inode() returns\ntrue and nilfs_free_inode() wrongly calls nilfs_mdt_destroy(),\nwhich frees the uninitialized inode->i_private\nand leads to crashes(e.g., UAF/GPF).\n\nFix this by moving security_inode_alloc just prior to\nthis_cpu_inc(nr_inodes)",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-50367",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1e555c3ed1fce4b278aaebe18a64a934cece57d8",
            "patch_url": "https://git.kernel.org/stable/p/1e555c3ed1fce4b278aaebe18a64a934cece57d8",
            "filename": "CVE-2022-50367-1e555c3ed1fce4b278aaebe18a64a934cece57d8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50367/CVE-2022-50367-1e555c3ed1fce4b278aaebe18a64a934cece57d8.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1e555c3ed1fce4b278aaebe18a64a934cece57d8",
                "patch_url": "https://git.kernel.org/stable/p/1e555c3ed1fce4b278aaebe18a64a934cece57d8",
                "filename": "CVE-2022-50367-1e555c3ed1fce4b278aaebe18a64a934cece57d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50367/CVE-2022-50367-1e555c3ed1fce4b278aaebe18a64a934cece57d8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2a96b532098284ecf8e4849b8b9e5fc7a28bdee9",
                "patch_url": "https://git.kernel.org/stable/p/2a96b532098284ecf8e4849b8b9e5fc7a28bdee9",
                "filename": "CVE-2022-50367-2a96b532098284ecf8e4849b8b9e5fc7a28bdee9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50367/CVE-2022-50367-2a96b532098284ecf8e4849b8b9e5fc7a28bdee9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2e488f13755ffbb60f307e991b27024716a33b29",
                "patch_url": "https://git.kernel.org/stable/p/2e488f13755ffbb60f307e991b27024716a33b29",
                "filename": "CVE-2022-50367-2e488f13755ffbb60f307e991b27024716a33b29.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50367/CVE-2022-50367-2e488f13755ffbb60f307e991b27024716a33b29.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/64b79e632869ad3ef6c098a4731d559381da1115",
                "patch_url": "https://git.kernel.org/stable/p/64b79e632869ad3ef6c098a4731d559381da1115",
                "filename": "CVE-2022-50367-64b79e632869ad3ef6c098a4731d559381da1115.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50367/CVE-2022-50367-64b79e632869ad3ef6c098a4731d559381da1115.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/70e4f70d54e0225f91814e8610477d65f33cefe4",
                "patch_url": "https://git.kernel.org/stable/p/70e4f70d54e0225f91814e8610477d65f33cefe4",
                "filename": "CVE-2022-50367-70e4f70d54e0225f91814e8610477d65f33cefe4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50367/CVE-2022-50367-70e4f70d54e0225f91814e8610477d65f33cefe4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/81de80330fa6907aec32eb54c5619059e6e36452",
                "patch_url": "https://git.kernel.org/stable/p/81de80330fa6907aec32eb54c5619059e6e36452",
                "filename": "CVE-2022-50367-81de80330fa6907aec32eb54c5619059e6e36452.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50367/CVE-2022-50367-81de80330fa6907aec32eb54c5619059e6e36452.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c0aa76b0f17f59dd9c9d3463550a2986a1d592e4",
                "patch_url": "https://git.kernel.org/stable/p/c0aa76b0f17f59dd9c9d3463550a2986a1d592e4",
                "filename": "CVE-2022-50367-c0aa76b0f17f59dd9c9d3463550a2986a1d592e4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50367/CVE-2022-50367-c0aa76b0f17f59dd9c9d3463550a2986a1d592e4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d1ff475d7c83289d0a7faef346ea3bbf90818bad",
                "patch_url": "https://git.kernel.org/stable/p/d1ff475d7c83289d0a7faef346ea3bbf90818bad",
                "filename": "CVE-2022-50367-d1ff475d7c83289d0a7faef346ea3bbf90818bad.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50367/CVE-2022-50367-d1ff475d7c83289d0a7faef346ea3bbf90818bad.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48",
                "patch_url": "https://git.kernel.org/stable/p/ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48",
                "filename": "CVE-2022-50367-ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50367/CVE-2022-50367-ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1e555c3ed1fce4b278aaebe18a64a934cece57d8",
            "https://git.kernel.org/stable/c/2a96b532098284ecf8e4849b8b9e5fc7a28bdee9",
            "https://git.kernel.org/stable/c/2e488f13755ffbb60f307e991b27024716a33b29",
            "https://git.kernel.org/stable/c/64b79e632869ad3ef6c098a4731d559381da1115",
            "https://git.kernel.org/stable/c/70e4f70d54e0225f91814e8610477d65f33cefe4",
            "https://git.kernel.org/stable/c/81de80330fa6907aec32eb54c5619059e6e36452",
            "https://git.kernel.org/stable/c/c0aa76b0f17f59dd9c9d3463550a2986a1d592e4",
            "https://git.kernel.org/stable/c/d1ff475d7c83289d0a7faef346ea3bbf90818bad",
            "https://git.kernel.org/stable/c/ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48",
            "https://www.cve.org/CVERecord?id=CVE-2022-50367\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-50367\nhttps://lore.kernel.org/linux-cve-announce/2025091716-CVE-2022-50367-651c@gregkh/T"
        ]
    },
    "CVE-2022-50386": {
        "cve": "CVE-2022-50386",
        "cvss_v2": null,
        "cvss_v3": 8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix user-after-free\n\nThis uses l2cap_chan_hold_unless_zero() after calling\n__l2cap_get_chan_blah() to prevent the following trace:\n\nBluetooth: l2cap_core.c:static void l2cap_chan_destroy(struct kref\n*kref)\nBluetooth: chan 0000000023c4974d\nBluetooth: parent 00000000ae861c08\n==================================================================\nBUG: KASAN: use-after-free in __mutex_waiter_is_first\nkernel/locking/mutex.c:191 [inline]\nBUG: KASAN: use-after-free in __mutex_lock_common\nkernel/locking/mutex.c:671 [inline]\nBUG: KASAN: use-after-free in __mutex_lock+0x278/0x400\nkernel/locking/mutex.c:729\nRead of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-50386",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0c108cf3ad386e0084277093b55a351c49e0be27",
            "patch_url": "https://git.kernel.org/stable/p/0c108cf3ad386e0084277093b55a351c49e0be27",
            "filename": "CVE-2022-50386-0c108cf3ad386e0084277093b55a351c49e0be27.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50386/CVE-2022-50386-0c108cf3ad386e0084277093b55a351c49e0be27.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0c108cf3ad386e0084277093b55a351c49e0be27",
                "patch_url": "https://git.kernel.org/stable/p/0c108cf3ad386e0084277093b55a351c49e0be27",
                "filename": "CVE-2022-50386-0c108cf3ad386e0084277093b55a351c49e0be27.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50386/CVE-2022-50386-0c108cf3ad386e0084277093b55a351c49e0be27.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/11e40d6c0823f699d8ad501e48d1c3ae4be386cd",
                "patch_url": "https://git.kernel.org/stable/p/11e40d6c0823f699d8ad501e48d1c3ae4be386cd",
                "filename": "CVE-2022-50386-11e40d6c0823f699d8ad501e48d1c3ae4be386cd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50386/CVE-2022-50386-11e40d6c0823f699d8ad501e48d1c3ae4be386cd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/15fc21695eb606bdc5d483b92118ee42610a952d",
                "patch_url": "https://git.kernel.org/stable/p/15fc21695eb606bdc5d483b92118ee42610a952d",
                "filename": "CVE-2022-50386-15fc21695eb606bdc5d483b92118ee42610a952d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50386/CVE-2022-50386-15fc21695eb606bdc5d483b92118ee42610a952d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/35fcbc4243aad7e7d020b7c1dfb14bb888b20a4f",
                "patch_url": "https://git.kernel.org/stable/p/35fcbc4243aad7e7d020b7c1dfb14bb888b20a4f",
                "filename": "CVE-2022-50386-35fcbc4243aad7e7d020b7c1dfb14bb888b20a4f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50386/CVE-2022-50386-35fcbc4243aad7e7d020b7c1dfb14bb888b20a4f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6ffde6e03085874ae22263ff4cef4869f797e84f",
                "patch_url": "https://git.kernel.org/stable/p/6ffde6e03085874ae22263ff4cef4869f797e84f",
                "filename": "CVE-2022-50386-6ffde6e03085874ae22263ff4cef4869f797e84f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50386/CVE-2022-50386-6ffde6e03085874ae22263ff4cef4869f797e84f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7d6f9cb24d2b2f6b6370eac074e2e6b1bafdad45",
                "patch_url": "https://git.kernel.org/stable/p/7d6f9cb24d2b2f6b6370eac074e2e6b1bafdad45",
                "filename": "CVE-2022-50386-7d6f9cb24d2b2f6b6370eac074e2e6b1bafdad45.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50386/CVE-2022-50386-7d6f9cb24d2b2f6b6370eac074e2e6b1bafdad45.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/843fc4e386dd84b806a7f07fb062d8c3a44e5364",
                "patch_url": "https://git.kernel.org/stable/p/843fc4e386dd84b806a7f07fb062d8c3a44e5364",
                "filename": "CVE-2022-50386-843fc4e386dd84b806a7f07fb062d8c3a44e5364.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50386/CVE-2022-50386-843fc4e386dd84b806a7f07fb062d8c3a44e5364.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d1e894f950ad48897d1a7cb05909ea29d8c3810e",
                "patch_url": "https://git.kernel.org/stable/p/d1e894f950ad48897d1a7cb05909ea29d8c3810e",
                "filename": "CVE-2022-50386-d1e894f950ad48897d1a7cb05909ea29d8c3810e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50386/CVE-2022-50386-d1e894f950ad48897d1a7cb05909ea29d8c3810e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d91fc2836562f299f34e361e089e9fe154da4f73",
                "patch_url": "https://git.kernel.org/stable/p/d91fc2836562f299f34e361e089e9fe154da4f73",
                "filename": "CVE-2022-50386-d91fc2836562f299f34e361e089e9fe154da4f73.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50386/CVE-2022-50386-d91fc2836562f299f34e361e089e9fe154da4f73.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0c108cf3ad386e0084277093b55a351c49e0be27",
            "https://git.kernel.org/stable/c/11e40d6c0823f699d8ad501e48d1c3ae4be386cd",
            "https://git.kernel.org/stable/c/15fc21695eb606bdc5d483b92118ee42610a952d",
            "https://git.kernel.org/stable/c/35fcbc4243aad7e7d020b7c1dfb14bb888b20a4f",
            "https://git.kernel.org/stable/c/6ffde6e03085874ae22263ff4cef4869f797e84f",
            "https://git.kernel.org/stable/c/7d6f9cb24d2b2f6b6370eac074e2e6b1bafdad45",
            "https://git.kernel.org/stable/c/843fc4e386dd84b806a7f07fb062d8c3a44e5364",
            "https://git.kernel.org/stable/c/d1e894f950ad48897d1a7cb05909ea29d8c3810e",
            "https://git.kernel.org/stable/c/d91fc2836562f299f34e361e089e9fe154da4f73",
            "https://www.cve.org/CVERecord?id=CVE-2022-50386\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-50386\nhttps://lore.kernel.org/linux-cve-announce/2025091852-CVE-2022-50386-07d7@gregkh/T"
        ]
    },
    "CVE-2022-50543": {
        "cve": "CVE-2022-50543",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix mr->map double free\n\nrxe_mr_cleanup() which tries to free mr->map again will be called when\nrxe_mr_init_user() fails:\n\n   CPU: 0 PID: 4917 Comm: rdma_flush_serv Kdump: loaded Not tainted 6.1.0-rc1-roce-flush+ #25\n   Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n   Call Trace:\n    <TASK>\n    dump_stack_lvl+0x45/0x5d\n    panic+0x19e/0x349\n    end_report.part.0+0x54/0x7c\n    kasan_report.cold+0xa/0xf\n    rxe_mr_cleanup+0x9d/0xf0 [rdma_rxe]\n    __rxe_cleanup+0x10a/0x1e0 [rdma_rxe]\n    rxe_reg_user_mr+0xb7/0xd0 [rdma_rxe]\n    ib_uverbs_reg_mr+0x26a/0x480 [ib_uverbs]\n    ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x1a2/0x250 [ib_uverbs]\n    ib_uverbs_cmd_verbs+0x1397/0x15a0 [ib_uverbs]\n\nThis issue was firstly exposed since commit b18c7da63fcb (\"RDMA/rxe: Fix\nmemory leak in error path code\") and then we fixed it in commit\n8ff5f5d9d8cf (\"RDMA/rxe: Prevent double freeing rxe_map_set()\") but this\nfix was reverted together at last by commit 1e75550648da (Revert\n\"RDMA/rxe: Create duplicate mapping tables for FMRs\")\n\nSimply let rxe_mr_cleanup() always handle freeing the mr->map once it is\nsuccessfully allocated.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-50543",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6ce577f09013206e36e674cd27da3707b2278268",
            "patch_url": "https://git.kernel.org/stable/p/6ce577f09013206e36e674cd27da3707b2278268",
            "filename": "CVE-2022-50543-6ce577f09013206e36e674cd27da3707b2278268.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50543/CVE-2022-50543-6ce577f09013206e36e674cd27da3707b2278268.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/06f73568f553b5be6ba7f6fe274d333ea29fc46d",
                "patch_url": "https://git.kernel.org/stable/p/06f73568f553b5be6ba7f6fe274d333ea29fc46d",
                "filename": "CVE-2022-50543-06f73568f553b5be6ba7f6fe274d333ea29fc46d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50543/CVE-2022-50543-06f73568f553b5be6ba7f6fe274d333ea29fc46d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6ce577f09013206e36e674cd27da3707b2278268",
                "patch_url": "https://git.kernel.org/stable/p/6ce577f09013206e36e674cd27da3707b2278268",
                "filename": "CVE-2022-50543-6ce577f09013206e36e674cd27da3707b2278268.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50543/CVE-2022-50543-6ce577f09013206e36e674cd27da3707b2278268.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7d984dac8f6bf4ebd3398af82b357e1d181ecaac",
                "patch_url": "https://git.kernel.org/stable/p/7d984dac8f6bf4ebd3398af82b357e1d181ecaac",
                "filename": "CVE-2022-50543-7d984dac8f6bf4ebd3398af82b357e1d181ecaac.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50543/CVE-2022-50543-7d984dac8f6bf4ebd3398af82b357e1d181ecaac.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/06f73568f553b5be6ba7f6fe274d333ea29fc46d",
            "https://git.kernel.org/stable/c/6ce577f09013206e36e674cd27da3707b2278268",
            "https://git.kernel.org/stable/c/7d984dac8f6bf4ebd3398af82b357e1d181ecaac",
            "https://www.cve.org/CVERecord?id=CVE-2022-50543\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-50543\nhttps://lore.kernel.org/linux-cve-announce/2025100756-CVE-2022-50543-597d@gregkh/T"
        ]
    },
    "CVE-2022-50673": {
        "cve": "CVE-2022-50673",
        "cvss_v2": null,
        "cvss_v3": "7.0",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix use-after-free in ext4_orphan_cleanup\n\nI caught a issue as follows:\n==================================================================\n BUG: KASAN: use-after-free in __list_add_valid+0x28/0x1a0\n Read of size 8 at addr ffff88814b13f378 by task mount/710\n\n CPU: 1 PID: 710 Comm: mount Not tainted 6.1.0-rc3-next #370\n Call Trace:\n  <TASK>\n  dump_stack_lvl+0x73/0x9f\n  print_report+0x25d/0x759\n  kasan_report+0xc0/0x120\n  __asan_load8+0x99/0x140\n  __list_add_valid+0x28/0x1a0\n  ext4_orphan_cleanup+0x564/0x9d0 [ext4]\n  __ext4_fill_super+0x48e2/0x5300 [ext4]\n  ext4_fill_super+0x19f/0x3a0 [ext4]\n  get_tree_bdev+0x27b/0x450\n  ext4_get_tree+0x19/0x30 [ext4]\n  vfs_get_tree+0x49/0x150\n  path_mount+0xaae/0x1350\n  do_mount+0xe2/0x110\n  __x64_sys_mount+0xf0/0x190\n  do_syscall_64+0x35/0x80\n  entry_SYSCALL_64_after_hwframe+0x63/0xcd\n  </TASK>\n [...]\n==================================================================\n\nAbove issue may happen as follows:\n-------------------------------------\next4_fill_super\n  ext4_orphan_cleanup\n   --- loop1: assume last_orphan is 12 ---\n    list_add(&EXT4_I(inode)->i_orphan, &EXT4_SB(sb)->s_orphan)\n    ext4_truncate --> return 0\n      ext4_inode_attach_jinode --> return -ENOMEM\n    iput(inode) --> free inode<12>\n   --- loop2: last_orphan is still 12 ---\n    list_add(&EXT4_I(inode)->i_orphan, &EXT4_SB(sb)->s_orphan);\n    // use inode<12> and trigger UAF\n\nTo solve this issue, we need to propagate the return value of\next4_inode_attach_jinode() appropriately.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-50673",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/026a4490b5381229a30f23d073b58e8e35ee6858",
            "patch_url": "https://git.kernel.org/stable/p/026a4490b5381229a30f23d073b58e8e35ee6858",
            "filename": "CVE-2022-50673-026a4490b5381229a30f23d073b58e8e35ee6858.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50673/CVE-2022-50673-026a4490b5381229a30f23d073b58e8e35ee6858.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/026a4490b5381229a30f23d073b58e8e35ee6858",
                "patch_url": "https://git.kernel.org/stable/p/026a4490b5381229a30f23d073b58e8e35ee6858",
                "filename": "CVE-2022-50673-026a4490b5381229a30f23d073b58e8e35ee6858.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50673/CVE-2022-50673-026a4490b5381229a30f23d073b58e8e35ee6858.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7223d5e75f26352354ea2c0ccf8b579821b52adf",
                "patch_url": "https://git.kernel.org/stable/p/7223d5e75f26352354ea2c0ccf8b579821b52adf",
                "filename": "CVE-2022-50673-7223d5e75f26352354ea2c0ccf8b579821b52adf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50673/CVE-2022-50673-7223d5e75f26352354ea2c0ccf8b579821b52adf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7908b8a541b1578cc61b4da7f19b604a931441da",
                "patch_url": "https://git.kernel.org/stable/p/7908b8a541b1578cc61b4da7f19b604a931441da",
                "filename": "CVE-2022-50673-7908b8a541b1578cc61b4da7f19b604a931441da.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50673/CVE-2022-50673-7908b8a541b1578cc61b4da7f19b604a931441da.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7f801a1593cb957f73659732836b2dafbdfc7709",
                "patch_url": "https://git.kernel.org/stable/p/7f801a1593cb957f73659732836b2dafbdfc7709",
                "filename": "CVE-2022-50673-7f801a1593cb957f73659732836b2dafbdfc7709.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50673/CVE-2022-50673-7f801a1593cb957f73659732836b2dafbdfc7709.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a71248b1accb2b42e4980afef4fa4a27fa0e36f5",
                "patch_url": "https://git.kernel.org/stable/p/a71248b1accb2b42e4980afef4fa4a27fa0e36f5",
                "filename": "CVE-2022-50673-a71248b1accb2b42e4980afef4fa4a27fa0e36f5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50673/CVE-2022-50673-a71248b1accb2b42e4980afef4fa4a27fa0e36f5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c2bdbd4c69308835d1b6f6ba74feeccbfe113478",
                "patch_url": "https://git.kernel.org/stable/p/c2bdbd4c69308835d1b6f6ba74feeccbfe113478",
                "filename": "CVE-2022-50673-c2bdbd4c69308835d1b6f6ba74feeccbfe113478.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50673/CVE-2022-50673-c2bdbd4c69308835d1b6f6ba74feeccbfe113478.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf0e0817b0f925b70d101d7014ea81b7094e1159",
                "patch_url": "https://git.kernel.org/stable/p/cf0e0817b0f925b70d101d7014ea81b7094e1159",
                "filename": "CVE-2022-50673-cf0e0817b0f925b70d101d7014ea81b7094e1159.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50673/CVE-2022-50673-cf0e0817b0f925b70d101d7014ea81b7094e1159.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/026a4490b5381229a30f23d073b58e8e35ee6858",
            "https://git.kernel.org/stable/c/7223d5e75f26352354ea2c0ccf8b579821b52adf",
            "https://git.kernel.org/stable/c/7908b8a541b1578cc61b4da7f19b604a931441da",
            "https://git.kernel.org/stable/c/7f801a1593cb957f73659732836b2dafbdfc7709",
            "https://git.kernel.org/stable/c/a71248b1accb2b42e4980afef4fa4a27fa0e36f5",
            "https://git.kernel.org/stable/c/c2bdbd4c69308835d1b6f6ba74feeccbfe113478",
            "https://git.kernel.org/stable/c/cf0e0817b0f925b70d101d7014ea81b7094e1159",
            "https://www.cve.org/CVERecord?id=CVE-2022-50673\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-50673\nhttps://lore.kernel.org/linux-cve-announce/2025120947-CVE-2022-50673-f920@gregkh/T"
        ]
    },
    "CVE-2022-50865": {
        "cve": "CVE-2022-50865",
        "cvss_v2": null,
        "cvss_v3": "7.5",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix a signed-integer-overflow bug in tcp_add_backlog()\n\nThe type of sk_rcvbuf and sk_sndbuf in struct sock is int, and\nin tcp_add_backlog(), the variable limit is caculated by adding\nsk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value\nof int and overflow. This patch reduces the limit budget by\nhalving the sndbuf to solve this issue since ACK packets are much\nsmaller than the payload.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2022-50865",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/28addf029417d53b1df062b4c87feb7bc033cb5f",
            "patch_url": "https://git.kernel.org/stable/p/28addf029417d53b1df062b4c87feb7bc033cb5f",
            "filename": "CVE-2022-50865-28addf029417d53b1df062b4c87feb7bc033cb5f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50865/CVE-2022-50865-28addf029417d53b1df062b4c87feb7bc033cb5f.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/28addf029417d53b1df062b4c87feb7bc033cb5f",
                "patch_url": "https://git.kernel.org/stable/p/28addf029417d53b1df062b4c87feb7bc033cb5f",
                "filename": "CVE-2022-50865-28addf029417d53b1df062b4c87feb7bc033cb5f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50865/CVE-2022-50865-28addf029417d53b1df062b4c87feb7bc033cb5f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f23cb2be530785db284a685d1b1c30224d8a538",
                "patch_url": "https://git.kernel.org/stable/p/4f23cb2be530785db284a685d1b1c30224d8a538",
                "filename": "CVE-2022-50865-4f23cb2be530785db284a685d1b1c30224d8a538.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50865/CVE-2022-50865-4f23cb2be530785db284a685d1b1c30224d8a538.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9d04b4d0feee12bce6bfe37f30d8e953d3c30368",
                "patch_url": "https://git.kernel.org/stable/p/9d04b4d0feee12bce6bfe37f30d8e953d3c30368",
                "filename": "CVE-2022-50865-9d04b4d0feee12bce6bfe37f30d8e953d3c30368.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50865/CVE-2022-50865-9d04b4d0feee12bce6bfe37f30d8e953d3c30368.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a85d39f14aa8a71e29cfb5eb5de02878a8779898",
                "patch_url": "https://git.kernel.org/stable/p/a85d39f14aa8a71e29cfb5eb5de02878a8779898",
                "filename": "CVE-2022-50865-a85d39f14aa8a71e29cfb5eb5de02878a8779898.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50865/CVE-2022-50865-a85d39f14aa8a71e29cfb5eb5de02878a8779898.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ec791d8149ff60c40ad2074af3b92a39c916a03f",
                "patch_url": "https://git.kernel.org/stable/p/ec791d8149ff60c40ad2074af3b92a39c916a03f",
                "filename": "CVE-2022-50865-ec791d8149ff60c40ad2074af3b92a39c916a03f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2022-50865/CVE-2022-50865-ec791d8149ff60c40ad2074af3b92a39c916a03f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/28addf029417d53b1df062b4c87feb7bc033cb5f",
            "https://git.kernel.org/stable/c/4f23cb2be530785db284a685d1b1c30224d8a538",
            "https://git.kernel.org/stable/c/9d04b4d0feee12bce6bfe37f30d8e953d3c30368",
            "https://git.kernel.org/stable/c/a85d39f14aa8a71e29cfb5eb5de02878a8779898",
            "https://git.kernel.org/stable/c/ec791d8149ff60c40ad2074af3b92a39c916a03f",
            "https://www.cve.org/CVERecord?id=CVE-2022-50865\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-50865\nhttps://lore.kernel.org/linux-cve-announce/2025123049-CVE-2022-50865-281e@gregkh/T"
        ]
    },
    "CVE-2023-0458": {
        "cve": "CVE-2023-0458",
        "cvss_v2": null,
        "cvss_v3": 5.3,
        "description": "A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit\u00a0739790605705ddcf18f21782b9c99ad7d53a8c11",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-0458",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11",
            "patch_url": "https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11.patch",
            "filename": "CVE-2023-0458-739790605705ddcf18f21782b9c99ad7d53a8c11.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-0458/CVE-2023-0458-739790605705ddcf18f21782b9c99ad7d53a8c11.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11",
                "patch_url": "https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11.patch",
                "filename": "CVE-2023-0458-739790605705ddcf18f21782b9c99ad7d53a8c11.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-0458/CVE-2023-0458-739790605705ddcf18f21782b9c99ad7d53a8c11.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7",
            "https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11"
        ]
    },
    "CVE-2023-0590": {
        "cve": "CVE-2023-0590",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-0590",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://lore.kernel.org/all/",
            "https://lore.kernel.org/all/20221018203258.2793282-1-edumazet%40google.com/",
            "https://www.cve.org/CVERecord?id=CVE-2023-0590\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-0590\nhttps://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/"
        ]
    },
    "CVE-2023-0597": {
        "cve": "CVE-2023-0597",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-0597",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80",
            "https://www.cve.org/CVERecord?id=CVE-2023-0597\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-0597\nhttps://lore.kernel.org/lkml/Yz%2FmfJ1gjgshF19t@hirez.programming.kicks-ass.net/"
        ]
    },
    "CVE-2023-1073": {
        "cve": "CVE-2023-1073",
        "cvss_v2": null,
        "cvss_v3": 6.6,
        "description": "A memory corruption flaw was found in the Linux kernel\u2019s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1073",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/id=b12fece4c64857e5fab4290bf01b2e0317a88456",
            "https://www.cve.org/CVERecord?id=CVE-2023-1073\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-1073\nhttps://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=b12fece4c64857e5fab4290bf01b2e0317a88456\nhttps://www.openwall.com/lists/oss-security/2023/01/17/3"
        ]
    },
    "CVE-2023-1074": {
        "cve": "CVE-2023-1074",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1074",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/patch/?id=458e279f861d3f61796894cd158b780765a1569f",
            "filename": "CVE-2023-1074-458e279f861d3f61796894cd158b780765a1569f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1074/CVE-2023-1074-458e279f861d3f61796894cd158b780765a1569f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/patch/?id=458e279f861d3f61796894cd158b780765a1569f",
                "filename": "CVE-2023-1074-458e279f861d3f61796894cd158b780765a1569f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1074/CVE-2023-1074-458e279f861d3f61796894cd158b780765a1569f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f",
            "https://www.cve.org/CVERecord?id=CVE-2023-1074\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-1074\nhttps://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f\nhttps://www.openwall.com/lists/oss-security/2023/01/23/1"
        ]
    },
    "CVE-2023-1075": {
        "cve": "CVE-2023-1075",
        "cvss_v2": null,
        "cvss_v3": 3.3,
        "description": "A flaw was found in the Linux Kernel. The tls_is_tx_ready() incorrectly checks for list emptiness, potentially accessing a type confused entry to the list_head, leaking the last byte of the confused field that overlaps with rec->tx_ready.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1075",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/patch/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb",
            "filename": "CVE-2023-1075-ffe2a22562444720b05bdfeb999c03e810d84cbb.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1075/CVE-2023-1075-ffe2a22562444720b05bdfeb999c03e810d84cbb.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/patch/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb",
                "filename": "CVE-2023-1075-ffe2a22562444720b05bdfeb999c03e810d84cbb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1075/CVE-2023-1075-ffe2a22562444720b05bdfeb999c03e810d84cbb.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb"
        ]
    },
    "CVE-2023-1079": {
        "cve": "CVE-2023-1079",
        "cvss_v2": null,
        "cvss_v3": 6.8,
        "description": "A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1079",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/patch/?id=4ab3a086d10eeec1424f2e8a968827a6336203df",
            "filename": "CVE-2023-1079-4ab3a086d10eeec1424f2e8a968827a6336203df.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1079/CVE-2023-1079-4ab3a086d10eeec1424f2e8a968827a6336203df.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/patch/?id=4ab3a086d10eeec1424f2e8a968827a6336203df",
                "filename": "CVE-2023-1079-4ab3a086d10eeec1424f2e8a968827a6336203df.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1079/CVE-2023-1079-4ab3a086d10eeec1424f2e8a968827a6336203df.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df",
            "https://www.cve.org/CVERecord?id=CVE-2023-1079\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-1079\nhttps://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df"
        ]
    },
    "CVE-2023-1118": {
        "cve": "CVE-2023-1118",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1118",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17",
            "patch_url": "https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17.patch",
            "filename": "CVE-2023-1118-29b0589a865b6f66d141d79b2dd1373e4e50fe17.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1118/CVE-2023-1118-29b0589a865b6f66d141d79b2dd1373e4e50fe17.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17",
                "patch_url": "https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17.patch",
                "filename": "CVE-2023-1118-29b0589a865b6f66d141d79b2dd1373e4e50fe17.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1118/CVE-2023-1118-29b0589a865b6f66d141d79b2dd1373e4e50fe17.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17"
        ]
    },
    "CVE-2023-1192": {
        "cve": "CVE-2023-1192",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1192",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d527f51331cace562393a8038d870b3e9916686f",
            "filename": "CVE-2023-1192-d527f51331cace562393a8038d870b3e9916686f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1192/CVE-2023-1192-d527f51331cace562393a8038d870b3e9916686f.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d527f51331cace562393a8038d870b3e9916686f",
                "filename": "CVE-2023-1192-d527f51331cace562393a8038d870b3e9916686f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1192/CVE-2023-1192-d527f51331cace562393a8038d870b3e9916686f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=98bea253aa28ad8be2ce565a9ca21beb4a9419e5",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch?id=98bea253aa28ad8be2ce565a9ca21beb4a9419e5",
                "filename": "CVE-2023-1192-98bea253aa28ad8be2ce565a9ca21beb4a9419e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1192/CVE-2023-1192-98bea253aa28ad8be2ce565a9ca21beb4a9419e5.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=98bea253aa28ad8be2ce565a9ca21beb4a9419e5",
            "https://www.cve.org/CVERecord?id=CVE-2023-1192\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-1192\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686fCVE-2023-52"
        ]
    },
    "CVE-2023-1206": {
        "cve": "CVE-2023-1206",
        "cvss_v2": null,
        "cvss_v3": 5.7,
        "description": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1206",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://www.cve.org/CVERecord?id=CVE-2023-1206\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-1206\nhttps://git.kernel.org/linus/d11b0df7ddf1831f3e170972f43186dad520bfcc"
        ]
    },
    "CVE-2023-1252": {
        "cve": "CVE-2023-1252",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free flaw was found in the Linux kernel\u2019s Ext4 File System in how a user triggers several file operations simultaneously with the overlay FS usage. This flaw allows a local user to crash or potentially escalate their privileges on the system. Only if patch 9a2544037600 (\"ovl: fix use after free in struct ovl_aio_req\") not applied yet, the kernel could be affected.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1252",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://lore.kernel.org/lkml/",
            "https://lore.kernel.org/lkml/20211115165433.449951285%40linuxfoundation.org/",
            "https://www.cve.org/CVERecord?id=CVE-2023-1252\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-1252\nhttps://lore.kernel.org/lkml/20211115165433.449951285@linuxfoundation.org/"
        ]
    },
    "CVE-2023-1281": {
        "cve": "CVE-2023-1281",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation.\u00a0The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext.\u00a0A local attacker user can use this vulnerability to elevate its privileges to root.\nThis issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1281",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2",
            "filename": "CVE-2023-1281-ee059170b1f7e94e55fa6cadee544e176a6e59c2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1281/CVE-2023-1281-ee059170b1f7e94e55fa6cadee544e176a6e59c2.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2",
                "filename": "CVE-2023-1281-ee059170b1f7e94e55fa6cadee544e176a6e59c2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1281/CVE-2023-1281-ee059170b1f7e94e55fa6cadee544e176a6e59c2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2",
            "https://www.cve.org/CVERecord?id=CVE-2023-1281\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-1281\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2"
        ]
    },
    "CVE-2023-1382": {
        "cve": "CVE-2023-1382",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1382",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u",
            "https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u",
            "https://www.cve.org/CVERecord?id=CVE-2023-1382\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-1382\nhttps://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u"
        ]
    },
    "CVE-2023-1513": {
        "cve": "CVE-2023-1513",
        "cvss_v2": null,
        "cvss_v3": 3.3,
        "description": "A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1513",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952",
            "patch_url": "https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952.patch",
            "filename": "CVE-2023-1513-2c10b61421a28e95a46ab489fd56c0f442ff6952.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1513/CVE-2023-1513-2c10b61421a28e95a46ab489fd56c0f442ff6952.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952",
                "patch_url": "https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952.patch",
                "filename": "CVE-2023-1513-2c10b61421a28e95a46ab489fd56c0f442ff6952.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1513/CVE-2023-1513-2c10b61421a28e95a46ab489fd56c0f442ff6952.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952",
            "https://lore.kernel.org/kvm/",
            "https://lore.kernel.org/kvm/20230214103304.3689213-1-gregkh%40linuxfoundation.org/"
        ]
    },
    "CVE-2023-1667": {
        "cve": "CVE-2023-1667",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1667",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-1829": {
        "cve": "CVE-2023-1829",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation.\u00a0The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure.\u00a0A local attacker user can use this vulnerability to elevate its privileges to root.\nWe recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1829",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28",
            "filename": "CVE-2023-1829-8c710f75256bb3cf05ac7b1672c82b92c43f3d28.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1829/CVE-2023-1829-8c710f75256bb3cf05ac7b1672c82b92c43f3d28.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28",
                "filename": "CVE-2023-1829-8c710f75256bb3cf05ac7b1672c82b92c43f3d28.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1829/CVE-2023-1829-8c710f75256bb3cf05ac7b1672c82b92c43f3d28.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28",
            "https://www.cve.org/CVERecord?id=CVE-2023-1829\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-1829\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28"
        ]
    },
    "CVE-2023-1838": {
        "cve": "CVE-2023-1838",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1838",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://lore.kernel.org/netdev/",
            "https://lore.kernel.org/netdev/20220516084213.26854-1-jasowang%40redhat.com/T/",
            "https://www.cve.org/CVERecord?id=CVE-2023-1838\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-1838\nhttps://lore.kernel.org/netdev/20220516084213.26854-1-jasowang@redhat.com/T/"
        ]
    },
    "CVE-2023-1855": {
        "cve": "CVE-2023-1855",
        "cvss_v2": null,
        "cvss_v3": 6.3,
        "description": "A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1855",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1",
            "patch_url": "https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1.patch",
            "filename": "CVE-2023-1855-cb090e64cf25602b9adaf32d5dfc9c8bec493cd1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1855/CVE-2023-1855-cb090e64cf25602b9adaf32d5dfc9c8bec493cd1.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1",
                "patch_url": "https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1.patch",
                "filename": "CVE-2023-1855-cb090e64cf25602b9adaf32d5dfc9c8bec493cd1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1855/CVE-2023-1855-cb090e64cf25602b9adaf32d5dfc9c8bec493cd1.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1",
            "https://lore.kernel.org/all/",
            "https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/",
            "https://www.cve.org/CVERecord?id=CVE-2023-1855\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-1855\nhttps://lore.kernel.org/all/20230318122758.2140868-1-linux@roeck-us.net/"
        ]
    },
    "CVE-2023-1989": {
        "cve": "CVE-2023-1989",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1989",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/patch/?id=f132c2d13088",
            "filename": "CVE-2023-1989-f132c2d13088.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1989/CVE-2023-1989-f132c2d13088.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/patch/?id=f132c2d13088",
                "filename": "CVE-2023-1989-f132c2d13088.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1989/CVE-2023-1989-f132c2d13088.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088",
            "https://www.cve.org/CVERecord?id=CVE-2023-1989\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-1989\nhttps://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088"
        ]
    },
    "CVE-2023-1998": {
        "cve": "CVE-2023-1998",
        "cvss_v2": null,
        "cvss_v3": 5.6,
        "description": "The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-1998",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d",
            "patch_url": "https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d.patch",
            "filename": "CVE-2023-1998-6921ed9049bc7457f66c1596c5b78aec0dae4a9d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1998/CVE-2023-1998-6921ed9049bc7457f66c1596c5b78aec0dae4a9d.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d",
                "patch_url": "https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d.patch",
                "filename": "CVE-2023-1998-6921ed9049bc7457f66c1596c5b78aec0dae4a9d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-1998/CVE-2023-1998-6921ed9049bc7457f66c1596c5b78aec0dae4a9d.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d"
        ]
    },
    "CVE-2023-2002": {
        "cve": "CVE-2023-2002",
        "cvss_v2": null,
        "cvss_v3": 6.8,
        "description": "A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-2002",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-20569": {
        "cve": "CVE-2023-20569",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-20569",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-20584": {
        "cve": "CVE-2023-20584",
        "cvss_v2": null,
        "cvss_v3": 5.3,
        "description": "IOMMU improperly handles certain special address\nranges with invalid device table entries (DTEs), which may allow an attacker\nwith privileges and a compromised Hypervisor to\ninduce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a\nloss of guest integrity.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-20584",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-20592": {
        "cve": "CVE-2023-20592",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\n",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-20592",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-20593": {
        "cve": "CVE-2023-20593",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "An issue in \u201cZen 2\u201d CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-20593",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://www.cve.org/CVERecord?id=CVE-2023-20593\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-20593\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=522b1d69219d8f083173819fde04f994aa051a98\nhttps://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html"
        ]
    },
    "CVE-2023-2124": {
        "cve": "CVE-2023-2124",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "An out-of-bounds memory access flaw was found in the Linux kernel\u2019s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-2124",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210",
            "https://www.cve.org/CVERecord?id=CVE-2023-2124\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-2124\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210\nhttps://lore.kernel.org/linux-xfs/20230412214034.GL3223426@dread.disaster.area/T/#m1ebbcd1ad061d2d33bef6f0534a2b014744d152d"
        ]
    },
    "CVE-2023-2162": {
        "cve": "CVE-2023-2162",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-2162",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-2163": {
        "cve": "CVE-2023-2163",
        "cvss_v2": null,
        "cvss_v3": 10,
        "description": "Incorrect verifier pruning\u00a0in BPF in Linux Kernel\u00a0>=5.4\u00a0leads to unsafe\ncode paths being incorrectly marked as safe, resulting in\u00a0arbitrary read/write in\nkernel memory, lateral privilege escalation, and container escape.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-2163",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=71b547f561247897a0a14f3082730156c0533fed",
            "filename": "CVE-2023-2163-71b547f561247897a0a14f3082730156c0533fed.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-2163/CVE-2023-2163-71b547f561247897a0a14f3082730156c0533fed.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=71b547f561247897a0a14f3082730156c0533fed",
                "filename": "CVE-2023-2163-71b547f561247897a0a14f3082730156c0533fed.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-2163/CVE-2023-2163-71b547f561247897a0a14f3082730156c0533fed.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed",
            "https://www.cve.org/CVERecord?id=CVE-2023-2163\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-2163\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed"
        ]
    },
    "CVE-2023-2166": {
        "cve": "CVE-2023-2166",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-2166",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://lore.kernel.org/lkml/CAO4mrfcV_07hbj8NUuZrA8FH-kaRsrFy-2metecpTuE5kKHn5w%40mail.gmail.com/",
            "https://lore.kernel.org/lkml/CAO4mrfcV_07hbj8NUuZrA8FH-kaRsrFy-2metecpTuE5kKHn5w@mail.gmail.com/",
            "https://www.cve.org/CVERecord?id=CVE-2023-2166\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-2166\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0acc442309a0a1b01bcdaa135e56e6398a49439c"
        ]
    },
    "CVE-2023-2176": {
        "cve": "CVE-2023-2176",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-2176",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-2194": {
        "cve": "CVE-2023-2194",
        "cvss_v2": null,
        "cvss_v3": 6.7,
        "description": "An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace \"data->block[0]\" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-2194",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/92fbb6d1296f",
            "patch_url": "https://github.com/torvalds/linux/commit/92fbb6d1296f.patch",
            "filename": "CVE-2023-2194-92fbb6d1296f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-2194/CVE-2023-2194-92fbb6d1296f.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/92fbb6d1296f",
                "patch_url": "https://github.com/torvalds/linux/commit/92fbb6d1296f.patch",
                "filename": "CVE-2023-2194-92fbb6d1296f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-2194/CVE-2023-2194-92fbb6d1296f.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/92fbb6d1296f"
        ]
    },
    "CVE-2023-2235": {
        "cve": "CVE-2023-2235",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.\n\nThe perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but\u00a0remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.\n\n",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-2235",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fd0815f632c24878e325821943edccc7fde947a2",
            "filename": "CVE-2023-2235-fd0815f632c24878e325821943edccc7fde947a2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-2235/CVE-2023-2235-fd0815f632c24878e325821943edccc7fde947a2.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fd0815f632c24878e325821943edccc7fde947a2",
                "filename": "CVE-2023-2235-fd0815f632c24878e325821943edccc7fde947a2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-2235/CVE-2023-2235-fd0815f632c24878e325821943edccc7fde947a2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2",
            "https://www.cve.org/CVERecord?id=CVE-2023-2235\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-2235\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2"
        ]
    },
    "CVE-2023-22745": {
        "cve": "CVE-2023-22745",
        "cvss_v2": null,
        "cvss_v3": 6.4,
        "description": "tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In versions prior to 4.1.0-rc0, 4.0.1, and 3.2.2-rc1, `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege. Versions 4.1.0-rc0, 4.0.1, and 3.2.2-rc1 fix the issue.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-22745",
        "selected_patch": {
            "url": "https://github.com/tpm2-software/tpm2-tss/commit/306490c8d848c367faa2d9df81f5e69dab46ffb5",
            "patch_url": "https://github.com/tpm2-software/tpm2-tss/commit/306490c8d848c367faa2d9df81f5e69dab46ffb5.patch",
            "filename": "CVE-2023-22745-306490c8d848c367faa2d9df81f5e69dab46ffb5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-22745/CVE-2023-22745-306490c8d848c367faa2d9df81f5e69dab46ffb5.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/tpm2-software/tpm2-tss/commit/306490c8d848c367faa2d9df81f5e69dab46ffb5",
                "patch_url": "https://github.com/tpm2-software/tpm2-tss/commit/306490c8d848c367faa2d9df81f5e69dab46ffb5.patch",
                "filename": "CVE-2023-22745-306490c8d848c367faa2d9df81f5e69dab46ffb5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-22745/CVE-2023-22745-306490c8d848c367faa2d9df81f5e69dab46ffb5.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/tpm2-software/tpm2-tss/commit/49107d65d5c7be430671398416bbd89dae4e34e7",
                "patch_url": "https://github.com/tpm2-software/tpm2-tss/commit/49107d65d5c7be430671398416bbd89dae4e34e7.patch",
                "filename": "CVE-2023-22745-49107d65d5c7be430671398416bbd89dae4e34e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-22745/CVE-2023-22745-49107d65d5c7be430671398416bbd89dae4e34e7.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/tpm2-software/tpm2-tss/commit/7ab42953216adec046d000a5e3085f3ee5e9cabf",
                "patch_url": "https://github.com/tpm2-software/tpm2-tss/commit/7ab42953216adec046d000a5e3085f3ee5e9cabf.patch",
                "filename": "CVE-2023-22745-7ab42953216adec046d000a5e3085f3ee5e9cabf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-22745/CVE-2023-22745-7ab42953216adec046d000a5e3085f3ee5e9cabf.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/tpm2-software/tpm2-tss/commit/306490c8d848c367faa2d9df81f5e69dab46ffb5",
            "https://github.com/tpm2-software/tpm2-tss/commit/49107d65d5c7be430671398416bbd89dae4e34e7",
            "https://github.com/tpm2-software/tpm2-tss/commit/7ab42953216adec046d000a5e3085f3ee5e9cabf"
        ]
    },
    "CVE-2023-2283": {
        "cve": "CVE-2023-2283",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-2283",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-23455": {
        "cve": "CVE-2023-23455",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-23455",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=a2965c7be0522eaa18808684b7b82b248515511b",
            "filename": "CVE-2023-23455-a2965c7be0522eaa18808684b7b82b248515511b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-23455/CVE-2023-23455-a2965c7be0522eaa18808684b7b82b248515511b.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=a2965c7be0522eaa18808684b7b82b248515511b",
                "filename": "CVE-2023-23455-a2965c7be0522eaa18808684b7b82b248515511b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-23455/CVE-2023-23455-a2965c7be0522eaa18808684b7b82b248515511b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b",
            "https://www.cve.org/CVERecord?id=CVE-2023-23455\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-23455\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b"
        ]
    },
    "CVE-2023-24023": {
        "cve": "CVE-2023-24023",
        "cvss_v2": null,
        "cvss_v3": 6.8,
        "description": "Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-24023",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-2513": {
        "cve": "CVE-2023-2513",
        "cvss_v2": null,
        "cvss_v3": 6.7,
        "description": "A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-2513",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/67d7d8ad99be",
            "patch_url": "https://github.com/torvalds/linux/commit/67d7d8ad99be.patch",
            "filename": "CVE-2023-2513-67d7d8ad99be.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-2513/CVE-2023-2513-67d7d8ad99be.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/67d7d8ad99be",
                "patch_url": "https://github.com/torvalds/linux/commit/67d7d8ad99be.patch",
                "filename": "CVE-2023-2513-67d7d8ad99be.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-2513/CVE-2023-2513-67d7d8ad99be.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/67d7d8ad99be",
            "https://lore.kernel.org/all/",
            "https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/"
        ]
    },
    "CVE-2023-25775": {
        "cve": "CVE-2023-25775",
        "cvss_v2": null,
        "cvss_v3": 5.6,
        "description": "Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-25775",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-2602": {
        "cve": "CVE-2023-2602",
        "cvss_v2": null,
        "cvss_v3": 3.3,
        "description": "A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-2602",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-2603": {
        "cve": "CVE-2023-2603",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-2603",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-26545": {
        "cve": "CVE-2023-26545",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-26545",
        "selected_patch": {
            "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377",
            "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377",
            "filename": "CVE-2023-26545-fda6c89fe3d9aca073495a664e1d5aea28cd4377.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-26545/CVE-2023-26545-fda6c89fe3d9aca073495a664e1d5aea28cd4377.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377",
                "filename": "CVE-2023-26545-fda6c89fe3d9aca073495a664e1d5aea28cd4377.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-26545/CVE-2023-26545-fda6c89fe3d9aca073495a664e1d5aea28cd4377.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://github.com/torvalds/linux/commit/fda6c89fe3d9aca073495a664e1d5aea28cd4377",
                "patch_url": "https://github.com/torvalds/linux/commit/fda6c89fe3d9aca073495a664e1d5aea28cd4377.patch",
                "filename": "CVE-2023-26545-fda6c89fe3d9aca073495a664e1d5aea28cd4377.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-26545/CVE-2023-26545-fda6c89fe3d9aca073495a664e1d5aea28cd4377.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.13",
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377",
            "https://github.com/torvalds/linux/commit/fda6c89fe3d9aca073495a664e1d5aea28cd4377"
        ]
    },
    "CVE-2023-26604": {
        "cve": "CVE-2023-26604",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the \"systemctl status\" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-26604",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-27536": {
        "cve": "CVE-2023-27536",
        "cvss_v2": null,
        "cvss_v3": 5.9,
        "description": "An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-27536",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-28321": {
        "cve": "CVE-2023-28321",
        "cvss_v2": null,
        "cvss_v3": 5.9,
        "description": "An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as \"Subject Alternative Name\" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-28321",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-28322": {
        "cve": "CVE-2023-28322",
        "cvss_v2": null,
        "cvss_v3": 3.7,
        "description": "An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-28322",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-28328": {
        "cve": "CVE-2023-28328",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-28328",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://www.cve.org/CVERecord?id=CVE-2023-28328\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-28328\nhttps://lore.kernel.org/linux-media/20221120065918.2160782-1-zhongbaisong@huawei.com/\nhttps://lore.kernel.org/lkml/CAO4mrfcPHB5aQJO=mpqV+p8mPLNg-Fok0gw8gZ=zemAfMGTzMg@mail.gmail.com/"
        ]
    },
    "CVE-2023-28464": {
        "cve": "CVE-2023-28464",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-28464",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://lore.kernel.org/lkml/",
            "https://lore.kernel.org/lkml/20230309074645.74309-1-wzhmmmmm%40gmail.com/"
        ]
    },
    "CVE-2023-28466": {
        "cve": "CVE-2023-28466",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-28466",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
            "filename": "CVE-2023-28466-49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-28466/CVE-2023-28466-49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
                "filename": "CVE-2023-28466-49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-28466/CVE-2023-28466-49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
            "https://www.cve.org/CVERecord?id=CVE-2023-28466\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-28466\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962"
        ]
    },
    "CVE-2023-28484": {
        "cve": "CVE-2023-28484",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-28484",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-28746": {
        "cve": "CVE-2023-28746",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-28746",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-28772": {
        "cve": "CVE-2023-28772",
        "cvss_v2": null,
        "cvss_v3": 6.7,
        "description": "An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-28772",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7",
            "patch_url": "https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7.patch",
            "filename": "CVE-2023-28772-d3b16034a24a112bb83aeb669ac5b9b01f744bb7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-28772/CVE-2023-28772-d3b16034a24a112bb83aeb669ac5b9b01f744bb7.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7",
                "patch_url": "https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7.patch",
                "filename": "CVE-2023-28772-d3b16034a24a112bb83aeb669ac5b9b01f744bb7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-28772/CVE-2023-28772-d3b16034a24a112bb83aeb669ac5b9b01f744bb7.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3",
            "https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7",
            "https://lkml.kernel.org/r/",
            "https://lkml.kernel.org/r/20210626032156.47889-1-yun.zhou%40windriver.com",
            "https://lore.kernel.org/lkml/",
            "https://lore.kernel.org/lkml/20210625122453.5e2fe304%40oasis.local.home/"
        ]
    },
    "CVE-2023-29469": {
        "cve": "CVE-2023-29469",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the '\\0' value).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-29469",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-29491": {
        "cve": "CVE-2023-29491",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-29491",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-2953": {
        "cve": "CVE-2023-2953",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-2953",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-30456": {
        "cve": "CVE-2023-30456",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-30456",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5",
            "patch_url": "https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5.patch",
            "filename": "CVE-2023-30456-112e66017bff7f2837030f34c2bc19501e9212d5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-30456/CVE-2023-30456-112e66017bff7f2837030f34c2bc19501e9212d5.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5",
                "patch_url": "https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5.patch",
                "filename": "CVE-2023-30456-112e66017bff7f2837030f34c2bc19501e9212d5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-30456/CVE-2023-30456-112e66017bff7f2837030f34c2bc19501e9212d5.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8",
            "https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5"
        ]
    },
    "CVE-2023-30630": {
        "cve": "CVE-2023-30630",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-30630",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-3090": {
        "cve": "CVE-2023-3090",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.\n\nThe out-of-bounds write is caused by missing skb->cb  initialization in the ipvlan network driver. The vulnerability is reachable if\u00a0CONFIG_IPVLAN is enabled.\n\n\nWe recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3090",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=90cbed5247439a966b645b34eb0a2e037836ea8e",
            "filename": "CVE-2023-3090-90cbed5247439a966b645b34eb0a2e037836ea8e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3090/CVE-2023-3090-90cbed5247439a966b645b34eb0a2e037836ea8e.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=90cbed5247439a966b645b34eb0a2e037836ea8e",
                "filename": "CVE-2023-3090-90cbed5247439a966b645b34eb0a2e037836ea8e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3090/CVE-2023-3090-90cbed5247439a966b645b34eb0a2e037836ea8e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e"
        ]
    },
    "CVE-2023-31083": {
        "cve": "CVE-2023-31083",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-31083",
        "selected_patch": {
            "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9c33663af9ad115f90c076a1828129a3fbadea98",
            "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=9c33663af9ad115f90c076a1828129a3fbadea98",
            "filename": "CVE-2023-31083-9c33663af9ad115f90c076a1828129a3fbadea98.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-31083/CVE-2023-31083-9c33663af9ad115f90c076a1828129a3fbadea98.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9c33663af9ad115f90c076a1828129a3fbadea98",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=9c33663af9ad115f90c076a1828129a3fbadea98",
                "filename": "CVE-2023-31083-9c33663af9ad115f90c076a1828129a3fbadea98.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-31083/CVE-2023-31083-9c33663af9ad115f90c076a1828129a3fbadea98.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9c33663af9ad115f90c076a1828129a3fbadea98",
            "https://lore.kernel.org/all/CA+UBctC3p49aTgzbVgkSZ2+TQcqq4fPDO7yZitFT5uBPDeCO2g%40mail.gmail.com/",
            "https://lore.kernel.org/all/CA+UBctC3p49aTgzbVgkSZ2+TQcqq4fPDO7yZitFT5uBPDeCO2g@mail.gmail.com/",
            "https://www.cve.org/CVERecord?id=CVE-2023-31083\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-31083\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/bluetooth/hci_ldisc.c?h=v6.6-rc7&id=9c33663af9ad115f90c076a1828129a3fbadea98"
        ]
    },
    "CVE-2023-31084": {
        "cve": "CVE-2023-31084",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(&fepriv->sem) is called. However, wait_event_interruptible would put the process to sleep, and down(&fepriv->sem) may block the process.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-31084",
        "selected_patch": {
            "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946",
            "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946",
            "filename": "CVE-2023-31084-b8c75e4a1b325ea0a9433fa8834be97b5836b946.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-31084/CVE-2023-31084-b8c75e4a1b325ea0a9433fa8834be97b5836b946.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946",
                "filename": "CVE-2023-31084-b8c75e4a1b325ea0a9433fa8834be97b5836b946.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-31084/CVE-2023-31084-b8c75e4a1b325ea0a9433fa8834be97b5836b946.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946",
            "https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/",
            "https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw@mail.gmail.com/"
        ]
    },
    "CVE-2023-31130": {
        "cve": "CVE-2023-31130",
        "cvss_v2": null,
        "cvss_v3": 4.1,
        "description": "c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular \"0::00:00:00/2\" was found to cause an issue.  C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-31130",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-31346": {
        "cve": "CVE-2023-31346",
        "cvss_v2": null,
        "cvss_v3": 6,
        "description": "Failure to initialize\nmemory in SEV Firmware may allow a privileged attacker to access stale data\nfrom other guests.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-31346",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-31356": {
        "cve": "CVE-2023-31356",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "Incomplete system memory cleanup in SEV firmware could\nallow a privileged attacker to corrupt guest private memory, potentially\nresulting in a loss of data integrity.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-31356",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-3141": {
        "cve": "CVE-2023-3141",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3141",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=63264422785021704c39b38f65a78ab9e4a186d7",
            "filename": "CVE-2023-3141-63264422785021704c39b38f65a78ab9e4a186d7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3141/CVE-2023-3141-63264422785021704c39b38f65a78ab9e4a186d7.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=63264422785021704c39b38f65a78ab9e4a186d7",
                "filename": "CVE-2023-3141-63264422785021704c39b38f65a78ab9e4a186d7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3141/CVE-2023-3141-63264422785021704c39b38f65a78ab9e4a186d7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7",
            "https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com/t/",
            "https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw@mail.gmail.com/t/",
            "https://www.cve.org/CVERecord?id=CVE-2023-3141\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-3141\nhttps://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw@mail.gmail.com/t/"
        ]
    },
    "CVE-2023-31436": {
        "cve": "CVE-2023-31436",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-31436",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d",
            "patch_url": "https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d.patch",
            "filename": "CVE-2023-31436-3037933448f60f9acb705997eae62013ecb81e0d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-31436/CVE-2023-31436-3037933448f60f9acb705997eae62013ecb81e0d.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d",
                "patch_url": "https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d.patch",
                "filename": "CVE-2023-31436-3037933448f60f9acb705997eae62013ecb81e0d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-31436/CVE-2023-31436-3037933448f60f9acb705997eae62013ecb81e0d.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13",
            "https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d",
            "https://www.cve.org/CVERecord?id=CVE-2023-31436\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-31436\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3037933448f60f9acb705997eae62013ecb81e0d"
        ]
    },
    "CVE-2023-3161": {
        "cve": "CVE-2023-3161",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font->width and font->height greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3161",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be",
            "patch_url": "https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be.patch",
            "filename": "CVE-2023-3161-2b09d5d364986f724f17001ccfe4126b9b43a0be.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3161/CVE-2023-3161-2b09d5d364986f724f17001ccfe4126b9b43a0be.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be",
                "patch_url": "https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be.patch",
                "filename": "CVE-2023-3161-2b09d5d364986f724f17001ccfe4126b9b43a0be.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3161/CVE-2023-3161-2b09d5d364986f724f17001ccfe4126b9b43a0be.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be"
        ]
    },
    "CVE-2023-32067": {
        "cve": "CVE-2023-32067",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-32067",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-3212": {
        "cve": "CVE-2023-3212",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3212",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/504a10d9e46bc37b23d0a1ae2f28973c8516e636",
            "patch_url": "https://github.com/torvalds/linux/commit/504a10d9e46bc37b23d0a1ae2f28973c8516e636.patch",
            "filename": "CVE-2023-3212-504a10d9e46bc37b23d0a1ae2f28973c8516e636.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3212/CVE-2023-3212-504a10d9e46bc37b23d0a1ae2f28973c8516e636.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/504a10d9e46bc37b23d0a1ae2f28973c8516e636",
                "patch_url": "https://github.com/torvalds/linux/commit/504a10d9e46bc37b23d0a1ae2f28973c8516e636.patch",
                "filename": "CVE-2023-3212-504a10d9e46bc37b23d0a1ae2f28973c8516e636.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3212/CVE-2023-3212-504a10d9e46bc37b23d0a1ae2f28973c8516e636.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/504a10d9e46bc37b23d0a1ae2f28973c8516e636"
        ]
    },
    "CVE-2023-3268": {
        "cve": "CVE-2023-3268",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3268",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1",
            "filename": "CVE-2023-3268-43ec16f1450f4936025a9bdf1a273affdb9732c1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3268/CVE-2023-3268-43ec16f1450f4936025a9bdf1a273affdb9732c1.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1",
                "filename": "CVE-2023-3268-43ec16f1450f4936025a9bdf1a273affdb9732c1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3268/CVE-2023-3268-43ec16f1450f4936025a9bdf1a273affdb9732c1.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1",
            "https://lore.kernel.org/lkml/",
            "https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/",
            "https://www.cve.org/CVERecord?id=CVE-2023-3268\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-3268\nhttps://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc@wangsu.com/T/"
        ]
    },
    "CVE-2023-3301": {
        "cve": "CVE-2023-3301",
        "cvss_v2": null,
        "cvss_v3": 5.6,
        "description": "A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3301",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-33203": {
        "cve": "CVE-2023-33203",
        "cvss_v2": null,
        "cvss_v3": 6.4,
        "description": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-33203",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75",
            "filename": "CVE-2023-33203-6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-33203/CVE-2023-33203-6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75",
                "filename": "CVE-2023-33203-6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-33203/CVE-2023-33203-6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75"
        ]
    },
    "CVE-2023-3354": {
        "cve": "CVE-2023-3354",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3354",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-3390": {
        "cve": "CVE-2023-3390",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit\u00a01240eb93f0616b21c675416516ff3d74798fdc97.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3390",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=1240eb93f0616b21c675416516ff3d74798fdc97",
            "filename": "CVE-2023-3390-1240eb93f0616b21c675416516ff3d74798fdc97.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3390/CVE-2023-3390-1240eb93f0616b21c675416516ff3d74798fdc97.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=1240eb93f0616b21c675416516ff3d74798fdc97",
                "filename": "CVE-2023-3390-1240eb93f0616b21c675416516ff3d74798fdc97.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3390/CVE-2023-3390-1240eb93f0616b21c675416516ff3d74798fdc97.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97",
            "https://www.cve.org/CVERecord?id=CVE-2023-3390\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-3390\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97"
        ]
    },
    "CVE-2023-33951": {
        "cve": "CVE-2023-33951",
        "cvss_v2": null,
        "cvss_v3": 6.7,
        "description": "A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of GEM objects. The issue results from improper locking when performing operations on an object. This flaw allows a local privileged user to disclose information in the context of the kernel.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-33951",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-33952": {
        "cve": "CVE-2023-33952",
        "cvss_v2": null,
        "cvss_v3": 6.7,
        "description": "A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. This issue occurs due to the lack of validating the existence of an object prior to performing further free operations on the object, which may allow a local privileged user to escalate privileges and execute code in the context of the kernel.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-33952",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-34969": {
        "cve": "CVE-2023-34969",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-34969",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-35001": {
        "cve": "CVE-2023-35001",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-35001",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://lore.kernel.org/netfilter-devel/",
            "https://lore.kernel.org/netfilter-devel/20230705121515.747251-1-cascardo@canonical.com/T/",
            "https://www.cve.org/CVERecord?id=CVE-2023-35001\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-35001\nhttps://lore.kernel.org/netfilter-devel/20230705121515.747251-1-cascardo@canonical.com/T/\nhttps://www.openwall.com/lists/oss-security/2023/07/05/3"
        ]
    },
    "CVE-2023-3567": {
        "cve": "CVE-2023-3567",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3567",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-35788": {
        "cve": "CVE-2023-35788",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-35788",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7",
            "https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c"
        ]
    },
    "CVE-2023-35823": {
        "cve": "CVE-2023-35823",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-35823",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30cf57da176cca80f11df0d9b7f71581fe601389",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=30cf57da176cca80f11df0d9b7f71581fe601389",
            "filename": "CVE-2023-35823-30cf57da176cca80f11df0d9b7f71581fe601389.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-35823/CVE-2023-35823-30cf57da176cca80f11df0d9b7f71581fe601389.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30cf57da176cca80f11df0d9b7f71581fe601389",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=30cf57da176cca80f11df0d9b7f71581fe601389",
                "filename": "CVE-2023-35823-30cf57da176cca80f11df0d9b7f71581fe601389.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-35823/CVE-2023-35823-30cf57da176cca80f11df0d9b7f71581fe601389.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30cf57da176cca80f11df0d9b7f71581fe601389",
            "https://lore.kernel.org/all/",
            "https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/",
            "https://lore.kernel.org/lkml/",
            "https://lore.kernel.org/lkml/20230318085023.832510-1-zyytlz.wz%40163.com/t/"
        ]
    },
    "CVE-2023-35824": {
        "cve": "CVE-2023-35824",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-35824",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a",
            "filename": "CVE-2023-35824-5abda7a16698d4d1f47af1168d8fa2c640116b4a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-35824/CVE-2023-35824-5abda7a16698d4d1f47af1168d8fa2c640116b4a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a",
                "filename": "CVE-2023-35824-5abda7a16698d4d1f47af1168d8fa2c640116b4a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-35824/CVE-2023-35824-5abda7a16698d4d1f47af1168d8fa2c640116b4a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a",
            "https://lore.kernel.org/all/",
            "https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/",
            "https://lore.kernel.org/lkml/",
            "https://lore.kernel.org/lkml/20230318081506.795147-1-zyytlz.wz%40163.com/"
        ]
    },
    "CVE-2023-35825": {
        "cve": "CVE-2023-35825",
        "cvss_v2": null,
        "cvss_v3": "6.4",
        "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-3141. Reason: This candidate is a reservation duplicate of CVE-2023-3141. Notes: All CVE users should reference CVE-2023-3141 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-35825",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=63264422785021704c39b38f65a78ab9e4a186d7",
            "filename": "CVE-2023-35825-63264422785021704c39b38f65a78ab9e4a186d7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-35825/CVE-2023-35825-63264422785021704c39b38f65a78ab9e4a186d7.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=63264422785021704c39b38f65a78ab9e4a186d7",
                "filename": "CVE-2023-35825-63264422785021704c39b38f65a78ab9e4a186d7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-35825/CVE-2023-35825-63264422785021704c39b38f65a78ab9e4a186d7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7",
            "https://lore.kernel.org/all/",
            "https://lore.kernel.org/lkml/"
        ]
    },
    "CVE-2023-3609": {
        "cve": "CVE-2023-3609",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3609",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch?id=04c55383fa5689357bcdd2c8036725a55ed632bc",
            "filename": "CVE-2023-3609-04c55383fa5689357bcdd2c8036725a55ed632bc.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3609/CVE-2023-3609-04c55383fa5689357bcdd2c8036725a55ed632bc.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch?id=04c55383fa5689357bcdd2c8036725a55ed632bc",
                "filename": "CVE-2023-3609-04c55383fa5689357bcdd2c8036725a55ed632bc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3609/CVE-2023-3609-04c55383fa5689357bcdd2c8036725a55ed632bc.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc",
            "https://www.cve.org/CVERecord?id=CVE-2023-3609\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-3609\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc"
        ]
    },
    "CVE-2023-3611": {
        "cve": "CVE-2023-3611",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.\n\nWe recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3611",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64",
            "filename": "CVE-2023-3611-3e337087c3b5805fe0b8a46ba622a962880b5d64.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3611/CVE-2023-3611-3e337087c3b5805fe0b8a46ba622a962880b5d64.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64",
                "filename": "CVE-2023-3611-3e337087c3b5805fe0b8a46ba622a962880b5d64.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3611/CVE-2023-3611-3e337087c3b5805fe0b8a46ba622a962880b5d64.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64",
            "https://www.cve.org/CVERecord?id=CVE-2023-3611\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-3611\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64"
        ]
    },
    "CVE-2023-37453": {
        "cve": "CVE-2023-37453",
        "cvss_v2": null,
        "cvss_v3": 4.6,
        "description": "An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-37453",
        "selected_patch": {
            "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=85d07c55621676d47d873d2749b88f783cd4d5a1",
            "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=85d07c55621676d47d873d2749b88f783cd4d5a1",
            "filename": "CVE-2023-37453-85d07c55621676d47d873d2749b88f783cd4d5a1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-37453/CVE-2023-37453-85d07c55621676d47d873d2749b88f783cd4d5a1.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e4c574225cc5a0553115e5eb5787d1474db5b0f",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=1e4c574225cc5a0553115e5eb5787d1474db5b0f",
                "filename": "CVE-2023-37453-1e4c574225cc5a0553115e5eb5787d1474db5b0f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-37453/CVE-2023-37453-1e4c574225cc5a0553115e5eb5787d1474db5b0f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=85d07c55621676d47d873d2749b88f783cd4d5a1",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=85d07c55621676d47d873d2749b88f783cd4d5a1",
                "filename": "CVE-2023-37453-85d07c55621676d47d873d2749b88f783cd4d5a1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-37453/CVE-2023-37453-85d07c55621676d47d873d2749b88f783cd4d5a1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de28e469da75359a2bb8cd8778b78aa64b1be1f4",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=de28e469da75359a2bb8cd8778b78aa64b1be1f4",
                "filename": "CVE-2023-37453-de28e469da75359a2bb8cd8778b78aa64b1be1f4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-37453/CVE-2023-37453-de28e469da75359a2bb8cd8778b78aa64b1be1f4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b",
                "filename": "CVE-2023-37453-ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-37453/CVE-2023-37453-ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e4c574225cc5a0553115e5eb5787d1474db5b0f",
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=85d07c55621676d47d873d2749b88f783cd4d5a1",
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de28e469da75359a2bb8cd8778b78aa64b1be1f4",
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b",
            "https://lore.kernel.org/all/",
            "https://lore.kernel.org/all/000000000000c0ffe505fe86c9ca%40google.com/T/",
            "https://lore.kernel.org/all/000000000000e56434059580f86e%40google.com/T/"
        ]
    },
    "CVE-2023-3758": {
        "cve": "CVE-2023-3758",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3758",
        "selected_patch": {
            "url": "https://github.com/SSSD/sssd/pull/7302",
            "patch_url": "https://github.com/SSSD/sssd/pull/7302.patch",
            "filename": "CVE-2023-3758-https___github_com_SSSD_sssd_pull_7302_patch.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3758/CVE-2023-3758-https___github_com_SSSD_sssd_pull_7302_patch.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/SSSD/sssd/pull/7302",
                "patch_url": "https://github.com/SSSD/sssd/pull/7302.patch",
                "filename": "CVE-2023-3758-https___github_com_SSSD_sssd_pull_7302_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3758/CVE-2023-3758-https___github_com_SSSD_sssd_pull_7302_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/SSSD/sssd/pull/7302"
        ]
    },
    "CVE-2023-3772": {
        "cve": "CVE-2023-3772",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "A flaw was found in the Linux kernel\u2019s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3772",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-3776": {
        "cve": "CVE-2023-3776",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3776",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch?id=0323bce598eea038714f941ce2b22541c46d488f",
            "filename": "CVE-2023-3776-0323bce598eea038714f941ce2b22541c46d488f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3776/CVE-2023-3776-0323bce598eea038714f941ce2b22541c46d488f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch?id=0323bce598eea038714f941ce2b22541c46d488f",
                "filename": "CVE-2023-3776-0323bce598eea038714f941ce2b22541c46d488f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3776/CVE-2023-3776-0323bce598eea038714f941ce2b22541c46d488f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f",
            "https://www.cve.org/CVERecord?id=CVE-2023-3776\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-3776\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f"
        ]
    },
    "CVE-2023-3812": {
        "cve": "CVE-2023-3812",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "An out-of-bounds memory access flaw was found in the Linux kernel\u2019s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3812",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=363a5328f4b0",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=363a5328f4b0",
            "filename": "CVE-2023-3812-363a5328f4b0.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3812/CVE-2023-3812-363a5328f4b0.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=363a5328f4b0",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=363a5328f4b0",
                "filename": "CVE-2023-3812-363a5328f4b0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-3812/CVE-2023-3812-363a5328f4b0.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=363a5328f4b0",
            "https://www.cve.org/CVERecord?id=CVE-2023-3812\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-3812\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=363a5328f4b0"
        ]
    },
    "CVE-2023-38408": {
        "cve": "CVE-2023-38408",
        "cvss_v2": null,
        "cvss_v3": 9.8,
        "description": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-38408",
        "selected_patch": {
            "url": "https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
            "patch_url": "https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8.patch",
            "filename": "CVE-2023-38408-7bc29a9d5cd697290aa056e94ecee6253d3425f8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-38408/CVE-2023-38408-7bc29a9d5cd697290aa056e94ecee6253d3425f8.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
                "patch_url": "https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8.patch",
                "filename": "CVE-2023-38408-7bc29a9d5cd697290aa056e94ecee6253d3425f8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-38408/CVE-2023-38408-7bc29a9d5cd697290aa056e94ecee6253d3425f8.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
                "patch_url": "https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d.patch",
                "filename": "CVE-2023-38408-f03a4faa55c4ce0818324701dadbf91988d7351d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-38408/CVE-2023-38408-f03a4faa55c4ce0818324701dadbf91988d7351d.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
                "patch_url": "https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca.patch",
                "filename": "CVE-2023-38408-f8f5a6b003981bb824329dc987d101977beda7ca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-38408/CVE-2023-38408-f8f5a6b003981bb824329dc987d101977beda7ca.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
            "https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
            "https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca"
        ]
    },
    "CVE-2023-38409": {
        "cve": "CVE-2023-38409",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-38409",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch?id=fffb0b52d5258554c645c966c6cbef7de50b851d",
            "filename": "CVE-2023-38409-fffb0b52d5258554c645c966c6cbef7de50b851d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-38409/CVE-2023-38409-fffb0b52d5258554c645c966c6cbef7de50b851d.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch?id=fffb0b52d5258554c645c966c6cbef7de50b851d",
                "filename": "CVE-2023-38409-fffb0b52d5258554c645c966c6cbef7de50b851d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-38409/CVE-2023-38409-fffb0b52d5258554c645c966c6cbef7de50b851d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.12",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d",
            "https://www.cve.org/CVERecord?id=CVE-2023-38409\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-38409\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d"
        ]
    },
    "CVE-2023-38546": {
        "cve": "CVE-2023-38546",
        "cvss_v2": null,
        "cvss_v3": 3.7,
        "description": "This flaw allows an attacker to insert cookies at will into a running program\nusing libcurl, if the specific series of conditions are met.\n\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\nthat are the individual handles for single transfers.\n\nlibcurl provides a function call that duplicates en easy handle called\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\n\nIf a transfer has cookies enabled when the handle is duplicated, the\ncookie-enable state is also cloned - but without cloning the actual\ncookies. If the source handle did not read any cookies from a specific file on\ndisk, the cloned version of the handle would instead store the file name as\n`none` (using the four ASCII letters, no quotes).\n\nSubsequent use of the cloned handle that does not explicitly set a source to\nload cookies from would then inadvertently load cookies from a file named\n`none` - if such a file exists and is readable in the current directory of the\nprogram using libcurl. And if using the correct file format of course.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-38546",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-3899": {
        "cve": "CVE-2023-3899",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-3899",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-39189": {
        "cve": "CVE-2023-39189",
        "cvss_v2": null,
        "cvss_v3": 5.1,
        "description": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-39189",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-39192": {
        "cve": "CVE-2023-39192",
        "cvss_v2": null,
        "cvss_v3": 6.7,
        "description": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-39192",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-39193": {
        "cve": "CVE-2023-39193",
        "cvss_v2": null,
        "cvss_v3": 6.1,
        "description": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-39193",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-39194": {
        "cve": "CVE-2023-39194",
        "cvss_v2": null,
        "cvss_v3": 3.2,
        "description": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-39194",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-39198": {
        "cve": "CVE-2023-39198",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-39198",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-39615": {
        "cve": "CVE-2023-39615",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-39615",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-4004": {
        "cve": "CVE-2023-4004",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4004",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-4016": {
        "cve": "CVE-2023-4016",
        "cvss_v2": null,
        "cvss_v3": 2.5,
        "description": "Under some circumstances, this weakness allows a user who has access to run the \u201cps\u201d utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4016",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-40283": {
        "cve": "CVE-2023-40283",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-40283",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1",
            "filename": "CVE-2023-40283-1728137b33c00d5a2b5110ed7aafb42e7c32e4a1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-40283/CVE-2023-40283-1728137b33c00d5a2b5110ed7aafb42e7c32e4a1.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1",
                "filename": "CVE-2023-40283-1728137b33c00d5a2b5110ed7aafb42e7c32e4a1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-40283/CVE-2023-40283-1728137b33c00d5a2b5110ed7aafb42e7c32e4a1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://github.com/torvalds/linux/commit/1728137b33c00d5a2b5110ed7aafb42e7c32e4a1",
                "patch_url": "https://github.com/torvalds/linux/commit/1728137b33c00d5a2b5110ed7aafb42e7c32e4a1.patch",
                "filename": "CVE-2023-40283-1728137b33c00d5a2b5110ed7aafb42e7c32e4a1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-40283/CVE-2023-40283-1728137b33c00d5a2b5110ed7aafb42e7c32e4a1.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.10",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1",
            "https://github.com/torvalds/linux/commit/1728137b33c00d5a2b5110ed7aafb42e7c32e4a1",
            "https://www.cve.org/CVERecord?id=CVE-2023-40283\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-40283\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1"
        ]
    },
    "CVE-2023-4128": {
        "cve": "CVE-2023-4128",
        "cvss_v2": null,
        "cvss_v3": "7.8",
        "description": "Rejected reason: ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208.  Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4128",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec",
            "filename": "CVE-2023-4128-76e42ae831991c828cffa8c37736ebfb831ad5ec.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4128/CVE-2023-4128-76e42ae831991c828cffa8c37736ebfb831ad5ec.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81",
                "filename": "CVE-2023-4128-3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4128/CVE-2023-4128-3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec",
                "filename": "CVE-2023-4128-76e42ae831991c828cffa8c37736ebfb831ad5ec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4128/CVE-2023-4128-76e42ae831991c828cffa8c37736ebfb831ad5ec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8",
                "filename": "CVE-2023-4128-b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4128/CVE-2023-4128-b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8",
            "https://lore.kernel.org/netdev/"
        ]
    },
    "CVE-2023-4132": {
        "cve": "CVE-2023-4132",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "A use-after-free vulnerability was found in the siano smsusb module in the Linux kernel. The bug occurs during device initialization when the siano device is plugged in. This flaw allows a local user to crash the system, causing a denial of service condition.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4132",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-4133": {
        "cve": "CVE-2023-4133",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "A use-after-free vulnerability was found in the cxgb4 driver in the Linux kernel. The bug occurs when the cxgb4 device is detaching due to a possible rearming of the flower_stats_timer from the work queue. This flaw allows a local user to crash the system, causing a denial of service condition.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4133",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-4155": {
        "cve": "CVE-2023-4155",
        "cvss_v2": null,
        "cvss_v3": 5.3,
        "description": "A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4155",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-4206": {
        "cve": "CVE-2023-4206",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation.\n\nWhen route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4206",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8",
            "filename": "CVE-2023-4206-b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4206/CVE-2023-4206-b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8",
                "filename": "CVE-2023-4206-b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4206/CVE-2023-4206-b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8",
            "https://www.cve.org/CVERecord?id=CVE-2023-4206\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-4206\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8\nhttps://lore.kernel.org/netdev/193d6cdf-d6c9-f9be-c36a-b2a7551d5fb6@mojatatu.com/"
        ]
    },
    "CVE-2023-4207": {
        "cve": "CVE-2023-4207",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nWhen fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4207",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec",
            "filename": "CVE-2023-4207-76e42ae831991c828cffa8c37736ebfb831ad5ec.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4207/CVE-2023-4207-76e42ae831991c828cffa8c37736ebfb831ad5ec.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec",
                "filename": "CVE-2023-4207-76e42ae831991c828cffa8c37736ebfb831ad5ec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4207/CVE-2023-4207-76e42ae831991c828cffa8c37736ebfb831ad5ec.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec",
            "https://www.cve.org/CVERecord?id=CVE-2023-4207\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-4207\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8\nhttps://lore.kernel.org/netdev/193d6cdf-d6c9-f9be-c36a-b2a7551d5fb6@mojatatu.com/"
        ]
    },
    "CVE-2023-4208": {
        "cve": "CVE-2023-4208",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nWhen u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.\n\nWe recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4208",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81",
            "filename": "CVE-2023-4208-3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4208/CVE-2023-4208-3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81",
                "filename": "CVE-2023-4208-3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4208/CVE-2023-4208-3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81",
            "https://www.cve.org/CVERecord?id=CVE-2023-4208\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-4208\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8\nhttps://lore.kernel.org/netdev/193d6cdf-d6c9-f9be-c36a-b2a7551d5fb6@mojatatu.com/"
        ]
    },
    "CVE-2023-4244": {
        "cve": "CVE-2023-4244",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4244",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8",
            "filename": "CVE-2023-4244-3e91b0ebd994635df2346353322ac51ce84ce6d8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4244/CVE-2023-4244-3e91b0ebd994635df2346353322ac51ce84ce6d8.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8",
                "filename": "CVE-2023-4244-3e91b0ebd994635df2346353322ac51ce84ce6d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4244/CVE-2023-4244-3e91b0ebd994635df2346353322ac51ce84ce6d8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8",
            "https://www.cve.org/CVERecord?id=CVE-2023-4244\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-4244\nhttps://lore.kernel.org/netdev/20230810070830.24064-1-pablo@netfilter.org/\nhttps://lore.kernel.org/netdev/20230815223011.7019-1-fw@strlen.de/"
        ]
    },
    "CVE-2023-42753": {
        "cve": "CVE-2023-42753",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-42753",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-42754": {
        "cve": "CVE-2023-42754",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-42754",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-42755": {
        "cve": "CVE-2023-42755",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-42755",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-44466": {
        "cve": "CVE-2023-44466",
        "cvss_v2": null,
        "cvss_v3": 8.8,
        "description": "An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-44466",
        "selected_patch": {
            "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a282a2f10539dce2aa619e71e1817570d557fc97",
            "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=a282a2f10539dce2aa619e71e1817570d557fc97",
            "filename": "CVE-2023-44466-a282a2f10539dce2aa619e71e1817570d557fc97.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44466/CVE-2023-44466-a282a2f10539dce2aa619e71e1817570d557fc97.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a282a2f10539dce2aa619e71e1817570d557fc97",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=a282a2f10539dce2aa619e71e1817570d557fc97",
                "filename": "CVE-2023-44466-a282a2f10539dce2aa619e71e1817570d557fc97.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44466/CVE-2023-44466-a282a2f10539dce2aa619e71e1817570d557fc97.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://github.com/torvalds/linux/commit/a282a2f10539dce2aa619e71e1817570d557fc97",
                "patch_url": "https://github.com/torvalds/linux/commit/a282a2f10539dce2aa619e71e1817570d557fc97.patch",
                "filename": "CVE-2023-44466-a282a2f10539dce2aa619e71e1817570d557fc97.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44466/CVE-2023-44466-a282a2f10539dce2aa619e71e1817570d557fc97.patch",
                "type": "github"
            },
            {
                "url": "https://www.cve.org/CVERecord?id=CVE-2023-44466\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-44466\nhttps://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a282a2f10539dce2aa619e71e1817570d557fc97",
                "patch_url": "https://www.cve.org/CVERecord?id=CVE-2023-44466\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-44466\nhttps://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=a282a2f10539dce2aa619e71e1817570d557fc97",
                "filename": "CVE-2023-44466-a282a2f10539dce2aa619e71e1817570d557fc97.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44466/CVE-2023-44466-a282a2f10539dce2aa619e71e1817570d557fc97.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a282a2f10539dce2aa619e71e1817570d557fc97",
            "https://github.com/torvalds/linux/commit/a282a2f10539dce2aa619e71e1817570d557fc97",
            "https://www.cve.org/CVERecord?id=CVE-2023-44466\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-44466\nhttps://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a282a2f10539dce2aa619e71e1817570d557fc97"
        ]
    },
    "CVE-2023-44487": {
        "cve": "CVE-2023-44487",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-44487",
        "selected_patch": {
            "url": "https://github.com/apache/httpd-site/pull/10",
            "patch_url": "https://github.com/apache/httpd-site/pull/10.patch",
            "filename": "CVE-2023-44487-https___github_com_apache_httpd_site_pull_10_patch.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-https___github_com_apache_httpd_site_pull_10_patch.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/apache/httpd-site/pull/10",
                "patch_url": "https://github.com/apache/httpd-site/pull/10.patch",
                "filename": "CVE-2023-44487-https___github_com_apache_httpd_site_pull_10_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-https___github_com_apache_httpd_site_pull_10_patch.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/apache/trafficserver/pull/10564",
                "patch_url": "https://github.com/apache/trafficserver/pull/10564.patch",
                "filename": "CVE-2023-44487-https___github_com_apache_trafficserver_pull_10564_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-https___github_com_apache_trafficserver_pull_10564_patch.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/envoyproxy/envoy/pull/30055",
                "patch_url": "https://github.com/envoyproxy/envoy/pull/30055.patch",
                "filename": "CVE-2023-44487-https___github_com_envoyproxy_envoy_pull_30055_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-https___github_com_envoyproxy_envoy_pull_30055_patch.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/facebook/proxygen/pull/466",
                "patch_url": "https://github.com/facebook/proxygen/pull/466.patch",
                "filename": "CVE-2023-44487-https___github_com_facebook_proxygen_pull_466_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-https___github_com_facebook_proxygen_pull_466_patch.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/grpc/grpc-go/pull/6703",
                "patch_url": "https://github.com/grpc/grpc-go/pull/6703.patch",
                "filename": "CVE-2023-44487-https___github_com_grpc_grpc_go_pull_6703_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-https___github_com_grpc_grpc_go_pull_6703_patch.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/h2o/h2o/pull/3291",
                "patch_url": "https://github.com/h2o/h2o/pull/3291.patch",
                "filename": "CVE-2023-44487-https___github_com_h2o_h2o_pull_3291_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-https___github_com_h2o_h2o_pull_3291_patch.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1",
                "patch_url": "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1.patch",
                "filename": "CVE-2023-44487-f61d41a502bd0f60eb24e1ce14edc7b6df6722a1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-f61d41a502bd0f60eb24e1ce14edc7b6df6722a1.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/kubernetes/kubernetes/pull/121120",
                "patch_url": "https://github.com/kubernetes/kubernetes/pull/121120.patch",
                "filename": "CVE-2023-44487-https___github_com_kubernetes_kubernetes_pull_121120_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-https___github_com_kubernetes_kubernetes_pull_121120_patch.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/line/armeria/pull/5232",
                "patch_url": "https://github.com/line/armeria/pull/5232.patch",
                "filename": "CVE-2023-44487-https___github_com_line_armeria_pull_5232_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-https___github_com_line_armeria_pull_5232_patch.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632",
                "patch_url": "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632.patch",
                "filename": "CVE-2023-44487-https___github_com_linkerd_website_pull_1695_commits_4b9c6836471bc8270ab48aae6fd2181bc73fd632_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-https___github_com_linkerd_website_pull_1695_commits_4b9c6836471bc8270ab48aae6fd2181bc73fd632_patch.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/microsoft/CBL-Mariner/pull/6381",
                "patch_url": "https://github.com/microsoft/CBL-Mariner/pull/6381.patch",
                "filename": "CVE-2023-44487-https___github_com_microsoft_CBL_Mariner_pull_6381_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-https___github_com_microsoft_CBL_Mariner_pull_6381_patch.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61",
                "patch_url": "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61.patch",
                "filename": "CVE-2023-44487-58f75f665aa81a8cbcf6ffa74820042a285c5e61.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-58f75f665aa81a8cbcf6ffa74820042a285c5e61.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/nghttp2/nghttp2/pull/1961",
                "patch_url": "https://github.com/nghttp2/nghttp2/pull/1961.patch",
                "filename": "CVE-2023-44487-https___github_com_nghttp2_nghttp2_pull_1961_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-https___github_com_nghttp2_nghttp2_pull_1961_patch.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/nodejs/node/pull/50121",
                "patch_url": "https://github.com/nodejs/node/pull/50121.patch",
                "filename": "CVE-2023-44487-https___github_com_nodejs_node_pull_50121_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-https___github_com_nodejs_node_pull_50121_patch.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/projectcontour/contour/pull/5826",
                "patch_url": "https://github.com/projectcontour/contour/pull/5826.patch",
                "filename": "CVE-2023-44487-https___github_com_projectcontour_contour_pull_5826_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-44487/CVE-2023-44487-https___github_com_projectcontour_contour_pull_5826_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9",
            "https://github.com/apache/httpd-site/pull/10",
            "https://github.com/apache/trafficserver/pull/10564",
            "https://github.com/envoyproxy/envoy/pull/30055",
            "https://github.com/facebook/proxygen/pull/466",
            "https://github.com/grpc/grpc-go/pull/6703",
            "https://github.com/h2o/h2o/pull/3291",
            "https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1",
            "https://github.com/kubernetes/kubernetes/pull/121120",
            "https://github.com/line/armeria/pull/5232",
            "https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632",
            "https://github.com/microsoft/CBL-Mariner/pull/6381",
            "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61",
            "https://github.com/nghttp2/nghttp2/pull/1961",
            "https://github.com/nodejs/node/pull/50121",
            "https://github.com/projectcontour/contour/pull/5826"
        ]
    },
    "CVE-2023-45863": {
        "cve": "CVE-2023-45863",
        "cvss_v2": null,
        "cvss_v3": 6.4,
        "description": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-45863",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3bb2a01caa813d3a1845d378bbe4169ef280d394",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3bb2a01caa813d3a1845d378bbe4169ef280d394",
            "filename": "CVE-2023-45863-3bb2a01caa813d3a1845d378bbe4169ef280d394.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-45863/CVE-2023-45863-3bb2a01caa813d3a1845d378bbe4169ef280d394.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3bb2a01caa813d3a1845d378bbe4169ef280d394",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=3bb2a01caa813d3a1845d378bbe4169ef280d394",
                "filename": "CVE-2023-45863-3bb2a01caa813d3a1845d378bbe4169ef280d394.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-45863/CVE-2023-45863-3bb2a01caa813d3a1845d378bbe4169ef280d394.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.3",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3bb2a01caa813d3a1845d378bbe4169ef280d394"
        ]
    },
    "CVE-2023-45871": {
        "cve": "CVE-2023-45871",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-45871",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f",
            "filename": "CVE-2023-45871-bb5ed01cd2428cd25b1c88a3a9cba87055eb289f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-45871/CVE-2023-45871-bb5ed01cd2428cd25b1c88a3a9cba87055eb289f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f",
                "filename": "CVE-2023-45871-bb5ed01cd2428cd25b1c88a3a9cba87055eb289f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-45871/CVE-2023-45871-bb5ed01cd2428cd25b1c88a3a9cba87055eb289f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.3",
            "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f",
            "https://www.cve.org/CVERecord?id=CVE-2023-45871\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-45871\nhttps://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f"
        ]
    },
    "CVE-2023-46218": {
        "cve": "CVE-2023-46218",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "This flaw allows a malicious HTTP server to set \"super cookies\" in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl's function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with `domain=co.UK` when the URL used a lower\ncase hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-46218",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-4622": {
        "cve": "CVE-2023-4622",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation.\n\nThe unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free.\n\nWe recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4622",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.1.y&id=790c2f9d15b594350ae9bca7b236f2b1859de02c",
            "https://www.cve.org/CVERecord?id=CVE-2023-4622\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-4622\nhttps://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.1.y&id=790c2f9d15b594350ae9bca7b236f2b1859de02c"
        ]
    },
    "CVE-2023-4623": {
        "cve": "CVE-2023-4623",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4623",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f",
            "filename": "CVE-2023-4623-b3d26c5702c7d6c45456326e56d2ccf3f103e60f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4623/CVE-2023-4623-b3d26c5702c7d6c45456326e56d2ccf3f103e60f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f",
                "filename": "CVE-2023-4623-b3d26c5702c7d6c45456326e56d2ccf3f103e60f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4623/CVE-2023-4623-b3d26c5702c7d6c45456326e56d2ccf3f103e60f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f",
            "https://www.cve.org/CVERecord?id=CVE-2023-4623\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-4623\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f"
        ]
    },
    "CVE-2023-4641": {
        "cve": "CVE-2023-4641",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4641",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-46813": {
        "cve": "CVE-2023-46813",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-46813",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=63e44bc52047f182601e7817da969a105aa1f721",
            "filename": "CVE-2023-46813-63e44bc52047f182601e7817da969a105aa1f721.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-46813/CVE-2023-46813-63e44bc52047f182601e7817da969a105aa1f721.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=63e44bc52047f182601e7817da969a105aa1f721",
                "filename": "CVE-2023-46813-63e44bc52047f182601e7817da969a105aa1f721.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-46813/CVE-2023-46813-63e44bc52047f182601e7817da969a105aa1f721.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba",
                "filename": "CVE-2023-46813-a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-46813/CVE-2023-46813-a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf",
                "filename": "CVE-2023-46813-b9cb9c45583b911e0db71d09caa6b56469eb2bdf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-46813/CVE-2023-46813-b9cb9c45583b911e0db71d09caa6b56469eb2bdf.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf",
            "https://www.cve.org/CVERecord?id=CVE-2023-46813\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-46813\nhttps://bugzilla.suse.com/show_bug.cgi?id=1212649\nhttps://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf"
        ]
    },
    "CVE-2023-4692": {
        "cve": "CVE-2023-4692",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4692",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-4693": {
        "cve": "CVE-2023-4693",
        "cvss_v2": null,
        "cvss_v3": 5.3,
        "description": "An out-of-bounds read flaw was found on grub2's NTFS filesystem driver. This issue may allow a physically present attacker to present a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack allows sensitive data cached in memory or EFI variable values to be leaked, presenting a high Confidentiality risk.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4693",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-4732": {
        "cve": "CVE-2023-4732",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "A flaw was found in pfn_swap_entry_to_page in memory management subsystem in the Linux Kernel. In this flaw, an attacker with a local user privilege may cause a denial of service problem due to a BUG statement referencing pmd_t x.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4732",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-48795": {
        "cve": "CVE-2023-48795",
        "cvss_v2": null,
        "cvss_v3": 5.9,
        "description": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-48795",
        "selected_patch": {
            "url": "https://github.com/NixOS/nixpkgs/pull/275249",
            "patch_url": "https://github.com/NixOS/nixpkgs/pull/275249.patch",
            "filename": "CVE-2023-48795-https___github_com_NixOS_nixpkgs_pull_275249_patch.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-48795/CVE-2023-48795-https___github_com_NixOS_nixpkgs_pull_275249_patch.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/NixOS/nixpkgs/pull/275249",
                "patch_url": "https://github.com/NixOS/nixpkgs/pull/275249.patch",
                "filename": "CVE-2023-48795-https___github_com_NixOS_nixpkgs_pull_275249_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-48795/CVE-2023-48795-https___github_com_NixOS_nixpkgs_pull_275249_patch.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
                "patch_url": "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0.patch",
                "filename": "CVE-2023-48795-7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-48795/CVE-2023-48795-7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
                "patch_url": "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab.patch",
                "filename": "CVE-2023-48795-5c8b534f6e97db7ac0e0e579331213aa25c173ab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-48795/CVE-2023-48795-5c8b534f6e97db7ac0e0e579331213aa25c173ab.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
                "patch_url": "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d.patch",
                "filename": "CVE-2023-48795-9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-48795/CVE-2023-48795-9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
                "patch_url": "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5.patch",
                "filename": "CVE-2023-48795-8e972c5e94b460379fe0c7d20209c16df81538a5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-48795/CVE-2023-48795-8e972c5e94b460379fe0c7d20209c16df81538a5.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/libssh2/libssh2/pull/1291",
                "patch_url": "https://github.com/libssh2/libssh2/pull/1291.patch",
                "filename": "CVE-2023-48795-https___github_com_libssh2_libssh2_pull_1291_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-48795/CVE-2023-48795-https___github_com_libssh2_libssh2_pull_1291_patch.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
                "patch_url": "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3.patch",
                "filename": "CVE-2023-48795-97b223f8891b96d6fc054df5ab1d5a1a545da2a3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-48795/CVE-2023-48795-97b223f8891b96d6fc054df5ab1d5a1a545da2a3.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/mwiede/jsch/pull/461",
                "patch_url": "https://github.com/mwiede/jsch/pull/461.patch",
                "filename": "CVE-2023-48795-https___github_com_mwiede_jsch_pull_461_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-48795/CVE-2023-48795-https___github_com_mwiede_jsch_pull_461_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/NixOS/nixpkgs/pull/275249",
            "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
            "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
            "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
            "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
            "https://github.com/libssh2/libssh2/pull/1291",
            "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
            "https://github.com/mwiede/jsch/pull/461"
        ]
    },
    "CVE-2023-4921": {
        "cve": "CVE-2023-4921",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-4921",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8fc134fee27f2263988ae38920bc03da416b03d8",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=8fc134fee27f2263988ae38920bc03da416b03d8",
            "filename": "CVE-2023-4921-8fc134fee27f2263988ae38920bc03da416b03d8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4921/CVE-2023-4921-8fc134fee27f2263988ae38920bc03da416b03d8.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8fc134fee27f2263988ae38920bc03da416b03d8",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=8fc134fee27f2263988ae38920bc03da416b03d8",
                "filename": "CVE-2023-4921-8fc134fee27f2263988ae38920bc03da416b03d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-4921/CVE-2023-4921-8fc134fee27f2263988ae38920bc03da416b03d8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8fc134fee27f2263988ae38920bc03da416b03d8"
        ]
    },
    "CVE-2023-50387": {
        "cve": "CVE-2023-50387",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the \"KeyTrap\" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-50387",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-50868": {
        "cve": "CVE-2023-50868",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the \"NSEC3\" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-50868",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-5090": {
        "cve": "CVE-2023-5090",
        "cvss_v2": null,
        "cvss_v3": 6,
        "description": "A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-5090",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-51042": {
        "cve": "CVE-2023-51042",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-51042",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628",
            "patch_url": "https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628.patch",
            "filename": "CVE-2023-51042-2e54154b9f27262efd0cb4f903cc7d5ad1fe9628.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-51042/CVE-2023-51042-2e54154b9f27262efd0cb4f903cc7d5ad1fe9628.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628",
                "patch_url": "https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628.patch",
                "filename": "CVE-2023-51042-2e54154b9f27262efd0cb4f903cc7d5ad1fe9628.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-51042/CVE-2023-51042-2e54154b9f27262efd0cb4f903cc7d5ad1fe9628.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12",
            "https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628"
        ]
    },
    "CVE-2023-51385": {
        "cve": "CVE-2023-51385",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-51385",
        "selected_patch": {
            "url": "https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
            "patch_url": "https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a.patch",
            "filename": "CVE-2023-51385-7ef3787c84b6b524501211b11a26c742f829af1a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-51385/CVE-2023-51385-7ef3787c84b6b524501211b11a26c742f829af1a.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
                "patch_url": "https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a.patch",
                "filename": "CVE-2023-51385-7ef3787c84b6b524501211b11a26c742f829af1a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-51385/CVE-2023-51385-7ef3787c84b6b524501211b11a26c742f829af1a.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a"
        ]
    },
    "CVE-2023-51779": {
        "cve": "CVE-2023-51779",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-51779",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768",
            "patch_url": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768.patch",
            "filename": "CVE-2023-51779-2e07e8348ea454615e268222ae3fc240421be768.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-51779/CVE-2023-51779-2e07e8348ea454615e268222ae3fc240421be768.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768",
                "patch_url": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768.patch",
                "filename": "CVE-2023-51779-2e07e8348ea454615e268222ae3fc240421be768.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-51779/CVE-2023-51779-2e07e8348ea454615e268222ae3fc240421be768.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768"
        ]
    },
    "CVE-2023-5178": {
        "cve": "CVE-2023-5178",
        "cvss_v2": null,
        "cvss_v3": 8.8,
        "description": "A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-5178",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://lore.kernel.org/linux-nvme/",
            "https://lore.kernel.org/linux-nvme/20231002105428.226515-1-sagi@grimberg.me/",
            "https://www.cve.org/CVERecord?id=CVE-2023-5178\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-5178\nhttps://lore.kernel.org/linux-nvme/20231002105428.226515-1-sagi@grimberg.me/"
        ]
    },
    "CVE-2023-51780": {
        "cve": "CVE-2023-51780",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-51780",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3",
            "patch_url": "https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3.patch",
            "filename": "CVE-2023-51780-24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-51780/CVE-2023-51780-24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3",
                "patch_url": "https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3.patch",
                "filename": "CVE-2023-51780-24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-51780/CVE-2023-51780-24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8",
            "https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3"
        ]
    },
    "CVE-2023-52340": {
        "cve": "CVE-2023-52340",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52340",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch?id=af6d10345ca76670c1b7c37799f0d5576ccef277",
            "filename": "CVE-2023-52340-af6d10345ca76670c1b7c37799f0d5576ccef277.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52340/CVE-2023-52340-af6d10345ca76670c1b7c37799f0d5576ccef277.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch?id=af6d10345ca76670c1b7c37799f0d5576ccef277",
                "filename": "CVE-2023-52340-af6d10345ca76670c1b7c37799f0d5576ccef277.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52340/CVE-2023-52340-af6d10345ca76670c1b7c37799f0d5576ccef277.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277",
            "https://www.cve.org/CVERecord?id=CVE-2023-52340\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52340\nhttps://alas.aws.amazon.com/cve/html/CVE-2023-52340.html\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277"
        ]
    },
    "CVE-2023-52425": {
        "cve": "CVE-2023-52425",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52425",
        "selected_patch": {
            "url": "https://github.com/libexpat/libexpat/pull/789",
            "patch_url": "https://github.com/libexpat/libexpat/pull/789.patch",
            "filename": "CVE-2023-52425-https___github_com_libexpat_libexpat_pull_789_patch.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52425/CVE-2023-52425-https___github_com_libexpat_libexpat_pull_789_patch.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/libexpat/libexpat/pull/789",
                "patch_url": "https://github.com/libexpat/libexpat/pull/789.patch",
                "filename": "CVE-2023-52425-https___github_com_libexpat_libexpat_pull_789_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52425/CVE-2023-52425-https___github_com_libexpat_libexpat_pull_789_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/libexpat/libexpat/pull/789"
        ]
    },
    "CVE-2023-52434": {
        "cve": "CVE-2023-52434",
        "cvss_v2": null,
        "cvss_v3": 8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential OOBs in smb2_parse_contexts()\n\nValidate offsets and lengths before dereferencing create contexts in\nsmb2_parse_contexts().\n\nThis fixes following oops when accessing invalid create contexts from\nserver:\n\n  BUG: unable to handle page fault for address: ffff8881178d8cc3\n  #PF: supervisor read access in kernel mode\n  #PF: error_code(0x0000) - not-present page\n  PGD 4a01067 P4D 4a01067 PUD 0\n  Oops: 0000 [#1] PREEMPT SMP NOPTI\n  CPU: 3 PID: 1736 Comm: mount.cifs Not tainted 6.7.0-rc4 #1\n  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\n  rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014\n  RIP: 0010:smb2_parse_contexts+0xa0/0x3a0 [cifs]\n  Code: f8 10 75 13 48 b8 93 ad 25 50 9c b4 11 e7 49 39 06 0f 84 d2 00\n  00 00 8b 45 00 85 c0 74 61 41 29 c5 48 01 c5 41 83 fd 0f 76 55 <0f> b7\n  7d 04 0f b7 45 06 4c 8d 74 3d 00 66 83 f8 04 75 bc ba 04 00\n  RSP: 0018:ffffc900007939e0 EFLAGS: 00010216\n  RAX: ffffc90000793c78 RBX: ffff8880180cc000 RCX: ffffc90000793c90\n  RDX: ffffc90000793cc0 RSI: ffff8880178d8cc0 RDI: ffff8880180cc000\n  RBP: ffff8881178d8cbf R08: ffffc90000793c22 R09: 0000000000000000\n  R10: ffff8880180cc000 R11: 0000000000000024 R12: 0000000000000000\n  R13: 0000000000000020 R14: 0000000000000000 R15: ffffc90000793c22\n  FS: 00007f873753cbc0(0000) GS:ffff88806bc00000(0000)\n  knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: ffff8881178d8cc3 CR3: 00000000181ca000 CR4: 0000000000750ef0\n  PKRU: 55555554\n  Call Trace:\n   <TASK>\n   ? __die+0x23/0x70\n   ? page_fault_oops+0x181/0x480\n   ? search_module_extables+0x19/0x60\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? exc_page_fault+0x1b6/0x1c0\n   ? asm_exc_page_fault+0x26/0x30\n   ? smb2_parse_contexts+0xa0/0x3a0 [cifs]\n   SMB2_open+0x38d/0x5f0 [cifs]\n   ? smb2_is_path_accessible+0x138/0x260 [cifs]\n   smb2_is_path_accessible+0x138/0x260 [cifs]\n   cifs_is_path_remote+0x8d/0x230 [cifs]\n   cifs_mount+0x7e/0x350 [cifs]\n   cifs_smb3_do_mount+0x128/0x780 [cifs]\n   smb3_get_tree+0xd9/0x290 [cifs]\n   vfs_get_tree+0x2c/0x100\n   ? capable+0x37/0x70\n   path_mount+0x2d7/0xb80\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? _raw_spin_unlock_irqrestore+0x44/0x60\n   __x64_sys_mount+0x11a/0x150\n   do_syscall_64+0x47/0xf0\n   entry_SYSCALL_64_after_hwframe+0x6f/0x77\n  RIP: 0033:0x7f8737657b1e",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52434",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/13fb0fc4917621f3dfa285a27eaf7151d770b5e5",
            "patch_url": "https://git.kernel.org/stable/p/13fb0fc4917621f3dfa285a27eaf7151d770b5e5",
            "filename": "CVE-2023-52434-13fb0fc4917621f3dfa285a27eaf7151d770b5e5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52434/CVE-2023-52434-13fb0fc4917621f3dfa285a27eaf7151d770b5e5.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/13fb0fc4917621f3dfa285a27eaf7151d770b5e5",
                "patch_url": "https://git.kernel.org/stable/p/13fb0fc4917621f3dfa285a27eaf7151d770b5e5",
                "filename": "CVE-2023-52434-13fb0fc4917621f3dfa285a27eaf7151d770b5e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52434/CVE-2023-52434-13fb0fc4917621f3dfa285a27eaf7151d770b5e5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/17a0f64cc02d4972e21c733d9f21d1c512963afa",
                "patch_url": "https://git.kernel.org/stable/p/17a0f64cc02d4972e21c733d9f21d1c512963afa",
                "filename": "CVE-2023-52434-17a0f64cc02d4972e21c733d9f21d1c512963afa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52434/CVE-2023-52434-17a0f64cc02d4972e21c733d9f21d1c512963afa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1ae3c59355dc9882e09c020afe8ffbd895ad0f29",
                "patch_url": "https://git.kernel.org/stable/p/1ae3c59355dc9882e09c020afe8ffbd895ad0f29",
                "filename": "CVE-2023-52434-1ae3c59355dc9882e09c020afe8ffbd895ad0f29.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52434/CVE-2023-52434-1ae3c59355dc9882e09c020afe8ffbd895ad0f29.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6726429c18c62dbf5e96ebbd522f262e016553fb",
                "patch_url": "https://git.kernel.org/stable/p/6726429c18c62dbf5e96ebbd522f262e016553fb",
                "filename": "CVE-2023-52434-6726429c18c62dbf5e96ebbd522f262e016553fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52434/CVE-2023-52434-6726429c18c62dbf5e96ebbd522f262e016553fb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/890bc4fac3c0973a49cac35f634579bebba7fe48",
                "patch_url": "https://git.kernel.org/stable/p/890bc4fac3c0973a49cac35f634579bebba7fe48",
                "filename": "CVE-2023-52434-890bc4fac3c0973a49cac35f634579bebba7fe48.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52434/CVE-2023-52434-890bc4fac3c0973a49cac35f634579bebba7fe48.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/af1689a9b7701d9907dfc84d2a4b57c4bc907144",
                "patch_url": "https://git.kernel.org/stable/p/af1689a9b7701d9907dfc84d2a4b57c4bc907144",
                "filename": "CVE-2023-52434-af1689a9b7701d9907dfc84d2a4b57c4bc907144.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52434/CVE-2023-52434-af1689a9b7701d9907dfc84d2a4b57c4bc907144.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/13fb0fc4917621f3dfa285a27eaf7151d770b5e5",
            "https://git.kernel.org/stable/c/17a0f64cc02d4972e21c733d9f21d1c512963afa",
            "https://git.kernel.org/stable/c/1ae3c59355dc9882e09c020afe8ffbd895ad0f29",
            "https://git.kernel.org/stable/c/6726429c18c62dbf5e96ebbd522f262e016553fb",
            "https://git.kernel.org/stable/c/890bc4fac3c0973a49cac35f634579bebba7fe48",
            "https://git.kernel.org/stable/c/af1689a9b7701d9907dfc84d2a4b57c4bc907144",
            "https://www.cve.org/CVERecord?id=CVE-2023-52434\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52434\nhttps://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=17a0f64cc02d4972e21c733d9f21d1c512963afa\nhttps://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=af1689a9b7701d9907dfc84d2a4b57c4bc907144\nhttps://lore.kernel.org/linux-cve-announce/2024022033-makeshift-flammable-cb72@gregkh/T/#u"
        ]
    },
    "CVE-2023-52439": {
        "cve": "CVE-2023-52439",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nuio: Fix use-after-free in uio_open\n\ncore-1\t\t\t\tcore-2\n-------------------------------------------------------\nuio_unregister_device\t\tuio_open\n\t\t\t\tidev = idr_find()\ndevice_unregister(&idev->dev)\nput_device(&idev->dev)\nuio_device_release\n\t\t\t\tget_device(&idev->dev)\nkfree(idev)\nuio_free_minor(minor)\n\t\t\t\tuio_release\n\t\t\t\tput_device(&idev->dev)\n\t\t\t\tkfree(idev)\n-------------------------------------------------------\n\nIn the core-1 uio_unregister_device(), the device_unregister will kfree\nidev when the idev->dev kobject ref is 1. But after core-1\ndevice_unregister, put_device and before doing kfree, the core-2 may\nget_device. Then:\n1. After core-1 kfree idev, the core-2 will do use-after-free for idev.\n2. When core-2 do uio_release and put_device, the idev will be double\n   freed.\n\nTo address this issue, we can get idev atomic & inc idev reference with\nminor_lock.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52439",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/e93da893d52d82d57fc0db2ca566024e0f26ff50",
            "patch_url": "https://git.kernel.org/stable/p/e93da893d52d82d57fc0db2ca566024e0f26ff50",
            "filename": "CVE-2023-52439-e93da893d52d82d57fc0db2ca566024e0f26ff50.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52439/CVE-2023-52439-e93da893d52d82d57fc0db2ca566024e0f26ff50.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0c9ae0b8605078eafc3bea053cc78791e97ba2e2",
                "patch_url": "https://git.kernel.org/stable/p/0c9ae0b8605078eafc3bea053cc78791e97ba2e2",
                "filename": "CVE-2023-52439-0c9ae0b8605078eafc3bea053cc78791e97ba2e2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52439/CVE-2023-52439-0c9ae0b8605078eafc3bea053cc78791e97ba2e2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/17a8519cb359c3b483fb5c7367efa9a8a508bdea",
                "patch_url": "https://git.kernel.org/stable/p/17a8519cb359c3b483fb5c7367efa9a8a508bdea",
                "filename": "CVE-2023-52439-17a8519cb359c3b483fb5c7367efa9a8a508bdea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52439/CVE-2023-52439-17a8519cb359c3b483fb5c7367efa9a8a508bdea.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3174e0f7de1ba392dc191625da83df02d695b60c",
                "patch_url": "https://git.kernel.org/stable/p/3174e0f7de1ba392dc191625da83df02d695b60c",
                "filename": "CVE-2023-52439-3174e0f7de1ba392dc191625da83df02d695b60c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52439/CVE-2023-52439-3174e0f7de1ba392dc191625da83df02d695b60c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/35f102607054faafe78d2a6994b18d5d9d6e92ad",
                "patch_url": "https://git.kernel.org/stable/p/35f102607054faafe78d2a6994b18d5d9d6e92ad",
                "filename": "CVE-2023-52439-35f102607054faafe78d2a6994b18d5d9d6e92ad.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52439/CVE-2023-52439-35f102607054faafe78d2a6994b18d5d9d6e92ad.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5cf604ee538ed0c467abe3b4cda5308a6398f0f7",
                "patch_url": "https://git.kernel.org/stable/p/5cf604ee538ed0c467abe3b4cda5308a6398f0f7",
                "filename": "CVE-2023-52439-5cf604ee538ed0c467abe3b4cda5308a6398f0f7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52439/CVE-2023-52439-5cf604ee538ed0c467abe3b4cda5308a6398f0f7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5e0be1229ae199ebb90b33102f74a0f22d152570",
                "patch_url": "https://git.kernel.org/stable/p/5e0be1229ae199ebb90b33102f74a0f22d152570",
                "filename": "CVE-2023-52439-5e0be1229ae199ebb90b33102f74a0f22d152570.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52439/CVE-2023-52439-5e0be1229ae199ebb90b33102f74a0f22d152570.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/913205930da6213305616ac539447702eaa85e41",
                "patch_url": "https://git.kernel.org/stable/p/913205930da6213305616ac539447702eaa85e41",
                "filename": "CVE-2023-52439-913205930da6213305616ac539447702eaa85e41.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52439/CVE-2023-52439-913205930da6213305616ac539447702eaa85e41.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e93da893d52d82d57fc0db2ca566024e0f26ff50",
                "patch_url": "https://git.kernel.org/stable/p/e93da893d52d82d57fc0db2ca566024e0f26ff50",
                "filename": "CVE-2023-52439-e93da893d52d82d57fc0db2ca566024e0f26ff50.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52439/CVE-2023-52439-e93da893d52d82d57fc0db2ca566024e0f26ff50.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0c9ae0b8605078eafc3bea053cc78791e97ba2e2",
            "https://git.kernel.org/stable/c/17a8519cb359c3b483fb5c7367efa9a8a508bdea",
            "https://git.kernel.org/stable/c/3174e0f7de1ba392dc191625da83df02d695b60c",
            "https://git.kernel.org/stable/c/35f102607054faafe78d2a6994b18d5d9d6e92ad",
            "https://git.kernel.org/stable/c/5cf604ee538ed0c467abe3b4cda5308a6398f0f7",
            "https://git.kernel.org/stable/c/5e0be1229ae199ebb90b33102f74a0f22d152570",
            "https://git.kernel.org/stable/c/913205930da6213305616ac539447702eaa85e41",
            "https://git.kernel.org/stable/c/e93da893d52d82d57fc0db2ca566024e0f26ff50",
            "https://www.cve.org/CVERecord?id=CVE-2023-52439\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52439\nhttps://lore.kernel.org/linux-cve-announce/2024022026-wobbling-jumbo-748e@gregkh/T/#u"
        ]
    },
    "CVE-2023-52445": {
        "cve": "CVE-2023-52445",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix use after free on context disconnection\n\nUpon module load, a kthread is created targeting the\npvr2_context_thread_func function, which may call pvr2_context_destroy\nand thus call kfree() on the context object. However, that might happen\nbefore the usb hub_event handler is able to notify the driver. This\npatch adds a sanity check before the invalid read reported by syzbot,\nwithin the context disconnection call stack.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52445",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2cf0005d315549b8d2b940ff96a66c2a889aa795",
            "patch_url": "https://git.kernel.org/stable/p/2cf0005d315549b8d2b940ff96a66c2a889aa795",
            "filename": "CVE-2023-52445-2cf0005d315549b8d2b940ff96a66c2a889aa795.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52445/CVE-2023-52445-2cf0005d315549b8d2b940ff96a66c2a889aa795.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2cf0005d315549b8d2b940ff96a66c2a889aa795",
                "patch_url": "https://git.kernel.org/stable/p/2cf0005d315549b8d2b940ff96a66c2a889aa795",
                "filename": "CVE-2023-52445-2cf0005d315549b8d2b940ff96a66c2a889aa795.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52445/CVE-2023-52445-2cf0005d315549b8d2b940ff96a66c2a889aa795.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/30773ea47d41773f9611ffb4ebc9bda9d19a9e7e",
                "patch_url": "https://git.kernel.org/stable/p/30773ea47d41773f9611ffb4ebc9bda9d19a9e7e",
                "filename": "CVE-2023-52445-30773ea47d41773f9611ffb4ebc9bda9d19a9e7e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52445/CVE-2023-52445-30773ea47d41773f9611ffb4ebc9bda9d19a9e7e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3233d8bf7893550045682192cb227af7fa3defeb",
                "patch_url": "https://git.kernel.org/stable/p/3233d8bf7893550045682192cb227af7fa3defeb",
                "filename": "CVE-2023-52445-3233d8bf7893550045682192cb227af7fa3defeb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52445/CVE-2023-52445-3233d8bf7893550045682192cb227af7fa3defeb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/437b5f57732bb4cc32cc9f8895d2010ee9ff521c",
                "patch_url": "https://git.kernel.org/stable/p/437b5f57732bb4cc32cc9f8895d2010ee9ff521c",
                "filename": "CVE-2023-52445-437b5f57732bb4cc32cc9f8895d2010ee9ff521c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52445/CVE-2023-52445-437b5f57732bb4cc32cc9f8895d2010ee9ff521c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/47aa8fcd5e8b5563af4042a00f25ba89bef8f33d",
                "patch_url": "https://git.kernel.org/stable/p/47aa8fcd5e8b5563af4042a00f25ba89bef8f33d",
                "filename": "CVE-2023-52445-47aa8fcd5e8b5563af4042a00f25ba89bef8f33d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52445/CVE-2023-52445-47aa8fcd5e8b5563af4042a00f25ba89bef8f33d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ded85b0c0edd8f45fec88783d7555a5b982449c1",
                "patch_url": "https://git.kernel.org/stable/p/ded85b0c0edd8f45fec88783d7555a5b982449c1",
                "filename": "CVE-2023-52445-ded85b0c0edd8f45fec88783d7555a5b982449c1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52445/CVE-2023-52445-ded85b0c0edd8f45fec88783d7555a5b982449c1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ec3634ebe23fc3c44ebc67c6d25917300bc68c08",
                "patch_url": "https://git.kernel.org/stable/p/ec3634ebe23fc3c44ebc67c6d25917300bc68c08",
                "filename": "CVE-2023-52445-ec3634ebe23fc3c44ebc67c6d25917300bc68c08.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52445/CVE-2023-52445-ec3634ebe23fc3c44ebc67c6d25917300bc68c08.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ec36c134dd020d28e312c2f1766f85525e747aab",
                "patch_url": "https://git.kernel.org/stable/p/ec36c134dd020d28e312c2f1766f85525e747aab",
                "filename": "CVE-2023-52445-ec36c134dd020d28e312c2f1766f85525e747aab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52445/CVE-2023-52445-ec36c134dd020d28e312c2f1766f85525e747aab.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2cf0005d315549b8d2b940ff96a66c2a889aa795",
            "https://git.kernel.org/stable/c/30773ea47d41773f9611ffb4ebc9bda9d19a9e7e",
            "https://git.kernel.org/stable/c/3233d8bf7893550045682192cb227af7fa3defeb",
            "https://git.kernel.org/stable/c/437b5f57732bb4cc32cc9f8895d2010ee9ff521c",
            "https://git.kernel.org/stable/c/47aa8fcd5e8b5563af4042a00f25ba89bef8f33d",
            "https://git.kernel.org/stable/c/ded85b0c0edd8f45fec88783d7555a5b982449c1",
            "https://git.kernel.org/stable/c/ec3634ebe23fc3c44ebc67c6d25917300bc68c08",
            "https://git.kernel.org/stable/c/ec36c134dd020d28e312c2f1766f85525e747aab",
            "https://www.cve.org/CVERecord?id=CVE-2023-52445\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52445\nhttps://lore.kernel.org/linux-cve-announce/2024022253-CVE-2023-52445-07a6@gregkh/T/#u"
        ]
    },
    "CVE-2023-52448": {
        "cve": "CVE-2023-52448",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump\n\nSyzkaller has reported a NULL pointer dereference when accessing\nrgd->rd_rgl in gfs2_rgrp_dump().  This can happen when creating\nrgd->rd_gl fails in read_rindex_entry().  Add a NULL pointer check in\ngfs2_rgrp_dump() to prevent that.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52448",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/067a7c48c2c70f05f9460d6f0e8423e234729f05",
            "patch_url": "https://git.kernel.org/stable/p/067a7c48c2c70f05f9460d6f0e8423e234729f05",
            "filename": "CVE-2023-52448-067a7c48c2c70f05f9460d6f0e8423e234729f05.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52448/CVE-2023-52448-067a7c48c2c70f05f9460d6f0e8423e234729f05.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/067a7c48c2c70f05f9460d6f0e8423e234729f05",
                "patch_url": "https://git.kernel.org/stable/p/067a7c48c2c70f05f9460d6f0e8423e234729f05",
                "filename": "CVE-2023-52448-067a7c48c2c70f05f9460d6f0e8423e234729f05.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52448/CVE-2023-52448-067a7c48c2c70f05f9460d6f0e8423e234729f05.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5c28478af371a1c3fdb570ca67f110e1ae60fc37",
                "patch_url": "https://git.kernel.org/stable/p/5c28478af371a1c3fdb570ca67f110e1ae60fc37",
                "filename": "CVE-2023-52448-5c28478af371a1c3fdb570ca67f110e1ae60fc37.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52448/CVE-2023-52448-5c28478af371a1c3fdb570ca67f110e1ae60fc37.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8877243beafa7c6bfc42022cbfdf9e39b25bd4fa",
                "patch_url": "https://git.kernel.org/stable/p/8877243beafa7c6bfc42022cbfdf9e39b25bd4fa",
                "filename": "CVE-2023-52448-8877243beafa7c6bfc42022cbfdf9e39b25bd4fa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52448/CVE-2023-52448-8877243beafa7c6bfc42022cbfdf9e39b25bd4fa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c323efd620c741168c8e0cc6fc0be04ab57e331a",
                "patch_url": "https://git.kernel.org/stable/p/c323efd620c741168c8e0cc6fc0be04ab57e331a",
                "filename": "CVE-2023-52448-c323efd620c741168c8e0cc6fc0be04ab57e331a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52448/CVE-2023-52448-c323efd620c741168c8e0cc6fc0be04ab57e331a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d69d7804cf9e2ba171a27e5f98bc266f13d0414a",
                "patch_url": "https://git.kernel.org/stable/p/d69d7804cf9e2ba171a27e5f98bc266f13d0414a",
                "filename": "CVE-2023-52448-d69d7804cf9e2ba171a27e5f98bc266f13d0414a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52448/CVE-2023-52448-d69d7804cf9e2ba171a27e5f98bc266f13d0414a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ee0586d73cbaf0e7058bc640d62a9daf2dfa9178",
                "patch_url": "https://git.kernel.org/stable/p/ee0586d73cbaf0e7058bc640d62a9daf2dfa9178",
                "filename": "CVE-2023-52448-ee0586d73cbaf0e7058bc640d62a9daf2dfa9178.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52448/CVE-2023-52448-ee0586d73cbaf0e7058bc640d62a9daf2dfa9178.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/efc8ef87ab9185a23d5676f2f7d986022d91bcde",
                "patch_url": "https://git.kernel.org/stable/p/efc8ef87ab9185a23d5676f2f7d986022d91bcde",
                "filename": "CVE-2023-52448-efc8ef87ab9185a23d5676f2f7d986022d91bcde.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52448/CVE-2023-52448-efc8ef87ab9185a23d5676f2f7d986022d91bcde.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/067a7c48c2c70f05f9460d6f0e8423e234729f05",
            "https://git.kernel.org/stable/c/5c28478af371a1c3fdb570ca67f110e1ae60fc37",
            "https://git.kernel.org/stable/c/8877243beafa7c6bfc42022cbfdf9e39b25bd4fa",
            "https://git.kernel.org/stable/c/c323efd620c741168c8e0cc6fc0be04ab57e331a",
            "https://git.kernel.org/stable/c/d69d7804cf9e2ba171a27e5f98bc266f13d0414a",
            "https://git.kernel.org/stable/c/ee0586d73cbaf0e7058bc640d62a9daf2dfa9178",
            "https://git.kernel.org/stable/c/efc8ef87ab9185a23d5676f2f7d986022d91bcde",
            "https://www.cve.org/CVERecord?id=CVE-2023-52448\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52448\nhttps://lore.kernel.org/linux-cve-announce/2024022255-CVE-2023-52448-7bf2@gregkh/T/#u"
        ]
    },
    "CVE-2023-52451": {
        "cve": "CVE-2023-52451",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries/memhp: Fix access beyond end of drmem array\n\ndlpar_memory_remove_by_index() may access beyond the bounds of the\ndrmem lmb array when the LMB lookup fails to match an entry with the\ngiven DRC index. When the search fails, the cursor is left pointing to\n&drmem_info->lmbs[drmem_info->n_lmbs], which is one element past the\nlast valid entry in the array. The debug message at the end of the\nfunction then dereferences this pointer:\n\n        pr_debug(\"Failed to hot-remove memory at %llx\\n\",\n                 lmb->base_addr);\n\nThis was found by inspection and confirmed with KASAN:\n\n  pseries-hotplug-mem: Attempting to hot-remove LMB, drc index 1234\n  ==================================================================\n  BUG: KASAN: slab-out-of-bounds in dlpar_memory+0x298/0x1658\n  Read of size 8 at addr c000000364e97fd0 by task bash/949\n\n  dump_stack_lvl+0xa4/0xfc (unreliable)\n  print_report+0x214/0x63c\n  kasan_report+0x140/0x2e0\n  __asan_load8+0xa8/0xe0\n  dlpar_memory+0x298/0x1658\n  handle_dlpar_errorlog+0x130/0x1d0\n  dlpar_store+0x18c/0x3e0\n  kobj_attr_store+0x68/0xa0\n  sysfs_kf_write+0xc4/0x110\n  kernfs_fop_write_iter+0x26c/0x390\n  vfs_write+0x2d4/0x4e0\n  ksys_write+0xac/0x1a0\n  system_call_exception+0x268/0x530\n  system_call_vectored_common+0x15c/0x2ec\n\n  Allocated by task 1:\n   kasan_save_stack+0x48/0x80\n   kasan_set_track+0x34/0x50\n   kasan_save_alloc_info+0x34/0x50\n   __kasan_kmalloc+0xd0/0x120\n   __kmalloc+0x8c/0x320\n   kmalloc_array.constprop.0+0x48/0x5c\n   drmem_init+0x2a0/0x41c\n   do_one_initcall+0xe0/0x5c0\n   kernel_init_freeable+0x4ec/0x5a0\n   kernel_init+0x30/0x1e0\n   ret_from_kernel_user_thread+0x14/0x1c\n\n  The buggy address belongs to the object at c000000364e80000\n   which belongs to the cache kmalloc-128k of size 131072\n  The buggy address is located 0 bytes to the right of\n   allocated 98256-byte region [c000000364e80000, c000000364e97fd0)\n\n  ==================================================================\n  pseries-hotplug-mem: Failed to hot-remove memory at 0\n\nLog failed lookups with a separate message and dereference the\ncursor only when it points to a valid entry.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52451",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/026fd977dc50ff4a5e09bfb0603557f104d3f3a0",
            "patch_url": "https://git.kernel.org/stable/p/026fd977dc50ff4a5e09bfb0603557f104d3f3a0",
            "filename": "CVE-2023-52451-026fd977dc50ff4a5e09bfb0603557f104d3f3a0.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52451/CVE-2023-52451-026fd977dc50ff4a5e09bfb0603557f104d3f3a0.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/026fd977dc50ff4a5e09bfb0603557f104d3f3a0",
                "patch_url": "https://git.kernel.org/stable/p/026fd977dc50ff4a5e09bfb0603557f104d3f3a0",
                "filename": "CVE-2023-52451-026fd977dc50ff4a5e09bfb0603557f104d3f3a0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52451/CVE-2023-52451-026fd977dc50ff4a5e09bfb0603557f104d3f3a0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/708a4b59baad96c4718dc0bd3a3427d3ab22fedc",
                "patch_url": "https://git.kernel.org/stable/p/708a4b59baad96c4718dc0bd3a3427d3ab22fedc",
                "filename": "CVE-2023-52451-708a4b59baad96c4718dc0bd3a3427d3ab22fedc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52451/CVE-2023-52451-708a4b59baad96c4718dc0bd3a3427d3ab22fedc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/999a27b3ce9a69d54ccd5db000ec3a447bc43e6d",
                "patch_url": "https://git.kernel.org/stable/p/999a27b3ce9a69d54ccd5db000ec3a447bc43e6d",
                "filename": "CVE-2023-52451-999a27b3ce9a69d54ccd5db000ec3a447bc43e6d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52451/CVE-2023-52451-999a27b3ce9a69d54ccd5db000ec3a447bc43e6d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9b5f03500bc5b083c0df696d7dd169d7ef3dd0c7",
                "patch_url": "https://git.kernel.org/stable/p/9b5f03500bc5b083c0df696d7dd169d7ef3dd0c7",
                "filename": "CVE-2023-52451-9b5f03500bc5b083c0df696d7dd169d7ef3dd0c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52451/CVE-2023-52451-9b5f03500bc5b083c0df696d7dd169d7ef3dd0c7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b582aa1f66411d4adcc1aa55b8c575683fb4687e",
                "patch_url": "https://git.kernel.org/stable/p/b582aa1f66411d4adcc1aa55b8c575683fb4687e",
                "filename": "CVE-2023-52451-b582aa1f66411d4adcc1aa55b8c575683fb4687e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52451/CVE-2023-52451-b582aa1f66411d4adcc1aa55b8c575683fb4687e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bb79613a9a704469ddb8d6c6029d532a5cea384c",
                "patch_url": "https://git.kernel.org/stable/p/bb79613a9a704469ddb8d6c6029d532a5cea384c",
                "filename": "CVE-2023-52451-bb79613a9a704469ddb8d6c6029d532a5cea384c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52451/CVE-2023-52451-bb79613a9a704469ddb8d6c6029d532a5cea384c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bd68ffce69f6cf8ddd3a3c32549d1d2275e49fc5",
                "patch_url": "https://git.kernel.org/stable/p/bd68ffce69f6cf8ddd3a3c32549d1d2275e49fc5",
                "filename": "CVE-2023-52451-bd68ffce69f6cf8ddd3a3c32549d1d2275e49fc5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52451/CVE-2023-52451-bd68ffce69f6cf8ddd3a3c32549d1d2275e49fc5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/df16afba2378d985359812c865a15c05c70a967e",
                "patch_url": "https://git.kernel.org/stable/p/df16afba2378d985359812c865a15c05c70a967e",
                "filename": "CVE-2023-52451-df16afba2378d985359812c865a15c05c70a967e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52451/CVE-2023-52451-df16afba2378d985359812c865a15c05c70a967e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/026fd977dc50ff4a5e09bfb0603557f104d3f3a0",
            "https://git.kernel.org/stable/c/708a4b59baad96c4718dc0bd3a3427d3ab22fedc",
            "https://git.kernel.org/stable/c/999a27b3ce9a69d54ccd5db000ec3a447bc43e6d",
            "https://git.kernel.org/stable/c/9b5f03500bc5b083c0df696d7dd169d7ef3dd0c7",
            "https://git.kernel.org/stable/c/b582aa1f66411d4adcc1aa55b8c575683fb4687e",
            "https://git.kernel.org/stable/c/bb79613a9a704469ddb8d6c6029d532a5cea384c",
            "https://git.kernel.org/stable/c/bd68ffce69f6cf8ddd3a3c32549d1d2275e49fc5",
            "https://git.kernel.org/stable/c/df16afba2378d985359812c865a15c05c70a967e",
            "https://www.cve.org/CVERecord?id=CVE-2023-52451\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52451\nhttps://lore.kernel.org/linux-cve-announce/2024022257-CVE-2023-52451-7bdb@gregkh/T/#u"
        ]
    },
    "CVE-2023-52463": {
        "cve": "CVE-2023-52463",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: force RO when remounting if SetVariable is not supported\n\nIf SetVariable at runtime is not supported by the firmware we never assign\na callback for that function. At the same time mount the efivarfs as\nRO so no one can call that.  However, we never check the permission flags\nwhen someone remounts the filesystem as RW. As a result this leads to a\ncrash looking like this:\n\n$ mount -o remount,rw /sys/firmware/efi/efivars\n$ efi-updatevar -f PK.auth PK\n\n[  303.279166] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n[  303.280482] Mem abort info:\n[  303.280854]   ESR = 0x0000000086000004\n[  303.281338]   EC = 0x21: IABT (current EL), IL = 32 bits\n[  303.282016]   SET = 0, FnV = 0\n[  303.282414]   EA = 0, S1PTW = 0\n[  303.282821]   FSC = 0x04: level 0 translation fault\n[  303.283771] user pgtable: 4k pages, 48-bit VAs, pgdp=000000004258c000\n[  303.284913] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n[  303.286076] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP\n[  303.286936] Modules linked in: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6\n[  303.288586] CPU: 1 PID: 755 Comm: efi-updatevar Not tainted 6.3.0-rc1-00108-gc7d0c4695c68 #1\n[  303.289748] Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.04-00627-g88336918701d 04/01/2023\n[  303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[  303.292123] pc : 0x0\n[  303.292443] lr : efivar_set_variable_locked+0x74/0xec\n[  303.293156] sp : ffff800008673c10\n[  303.293619] x29: ffff800008673c10 x28: ffff0000037e8000 x27: 0000000000000000\n[  303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027\n[  303.295572] x23: ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000\n[  303.296566] x20: 0000000000000001 x19: 00000000000007fc x18: 0000000000000000\n[  303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54\n[  303.298495] x14: ed37489f673633c0 x13: 71c45c606de13f80 x12: 47464259e219acf4\n[  303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9 : 0000000000000002\n[  303.300431] x8 : 0000000000000010 x7 : ffffd49ea8973230 x6 : 0000000000a85201\n[  303.301412] x5 : 0000000000000000 x4 : ffff0000020c9800 x3 : 00000000000007fc\n[  303.302370] x2 : 0000000000000027 x1 : ffff000002467400 x0 : ffff000002467000\n[  303.303341] Call trace:\n[  303.303679]  0x0\n[  303.303938]  efivar_entry_set_get_size+0x98/0x16c\n[  303.304585]  efivarfs_file_write+0xd0/0x1a4\n[  303.305148]  vfs_write+0xc4/0x2e4\n[  303.305601]  ksys_write+0x70/0x104\n[  303.306073]  __arm64_sys_write+0x1c/0x28\n[  303.306622]  invoke_syscall+0x48/0x114\n[  303.307156]  el0_svc_common.constprop.0+0x44/0xec\n[  303.307803]  do_el0_svc+0x38/0x98\n[  303.308268]  el0_svc+0x2c/0x84\n[  303.308702]  el0t_64_sync_handler+0xf4/0x120\n[  303.309293]  el0t_64_sync+0x190/0x194\n[  303.309794] Code: ???????? ???????? ???????? ???????? (????????)\n[  303.310612] ---[ end trace 0000000000000000 ]---\n\nFix this by adding a .reconfigure() function to the fs operations which\nwe can use to check the requested flags and deny anything that's not RO\nif the firmware doesn't implement SetVariable at runtime.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52463",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/d4a9aa7db574a0da64307729cc031fb68597aa8b",
            "patch_url": "https://git.kernel.org/stable/p/d4a9aa7db574a0da64307729cc031fb68597aa8b",
            "filename": "CVE-2023-52463-d4a9aa7db574a0da64307729cc031fb68597aa8b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52463/CVE-2023-52463-d4a9aa7db574a0da64307729cc031fb68597aa8b.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0049fe7e4a85849bdd778cdb72e51a791ff3d737",
                "patch_url": "https://git.kernel.org/stable/p/0049fe7e4a85849bdd778cdb72e51a791ff3d737",
                "filename": "CVE-2023-52463-0049fe7e4a85849bdd778cdb72e51a791ff3d737.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52463/CVE-2023-52463-0049fe7e4a85849bdd778cdb72e51a791ff3d737.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0e8d2444168dd519fea501599d150e62718ed2fe",
                "patch_url": "https://git.kernel.org/stable/p/0e8d2444168dd519fea501599d150e62718ed2fe",
                "filename": "CVE-2023-52463-0e8d2444168dd519fea501599d150e62718ed2fe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52463/CVE-2023-52463-0e8d2444168dd519fea501599d150e62718ed2fe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2aa141f8bc580f8f9811dfe4e0e6009812b73826",
                "patch_url": "https://git.kernel.org/stable/p/2aa141f8bc580f8f9811dfe4e0e6009812b73826",
                "filename": "CVE-2023-52463-2aa141f8bc580f8f9811dfe4e0e6009812b73826.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52463/CVE-2023-52463-2aa141f8bc580f8f9811dfe4e0e6009812b73826.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8",
                "patch_url": "https://git.kernel.org/stable/p/94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8",
                "filename": "CVE-2023-52463-94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52463/CVE-2023-52463-94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d4a714873db0866cc471521114eeac4a5072d548",
                "patch_url": "https://git.kernel.org/stable/p/d4a714873db0866cc471521114eeac4a5072d548",
                "filename": "CVE-2023-52463-d4a714873db0866cc471521114eeac4a5072d548.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52463/CVE-2023-52463-d4a714873db0866cc471521114eeac4a5072d548.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d4a9aa7db574a0da64307729cc031fb68597aa8b",
                "patch_url": "https://git.kernel.org/stable/p/d4a9aa7db574a0da64307729cc031fb68597aa8b",
                "filename": "CVE-2023-52463-d4a9aa7db574a0da64307729cc031fb68597aa8b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52463/CVE-2023-52463-d4a9aa7db574a0da64307729cc031fb68597aa8b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0049fe7e4a85849bdd778cdb72e51a791ff3d737",
            "https://git.kernel.org/stable/c/0e8d2444168dd519fea501599d150e62718ed2fe",
            "https://git.kernel.org/stable/c/2aa141f8bc580f8f9811dfe4e0e6009812b73826",
            "https://git.kernel.org/stable/c/94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8",
            "https://git.kernel.org/stable/c/d4a714873db0866cc471521114eeac4a5072d548",
            "https://git.kernel.org/stable/c/d4a9aa7db574a0da64307729cc031fb68597aa8b",
            "https://www.cve.org/CVERecord?id=CVE-2023-52463\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52463\nhttps://lore.kernel.org/linux-cve-announce/2024022335-CVE-2023-52463-6195@gregkh/T/#u"
        ]
    },
    "CVE-2023-52464": {
        "cve": "CVE-2023-52464",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/thunderx: Fix possible out-of-bounds string access\n\nEnabling -Wstringop-overflow globally exposes a warning for a common bug\nin the usage of strncat():\n\n  drivers/edac/thunderx_edac.c: In function 'thunderx_ocx_com_threaded_isr':\n  drivers/edac/thunderx_edac.c:1136:17: error: 'strncat' specified bound 1024 equals destination size [-Werror=stringop-overflow=]\n   1136 |                 strncat(msg, other, OCX_MESSAGE_SIZE);\n        |                 ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n   ...\n   1145 |                                 strncat(msg, other, OCX_MESSAGE_SIZE);\n   ...\n   1150 |                                 strncat(msg, other, OCX_MESSAGE_SIZE);\n\n   ...\n\nApparently the author of this driver expected strncat() to behave the\nway that strlcat() does, which uses the size of the destination buffer\nas its third argument rather than the length of the source buffer. The\nresult is that there is no check on the size of the allocated buffer.\n\nChange it to strlcat().\n\n  [ bp: Trim compiler output, fixup commit message. ]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52464",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5",
            "patch_url": "https://git.kernel.org/stable/p/426fae93c01dffa379225eb2bd4d3cdc42c6eec5",
            "filename": "CVE-2023-52464-426fae93c01dffa379225eb2bd4d3cdc42c6eec5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52464/CVE-2023-52464-426fae93c01dffa379225eb2bd4d3cdc42c6eec5.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5",
                "patch_url": "https://git.kernel.org/stable/p/426fae93c01dffa379225eb2bd4d3cdc42c6eec5",
                "filename": "CVE-2023-52464-426fae93c01dffa379225eb2bd4d3cdc42c6eec5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52464/CVE-2023-52464-426fae93c01dffa379225eb2bd4d3cdc42c6eec5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8",
                "patch_url": "https://git.kernel.org/stable/p/475c58e1a471e9b873e3e39958c64a2d278275c8",
                "filename": "CVE-2023-52464-475c58e1a471e9b873e3e39958c64a2d278275c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52464/CVE-2023-52464-475c58e1a471e9b873e3e39958c64a2d278275c8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6",
                "patch_url": "https://git.kernel.org/stable/p/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6",
                "filename": "CVE-2023-52464-5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52464/CVE-2023-52464-5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a",
                "patch_url": "https://git.kernel.org/stable/p/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a",
                "filename": "CVE-2023-52464-6aa7865ba7ff7f0ede0035180fb3b9400ceb405a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52464/CVE-2023-52464-6aa7865ba7ff7f0ede0035180fb3b9400ceb405a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21",
                "patch_url": "https://git.kernel.org/stable/p/700cf4bead80fac994dcc43ae1ca5d86d8959b21",
                "filename": "CVE-2023-52464-700cf4bead80fac994dcc43ae1ca5d86d8959b21.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52464/CVE-2023-52464-700cf4bead80fac994dcc43ae1ca5d86d8959b21.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601",
                "patch_url": "https://git.kernel.org/stable/p/71c17ee02538802ceafc830f0736aa35b564e601",
                "filename": "CVE-2023-52464-71c17ee02538802ceafc830f0736aa35b564e601.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52464/CVE-2023-52464-71c17ee02538802ceafc830f0736aa35b564e601.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398",
                "patch_url": "https://git.kernel.org/stable/p/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398",
                "filename": "CVE-2023-52464-9dbac9fdae6e3b411fc4c3fca3bf48f70609c398.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52464/CVE-2023-52464-9dbac9fdae6e3b411fc4c3fca3bf48f70609c398.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057",
                "patch_url": "https://git.kernel.org/stable/p/e1c86511241588efffaa49556196f09a498d5057",
                "filename": "CVE-2023-52464-e1c86511241588efffaa49556196f09a498d5057.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52464/CVE-2023-52464-e1c86511241588efffaa49556196f09a498d5057.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5",
            "https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8",
            "https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6",
            "https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a",
            "https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21",
            "https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601",
            "https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398",
            "https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057",
            "https://www.cve.org/CVERecord?id=CVE-2023-52464\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52464\nhttps://lore.kernel.org/linux-cve-announce/2024022336-CVE-2023-52464-b17c@gregkh/T/#u"
        ]
    },
    "CVE-2023-52469": {
        "cve": "CVE-2023-52469",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers/amd/pm: fix a use-after-free in kv_parse_power_table\n\nWhen ps allocated by kzalloc equals to NULL, kv_parse_power_table\nfrees adev->pm.dpm.ps that allocated before. However, after the control\nflow goes through the following call chains:\n\nkv_parse_power_table\n  |-> kv_dpm_init\n        |-> kv_dpm_sw_init\n\t      |-> kv_dpm_fini\n\nThe adev->pm.dpm.ps is used in the for loop of kv_dpm_fini after its\nfirst free in kv_parse_power_table and causes a use-after-free bug.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52469",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/35fa2394d26e919f63600ce631e6aefc95ec2706",
            "patch_url": "https://git.kernel.org/stable/p/35fa2394d26e919f63600ce631e6aefc95ec2706",
            "filename": "CVE-2023-52469-35fa2394d26e919f63600ce631e6aefc95ec2706.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52469/CVE-2023-52469-35fa2394d26e919f63600ce631e6aefc95ec2706.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/28dd788382c43b330480f57cd34cde0840896743",
                "patch_url": "https://git.kernel.org/stable/p/28dd788382c43b330480f57cd34cde0840896743",
                "filename": "CVE-2023-52469-28dd788382c43b330480f57cd34cde0840896743.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52469/CVE-2023-52469-28dd788382c43b330480f57cd34cde0840896743.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3426f059eacc33ecc676b0d66539297e1cfafd02",
                "patch_url": "https://git.kernel.org/stable/p/3426f059eacc33ecc676b0d66539297e1cfafd02",
                "filename": "CVE-2023-52469-3426f059eacc33ecc676b0d66539297e1cfafd02.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52469/CVE-2023-52469-3426f059eacc33ecc676b0d66539297e1cfafd02.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/35fa2394d26e919f63600ce631e6aefc95ec2706",
                "patch_url": "https://git.kernel.org/stable/p/35fa2394d26e919f63600ce631e6aefc95ec2706",
                "filename": "CVE-2023-52469-35fa2394d26e919f63600ce631e6aefc95ec2706.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52469/CVE-2023-52469-35fa2394d26e919f63600ce631e6aefc95ec2706.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/520e213a0b97b64735a13950e9371e0a5d7a5dc3",
                "patch_url": "https://git.kernel.org/stable/p/520e213a0b97b64735a13950e9371e0a5d7a5dc3",
                "filename": "CVE-2023-52469-520e213a0b97b64735a13950e9371e0a5d7a5dc3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52469/CVE-2023-52469-520e213a0b97b64735a13950e9371e0a5d7a5dc3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e",
                "patch_url": "https://git.kernel.org/stable/p/8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e",
                "filename": "CVE-2023-52469-8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52469/CVE-2023-52469-8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8b55b06e737feb2a645b0293ea27e38418876d63",
                "patch_url": "https://git.kernel.org/stable/p/8b55b06e737feb2a645b0293ea27e38418876d63",
                "filename": "CVE-2023-52469-8b55b06e737feb2a645b0293ea27e38418876d63.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52469/CVE-2023-52469-8b55b06e737feb2a645b0293ea27e38418876d63.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/95084632a65d5c0d682a83b55935560bdcd2a1e3",
                "patch_url": "https://git.kernel.org/stable/p/95084632a65d5c0d682a83b55935560bdcd2a1e3",
                "filename": "CVE-2023-52469-95084632a65d5c0d682a83b55935560bdcd2a1e3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52469/CVE-2023-52469-95084632a65d5c0d682a83b55935560bdcd2a1e3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b6dcba02ee178282e0d28684d241e0b8462dea6a",
                "patch_url": "https://git.kernel.org/stable/p/b6dcba02ee178282e0d28684d241e0b8462dea6a",
                "filename": "CVE-2023-52469-b6dcba02ee178282e0d28684d241e0b8462dea6a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52469/CVE-2023-52469-b6dcba02ee178282e0d28684d241e0b8462dea6a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/28dd788382c43b330480f57cd34cde0840896743",
            "https://git.kernel.org/stable/c/3426f059eacc33ecc676b0d66539297e1cfafd02",
            "https://git.kernel.org/stable/c/35fa2394d26e919f63600ce631e6aefc95ec2706",
            "https://git.kernel.org/stable/c/520e213a0b97b64735a13950e9371e0a5d7a5dc3",
            "https://git.kernel.org/stable/c/8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e",
            "https://git.kernel.org/stable/c/8b55b06e737feb2a645b0293ea27e38418876d63",
            "https://git.kernel.org/stable/c/95084632a65d5c0d682a83b55935560bdcd2a1e3",
            "https://git.kernel.org/stable/c/b6dcba02ee178282e0d28684d241e0b8462dea6a",
            "https://www.cve.org/CVERecord?id=CVE-2023-52469\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52469\nhttps://git.kernel.org/stable/c/28dd788382c43b330480f57cd34cde0840896743\nhttps://git.kernel.org/stable/c/3426f059eacc33ecc676b0d66539297e1cfafd02\nhttps://git.kernel.org/stable/c/35fa2394d26e919f63600ce631e6aefc95ec2706\nhttps://git.kernel.org/stable/c/520e213a0b97b64735a13950e9371e0a5d7a5dc3\nhttps://git.kernel.org/stable/c/8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e\nhttps://git.kernel.org/stable/c/8b55b06e737feb2a645b0293ea27e38418876d63\nhttps://git.kernel.org/stable/c/95084632a65d5c0d682a83b55935560bdcd2a1e3\nhttps://git.kernel.org/stable/c/b6dcba02ee178282e0d28684d241e0b8462dea6a"
        ]
    },
    "CVE-2023-52470": {
        "cve": "CVE-2023-52470",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: check the alloc_workqueue return value in radeon_crtc_init()\n\ncheck the alloc_workqueue return value in radeon_crtc_init()\nto avoid null-ptr-deref.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52470",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088",
            "patch_url": "https://git.kernel.org/stable/p/0b813a6a0087451cb702b6eb841f10856f49d088",
            "filename": "CVE-2023-52470-0b813a6a0087451cb702b6eb841f10856f49d088.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52470/CVE-2023-52470-0b813a6a0087451cb702b6eb841f10856f49d088.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088",
                "patch_url": "https://git.kernel.org/stable/p/0b813a6a0087451cb702b6eb841f10856f49d088",
                "filename": "CVE-2023-52470-0b813a6a0087451cb702b6eb841f10856f49d088.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52470/CVE-2023-52470-0b813a6a0087451cb702b6eb841f10856f49d088.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1",
                "patch_url": "https://git.kernel.org/stable/p/14bbfaa5df273b26cde6707f6e655585700e6fe1",
                "filename": "CVE-2023-52470-14bbfaa5df273b26cde6707f6e655585700e6fe1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52470/CVE-2023-52470-14bbfaa5df273b26cde6707f6e655585700e6fe1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41",
                "patch_url": "https://git.kernel.org/stable/p/21b1645660717d6126dd4866c850fcc5c4703a41",
                "filename": "CVE-2023-52470-21b1645660717d6126dd4866c850fcc5c4703a41.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52470/CVE-2023-52470-21b1645660717d6126dd4866c850fcc5c4703a41.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb",
                "patch_url": "https://git.kernel.org/stable/p/57ca7984806d79b38af528de88fd803babf27feb",
                "filename": "CVE-2023-52470-57ca7984806d79b38af528de88fd803babf27feb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52470/CVE-2023-52470-57ca7984806d79b38af528de88fd803babf27feb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4",
                "patch_url": "https://git.kernel.org/stable/p/5d12c5d75f7c78b83a738025947651ec5c95b4d4",
                "filename": "CVE-2023-52470-5d12c5d75f7c78b83a738025947651ec5c95b4d4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52470/CVE-2023-52470-5d12c5d75f7c78b83a738025947651ec5c95b4d4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310",
                "patch_url": "https://git.kernel.org/stable/p/7a2464fac80d42f6f8819fed97a553e9c2f43310",
                "filename": "CVE-2023-52470-7a2464fac80d42f6f8819fed97a553e9c2f43310.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52470/CVE-2023-52470-7a2464fac80d42f6f8819fed97a553e9c2f43310.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85",
                "patch_url": "https://git.kernel.org/stable/p/c4ff55408187f2595066967047363ca84e76db85",
                "filename": "CVE-2023-52470-c4ff55408187f2595066967047363ca84e76db85.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52470/CVE-2023-52470-c4ff55408187f2595066967047363ca84e76db85.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97",
                "patch_url": "https://git.kernel.org/stable/p/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97",
                "filename": "CVE-2023-52470-fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52470/CVE-2023-52470-fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088",
            "https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1",
            "https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41",
            "https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb",
            "https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4",
            "https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310",
            "https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85",
            "https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97",
            "https://www.cve.org/CVERecord?id=CVE-2023-52470\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52470\nhttps://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088\nhttps://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1\nhttps://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41\nhttps://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb\nhttps://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4\nhttps://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310\nhttps://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85\nhttps://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97"
        ]
    },
    "CVE-2023-52471": {
        "cve": "CVE-2023-52471",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix some null pointer dereference issues in ice_ptp.c\n\ndevm_kasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52471",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf",
            "patch_url": "https://git.kernel.org/stable/p/3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf",
            "filename": "CVE-2023-52471-3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52471/CVE-2023-52471-3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf",
                "patch_url": "https://git.kernel.org/stable/p/3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf",
                "filename": "CVE-2023-52471-3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52471/CVE-2023-52471-3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3cd9b9bee33f39f6c6d52360fe381b89a7b12695",
                "patch_url": "https://git.kernel.org/stable/p/3cd9b9bee33f39f6c6d52360fe381b89a7b12695",
                "filename": "CVE-2023-52471-3cd9b9bee33f39f6c6d52360fe381b89a7b12695.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52471/CVE-2023-52471-3cd9b9bee33f39f6c6d52360fe381b89a7b12695.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf",
            "https://git.kernel.org/stable/c/3cd9b9bee33f39f6c6d52360fe381b89a7b12695",
            "https://www.cve.org/CVERecord?id=CVE-2023-52471\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52471\nhttps://git.kernel.org/stable/c/3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf\nhttps://git.kernel.org/stable/c/3cd9b9bee33f39f6c6d52360fe381b89a7b12695"
        ]
    },
    "CVE-2023-52476": {
        "cve": "CVE-2023-52476",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/x86/lbr: Filter vsyscall addresses\n\nWe found that a panic can occur when a vsyscall is made while LBR sampling\nis active. If the vsyscall is interrupted (NMI) for perf sampling, this\ncall sequence can occur (most recent at top):\n\n    __insn_get_emulate_prefix()\n    insn_get_emulate_prefix()\n    insn_get_prefixes()\n    insn_get_opcode()\n    decode_branch_type()\n    get_branch_type()\n    intel_pmu_lbr_filter()\n    intel_pmu_handle_irq()\n    perf_event_nmi_handler()\n\nWithin __insn_get_emulate_prefix() at frame 0, a macro is called:\n\n    peek_nbyte_next(insn_byte_t, insn, i)\n\nWithin this macro, this dereference occurs:\n\n    (insn)->next_byte\n\nInspecting registers at this point, the value of the next_byte field is the\naddress of the vsyscall made, for example the location of the vsyscall\nversion of gettimeofday() at 0xffffffffff600000. The access to an address\nin the vsyscall region will trigger an oops due to an unhandled page fault.\n\nTo fix the bug, filtering for vsyscalls can be done when\ndetermining the branch type. This patch will return\na \"none\" branch if a kernel address if found to lie in the\nvsyscall region.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52476",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c",
            "patch_url": "https://git.kernel.org/stable/p/3863989497652488a50f00e96de4331e5efabc6c",
            "filename": "CVE-2023-52476-3863989497652488a50f00e96de4331e5efabc6c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52476/CVE-2023-52476-3863989497652488a50f00e96de4331e5efabc6c.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c",
                "patch_url": "https://git.kernel.org/stable/p/3863989497652488a50f00e96de4331e5efabc6c",
                "filename": "CVE-2023-52476-3863989497652488a50f00e96de4331e5efabc6c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52476/CVE-2023-52476-3863989497652488a50f00e96de4331e5efabc6c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c",
                "patch_url": "https://git.kernel.org/stable/p/403d201d1fd144cb249836dafb222f6375871c6c",
                "filename": "CVE-2023-52476-403d201d1fd144cb249836dafb222f6375871c6c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52476/CVE-2023-52476-403d201d1fd144cb249836dafb222f6375871c6c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265",
                "patch_url": "https://git.kernel.org/stable/p/e53899771a02f798d436655efbd9d4b46c0f9265",
                "filename": "CVE-2023-52476-e53899771a02f798d436655efbd9d4b46c0f9265.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52476/CVE-2023-52476-e53899771a02f798d436655efbd9d4b46c0f9265.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db",
                "patch_url": "https://git.kernel.org/stable/p/f71edacbd4f99c0e12fe4a4007ab4d687d0688db",
                "filename": "CVE-2023-52476-f71edacbd4f99c0e12fe4a4007ab4d687d0688db.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52476/CVE-2023-52476-f71edacbd4f99c0e12fe4a4007ab4d687d0688db.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c",
            "https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c",
            "https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265",
            "https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db",
            "https://www.cve.org/CVERecord?id=CVE-2023-52476\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52476\nhttps://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52476-e307@gregkh/T/#u"
        ]
    },
    "CVE-2023-52477": {
        "cve": "CVE-2023-52477",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: hub: Guard against accesses to uninitialized BOS descriptors\n\nMany functions in drivers/usb/core/hub.c and drivers/usb/core/hub.h\naccess fields inside udev->bos without checking if it was allocated and\ninitialized. If usb_get_bos_descriptor() fails for whatever\nreason, udev->bos will be NULL and those accesses will result in a\ncrash:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000018\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 5 PID: 17818 Comm: kworker/5:1 Tainted: G W 5.15.108-18910-gab0e1cb584e1 #1 <HASH:1f9e 1>\nHardware name: Google Kindred/Kindred, BIOS Google_Kindred.12672.413.0 02/03/2021\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:hub_port_reset+0x193/0x788\nCode: 89 f7 e8 20 f7 15 00 48 8b 43 08 80 b8 96 03 00 00 03 75 36 0f b7 88 92 03 00 00 81 f9 10 03 00 00 72 27 48 8b 80 a8 03 00 00 <48> 83 78 18 00 74 19 48 89 df 48 8b 75 b0 ba 02 00 00 00 4c 89 e9\nRSP: 0018:ffffab740c53fcf8 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffffa1bc5f678000 RCX: 0000000000000310\nRDX: fffffffffffffdff RSI: 0000000000000286 RDI: ffffa1be9655b840\nRBP: ffffab740c53fd70 R08: 00001b7d5edaa20c R09: ffffffffb005e060\nR10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000\nR13: ffffab740c53fd3e R14: 0000000000000032 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffffa1be96540000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000018 CR3: 000000022e80c005 CR4: 00000000003706e0\nCall Trace:\nhub_event+0x73f/0x156e\n? hub_activate+0x5b7/0x68f\nprocess_one_work+0x1a2/0x487\nworker_thread+0x11a/0x288\nkthread+0x13a/0x152\n? process_one_work+0x487/0x487\n? kthread_associate_blkcg+0x70/0x70\nret_from_fork+0x1f/0x30\n\nFall back to a default behavior if the BOS descriptor isn't accessible\nand skip all the functionalities that depend on it: LPM support checks,\nSuper Speed capabilitiy checks, U1/U2 states setup.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52477",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/fb9895ab9533534335fa83d70344b397ac862c81",
            "patch_url": "https://git.kernel.org/stable/p/fb9895ab9533534335fa83d70344b397ac862c81",
            "filename": "CVE-2023-52477-fb9895ab9533534335fa83d70344b397ac862c81.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52477/CVE-2023-52477-fb9895ab9533534335fa83d70344b397ac862c81.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/136f69a04e71ba3458d137aec3bb2ce1232c0289",
                "patch_url": "https://git.kernel.org/stable/p/136f69a04e71ba3458d137aec3bb2ce1232c0289",
                "filename": "CVE-2023-52477-136f69a04e71ba3458d137aec3bb2ce1232c0289.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52477/CVE-2023-52477-136f69a04e71ba3458d137aec3bb2ce1232c0289.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/241f230324337ed5eae3846a554fb6d15169872c",
                "patch_url": "https://git.kernel.org/stable/p/241f230324337ed5eae3846a554fb6d15169872c",
                "filename": "CVE-2023-52477-241f230324337ed5eae3846a554fb6d15169872c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52477/CVE-2023-52477-241f230324337ed5eae3846a554fb6d15169872c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/528f0ba9f7a4bc1b61c9b6eb591ff97ca37cac6b",
                "patch_url": "https://git.kernel.org/stable/p/528f0ba9f7a4bc1b61c9b6eb591ff97ca37cac6b",
                "filename": "CVE-2023-52477-528f0ba9f7a4bc1b61c9b6eb591ff97ca37cac6b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52477/CVE-2023-52477-528f0ba9f7a4bc1b61c9b6eb591ff97ca37cac6b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6ad3e9fd3632106696692232bf7ff88b9f7e1bc3",
                "patch_url": "https://git.kernel.org/stable/p/6ad3e9fd3632106696692232bf7ff88b9f7e1bc3",
                "filename": "CVE-2023-52477-6ad3e9fd3632106696692232bf7ff88b9f7e1bc3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52477/CVE-2023-52477-6ad3e9fd3632106696692232bf7ff88b9f7e1bc3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8e7346bfea56453e31b7421c1c17ca2fb9ed613d",
                "patch_url": "https://git.kernel.org/stable/p/8e7346bfea56453e31b7421c1c17ca2fb9ed613d",
                "filename": "CVE-2023-52477-8e7346bfea56453e31b7421c1c17ca2fb9ed613d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52477/CVE-2023-52477-8e7346bfea56453e31b7421c1c17ca2fb9ed613d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c64e4dca9aefd232b17ac4c779b608b286654e81",
                "patch_url": "https://git.kernel.org/stable/p/c64e4dca9aefd232b17ac4c779b608b286654e81",
                "filename": "CVE-2023-52477-c64e4dca9aefd232b17ac4c779b608b286654e81.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52477/CVE-2023-52477-c64e4dca9aefd232b17ac4c779b608b286654e81.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f74a7afc224acd5e922c7a2e52244d891bbe44ee",
                "patch_url": "https://git.kernel.org/stable/p/f74a7afc224acd5e922c7a2e52244d891bbe44ee",
                "filename": "CVE-2023-52477-f74a7afc224acd5e922c7a2e52244d891bbe44ee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52477/CVE-2023-52477-f74a7afc224acd5e922c7a2e52244d891bbe44ee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fb9895ab9533534335fa83d70344b397ac862c81",
                "patch_url": "https://git.kernel.org/stable/p/fb9895ab9533534335fa83d70344b397ac862c81",
                "filename": "CVE-2023-52477-fb9895ab9533534335fa83d70344b397ac862c81.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52477/CVE-2023-52477-fb9895ab9533534335fa83d70344b397ac862c81.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/136f69a04e71ba3458d137aec3bb2ce1232c0289",
            "https://git.kernel.org/stable/c/241f230324337ed5eae3846a554fb6d15169872c",
            "https://git.kernel.org/stable/c/528f0ba9f7a4bc1b61c9b6eb591ff97ca37cac6b",
            "https://git.kernel.org/stable/c/6ad3e9fd3632106696692232bf7ff88b9f7e1bc3",
            "https://git.kernel.org/stable/c/8e7346bfea56453e31b7421c1c17ca2fb9ed613d",
            "https://git.kernel.org/stable/c/c64e4dca9aefd232b17ac4c779b608b286654e81",
            "https://git.kernel.org/stable/c/f74a7afc224acd5e922c7a2e52244d891bbe44ee",
            "https://git.kernel.org/stable/c/fb9895ab9533534335fa83d70344b397ac862c81",
            "https://www.cve.org/CVERecord?id=CVE-2023-52477\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52477\nhttps://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52477-6f20@gregkh/T/#u"
        ]
    },
    "CVE-2023-52478": {
        "cve": "CVE-2023-52478",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: logitech-hidpp: Fix kernel crash on receiver USB disconnect\n\nhidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)\nraces when it races with itself.\n\nhidpp_connect_event() primarily runs from a workqueue but it also runs\non probe() and if a \"device-connected\" packet is received by the hw\nwhen the thread running hidpp_connect_event() from probe() is waiting on\nthe hw, then a second thread running hidpp_connect_event() will be\nstarted from the workqueue.\n\nThis opens the following races (note the below code is simplified):\n\n1. Retrieving + printing the protocol (harmless race):\n\n\tif (!hidpp->protocol_major) {\n\t\thidpp_root_get_protocol_version()\n\t\thidpp->protocol_major = response.rap.params[0];\n\t}\n\nWe can actually see this race hit in the dmesg in the abrt output\nattached to rhbz#2227968:\n\n[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.\n\nTesting with extra logging added has shown that after this the 2 threads\ntake turn grabbing the hw access mutex (send_mutex) so they ping-pong\nthrough all the other TOCTOU cases managing to hit all of them:\n\n2. Updating the name to the HIDPP name (harmless race):\n\n\tif (hidpp->name == hdev->name) {\n\t\t...\n\t\thidpp->name = new_name;\n\t}\n\n3. Initializing the power_supply class for the battery (problematic!):\n\nhidpp_initialize_battery()\n{\n        if (hidpp->battery.ps)\n                return 0;\n\n\tprobe_battery(); /* Blocks, threads take turns executing this */\n\n\thidpp->battery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp->battery.ps =\n\t\tdevm_power_supply_register(&hidpp->hid_dev->dev,\n\t\t\t\t\t   &hidpp->battery.desc, cfg);\n}\n\n4. Creating delayed input_device (potentially problematic):\n\n\tif (hidpp->delayed_input)\n\t\treturn;\n\n\thidpp->delayed_input = hidpp_allocate_input(hdev);\n\nThe really big problem here is 3. Hitting the race leads to the following\nsequence:\n\n\thidpp->battery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp->battery.ps =\n\t\tdevm_power_supply_register(&hidpp->hid_dev->dev,\n\t\t\t\t\t   &hidpp->battery.desc, cfg);\n\n\t...\n\n\thidpp->battery.desc.properties =\n\t\tdevm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);\n\n\thidpp->battery.ps =\n\t\tdevm_power_supply_register(&hidpp->hid_dev->dev,\n\t\t\t\t\t   &hidpp->battery.desc, cfg);\n\nSo now we have registered 2 power supplies for the same battery,\nwhich looks a bit weird from userspace's pov but this is not even\nthe really big problem.\n\nNotice how:\n\n1. This is all devm-maganaged\n2. The hidpp->battery.desc struct is shared between the 2 power supplies\n3. hidpp->battery.desc.properties points to the result from the second\n   devm_kmemdup()\n\nThis causes a use after free scenario on USB disconnect of the receiver:\n1. The last registered power supply class device gets unregistered\n2. The memory from the last devm_kmemdup() call gets freed,\n   hidpp->battery.desc.properties now points to freed memory\n3. The first registered power supply class device gets unregistered,\n   this involves sending a remove uevent to userspace which invokes\n   power_supply_uevent() to fill the uevent data\n4. power_supply_uevent() uses hidpp->battery.desc.properties which\n   now points to freed memory leading to backtraces like this one:\n\nSep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08\n...\nSep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event\nSep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0\n...\nSep 22 20:01:35 eric kernel:  ? asm_exc_page_fault+0x26/0x30\nSep 22 20:01:35 eric kernel:  ? power_supply_uevent+0xee/0x1d0\nSep 22 20:01:35 eric kernel:  ? power_supply_uevent+0x10d/0x1d0\nSep 22 20:01:35 eric kernel:  dev_uevent+0x10f/0x2d0\nSep 22 20:01:35 eric kernel:  kobject_uevent_env+0x291/0x680\nSep 22 20:01:35 eric kernel:  \n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52478",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528",
            "patch_url": "https://git.kernel.org/stable/p/28ddc1e0b898291323b62d770b1b931de131a528",
            "filename": "CVE-2023-52478-28ddc1e0b898291323b62d770b1b931de131a528.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52478/CVE-2023-52478-28ddc1e0b898291323b62d770b1b931de131a528.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1",
                "patch_url": "https://git.kernel.org/stable/p/093af62c023537f097d2ebdfaa0bc7c1a6e874e1",
                "filename": "CVE-2023-52478-093af62c023537f097d2ebdfaa0bc7c1a6e874e1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52478/CVE-2023-52478-093af62c023537f097d2ebdfaa0bc7c1a6e874e1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528",
                "patch_url": "https://git.kernel.org/stable/p/28ddc1e0b898291323b62d770b1b931de131a528",
                "filename": "CVE-2023-52478-28ddc1e0b898291323b62d770b1b931de131a528.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52478/CVE-2023-52478-28ddc1e0b898291323b62d770b1b931de131a528.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c",
                "patch_url": "https://git.kernel.org/stable/p/44481b244fcaa2b895a53081d6204c574720c38c",
                "filename": "CVE-2023-52478-44481b244fcaa2b895a53081d6204c574720c38c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52478/CVE-2023-52478-44481b244fcaa2b895a53081d6204c574720c38c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5",
                "patch_url": "https://git.kernel.org/stable/p/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5",
                "filename": "CVE-2023-52478-ca0c4cc1d215dc22ab0e738c9f017c650f3183f5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52478/CVE-2023-52478-ca0c4cc1d215dc22ab0e738c9f017c650f3183f5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b",
                "patch_url": "https://git.kernel.org/stable/p/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b",
                "filename": "CVE-2023-52478-cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52478/CVE-2023-52478-cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452",
                "patch_url": "https://git.kernel.org/stable/p/dac501397b9d81e4782232c39f94f4307b137452",
                "filename": "CVE-2023-52478-dac501397b9d81e4782232c39f94f4307b137452.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52478/CVE-2023-52478-dac501397b9d81e4782232c39f94f4307b137452.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e",
                "patch_url": "https://git.kernel.org/stable/p/f7b2c7d9831af99369fe8ad9b2a68d78942f414e",
                "filename": "CVE-2023-52478-f7b2c7d9831af99369fe8ad9b2a68d78942f414e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52478/CVE-2023-52478-f7b2c7d9831af99369fe8ad9b2a68d78942f414e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d",
                "patch_url": "https://git.kernel.org/stable/p/fd72ac9556a473fc7daf54efb6ca8a97180d621d",
                "filename": "CVE-2023-52478-fd72ac9556a473fc7daf54efb6ca8a97180d621d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52478/CVE-2023-52478-fd72ac9556a473fc7daf54efb6ca8a97180d621d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1",
            "https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528",
            "https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c",
            "https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5",
            "https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b",
            "https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452",
            "https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e",
            "https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d",
            "https://www.cve.org/CVERecord?id=CVE-2023-52478\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52478\nhttps://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52478-c0a1@gregkh/T/#u"
        ]
    },
    "CVE-2023-52486": {
        "cve": "CVE-2023-52486",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: Don't unref the same fb many times by mistake due to deadlock handling\n\nIf we get a deadlock after the fb lookup in drm_mode_page_flip_ioctl()\nwe proceed to unref the fb and then retry the whole thing from the top.\nBut we forget to reset the fb pointer back to NULL, and so if we then\nget another error during the retry, before the fb lookup, we proceed\nthe unref the same fb again without having gotten another reference.\nThe end result is that the fb will (eventually) end up being freed\nwhile it's still in use.\n\nReset fb to NULL once we've unreffed it to avoid doing it again\nuntil we've done another fb lookup.\n\nThis turned out to be pretty easy to hit on a DG2 when doing async\nflips (and CONFIG_DEBUG_WW_MUTEX_SLOWPATH=y). The first symptom I\nsaw that drm_closefb() simply got stuck in a busy loop while walking\nthe framebuffer list. Fortunately I was able to convince it to oops\ninstead, and from there it was easier to track down the culprit.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52486",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551",
            "patch_url": "https://git.kernel.org/stable/p/b4af63da9d94986c529d74499fdfe44289acd551",
            "filename": "CVE-2023-52486-b4af63da9d94986c529d74499fdfe44289acd551.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52486/CVE-2023-52486-b4af63da9d94986c529d74499fdfe44289acd551.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229",
                "patch_url": "https://git.kernel.org/stable/p/376e21a9e4c2c63ee5d8d3aa74be5082c3882229",
                "filename": "CVE-2023-52486-376e21a9e4c2c63ee5d8d3aa74be5082c3882229.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52486/CVE-2023-52486-376e21a9e4c2c63ee5d8d3aa74be5082c3882229.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0",
                "patch_url": "https://git.kernel.org/stable/p/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0",
                "filename": "CVE-2023-52486-62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52486/CVE-2023-52486-62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7",
                "patch_url": "https://git.kernel.org/stable/p/9dd334a8245011ace45e53298175c7b659edb3e7",
                "filename": "CVE-2023-52486-9dd334a8245011ace45e53298175c7b659edb3e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52486/CVE-2023-52486-9dd334a8245011ace45e53298175c7b659edb3e7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551",
                "patch_url": "https://git.kernel.org/stable/p/b4af63da9d94986c529d74499fdfe44289acd551",
                "filename": "CVE-2023-52486-b4af63da9d94986c529d74499fdfe44289acd551.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52486/CVE-2023-52486-b4af63da9d94986c529d74499fdfe44289acd551.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a",
                "patch_url": "https://git.kernel.org/stable/p/bfd0feb1b109cb63b87fdcd00122603787c75a1a",
                "filename": "CVE-2023-52486-bfd0feb1b109cb63b87fdcd00122603787c75a1a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52486/CVE-2023-52486-bfd0feb1b109cb63b87fdcd00122603787c75a1a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c",
                "patch_url": "https://git.kernel.org/stable/p/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c",
                "filename": "CVE-2023-52486-cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52486/CVE-2023-52486-cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c",
                "patch_url": "https://git.kernel.org/stable/p/d7afdf360f4ac142832b098b4de974e867cc063c",
                "filename": "CVE-2023-52486-d7afdf360f4ac142832b098b4de974e867cc063c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52486/CVE-2023-52486-d7afdf360f4ac142832b098b4de974e867cc063c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105",
                "patch_url": "https://git.kernel.org/stable/p/f55261469be87c55df13db76dc945f6bcd825105",
                "filename": "CVE-2023-52486-f55261469be87c55df13db76dc945f6bcd825105.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52486/CVE-2023-52486-f55261469be87c55df13db76dc945f6bcd825105.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229",
            "https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0",
            "https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7",
            "https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551",
            "https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a",
            "https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c",
            "https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c",
            "https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105",
            "https://www.cve.org/CVERecord?id=CVE-2023-52486\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52486\nhttps://lore.kernel.org/linux-cve-announce/20240229155245.1571576-27-lee@kernel.org/T/#u"
        ]
    },
    "CVE-2023-52489": {
        "cve": "CVE-2023-52489",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/sparsemem: fix race in accessing memory_section->usage\n\nThe below race is observed on a PFN which falls into the device memory\nregion with the system memory configuration where PFN's are such that\n[ZONE_NORMAL ZONE_DEVICE ZONE_NORMAL].  Since normal zone start and end\npfn contains the device memory PFN's as well, the compaction triggered\nwill try on the device memory PFN's too though they end up in NOP(because\npfn_to_online_page() returns NULL for ZONE_DEVICE memory sections).  When\nfrom other core, the section mappings are being removed for the\nZONE_DEVICE region, that the PFN in question belongs to, on which\ncompaction is currently being operated is resulting into the kernel crash\nwith CONFIG_SPASEMEM_VMEMAP enabled.  The crash logs can be seen at [1].\n\ncompact_zone()\t\t\tmemunmap_pages\n-------------\t\t\t---------------\n__pageblock_pfn_to_page\n   ......\n (a)pfn_valid():\n     valid_section()//return true\n\t\t\t      (b)__remove_pages()->\n\t\t\t\t  sparse_remove_section()->\n\t\t\t\t    section_deactivate():\n\t\t\t\t    [Free the array ms->usage and set\n\t\t\t\t     ms->usage = NULL]\n     pfn_section_valid()\n     [Access ms->usage which\n     is NULL]\n\nNOTE: From the above it can be said that the race is reduced to between\nthe pfn_valid()/pfn_section_valid() and the section deactivate with\nSPASEMEM_VMEMAP enabled.\n\nThe commit b943f045a9af(\"mm/sparse: fix kernel crash with\npfn_section_valid check\") tried to address the same problem by clearing\nthe SECTION_HAS_MEM_MAP with the expectation of valid_section() returns\nfalse thus ms->usage is not accessed.\n\nFix this issue by the below steps:\n\na) Clear SECTION_HAS_MEM_MAP before freeing the ->usage.\n\nb) RCU protected read side critical section will either return NULL\n   when SECTION_HAS_MEM_MAP is cleared or can successfully access ->usage.\n\nc) Free the ->usage with kfree_rcu() and set ms->usage = NULL.  No\n   attempt will be made to access ->usage after this as the\n   SECTION_HAS_MEM_MAP is cleared thus valid_section() return false.\n\nThanks to David/Pavan for their inputs on this patch.\n\n[1] https://lore.kernel.org/linux-mm/994410bb-89aa-d987-1f50-f514903c55aa@quicinc.com/\n\nOn Snapdragon SoC, with the mentioned memory configuration of PFN's as\n[ZONE_NORMAL ZONE_DEVICE ZONE_NORMAL], we are able to see bunch of\nissues daily while testing on a device farm.\n\nFor this particular issue below is the log.  Though the below log is\nnot directly pointing to the pfn_section_valid(){ ms->usage;}, when we\nloaded this dump on T32 lauterbach tool, it is pointing.\n\n[  540.578056] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n[  540.578068] Mem abort info:\n[  540.578070]   ESR = 0x0000000096000005\n[  540.578073]   EC = 0x25: DABT (current EL), IL = 32 bits\n[  540.578077]   SET = 0, FnV = 0\n[  540.578080]   EA = 0, S1PTW = 0\n[  540.578082]   FSC = 0x05: level 1 translation fault\n[  540.578085] Data abort info:\n[  540.578086]   ISV = 0, ISS = 0x00000005\n[  540.578088]   CM = 0, WnR = 0\n[  540.579431] pstate: 82400005 (Nzcv daif +PAN -UAO +TCO -DIT -SSBSBTYPE=--)\n[  540.579436] pc : __pageblock_pfn_to_page+0x6c/0x14c\n[  540.579454] lr : compact_zone+0x994/0x1058\n[  540.579460] sp : ffffffc03579b510\n[  540.579463] x29: ffffffc03579b510 x28: 0000000000235800 x27:000000000000000c\n[  540.579470] x26: 0000000000235c00 x25: 0000000000000068 x24:ffffffc03579b640\n[  540.579477] x23: 0000000000000001 x22: ffffffc03579b660 x21:0000000000000000\n[  540.579483] x20: 0000000000235bff x19: ffffffdebf7e3940 x18:ffffffdebf66d140\n[  540.579489] x17: 00000000739ba063 x16: 00000000739ba063 x15:00000000009f4bff\n[  540.579495] x14: 0000008000000000 x13: 0000000000000000 x12:0000000000000001\n[  540.579501] x11: 0000000000000000 x10: 0000000000000000 x9 :ffffff897d2cd440\n[  540.579507] x8 : 0000000000000000 x7 : 0000000000000000 x6 :ffffffc03579b5b4\n[  540.579512] x5 : 0000000000027f25 x4 : ffffffc03579b5b8 x3 :0000000000000\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52489",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3a01daace71b521563c38bbbf874e14c3e58adb7",
            "patch_url": "https://git.kernel.org/stable/p/3a01daace71b521563c38bbbf874e14c3e58adb7",
            "filename": "CVE-2023-52489-3a01daace71b521563c38bbbf874e14c3e58adb7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52489/CVE-2023-52489-3a01daace71b521563c38bbbf874e14c3e58adb7.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3a01daace71b521563c38bbbf874e14c3e58adb7",
                "patch_url": "https://git.kernel.org/stable/p/3a01daace71b521563c38bbbf874e14c3e58adb7",
                "filename": "CVE-2023-52489-3a01daace71b521563c38bbbf874e14c3e58adb7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52489/CVE-2023-52489-3a01daace71b521563c38bbbf874e14c3e58adb7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5ec8e8ea8b7783fab150cf86404fc38cb4db8800",
                "patch_url": "https://git.kernel.org/stable/p/5ec8e8ea8b7783fab150cf86404fc38cb4db8800",
                "filename": "CVE-2023-52489-5ec8e8ea8b7783fab150cf86404fc38cb4db8800.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52489/CVE-2023-52489-5ec8e8ea8b7783fab150cf86404fc38cb4db8800.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/68ed9e33324021e9d6b798e9db00ca3093d2012a",
                "patch_url": "https://git.kernel.org/stable/p/68ed9e33324021e9d6b798e9db00ca3093d2012a",
                "filename": "CVE-2023-52489-68ed9e33324021e9d6b798e9db00ca3093d2012a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52489/CVE-2023-52489-68ed9e33324021e9d6b798e9db00ca3093d2012a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/70064241f2229f7ba7b9599a98f68d9142e81a97",
                "patch_url": "https://git.kernel.org/stable/p/70064241f2229f7ba7b9599a98f68d9142e81a97",
                "filename": "CVE-2023-52489-70064241f2229f7ba7b9599a98f68d9142e81a97.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52489/CVE-2023-52489-70064241f2229f7ba7b9599a98f68d9142e81a97.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/90ad17575d26874287271127d43ef3c2af876cea",
                "patch_url": "https://git.kernel.org/stable/p/90ad17575d26874287271127d43ef3c2af876cea",
                "filename": "CVE-2023-52489-90ad17575d26874287271127d43ef3c2af876cea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52489/CVE-2023-52489-90ad17575d26874287271127d43ef3c2af876cea.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b448de2459b6d62a53892487ab18b7d823ff0529",
                "patch_url": "https://git.kernel.org/stable/p/b448de2459b6d62a53892487ab18b7d823ff0529",
                "filename": "CVE-2023-52489-b448de2459b6d62a53892487ab18b7d823ff0529.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52489/CVE-2023-52489-b448de2459b6d62a53892487ab18b7d823ff0529.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3a01daace71b521563c38bbbf874e14c3e58adb7",
            "https://git.kernel.org/stable/c/5ec8e8ea8b7783fab150cf86404fc38cb4db8800",
            "https://git.kernel.org/stable/c/68ed9e33324021e9d6b798e9db00ca3093d2012a",
            "https://git.kernel.org/stable/c/70064241f2229f7ba7b9599a98f68d9142e81a97",
            "https://git.kernel.org/stable/c/90ad17575d26874287271127d43ef3c2af876cea",
            "https://git.kernel.org/stable/c/b448de2459b6d62a53892487ab18b7d823ff0529",
            "https://lore.kernel.org/linux-mm/",
            "https://www.cve.org/CVERecord?id=CVE-2023-52489\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52489\nhttps://lore.kernel.org/linux-cve-announce/20240229155245.1571576-30-lee@kernel.org/T"
        ]
    },
    "CVE-2023-52492": {
        "cve": "CVE-2023-52492",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: fix NULL pointer in channel unregistration function\n\n__dma_async_device_channel_register() can fail. In case of failure,\nchan->local is freed (with free_percpu()), and chan->local is nullified.\nWhen dma_async_device_unregister() is called (because of managed API or\nintentionally by DMA controller driver), channels are unconditionally\nunregistered, leading to this NULL pointer:\n[    1.318693] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000d0\n[...]\n[    1.484499] Call trace:\n[    1.486930]  device_del+0x40/0x394\n[    1.490314]  device_unregister+0x20/0x7c\n[    1.494220]  __dma_async_device_channel_unregister+0x68/0xc0\n\nLook at dma_async_device_register() function error path, channel device\nunregistration is done only if chan->local is not NULL.\n\nThen add the same condition at the beginning of\n__dma_async_device_channel_unregister() function, to avoid NULL pointer\nissue whatever the API used to reach this function.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52492",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/047fce470412ab64cb7345f9ff5d06919078ad79",
            "patch_url": "https://git.kernel.org/stable/p/047fce470412ab64cb7345f9ff5d06919078ad79",
            "filename": "CVE-2023-52492-047fce470412ab64cb7345f9ff5d06919078ad79.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52492/CVE-2023-52492-047fce470412ab64cb7345f9ff5d06919078ad79.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/047fce470412ab64cb7345f9ff5d06919078ad79",
                "patch_url": "https://git.kernel.org/stable/p/047fce470412ab64cb7345f9ff5d06919078ad79",
                "filename": "CVE-2023-52492-047fce470412ab64cb7345f9ff5d06919078ad79.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52492/CVE-2023-52492-047fce470412ab64cb7345f9ff5d06919078ad79.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2ab32986a0b9e329eb7f8f04dd57cc127f797c08",
                "patch_url": "https://git.kernel.org/stable/p/2ab32986a0b9e329eb7f8f04dd57cc127f797c08",
                "filename": "CVE-2023-52492-2ab32986a0b9e329eb7f8f04dd57cc127f797c08.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52492/CVE-2023-52492-2ab32986a0b9e329eb7f8f04dd57cc127f797c08.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7f0ccfad2031eddcc510caf4e57f2d4aa2d8a50b",
                "patch_url": "https://git.kernel.org/stable/p/7f0ccfad2031eddcc510caf4e57f2d4aa2d8a50b",
                "filename": "CVE-2023-52492-7f0ccfad2031eddcc510caf4e57f2d4aa2d8a50b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52492/CVE-2023-52492-7f0ccfad2031eddcc510caf4e57f2d4aa2d8a50b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9263fd2a63487c6d04cbb7b74a48fb12e1e352d0",
                "patch_url": "https://git.kernel.org/stable/p/9263fd2a63487c6d04cbb7b74a48fb12e1e352d0",
                "filename": "CVE-2023-52492-9263fd2a63487c6d04cbb7b74a48fb12e1e352d0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52492/CVE-2023-52492-9263fd2a63487c6d04cbb7b74a48fb12e1e352d0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9de69732dde4e443c1c7f89acbbed2c45a6a8e17",
                "patch_url": "https://git.kernel.org/stable/p/9de69732dde4e443c1c7f89acbbed2c45a6a8e17",
                "filename": "CVE-2023-52492-9de69732dde4e443c1c7f89acbbed2c45a6a8e17.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52492/CVE-2023-52492-9de69732dde4e443c1c7f89acbbed2c45a6a8e17.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f5c24d94512f1b288262beda4d3dcb9629222fc7",
                "patch_url": "https://git.kernel.org/stable/p/f5c24d94512f1b288262beda4d3dcb9629222fc7",
                "filename": "CVE-2023-52492-f5c24d94512f1b288262beda4d3dcb9629222fc7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52492/CVE-2023-52492-f5c24d94512f1b288262beda4d3dcb9629222fc7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/047fce470412ab64cb7345f9ff5d06919078ad79",
            "https://git.kernel.org/stable/c/2ab32986a0b9e329eb7f8f04dd57cc127f797c08",
            "https://git.kernel.org/stable/c/7f0ccfad2031eddcc510caf4e57f2d4aa2d8a50b",
            "https://git.kernel.org/stable/c/9263fd2a63487c6d04cbb7b74a48fb12e1e352d0",
            "https://git.kernel.org/stable/c/9de69732dde4e443c1c7f89acbbed2c45a6a8e17",
            "https://git.kernel.org/stable/c/f5c24d94512f1b288262beda4d3dcb9629222fc7",
            "https://www.cve.org/CVERecord?id=CVE-2023-52492\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52492\nhttps://lore.kernel.org/linux-cve-announce/20240229155245.1571576-33-lee@kernel.org/T"
        ]
    },
    "CVE-2023-52513": {
        "cve": "CVE-2023-52513",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/siw: Fix connection failure handling\n\nIn case immediate MPA request processing fails, the newly\ncreated endpoint unlinks the listening endpoint and is\nready to be dropped. This special case was not handled\ncorrectly by the code handling the later TCP socket close,\ncausing a NULL dereference crash in siw_cm_work_handler()\nwhen dereferencing a NULL listener. We now also cancel\nthe useless MPA timeout, if immediate MPA request\nprocessing fails.\n\nThis patch furthermore simplifies MPA processing in general:\nScheduling a useless TCP socket read in sk_data_ready() upcall\nis now surpressed, if the socket is already moved out of\nTCP_ESTABLISHED state.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52513",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0d520cdb0cd095eac5d00078dfd318408c9b5eed",
            "patch_url": "https://git.kernel.org/stable/p/0d520cdb0cd095eac5d00078dfd318408c9b5eed",
            "filename": "CVE-2023-52513-0d520cdb0cd095eac5d00078dfd318408c9b5eed.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52513/CVE-2023-52513-0d520cdb0cd095eac5d00078dfd318408c9b5eed.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0d520cdb0cd095eac5d00078dfd318408c9b5eed",
                "patch_url": "https://git.kernel.org/stable/p/0d520cdb0cd095eac5d00078dfd318408c9b5eed",
                "filename": "CVE-2023-52513-0d520cdb0cd095eac5d00078dfd318408c9b5eed.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52513/CVE-2023-52513-0d520cdb0cd095eac5d00078dfd318408c9b5eed.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/53a3f777049771496f791504e7dc8ef017cba590",
                "patch_url": "https://git.kernel.org/stable/p/53a3f777049771496f791504e7dc8ef017cba590",
                "filename": "CVE-2023-52513-53a3f777049771496f791504e7dc8ef017cba590.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52513/CVE-2023-52513-53a3f777049771496f791504e7dc8ef017cba590.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5cf38e638e5d01b68f9133968a85e8b3fd1ecf2f",
                "patch_url": "https://git.kernel.org/stable/p/5cf38e638e5d01b68f9133968a85e8b3fd1ecf2f",
                "filename": "CVE-2023-52513-5cf38e638e5d01b68f9133968a85e8b3fd1ecf2f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52513/CVE-2023-52513-5cf38e638e5d01b68f9133968a85e8b3fd1ecf2f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6e26812e289b374c17677d238164a5a8f5770594",
                "patch_url": "https://git.kernel.org/stable/p/6e26812e289b374c17677d238164a5a8f5770594",
                "filename": "CVE-2023-52513-6e26812e289b374c17677d238164a5a8f5770594.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52513/CVE-2023-52513-6e26812e289b374c17677d238164a5a8f5770594.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/81b7bf367eea795d259d0261710c6a89f548844d",
                "patch_url": "https://git.kernel.org/stable/p/81b7bf367eea795d259d0261710c6a89f548844d",
                "filename": "CVE-2023-52513-81b7bf367eea795d259d0261710c6a89f548844d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52513/CVE-2023-52513-81b7bf367eea795d259d0261710c6a89f548844d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eeafc50a77f6a783c2c44e7ec3674a7b693e06f8",
                "patch_url": "https://git.kernel.org/stable/p/eeafc50a77f6a783c2c44e7ec3674a7b693e06f8",
                "filename": "CVE-2023-52513-eeafc50a77f6a783c2c44e7ec3674a7b693e06f8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52513/CVE-2023-52513-eeafc50a77f6a783c2c44e7ec3674a7b693e06f8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0d520cdb0cd095eac5d00078dfd318408c9b5eed",
            "https://git.kernel.org/stable/c/53a3f777049771496f791504e7dc8ef017cba590",
            "https://git.kernel.org/stable/c/5cf38e638e5d01b68f9133968a85e8b3fd1ecf2f",
            "https://git.kernel.org/stable/c/6e26812e289b374c17677d238164a5a8f5770594",
            "https://git.kernel.org/stable/c/81b7bf367eea795d259d0261710c6a89f548844d",
            "https://git.kernel.org/stable/c/eeafc50a77f6a783c2c44e7ec3674a7b693e06f8",
            "https://www.cve.org/CVERecord?id=CVE-2023-52513\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52513\nhttps://lore.kernel.org/linux-cve-announce/2024030251-CVE-2023-52513-5224@gregkh/T/#u"
        ]
    },
    "CVE-2023-52520": {
        "cve": "CVE-2023-52520",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: think-lmi: Fix reference leak\n\nIf a duplicate attribute is found using kset_find_obj(), a reference\nto that attribute is returned which needs to be disposed accordingly\nusing kobject_put(). Move the setting name validation into a separate\nfunction to allow for this change without having to duplicate the\ncleanup code for this setting.\nAs a side note, a very similar bug was fixed in\ncommit 7295a996fdab (\"platform/x86: dell-sysman: Fix reference leak\"),\nso it seems that the bug was copied from that driver.\n\nCompile-tested only.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52520",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/124cf0ea4b82e1444ec8c7420af4e7db5558c293",
            "patch_url": "https://git.kernel.org/stable/p/124cf0ea4b82e1444ec8c7420af4e7db5558c293",
            "filename": "CVE-2023-52520-124cf0ea4b82e1444ec8c7420af4e7db5558c293.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52520/CVE-2023-52520-124cf0ea4b82e1444ec8c7420af4e7db5558c293.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/124cf0ea4b82e1444ec8c7420af4e7db5558c293",
                "patch_url": "https://git.kernel.org/stable/p/124cf0ea4b82e1444ec8c7420af4e7db5558c293",
                "filename": "CVE-2023-52520-124cf0ea4b82e1444ec8c7420af4e7db5558c293.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52520/CVE-2023-52520-124cf0ea4b82e1444ec8c7420af4e7db5558c293.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/528ab3e605cabf2f9c9bd5944d3bfe15f6e94f81",
                "patch_url": "https://git.kernel.org/stable/p/528ab3e605cabf2f9c9bd5944d3bfe15f6e94f81",
                "filename": "CVE-2023-52520-528ab3e605cabf2f9c9bd5944d3bfe15f6e94f81.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52520/CVE-2023-52520-528ab3e605cabf2f9c9bd5944d3bfe15f6e94f81.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/af21c9119a37cecb7ff27ce0c2f3cf721e9d0ec4",
                "patch_url": "https://git.kernel.org/stable/p/af21c9119a37cecb7ff27ce0c2f3cf721e9d0ec4",
                "filename": "CVE-2023-52520-af21c9119a37cecb7ff27ce0c2f3cf721e9d0ec4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52520/CVE-2023-52520-af21c9119a37cecb7ff27ce0c2f3cf721e9d0ec4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c6e3023579de8d33256771ac0745239029e81106",
                "patch_url": "https://git.kernel.org/stable/p/c6e3023579de8d33256771ac0745239029e81106",
                "filename": "CVE-2023-52520-c6e3023579de8d33256771ac0745239029e81106.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52520/CVE-2023-52520-c6e3023579de8d33256771ac0745239029e81106.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/124cf0ea4b82e1444ec8c7420af4e7db5558c293",
            "https://git.kernel.org/stable/c/528ab3e605cabf2f9c9bd5944d3bfe15f6e94f81",
            "https://git.kernel.org/stable/c/af21c9119a37cecb7ff27ce0c2f3cf721e9d0ec4",
            "https://git.kernel.org/stable/c/c6e3023579de8d33256771ac0745239029e81106",
            "https://www.cve.org/CVERecord?id=CVE-2023-52520\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52520\nhttps://lore.kernel.org/linux-cve-announce/2024030252-CVE-2023-52520-0a4e@gregkh/T/#u"
        ]
    },
    "CVE-2023-52522": {
        "cve": "CVE-2023-52522",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix possible store tearing in neigh_periodic_work()\n\nWhile looking at a related syzbot report involving neigh_periodic_work(),\nI found that I forgot to add an annotation when deleting an\nRCU protected item from a list.\n\nReaders use rcu_deference(*np), we need to use either\nrcu_assign_pointer() or WRITE_ONCE() on writer side\nto prevent store tearing.\n\nI use rcu_assign_pointer() to have lockdep support,\nthis was the choice made in neigh_flush_dev().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52522",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/147d89ee41434b97043c2dcb17a97dc151859baa",
            "patch_url": "https://git.kernel.org/stable/p/147d89ee41434b97043c2dcb17a97dc151859baa",
            "filename": "CVE-2023-52522-147d89ee41434b97043c2dcb17a97dc151859baa.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52522/CVE-2023-52522-147d89ee41434b97043c2dcb17a97dc151859baa.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/147d89ee41434b97043c2dcb17a97dc151859baa",
                "patch_url": "https://git.kernel.org/stable/p/147d89ee41434b97043c2dcb17a97dc151859baa",
                "filename": "CVE-2023-52522-147d89ee41434b97043c2dcb17a97dc151859baa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52522/CVE-2023-52522-147d89ee41434b97043c2dcb17a97dc151859baa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/25563b581ba3a1f263a00e8c9a97f5e7363be6fd",
                "patch_url": "https://git.kernel.org/stable/p/25563b581ba3a1f263a00e8c9a97f5e7363be6fd",
                "filename": "CVE-2023-52522-25563b581ba3a1f263a00e8c9a97f5e7363be6fd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52522/CVE-2023-52522-25563b581ba3a1f263a00e8c9a97f5e7363be6fd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2ea52a2fb8e87067e26bbab4efb8872639240eb0",
                "patch_url": "https://git.kernel.org/stable/p/2ea52a2fb8e87067e26bbab4efb8872639240eb0",
                "filename": "CVE-2023-52522-2ea52a2fb8e87067e26bbab4efb8872639240eb0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52522/CVE-2023-52522-2ea52a2fb8e87067e26bbab4efb8872639240eb0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/95eabb075a5902f4c0834ab1fb12dc35730c05af",
                "patch_url": "https://git.kernel.org/stable/p/95eabb075a5902f4c0834ab1fb12dc35730c05af",
                "filename": "CVE-2023-52522-95eabb075a5902f4c0834ab1fb12dc35730c05af.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52522/CVE-2023-52522-95eabb075a5902f4c0834ab1fb12dc35730c05af.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a75152d233370362eebedb2643592e7c883cc9fc",
                "patch_url": "https://git.kernel.org/stable/p/a75152d233370362eebedb2643592e7c883cc9fc",
                "filename": "CVE-2023-52522-a75152d233370362eebedb2643592e7c883cc9fc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52522/CVE-2023-52522-a75152d233370362eebedb2643592e7c883cc9fc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f82aac8162871e87027692b36af335a2375d4580",
                "patch_url": "https://git.kernel.org/stable/p/f82aac8162871e87027692b36af335a2375d4580",
                "filename": "CVE-2023-52522-f82aac8162871e87027692b36af335a2375d4580.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52522/CVE-2023-52522-f82aac8162871e87027692b36af335a2375d4580.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/147d89ee41434b97043c2dcb17a97dc151859baa",
            "https://git.kernel.org/stable/c/25563b581ba3a1f263a00e8c9a97f5e7363be6fd",
            "https://git.kernel.org/stable/c/2ea52a2fb8e87067e26bbab4efb8872639240eb0",
            "https://git.kernel.org/stable/c/95eabb075a5902f4c0834ab1fb12dc35730c05af",
            "https://git.kernel.org/stable/c/a75152d233370362eebedb2643592e7c883cc9fc",
            "https://git.kernel.org/stable/c/f82aac8162871e87027692b36af335a2375d4580",
            "https://www.cve.org/CVERecord?id=CVE-2023-52522\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52522\nhttps://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52522-6abd@gregkh/T/#u"
        ]
    },
    "CVE-2023-52528": {
        "cve": "CVE-2023-52528",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg\n\nsyzbot reported the following uninit-value access issue:\n\n=====================================================\nBUG: KMSAN: uninit-value in smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:975 [inline]\nBUG: KMSAN: uninit-value in smsc75xx_bind+0x5c9/0x11e0 drivers/net/usb/smsc75xx.c:1482\nCPU: 0 PID: 8696 Comm: kworker/0:3 Not tainted 5.8.0-rc5-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x21c/0x280 lib/dump_stack.c:118\n kmsan_report+0xf7/0x1e0 mm/kmsan/kmsan_report.c:121\n __msan_warning+0x58/0xa0 mm/kmsan/kmsan_instr.c:215\n smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:975 [inline]\n smsc75xx_bind+0x5c9/0x11e0 drivers/net/usb/smsc75xx.c:1482\n usbnet_probe+0x1152/0x3f90 drivers/net/usb/usbnet.c:1737\n usb_probe_interface+0xece/0x1550 drivers/usb/core/driver.c:374\n really_probe+0xf20/0x20b0 drivers/base/dd.c:529\n driver_probe_device+0x293/0x390 drivers/base/dd.c:701\n __device_attach_driver+0x63f/0x830 drivers/base/dd.c:807\n bus_for_each_drv+0x2ca/0x3f0 drivers/base/bus.c:431\n __device_attach+0x4e2/0x7f0 drivers/base/dd.c:873\n device_initial_probe+0x4a/0x60 drivers/base/dd.c:920\n bus_probe_device+0x177/0x3d0 drivers/base/bus.c:491\n device_add+0x3b0e/0x40d0 drivers/base/core.c:2680\n usb_set_configuration+0x380f/0x3f10 drivers/usb/core/message.c:2032\n usb_generic_driver_probe+0x138/0x300 drivers/usb/core/generic.c:241\n usb_probe_device+0x311/0x490 drivers/usb/core/driver.c:272\n really_probe+0xf20/0x20b0 drivers/base/dd.c:529\n driver_probe_device+0x293/0x390 drivers/base/dd.c:701\n __device_attach_driver+0x63f/0x830 drivers/base/dd.c:807\n bus_for_each_drv+0x2ca/0x3f0 drivers/base/bus.c:431\n __device_attach+0x4e2/0x7f0 drivers/base/dd.c:873\n device_initial_probe+0x4a/0x60 drivers/base/dd.c:920\n bus_probe_device+0x177/0x3d0 drivers/base/bus.c:491\n device_add+0x3b0e/0x40d0 drivers/base/core.c:2680\n usb_new_device+0x1bd4/0x2a30 drivers/usb/core/hub.c:2554\n hub_port_connect drivers/usb/core/hub.c:5208 [inline]\n hub_port_connect_change drivers/usb/core/hub.c:5348 [inline]\n port_event drivers/usb/core/hub.c:5494 [inline]\n hub_event+0x5e7b/0x8a70 drivers/usb/core/hub.c:5576\n process_one_work+0x1688/0x2140 kernel/workqueue.c:2269\n worker_thread+0x10bc/0x2730 kernel/workqueue.c:2415\n kthread+0x551/0x590 kernel/kthread.c:292\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:293\n\nLocal variable ----buf.i87@smsc75xx_bind created at:\n __smsc75xx_read_reg drivers/net/usb/smsc75xx.c:83 [inline]\n smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:968 [inline]\n smsc75xx_bind+0x485/0x11e0 drivers/net/usb/smsc75xx.c:1482\n __smsc75xx_read_reg drivers/net/usb/smsc75xx.c:83 [inline]\n smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:968 [inline]\n smsc75xx_bind+0x485/0x11e0 drivers/net/usb/smsc75xx.c:1482\n\nThis issue is caused because usbnet_read_cmd() reads less bytes than requested\n(zero byte in the reproducer). In this case, 'buf' is not properly filled.\n\nThis patch fixes the issue by returning -ENODATA if usbnet_read_cmd() reads\nless bytes than requested.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52528",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2a36d9e2995c8c3c3f179aab1215a69cff06cbed",
            "patch_url": "https://git.kernel.org/stable/p/2a36d9e2995c8c3c3f179aab1215a69cff06cbed",
            "filename": "CVE-2023-52528-2a36d9e2995c8c3c3f179aab1215a69cff06cbed.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52528/CVE-2023-52528-2a36d9e2995c8c3c3f179aab1215a69cff06cbed.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2a36d9e2995c8c3c3f179aab1215a69cff06cbed",
                "patch_url": "https://git.kernel.org/stable/p/2a36d9e2995c8c3c3f179aab1215a69cff06cbed",
                "filename": "CVE-2023-52528-2a36d9e2995c8c3c3f179aab1215a69cff06cbed.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52528/CVE-2023-52528-2a36d9e2995c8c3c3f179aab1215a69cff06cbed.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/30bc4d7aebe33904b0f2d3aad4b4a9c6029ad0c5",
                "patch_url": "https://git.kernel.org/stable/p/30bc4d7aebe33904b0f2d3aad4b4a9c6029ad0c5",
                "filename": "CVE-2023-52528-30bc4d7aebe33904b0f2d3aad4b4a9c6029ad0c5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52528/CVE-2023-52528-30bc4d7aebe33904b0f2d3aad4b4a9c6029ad0c5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/310f1c92f65ad905b7e81fe14de82d979ebbd825",
                "patch_url": "https://git.kernel.org/stable/p/310f1c92f65ad905b7e81fe14de82d979ebbd825",
                "filename": "CVE-2023-52528-310f1c92f65ad905b7e81fe14de82d979ebbd825.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52528/CVE-2023-52528-310f1c92f65ad905b7e81fe14de82d979ebbd825.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3e0af6eec1789fd11934164a7f4dbcad979855a4",
                "patch_url": "https://git.kernel.org/stable/p/3e0af6eec1789fd11934164a7f4dbcad979855a4",
                "filename": "CVE-2023-52528-3e0af6eec1789fd11934164a7f4dbcad979855a4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52528/CVE-2023-52528-3e0af6eec1789fd11934164a7f4dbcad979855a4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4931e80da9463b03bfe42be54a9a19f213b0f76d",
                "patch_url": "https://git.kernel.org/stable/p/4931e80da9463b03bfe42be54a9a19f213b0f76d",
                "filename": "CVE-2023-52528-4931e80da9463b03bfe42be54a9a19f213b0f76d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52528/CVE-2023-52528-4931e80da9463b03bfe42be54a9a19f213b0f76d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ffc5018020fe646795a8dc1203224b8f776dc09",
                "patch_url": "https://git.kernel.org/stable/p/9ffc5018020fe646795a8dc1203224b8f776dc09",
                "filename": "CVE-2023-52528-9ffc5018020fe646795a8dc1203224b8f776dc09.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52528/CVE-2023-52528-9ffc5018020fe646795a8dc1203224b8f776dc09.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cda10784a176d7192f08ecb518f777a4e9575812",
                "patch_url": "https://git.kernel.org/stable/p/cda10784a176d7192f08ecb518f777a4e9575812",
                "filename": "CVE-2023-52528-cda10784a176d7192f08ecb518f777a4e9575812.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52528/CVE-2023-52528-cda10784a176d7192f08ecb518f777a4e9575812.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e9c65989920f7c28775ec4e0c11b483910fb67b8",
                "patch_url": "https://git.kernel.org/stable/p/e9c65989920f7c28775ec4e0c11b483910fb67b8",
                "filename": "CVE-2023-52528-e9c65989920f7c28775ec4e0c11b483910fb67b8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52528/CVE-2023-52528-e9c65989920f7c28775ec4e0c11b483910fb67b8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2a36d9e2995c8c3c3f179aab1215a69cff06cbed",
            "https://git.kernel.org/stable/c/30bc4d7aebe33904b0f2d3aad4b4a9c6029ad0c5",
            "https://git.kernel.org/stable/c/310f1c92f65ad905b7e81fe14de82d979ebbd825",
            "https://git.kernel.org/stable/c/3e0af6eec1789fd11934164a7f4dbcad979855a4",
            "https://git.kernel.org/stable/c/4931e80da9463b03bfe42be54a9a19f213b0f76d",
            "https://git.kernel.org/stable/c/9ffc5018020fe646795a8dc1203224b8f776dc09",
            "https://git.kernel.org/stable/c/cda10784a176d7192f08ecb518f777a4e9575812",
            "https://git.kernel.org/stable/c/e9c65989920f7c28775ec4e0c11b483910fb67b8",
            "https://www.cve.org/CVERecord?id=CVE-2023-52528\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52528\nhttps://lore.kernel.org/linux-cve-announce/2024030254-CVE-2023-52528-c33b@gregkh/T/#u"
        ]
    },
    "CVE-2023-52530": {
        "cve": "CVE-2023-52530",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix potential key use-after-free\n\nWhen ieee80211_key_link() is called by ieee80211_gtk_rekey_add()\nbut returns 0 due to KRACK protection (identical key reinstall),\nieee80211_gtk_rekey_add() will still return a pointer into the\nkey, in a potential use-after-free. This normally doesn't happen\nsince it's only called by iwlwifi in case of WoWLAN rekey offload\nwhich has its own KRACK protection, but still better to fix, do\nthat by returning an error code and converting that to success on\nthe cfg80211 boundary only, leaving the error for bad callers of\nieee80211_gtk_rekey_add().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52530",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36",
            "patch_url": "https://git.kernel.org/stable/p/2f4e16e39e4f5e78248dd9e51276a83203950b36",
            "filename": "CVE-2023-52530-2f4e16e39e4f5e78248dd9e51276a83203950b36.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52530/CVE-2023-52530-2f4e16e39e4f5e78248dd9e51276a83203950b36.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2408f491ff998d674707725eadc47d8930aced09",
                "patch_url": "https://git.kernel.org/stable/p/2408f491ff998d674707725eadc47d8930aced09",
                "filename": "CVE-2023-52530-2408f491ff998d674707725eadc47d8930aced09.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52530/CVE-2023-52530-2408f491ff998d674707725eadc47d8930aced09.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36",
                "patch_url": "https://git.kernel.org/stable/p/2f4e16e39e4f5e78248dd9e51276a83203950b36",
                "filename": "CVE-2023-52530-2f4e16e39e4f5e78248dd9e51276a83203950b36.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52530/CVE-2023-52530-2f4e16e39e4f5e78248dd9e51276a83203950b36.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b",
                "patch_url": "https://git.kernel.org/stable/p/31db78a4923ef5e2008f2eed321811ca79e7f71b",
                "filename": "CVE-2023-52530-31db78a4923ef5e2008f2eed321811ca79e7f71b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52530/CVE-2023-52530-31db78a4923ef5e2008f2eed321811ca79e7f71b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d",
                "patch_url": "https://git.kernel.org/stable/p/65c72a7201704574dace708cbc96a8f367b1491d",
                "filename": "CVE-2023-52530-65c72a7201704574dace708cbc96a8f367b1491d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52530/CVE-2023-52530-65c72a7201704574dace708cbc96a8f367b1491d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e8a834eb09bb95c2bf9c76f1a28ecef7d8c439d0",
                "patch_url": "https://git.kernel.org/stable/p/e8a834eb09bb95c2bf9c76f1a28ecef7d8c439d0",
                "filename": "CVE-2023-52530-e8a834eb09bb95c2bf9c76f1a28ecef7d8c439d0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52530/CVE-2023-52530-e8a834eb09bb95c2bf9c76f1a28ecef7d8c439d0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e8e599a635066c50ac214c3e10858f1d37e03022",
                "patch_url": "https://git.kernel.org/stable/p/e8e599a635066c50ac214c3e10858f1d37e03022",
                "filename": "CVE-2023-52530-e8e599a635066c50ac214c3e10858f1d37e03022.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52530/CVE-2023-52530-e8e599a635066c50ac214c3e10858f1d37e03022.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2408f491ff998d674707725eadc47d8930aced09",
            "https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36",
            "https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b",
            "https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d",
            "https://git.kernel.org/stable/c/e8a834eb09bb95c2bf9c76f1a28ecef7d8c439d0",
            "https://git.kernel.org/stable/c/e8e599a635066c50ac214c3e10858f1d37e03022",
            "https://www.cve.org/CVERecord?id=CVE-2023-52530\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52530\nhttps://lore.kernel.org/linux-cve-announce/2024030255-CVE-2023-52530-ebf0@gregkh/T/#u"
        ]
    },
    "CVE-2023-52560": {
        "cve": "CVE-2023-52560",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()\n\nWhen CONFIG_DAMON_VADDR_KUNIT_TEST=y and making CONFIG_DEBUG_KMEMLEAK=y\nand CONFIG_DEBUG_KMEMLEAK_AUTO_SCAN=y, the below memory leak is detected.\n\nSince commit 9f86d624292c (\"mm/damon/vaddr-test: remove unnecessary\nvariables\"), the damon_destroy_ctx() is removed, but still call\ndamon_new_target() and damon_new_region(), the damon_region which is\nallocated by kmem_cache_alloc() in damon_new_region() and the damon_target\nwhich is allocated by kmalloc in damon_new_target() are not freed.  And\nthe damon_region which is allocated in damon_new_region() in\ndamon_set_regions() is also not freed.\n\nSo use damon_destroy_target to free all the damon_regions and damon_target.\n\n    unreferenced object 0xffff888107c9a940 (size 64):\n      comm \"kunit_try_catch\", pid 1069, jiffies 4294670592 (age 732.761s)\n      hex dump (first 32 bytes):\n        00 00 00 00 00 00 00 00 06 00 00 00 6b 6b 6b 6b  ............kkkk\n        60 c7 9c 07 81 88 ff ff f8 cb 9c 07 81 88 ff ff  `...............\n      backtrace:\n        [<ffffffff817e0167>] kmalloc_trace+0x27/0xa0\n        [<ffffffff819c11cf>] damon_new_target+0x3f/0x1b0\n        [<ffffffff819c7d55>] damon_do_test_apply_three_regions.constprop.0+0x95/0x3e0\n        [<ffffffff819c82be>] damon_test_apply_three_regions1+0x21e/0x260\n        [<ffffffff829fce6a>] kunit_generic_run_threadfn_adapter+0x4a/0x90\n        [<ffffffff81237cf6>] kthread+0x2b6/0x380\n        [<ffffffff81097add>] ret_from_fork+0x2d/0x70\n        [<ffffffff81003791>] ret_from_fork_asm+0x11/0x20\n    unreferenced object 0xffff8881079cc740 (size 56):\n      comm \"kunit_try_catch\", pid 1069, jiffies 4294670592 (age 732.761s)\n      hex dump (first 32 bytes):\n        05 00 00 00 00 00 00 00 14 00 00 00 00 00 00 00  ................\n        6b 6b 6b 6b 6b 6b 6b 6b 00 00 00 00 6b 6b 6b 6b  kkkkkkkk....kkkk\n      backtrace:\n        [<ffffffff819bc492>] damon_new_region+0x22/0x1c0\n        [<ffffffff819c7d91>] damon_do_test_apply_three_regions.constprop.0+0xd1/0x3e0\n        [<ffffffff819c82be>] damon_test_apply_three_regions1+0x21e/0x260\n        [<ffffffff829fce6a>] kunit_generic_run_threadfn_adapter+0x4a/0x90\n        [<ffffffff81237cf6>] kthread+0x2b6/0x380\n        [<ffffffff81097add>] ret_from_fork+0x2d/0x70\n        [<ffffffff81003791>] ret_from_fork_asm+0x11/0x20\n    unreferenced object 0xffff888107c9ac40 (size 64):\n      comm \"kunit_try_catch\", pid 1071, jiffies 4294670595 (age 732.843s)\n      hex dump (first 32 bytes):\n        00 00 00 00 00 00 00 00 06 00 00 00 6b 6b 6b 6b  ............kkkk\n        a0 cc 9c 07 81 88 ff ff 78 a1 76 07 81 88 ff ff  ........x.v.....\n      backtrace:\n        [<ffffffff817e0167>] kmalloc_trace+0x27/0xa0\n        [<ffffffff819c11cf>] damon_new_target+0x3f/0x1b0\n        [<ffffffff819c7d55>] damon_do_test_apply_three_regions.constprop.0+0x95/0x3e0\n        [<ffffffff819c851e>] damon_test_apply_three_regions2+0x21e/0x260\n        [<ffffffff829fce6a>] kunit_generic_run_threadfn_adapter+0x4a/0x90\n        [<ffffffff81237cf6>] kthread+0x2b6/0x380\n        [<ffffffff81097add>] ret_from_fork+0x2d/0x70\n        [<ffffffff81003791>] ret_from_fork_asm+0x11/0x20\n    unreferenced object 0xffff8881079ccc80 (size 56):\n      comm \"kunit_try_catch\", pid 1071, jiffies 4294670595 (age 732.843s)\n      hex dump (first 32 bytes):\n        05 00 00 00 00 00 00 00 14 00 00 00 00 00 00 00  ................\n        6b 6b 6b 6b 6b 6b 6b 6b 00 00 00 00 6b 6b 6b 6b  kkkkkkkk....kkkk\n      backtrace:\n        [<ffffffff819bc492>] damon_new_region+0x22/0x1c0\n        [<ffffffff819c7d91>] damon_do_test_apply_three_regions.constprop.0+0xd1/0x3e0\n        [<ffffffff819c851e>] damon_test_apply_three_regions2+0x21e/0x260\n        [<ffffffff829fce6a>] kunit_generic_run_threadfn_adapter+0x4a/0x90\n        [<ffffffff81237cf6>] kthread+0x2b6/0x380\n        [<ffffffff81097add>] ret_from_fork+0x2d/0x70\n        [<ffff\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52560",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/45120b15743fa7c0aa53d5db6dfb4c8f87be4abd",
            "patch_url": "https://git.kernel.org/stable/p/45120b15743fa7c0aa53d5db6dfb4c8f87be4abd",
            "filename": "CVE-2023-52560-45120b15743fa7c0aa53d5db6dfb4c8f87be4abd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52560/CVE-2023-52560-45120b15743fa7c0aa53d5db6dfb4c8f87be4abd.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/45120b15743fa7c0aa53d5db6dfb4c8f87be4abd",
                "patch_url": "https://git.kernel.org/stable/p/45120b15743fa7c0aa53d5db6dfb4c8f87be4abd",
                "filename": "CVE-2023-52560-45120b15743fa7c0aa53d5db6dfb4c8f87be4abd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52560/CVE-2023-52560-45120b15743fa7c0aa53d5db6dfb4c8f87be4abd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6b522001693aa113d97a985abc5f6932972e8e86",
                "patch_url": "https://git.kernel.org/stable/p/6b522001693aa113d97a985abc5f6932972e8e86",
                "filename": "CVE-2023-52560-6b522001693aa113d97a985abc5f6932972e8e86.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52560/CVE-2023-52560-6b522001693aa113d97a985abc5f6932972e8e86.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9a4fe81a8644b717d57d81ce5849e16583b13fe8",
                "patch_url": "https://git.kernel.org/stable/p/9a4fe81a8644b717d57d81ce5849e16583b13fe8",
                "filename": "CVE-2023-52560-9a4fe81a8644b717d57d81ce5849e16583b13fe8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52560/CVE-2023-52560-9a4fe81a8644b717d57d81ce5849e16583b13fe8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/45120b15743fa7c0aa53d5db6dfb4c8f87be4abd",
            "https://git.kernel.org/stable/c/6b522001693aa113d97a985abc5f6932972e8e86",
            "https://git.kernel.org/stable/c/9a4fe81a8644b717d57d81ce5849e16583b13fe8",
            "https://www.cve.org/CVERecord?id=CVE-2023-52560\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52560\nhttps://lore.kernel.org/linux-cve-announce/2024030252-CVE-2023-52560-c3de@gregkh/T/#u"
        ]
    },
    "CVE-2023-52565": {
        "cve": "CVE-2023-52565",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Fix OOB read\n\nIf the index provided by the user is bigger than the mask size, we might do\nan out of bound read.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52565",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/09635bf4cdd4adf2160198a6041bcc7ca46c0558",
            "patch_url": "https://git.kernel.org/stable/p/09635bf4cdd4adf2160198a6041bcc7ca46c0558",
            "filename": "CVE-2023-52565-09635bf4cdd4adf2160198a6041bcc7ca46c0558.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52565/CVE-2023-52565-09635bf4cdd4adf2160198a6041bcc7ca46c0558.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/09635bf4cdd4adf2160198a6041bcc7ca46c0558",
                "patch_url": "https://git.kernel.org/stable/p/09635bf4cdd4adf2160198a6041bcc7ca46c0558",
                "filename": "CVE-2023-52565-09635bf4cdd4adf2160198a6041bcc7ca46c0558.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52565/CVE-2023-52565-09635bf4cdd4adf2160198a6041bcc7ca46c0558.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/41ebaa5e0eebea4c3bac96b72f9f8ae0d77c0bdb",
                "patch_url": "https://git.kernel.org/stable/p/41ebaa5e0eebea4c3bac96b72f9f8ae0d77c0bdb",
                "filename": "CVE-2023-52565-41ebaa5e0eebea4c3bac96b72f9f8ae0d77c0bdb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52565/CVE-2023-52565-41ebaa5e0eebea4c3bac96b72f9f8ae0d77c0bdb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8bcf70d787f7d53a3b85ad394f926cfef3eed023",
                "patch_url": "https://git.kernel.org/stable/p/8bcf70d787f7d53a3b85ad394f926cfef3eed023",
                "filename": "CVE-2023-52565-8bcf70d787f7d53a3b85ad394f926cfef3eed023.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52565/CVE-2023-52565-8bcf70d787f7d53a3b85ad394f926cfef3eed023.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/09635bf4cdd4adf2160198a6041bcc7ca46c0558",
            "https://git.kernel.org/stable/c/41ebaa5e0eebea4c3bac96b72f9f8ae0d77c0bdb",
            "https://git.kernel.org/stable/c/8bcf70d787f7d53a3b85ad394f926cfef3eed023",
            "https://www.cve.org/CVERecord?id=CVE-2023-52565\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52565\nhttps://lore.kernel.org/linux-cve-announce/2024030254-CVE-2023-52565-07ce@gregkh/"
        ]
    },
    "CVE-2023-52574": {
        "cve": "CVE-2023-52574",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nteam: fix null-ptr-deref when team device type is changed\n\nGet a null-ptr-deref bug as follows with reproducer [1].\n\nBUG: kernel NULL pointer dereference, address: 0000000000000228\n...\nRIP: 0010:vlan_dev_hard_header+0x35/0x140 [8021q]\n...\nCall Trace:\n <TASK>\n ? __die+0x24/0x70\n ? page_fault_oops+0x82/0x150\n ? exc_page_fault+0x69/0x150\n ? asm_exc_page_fault+0x26/0x30\n ? vlan_dev_hard_header+0x35/0x140 [8021q]\n ? vlan_dev_hard_header+0x8e/0x140 [8021q]\n neigh_connected_output+0xb2/0x100\n ip6_finish_output2+0x1cb/0x520\n ? nf_hook_slow+0x43/0xc0\n ? ip6_mtu+0x46/0x80\n ip6_finish_output+0x2a/0xb0\n mld_sendpack+0x18f/0x250\n mld_ifc_work+0x39/0x160\n process_one_work+0x1e6/0x3f0\n worker_thread+0x4d/0x2f0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0xe5/0x120\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x34/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1b/0x30\n\n[1]\n$ teamd -t team0 -d -c '{\"runner\": {\"name\": \"loadbalance\"}}'\n$ ip link add name t-dummy type dummy\n$ ip link add link t-dummy name t-dummy.100 type vlan id 100\n$ ip link add name t-nlmon type nlmon\n$ ip link set t-nlmon master team0\n$ ip link set t-nlmon nomaster\n$ ip link set t-dummy up\n$ ip link set team0 up\n$ ip link set t-dummy.100 down\n$ ip link set t-dummy.100 master team0\n\nWhen enslave a vlan device to team device and team device type is changed\nfrom non-ether to ether, header_ops of team device is changed to\nvlan_header_ops. That is incorrect and will trigger null-ptr-deref\nfor vlan->real_dev in vlan_dev_hard_header() because team device is not\na vlan device.\n\nCache eth_header_ops in team_setup(), then assign cached header_ops to\nheader_ops of team net device when its type is changed from non-ether\nto ether to fix the bug.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52574",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/c5f6478686bb45f453031594ae19b6c9723a780d",
            "patch_url": "https://git.kernel.org/stable/p/c5f6478686bb45f453031594ae19b6c9723a780d",
            "filename": "CVE-2023-52574-c5f6478686bb45f453031594ae19b6c9723a780d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52574/CVE-2023-52574-c5f6478686bb45f453031594ae19b6c9723a780d.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1779eb51b9cc628cee551f252701a85a2a50a457",
                "patch_url": "https://git.kernel.org/stable/p/1779eb51b9cc628cee551f252701a85a2a50a457",
                "filename": "CVE-2023-52574-1779eb51b9cc628cee551f252701a85a2a50a457.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52574/CVE-2023-52574-1779eb51b9cc628cee551f252701a85a2a50a457.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f0acb0736ecc3eb85dc80ad2790d634dcb10b58",
                "patch_url": "https://git.kernel.org/stable/p/2f0acb0736ecc3eb85dc80ad2790d634dcb10b58",
                "filename": "CVE-2023-52574-2f0acb0736ecc3eb85dc80ad2790d634dcb10b58.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52574/CVE-2023-52574-2f0acb0736ecc3eb85dc80ad2790d634dcb10b58.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/492032760127251e5540a5716a70996bacf2a3fd",
                "patch_url": "https://git.kernel.org/stable/p/492032760127251e5540a5716a70996bacf2a3fd",
                "filename": "CVE-2023-52574-492032760127251e5540a5716a70996bacf2a3fd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52574/CVE-2023-52574-492032760127251e5540a5716a70996bacf2a3fd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a7fb47b9711101d2405b0eb1276fb1f9b9b270c7",
                "patch_url": "https://git.kernel.org/stable/p/a7fb47b9711101d2405b0eb1276fb1f9b9b270c7",
                "filename": "CVE-2023-52574-a7fb47b9711101d2405b0eb1276fb1f9b9b270c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52574/CVE-2023-52574-a7fb47b9711101d2405b0eb1276fb1f9b9b270c7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b44dd92e2afd89eb6e9d27616858e72a67bdc1a7",
                "patch_url": "https://git.kernel.org/stable/p/b44dd92e2afd89eb6e9d27616858e72a67bdc1a7",
                "filename": "CVE-2023-52574-b44dd92e2afd89eb6e9d27616858e72a67bdc1a7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52574/CVE-2023-52574-b44dd92e2afd89eb6e9d27616858e72a67bdc1a7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c5f6478686bb45f453031594ae19b6c9723a780d",
                "patch_url": "https://git.kernel.org/stable/p/c5f6478686bb45f453031594ae19b6c9723a780d",
                "filename": "CVE-2023-52574-c5f6478686bb45f453031594ae19b6c9723a780d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52574/CVE-2023-52574-c5f6478686bb45f453031594ae19b6c9723a780d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cac50d9f5d876be32cb9aa21c74018468900284d",
                "patch_url": "https://git.kernel.org/stable/p/cac50d9f5d876be32cb9aa21c74018468900284d",
                "filename": "CVE-2023-52574-cac50d9f5d876be32cb9aa21c74018468900284d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52574/CVE-2023-52574-cac50d9f5d876be32cb9aa21c74018468900284d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cd05eec2ee0cc396813a32ef675634e403748255",
                "patch_url": "https://git.kernel.org/stable/p/cd05eec2ee0cc396813a32ef675634e403748255",
                "filename": "CVE-2023-52574-cd05eec2ee0cc396813a32ef675634e403748255.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52574/CVE-2023-52574-cd05eec2ee0cc396813a32ef675634e403748255.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1779eb51b9cc628cee551f252701a85a2a50a457",
            "https://git.kernel.org/stable/c/2f0acb0736ecc3eb85dc80ad2790d634dcb10b58",
            "https://git.kernel.org/stable/c/492032760127251e5540a5716a70996bacf2a3fd",
            "https://git.kernel.org/stable/c/a7fb47b9711101d2405b0eb1276fb1f9b9b270c7",
            "https://git.kernel.org/stable/c/b44dd92e2afd89eb6e9d27616858e72a67bdc1a7",
            "https://git.kernel.org/stable/c/c5f6478686bb45f453031594ae19b6c9723a780d",
            "https://git.kernel.org/stable/c/cac50d9f5d876be32cb9aa21c74018468900284d",
            "https://git.kernel.org/stable/c/cd05eec2ee0cc396813a32ef675634e403748255",
            "https://www.cve.org/CVERecord?id=CVE-2023-52574\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52574\nhttps://lore.kernel.org/linux-cve-announce/2024030256-CVE-2023-52574-a423@gregkh/T/#u"
        ]
    },
    "CVE-2023-52578": {
        "cve": "CVE-2023-52578",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: use DEV_STATS_INC()\n\nsyzbot/KCSAN reported data-races in br_handle_frame_finish() [1]\nThis function can run from multiple cpus without mutual exclusion.\n\nAdopt SMP safe DEV_STATS_INC() to update dev->stats fields.\n\nHandles updates to dev->stats.tx_dropped while we are at it.\n\n[1]\nBUG: KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish\n\nread-write to 0xffff8881374b2178 of 8 bytes by interrupt on cpu 1:\nbr_handle_frame_finish+0xd4f/0xef0 net/bridge/br_input.c:189\nbr_nf_hook_thresh+0x1ed/0x220\nbr_nf_pre_routing_finish_ipv6+0x50f/0x540\nNF_HOOK include/linux/netfilter.h:304 [inline]\nbr_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:178\nbr_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:508\nnf_hook_entry_hookfn include/linux/netfilter.h:144 [inline]\nnf_hook_bridge_pre net/bridge/br_input.c:272 [inline]\nbr_handle_frame+0x4c9/0x940 net/bridge/br_input.c:417\n__netif_receive_skb_core+0xa8a/0x21e0 net/core/dev.c:5417\n__netif_receive_skb_one_core net/core/dev.c:5521 [inline]\n__netif_receive_skb+0x57/0x1b0 net/core/dev.c:5637\nprocess_backlog+0x21f/0x380 net/core/dev.c:5965\n__napi_poll+0x60/0x3b0 net/core/dev.c:6527\nnapi_poll net/core/dev.c:6594 [inline]\nnet_rx_action+0x32b/0x750 net/core/dev.c:6727\n__do_softirq+0xc1/0x265 kernel/softirq.c:553\nrun_ksoftirqd+0x17/0x20 kernel/softirq.c:921\nsmpboot_thread_fn+0x30a/0x4a0 kernel/smpboot.c:164\nkthread+0x1d7/0x210 kernel/kthread.c:388\nret_from_fork+0x48/0x60 arch/x86/kernel/process.c:147\nret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304\n\nread-write to 0xffff8881374b2178 of 8 bytes by interrupt on cpu 0:\nbr_handle_frame_finish+0xd4f/0xef0 net/bridge/br_input.c:189\nbr_nf_hook_thresh+0x1ed/0x220\nbr_nf_pre_routing_finish_ipv6+0x50f/0x540\nNF_HOOK include/linux/netfilter.h:304 [inline]\nbr_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:178\nbr_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:508\nnf_hook_entry_hookfn include/linux/netfilter.h:144 [inline]\nnf_hook_bridge_pre net/bridge/br_input.c:272 [inline]\nbr_handle_frame+0x4c9/0x940 net/bridge/br_input.c:417\n__netif_receive_skb_core+0xa8a/0x21e0 net/core/dev.c:5417\n__netif_receive_skb_one_core net/core/dev.c:5521 [inline]\n__netif_receive_skb+0x57/0x1b0 net/core/dev.c:5637\nprocess_backlog+0x21f/0x380 net/core/dev.c:5965\n__napi_poll+0x60/0x3b0 net/core/dev.c:6527\nnapi_poll net/core/dev.c:6594 [inline]\nnet_rx_action+0x32b/0x750 net/core/dev.c:6727\n__do_softirq+0xc1/0x265 kernel/softirq.c:553\ndo_softirq+0x5e/0x90 kernel/softirq.c:454\n__local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381\n__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]\n_raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210\nspin_unlock_bh include/linux/spinlock.h:396 [inline]\nbatadv_tt_local_purge+0x1a8/0x1f0 net/batman-adv/translation-table.c:1356\nbatadv_tt_purge+0x2b/0x630 net/batman-adv/translation-table.c:3560\nprocess_one_work kernel/workqueue.c:2630 [inline]\nprocess_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2703\nworker_thread+0x525/0x730 kernel/workqueue.c:2784\nkthread+0x1d7/0x210 kernel/kthread.c:388\nret_from_fork+0x48/0x60 arch/x86/kernel/process.c:147\nret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304\n\nvalue changed: 0x00000000000d7190 -> 0x00000000000d7191\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 PID: 14848 Comm: kworker/u4:11 Not tainted 6.6.0-rc1-syzkaller-00236-gad8a69f361b9 #0",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52578",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2",
            "patch_url": "https://git.kernel.org/stable/p/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2",
            "filename": "CVE-2023-52578-89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52578/CVE-2023-52578-89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd",
                "patch_url": "https://git.kernel.org/stable/p/04cc361f029c14dd067ad180525c7392334c9bfd",
                "filename": "CVE-2023-52578-04cc361f029c14dd067ad180525c7392334c9bfd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52578/CVE-2023-52578-04cc361f029c14dd067ad180525c7392334c9bfd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4",
                "patch_url": "https://git.kernel.org/stable/p/44bdb313da57322c9b3c108eb66981c6ec6509f4",
                "filename": "CVE-2023-52578-44bdb313da57322c9b3c108eb66981c6ec6509f4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52578/CVE-2023-52578-44bdb313da57322c9b3c108eb66981c6ec6509f4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2",
                "patch_url": "https://git.kernel.org/stable/p/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2",
                "filename": "CVE-2023-52578-89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52578/CVE-2023-52578-89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394",
                "patch_url": "https://git.kernel.org/stable/p/8bc97117b51d68d5cea8f5351cca2d8c4153f394",
                "filename": "CVE-2023-52578-8bc97117b51d68d5cea8f5351cca2d8c4153f394.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52578/CVE-2023-52578-8bc97117b51d68d5cea8f5351cca2d8c4153f394.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5",
                "patch_url": "https://git.kernel.org/stable/p/ad8d39c7b437fcdab7208a6a56c093d222c008d5",
                "filename": "CVE-2023-52578-ad8d39c7b437fcdab7208a6a56c093d222c008d5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52578/CVE-2023-52578-ad8d39c7b437fcdab7208a6a56c093d222c008d5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839",
                "patch_url": "https://git.kernel.org/stable/p/d2346e6beb699909ca455d9d20c4e577ce900839",
                "filename": "CVE-2023-52578-d2346e6beb699909ca455d9d20c4e577ce900839.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52578/CVE-2023-52578-d2346e6beb699909ca455d9d20c4e577ce900839.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa",
                "patch_url": "https://git.kernel.org/stable/p/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa",
                "filename": "CVE-2023-52578-f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52578/CVE-2023-52578-f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd",
            "https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4",
            "https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2",
            "https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394",
            "https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5",
            "https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839",
            "https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa",
            "https://www.cve.org/CVERecord?id=CVE-2023-52578\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52578\nhttps://lore.kernel.org/linux-cve-announce/2024030257-CVE-2023-52578-50cb@gregkh/T/#u"
        ]
    },
    "CVE-2023-52580": {
        "cve": "CVE-2023-52580",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/core: Fix ETH_P_1588 flow dissector\n\nWhen a PTP ethernet raw frame with a size of more than 256 bytes followed\nby a 0xff pattern is sent to __skb_flow_dissect, nhoff value calculation\nis wrong. For example: hdr->message_length takes the wrong value (0xffff)\nand it does not replicate real header length. In this case, 'nhoff' value\nwas overridden and the PTP header was badly dissected. This leads to a\nkernel crash.\n\nnet/core: flow_dissector\nnet/core flow dissector nhoff = 0x0000000e\nnet/core flow dissector hdr->message_length = 0x0000ffff\nnet/core flow dissector nhoff = 0x0001000d (u16 overflow)\n...\nskb linear:   00000000: 00 a0 c9 00 00 00 00 a0 c9 00 00 00 88\nskb frag:     00000000: f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n\nUsing the size of the ptp_header struct will allow the corrected\ncalculation of the nhoff value.\n\nnet/core flow dissector nhoff = 0x0000000e\nnet/core flow dissector nhoff = 0x00000030 (sizeof ptp_header)\n...\nskb linear:   00000000: 00 a0 c9 00 00 00 00 a0 c9 00 00 00 88 f7 ff ff\nskb linear:   00000010: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\nskb linear:   00000020: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\nskb frag:     00000000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n\nKernel trace:\n[   74.984279] ------------[ cut here ]------------\n[   74.989471] kernel BUG at include/linux/skbuff.h:2440!\n[   74.995237] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n[   75.001098] CPU: 4 PID: 0 Comm: swapper/4 Tainted: G     U            5.15.85-intel-ese-standard-lts #1\n[   75.011629] Hardware name: Intel Corporation A-Island (CPU:AlderLake)/A-Island (ID:06), BIOS SB_ADLP.01.01.00.01.03.008.D-6A9D9E73-dirty Mar 30 2023\n[   75.026507] RIP: 0010:eth_type_trans+0xd0/0x130\n[   75.031594] Code: 03 88 47 78 eb c7 8b 47 68 2b 47 6c 48 8b 97 c0 00 00 00 83 f8 01 7e 1b 48 85 d2 74 06 66 83 3a ff 74 09 b8 00 04 00 00 eb ab <0f> 0b b8 00 01 00 00 eb a2 48 85 ff 74 eb 48 8d 54 24 06 31 f6 b9\n[   75.052612] RSP: 0018:ffff9948c0228de0 EFLAGS: 00010297\n[   75.058473] RAX: 00000000000003f2 RBX: ffff8e47047dc300 RCX: 0000000000001003\n[   75.066462] RDX: ffff8e4e8c9ea040 RSI: ffff8e4704e0a000 RDI: ffff8e47047dc300\n[   75.074458] RBP: ffff8e4704e2acc0 R08: 00000000000003f3 R09: 0000000000000800\n[   75.082466] R10: 000000000000000d R11: ffff9948c0228dec R12: ffff8e4715e4e010\n[   75.090461] R13: ffff9948c0545018 R14: 0000000000000001 R15: 0000000000000800\n[   75.098464] FS:  0000000000000000(0000) GS:ffff8e4e8fb00000(0000) knlGS:0000000000000000\n[   75.107530] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   75.113982] CR2: 00007f5eb35934a0 CR3: 0000000150e0a002 CR4: 0000000000770ee0\n[   75.121980] PKRU: 55555554\n[   75.125035] Call Trace:\n[   75.127792]  <IRQ>\n[   75.130063]  ? eth_get_headlen+0xa4/0xc0\n[   75.134472]  igc_process_skb_fields+0xcd/0x150\n[   75.139461]  igc_poll+0xc80/0x17b0\n[   75.143272]  __napi_poll+0x27/0x170\n[   75.147192]  net_rx_action+0x234/0x280\n[   75.151409]  __do_softirq+0xef/0x2f4\n[   75.155424]  irq_exit_rcu+0xc7/0x110\n[   75.159432]  common_interrupt+0xb8/0xd0\n[   75.163748]  </IRQ>\n[   75.166112]  <TASK>\n[   75.168473]  asm_common_interrupt+0x22/0x40\n[   75.173175] RIP: 0010:cpuidle_enter_state+0xe2/0x350\n[   75.178749] Code: 85 c0 0f 8f 04 02 00 00 31 ff e8 39 6c 67 ff 45 84 ff 74 12 9c 58 f6 c4 02 0f 85 50 02 00 00 31 ff e8 52 b0 6d ff fb 45 85 f6 <0f> 88 b1 00 00 00 49 63 ce 4c 2b 2c 24 48 89 c8 48 6b d1 68 48 c1\n[   75.199757] RSP: 0018:ffff9948c013bea8 EFLAGS: 00000202\n[   75.205614] RAX: ffff8e4e8fb00000 RBX: ffffb948bfd23900 RCX: 000000000000001f\n[   75.213619] RDX: 0000000000000004 RSI: ffffffff94206161 RDI: ffffffff94212e20\n[   75.221620] RBP: 0000000000000004 R08: 000000117568973a R09: 0000000000000001\n[   75.229622] R10: 000000000000afc8 R11: ffff8e4e8fb29ce4 R12: ffffffff945ae980\n[   75.237628] R13: 000000117568973a R14: 0000000000000004 R15: 0000000000000000\n[   75.245635]  ? \n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52580",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/488ea2a3e2666022f79abfdd7d12e8305fc27a40",
            "patch_url": "https://git.kernel.org/stable/p/488ea2a3e2666022f79abfdd7d12e8305fc27a40",
            "filename": "CVE-2023-52580-488ea2a3e2666022f79abfdd7d12e8305fc27a40.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52580/CVE-2023-52580-488ea2a3e2666022f79abfdd7d12e8305fc27a40.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/488ea2a3e2666022f79abfdd7d12e8305fc27a40",
                "patch_url": "https://git.kernel.org/stable/p/488ea2a3e2666022f79abfdd7d12e8305fc27a40",
                "filename": "CVE-2023-52580-488ea2a3e2666022f79abfdd7d12e8305fc27a40.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52580/CVE-2023-52580-488ea2a3e2666022f79abfdd7d12e8305fc27a40.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/48e105a2a1a10adc21c0ae717969f5e8e990ba48",
                "patch_url": "https://git.kernel.org/stable/p/48e105a2a1a10adc21c0ae717969f5e8e990ba48",
                "filename": "CVE-2023-52580-48e105a2a1a10adc21c0ae717969f5e8e990ba48.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52580/CVE-2023-52580-48e105a2a1a10adc21c0ae717969f5e8e990ba48.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/75ad80ed88a182ab2ad5513e448cf07b403af5c3",
                "patch_url": "https://git.kernel.org/stable/p/75ad80ed88a182ab2ad5513e448cf07b403af5c3",
                "filename": "CVE-2023-52580-75ad80ed88a182ab2ad5513e448cf07b403af5c3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52580/CVE-2023-52580-75ad80ed88a182ab2ad5513e448cf07b403af5c3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f90a7b9586d72f907092078a9f394733ca502cc9",
                "patch_url": "https://git.kernel.org/stable/p/f90a7b9586d72f907092078a9f394733ca502cc9",
                "filename": "CVE-2023-52580-f90a7b9586d72f907092078a9f394733ca502cc9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52580/CVE-2023-52580-f90a7b9586d72f907092078a9f394733ca502cc9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/488ea2a3e2666022f79abfdd7d12e8305fc27a40",
            "https://git.kernel.org/stable/c/48e105a2a1a10adc21c0ae717969f5e8e990ba48",
            "https://git.kernel.org/stable/c/75ad80ed88a182ab2ad5513e448cf07b403af5c3",
            "https://git.kernel.org/stable/c/f90a7b9586d72f907092078a9f394733ca502cc9",
            "https://www.cve.org/CVERecord?id=CVE-2023-52580\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52580\nhttps://lore.kernel.org/linux-cve-announce/2024030258-CVE-2023-52580-c37e@gregkh/T/#u"
        ]
    },
    "CVE-2023-52581": {
        "cve": "CVE-2023-52581",
        "cvss_v2": null,
        "cvss_v3": 6.3,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix memleak when more than 255 elements expired\n\nWhen more than 255 elements expired we're supposed to switch to a new gc\ncontainer structure.\n\nThis never happens: u8 type will wrap before reaching the boundary\nand nft_trans_gc_space() always returns true.\n\nThis means we recycle the initial gc container structure and\nlose track of the elements that came before.\n\nWhile at it, don't deref 'gc' after we've passed it to call_rcu.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52581",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8",
            "patch_url": "https://git.kernel.org/stable/p/09c85f2d21ab6b5acba31a037985b13e8e6565b8",
            "filename": "CVE-2023-52581-09c85f2d21ab6b5acba31a037985b13e8e6565b8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52581/CVE-2023-52581-09c85f2d21ab6b5acba31a037985b13e8e6565b8.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8",
                "patch_url": "https://git.kernel.org/stable/p/09c85f2d21ab6b5acba31a037985b13e8e6565b8",
                "filename": "CVE-2023-52581-09c85f2d21ab6b5acba31a037985b13e8e6565b8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52581/CVE-2023-52581-09c85f2d21ab6b5acba31a037985b13e8e6565b8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14",
                "patch_url": "https://git.kernel.org/stable/p/4aea243b6853d06c1d160a9955b759189aa02b14",
                "filename": "CVE-2023-52581-4aea243b6853d06c1d160a9955b759189aa02b14.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52581/CVE-2023-52581-4aea243b6853d06c1d160a9955b759189aa02b14.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125",
                "patch_url": "https://git.kernel.org/stable/p/7cf055b43756b10aa2b851c927c940f5ed652125",
                "filename": "CVE-2023-52581-7cf055b43756b10aa2b851c927c940f5ed652125.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52581/CVE-2023-52581-7cf055b43756b10aa2b851c927c940f5ed652125.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07",
                "patch_url": "https://git.kernel.org/stable/p/7e5d732e6902eb6a37b35480796838a145ae5f07",
                "filename": "CVE-2023-52581-7e5d732e6902eb6a37b35480796838a145ae5f07.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52581/CVE-2023-52581-7e5d732e6902eb6a37b35480796838a145ae5f07.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01",
                "patch_url": "https://git.kernel.org/stable/p/a995a68e8a3b48533e47c856865d109a1f1a9d01",
                "filename": "CVE-2023-52581-a995a68e8a3b48533e47c856865d109a1f1a9d01.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52581/CVE-2023-52581-a995a68e8a3b48533e47c856865d109a1f1a9d01.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5",
                "patch_url": "https://git.kernel.org/stable/p/cf5000a7787cbc10341091d37245a42c119d26c5",
                "filename": "CVE-2023-52581-cf5000a7787cbc10341091d37245a42c119d26c5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52581/CVE-2023-52581-cf5000a7787cbc10341091d37245a42c119d26c5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171",
                "patch_url": "https://git.kernel.org/stable/p/ef99506eaf1dc31feff1adfcfd68bc5535a22171",
                "filename": "CVE-2023-52581-ef99506eaf1dc31feff1adfcfd68bc5535a22171.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52581/CVE-2023-52581-ef99506eaf1dc31feff1adfcfd68bc5535a22171.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8",
            "https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14",
            "https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125",
            "https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07",
            "https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01",
            "https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5",
            "https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171",
            "https://www.cve.org/CVERecord?id=CVE-2023-52581\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52581\nhttps://lore.kernel.org/linux-cve-announce/2024030258-CVE-2023-52581-2165@gregkh/T/#u"
        ]
    },
    "CVE-2023-52594": {
        "cve": "CVE-2023-52594",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()\n\nFix an array-index-out-of-bounds read in ath9k_htc_txstatus(). The bug\noccurs when txs->cnt, data from a URB provided by a USB device, is\nbigger than the size of the array txs->txstatus, which is\nHTC_MAX_TX_STATUS. WARN_ON() already checks it, but there is no bug\nhandling code after the check. Make the function return if that is the\ncase.\n\nFound by a modified version of syzkaller.\n\nUBSAN: array-index-out-of-bounds in htc_drv_txrx.c\nindex 13 is out of range for type '__wmi_event_txstatus [12]'\nCall Trace:\n ath9k_htc_txstatus\n ath9k_wmi_event_tasklet\n tasklet_action_common\n __do_softirq\n irq_exit_rxu\n sysvec_apic_timer_interrupt",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52594",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234",
            "patch_url": "https://git.kernel.org/stable/p/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234",
            "filename": "CVE-2023-52594-25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52594/CVE-2023-52594-25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234",
                "patch_url": "https://git.kernel.org/stable/p/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234",
                "filename": "CVE-2023-52594-25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52594/CVE-2023-52594-25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348",
                "patch_url": "https://git.kernel.org/stable/p/2adc886244dff60f948497b59affb6c6ebb3c348",
                "filename": "CVE-2023-52594-2adc886244dff60f948497b59affb6c6ebb3c348.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52594/CVE-2023-52594-2adc886244dff60f948497b59affb6c6ebb3c348.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1",
                "patch_url": "https://git.kernel.org/stable/p/84770a996ad8d7f121ff2fb5a8d149aad52d64c1",
                "filename": "CVE-2023-52594-84770a996ad8d7f121ff2fb5a8d149aad52d64c1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52594/CVE-2023-52594-84770a996ad8d7f121ff2fb5a8d149aad52d64c1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9",
                "patch_url": "https://git.kernel.org/stable/p/9003fa9a0198ce004b30738766c67eb7373479c9",
                "filename": "CVE-2023-52594-9003fa9a0198ce004b30738766c67eb7373479c9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52594/CVE-2023-52594-9003fa9a0198ce004b30738766c67eb7373479c9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1",
                "patch_url": "https://git.kernel.org/stable/p/be609c7002dd4504b15b069cb7582f4c778548d1",
                "filename": "CVE-2023-52594-be609c7002dd4504b15b069cb7582f4c778548d1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52594/CVE-2023-52594-be609c7002dd4504b15b069cb7582f4c778548d1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d",
                "patch_url": "https://git.kernel.org/stable/p/e4f4bac7d3b64eb75f70cd3345712de6f68a215d",
                "filename": "CVE-2023-52594-e4f4bac7d3b64eb75f70cd3345712de6f68a215d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52594/CVE-2023-52594-e4f4bac7d3b64eb75f70cd3345712de6f68a215d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225",
                "patch_url": "https://git.kernel.org/stable/p/f11f0fd1ad6c11ae7856d4325fe9d05059767225",
                "filename": "CVE-2023-52594-f11f0fd1ad6c11ae7856d4325fe9d05059767225.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52594/CVE-2023-52594-f11f0fd1ad6c11ae7856d4325fe9d05059767225.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc",
                "patch_url": "https://git.kernel.org/stable/p/f44f073c78112ff921a220d01b86d09f2ace59bc",
                "filename": "CVE-2023-52594-f44f073c78112ff921a220d01b86d09f2ace59bc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52594/CVE-2023-52594-f44f073c78112ff921a220d01b86d09f2ace59bc.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234",
            "https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348",
            "https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1",
            "https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9",
            "https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1",
            "https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d",
            "https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225",
            "https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc",
            "https://www.cve.org/CVERecord?id=CVE-2023-52594\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52594\nhttps://lore.kernel.org/linux-cve-announce/2024030645-CVE-2023-52594-9b84@gregkh/T"
        ]
    },
    "CVE-2023-52595": {
        "cve": "CVE-2023-52595",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rt2x00: restart beacon queue when hardware reset\n\nWhen a hardware reset is triggered, all registers are reset, so all\nqueues are forced to stop in hardware interface. However, mac80211\nwill not automatically stop the queue. If we don't manually stop the\nbeacon queue, the queue will be deadlocked and unable to start again.\nThis patch fixes the issue where Apple devices cannot connect to the\nAP after calling ieee80211_restart_hw().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52595",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83",
            "patch_url": "https://git.kernel.org/stable/p/04cfe4a5da57ab9358cdfadea22bcb37324aaf83",
            "filename": "CVE-2023-52595-04cfe4a5da57ab9358cdfadea22bcb37324aaf83.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52595/CVE-2023-52595-04cfe4a5da57ab9358cdfadea22bcb37324aaf83.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83",
                "patch_url": "https://git.kernel.org/stable/p/04cfe4a5da57ab9358cdfadea22bcb37324aaf83",
                "filename": "CVE-2023-52595-04cfe4a5da57ab9358cdfadea22bcb37324aaf83.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52595/CVE-2023-52595-04cfe4a5da57ab9358cdfadea22bcb37324aaf83.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c",
                "patch_url": "https://git.kernel.org/stable/p/4cc198580a7b93a36f5beb923f40f7ae27a3716c",
                "filename": "CVE-2023-52595-4cc198580a7b93a36f5beb923f40f7ae27a3716c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52595/CVE-2023-52595-4cc198580a7b93a36f5beb923f40f7ae27a3716c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e",
                "patch_url": "https://git.kernel.org/stable/p/69e905beca193125820c201ab3db4fb0e245124e",
                "filename": "CVE-2023-52595-69e905beca193125820c201ab3db4fb0e245124e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52595/CVE-2023-52595-69e905beca193125820c201ab3db4fb0e245124e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957",
                "patch_url": "https://git.kernel.org/stable/p/739b3ccd9486dff04af95f9a890846d088a84957",
                "filename": "CVE-2023-52595-739b3ccd9486dff04af95f9a890846d088a84957.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52595/CVE-2023-52595-739b3ccd9486dff04af95f9a890846d088a84957.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8",
                "patch_url": "https://git.kernel.org/stable/p/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8",
                "filename": "CVE-2023-52595-a11d965a218f0cd95b13fe44d0bcd8a20ce134a8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52595/CVE-2023-52595-a11d965a218f0cd95b13fe44d0bcd8a20ce134a8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48",
                "patch_url": "https://git.kernel.org/stable/p/e1f113b57ddd18274d7c83618deca25cc880bc48",
                "filename": "CVE-2023-52595-e1f113b57ddd18274d7c83618deca25cc880bc48.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52595/CVE-2023-52595-e1f113b57ddd18274d7c83618deca25cc880bc48.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb",
                "patch_url": "https://git.kernel.org/stable/p/fdb580ed05df8973aa5149cafa598c64bebcd0cb",
                "filename": "CVE-2023-52595-fdb580ed05df8973aa5149cafa598c64bebcd0cb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52595/CVE-2023-52595-fdb580ed05df8973aa5149cafa598c64bebcd0cb.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83",
            "https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c",
            "https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e",
            "https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957",
            "https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8",
            "https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48",
            "https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb",
            "https://www.cve.org/CVERecord?id=CVE-2023-52595\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52595\nhttps://lore.kernel.org/linux-cve-announce/2024030645-CVE-2023-52595-d018@gregkh/T"
        ]
    },
    "CVE-2023-52598": {
        "cve": "CVE-2023-52598",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/ptrace: handle setting of fpc register correctly\n\nIf the content of the floating point control (fpc) register of a traced\nprocess is modified with the ptrace interface the new value is tested for\nvalidity by temporarily loading it into the fpc register.\n\nThis may lead to corruption of the fpc register of the tracing process:\nif an interrupt happens while the value is temporarily loaded into the\nfpc register, and within interrupt context floating point or vector\nregisters are used, the current fp/vx registers are saved with\nsave_fpu_regs() assuming they belong to user space and will be loaded into\nfp/vx registers when returning to user space.\n\ntest_fp_ctl() restores the original user space fpc register value, however\nit will be discarded, when returning to user space.\n\nIn result the tracer will incorrectly continue to run with the value that\nwas supposed to be used for the traced process.\n\nFix this by saving fpu register contents with save_fpu_regs() before using\ntest_fp_ctl().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52598",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/8b13601d19c541158a6e18b278c00ba69ae37829",
            "patch_url": "https://git.kernel.org/stable/p/8b13601d19c541158a6e18b278c00ba69ae37829",
            "filename": "CVE-2023-52598-8b13601d19c541158a6e18b278c00ba69ae37829.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52598/CVE-2023-52598-8b13601d19c541158a6e18b278c00ba69ae37829.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/02c6bbfb08bad78dd014e24c7b893723c15ec7a1",
                "patch_url": "https://git.kernel.org/stable/p/02c6bbfb08bad78dd014e24c7b893723c15ec7a1",
                "filename": "CVE-2023-52598-02c6bbfb08bad78dd014e24c7b893723c15ec7a1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52598/CVE-2023-52598-02c6bbfb08bad78dd014e24c7b893723c15ec7a1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/28a1f492cb527f64593457a0a0f0d809b3f36c25",
                "patch_url": "https://git.kernel.org/stable/p/28a1f492cb527f64593457a0a0f0d809b3f36c25",
                "filename": "CVE-2023-52598-28a1f492cb527f64593457a0a0f0d809b3f36c25.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52598/CVE-2023-52598-28a1f492cb527f64593457a0a0f0d809b3f36c25.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6ccf904aac0292e1f6b1a1be6c407c414f7cf713",
                "patch_url": "https://git.kernel.org/stable/p/6ccf904aac0292e1f6b1a1be6c407c414f7cf713",
                "filename": "CVE-2023-52598-6ccf904aac0292e1f6b1a1be6c407c414f7cf713.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52598/CVE-2023-52598-6ccf904aac0292e1f6b1a1be6c407c414f7cf713.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6d0822f2cc9b153bf2df49a84599195a2e0d21a8",
                "patch_url": "https://git.kernel.org/stable/p/6d0822f2cc9b153bf2df49a84599195a2e0d21a8",
                "filename": "CVE-2023-52598-6d0822f2cc9b153bf2df49a84599195a2e0d21a8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52598/CVE-2023-52598-6d0822f2cc9b153bf2df49a84599195a2e0d21a8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7a4d6481fbdd661f9e40e95febb95e3dee82bad3",
                "patch_url": "https://git.kernel.org/stable/p/7a4d6481fbdd661f9e40e95febb95e3dee82bad3",
                "filename": "CVE-2023-52598-7a4d6481fbdd661f9e40e95febb95e3dee82bad3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52598/CVE-2023-52598-7a4d6481fbdd661f9e40e95febb95e3dee82bad3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/856caf2730ea18cb39e95833719c02a02447dc0a",
                "patch_url": "https://git.kernel.org/stable/p/856caf2730ea18cb39e95833719c02a02447dc0a",
                "filename": "CVE-2023-52598-856caf2730ea18cb39e95833719c02a02447dc0a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52598/CVE-2023-52598-856caf2730ea18cb39e95833719c02a02447dc0a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8b13601d19c541158a6e18b278c00ba69ae37829",
                "patch_url": "https://git.kernel.org/stable/p/8b13601d19c541158a6e18b278c00ba69ae37829",
                "filename": "CVE-2023-52598-8b13601d19c541158a6e18b278c00ba69ae37829.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52598/CVE-2023-52598-8b13601d19c541158a6e18b278c00ba69ae37829.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bdce67df7f12fb0409fbc604ce7c4254703f56d4",
                "patch_url": "https://git.kernel.org/stable/p/bdce67df7f12fb0409fbc604ce7c4254703f56d4",
                "filename": "CVE-2023-52598-bdce67df7f12fb0409fbc604ce7c4254703f56d4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52598/CVE-2023-52598-bdce67df7f12fb0409fbc604ce7c4254703f56d4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/02c6bbfb08bad78dd014e24c7b893723c15ec7a1",
            "https://git.kernel.org/stable/c/28a1f492cb527f64593457a0a0f0d809b3f36c25",
            "https://git.kernel.org/stable/c/6ccf904aac0292e1f6b1a1be6c407c414f7cf713",
            "https://git.kernel.org/stable/c/6d0822f2cc9b153bf2df49a84599195a2e0d21a8",
            "https://git.kernel.org/stable/c/7a4d6481fbdd661f9e40e95febb95e3dee82bad3",
            "https://git.kernel.org/stable/c/856caf2730ea18cb39e95833719c02a02447dc0a",
            "https://git.kernel.org/stable/c/8b13601d19c541158a6e18b278c00ba69ae37829",
            "https://git.kernel.org/stable/c/bdce67df7f12fb0409fbc604ce7c4254703f56d4",
            "https://www.cve.org/CVERecord?id=CVE-2023-52598\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52598\nhttps://lore.kernel.org/linux-cve-announce/2024030646-CVE-2023-52598-d0a2@gregkh/T"
        ]
    },
    "CVE-2023-52605": {
        "cve": "CVE-2023-52605",
        "cvss_v2": null,
        "cvss_v3": "4.4",
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52605",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/d2049af7ddbc361702c3e1f09bd6c5e9488454ca",
            "patch_url": "https://git.kernel.org/stable/p/d2049af7ddbc361702c3e1f09bd6c5e9488454ca",
            "filename": "CVE-2023-52605-d2049af7ddbc361702c3e1f09bd6c5e9488454ca.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52605/CVE-2023-52605-d2049af7ddbc361702c3e1f09bd6c5e9488454ca.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/33650372e3ead97c5ab3b84d9ad97737bc5e00c0",
                "patch_url": "https://git.kernel.org/stable/p/33650372e3ead97c5ab3b84d9ad97737bc5e00c0",
                "filename": "CVE-2023-52605-33650372e3ead97c5ab3b84d9ad97737bc5e00c0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52605/CVE-2023-52605-33650372e3ead97c5ab3b84d9ad97737bc5e00c0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5457b0cbaa0238fc56b855c4ef2c0b9cc9c559ab",
                "patch_url": "https://git.kernel.org/stable/p/5457b0cbaa0238fc56b855c4ef2c0b9cc9c559ab",
                "filename": "CVE-2023-52605-5457b0cbaa0238fc56b855c4ef2c0b9cc9c559ab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52605/CVE-2023-52605-5457b0cbaa0238fc56b855c4ef2c0b9cc9c559ab.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/72d9b9747e78979510e9aafdd32eb99c7aa30dd1",
                "patch_url": "https://git.kernel.org/stable/p/72d9b9747e78979510e9aafdd32eb99c7aa30dd1",
                "filename": "CVE-2023-52605-72d9b9747e78979510e9aafdd32eb99c7aa30dd1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52605/CVE-2023-52605-72d9b9747e78979510e9aafdd32eb99c7aa30dd1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/77846571b3ba6a6125a20ad109bb8514ba884cf9",
                "patch_url": "https://git.kernel.org/stable/p/77846571b3ba6a6125a20ad109bb8514ba884cf9",
                "filename": "CVE-2023-52605-77846571b3ba6a6125a20ad109bb8514ba884cf9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52605/CVE-2023-52605-77846571b3ba6a6125a20ad109bb8514ba884cf9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b17a71435e7e153e949df018244a98b4ede04069",
                "patch_url": "https://git.kernel.org/stable/p/b17a71435e7e153e949df018244a98b4ede04069",
                "filename": "CVE-2023-52605-b17a71435e7e153e949df018244a98b4ede04069.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52605/CVE-2023-52605-b17a71435e7e153e949df018244a98b4ede04069.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7b33627be0626b16ca321b982d6a2261ef7f703",
                "patch_url": "https://git.kernel.org/stable/p/b7b33627be0626b16ca321b982d6a2261ef7f703",
                "filename": "CVE-2023-52605-b7b33627be0626b16ca321b982d6a2261ef7f703.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52605/CVE-2023-52605-b7b33627be0626b16ca321b982d6a2261ef7f703.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d2049af7ddbc361702c3e1f09bd6c5e9488454ca",
                "patch_url": "https://git.kernel.org/stable/p/d2049af7ddbc361702c3e1f09bd6c5e9488454ca",
                "filename": "CVE-2023-52605-d2049af7ddbc361702c3e1f09bd6c5e9488454ca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52605/CVE-2023-52605-d2049af7ddbc361702c3e1f09bd6c5e9488454ca.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f066171de33d71ff0f7c46bd17636a5a26db3fb6",
                "patch_url": "https://git.kernel.org/stable/p/f066171de33d71ff0f7c46bd17636a5a26db3fb6",
                "filename": "CVE-2023-52605-f066171de33d71ff0f7c46bd17636a5a26db3fb6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52605/CVE-2023-52605-f066171de33d71ff0f7c46bd17636a5a26db3fb6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/33650372e3ead97c5ab3b84d9ad97737bc5e00c0",
            "https://git.kernel.org/stable/c/5457b0cbaa0238fc56b855c4ef2c0b9cc9c559ab",
            "https://git.kernel.org/stable/c/72d9b9747e78979510e9aafdd32eb99c7aa30dd1",
            "https://git.kernel.org/stable/c/77846571b3ba6a6125a20ad109bb8514ba884cf9",
            "https://git.kernel.org/stable/c/b17a71435e7e153e949df018244a98b4ede04069",
            "https://git.kernel.org/stable/c/b7b33627be0626b16ca321b982d6a2261ef7f703",
            "https://git.kernel.org/stable/c/d2049af7ddbc361702c3e1f09bd6c5e9488454ca",
            "https://git.kernel.org/stable/c/f066171de33d71ff0f7c46bd17636a5a26db3fb6",
            "https://www.cve.org/CVERecord?id=CVE-2023-52605\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52605\nhttps://lore.kernel.org/linux-cve-announce/2024030647-CVE-2023-52605-292a@gregkh/T"
        ]
    },
    "CVE-2023-52606": {
        "cve": "CVE-2023-52606",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/lib: Validate size for vector operations\n\nSome of the fp/vmx code in sstep.c assume a certain maximum size for the\ninstructions being emulated. The size of those operations however is\ndetermined separately in analyse_instr().\n\nAdd a check to validate the assumption on the maximum size of the\noperations, so as to prevent any unintended kernel stack corruption.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52606",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b",
            "patch_url": "https://git.kernel.org/stable/p/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b",
            "filename": "CVE-2023-52606-de4f5ed63b8a199704d8cdcbf810309d7eb4b36b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52606/CVE-2023-52606-de4f5ed63b8a199704d8cdcbf810309d7eb4b36b.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf",
                "patch_url": "https://git.kernel.org/stable/p/0580f4403ad33f379eef865c2a6fe94de37febdf",
                "filename": "CVE-2023-52606-0580f4403ad33f379eef865c2a6fe94de37febdf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52606/CVE-2023-52606-0580f4403ad33f379eef865c2a6fe94de37febdf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c",
                "patch_url": "https://git.kernel.org/stable/p/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c",
                "filename": "CVE-2023-52606-28b8ba8eebf26f66d9f2df4ba550b6b3b136082c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52606/CVE-2023-52606-28b8ba8eebf26f66d9f2df4ba550b6b3b136082c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414",
                "patch_url": "https://git.kernel.org/stable/p/42084a428a139f1a429f597d44621e3a18f3e414",
                "filename": "CVE-2023-52606-42084a428a139f1a429f597d44621e3a18f3e414.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52606/CVE-2023-52606-42084a428a139f1a429f597d44621e3a18f3e414.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd",
                "patch_url": "https://git.kernel.org/stable/p/848e1d7fd710900397e1d0e7584680c1c04e3afd",
                "filename": "CVE-2023-52606-848e1d7fd710900397e1d0e7584680c1c04e3afd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52606/CVE-2023-52606-848e1d7fd710900397e1d0e7584680c1c04e3afd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59",
                "patch_url": "https://git.kernel.org/stable/p/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59",
                "filename": "CVE-2023-52606-8f9abaa6d7de0a70fc68acaedce290c1f96e2e59.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52606/CVE-2023-52606-8f9abaa6d7de0a70fc68acaedce290c1f96e2e59.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e",
                "patch_url": "https://git.kernel.org/stable/p/abd26515d4b767ba48241eea77b28ce0872aef3e",
                "filename": "CVE-2023-52606-abd26515d4b767ba48241eea77b28ce0872aef3e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52606/CVE-2023-52606-abd26515d4b767ba48241eea77b28ce0872aef3e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678",
                "patch_url": "https://git.kernel.org/stable/p/beee482cc4c9a6b1dcffb2e190b4fd8782258678",
                "filename": "CVE-2023-52606-beee482cc4c9a6b1dcffb2e190b4fd8782258678.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52606/CVE-2023-52606-beee482cc4c9a6b1dcffb2e190b4fd8782258678.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b",
                "patch_url": "https://git.kernel.org/stable/p/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b",
                "filename": "CVE-2023-52606-de4f5ed63b8a199704d8cdcbf810309d7eb4b36b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52606/CVE-2023-52606-de4f5ed63b8a199704d8cdcbf810309d7eb4b36b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf",
            "https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c",
            "https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414",
            "https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd",
            "https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59",
            "https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e",
            "https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678",
            "https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b",
            "https://www.cve.org/CVERecord?id=CVE-2023-52606\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52606\nhttps://lore.kernel.org/linux-cve-announce/2024030647-CVE-2023-52606-fdcc@gregkh/T"
        ]
    },
    "CVE-2023-52607": {
        "cve": "CVE-2023-52607",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/mm: Fix null-pointer dereference in pgtable_cache_add\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure. Ensure the allocation was successful\nby checking the pointer validity.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52607",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611",
            "patch_url": "https://git.kernel.org/stable/p/21e45a7b08d7cd98d6a53c5fc5111879f2d96611",
            "filename": "CVE-2023-52607-21e45a7b08d7cd98d6a53c5fc5111879f2d96611.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52607/CVE-2023-52607-21e45a7b08d7cd98d6a53c5fc5111879f2d96611.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532",
                "patch_url": "https://git.kernel.org/stable/p/145febd85c3bcc5c74d87ef9a598fc7d9122d532",
                "filename": "CVE-2023-52607-145febd85c3bcc5c74d87ef9a598fc7d9122d532.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52607/CVE-2023-52607-145febd85c3bcc5c74d87ef9a598fc7d9122d532.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611",
                "patch_url": "https://git.kernel.org/stable/p/21e45a7b08d7cd98d6a53c5fc5111879f2d96611",
                "filename": "CVE-2023-52607-21e45a7b08d7cd98d6a53c5fc5111879f2d96611.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52607/CVE-2023-52607-21e45a7b08d7cd98d6a53c5fc5111879f2d96611.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b",
                "patch_url": "https://git.kernel.org/stable/p/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b",
                "filename": "CVE-2023-52607-aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52607/CVE-2023-52607-aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7",
                "patch_url": "https://git.kernel.org/stable/p/ac3ed969a40357b0542d20f096a6d43acdfa6cc7",
                "filename": "CVE-2023-52607-ac3ed969a40357b0542d20f096a6d43acdfa6cc7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52607/CVE-2023-52607-ac3ed969a40357b0542d20f096a6d43acdfa6cc7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1",
                "patch_url": "https://git.kernel.org/stable/p/d482d61025e303a2bef3733a011b6b740215cfa1",
                "filename": "CVE-2023-52607-d482d61025e303a2bef3733a011b6b740215cfa1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52607/CVE-2023-52607-d482d61025e303a2bef3733a011b6b740215cfa1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071",
                "patch_url": "https://git.kernel.org/stable/p/f46c8a75263f97bda13c739ba1c90aced0d3b071",
                "filename": "CVE-2023-52607-f46c8a75263f97bda13c739ba1c90aced0d3b071.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52607/CVE-2023-52607-f46c8a75263f97bda13c739ba1c90aced0d3b071.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e",
                "patch_url": "https://git.kernel.org/stable/p/f6781add1c311c17eff43e14c786004bbacf901e",
                "filename": "CVE-2023-52607-f6781add1c311c17eff43e14c786004bbacf901e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52607/CVE-2023-52607-f6781add1c311c17eff43e14c786004bbacf901e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74",
                "patch_url": "https://git.kernel.org/stable/p/ffd29dc45bc0355393859049f6becddc3ed08f74",
                "filename": "CVE-2023-52607-ffd29dc45bc0355393859049f6becddc3ed08f74.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52607/CVE-2023-52607-ffd29dc45bc0355393859049f6becddc3ed08f74.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532",
            "https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611",
            "https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b",
            "https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7",
            "https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1",
            "https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071",
            "https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e",
            "https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74",
            "https://www.cve.org/CVERecord?id=CVE-2023-52607\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52607\nhttps://lore.kernel.org/linux-cve-announce/2024030647-CVE-2023-52607-75d1@gregkh/T"
        ]
    },
    "CVE-2023-52610": {
        "cve": "CVE-2023-52610",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_ct: fix skb leak and crash on ooo frags\n\nact_ct adds skb->users before defragmentation. If frags arrive in order,\nthe last frag's reference is reset in:\n\n  inet_frag_reasm_prepare\n    skb_morph\n\nwhich is not straightforward.\n\nHowever when frags arrive out of order, nobody unref the last frag, and\nall frags are leaked. The situation is even worse, as initiating packet\ncapture can lead to a crash[0] when skb has been cloned and shared at the\nsame time.\n\nFix the issue by removing skb_get() before defragmentation. act_ct\nreturns TC_ACT_CONSUMED when defrag failed or in progress.\n\n[0]:\n[  843.804823] ------------[ cut here ]------------\n[  843.809659] kernel BUG at net/core/skbuff.c:2091!\n[  843.814516] invalid opcode: 0000 [#1] PREEMPT SMP\n[  843.819296] CPU: 7 PID: 0 Comm: swapper/7 Kdump: loaded Tainted: G S 6.7.0-rc3 #2\n[  843.824107] Hardware name: XFUSION 1288H V6/BC13MBSBD, BIOS 1.29 11/25/2022\n[  843.828953] RIP: 0010:pskb_expand_head+0x2ac/0x300\n[  843.833805] Code: 8b 70 28 48 85 f6 74 82 48 83 c6 08 bf 01 00 00 00 e8 38 bd ff ff 8b 83 c0 00 00 00 48 03 83 c8 00 00 00 e9 62 ff ff ff 0f 0b <0f> 0b e8 8d d0 ff ff e9 b3 fd ff ff 81 7c 24 14 40 01 00 00 4c 89\n[  843.843698] RSP: 0018:ffffc9000cce07c0 EFLAGS: 00010202\n[  843.848524] RAX: 0000000000000002 RBX: ffff88811a211d00 RCX: 0000000000000820\n[  843.853299] RDX: 0000000000000640 RSI: 0000000000000000 RDI: ffff88811a211d00\n[  843.857974] RBP: ffff888127d39518 R08: 00000000bee97314 R09: 0000000000000000\n[  843.862584] R10: 0000000000000000 R11: ffff8881109f0000 R12: 0000000000000880\n[  843.867147] R13: ffff888127d39580 R14: 0000000000000640 R15: ffff888170f7b900\n[  843.871680] FS:  0000000000000000(0000) GS:ffff889ffffc0000(0000) knlGS:0000000000000000\n[  843.876242] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  843.880778] CR2: 00007fa42affcfb8 CR3: 000000011433a002 CR4: 0000000000770ef0\n[  843.885336] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[  843.889809] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[  843.894229] PKRU: 55555554\n[  843.898539] Call Trace:\n[  843.902772]  <IRQ>\n[  843.906922]  ? __die_body+0x1e/0x60\n[  843.911032]  ? die+0x3c/0x60\n[  843.915037]  ? do_trap+0xe2/0x110\n[  843.918911]  ? pskb_expand_head+0x2ac/0x300\n[  843.922687]  ? do_error_trap+0x65/0x80\n[  843.926342]  ? pskb_expand_head+0x2ac/0x300\n[  843.929905]  ? exc_invalid_op+0x50/0x60\n[  843.933398]  ? pskb_expand_head+0x2ac/0x300\n[  843.936835]  ? asm_exc_invalid_op+0x1a/0x20\n[  843.940226]  ? pskb_expand_head+0x2ac/0x300\n[  843.943580]  inet_frag_reasm_prepare+0xd1/0x240\n[  843.946904]  ip_defrag+0x5d4/0x870\n[  843.950132]  nf_ct_handle_fragments+0xec/0x130 [nf_conntrack]\n[  843.953334]  tcf_ct_act+0x252/0xd90 [act_ct]\n[  843.956473]  ? tcf_mirred_act+0x516/0x5a0 [act_mirred]\n[  843.959657]  tcf_action_exec+0xa1/0x160\n[  843.962823]  fl_classify+0x1db/0x1f0 [cls_flower]\n[  843.966010]  ? skb_clone+0x53/0xc0\n[  843.969173]  tcf_classify+0x24d/0x420\n[  843.972333]  tc_run+0x8f/0xf0\n[  843.975465]  __netif_receive_skb_core+0x67a/0x1080\n[  843.978634]  ? dev_gro_receive+0x249/0x730\n[  843.981759]  __netif_receive_skb_list_core+0x12d/0x260\n[  843.984869]  netif_receive_skb_list_internal+0x1cb/0x2f0\n[  843.987957]  ? mlx5e_handle_rx_cqe_mpwrq_rep+0xfa/0x1a0 [mlx5_core]\n[  843.991170]  napi_complete_done+0x72/0x1a0\n[  843.994305]  mlx5e_napi_poll+0x28c/0x6d0 [mlx5_core]\n[  843.997501]  __napi_poll+0x25/0x1b0\n[  844.000627]  net_rx_action+0x256/0x330\n[  844.003705]  __do_softirq+0xb3/0x29b\n[  844.006718]  irq_exit_rcu+0x9e/0xc0\n[  844.009672]  common_interrupt+0x86/0xa0\n[  844.012537]  </IRQ>\n[  844.015285]  <TASK>\n[  844.017937]  asm_common_interrupt+0x26/0x40\n[  844.020591] RIP: 0010:acpi_safe_halt+0x1b/0x20\n[  844.023247] Code: ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 65 48 8b 04 25 00 18 03 00 48 8b 00 a8 08 75 0c 66 90 0f 00 2d 81 d0 44 00 fb\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52610",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/172ba7d46c202e679f3ccb10264c67416aaeb1c4",
            "patch_url": "https://git.kernel.org/stable/p/172ba7d46c202e679f3ccb10264c67416aaeb1c4",
            "filename": "CVE-2023-52610-172ba7d46c202e679f3ccb10264c67416aaeb1c4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52610/CVE-2023-52610-172ba7d46c202e679f3ccb10264c67416aaeb1c4.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0b5b831122fc3789fff75be433ba3e4dd7b779d4",
                "patch_url": "https://git.kernel.org/stable/p/0b5b831122fc3789fff75be433ba3e4dd7b779d4",
                "filename": "CVE-2023-52610-0b5b831122fc3789fff75be433ba3e4dd7b779d4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52610/CVE-2023-52610-0b5b831122fc3789fff75be433ba3e4dd7b779d4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/172ba7d46c202e679f3ccb10264c67416aaeb1c4",
                "patch_url": "https://git.kernel.org/stable/p/172ba7d46c202e679f3ccb10264c67416aaeb1c4",
                "filename": "CVE-2023-52610-172ba7d46c202e679f3ccb10264c67416aaeb1c4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52610/CVE-2023-52610-172ba7d46c202e679f3ccb10264c67416aaeb1c4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3f14b377d01d8357eba032b4cabc8c1149b458b6",
                "patch_url": "https://git.kernel.org/stable/p/3f14b377d01d8357eba032b4cabc8c1149b458b6",
                "filename": "CVE-2023-52610-3f14b377d01d8357eba032b4cabc8c1149b458b6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52610/CVE-2023-52610-3f14b377d01d8357eba032b4cabc8c1149b458b6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/73f7da5fd124f2cda9161e2e46114915e6e82e97",
                "patch_url": "https://git.kernel.org/stable/p/73f7da5fd124f2cda9161e2e46114915e6e82e97",
                "filename": "CVE-2023-52610-73f7da5fd124f2cda9161e2e46114915e6e82e97.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52610/CVE-2023-52610-73f7da5fd124f2cda9161e2e46114915e6e82e97.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f5346df0591d10bc948761ca854b1fae6d2ef441",
                "patch_url": "https://git.kernel.org/stable/p/f5346df0591d10bc948761ca854b1fae6d2ef441",
                "filename": "CVE-2023-52610-f5346df0591d10bc948761ca854b1fae6d2ef441.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52610/CVE-2023-52610-f5346df0591d10bc948761ca854b1fae6d2ef441.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0b5b831122fc3789fff75be433ba3e4dd7b779d4",
            "https://git.kernel.org/stable/c/172ba7d46c202e679f3ccb10264c67416aaeb1c4",
            "https://git.kernel.org/stable/c/3f14b377d01d8357eba032b4cabc8c1149b458b6",
            "https://git.kernel.org/stable/c/73f7da5fd124f2cda9161e2e46114915e6e82e97",
            "https://git.kernel.org/stable/c/f5346df0591d10bc948761ca854b1fae6d2ef441",
            "https://www.cve.org/CVERecord?id=CVE-2023-52610\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52610\nhttps://lore.kernel.org/linux-cve-announce/20240318100758.2828621-10-lee@kernel.org/T"
        ]
    },
    "CVE-2023-52615": {
        "cve": "CVE-2023-52615",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: core - Fix page fault dead lock on mmap-ed hwrng\n\nThere is a dead-lock in the hwrng device read path.  This triggers\nwhen the user reads from /dev/hwrng into memory also mmap-ed from\n/dev/hwrng.  The resulting page fault triggers a recursive read\nwhich then dead-locks.\n\nFix this by using a stack buffer when calling copy_to_user.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52615",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/eafd83b92f6c044007a3591cbd476bcf90455990",
            "patch_url": "https://git.kernel.org/stable/p/eafd83b92f6c044007a3591cbd476bcf90455990",
            "filename": "CVE-2023-52615-eafd83b92f6c044007a3591cbd476bcf90455990.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52615/CVE-2023-52615-eafd83b92f6c044007a3591cbd476bcf90455990.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/26cc6d7006f922df6cc4389248032d955750b2a0",
                "patch_url": "https://git.kernel.org/stable/p/26cc6d7006f922df6cc4389248032d955750b2a0",
                "filename": "CVE-2023-52615-26cc6d7006f922df6cc4389248032d955750b2a0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52615/CVE-2023-52615-26cc6d7006f922df6cc4389248032d955750b2a0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5030d4c798863ccb266563201b341a099e8cdd48",
                "patch_url": "https://git.kernel.org/stable/p/5030d4c798863ccb266563201b341a099e8cdd48",
                "filename": "CVE-2023-52615-5030d4c798863ccb266563201b341a099e8cdd48.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52615/CVE-2023-52615-5030d4c798863ccb266563201b341a099e8cdd48.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6822a14271786150e178869f1495cc03e74c5029",
                "patch_url": "https://git.kernel.org/stable/p/6822a14271786150e178869f1495cc03e74c5029",
                "filename": "CVE-2023-52615-6822a14271786150e178869f1495cc03e74c5029.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52615/CVE-2023-52615-6822a14271786150e178869f1495cc03e74c5029.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/78aafb3884f6bc6636efcc1760c891c8500b9922",
                "patch_url": "https://git.kernel.org/stable/p/78aafb3884f6bc6636efcc1760c891c8500b9922",
                "filename": "CVE-2023-52615-78aafb3884f6bc6636efcc1760c891c8500b9922.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52615/CVE-2023-52615-78aafb3884f6bc6636efcc1760c891c8500b9922.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aa8aa16ed9adf1df05bb339d588cf485a011839e",
                "patch_url": "https://git.kernel.org/stable/p/aa8aa16ed9adf1df05bb339d588cf485a011839e",
                "filename": "CVE-2023-52615-aa8aa16ed9adf1df05bb339d588cf485a011839e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52615/CVE-2023-52615-aa8aa16ed9adf1df05bb339d588cf485a011839e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c6a8111aacbfe7a8a70f46cc0de8eed00561693c",
                "patch_url": "https://git.kernel.org/stable/p/c6a8111aacbfe7a8a70f46cc0de8eed00561693c",
                "filename": "CVE-2023-52615-c6a8111aacbfe7a8a70f46cc0de8eed00561693c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52615/CVE-2023-52615-c6a8111aacbfe7a8a70f46cc0de8eed00561693c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eafd83b92f6c044007a3591cbd476bcf90455990",
                "patch_url": "https://git.kernel.org/stable/p/eafd83b92f6c044007a3591cbd476bcf90455990",
                "filename": "CVE-2023-52615-eafd83b92f6c044007a3591cbd476bcf90455990.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52615/CVE-2023-52615-eafd83b92f6c044007a3591cbd476bcf90455990.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ecabe8cd456d3bf81e92c53b074732f3140f170d",
                "patch_url": "https://git.kernel.org/stable/p/ecabe8cd456d3bf81e92c53b074732f3140f170d",
                "filename": "CVE-2023-52615-ecabe8cd456d3bf81e92c53b074732f3140f170d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52615/CVE-2023-52615-ecabe8cd456d3bf81e92c53b074732f3140f170d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/26cc6d7006f922df6cc4389248032d955750b2a0",
            "https://git.kernel.org/stable/c/5030d4c798863ccb266563201b341a099e8cdd48",
            "https://git.kernel.org/stable/c/6822a14271786150e178869f1495cc03e74c5029",
            "https://git.kernel.org/stable/c/78aafb3884f6bc6636efcc1760c891c8500b9922",
            "https://git.kernel.org/stable/c/aa8aa16ed9adf1df05bb339d588cf485a011839e",
            "https://git.kernel.org/stable/c/c6a8111aacbfe7a8a70f46cc0de8eed00561693c",
            "https://git.kernel.org/stable/c/eafd83b92f6c044007a3591cbd476bcf90455990",
            "https://git.kernel.org/stable/c/ecabe8cd456d3bf81e92c53b074732f3140f170d",
            "https://www.cve.org/CVERecord?id=CVE-2023-52615\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52615\nhttps://lore.kernel.org/linux-cve-announce/20240318101458.2835626-10-lee@kernel.org/T"
        ]
    },
    "CVE-2023-52619": {
        "cve": "CVE-2023-52619",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npstore/ram: Fix crash when setting number of cpus to an odd number\n\nWhen the number of cpu cores is adjusted to 7 or other odd numbers,\nthe zone size will become an odd number.\nThe address of the zone will become:\n    addr of zone0 = BASE\n    addr of zone1 = BASE + zone_size\n    addr of zone2 = BASE + zone_size*2\n    ...\nThe address of zone1/3/5/7 will be mapped to non-alignment va.\nEventually crashes will occur when accessing these va.\n\nSo, use ALIGN_DOWN() to make sure the zone size is even\nto avoid this bug.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52619",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/8b69c30f4e8b69131d92096cb296dc1f217101e4",
            "patch_url": "https://git.kernel.org/stable/p/8b69c30f4e8b69131d92096cb296dc1f217101e4",
            "filename": "CVE-2023-52619-8b69c30f4e8b69131d92096cb296dc1f217101e4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52619/CVE-2023-52619-8b69c30f4e8b69131d92096cb296dc1f217101e4.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0593cfd321df9001142a9d2c58d4144917dff7ee",
                "patch_url": "https://git.kernel.org/stable/p/0593cfd321df9001142a9d2c58d4144917dff7ee",
                "filename": "CVE-2023-52619-0593cfd321df9001142a9d2c58d4144917dff7ee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52619/CVE-2023-52619-0593cfd321df9001142a9d2c58d4144917dff7ee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2a37905d47bffec61e95d99f0c1cc5dc6377956c",
                "patch_url": "https://git.kernel.org/stable/p/2a37905d47bffec61e95d99f0c1cc5dc6377956c",
                "filename": "CVE-2023-52619-2a37905d47bffec61e95d99f0c1cc5dc6377956c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52619/CVE-2023-52619-2a37905d47bffec61e95d99f0c1cc5dc6377956c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/75b0f71b26b3ad833c5c0670109c0af6e021e86a",
                "patch_url": "https://git.kernel.org/stable/p/75b0f71b26b3ad833c5c0670109c0af6e021e86a",
                "filename": "CVE-2023-52619-75b0f71b26b3ad833c5c0670109c0af6e021e86a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52619/CVE-2023-52619-75b0f71b26b3ad833c5c0670109c0af6e021e86a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8b69c30f4e8b69131d92096cb296dc1f217101e4",
                "patch_url": "https://git.kernel.org/stable/p/8b69c30f4e8b69131d92096cb296dc1f217101e4",
                "filename": "CVE-2023-52619-8b69c30f4e8b69131d92096cb296dc1f217101e4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52619/CVE-2023-52619-8b69c30f4e8b69131d92096cb296dc1f217101e4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a63e48cd835c34c38ef671d344cc029b1ea5bf10",
                "patch_url": "https://git.kernel.org/stable/p/a63e48cd835c34c38ef671d344cc029b1ea5bf10",
                "filename": "CVE-2023-52619-a63e48cd835c34c38ef671d344cc029b1ea5bf10.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52619/CVE-2023-52619-a63e48cd835c34c38ef671d344cc029b1ea5bf10.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cd40e43f870cf21726b22487a95ed223790b3542",
                "patch_url": "https://git.kernel.org/stable/p/cd40e43f870cf21726b22487a95ed223790b3542",
                "filename": "CVE-2023-52619-cd40e43f870cf21726b22487a95ed223790b3542.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52619/CVE-2023-52619-cd40e43f870cf21726b22487a95ed223790b3542.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d49270a04623ce3c0afddbf3e984cb245aa48e9c",
                "patch_url": "https://git.kernel.org/stable/p/d49270a04623ce3c0afddbf3e984cb245aa48e9c",
                "filename": "CVE-2023-52619-d49270a04623ce3c0afddbf3e984cb245aa48e9c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52619/CVE-2023-52619-d49270a04623ce3c0afddbf3e984cb245aa48e9c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e9f6ac50890104fdf8194f2865680689239d30fb",
                "patch_url": "https://git.kernel.org/stable/p/e9f6ac50890104fdf8194f2865680689239d30fb",
                "filename": "CVE-2023-52619-e9f6ac50890104fdf8194f2865680689239d30fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52619/CVE-2023-52619-e9f6ac50890104fdf8194f2865680689239d30fb.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0593cfd321df9001142a9d2c58d4144917dff7ee",
            "https://git.kernel.org/stable/c/2a37905d47bffec61e95d99f0c1cc5dc6377956c",
            "https://git.kernel.org/stable/c/75b0f71b26b3ad833c5c0670109c0af6e021e86a",
            "https://git.kernel.org/stable/c/8b69c30f4e8b69131d92096cb296dc1f217101e4",
            "https://git.kernel.org/stable/c/a63e48cd835c34c38ef671d344cc029b1ea5bf10",
            "https://git.kernel.org/stable/c/cd40e43f870cf21726b22487a95ed223790b3542",
            "https://git.kernel.org/stable/c/d49270a04623ce3c0afddbf3e984cb245aa48e9c",
            "https://git.kernel.org/stable/c/e9f6ac50890104fdf8194f2865680689239d30fb",
            "https://www.cve.org/CVERecord?id=CVE-2023-52619\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52619\nhttps://lore.kernel.org/linux-cve-announce/20240318102117.2839904-9-lee@kernel.org/T"
        ]
    },
    "CVE-2023-52620": {
        "cve": "CVE-2023-52620",
        "cvss_v2": null,
        "cvss_v3": 2.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: disallow timeout for anonymous sets\n\nNever used from userspace, disallow these parameters.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52620",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/49ce99ae43314d887153e07cec8bb6a647a19268",
            "patch_url": "https://git.kernel.org/stable/p/49ce99ae43314d887153e07cec8bb6a647a19268",
            "filename": "CVE-2023-52620-49ce99ae43314d887153e07cec8bb6a647a19268.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52620/CVE-2023-52620-49ce99ae43314d887153e07cec8bb6a647a19268.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/00b19ee0dcc1aef06294471ab489bae26d94524e",
                "patch_url": "https://git.kernel.org/stable/p/00b19ee0dcc1aef06294471ab489bae26d94524e",
                "filename": "CVE-2023-52620-00b19ee0dcc1aef06294471ab489bae26d94524e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52620/CVE-2023-52620-00b19ee0dcc1aef06294471ab489bae26d94524e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/116b0e8e4673a5faa8a739a19b467010c4d3058c",
                "patch_url": "https://git.kernel.org/stable/p/116b0e8e4673a5faa8a739a19b467010c4d3058c",
                "filename": "CVE-2023-52620-116b0e8e4673a5faa8a739a19b467010c4d3058c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52620/CVE-2023-52620-116b0e8e4673a5faa8a739a19b467010c4d3058c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/49ce99ae43314d887153e07cec8bb6a647a19268",
                "patch_url": "https://git.kernel.org/stable/p/49ce99ae43314d887153e07cec8bb6a647a19268",
                "filename": "CVE-2023-52620-49ce99ae43314d887153e07cec8bb6a647a19268.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52620/CVE-2023-52620-49ce99ae43314d887153e07cec8bb6a647a19268.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6f3ae02bbb62f151b19162d5fdc9fe3d48450323",
                "patch_url": "https://git.kernel.org/stable/p/6f3ae02bbb62f151b19162d5fdc9fe3d48450323",
                "filename": "CVE-2023-52620-6f3ae02bbb62f151b19162d5fdc9fe3d48450323.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52620/CVE-2023-52620-6f3ae02bbb62f151b19162d5fdc9fe3d48450323.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7be6c737a179a76901c872f6b4c1d00552d9a1b",
                "patch_url": "https://git.kernel.org/stable/p/b7be6c737a179a76901c872f6b4c1d00552d9a1b",
                "filename": "CVE-2023-52620-b7be6c737a179a76901c872f6b4c1d00552d9a1b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52620/CVE-2023-52620-b7be6c737a179a76901c872f6b4c1d00552d9a1b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e26d3009efda338f19016df4175f354a9bd0a4ab",
                "patch_url": "https://git.kernel.org/stable/p/e26d3009efda338f19016df4175f354a9bd0a4ab",
                "filename": "CVE-2023-52620-e26d3009efda338f19016df4175f354a9bd0a4ab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52620/CVE-2023-52620-e26d3009efda338f19016df4175f354a9bd0a4ab.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/00b19ee0dcc1aef06294471ab489bae26d94524e",
            "https://git.kernel.org/stable/c/116b0e8e4673a5faa8a739a19b467010c4d3058c",
            "https://git.kernel.org/stable/c/49ce99ae43314d887153e07cec8bb6a647a19268",
            "https://git.kernel.org/stable/c/6f3ae02bbb62f151b19162d5fdc9fe3d48450323",
            "https://git.kernel.org/stable/c/b7be6c737a179a76901c872f6b4c1d00552d9a1b",
            "https://git.kernel.org/stable/c/e26d3009efda338f19016df4175f354a9bd0a4ab",
            "https://www.cve.org/CVERecord?id=CVE-2023-52620\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52620\nhttps://lore.kernel.org/linux-cve-announce/2024032147-CVE-2023-52620-11a9@gregkh/T"
        ]
    },
    "CVE-2023-52622": {
        "cve": "CVE-2023-52622",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid online resizing failures due to oversized flex bg\n\nWhen we online resize an ext4 filesystem with a oversized flexbg_size,\n\n     mkfs.ext4 -F -G 67108864 $dev -b 4096 100M\n     mount $dev $dir\n     resize2fs $dev 16G\n\nthe following WARN_ON is triggered:\n==================================================================\nWARNING: CPU: 0 PID: 427 at mm/page_alloc.c:4402 __alloc_pages+0x411/0x550\nModules linked in: sg(E)\nCPU: 0 PID: 427 Comm: resize2fs Tainted: G  E  6.6.0-rc5+ #314\nRIP: 0010:__alloc_pages+0x411/0x550\nCall Trace:\n <TASK>\n __kmalloc_large_node+0xa2/0x200\n __kmalloc+0x16e/0x290\n ext4_resize_fs+0x481/0xd80\n __ext4_ioctl+0x1616/0x1d90\n ext4_ioctl+0x12/0x20\n __x64_sys_ioctl+0xf0/0x150\n do_syscall_64+0x3b/0x90\n==================================================================\n\nThis is because flexbg_size is too large and the size of the new_group_data\narray to be allocated exceeds MAX_ORDER. Currently, the minimum value of\nMAX_ORDER is 8, the minimum value of PAGE_SIZE is 4096, the corresponding\nmaximum number of groups that can be allocated is:\n\n (PAGE_SIZE << MAX_ORDER) / sizeof(struct ext4_new_group_data) \u2248 21845\n\nAnd the value that is down-aligned to the power of 2 is 16384. Therefore,\nthis value is defined as MAX_RESIZE_BG, and the number of groups added\neach time does not exceed this value during resizing, and is added multiple\ntimes to complete the online resizing. The difference is that the metadata\nin a flex_bg may be more dispersed.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52622",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/5d1935ac02ca5aee364a449a35e2977ea84509b0",
            "patch_url": "https://git.kernel.org/stable/p/5d1935ac02ca5aee364a449a35e2977ea84509b0",
            "filename": "CVE-2023-52622-5d1935ac02ca5aee364a449a35e2977ea84509b0.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52622/CVE-2023-52622-5d1935ac02ca5aee364a449a35e2977ea84509b0.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/5d1935ac02ca5aee364a449a35e2977ea84509b0",
                "patch_url": "https://git.kernel.org/stable/p/5d1935ac02ca5aee364a449a35e2977ea84509b0",
                "filename": "CVE-2023-52622-5d1935ac02ca5aee364a449a35e2977ea84509b0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52622/CVE-2023-52622-5d1935ac02ca5aee364a449a35e2977ea84509b0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6d2cbf517dcabc093159cf138ad5712c9c7fa954",
                "patch_url": "https://git.kernel.org/stable/p/6d2cbf517dcabc093159cf138ad5712c9c7fa954",
                "filename": "CVE-2023-52622-6d2cbf517dcabc093159cf138ad5712c9c7fa954.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52622/CVE-2023-52622-6d2cbf517dcabc093159cf138ad5712c9c7fa954.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8b1413dbfe49646eda2c00c0f1144ee9d3368e0c",
                "patch_url": "https://git.kernel.org/stable/p/8b1413dbfe49646eda2c00c0f1144ee9d3368e0c",
                "filename": "CVE-2023-52622-8b1413dbfe49646eda2c00c0f1144ee9d3368e0c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52622/CVE-2023-52622-8b1413dbfe49646eda2c00c0f1144ee9d3368e0c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b183fe8702e78bba3dcef8e7193cab6898abee07",
                "patch_url": "https://git.kernel.org/stable/p/b183fe8702e78bba3dcef8e7193cab6898abee07",
                "filename": "CVE-2023-52622-b183fe8702e78bba3dcef8e7193cab6898abee07.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52622/CVE-2023-52622-b183fe8702e78bba3dcef8e7193cab6898abee07.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cd1f93ca97a9136989f3bd2bf90696732a2ed644",
                "patch_url": "https://git.kernel.org/stable/p/cd1f93ca97a9136989f3bd2bf90696732a2ed644",
                "filename": "CVE-2023-52622-cd1f93ca97a9136989f3bd2bf90696732a2ed644.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52622/CVE-2023-52622-cd1f93ca97a9136989f3bd2bf90696732a2ed644.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cfbbb3199e71b63fc26cee0ebff327c47128a1e8",
                "patch_url": "https://git.kernel.org/stable/p/cfbbb3199e71b63fc26cee0ebff327c47128a1e8",
                "filename": "CVE-2023-52622-cfbbb3199e71b63fc26cee0ebff327c47128a1e8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52622/CVE-2023-52622-cfbbb3199e71b63fc26cee0ebff327c47128a1e8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d76c8d7ffe163c6bf2f1ef680b0539c2b3902b90",
                "patch_url": "https://git.kernel.org/stable/p/d76c8d7ffe163c6bf2f1ef680b0539c2b3902b90",
                "filename": "CVE-2023-52622-d76c8d7ffe163c6bf2f1ef680b0539c2b3902b90.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52622/CVE-2023-52622-d76c8d7ffe163c6bf2f1ef680b0539c2b3902b90.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dc3e0f55bec4410f3d74352c4a7c79f518088ee2",
                "patch_url": "https://git.kernel.org/stable/p/dc3e0f55bec4410f3d74352c4a7c79f518088ee2",
                "filename": "CVE-2023-52622-dc3e0f55bec4410f3d74352c4a7c79f518088ee2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52622/CVE-2023-52622-dc3e0f55bec4410f3d74352c4a7c79f518088ee2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/5d1935ac02ca5aee364a449a35e2977ea84509b0",
            "https://git.kernel.org/stable/c/6d2cbf517dcabc093159cf138ad5712c9c7fa954",
            "https://git.kernel.org/stable/c/8b1413dbfe49646eda2c00c0f1144ee9d3368e0c",
            "https://git.kernel.org/stable/c/b183fe8702e78bba3dcef8e7193cab6898abee07",
            "https://git.kernel.org/stable/c/cd1f93ca97a9136989f3bd2bf90696732a2ed644",
            "https://git.kernel.org/stable/c/cfbbb3199e71b63fc26cee0ebff327c47128a1e8",
            "https://git.kernel.org/stable/c/d76c8d7ffe163c6bf2f1ef680b0539c2b3902b90",
            "https://git.kernel.org/stable/c/dc3e0f55bec4410f3d74352c4a7c79f518088ee2",
            "https://www.cve.org/CVERecord?id=CVE-2023-52622\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52622\nhttps://lore.kernel.org/linux-cve-announce/20240326171931.1354035-5-lee@kernel.org/T"
        ]
    },
    "CVE-2023-52623": {
        "cve": "CVE-2023-52623",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix a suspicious RCU usage warning\n\nI received the following warning while running cthon against an ontap\nserver running pNFS:\n\n[   57.202521] =============================\n[   57.202522] WARNING: suspicious RCU usage\n[   57.202523] 6.7.0-rc3-g2cc14f52aeb7 #41492 Not tainted\n[   57.202525] -----------------------------\n[   57.202525] net/sunrpc/xprtmultipath.c:349 RCU-list traversed in non-reader section!!\n[   57.202527]\n               other info that might help us debug this:\n\n[   57.202528]\n               rcu_scheduler_active = 2, debug_locks = 1\n[   57.202529] no locks held by test5/3567.\n[   57.202530]\n               stack backtrace:\n[   57.202532] CPU: 0 PID: 3567 Comm: test5 Not tainted 6.7.0-rc3-g2cc14f52aeb7 #41492 5b09971b4965c0aceba19f3eea324a4a806e227e\n[   57.202534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 2/2/2022\n[   57.202536] Call Trace:\n[   57.202537]  <TASK>\n[   57.202540]  dump_stack_lvl+0x77/0xb0\n[   57.202551]  lockdep_rcu_suspicious+0x154/0x1a0\n[   57.202556]  rpc_xprt_switch_has_addr+0x17c/0x190 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[   57.202596]  rpc_clnt_setup_test_and_add_xprt+0x50/0x180 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[   57.202621]  ? rpc_clnt_add_xprt+0x254/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[   57.202646]  rpc_clnt_add_xprt+0x27a/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[   57.202671]  ? __pfx_rpc_clnt_setup_test_and_add_xprt+0x10/0x10 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]\n[   57.202696]  nfs4_pnfs_ds_connect+0x345/0x760 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[   57.202728]  ? __pfx_nfs4_test_session_trunk+0x10/0x10 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[   57.202754]  nfs4_fl_prepare_ds+0x75/0xc0 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]\n[   57.202760]  filelayout_write_pagelist+0x4a/0x200 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]\n[   57.202765]  pnfs_generic_pg_writepages+0xbe/0x230 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[   57.202788]  __nfs_pageio_add_request+0x3fd/0x520 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[   57.202813]  nfs_pageio_add_request+0x18b/0x390 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[   57.202831]  nfs_do_writepage+0x116/0x1e0 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[   57.202849]  nfs_writepages_callback+0x13/0x30 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[   57.202866]  write_cache_pages+0x265/0x450\n[   57.202870]  ? __pfx_nfs_writepages_callback+0x10/0x10 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[   57.202891]  nfs_writepages+0x141/0x230 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[   57.202913]  do_writepages+0xd2/0x230\n[   57.202917]  ? filemap_fdatawrite_wbc+0x5c/0x80\n[   57.202921]  filemap_fdatawrite_wbc+0x67/0x80\n[   57.202924]  filemap_write_and_wait_range+0xd9/0x170\n[   57.202930]  nfs_wb_all+0x49/0x180 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]\n[   57.202947]  nfs4_file_flush+0x72/0xb0 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]\n[   57.202969]  __se_sys_close+0x46/0xd0\n[   57.202972]  do_syscall_64+0x68/0x100\n[   57.202975]  ? do_syscall_64+0x77/0x100\n[   57.202976]  ? do_syscall_64+0x77/0x100\n[   57.202979]  entry_SYSCALL_64_after_hwframe+0x6e/0x76\n[   57.202982] RIP: 0033:0x7fe2b12e4a94\n[   57.202985] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 18 0e 00 00 74 13 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 c3\n[   57.202987] RSP: 002b:00007ffe857ddb38 EFLAGS: 00000202 ORIG_RAX: 0000000000000003\n[   57.202989] RAX: ffffffffffffffda RBX: 00007ffe857dfd68 RCX: 00007fe2b12e4a94\n[   57.202991] RDX: 0000000000002000 RSI: 00007ffe857ddc40 RDI: 0000000000000003\n[   57.202992] RBP: 00007ffe857dfc50 R08: 7fffffffffffffff R09: 0000000065650f49\n[   57.202993] R10: 00007f\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52623",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56",
            "patch_url": "https://git.kernel.org/stable/p/f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56",
            "filename": "CVE-2023-52623-f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52623/CVE-2023-52623-f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/31b62908693c90d4d07db597e685d9f25a120073",
                "patch_url": "https://git.kernel.org/stable/p/31b62908693c90d4d07db597e685d9f25a120073",
                "filename": "CVE-2023-52623-31b62908693c90d4d07db597e685d9f25a120073.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52623/CVE-2023-52623-31b62908693c90d4d07db597e685d9f25a120073.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/69c7eeb4f622c2a28da965f970f982db171f3dc6",
                "patch_url": "https://git.kernel.org/stable/p/69c7eeb4f622c2a28da965f970f982db171f3dc6",
                "filename": "CVE-2023-52623-69c7eeb4f622c2a28da965f970f982db171f3dc6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52623/CVE-2023-52623-69c7eeb4f622c2a28da965f970f982db171f3dc6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7a96d85bf196c170dcf1b47a82e9bb97cca69aa6",
                "patch_url": "https://git.kernel.org/stable/p/7a96d85bf196c170dcf1b47a82e9bb97cca69aa6",
                "filename": "CVE-2023-52623-7a96d85bf196c170dcf1b47a82e9bb97cca69aa6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52623/CVE-2023-52623-7a96d85bf196c170dcf1b47a82e9bb97cca69aa6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8f860c8407470baff2beb9982ad6b172c94f1d0a",
                "patch_url": "https://git.kernel.org/stable/p/8f860c8407470baff2beb9982ad6b172c94f1d0a",
                "filename": "CVE-2023-52623-8f860c8407470baff2beb9982ad6b172c94f1d0a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52623/CVE-2023-52623-8f860c8407470baff2beb9982ad6b172c94f1d0a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c430e6bb43955c6bf573665fcebf31694925b9f7",
                "patch_url": "https://git.kernel.org/stable/p/c430e6bb43955c6bf573665fcebf31694925b9f7",
                "filename": "CVE-2023-52623-c430e6bb43955c6bf573665fcebf31694925b9f7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52623/CVE-2023-52623-c430e6bb43955c6bf573665fcebf31694925b9f7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e8ca3e73301e23e8c0ac0ce2e6bac4545cd776e0",
                "patch_url": "https://git.kernel.org/stable/p/e8ca3e73301e23e8c0ac0ce2e6bac4545cd776e0",
                "filename": "CVE-2023-52623-e8ca3e73301e23e8c0ac0ce2e6bac4545cd776e0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52623/CVE-2023-52623-e8ca3e73301e23e8c0ac0ce2e6bac4545cd776e0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56",
                "patch_url": "https://git.kernel.org/stable/p/f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56",
                "filename": "CVE-2023-52623-f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52623/CVE-2023-52623-f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fece80a2a6718ed58487ce397285bb1b83a3e54e",
                "patch_url": "https://git.kernel.org/stable/p/fece80a2a6718ed58487ce397285bb1b83a3e54e",
                "filename": "CVE-2023-52623-fece80a2a6718ed58487ce397285bb1b83a3e54e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52623/CVE-2023-52623-fece80a2a6718ed58487ce397285bb1b83a3e54e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/31b62908693c90d4d07db597e685d9f25a120073",
            "https://git.kernel.org/stable/c/69c7eeb4f622c2a28da965f970f982db171f3dc6",
            "https://git.kernel.org/stable/c/7a96d85bf196c170dcf1b47a82e9bb97cca69aa6",
            "https://git.kernel.org/stable/c/8f860c8407470baff2beb9982ad6b172c94f1d0a",
            "https://git.kernel.org/stable/c/c430e6bb43955c6bf573665fcebf31694925b9f7",
            "https://git.kernel.org/stable/c/e8ca3e73301e23e8c0ac0ce2e6bac4545cd776e0",
            "https://git.kernel.org/stable/c/f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56",
            "https://git.kernel.org/stable/c/fece80a2a6718ed58487ce397285bb1b83a3e54e",
            "https://www.cve.org/CVERecord?id=CVE-2023-52623\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52623\nhttps://lore.kernel.org/linux-cve-announce/20240326171931.1354035-6-lee@kernel.org/T"
        ]
    },
    "CVE-2023-52626": {
        "cve": "CVE-2023-52626",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix operation precedence bug in port timestamping napi_poll context\n\nIndirection (*) is of lower precedence than postfix increment (++). Logic\nin napi_poll context would cause an out-of-bound read by first increment\nthe pointer address by byte address space and then dereference the value.\nRather, the intended logic was to dereference first and then increment the\nunderlying value.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52626",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/33cdeae8c6fb58cc445f859b67c014dc9f60b4e0",
            "patch_url": "https://git.kernel.org/stable/p/33cdeae8c6fb58cc445f859b67c014dc9f60b4e0",
            "filename": "CVE-2023-52626-33cdeae8c6fb58cc445f859b67c014dc9f60b4e0.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52626/CVE-2023-52626-33cdeae8c6fb58cc445f859b67c014dc9f60b4e0.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/33cdeae8c6fb58cc445f859b67c014dc9f60b4e0",
                "patch_url": "https://git.kernel.org/stable/p/33cdeae8c6fb58cc445f859b67c014dc9f60b4e0",
                "filename": "CVE-2023-52626-33cdeae8c6fb58cc445f859b67c014dc9f60b4e0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52626/CVE-2023-52626-33cdeae8c6fb58cc445f859b67c014dc9f60b4e0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3876638b2c7ebb2c9d181de1191db0de8cac143a",
                "patch_url": "https://git.kernel.org/stable/p/3876638b2c7ebb2c9d181de1191db0de8cac143a",
                "filename": "CVE-2023-52626-3876638b2c7ebb2c9d181de1191db0de8cac143a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52626/CVE-2023-52626-3876638b2c7ebb2c9d181de1191db0de8cac143a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/40e0d0746390c5b0c31144f4f1688d72f3f8d790",
                "patch_url": "https://git.kernel.org/stable/p/40e0d0746390c5b0c31144f4f1688d72f3f8d790",
                "filename": "CVE-2023-52626-40e0d0746390c5b0c31144f4f1688d72f3f8d790.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52626/CVE-2023-52626-40e0d0746390c5b0c31144f4f1688d72f3f8d790.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/33cdeae8c6fb58cc445f859b67c014dc9f60b4e0",
            "https://git.kernel.org/stable/c/3876638b2c7ebb2c9d181de1191db0de8cac143a",
            "https://git.kernel.org/stable/c/40e0d0746390c5b0c31144f4f1688d72f3f8d790",
            "https://www.cve.org/CVERecord?id=CVE-2023-52626\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52626\nhttps://lore.kernel.org/linux-cve-announce/20240326175007.1388794-12-lee@kernel.org/T"
        ]
    },
    "CVE-2023-52648": {
        "cve": "CVE-2023-52648",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Unmap the surface before resetting it on a plane state\n\nSwitch to a new plane state requires unreferencing of all held surfaces.\nIn the work required for mob cursors the mapped surfaces started being\ncached but the variable indicating whether the surface is currently\nmapped was not being reset. This leads to crashes as the duplicated\nstate, incorrectly, indicates the that surface is mapped even when\nno surface is present. That's because after unreferencing the surface\nit's perfectly possible for the plane to be backed by a bo instead of a\nsurface.\n\nReset the surface mapped flag when unreferencing the plane state surface\nto fix null derefs in cleanup. Fixes crashes in KDE KWin 6.0 on Wayland:\n\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 4 PID: 2533 Comm: kwin_wayland Not tainted 6.7.0-rc3-vmwgfx #2\nHardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020\nRIP: 0010:vmw_du_cursor_plane_cleanup_fb+0x124/0x140 [vmwgfx]\nCode: 00 00 00 75 3a 48 83 c4 10 5b 5d c3 cc cc cc cc 48 8b b3 a8 00 00 00 48 c7 c7 99 90 43 c0 e8 93 c5 db ca 48 8b 83 a8 00 00 00 <48> 8b 78 28 e8 e3 f>\nRSP: 0018:ffffb6b98216fa80 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff969d84cdcb00 RCX: 0000000000000027\nRDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff969e75f21600\nRBP: ffff969d4143dc50 R08: 0000000000000000 R09: ffffb6b98216f920\nR10: 0000000000000003 R11: ffff969e7feb3b10 R12: 0000000000000000\nR13: 0000000000000000 R14: 000000000000027b R15: ffff969d49c9fc00\nFS:  00007f1e8f1b4180(0000) GS:ffff969e75f00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000028 CR3: 0000000104006004 CR4: 00000000003706f0\nCall Trace:\n <TASK>\n ? __die+0x23/0x70\n ? page_fault_oops+0x171/0x4e0\n ? exc_page_fault+0x7f/0x180\n ? asm_exc_page_fault+0x26/0x30\n ? vmw_du_cursor_plane_cleanup_fb+0x124/0x140 [vmwgfx]\n drm_atomic_helper_cleanup_planes+0x9b/0xc0\n commit_tail+0xd1/0x130\n drm_atomic_helper_commit+0x11a/0x140\n drm_atomic_commit+0x97/0xd0\n ? __pfx___drm_printfn_info+0x10/0x10\n drm_atomic_helper_update_plane+0xf5/0x160\n drm_mode_cursor_universal+0x10e/0x270\n drm_mode_cursor_common+0x102/0x230\n ? __pfx_drm_mode_cursor2_ioctl+0x10/0x10\n drm_ioctl_kernel+0xb2/0x110\n drm_ioctl+0x26d/0x4b0\n ? __pfx_drm_mode_cursor2_ioctl+0x10/0x10\n ? __pfx_drm_ioctl+0x10/0x10\n vmw_generic_ioctl+0xa4/0x110 [vmwgfx]\n __x64_sys_ioctl+0x94/0xd0\n do_syscall_64+0x61/0xe0\n ? __x64_sys_ioctl+0xaf/0xd0\n ? syscall_exit_to_user_mode+0x2b/0x40\n ? do_syscall_64+0x70/0xe0\n ? __x64_sys_ioctl+0xaf/0xd0\n ? syscall_exit_to_user_mode+0x2b/0x40\n ? do_syscall_64+0x70/0xe0\n ? exc_page_fault+0x7f/0x180\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\nRIP: 0033:0x7f1e93f279ed\nCode: 04 25 28 00 00 00 48 89 45 c8 31 c0 48 8d 45 10 c7 45 b0 10 00 00 00 48 89 45 b8 48 8d 45 d0 48 89 45 c0 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff f>\nRSP: 002b:00007ffca0faf600 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 000055db876ed2c0 RCX: 00007f1e93f279ed\nRDX: 00007ffca0faf6c0 RSI: 00000000c02464bb RDI: 0000000000000015\nRBP: 00007ffca0faf650 R08: 000055db87184010 R09: 0000000000000007\nR10: 000055db886471a0 R11: 0000000000000246 R12: 00007ffca0faf6c0\nR13: 00000000c02464bb R14: 0000000000000015 R15: 00007ffca0faf790\n </TASK>\nModules linked in: snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_ine>\nCR2: 0000000000000028\n---[ end trace 0000000000000000 ]---\nRIP: 0010:vmw_du_cursor_plane_cleanup_fb+0x124/0x140 [vmwgfx]\nCode: 00 00 00 75 3a 48 83 c4 10 5b 5d c3 cc cc cc cc 48 8b b3 a8 00 00 00 48 c7 c7 99 90 43 c0 e8 93 c5 db ca 48 8b 83 a8 00 00 00 <48> 8b 78 28 e8 e3 f>\nRSP: 0018:ffffb6b98216fa80 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff969d84cdcb00 RCX: 0000000000000027\nRDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff969e75f21600\nRBP: ffff969d4143\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52648",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/27571c64f1855881753e6f33c3186573afbab7ba",
            "patch_url": "https://git.kernel.org/stable/p/27571c64f1855881753e6f33c3186573afbab7ba",
            "filename": "CVE-2023-52648-27571c64f1855881753e6f33c3186573afbab7ba.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52648/CVE-2023-52648-27571c64f1855881753e6f33c3186573afbab7ba.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0a23f95af7f28dae7c0f7c82578ca5e1a239d461",
                "patch_url": "https://git.kernel.org/stable/p/0a23f95af7f28dae7c0f7c82578ca5e1a239d461",
                "filename": "CVE-2023-52648-0a23f95af7f28dae7c0f7c82578ca5e1a239d461.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52648/CVE-2023-52648-0a23f95af7f28dae7c0f7c82578ca5e1a239d461.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/105f72cc48c4c93f4578fcc61e06276471858e92",
                "patch_url": "https://git.kernel.org/stable/p/105f72cc48c4c93f4578fcc61e06276471858e92",
                "filename": "CVE-2023-52648-105f72cc48c4c93f4578fcc61e06276471858e92.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52648/CVE-2023-52648-105f72cc48c4c93f4578fcc61e06276471858e92.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/27571c64f1855881753e6f33c3186573afbab7ba",
                "patch_url": "https://git.kernel.org/stable/p/27571c64f1855881753e6f33c3186573afbab7ba",
                "filename": "CVE-2023-52648-27571c64f1855881753e6f33c3186573afbab7ba.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52648/CVE-2023-52648-27571c64f1855881753e6f33c3186573afbab7ba.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/75baad63c033b3b900d822bffbc96c9d3649bc75",
                "patch_url": "https://git.kernel.org/stable/p/75baad63c033b3b900d822bffbc96c9d3649bc75",
                "filename": "CVE-2023-52648-75baad63c033b3b900d822bffbc96c9d3649bc75.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52648/CVE-2023-52648-75baad63c033b3b900d822bffbc96c9d3649bc75.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0a23f95af7f28dae7c0f7c82578ca5e1a239d461",
            "https://git.kernel.org/stable/c/105f72cc48c4c93f4578fcc61e06276471858e92",
            "https://git.kernel.org/stable/c/27571c64f1855881753e6f33c3186573afbab7ba",
            "https://git.kernel.org/stable/c/75baad63c033b3b900d822bffbc96c9d3649bc75",
            "https://www.cve.org/CVERecord?id=CVE-2023-52648\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52648\nhttps://lore.kernel.org/linux-cve-announce/2024050122-CVE-2023-52648-4e0d@gregkh/T"
        ]
    },
    "CVE-2023-52653": {
        "cve": "CVE-2023-52653",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: fix a memleak in gss_import_v2_context\n\nThe ctx->mech_used.data allocated by kmemdup is not freed in neither\ngss_import_v2_context nor it only caller gss_krb5_import_sec_context,\nwhich frees ctx on error.\n\nThus, this patch reform the last call of gss_import_v2_context to the\ngss_krb5_import_ctx_v2, preventing the memleak while keepping the return\nformation.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52653",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/47ac11db93e74ac49cd6c3fc69bcbc5964c4a8b4",
            "patch_url": "https://git.kernel.org/stable/p/47ac11db93e74ac49cd6c3fc69bcbc5964c4a8b4",
            "filename": "CVE-2023-52653-47ac11db93e74ac49cd6c3fc69bcbc5964c4a8b4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52653/CVE-2023-52653-47ac11db93e74ac49cd6c3fc69bcbc5964c4a8b4.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/47ac11db93e74ac49cd6c3fc69bcbc5964c4a8b4",
                "patch_url": "https://git.kernel.org/stable/p/47ac11db93e74ac49cd6c3fc69bcbc5964c4a8b4",
                "filename": "CVE-2023-52653-47ac11db93e74ac49cd6c3fc69bcbc5964c4a8b4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52653/CVE-2023-52653-47ac11db93e74ac49cd6c3fc69bcbc5964c4a8b4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/99044c01ed5329e73651c054d8a4baacdbb1a27c",
                "patch_url": "https://git.kernel.org/stable/p/99044c01ed5329e73651c054d8a4baacdbb1a27c",
                "filename": "CVE-2023-52653-99044c01ed5329e73651c054d8a4baacdbb1a27c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52653/CVE-2023-52653-99044c01ed5329e73651c054d8a4baacdbb1a27c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d111e30d9cd846bb368faf3637dc0f71fcbcf822",
                "patch_url": "https://git.kernel.org/stable/p/d111e30d9cd846bb368faf3637dc0f71fcbcf822",
                "filename": "CVE-2023-52653-d111e30d9cd846bb368faf3637dc0f71fcbcf822.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52653/CVE-2023-52653-d111e30d9cd846bb368faf3637dc0f71fcbcf822.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e67b652d8e8591d3b1e569dbcdfcee15993e91fa",
                "patch_url": "https://git.kernel.org/stable/p/e67b652d8e8591d3b1e569dbcdfcee15993e91fa",
                "filename": "CVE-2023-52653-e67b652d8e8591d3b1e569dbcdfcee15993e91fa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52653/CVE-2023-52653-e67b652d8e8591d3b1e569dbcdfcee15993e91fa.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/47ac11db93e74ac49cd6c3fc69bcbc5964c4a8b4",
            "https://git.kernel.org/stable/c/99044c01ed5329e73651c054d8a4baacdbb1a27c",
            "https://git.kernel.org/stable/c/d111e30d9cd846bb368faf3637dc0f71fcbcf822",
            "https://git.kernel.org/stable/c/e67b652d8e8591d3b1e569dbcdfcee15993e91fa",
            "https://www.cve.org/CVERecord?id=CVE-2023-52653\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52653\nhttps://lore.kernel.org/linux-cve-announce/2024050131-CVE-2023-52653-a5c2@gregkh/T"
        ]
    },
    "CVE-2023-52658": {
        "cve": "CVE-2023-52658",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"net/mlx5: Block entering switchdev mode with ns inconsistency\"\n\nThis reverts commit 662404b24a4c4d839839ed25e3097571f5938b9b.\nThe revert is required due to the suspicion it is not good for anything\nand cause crash.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52658",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/136ccb2041a5d1a475f845d3bc138550be6f5daa",
            "patch_url": "https://git.kernel.org/stable/p/136ccb2041a5d1a475f845d3bc138550be6f5daa",
            "filename": "CVE-2023-52658-136ccb2041a5d1a475f845d3bc138550be6f5daa.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52658/CVE-2023-52658-136ccb2041a5d1a475f845d3bc138550be6f5daa.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/136ccb2041a5d1a475f845d3bc138550be6f5daa",
                "patch_url": "https://git.kernel.org/stable/p/136ccb2041a5d1a475f845d3bc138550be6f5daa",
                "filename": "CVE-2023-52658-136ccb2041a5d1a475f845d3bc138550be6f5daa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52658/CVE-2023-52658-136ccb2041a5d1a475f845d3bc138550be6f5daa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1bcdd66d33edb446903132456c948f0b764ef2f9",
                "patch_url": "https://git.kernel.org/stable/p/1bcdd66d33edb446903132456c948f0b764ef2f9",
                "filename": "CVE-2023-52658-1bcdd66d33edb446903132456c948f0b764ef2f9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52658/CVE-2023-52658-1bcdd66d33edb446903132456c948f0b764ef2f9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3fba8eab2cfc7334e0f132d29dfd2552f2f2a579",
                "patch_url": "https://git.kernel.org/stable/p/3fba8eab2cfc7334e0f132d29dfd2552f2f2a579",
                "filename": "CVE-2023-52658-3fba8eab2cfc7334e0f132d29dfd2552f2f2a579.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52658/CVE-2023-52658-3fba8eab2cfc7334e0f132d29dfd2552f2f2a579.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8deeefb24786ea7950b37bde4516b286c877db00",
                "patch_url": "https://git.kernel.org/stable/p/8deeefb24786ea7950b37bde4516b286c877db00",
                "filename": "CVE-2023-52658-8deeefb24786ea7950b37bde4516b286c877db00.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52658/CVE-2023-52658-8deeefb24786ea7950b37bde4516b286c877db00.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/136ccb2041a5d1a475f845d3bc138550be6f5daa",
            "https://git.kernel.org/stable/c/1bcdd66d33edb446903132456c948f0b764ef2f9",
            "https://git.kernel.org/stable/c/3fba8eab2cfc7334e0f132d29dfd2552f2f2a579",
            "https://git.kernel.org/stable/c/8deeefb24786ea7950b37bde4516b286c877db00",
            "https://www.cve.org/CVERecord?id=CVE-2023-52658\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52658\nhttps://lore.kernel.org/linux-cve-announce/2024051717-CVE-2023-52658-4c61@gregkh/T"
        ]
    },
    "CVE-2023-52662": {
        "cve": "CVE-2023-52662",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node\n\nWhen ida_alloc_max fails, resources allocated before should be freed,\nincluding *res allocated by kmalloc and ttm_resource_init.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52662",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/40624af6674745e174c754a20d7c53c250e65e7a",
            "patch_url": "https://git.kernel.org/stable/p/40624af6674745e174c754a20d7c53c250e65e7a",
            "filename": "CVE-2023-52662-40624af6674745e174c754a20d7c53c250e65e7a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52662/CVE-2023-52662-40624af6674745e174c754a20d7c53c250e65e7a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/03b1072616a8f7d6e8594f643b416a9467c83fbf",
                "patch_url": "https://git.kernel.org/stable/p/03b1072616a8f7d6e8594f643b416a9467c83fbf",
                "filename": "CVE-2023-52662-03b1072616a8f7d6e8594f643b416a9467c83fbf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52662/CVE-2023-52662-03b1072616a8f7d6e8594f643b416a9467c83fbf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/40624af6674745e174c754a20d7c53c250e65e7a",
                "patch_url": "https://git.kernel.org/stable/p/40624af6674745e174c754a20d7c53c250e65e7a",
                "filename": "CVE-2023-52662-40624af6674745e174c754a20d7c53c250e65e7a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52662/CVE-2023-52662-40624af6674745e174c754a20d7c53c250e65e7a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6fc6233f6db1579b69b54b44571f1a7fde8186e6",
                "patch_url": "https://git.kernel.org/stable/p/6fc6233f6db1579b69b54b44571f1a7fde8186e6",
                "filename": "CVE-2023-52662-6fc6233f6db1579b69b54b44571f1a7fde8186e6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52662/CVE-2023-52662-6fc6233f6db1579b69b54b44571f1a7fde8186e6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/83e0f220d1e992fa074157fcf14945bf170ffbc5",
                "patch_url": "https://git.kernel.org/stable/p/83e0f220d1e992fa074157fcf14945bf170ffbc5",
                "filename": "CVE-2023-52662-83e0f220d1e992fa074157fcf14945bf170ffbc5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52662/CVE-2023-52662-83e0f220d1e992fa074157fcf14945bf170ffbc5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/89709105a6091948ffb6ec2427954cbfe45358ce",
                "patch_url": "https://git.kernel.org/stable/p/89709105a6091948ffb6ec2427954cbfe45358ce",
                "filename": "CVE-2023-52662-89709105a6091948ffb6ec2427954cbfe45358ce.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52662/CVE-2023-52662-89709105a6091948ffb6ec2427954cbfe45358ce.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d1e546ab91c670e536a274a75481034ab7534876",
                "patch_url": "https://git.kernel.org/stable/p/d1e546ab91c670e536a274a75481034ab7534876",
                "filename": "CVE-2023-52662-d1e546ab91c670e536a274a75481034ab7534876.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52662/CVE-2023-52662-d1e546ab91c670e536a274a75481034ab7534876.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/03b1072616a8f7d6e8594f643b416a9467c83fbf",
            "https://git.kernel.org/stable/c/40624af6674745e174c754a20d7c53c250e65e7a",
            "https://git.kernel.org/stable/c/6fc6233f6db1579b69b54b44571f1a7fde8186e6",
            "https://git.kernel.org/stable/c/83e0f220d1e992fa074157fcf14945bf170ffbc5",
            "https://git.kernel.org/stable/c/89709105a6091948ffb6ec2427954cbfe45358ce",
            "https://git.kernel.org/stable/c/d1e546ab91c670e536a274a75481034ab7534876",
            "https://www.cve.org/CVERecord?id=CVE-2023-52662\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52662\nhttps://lore.kernel.org/linux-cve-announce/2024051740-CVE-2023-52662-1536@gregkh/T"
        ]
    },
    "CVE-2023-52667": {
        "cve": "CVE-2023-52667",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: fix a potential double-free in fs_any_create_groups\n\nWhen kcalloc() for ft->g succeeds but kvzalloc() for in fails,\nfs_any_create_groups() will free ft->g. However, its caller\nfs_any_create_table() will free ft->g again through calling\nmlx5e_destroy_flow_table(), which will lead to a double-free.\nFix this by setting ft->g to NULL in fs_any_create_groups().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52667",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/72a729868592752b5a294d27453da264106983b1",
            "patch_url": "https://git.kernel.org/stable/p/72a729868592752b5a294d27453da264106983b1",
            "filename": "CVE-2023-52667-72a729868592752b5a294d27453da264106983b1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52667/CVE-2023-52667-72a729868592752b5a294d27453da264106983b1.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2897c981ee63e1be5e530b1042484626a10b26d8",
                "patch_url": "https://git.kernel.org/stable/p/2897c981ee63e1be5e530b1042484626a10b26d8",
                "filename": "CVE-2023-52667-2897c981ee63e1be5e530b1042484626a10b26d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52667/CVE-2023-52667-2897c981ee63e1be5e530b1042484626a10b26d8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/65a4ade8a6d205979292e88beeb6a626ddbd4779",
                "patch_url": "https://git.kernel.org/stable/p/65a4ade8a6d205979292e88beeb6a626ddbd4779",
                "filename": "CVE-2023-52667-65a4ade8a6d205979292e88beeb6a626ddbd4779.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52667/CVE-2023-52667-65a4ade8a6d205979292e88beeb6a626ddbd4779.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/72a729868592752b5a294d27453da264106983b1",
                "patch_url": "https://git.kernel.org/stable/p/72a729868592752b5a294d27453da264106983b1",
                "filename": "CVE-2023-52667-72a729868592752b5a294d27453da264106983b1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52667/CVE-2023-52667-72a729868592752b5a294d27453da264106983b1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aef855df7e1bbd5aa4484851561211500b22707e",
                "patch_url": "https://git.kernel.org/stable/p/aef855df7e1bbd5aa4484851561211500b22707e",
                "filename": "CVE-2023-52667-aef855df7e1bbd5aa4484851561211500b22707e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52667/CVE-2023-52667-aef855df7e1bbd5aa4484851561211500b22707e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b2fa86b2aceb4bc9ada51cea90f61546d7512cbe",
                "patch_url": "https://git.kernel.org/stable/p/b2fa86b2aceb4bc9ada51cea90f61546d7512cbe",
                "filename": "CVE-2023-52667-b2fa86b2aceb4bc9ada51cea90f61546d7512cbe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52667/CVE-2023-52667-b2fa86b2aceb4bc9ada51cea90f61546d7512cbe.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2897c981ee63e1be5e530b1042484626a10b26d8",
            "https://git.kernel.org/stable/c/65a4ade8a6d205979292e88beeb6a626ddbd4779",
            "https://git.kernel.org/stable/c/72a729868592752b5a294d27453da264106983b1",
            "https://git.kernel.org/stable/c/aef855df7e1bbd5aa4484851561211500b22707e",
            "https://git.kernel.org/stable/c/b2fa86b2aceb4bc9ada51cea90f61546d7512cbe",
            "https://www.cve.org/CVERecord?id=CVE-2023-52667\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52667\nhttps://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52667-649b@gregkh/T"
        ]
    },
    "CVE-2023-52669": {
        "cve": "CVE-2023-52669",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: s390/aes - Fix buffer overread in CTR mode\n\nWhen processing the last block, the s390 ctr code will always read\na whole block, even if there isn't a whole block of data left.  Fix\nthis by using the actual length left and copy it into a buffer first\nfor processing.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52669",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/a7f580cdb42ec3d53bbb7c4e4335a98423703285",
            "patch_url": "https://git.kernel.org/stable/p/a7f580cdb42ec3d53bbb7c4e4335a98423703285",
            "filename": "CVE-2023-52669-a7f580cdb42ec3d53bbb7c4e4335a98423703285.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52669/CVE-2023-52669-a7f580cdb42ec3d53bbb7c4e4335a98423703285.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/a7f580cdb42ec3d53bbb7c4e4335a98423703285",
                "patch_url": "https://git.kernel.org/stable/p/a7f580cdb42ec3d53bbb7c4e4335a98423703285",
                "filename": "CVE-2023-52669-a7f580cdb42ec3d53bbb7c4e4335a98423703285.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52669/CVE-2023-52669-a7f580cdb42ec3d53bbb7c4e4335a98423703285.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cd51e26a3b89706beec64f2d8296cfb1c34e0c79",
                "patch_url": "https://git.kernel.org/stable/p/cd51e26a3b89706beec64f2d8296cfb1c34e0c79",
                "filename": "CVE-2023-52669-cd51e26a3b89706beec64f2d8296cfb1c34e0c79.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52669/CVE-2023-52669-cd51e26a3b89706beec64f2d8296cfb1c34e0c79.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d07f951903fa9922c375b8ab1ce81b18a0034e3b",
                "patch_url": "https://git.kernel.org/stable/p/d07f951903fa9922c375b8ab1ce81b18a0034e3b",
                "filename": "CVE-2023-52669-d07f951903fa9922c375b8ab1ce81b18a0034e3b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52669/CVE-2023-52669-d07f951903fa9922c375b8ab1ce81b18a0034e3b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d68ac38895e84446848b7647ab9458d54cacba3e",
                "patch_url": "https://git.kernel.org/stable/p/d68ac38895e84446848b7647ab9458d54cacba3e",
                "filename": "CVE-2023-52669-d68ac38895e84446848b7647ab9458d54cacba3e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52669/CVE-2023-52669-d68ac38895e84446848b7647ab9458d54cacba3e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dbc9a791a70ea47be9f2acf251700fe254a2ab23",
                "patch_url": "https://git.kernel.org/stable/p/dbc9a791a70ea47be9f2acf251700fe254a2ab23",
                "filename": "CVE-2023-52669-dbc9a791a70ea47be9f2acf251700fe254a2ab23.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52669/CVE-2023-52669-dbc9a791a70ea47be9f2acf251700fe254a2ab23.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e78f1a43e72daf77705ad5b9946de66fc708b874",
                "patch_url": "https://git.kernel.org/stable/p/e78f1a43e72daf77705ad5b9946de66fc708b874",
                "filename": "CVE-2023-52669-e78f1a43e72daf77705ad5b9946de66fc708b874.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52669/CVE-2023-52669-e78f1a43e72daf77705ad5b9946de66fc708b874.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/a7f580cdb42ec3d53bbb7c4e4335a98423703285",
            "https://git.kernel.org/stable/c/cd51e26a3b89706beec64f2d8296cfb1c34e0c79",
            "https://git.kernel.org/stable/c/d07f951903fa9922c375b8ab1ce81b18a0034e3b",
            "https://git.kernel.org/stable/c/d68ac38895e84446848b7647ab9458d54cacba3e",
            "https://git.kernel.org/stable/c/dbc9a791a70ea47be9f2acf251700fe254a2ab23",
            "https://git.kernel.org/stable/c/e78f1a43e72daf77705ad5b9946de66fc708b874",
            "https://www.cve.org/CVERecord?id=CVE-2023-52669\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52669\nhttps://lore.kernel.org/linux-cve-announce/2024051728-CVE-2023-52669-5a58@gregkh/T"
        ]
    },
    "CVE-2023-52675": {
        "cve": "CVE-2023-52675",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/imc-pmu: Add a null pointer check in update_events_in_group()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52675",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1e80aa25d186a7aa212df5acd8c75f55ac8dae34",
            "patch_url": "https://git.kernel.org/stable/p/1e80aa25d186a7aa212df5acd8c75f55ac8dae34",
            "filename": "CVE-2023-52675-1e80aa25d186a7aa212df5acd8c75f55ac8dae34.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52675/CVE-2023-52675-1e80aa25d186a7aa212df5acd8c75f55ac8dae34.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/024352f7928b28f53609660663329d8c0f4ad032",
                "patch_url": "https://git.kernel.org/stable/p/024352f7928b28f53609660663329d8c0f4ad032",
                "filename": "CVE-2023-52675-024352f7928b28f53609660663329d8c0f4ad032.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52675/CVE-2023-52675-024352f7928b28f53609660663329d8c0f4ad032.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0a233867a39078ebb0f575e2948593bbff5826b3",
                "patch_url": "https://git.kernel.org/stable/p/0a233867a39078ebb0f575e2948593bbff5826b3",
                "filename": "CVE-2023-52675-0a233867a39078ebb0f575e2948593bbff5826b3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52675/CVE-2023-52675-0a233867a39078ebb0f575e2948593bbff5826b3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1e80aa25d186a7aa212df5acd8c75f55ac8dae34",
                "patch_url": "https://git.kernel.org/stable/p/1e80aa25d186a7aa212df5acd8c75f55ac8dae34",
                "filename": "CVE-2023-52675-1e80aa25d186a7aa212df5acd8c75f55ac8dae34.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52675/CVE-2023-52675-1e80aa25d186a7aa212df5acd8c75f55ac8dae34.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5a669f3511d273c8c1ab1c1d268fbcdf53fc7a05",
                "patch_url": "https://git.kernel.org/stable/p/5a669f3511d273c8c1ab1c1d268fbcdf53fc7a05",
                "filename": "CVE-2023-52675-5a669f3511d273c8c1ab1c1d268fbcdf53fc7a05.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52675/CVE-2023-52675-5a669f3511d273c8c1ab1c1d268fbcdf53fc7a05.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/75fc599bcdcb1de093c9ced2e3cccc832f3787f3",
                "patch_url": "https://git.kernel.org/stable/p/75fc599bcdcb1de093c9ced2e3cccc832f3787f3",
                "filename": "CVE-2023-52675-75fc599bcdcb1de093c9ced2e3cccc832f3787f3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52675/CVE-2023-52675-75fc599bcdcb1de093c9ced2e3cccc832f3787f3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a2da3f9b1a1019c887ee1d164475a8fcdb0a3fec",
                "patch_url": "https://git.kernel.org/stable/p/a2da3f9b1a1019c887ee1d164475a8fcdb0a3fec",
                "filename": "CVE-2023-52675-a2da3f9b1a1019c887ee1d164475a8fcdb0a3fec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52675/CVE-2023-52675-a2da3f9b1a1019c887ee1d164475a8fcdb0a3fec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c7d828e12b326ea50fb80c369d7aa87519ed14c6",
                "patch_url": "https://git.kernel.org/stable/p/c7d828e12b326ea50fb80c369d7aa87519ed14c6",
                "filename": "CVE-2023-52675-c7d828e12b326ea50fb80c369d7aa87519ed14c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52675/CVE-2023-52675-c7d828e12b326ea50fb80c369d7aa87519ed14c6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f105c263009839d80fad6998324a4e1b3511cba0",
                "patch_url": "https://git.kernel.org/stable/p/f105c263009839d80fad6998324a4e1b3511cba0",
                "filename": "CVE-2023-52675-f105c263009839d80fad6998324a4e1b3511cba0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52675/CVE-2023-52675-f105c263009839d80fad6998324a4e1b3511cba0.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/024352f7928b28f53609660663329d8c0f4ad032",
            "https://git.kernel.org/stable/c/0a233867a39078ebb0f575e2948593bbff5826b3",
            "https://git.kernel.org/stable/c/1e80aa25d186a7aa212df5acd8c75f55ac8dae34",
            "https://git.kernel.org/stable/c/5a669f3511d273c8c1ab1c1d268fbcdf53fc7a05",
            "https://git.kernel.org/stable/c/75fc599bcdcb1de093c9ced2e3cccc832f3787f3",
            "https://git.kernel.org/stable/c/a2da3f9b1a1019c887ee1d164475a8fcdb0a3fec",
            "https://git.kernel.org/stable/c/c7d828e12b326ea50fb80c369d7aa87519ed14c6",
            "https://git.kernel.org/stable/c/f105c263009839d80fad6998324a4e1b3511cba0",
            "https://www.cve.org/CVERecord?id=CVE-2023-52675\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52675\nhttps://lore.kernel.org/linux-cve-announce/2024051749-CVE-2023-52675-4d66@gregkh/T"
        ]
    },
    "CVE-2023-52679": {
        "cve": "CVE-2023-52679",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: Fix double free in of_parse_phandle_with_args_map\n\nIn of_parse_phandle_with_args_map() the inner loop that\niterates through the map entries calls of_node_put(new)\nto free the reference acquired by the previous iteration\nof the inner loop. This assumes that the value of \"new\" is\nNULL on the first iteration of the inner loop.\n\nMake sure that this is true in all iterations of the outer\nloop by setting \"new\" to NULL after its value is assigned to \"cur\".\n\nExtend the unittest to detect the double free and add an additional\ntest case that actually triggers this path.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52679",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4541004084527ce9e95a818ebbc4e6b293ffca21",
            "patch_url": "https://git.kernel.org/stable/p/4541004084527ce9e95a818ebbc4e6b293ffca21",
            "filename": "CVE-2023-52679-4541004084527ce9e95a818ebbc4e6b293ffca21.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52679/CVE-2023-52679-4541004084527ce9e95a818ebbc4e6b293ffca21.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/26b4d702c44f9e5cf3c5c001ae619a4a001889db",
                "patch_url": "https://git.kernel.org/stable/p/26b4d702c44f9e5cf3c5c001ae619a4a001889db",
                "filename": "CVE-2023-52679-26b4d702c44f9e5cf3c5c001ae619a4a001889db.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52679/CVE-2023-52679-26b4d702c44f9e5cf3c5c001ae619a4a001889db.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4541004084527ce9e95a818ebbc4e6b293ffca21",
                "patch_url": "https://git.kernel.org/stable/p/4541004084527ce9e95a818ebbc4e6b293ffca21",
                "filename": "CVE-2023-52679-4541004084527ce9e95a818ebbc4e6b293ffca21.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52679/CVE-2023-52679-4541004084527ce9e95a818ebbc4e6b293ffca21.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4dde83569832f9377362e50f7748463340c5db6b",
                "patch_url": "https://git.kernel.org/stable/p/4dde83569832f9377362e50f7748463340c5db6b",
                "filename": "CVE-2023-52679-4dde83569832f9377362e50f7748463340c5db6b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52679/CVE-2023-52679-4dde83569832f9377362e50f7748463340c5db6b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a0a061151a6200c13149dbcdb6c065203c8425d2",
                "patch_url": "https://git.kernel.org/stable/p/a0a061151a6200c13149dbcdb6c065203c8425d2",
                "filename": "CVE-2023-52679-a0a061151a6200c13149dbcdb6c065203c8425d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52679/CVE-2023-52679-a0a061151a6200c13149dbcdb6c065203c8425d2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b64d09a4e8596f76d27f4b4a90a1cf6baf6a82f8",
                "patch_url": "https://git.kernel.org/stable/p/b64d09a4e8596f76d27f4b4a90a1cf6baf6a82f8",
                "filename": "CVE-2023-52679-b64d09a4e8596f76d27f4b4a90a1cf6baf6a82f8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52679/CVE-2023-52679-b64d09a4e8596f76d27f4b4a90a1cf6baf6a82f8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b9d760dae5b10e73369b769073525acd7b3be2bd",
                "patch_url": "https://git.kernel.org/stable/p/b9d760dae5b10e73369b769073525acd7b3be2bd",
                "filename": "CVE-2023-52679-b9d760dae5b10e73369b769073525acd7b3be2bd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52679/CVE-2023-52679-b9d760dae5b10e73369b769073525acd7b3be2bd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cafa992134124e785609a406da4ff2b54052aff7",
                "patch_url": "https://git.kernel.org/stable/p/cafa992134124e785609a406da4ff2b54052aff7",
                "filename": "CVE-2023-52679-cafa992134124e785609a406da4ff2b54052aff7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52679/CVE-2023-52679-cafa992134124e785609a406da4ff2b54052aff7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d5f490343c77e6708b6c4aa7dbbfbcbb9546adea",
                "patch_url": "https://git.kernel.org/stable/p/d5f490343c77e6708b6c4aa7dbbfbcbb9546adea",
                "filename": "CVE-2023-52679-d5f490343c77e6708b6c4aa7dbbfbcbb9546adea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52679/CVE-2023-52679-d5f490343c77e6708b6c4aa7dbbfbcbb9546adea.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/26b4d702c44f9e5cf3c5c001ae619a4a001889db",
            "https://git.kernel.org/stable/c/4541004084527ce9e95a818ebbc4e6b293ffca21",
            "https://git.kernel.org/stable/c/4dde83569832f9377362e50f7748463340c5db6b",
            "https://git.kernel.org/stable/c/a0a061151a6200c13149dbcdb6c065203c8425d2",
            "https://git.kernel.org/stable/c/b64d09a4e8596f76d27f4b4a90a1cf6baf6a82f8",
            "https://git.kernel.org/stable/c/b9d760dae5b10e73369b769073525acd7b3be2bd",
            "https://git.kernel.org/stable/c/cafa992134124e785609a406da4ff2b54052aff7",
            "https://git.kernel.org/stable/c/d5f490343c77e6708b6c4aa7dbbfbcbb9546adea",
            "https://www.cve.org/CVERecord?id=CVE-2023-52679\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52679\nhttps://lore.kernel.org/linux-cve-announce/2024051750-CVE-2023-52679-948f@gregkh/T"
        ]
    },
    "CVE-2023-52683": {
        "cve": "CVE-2023-52683",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: LPIT: Avoid u32 multiplication overflow\n\nIn lpit_update_residency() there is a possibility of overflow\nin multiplication, if tsc_khz is large enough (> UINT_MAX/1000).\n\nChange multiplication to mul_u32_u32().\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52683",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/647d1d50c31e60ef9ccb9756a8fdf863329f7aee",
            "patch_url": "https://git.kernel.org/stable/p/647d1d50c31e60ef9ccb9756a8fdf863329f7aee",
            "filename": "CVE-2023-52683-647d1d50c31e60ef9ccb9756a8fdf863329f7aee.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52683/CVE-2023-52683-647d1d50c31e60ef9ccb9756a8fdf863329f7aee.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/56d2eeda87995245300836ee4dbd13b002311782",
                "patch_url": "https://git.kernel.org/stable/p/56d2eeda87995245300836ee4dbd13b002311782",
                "filename": "CVE-2023-52683-56d2eeda87995245300836ee4dbd13b002311782.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52683/CVE-2023-52683-56d2eeda87995245300836ee4dbd13b002311782.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/647d1d50c31e60ef9ccb9756a8fdf863329f7aee",
                "patch_url": "https://git.kernel.org/stable/p/647d1d50c31e60ef9ccb9756a8fdf863329f7aee",
                "filename": "CVE-2023-52683-647d1d50c31e60ef9ccb9756a8fdf863329f7aee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52683/CVE-2023-52683-647d1d50c31e60ef9ccb9756a8fdf863329f7aee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6c38e791bde07d6ca2a0a619ff9b6837e0d5f9ad",
                "patch_url": "https://git.kernel.org/stable/p/6c38e791bde07d6ca2a0a619ff9b6837e0d5f9ad",
                "filename": "CVE-2023-52683-6c38e791bde07d6ca2a0a619ff9b6837e0d5f9ad.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52683/CVE-2023-52683-6c38e791bde07d6ca2a0a619ff9b6837e0d5f9ad.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/72222dfd76a79d9666ab3117fcdd44ca8cd0c4de",
                "patch_url": "https://git.kernel.org/stable/p/72222dfd76a79d9666ab3117fcdd44ca8cd0c4de",
                "filename": "CVE-2023-52683-72222dfd76a79d9666ab3117fcdd44ca8cd0c4de.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52683/CVE-2023-52683-72222dfd76a79d9666ab3117fcdd44ca8cd0c4de.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7aab9d906e2e252a7783f872406033ec49b6dae",
                "patch_url": "https://git.kernel.org/stable/p/b7aab9d906e2e252a7783f872406033ec49b6dae",
                "filename": "CVE-2023-52683-b7aab9d906e2e252a7783f872406033ec49b6dae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52683/CVE-2023-52683-b7aab9d906e2e252a7783f872406033ec49b6dae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c1814a4ffd016ce5392c6767d22ef3aa2f0d4bd1",
                "patch_url": "https://git.kernel.org/stable/p/c1814a4ffd016ce5392c6767d22ef3aa2f0d4bd1",
                "filename": "CVE-2023-52683-c1814a4ffd016ce5392c6767d22ef3aa2f0d4bd1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52683/CVE-2023-52683-c1814a4ffd016ce5392c6767d22ef3aa2f0d4bd1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d1ac288b2742aa4af746c5613bac71760fadd1c4",
                "patch_url": "https://git.kernel.org/stable/p/d1ac288b2742aa4af746c5613bac71760fadd1c4",
                "filename": "CVE-2023-52683-d1ac288b2742aa4af746c5613bac71760fadd1c4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52683/CVE-2023-52683-d1ac288b2742aa4af746c5613bac71760fadd1c4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f39c3d578c7d09a18ceaf56750fc7f20b02ada63",
                "patch_url": "https://git.kernel.org/stable/p/f39c3d578c7d09a18ceaf56750fc7f20b02ada63",
                "filename": "CVE-2023-52683-f39c3d578c7d09a18ceaf56750fc7f20b02ada63.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52683/CVE-2023-52683-f39c3d578c7d09a18ceaf56750fc7f20b02ada63.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/56d2eeda87995245300836ee4dbd13b002311782",
            "https://git.kernel.org/stable/c/647d1d50c31e60ef9ccb9756a8fdf863329f7aee",
            "https://git.kernel.org/stable/c/6c38e791bde07d6ca2a0a619ff9b6837e0d5f9ad",
            "https://git.kernel.org/stable/c/72222dfd76a79d9666ab3117fcdd44ca8cd0c4de",
            "https://git.kernel.org/stable/c/b7aab9d906e2e252a7783f872406033ec49b6dae",
            "https://git.kernel.org/stable/c/c1814a4ffd016ce5392c6767d22ef3aa2f0d4bd1",
            "https://git.kernel.org/stable/c/d1ac288b2742aa4af746c5613bac71760fadd1c4",
            "https://git.kernel.org/stable/c/f39c3d578c7d09a18ceaf56750fc7f20b02ada63",
            "https://www.cve.org/CVERecord?id=CVE-2023-52683\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52683\nhttps://lore.kernel.org/linux-cve-announce/2024051751-CVE-2023-52683-f280@gregkh/T"
        ]
    },
    "CVE-2023-52686": {
        "cve": "CVE-2023-52686",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_event_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52686",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/8422d179cf46889c15ceff9ede48c5bfa4e7f0b4",
            "patch_url": "https://git.kernel.org/stable/p/8422d179cf46889c15ceff9ede48c5bfa4e7f0b4",
            "filename": "CVE-2023-52686-8422d179cf46889c15ceff9ede48c5bfa4e7f0b4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52686/CVE-2023-52686-8422d179cf46889c15ceff9ede48c5bfa4e7f0b4.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/8422d179cf46889c15ceff9ede48c5bfa4e7f0b4",
                "patch_url": "https://git.kernel.org/stable/p/8422d179cf46889c15ceff9ede48c5bfa4e7f0b4",
                "filename": "CVE-2023-52686-8422d179cf46889c15ceff9ede48c5bfa4e7f0b4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52686/CVE-2023-52686-8422d179cf46889c15ceff9ede48c5bfa4e7f0b4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8649829a1dd25199bbf557b2621cedb4bf9b3050",
                "patch_url": "https://git.kernel.org/stable/p/8649829a1dd25199bbf557b2621cedb4bf9b3050",
                "filename": "CVE-2023-52686-8649829a1dd25199bbf557b2621cedb4bf9b3050.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52686/CVE-2023-52686-8649829a1dd25199bbf557b2621cedb4bf9b3050.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9a523e1da6d88c2034f946adfa4f74b236c95ca9",
                "patch_url": "https://git.kernel.org/stable/p/9a523e1da6d88c2034f946adfa4f74b236c95ca9",
                "filename": "CVE-2023-52686-9a523e1da6d88c2034f946adfa4f74b236c95ca9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52686/CVE-2023-52686-9a523e1da6d88c2034f946adfa4f74b236c95ca9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a14c55eb461d630b836f80591d8caf1f74e62877",
                "patch_url": "https://git.kernel.org/stable/p/a14c55eb461d630b836f80591d8caf1f74e62877",
                "filename": "CVE-2023-52686-a14c55eb461d630b836f80591d8caf1f74e62877.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52686/CVE-2023-52686-a14c55eb461d630b836f80591d8caf1f74e62877.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c0b111ea786ddcc8be0682612830796ece9436c7",
                "patch_url": "https://git.kernel.org/stable/p/c0b111ea786ddcc8be0682612830796ece9436c7",
                "filename": "CVE-2023-52686-c0b111ea786ddcc8be0682612830796ece9436c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52686/CVE-2023-52686-c0b111ea786ddcc8be0682612830796ece9436c7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e08c2e275fa1874de945b87093f925997722ee42",
                "patch_url": "https://git.kernel.org/stable/p/e08c2e275fa1874de945b87093f925997722ee42",
                "filename": "CVE-2023-52686-e08c2e275fa1874de945b87093f925997722ee42.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52686/CVE-2023-52686-e08c2e275fa1874de945b87093f925997722ee42.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e6ad05e3ae9c84c5a71d7bb2d44dc845ae7990cf",
                "patch_url": "https://git.kernel.org/stable/p/e6ad05e3ae9c84c5a71d7bb2d44dc845ae7990cf",
                "filename": "CVE-2023-52686-e6ad05e3ae9c84c5a71d7bb2d44dc845ae7990cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52686/CVE-2023-52686-e6ad05e3ae9c84c5a71d7bb2d44dc845ae7990cf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e93d7cf4c1ddbcd846739e7ad849f955a4f18031",
                "patch_url": "https://git.kernel.org/stable/p/e93d7cf4c1ddbcd846739e7ad849f955a4f18031",
                "filename": "CVE-2023-52686-e93d7cf4c1ddbcd846739e7ad849f955a4f18031.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52686/CVE-2023-52686-e93d7cf4c1ddbcd846739e7ad849f955a4f18031.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/8422d179cf46889c15ceff9ede48c5bfa4e7f0b4",
            "https://git.kernel.org/stable/c/8649829a1dd25199bbf557b2621cedb4bf9b3050",
            "https://git.kernel.org/stable/c/9a523e1da6d88c2034f946adfa4f74b236c95ca9",
            "https://git.kernel.org/stable/c/a14c55eb461d630b836f80591d8caf1f74e62877",
            "https://git.kernel.org/stable/c/c0b111ea786ddcc8be0682612830796ece9436c7",
            "https://git.kernel.org/stable/c/e08c2e275fa1874de945b87093f925997722ee42",
            "https://git.kernel.org/stable/c/e6ad05e3ae9c84c5a71d7bb2d44dc845ae7990cf",
            "https://git.kernel.org/stable/c/e93d7cf4c1ddbcd846739e7ad849f955a4f18031",
            "https://www.cve.org/CVERecord?id=CVE-2023-52686\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52686\nhttps://lore.kernel.org/linux-cve-announce/2024051752-CVE-2023-52686-4a08@gregkh/T"
        ]
    },
    "CVE-2023-52700": {
        "cve": "CVE-2023-52700",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix kernel warning when sending SYN message\n\nWhen sending a SYN message, this kernel stack trace is observed:\n\n...\n[   13.396352] RIP: 0010:_copy_from_iter+0xb4/0x550\n...\n[   13.398494] Call Trace:\n[   13.398630]  <TASK>\n[   13.398630]  ? __alloc_skb+0xed/0x1a0\n[   13.398630]  tipc_msg_build+0x12c/0x670 [tipc]\n[   13.398630]  ? shmem_add_to_page_cache.isra.71+0x151/0x290\n[   13.398630]  __tipc_sendmsg+0x2d1/0x710 [tipc]\n[   13.398630]  ? tipc_connect+0x1d9/0x230 [tipc]\n[   13.398630]  ? __local_bh_enable_ip+0x37/0x80\n[   13.398630]  tipc_connect+0x1d9/0x230 [tipc]\n[   13.398630]  ? __sys_connect+0x9f/0xd0\n[   13.398630]  __sys_connect+0x9f/0xd0\n[   13.398630]  ? preempt_count_add+0x4d/0xa0\n[   13.398630]  ? fpregs_assert_state_consistent+0x22/0x50\n[   13.398630]  __x64_sys_connect+0x16/0x20\n[   13.398630]  do_syscall_64+0x42/0x90\n[   13.398630]  entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nIt is because commit a41dad905e5a (\"iov_iter: saner checks for attempt\nto copy to/from iterator\") has introduced sanity check for copying\nfrom/to iov iterator. Lacking of copy direction from the iterator\nviewpoint would lead to kernel stack trace like above.\n\nThis commit fixes this issue by initializing the iov iterator with\nthe correct copy direction when sending SYN or ACK without data.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52700",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/11a4d6f67cf55883dc78e31c247d1903ed7feccc",
            "patch_url": "https://git.kernel.org/stable/p/11a4d6f67cf55883dc78e31c247d1903ed7feccc",
            "filename": "CVE-2023-52700-11a4d6f67cf55883dc78e31c247d1903ed7feccc.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52700/CVE-2023-52700-11a4d6f67cf55883dc78e31c247d1903ed7feccc.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/11a4d6f67cf55883dc78e31c247d1903ed7feccc",
                "patch_url": "https://git.kernel.org/stable/p/11a4d6f67cf55883dc78e31c247d1903ed7feccc",
                "filename": "CVE-2023-52700-11a4d6f67cf55883dc78e31c247d1903ed7feccc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52700/CVE-2023-52700-11a4d6f67cf55883dc78e31c247d1903ed7feccc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/54b6082aec178f16ad6d193b4ecdc9c4823d9a32",
                "patch_url": "https://git.kernel.org/stable/p/54b6082aec178f16ad6d193b4ecdc9c4823d9a32",
                "filename": "CVE-2023-52700-54b6082aec178f16ad6d193b4ecdc9c4823d9a32.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52700/CVE-2023-52700-54b6082aec178f16ad6d193b4ecdc9c4823d9a32.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/11a4d6f67cf55883dc78e31c247d1903ed7feccc",
            "https://git.kernel.org/stable/c/54b6082aec178f16ad6d193b4ecdc9c4823d9a32",
            "https://www.cve.org/CVERecord?id=CVE-2023-52700\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52700\nhttps://lore.kernel.org/linux-cve-announce/2024052156-CVE-2023-52700-1e45@gregkh/T"
        ]
    },
    "CVE-2023-52703": {
        "cve": "CVE-2023-52703",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/usb: kalmia: Don't pass act_len in usb_bulk_msg error path\n\nsyzbot reported that act_len in kalmia_send_init_packet() is\nuninitialized when passing it to the first usb_bulk_msg error path. Jiri\nPirko noted that it's pointless to pass it in the error path, and that\nthe value that would be printed in the second error path would be the\nvalue of act_len from the first call to usb_bulk_msg.[1]\n\nWith this in mind, let's just not pass act_len to the usb_bulk_msg error\npaths.\n\n1: https://lore.kernel.org/lkml/Y9pY61y1nwTuzMOa@nanopsycho/",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52703",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1b5de7d44890b78519acbcc80d8d1f23ff2872e5",
            "patch_url": "https://git.kernel.org/stable/p/1b5de7d44890b78519acbcc80d8d1f23ff2872e5",
            "filename": "CVE-2023-52703-1b5de7d44890b78519acbcc80d8d1f23ff2872e5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52703/CVE-2023-52703-1b5de7d44890b78519acbcc80d8d1f23ff2872e5.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/02df3170c04a8356cd571ab9155a42f030190abc",
                "patch_url": "https://git.kernel.org/stable/p/02df3170c04a8356cd571ab9155a42f030190abc",
                "filename": "CVE-2023-52703-02df3170c04a8356cd571ab9155a42f030190abc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52703/CVE-2023-52703-02df3170c04a8356cd571ab9155a42f030190abc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1b5de7d44890b78519acbcc80d8d1f23ff2872e5",
                "patch_url": "https://git.kernel.org/stable/p/1b5de7d44890b78519acbcc80d8d1f23ff2872e5",
                "filename": "CVE-2023-52703-1b5de7d44890b78519acbcc80d8d1f23ff2872e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52703/CVE-2023-52703-1b5de7d44890b78519acbcc80d8d1f23ff2872e5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/338f826d3afead6e4df521f7972a4bef04a72efb",
                "patch_url": "https://git.kernel.org/stable/p/338f826d3afead6e4df521f7972a4bef04a72efb",
                "filename": "CVE-2023-52703-338f826d3afead6e4df521f7972a4bef04a72efb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52703/CVE-2023-52703-338f826d3afead6e4df521f7972a4bef04a72efb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/525bdcb0838d19d918c7786151ee14661967a030",
                "patch_url": "https://git.kernel.org/stable/p/525bdcb0838d19d918c7786151ee14661967a030",
                "filename": "CVE-2023-52703-525bdcb0838d19d918c7786151ee14661967a030.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52703/CVE-2023-52703-525bdcb0838d19d918c7786151ee14661967a030.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/723ef7b66f37c0841f5a451ccbce47ee1641e081",
                "patch_url": "https://git.kernel.org/stable/p/723ef7b66f37c0841f5a451ccbce47ee1641e081",
                "filename": "CVE-2023-52703-723ef7b66f37c0841f5a451ccbce47ee1641e081.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52703/CVE-2023-52703-723ef7b66f37c0841f5a451ccbce47ee1641e081.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a753352622b4f3c0219e0e9c73114b2848ae6042",
                "patch_url": "https://git.kernel.org/stable/p/a753352622b4f3c0219e0e9c73114b2848ae6042",
                "filename": "CVE-2023-52703-a753352622b4f3c0219e0e9c73114b2848ae6042.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52703/CVE-2023-52703-a753352622b4f3c0219e0e9c73114b2848ae6042.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c68f345b7c425b38656e1791a0486769a8797016",
                "patch_url": "https://git.kernel.org/stable/p/c68f345b7c425b38656e1791a0486769a8797016",
                "filename": "CVE-2023-52703-c68f345b7c425b38656e1791a0486769a8797016.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52703/CVE-2023-52703-c68f345b7c425b38656e1791a0486769a8797016.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/02df3170c04a8356cd571ab9155a42f030190abc",
            "https://git.kernel.org/stable/c/1b5de7d44890b78519acbcc80d8d1f23ff2872e5",
            "https://git.kernel.org/stable/c/338f826d3afead6e4df521f7972a4bef04a72efb",
            "https://git.kernel.org/stable/c/525bdcb0838d19d918c7786151ee14661967a030",
            "https://git.kernel.org/stable/c/723ef7b66f37c0841f5a451ccbce47ee1641e081",
            "https://git.kernel.org/stable/c/a753352622b4f3c0219e0e9c73114b2848ae6042",
            "https://git.kernel.org/stable/c/c68f345b7c425b38656e1791a0486769a8797016",
            "https://lore.kernel.org/lkml/Y9pY61y1nwTuzMOa@nanopsycho/",
            "https://www.cve.org/CVERecord?id=CVE-2023-52703\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52703\nhttps://lore.kernel.org/linux-cve-announce/2024052157-CVE-2023-52703-abcb@gregkh/T"
        ]
    },
    "CVE-2023-52707": {
        "cve": "CVE-2023-52707",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/psi: Fix use-after-free in ep_remove_wait_queue()\n\nIf a non-root cgroup gets removed when there is a thread that registered\ntrigger and is polling on a pressure file within the cgroup, the polling\nwaitqueue gets freed in the following path:\n\n do_rmdir\n   cgroup_rmdir\n     kernfs_drain_open_files\n       cgroup_file_release\n         cgroup_pressure_release\n           psi_trigger_destroy\n\nHowever, the polling thread still has a reference to the pressure file and\nwill access the freed waitqueue when the file is closed or upon exit:\n\n fput\n   ep_eventpoll_release\n     ep_free\n       ep_remove_wait_queue\n         remove_wait_queue\n\nThis results in use-after-free as pasted below.\n\nThe fundamental problem here is that cgroup_file_release() (and\nconsequently waitqueue's lifetime) is not tied to the file's real lifetime.\nUsing wake_up_pollfree() here might be less than ideal, but it is in line\nwith the comment at commit 42288cb44c4b (\"wait: add wake_up_pollfree()\")\nsince the waitqueue's lifetime is not tied to file's one and can be\nconsidered as another special case. While this would be fixable by somehow\nmaking cgroup_file_release() be tied to the fput(), it would require\nsizable refactoring at cgroups or higher layer which might be more\njustifiable if we identify more cases like this.\n\n  BUG: KASAN: use-after-free in _raw_spin_lock_irqsave+0x60/0xc0\n  Write of size 4 at addr ffff88810e625328 by task a.out/4404\n\n\tCPU: 19 PID: 4404 Comm: a.out Not tainted 6.2.0-rc6 #38\n\tHardware name: Amazon EC2 c5a.8xlarge/, BIOS 1.0 10/16/2017\n\tCall Trace:\n\t<TASK>\n\tdump_stack_lvl+0x73/0xa0\n\tprint_report+0x16c/0x4e0\n\tkasan_report+0xc3/0xf0\n\tkasan_check_range+0x2d2/0x310\n\t_raw_spin_lock_irqsave+0x60/0xc0\n\tremove_wait_queue+0x1a/0xa0\n\tep_free+0x12c/0x170\n\tep_eventpoll_release+0x26/0x30\n\t__fput+0x202/0x400\n\ttask_work_run+0x11d/0x170\n\tdo_exit+0x495/0x1130\n\tdo_group_exit+0x100/0x100\n\tget_signal+0xd67/0xde0\n\tarch_do_signal_or_restart+0x2a/0x2b0\n\texit_to_user_mode_prepare+0x94/0x100\n\tsyscall_exit_to_user_mode+0x20/0x40\n\tdo_syscall_64+0x52/0x90\n\tentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\t</TASK>\n\n Allocated by task 4404:\n\n\tkasan_set_track+0x3d/0x60\n\t__kasan_kmalloc+0x85/0x90\n\tpsi_trigger_create+0x113/0x3e0\n\tpressure_write+0x146/0x2e0\n\tcgroup_file_write+0x11c/0x250\n\tkernfs_fop_write_iter+0x186/0x220\n\tvfs_write+0x3d8/0x5c0\n\tksys_write+0x90/0x110\n\tdo_syscall_64+0x43/0x90\n\tentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\n Freed by task 4407:\n\n\tkasan_set_track+0x3d/0x60\n\tkasan_save_free_info+0x27/0x40\n\t____kasan_slab_free+0x11d/0x170\n\tslab_free_freelist_hook+0x87/0x150\n\t__kmem_cache_free+0xcb/0x180\n\tpsi_trigger_destroy+0x2e8/0x310\n\tcgroup_file_release+0x4f/0xb0\n\tkernfs_drain_open_files+0x165/0x1f0\n\tkernfs_drain+0x162/0x1a0\n\t__kernfs_remove+0x1fb/0x310\n\tkernfs_remove_by_name_ns+0x95/0xe0\n\tcgroup_addrm_files+0x67f/0x700\n\tcgroup_destroy_locked+0x283/0x3c0\n\tcgroup_rmdir+0x29/0x100\n\tkernfs_iop_rmdir+0xd1/0x140\n\tvfs_rmdir+0xfe/0x240\n\tdo_rmdir+0x13d/0x280\n\t__x64_sys_rmdir+0x2c/0x30\n\tdo_syscall_64+0x43/0x90\n\tentry_SYSCALL_64_after_hwframe+0x63/0xcd",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52707",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/cca2b3feb70170ef6f0fbc4b4d91eea235a2b73a",
            "patch_url": "https://git.kernel.org/stable/p/cca2b3feb70170ef6f0fbc4b4d91eea235a2b73a",
            "filename": "CVE-2023-52707-cca2b3feb70170ef6f0fbc4b4d91eea235a2b73a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52707/CVE-2023-52707-cca2b3feb70170ef6f0fbc4b4d91eea235a2b73a.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/7caeb5457bd01ccba0df1d6f4872f20d28e50b38",
                "patch_url": "https://git.kernel.org/stable/p/7caeb5457bd01ccba0df1d6f4872f20d28e50b38",
                "filename": "CVE-2023-52707-7caeb5457bd01ccba0df1d6f4872f20d28e50b38.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52707/CVE-2023-52707-7caeb5457bd01ccba0df1d6f4872f20d28e50b38.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c2dbe32d5db5c4ead121cf86dabd5ab691fb47fe",
                "patch_url": "https://git.kernel.org/stable/p/c2dbe32d5db5c4ead121cf86dabd5ab691fb47fe",
                "filename": "CVE-2023-52707-c2dbe32d5db5c4ead121cf86dabd5ab691fb47fe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52707/CVE-2023-52707-c2dbe32d5db5c4ead121cf86dabd5ab691fb47fe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c6879a4dcefe92d870ab68cabaa9caeda4f2af5a",
                "patch_url": "https://git.kernel.org/stable/p/c6879a4dcefe92d870ab68cabaa9caeda4f2af5a",
                "filename": "CVE-2023-52707-c6879a4dcefe92d870ab68cabaa9caeda4f2af5a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52707/CVE-2023-52707-c6879a4dcefe92d870ab68cabaa9caeda4f2af5a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cca2b3feb70170ef6f0fbc4b4d91eea235a2b73a",
                "patch_url": "https://git.kernel.org/stable/p/cca2b3feb70170ef6f0fbc4b4d91eea235a2b73a",
                "filename": "CVE-2023-52707-cca2b3feb70170ef6f0fbc4b4d91eea235a2b73a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52707/CVE-2023-52707-cca2b3feb70170ef6f0fbc4b4d91eea235a2b73a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ec9c7aa08819f976b2492fa63c41b5712d2924b5",
                "patch_url": "https://git.kernel.org/stable/p/ec9c7aa08819f976b2492fa63c41b5712d2924b5",
                "filename": "CVE-2023-52707-ec9c7aa08819f976b2492fa63c41b5712d2924b5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52707/CVE-2023-52707-ec9c7aa08819f976b2492fa63c41b5712d2924b5.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/7caeb5457bd01ccba0df1d6f4872f20d28e50b38",
            "https://git.kernel.org/stable/c/c2dbe32d5db5c4ead121cf86dabd5ab691fb47fe",
            "https://git.kernel.org/stable/c/c6879a4dcefe92d870ab68cabaa9caeda4f2af5a",
            "https://git.kernel.org/stable/c/cca2b3feb70170ef6f0fbc4b4d91eea235a2b73a",
            "https://git.kernel.org/stable/c/ec9c7aa08819f976b2492fa63c41b5712d2924b5",
            "https://www.cve.org/CVERecord?id=CVE-2023-52707\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52707\nhttps://lore.kernel.org/linux-cve-announce/2024052158-CVE-2023-52707-e048@gregkh/T"
        ]
    },
    "CVE-2023-52730": {
        "cve": "CVE-2023-52730",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdio: fix possible resource leaks in some error paths\n\nIf sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can\nnot release the resources, because the sdio function is not presented\nin these two cases, it won't call of_node_put() or put_device().\n\nTo fix these leaks, make sdio_func_present() only control whether\ndevice_del() needs to be called or not, then always call of_node_put()\nand put_device().\n\nIn error case in sdio_init_func(), the reference of 'card->dev' is\nnot get, to avoid redundant put in sdio_free_func_cis(), move the\nget_device() to sdio_alloc_func() and put_device() to sdio_release_func(),\nit can keep the get/put function be balanced.\n\nWithout this patch, while doing fault inject test, it can get the\nfollowing leak reports, after this fix, the leak is gone.\n\nunreferenced object 0xffff888112514000 (size 2048):\n  comm \"kworker/3:2\", pid 65, jiffies 4294741614 (age 124.774s)\n  hex dump (first 32 bytes):\n    00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff  ..o.....`X......\n    10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff  .@Q......@Q.....\n  backtrace:\n    [<000000009e5931da>] kmalloc_trace+0x21/0x110\n    [<000000002f839ccb>] mmc_alloc_card+0x38/0xb0 [mmc_core]\n    [<0000000004adcbf6>] mmc_sdio_init_card+0xde/0x170 [mmc_core]\n    [<000000007538fea0>] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]\n    [<00000000d4fdeba7>] mmc_rescan+0x54a/0x640 [mmc_core]\n\nunreferenced object 0xffff888112511000 (size 2048):\n  comm \"kworker/3:2\", pid 65, jiffies 4294741623 (age 124.766s)\n  hex dump (first 32 bytes):\n    00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff  .@Q......X......\n    10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff  ..Q.......Q.....\n  backtrace:\n    [<000000009e5931da>] kmalloc_trace+0x21/0x110\n    [<00000000fcbe706c>] sdio_alloc_func+0x35/0x100 [mmc_core]\n    [<00000000c68f4b50>] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]\n    [<00000000d4fdeba7>] mmc_rescan+0x54a/0x640 [mmc_core]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52730",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e",
            "patch_url": "https://git.kernel.org/stable/p/761db46b29b496946046d8cb33c7ea6de6bef36e",
            "filename": "CVE-2023-52730-761db46b29b496946046d8cb33c7ea6de6bef36e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52730/CVE-2023-52730-761db46b29b496946046d8cb33c7ea6de6bef36e.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1e06cf04239e202248c8fa356bf11449dc73cfbd",
                "patch_url": "https://git.kernel.org/stable/p/1e06cf04239e202248c8fa356bf11449dc73cfbd",
                "filename": "CVE-2023-52730-1e06cf04239e202248c8fa356bf11449dc73cfbd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52730/CVE-2023-52730-1e06cf04239e202248c8fa356bf11449dc73cfbd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/30716d9f0fa1766e522cf24c8a456244e4fc9931",
                "patch_url": "https://git.kernel.org/stable/p/30716d9f0fa1766e522cf24c8a456244e4fc9931",
                "filename": "CVE-2023-52730-30716d9f0fa1766e522cf24c8a456244e4fc9931.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52730/CVE-2023-52730-30716d9f0fa1766e522cf24c8a456244e4fc9931.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5c7858adada31dbed042448cff6997dd6efc472a",
                "patch_url": "https://git.kernel.org/stable/p/5c7858adada31dbed042448cff6997dd6efc472a",
                "filename": "CVE-2023-52730-5c7858adada31dbed042448cff6997dd6efc472a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52730/CVE-2023-52730-5c7858adada31dbed042448cff6997dd6efc472a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/605d9fb9556f8f5fb4566f4df1480f280f308ded",
                "patch_url": "https://git.kernel.org/stable/p/605d9fb9556f8f5fb4566f4df1480f280f308ded",
                "filename": "CVE-2023-52730-605d9fb9556f8f5fb4566f4df1480f280f308ded.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52730/CVE-2023-52730-605d9fb9556f8f5fb4566f4df1480f280f308ded.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e",
                "patch_url": "https://git.kernel.org/stable/p/761db46b29b496946046d8cb33c7ea6de6bef36e",
                "filename": "CVE-2023-52730-761db46b29b496946046d8cb33c7ea6de6bef36e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52730/CVE-2023-52730-761db46b29b496946046d8cb33c7ea6de6bef36e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/92ff03c2563c9b57a027c744750f3b7d2f261c58",
                "patch_url": "https://git.kernel.org/stable/p/92ff03c2563c9b57a027c744750f3b7d2f261c58",
                "filename": "CVE-2023-52730-92ff03c2563c9b57a027c744750f3b7d2f261c58.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52730/CVE-2023-52730-92ff03c2563c9b57a027c744750f3b7d2f261c58.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f855d31bb38d663c3ba672345d7cce9324ba3b72",
                "patch_url": "https://git.kernel.org/stable/p/f855d31bb38d663c3ba672345d7cce9324ba3b72",
                "filename": "CVE-2023-52730-f855d31bb38d663c3ba672345d7cce9324ba3b72.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52730/CVE-2023-52730-f855d31bb38d663c3ba672345d7cce9324ba3b72.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1e06cf04239e202248c8fa356bf11449dc73cfbd",
            "https://git.kernel.org/stable/c/30716d9f0fa1766e522cf24c8a456244e4fc9931",
            "https://git.kernel.org/stable/c/5c7858adada31dbed042448cff6997dd6efc472a",
            "https://git.kernel.org/stable/c/605d9fb9556f8f5fb4566f4df1480f280f308ded",
            "https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e",
            "https://git.kernel.org/stable/c/92ff03c2563c9b57a027c744750f3b7d2f261c58",
            "https://git.kernel.org/stable/c/f855d31bb38d663c3ba672345d7cce9324ba3b72",
            "https://www.cve.org/CVERecord?id=CVE-2023-52730\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52730\nhttps://lore.kernel.org/linux-cve-announce/2024052158-CVE-2023-52730-1c8f@gregkh/T"
        ]
    },
    "CVE-2023-52756": {
        "cve": "CVE-2023-52756",
        "cvss_v2": null,
        "cvss_v3": "4.4",
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52756",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/a7ee519e8095d9c834086d0ff40da11415e1e4d7",
            "patch_url": "https://git.kernel.org/stable/p/a7ee519e8095d9c834086d0ff40da11415e1e4d7",
            "filename": "CVE-2023-52756-a7ee519e8095d9c834086d0ff40da11415e1e4d7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52756/CVE-2023-52756-a7ee519e8095d9c834086d0ff40da11415e1e4d7.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1fb3a9c59e7f7d2b1d737a0d6e02e31d5b516455",
                "patch_url": "https://git.kernel.org/stable/p/1fb3a9c59e7f7d2b1d737a0d6e02e31d5b516455",
                "filename": "CVE-2023-52756-1fb3a9c59e7f7d2b1d737a0d6e02e31d5b516455.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52756/CVE-2023-52756-1fb3a9c59e7f7d2b1d737a0d6e02e31d5b516455.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/45d0a298e05adee521f6fe605d6a88341ba07edd",
                "patch_url": "https://git.kernel.org/stable/p/45d0a298e05adee521f6fe605d6a88341ba07edd",
                "filename": "CVE-2023-52756-45d0a298e05adee521f6fe605d6a88341ba07edd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52756/CVE-2023-52756-45d0a298e05adee521f6fe605d6a88341ba07edd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a7ee519e8095d9c834086d0ff40da11415e1e4d7",
                "patch_url": "https://git.kernel.org/stable/p/a7ee519e8095d9c834086d0ff40da11415e1e4d7",
                "filename": "CVE-2023-52756-a7ee519e8095d9c834086d0ff40da11415e1e4d7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52756/CVE-2023-52756-a7ee519e8095d9c834086d0ff40da11415e1e4d7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a98ff250b5af87f92f17bb9725cb21de1931ee57",
                "patch_url": "https://git.kernel.org/stable/p/a98ff250b5af87f92f17bb9725cb21de1931ee57",
                "filename": "CVE-2023-52756-a98ff250b5af87f92f17bb9725cb21de1931ee57.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52756/CVE-2023-52756-a98ff250b5af87f92f17bb9725cb21de1931ee57.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bce1f7c7e9812da57de1dda293cba87c693e9958",
                "patch_url": "https://git.kernel.org/stable/p/bce1f7c7e9812da57de1dda293cba87c693e9958",
                "filename": "CVE-2023-52756-bce1f7c7e9812da57de1dda293cba87c693e9958.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52756/CVE-2023-52756-bce1f7c7e9812da57de1dda293cba87c693e9958.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c19a8794bf4fe45cff997f07a75ea84cc9e5d89c",
                "patch_url": "https://git.kernel.org/stable/p/c19a8794bf4fe45cff997f07a75ea84cc9e5d89c",
                "filename": "CVE-2023-52756-c19a8794bf4fe45cff997f07a75ea84cc9e5d89c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52756/CVE-2023-52756-c19a8794bf4fe45cff997f07a75ea84cc9e5d89c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d27abbfd4888d79dd24baf50e774631046ac4732",
                "patch_url": "https://git.kernel.org/stable/p/d27abbfd4888d79dd24baf50e774631046ac4732",
                "filename": "CVE-2023-52756-d27abbfd4888d79dd24baf50e774631046ac4732.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52756/CVE-2023-52756-d27abbfd4888d79dd24baf50e774631046ac4732.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e52518b9cb9fc98fc043c8fb2b8cfc619ca8a88b",
                "patch_url": "https://git.kernel.org/stable/p/e52518b9cb9fc98fc043c8fb2b8cfc619ca8a88b",
                "filename": "CVE-2023-52756-e52518b9cb9fc98fc043c8fb2b8cfc619ca8a88b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52756/CVE-2023-52756-e52518b9cb9fc98fc043c8fb2b8cfc619ca8a88b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eca19db60f99925461f49c3fd743733881395728",
                "patch_url": "https://git.kernel.org/stable/p/eca19db60f99925461f49c3fd743733881395728",
                "filename": "CVE-2023-52756-eca19db60f99925461f49c3fd743733881395728.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52756/CVE-2023-52756-eca19db60f99925461f49c3fd743733881395728.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1fb3a9c59e7f7d2b1d737a0d6e02e31d5b516455",
            "https://git.kernel.org/stable/c/45d0a298e05adee521f6fe605d6a88341ba07edd",
            "https://git.kernel.org/stable/c/a7ee519e8095d9c834086d0ff40da11415e1e4d7",
            "https://git.kernel.org/stable/c/a98ff250b5af87f92f17bb9725cb21de1931ee57",
            "https://git.kernel.org/stable/c/bce1f7c7e9812da57de1dda293cba87c693e9958",
            "https://git.kernel.org/stable/c/c19a8794bf4fe45cff997f07a75ea84cc9e5d89c",
            "https://git.kernel.org/stable/c/d27abbfd4888d79dd24baf50e774631046ac4732",
            "https://git.kernel.org/stable/c/e52518b9cb9fc98fc043c8fb2b8cfc619ca8a88b",
            "https://git.kernel.org/stable/c/eca19db60f99925461f49c3fd743733881395728",
            "https://www.cve.org/CVERecord?id=CVE-2023-52756\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52756\nhttps://lore.kernel.org/linux-cve-announce/2024052146-CVE-2023-52756-f694@gregkh/T"
        ]
    },
    "CVE-2023-52762": {
        "cve": "CVE-2023-52762",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-blk: fix implicit overflow on virtio_max_dma_size\n\nThe following codes have an implicit conversion from size_t to u32:\n(u32)max_size = (size_t)virtio_max_dma_size(vdev);\n\nThis may lead overflow, Ex (size_t)4G -> (u32)0. Once\nvirtio_max_dma_size() has a larger size than U32_MAX, use U32_MAX\ninstead.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52762",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/017278f141141367f7d14b203e930b45b6ffffb9",
            "patch_url": "https://git.kernel.org/stable/p/017278f141141367f7d14b203e930b45b6ffffb9",
            "filename": "CVE-2023-52762-017278f141141367f7d14b203e930b45b6ffffb9.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52762/CVE-2023-52762-017278f141141367f7d14b203e930b45b6ffffb9.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/017278f141141367f7d14b203e930b45b6ffffb9",
                "patch_url": "https://git.kernel.org/stable/p/017278f141141367f7d14b203e930b45b6ffffb9",
                "filename": "CVE-2023-52762-017278f141141367f7d14b203e930b45b6ffffb9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52762/CVE-2023-52762-017278f141141367f7d14b203e930b45b6ffffb9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/472bd4787406bef2e8b41ee4c74d960a06a49a48",
                "patch_url": "https://git.kernel.org/stable/p/472bd4787406bef2e8b41ee4c74d960a06a49a48",
                "filename": "CVE-2023-52762-472bd4787406bef2e8b41ee4c74d960a06a49a48.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52762/CVE-2023-52762-472bd4787406bef2e8b41ee4c74d960a06a49a48.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/72775cad7f572bb2501f9ea609e1d20e68f0b38b",
                "patch_url": "https://git.kernel.org/stable/p/72775cad7f572bb2501f9ea609e1d20e68f0b38b",
                "filename": "CVE-2023-52762-72775cad7f572bb2501f9ea609e1d20e68f0b38b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52762/CVE-2023-52762-72775cad7f572bb2501f9ea609e1d20e68f0b38b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d667fe301dcbcb12d1d6494fc4b8abee2cb75d90",
                "patch_url": "https://git.kernel.org/stable/p/d667fe301dcbcb12d1d6494fc4b8abee2cb75d90",
                "filename": "CVE-2023-52762-d667fe301dcbcb12d1d6494fc4b8abee2cb75d90.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52762/CVE-2023-52762-d667fe301dcbcb12d1d6494fc4b8abee2cb75d90.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fafb51a67fb883eb2dde352539df939a251851be",
                "patch_url": "https://git.kernel.org/stable/p/fafb51a67fb883eb2dde352539df939a251851be",
                "filename": "CVE-2023-52762-fafb51a67fb883eb2dde352539df939a251851be.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52762/CVE-2023-52762-fafb51a67fb883eb2dde352539df939a251851be.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/017278f141141367f7d14b203e930b45b6ffffb9",
            "https://git.kernel.org/stable/c/472bd4787406bef2e8b41ee4c74d960a06a49a48",
            "https://git.kernel.org/stable/c/72775cad7f572bb2501f9ea609e1d20e68f0b38b",
            "https://git.kernel.org/stable/c/d667fe301dcbcb12d1d6494fc4b8abee2cb75d90",
            "https://git.kernel.org/stable/c/fafb51a67fb883eb2dde352539df939a251851be",
            "https://www.cve.org/CVERecord?id=CVE-2023-52762\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52762\nhttps://lore.kernel.org/linux-cve-announce/2024052147-CVE-2023-52762-fe90@gregkh/T"
        ]
    },
    "CVE-2023-52764": {
        "cve": "CVE-2023-52764",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: gspca: cpia1: shift-out-of-bounds in set_flicker\n\nSyzkaller reported the following issue:\nUBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27\nshift exponent 245 is too large for 32-bit type 'int'\n\nWhen the value of the variable \"sd->params.exposure.gain\" exceeds the\nnumber of bits in an integer, a shift-out-of-bounds error is reported. It\nis triggered because the variable \"currentexp\" cannot be left-shifted by\nmore than the number of bits in an integer. In order to avoid invalid\nrange during left-shift, the conditional expression is added.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52764",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/099be1822d1f095433f4b08af9cc9d6308ec1953",
            "patch_url": "https://git.kernel.org/stable/p/099be1822d1f095433f4b08af9cc9d6308ec1953",
            "filename": "CVE-2023-52764-099be1822d1f095433f4b08af9cc9d6308ec1953.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52764/CVE-2023-52764-099be1822d1f095433f4b08af9cc9d6308ec1953.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/099be1822d1f095433f4b08af9cc9d6308ec1953",
                "patch_url": "https://git.kernel.org/stable/p/099be1822d1f095433f4b08af9cc9d6308ec1953",
                "filename": "CVE-2023-52764-099be1822d1f095433f4b08af9cc9d6308ec1953.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52764/CVE-2023-52764-099be1822d1f095433f4b08af9cc9d6308ec1953.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/09cd8b561aa9796903710a1046957f2b112c8f26",
                "patch_url": "https://git.kernel.org/stable/p/09cd8b561aa9796903710a1046957f2b112c8f26",
                "filename": "CVE-2023-52764-09cd8b561aa9796903710a1046957f2b112c8f26.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52764/CVE-2023-52764-09cd8b561aa9796903710a1046957f2b112c8f26.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2eee8edfff90e22980a6b22079d238c3c9d323bb",
                "patch_url": "https://git.kernel.org/stable/p/2eee8edfff90e22980a6b22079d238c3c9d323bb",
                "filename": "CVE-2023-52764-2eee8edfff90e22980a6b22079d238c3c9d323bb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52764/CVE-2023-52764-2eee8edfff90e22980a6b22079d238c3c9d323bb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/69bba62600bd91d6b7c1e8ca181faf8ac64f7060",
                "patch_url": "https://git.kernel.org/stable/p/69bba62600bd91d6b7c1e8ca181faf8ac64f7060",
                "filename": "CVE-2023-52764-69bba62600bd91d6b7c1e8ca181faf8ac64f7060.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52764/CVE-2023-52764-69bba62600bd91d6b7c1e8ca181faf8ac64f7060.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8f83c85ee88225319c52680792320c02158c2a9b",
                "patch_url": "https://git.kernel.org/stable/p/8f83c85ee88225319c52680792320c02158c2a9b",
                "filename": "CVE-2023-52764-8f83c85ee88225319c52680792320c02158c2a9b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52764/CVE-2023-52764-8f83c85ee88225319c52680792320c02158c2a9b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/93bddd6529f187f510eec759f37d0569243c9809",
                "patch_url": "https://git.kernel.org/stable/p/93bddd6529f187f510eec759f37d0569243c9809",
                "filename": "CVE-2023-52764-93bddd6529f187f510eec759f37d0569243c9809.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52764/CVE-2023-52764-93bddd6529f187f510eec759f37d0569243c9809.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a647f27a7426d2fe1b40da7c8fa2b81354a51177",
                "patch_url": "https://git.kernel.org/stable/p/a647f27a7426d2fe1b40da7c8fa2b81354a51177",
                "filename": "CVE-2023-52764-a647f27a7426d2fe1b40da7c8fa2b81354a51177.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52764/CVE-2023-52764-a647f27a7426d2fe1b40da7c8fa2b81354a51177.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c6b6b8692218da73b33b310d7c1df90f115bdd9a",
                "patch_url": "https://git.kernel.org/stable/p/c6b6b8692218da73b33b310d7c1df90f115bdd9a",
                "filename": "CVE-2023-52764-c6b6b8692218da73b33b310d7c1df90f115bdd9a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52764/CVE-2023-52764-c6b6b8692218da73b33b310d7c1df90f115bdd9a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e2d7149b913d14352c82624e723ce1c211ca06d3",
                "patch_url": "https://git.kernel.org/stable/p/e2d7149b913d14352c82624e723ce1c211ca06d3",
                "filename": "CVE-2023-52764-e2d7149b913d14352c82624e723ce1c211ca06d3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52764/CVE-2023-52764-e2d7149b913d14352c82624e723ce1c211ca06d3.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/099be1822d1f095433f4b08af9cc9d6308ec1953",
            "https://git.kernel.org/stable/c/09cd8b561aa9796903710a1046957f2b112c8f26",
            "https://git.kernel.org/stable/c/2eee8edfff90e22980a6b22079d238c3c9d323bb",
            "https://git.kernel.org/stable/c/69bba62600bd91d6b7c1e8ca181faf8ac64f7060",
            "https://git.kernel.org/stable/c/8f83c85ee88225319c52680792320c02158c2a9b",
            "https://git.kernel.org/stable/c/93bddd6529f187f510eec759f37d0569243c9809",
            "https://git.kernel.org/stable/c/a647f27a7426d2fe1b40da7c8fa2b81354a51177",
            "https://git.kernel.org/stable/c/c6b6b8692218da73b33b310d7c1df90f115bdd9a",
            "https://git.kernel.org/stable/c/e2d7149b913d14352c82624e723ce1c211ca06d3",
            "https://www.cve.org/CVERecord?id=CVE-2023-52764\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52764\nhttps://lore.kernel.org/linux-cve-announce/2024052148-CVE-2023-52764-fa3b@gregkh/T"
        ]
    },
    "CVE-2023-52775": {
        "cve": "CVE-2023-52775",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: avoid data corruption caused by decline\n\nWe found a data corruption issue during testing of SMC-R on Redis\napplications.\n\nThe benchmark has a low probability of reporting a strange error as\nshown below.\n\n\"Error: Protocol error, got \"\\xe2\" as reply type byte\"\n\nFinally, we found that the retrieved error data was as follows:\n\n0xE2 0xD4 0xC3 0xD9 0x04 0x00 0x2C 0x20 0xA6 0x56 0x00 0x16 0x3E 0x0C\n0xCB 0x04 0x02 0x01 0x00 0x00 0x20 0x00 0x00 0x00 0x00 0x00 0x00 0x00\n0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0xE2\n\nIt is quite obvious that this is a SMC DECLINE message, which means that\nthe applications received SMC protocol message.\nWe found that this was caused by the following situations:\n\nclient                  server\n        \u00a6  clc proposal\n        ------------->\n        \u00a6  clc accept\n        <-------------\n        \u00a6  clc confirm\n        ------------->\nwait llc confirm\n\t\t\tsend llc confirm\n        \u00a6failed llc confirm\n        \u00a6   x------\n(after 2s)timeout\n                        wait llc confirm rsp\n\nwait decline\n\n(after 1s) timeout\n                        (after 2s) timeout\n        \u00a6   decline\n        -------------->\n        \u00a6   decline\n        <--------------\n\nAs a result, a decline message was sent in the implementation, and this\nmessage was read from TCP by the already-fallback connection.\n\nThis patch double the client timeout as 2x of the server value,\nWith this simple change, the Decline messages should never cross or\ncollide (during Confirm link timeout).\n\nThis issue requires an immediate solution, since the protocol updates\ninvolve a more long-term solution.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52775",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/94a0ae698b4d5d5bb598e23228002a1491c50add",
            "patch_url": "https://git.kernel.org/stable/p/94a0ae698b4d5d5bb598e23228002a1491c50add",
            "filename": "CVE-2023-52775-94a0ae698b4d5d5bb598e23228002a1491c50add.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52775/CVE-2023-52775-94a0ae698b4d5d5bb598e23228002a1491c50add.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/5ada292b5c504720a0acef8cae9acc62a694d19c",
                "patch_url": "https://git.kernel.org/stable/p/5ada292b5c504720a0acef8cae9acc62a694d19c",
                "filename": "CVE-2023-52775-5ada292b5c504720a0acef8cae9acc62a694d19c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52775/CVE-2023-52775-5ada292b5c504720a0acef8cae9acc62a694d19c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7234d2b5dffa5af77fd4e0deaebab509e130c6b1",
                "patch_url": "https://git.kernel.org/stable/p/7234d2b5dffa5af77fd4e0deaebab509e130c6b1",
                "filename": "CVE-2023-52775-7234d2b5dffa5af77fd4e0deaebab509e130c6b1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52775/CVE-2023-52775-7234d2b5dffa5af77fd4e0deaebab509e130c6b1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/90072af9efe8c7bd7d086709014ddd44cebd5e7c",
                "patch_url": "https://git.kernel.org/stable/p/90072af9efe8c7bd7d086709014ddd44cebd5e7c",
                "filename": "CVE-2023-52775-90072af9efe8c7bd7d086709014ddd44cebd5e7c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52775/CVE-2023-52775-90072af9efe8c7bd7d086709014ddd44cebd5e7c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/94a0ae698b4d5d5bb598e23228002a1491c50add",
                "patch_url": "https://git.kernel.org/stable/p/94a0ae698b4d5d5bb598e23228002a1491c50add",
                "filename": "CVE-2023-52775-94a0ae698b4d5d5bb598e23228002a1491c50add.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52775/CVE-2023-52775-94a0ae698b4d5d5bb598e23228002a1491c50add.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e6d71b437abc2f249e3b6a1ae1a7228e09c6e563",
                "patch_url": "https://git.kernel.org/stable/p/e6d71b437abc2f249e3b6a1ae1a7228e09c6e563",
                "filename": "CVE-2023-52775-e6d71b437abc2f249e3b6a1ae1a7228e09c6e563.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52775/CVE-2023-52775-e6d71b437abc2f249e3b6a1ae1a7228e09c6e563.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/5ada292b5c504720a0acef8cae9acc62a694d19c",
            "https://git.kernel.org/stable/c/7234d2b5dffa5af77fd4e0deaebab509e130c6b1",
            "https://git.kernel.org/stable/c/90072af9efe8c7bd7d086709014ddd44cebd5e7c",
            "https://git.kernel.org/stable/c/94a0ae698b4d5d5bb598e23228002a1491c50add",
            "https://git.kernel.org/stable/c/e6d71b437abc2f249e3b6a1ae1a7228e09c6e563",
            "https://www.cve.org/CVERecord?id=CVE-2023-52775\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52775\nhttps://lore.kernel.org/linux-cve-announce/2024052151-CVE-2023-52775-38a8@gregkh/T"
        ]
    },
    "CVE-2023-52777": {
        "cve": "CVE-2023-52777",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix gtk offload status event locking\n\nThe ath11k active pdevs are protected by RCU but the gtk offload status\nevent handling code calling ath11k_mac_get_arvif_by_vdev_id() was not\nmarked as a read-side critical section.\n\nMark the code in question as an RCU read-side critical section to avoid\nany potential use-after-free issues.\n\nCompile tested only.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52777",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0cf7577b6b3153b4b49deea9719fe43f96469c6d",
            "patch_url": "https://git.kernel.org/stable/p/0cf7577b6b3153b4b49deea9719fe43f96469c6d",
            "filename": "CVE-2023-52777-0cf7577b6b3153b4b49deea9719fe43f96469c6d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52777/CVE-2023-52777-0cf7577b6b3153b4b49deea9719fe43f96469c6d.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0cf7577b6b3153b4b49deea9719fe43f96469c6d",
                "patch_url": "https://git.kernel.org/stable/p/0cf7577b6b3153b4b49deea9719fe43f96469c6d",
                "filename": "CVE-2023-52777-0cf7577b6b3153b4b49deea9719fe43f96469c6d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52777/CVE-2023-52777-0cf7577b6b3153b4b49deea9719fe43f96469c6d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1dea3c0720a146bd7193969f2847ccfed5be2221",
                "patch_url": "https://git.kernel.org/stable/p/1dea3c0720a146bd7193969f2847ccfed5be2221",
                "filename": "CVE-2023-52777-1dea3c0720a146bd7193969f2847ccfed5be2221.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52777/CVE-2023-52777-1dea3c0720a146bd7193969f2847ccfed5be2221.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca",
                "patch_url": "https://git.kernel.org/stable/p/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca",
                "filename": "CVE-2023-52777-cf9c7d783a2bf9305df4ef5b93d9063a52e18fca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52777/CVE-2023-52777-cf9c7d783a2bf9305df4ef5b93d9063a52e18fca.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a",
                "patch_url": "https://git.kernel.org/stable/p/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a",
                "filename": "CVE-2023-52777-e83246ecd3b193f8d91fce778e8a5ba747fc7d8a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52777/CVE-2023-52777-e83246ecd3b193f8d91fce778e8a5ba747fc7d8a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0cf7577b6b3153b4b49deea9719fe43f96469c6d",
            "https://git.kernel.org/stable/c/1dea3c0720a146bd7193969f2847ccfed5be2221",
            "https://git.kernel.org/stable/c/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca",
            "https://git.kernel.org/stable/c/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a",
            "https://www.cve.org/CVERecord?id=CVE-2023-52777\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52777\nhttps://lore.kernel.org/linux-cve-announce/2024052152-CVE-2023-52777-2f32@gregkh/T"
        ]
    },
    "CVE-2023-52781": {
        "cve": "CVE-2023-52781",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: config: fix iteration issue in 'usb_get_bos_descriptor()'\n\nThe BOS descriptor defines a root descriptor and is the base descriptor for\naccessing a family of related descriptors.\n\nFunction 'usb_get_bos_descriptor()' encounters an iteration issue when\nskipping the 'USB_DT_DEVICE_CAPABILITY' descriptor type. This results in\nthe same descriptor being read repeatedly.\n\nTo address this issue, a 'goto' statement is introduced to ensure that the\npointer and the amount read is updated correctly. This ensures that the\nfunction iterates to the next descriptor instead of reading the same\ndescriptor repeatedly.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52781",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/64c27b7b2357ddb38b6afebaf46d5bff4d250702",
            "patch_url": "https://git.kernel.org/stable/p/64c27b7b2357ddb38b6afebaf46d5bff4d250702",
            "filename": "CVE-2023-52781-64c27b7b2357ddb38b6afebaf46d5bff4d250702.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52781/CVE-2023-52781-64c27b7b2357ddb38b6afebaf46d5bff4d250702.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/64c27b7b2357ddb38b6afebaf46d5bff4d250702",
                "patch_url": "https://git.kernel.org/stable/p/64c27b7b2357ddb38b6afebaf46d5bff4d250702",
                "filename": "CVE-2023-52781-64c27b7b2357ddb38b6afebaf46d5bff4d250702.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52781/CVE-2023-52781-64c27b7b2357ddb38b6afebaf46d5bff4d250702.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7c0244cc311a4038505b73682b7c8ceaa5c7a8c8",
                "patch_url": "https://git.kernel.org/stable/p/7c0244cc311a4038505b73682b7c8ceaa5c7a8c8",
                "filename": "CVE-2023-52781-7c0244cc311a4038505b73682b7c8ceaa5c7a8c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52781/CVE-2023-52781-7c0244cc311a4038505b73682b7c8ceaa5c7a8c8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/974bba5c118f4c2baf00de0356e3e4f7928b4cbc",
                "patch_url": "https://git.kernel.org/stable/p/974bba5c118f4c2baf00de0356e3e4f7928b4cbc",
                "filename": "CVE-2023-52781-974bba5c118f4c2baf00de0356e3e4f7928b4cbc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52781/CVE-2023-52781-974bba5c118f4c2baf00de0356e3e4f7928b4cbc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ef94ec8e52eaf7b9abc5b5f8f5b911751112223",
                "patch_url": "https://git.kernel.org/stable/p/9ef94ec8e52eaf7b9abc5b5f8f5b911751112223",
                "filename": "CVE-2023-52781-9ef94ec8e52eaf7b9abc5b5f8f5b911751112223.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52781/CVE-2023-52781-9ef94ec8e52eaf7b9abc5b5f8f5b911751112223.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f89fef7710b2ba0f7a1e46594e530dcf2f77be91",
                "patch_url": "https://git.kernel.org/stable/p/f89fef7710b2ba0f7a1e46594e530dcf2f77be91",
                "filename": "CVE-2023-52781-f89fef7710b2ba0f7a1e46594e530dcf2f77be91.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52781/CVE-2023-52781-f89fef7710b2ba0f7a1e46594e530dcf2f77be91.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/64c27b7b2357ddb38b6afebaf46d5bff4d250702",
            "https://git.kernel.org/stable/c/7c0244cc311a4038505b73682b7c8ceaa5c7a8c8",
            "https://git.kernel.org/stable/c/974bba5c118f4c2baf00de0356e3e4f7928b4cbc",
            "https://git.kernel.org/stable/c/9ef94ec8e52eaf7b9abc5b5f8f5b911751112223",
            "https://git.kernel.org/stable/c/f89fef7710b2ba0f7a1e46594e530dcf2f77be91",
            "https://www.cve.org/CVERecord?id=CVE-2023-52781\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52781\nhttps://lore.kernel.org/linux-cve-announce/2024052153-CVE-2023-52781-8f04@gregkh/T"
        ]
    },
    "CVE-2023-52784": {
        "cve": "CVE-2023-52784",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: stop the device in bond_setup_by_slave()\n\nCommit 9eed321cde22 (\"net: lapbether: only support ethernet devices\")\nhas been able to keep syzbot away from net/lapb, until today.\n\nIn the following splat [1], the issue is that a lapbether device has\nbeen created on a bonding device without members. Then adding a non\nARPHRD_ETHER member forced the bonding master to change its type.\n\nThe fix is to make sure we call dev_close() in bond_setup_by_slave()\nso that the potential linked lapbether devices (or any other devices\nhaving assumptions on the physical device) are removed.\n\nA similar bug has been addressed in commit 40baec225765\n(\"bonding: fix panic on non-ARPHRD_ETHER enslave failure\")\n\n[1]\nskbuff: skb_under_panic: text:ffff800089508810 len:44 put:40 head:ffff0000c78e7c00 data:ffff0000c78e7bea tail:0x16 end:0x140 dev:bond0\nkernel BUG at net/core/skbuff.c:192 !\nInternal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\nModules linked in:\nCPU: 0 PID: 6007 Comm: syz-executor383 Not tainted 6.6.0-rc3-syzkaller-gbf6547d8715b #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023\npstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : skb_panic net/core/skbuff.c:188 [inline]\npc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202\nlr : skb_panic net/core/skbuff.c:188 [inline]\nlr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202\nsp : ffff800096a06aa0\nx29: ffff800096a06ab0 x28: ffff800096a06ba0 x27: dfff800000000000\nx26: ffff0000ce9b9b50 x25: 0000000000000016 x24: ffff0000c78e7bea\nx23: ffff0000c78e7c00 x22: 000000000000002c x21: 0000000000000140\nx20: 0000000000000028 x19: ffff800089508810 x18: ffff800096a06100\nx17: 0000000000000000 x16: ffff80008a629a3c x15: 0000000000000001\nx14: 1fffe00036837a32 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000201 x10: 0000000000000000 x9 : cb50b496c519aa00\nx8 : cb50b496c519aa00 x7 : 0000000000000001 x6 : 0000000000000001\nx5 : ffff800096a063b8 x4 : ffff80008e280f80 x3 : ffff8000805ad11c\nx2 : 0000000000000001 x1 : 0000000100000201 x0 : 0000000000000086\nCall trace:\nskb_panic net/core/skbuff.c:188 [inline]\nskb_under_panic+0x13c/0x140 net/core/skbuff.c:202\nskb_push+0xf0/0x108 net/core/skbuff.c:2446\nip6gre_header+0xbc/0x738 net/ipv6/ip6_gre.c:1384\ndev_hard_header include/linux/netdevice.h:3136 [inline]\nlapbeth_data_transmit+0x1c4/0x298 drivers/net/wan/lapbether.c:257\nlapb_data_transmit+0x8c/0xb0 net/lapb/lapb_iface.c:447\nlapb_transmit_buffer+0x178/0x204 net/lapb/lapb_out.c:149\nlapb_send_control+0x220/0x320 net/lapb/lapb_subr.c:251\n__lapb_disconnect_request+0x9c/0x17c net/lapb/lapb_iface.c:326\nlapb_device_event+0x288/0x4e0 net/lapb/lapb_iface.c:492\nnotifier_call_chain+0x1a4/0x510 kernel/notifier.c:93\nraw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461\ncall_netdevice_notifiers_info net/core/dev.c:1970 [inline]\ncall_netdevice_notifiers_extack net/core/dev.c:2008 [inline]\ncall_netdevice_notifiers net/core/dev.c:2022 [inline]\n__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508\ndev_close_many+0x1e0/0x470 net/core/dev.c:1559\ndev_close+0x174/0x250 net/core/dev.c:1585\nlapbeth_device_event+0x2e4/0x958 drivers/net/wan/lapbether.c:466\nnotifier_call_chain+0x1a4/0x510 kernel/notifier.c:93\nraw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461\ncall_netdevice_notifiers_info net/core/dev.c:1970 [inline]\ncall_netdevice_notifiers_extack net/core/dev.c:2008 [inline]\ncall_netdevice_notifiers net/core/dev.c:2022 [inline]\n__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508\ndev_close_many+0x1e0/0x470 net/core/dev.c:1559\ndev_close+0x174/0x250 net/core/dev.c:1585\nbond_enslave+0x2298/0x30cc drivers/net/bonding/bond_main.c:2332\nbond_do_ioctl+0x268/0xc64 drivers/net/bonding/bond_main.c:4539\ndev_ifsioc+0x754/0x9ac\ndev_ioctl+0x4d8/0xd34 net/core/dev_ioctl.c:786\nsock_do_ioctl+0x1d4/0x2d0 net/socket.c:1217\nsock_ioctl+0x4e8/0x834 net/socket.c:1322\nvfs_ioctl fs/ioctl.c:51 [inline]\n__do_\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52784",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/19554aa901b5833787df4417a05ccdebf351b7f4",
            "patch_url": "https://git.kernel.org/stable/p/19554aa901b5833787df4417a05ccdebf351b7f4",
            "filename": "CVE-2023-52784-19554aa901b5833787df4417a05ccdebf351b7f4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52784/CVE-2023-52784-19554aa901b5833787df4417a05ccdebf351b7f4.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/19554aa901b5833787df4417a05ccdebf351b7f4",
                "patch_url": "https://git.kernel.org/stable/p/19554aa901b5833787df4417a05ccdebf351b7f4",
                "filename": "CVE-2023-52784-19554aa901b5833787df4417a05ccdebf351b7f4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52784/CVE-2023-52784-19554aa901b5833787df4417a05ccdebf351b7f4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/396baca6683f415b5bc2b380289387bef1406edc",
                "patch_url": "https://git.kernel.org/stable/p/396baca6683f415b5bc2b380289387bef1406edc",
                "filename": "CVE-2023-52784-396baca6683f415b5bc2b380289387bef1406edc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52784/CVE-2023-52784-396baca6683f415b5bc2b380289387bef1406edc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3cffa2ddc4d3fcf70cde361236f5a614f81a09b2",
                "patch_url": "https://git.kernel.org/stable/p/3cffa2ddc4d3fcf70cde361236f5a614f81a09b2",
                "filename": "CVE-2023-52784-3cffa2ddc4d3fcf70cde361236f5a614f81a09b2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52784/CVE-2023-52784-3cffa2ddc4d3fcf70cde361236f5a614f81a09b2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/53064e8239dd2ecfefc5634e991f1025abc2ee0c",
                "patch_url": "https://git.kernel.org/stable/p/53064e8239dd2ecfefc5634e991f1025abc2ee0c",
                "filename": "CVE-2023-52784-53064e8239dd2ecfefc5634e991f1025abc2ee0c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52784/CVE-2023-52784-53064e8239dd2ecfefc5634e991f1025abc2ee0c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/87c49806a37f88eddde3f537c162fd0c2834170c",
                "patch_url": "https://git.kernel.org/stable/p/87c49806a37f88eddde3f537c162fd0c2834170c",
                "filename": "CVE-2023-52784-87c49806a37f88eddde3f537c162fd0c2834170c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52784/CVE-2023-52784-87c49806a37f88eddde3f537c162fd0c2834170c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b4f0e605a508f6d7cda6df2f03a0c676b778b1fe",
                "patch_url": "https://git.kernel.org/stable/p/b4f0e605a508f6d7cda6df2f03a0c676b778b1fe",
                "filename": "CVE-2023-52784-b4f0e605a508f6d7cda6df2f03a0c676b778b1fe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52784/CVE-2023-52784-b4f0e605a508f6d7cda6df2f03a0c676b778b1fe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d98c91215a5748a0f536e7ccea26027005196859",
                "patch_url": "https://git.kernel.org/stable/p/d98c91215a5748a0f536e7ccea26027005196859",
                "filename": "CVE-2023-52784-d98c91215a5748a0f536e7ccea26027005196859.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52784/CVE-2023-52784-d98c91215a5748a0f536e7ccea26027005196859.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/19554aa901b5833787df4417a05ccdebf351b7f4",
            "https://git.kernel.org/stable/c/396baca6683f415b5bc2b380289387bef1406edc",
            "https://git.kernel.org/stable/c/3cffa2ddc4d3fcf70cde361236f5a614f81a09b2",
            "https://git.kernel.org/stable/c/53064e8239dd2ecfefc5634e991f1025abc2ee0c",
            "https://git.kernel.org/stable/c/87c49806a37f88eddde3f537c162fd0c2834170c",
            "https://git.kernel.org/stable/c/b4f0e605a508f6d7cda6df2f03a0c676b778b1fe",
            "https://git.kernel.org/stable/c/d98c91215a5748a0f536e7ccea26027005196859",
            "https://www.cve.org/CVERecord?id=CVE-2023-52784\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52784\nhttps://lore.kernel.org/linux-cve-announce/2024052154-CVE-2023-52784-80ad@gregkh/T"
        ]
    },
    "CVE-2023-52791": {
        "cve": "CVE-2023-52791",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: core: Run atomic i2c xfer when !preemptible\n\nSince bae1d3a05a8b, i2c transfers are non-atomic if preemption is\ndisabled. However, non-atomic i2c transfers require preemption (e.g. in\nwait_for_completion() while waiting for the DMA).\n\npanic() calls preempt_disable_notrace() before calling\nemergency_restart(). Therefore, if an i2c device is used for the\nrestart, the xfer should be atomic. This avoids warnings like:\n\n[   12.667612] WARNING: CPU: 1 PID: 1 at kernel/rcu/tree_plugin.h:318 rcu_note_context_switch+0x33c/0x6b0\n[   12.676926] Voluntary context switch within RCU read-side critical section!\n...\n[   12.742376]  schedule_timeout from wait_for_completion_timeout+0x90/0x114\n[   12.749179]  wait_for_completion_timeout from tegra_i2c_wait_completion+0x40/0x70\n...\n[   12.994527]  atomic_notifier_call_chain from machine_restart+0x34/0x58\n[   13.001050]  machine_restart from panic+0x2a8/0x32c\n\nUse !preemptible() instead, which is basically the same check as\npre-v5.2.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52791",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/185f3617adc8fe45e40489b458f03911f0dec46c",
            "patch_url": "https://git.kernel.org/stable/p/185f3617adc8fe45e40489b458f03911f0dec46c",
            "filename": "CVE-2023-52791-185f3617adc8fe45e40489b458f03911f0dec46c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52791/CVE-2023-52791-185f3617adc8fe45e40489b458f03911f0dec46c.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/185f3617adc8fe45e40489b458f03911f0dec46c",
                "patch_url": "https://git.kernel.org/stable/p/185f3617adc8fe45e40489b458f03911f0dec46c",
                "filename": "CVE-2023-52791-185f3617adc8fe45e40489b458f03911f0dec46c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52791/CVE-2023-52791-185f3617adc8fe45e40489b458f03911f0dec46c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/25284c46b657f48c0f3880a2e0706c70d81182c0",
                "patch_url": "https://git.kernel.org/stable/p/25284c46b657f48c0f3880a2e0706c70d81182c0",
                "filename": "CVE-2023-52791-25284c46b657f48c0f3880a2e0706c70d81182c0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52791/CVE-2023-52791-25284c46b657f48c0f3880a2e0706c70d81182c0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/25eb381a736e7ae39a4245ef5c96484eb1073809",
                "patch_url": "https://git.kernel.org/stable/p/25eb381a736e7ae39a4245ef5c96484eb1073809",
                "filename": "CVE-2023-52791-25eb381a736e7ae39a4245ef5c96484eb1073809.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52791/CVE-2023-52791-25eb381a736e7ae39a4245ef5c96484eb1073809.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3473cf43b9068b9dfef2f545f833f33c6a544b91",
                "patch_url": "https://git.kernel.org/stable/p/3473cf43b9068b9dfef2f545f833f33c6a544b91",
                "filename": "CVE-2023-52791-3473cf43b9068b9dfef2f545f833f33c6a544b91.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52791/CVE-2023-52791-3473cf43b9068b9dfef2f545f833f33c6a544b91.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8c3fa52a46ff4d208cefb1a462ec94e0043a91e1",
                "patch_url": "https://git.kernel.org/stable/p/8c3fa52a46ff4d208cefb1a462ec94e0043a91e1",
                "filename": "CVE-2023-52791-8c3fa52a46ff4d208cefb1a462ec94e0043a91e1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52791/CVE-2023-52791-8c3fa52a46ff4d208cefb1a462ec94e0043a91e1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aa49c90894d06e18a1ee7c095edbd2f37c232d02",
                "patch_url": "https://git.kernel.org/stable/p/aa49c90894d06e18a1ee7c095edbd2f37c232d02",
                "filename": "CVE-2023-52791-aa49c90894d06e18a1ee7c095edbd2f37c232d02.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52791/CVE-2023-52791-aa49c90894d06e18a1ee7c095edbd2f37c232d02.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f6237afabc349c1c7909db00e15d2816519e0d2b",
                "patch_url": "https://git.kernel.org/stable/p/f6237afabc349c1c7909db00e15d2816519e0d2b",
                "filename": "CVE-2023-52791-f6237afabc349c1c7909db00e15d2816519e0d2b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52791/CVE-2023-52791-f6237afabc349c1c7909db00e15d2816519e0d2b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/185f3617adc8fe45e40489b458f03911f0dec46c",
            "https://git.kernel.org/stable/c/25284c46b657f48c0f3880a2e0706c70d81182c0",
            "https://git.kernel.org/stable/c/25eb381a736e7ae39a4245ef5c96484eb1073809",
            "https://git.kernel.org/stable/c/3473cf43b9068b9dfef2f545f833f33c6a544b91",
            "https://git.kernel.org/stable/c/8c3fa52a46ff4d208cefb1a462ec94e0043a91e1",
            "https://git.kernel.org/stable/c/aa49c90894d06e18a1ee7c095edbd2f37c232d02",
            "https://git.kernel.org/stable/c/f6237afabc349c1c7909db00e15d2816519e0d2b",
            "https://www.cve.org/CVERecord?id=CVE-2023-52791\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52791\nhttps://lore.kernel.org/linux-cve-announce/2024052156-CVE-2023-52791-f2b9@gregkh/T"
        ]
    },
    "CVE-2023-52796": {
        "cve": "CVE-2023-52796",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: add ipvlan_route_v6_outbound() helper\n\nInspired by syzbot reports using a stack of multiple ipvlan devices.\n\nReduce stack size needed in ipvlan_process_v6_outbound() by moving\nthe flowi6 struct used for the route lookup in an non inlined\nhelper. ipvlan_route_v6_outbound() needs 120 bytes on the stack,\nimmediately reclaimed.\n\nAlso make sure ipvlan_process_v4_outbound() is not inlined.\n\nWe might also have to lower MAX_NEST_DEV, because only syzbot uses\nsetups with more than four stacked devices.\n\nBUG: TASK stack guard page was hit at ffffc9000e803ff8 (stack is ffffc9000e804000..ffffc9000e808000)\nstack guard page: 0000 [#1] SMP KASAN\nCPU: 0 PID: 13442 Comm: syz-executor.4 Not tainted 6.1.52-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023\nRIP: 0010:kasan_check_range+0x4/0x2a0 mm/kasan/generic.c:188\nCode: 48 01 c6 48 89 c7 e8 db 4e c1 03 31 c0 5d c3 cc 0f 0b eb 02 0f 0b b8 ea ff ff ff 5d c3 cc 00 00 cc cc 00 00 cc cc 55 48 89 e5 <41> 57 41 56 41 55 41 54 53 b0 01 48 85 f6 0f 84 a4 01 00 00 48 89\nRSP: 0018:ffffc9000e804000 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817e5bf2\nRDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff887c6568\nRBP: ffffc9000e804000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92001d0080c\nR13: dffffc0000000000 R14: ffffffff87e6b100 R15: 0000000000000000\nFS: 00007fd0c55826c0(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000e803ff8 CR3: 0000000170ef7000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n<#DF>\n</#DF>\n<TASK>\n[<ffffffff81f281d1>] __kasan_check_read+0x11/0x20 mm/kasan/shadow.c:31\n[<ffffffff817e5bf2>] instrument_atomic_read include/linux/instrumented.h:72 [inline]\n[<ffffffff817e5bf2>] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\n[<ffffffff817e5bf2>] cpumask_test_cpu include/linux/cpumask.h:506 [inline]\n[<ffffffff817e5bf2>] cpu_online include/linux/cpumask.h:1092 [inline]\n[<ffffffff817e5bf2>] trace_lock_acquire include/trace/events/lock.h:24 [inline]\n[<ffffffff817e5bf2>] lock_acquire+0xe2/0x590 kernel/locking/lockdep.c:5632\n[<ffffffff8563221e>] rcu_lock_acquire+0x2e/0x40 include/linux/rcupdate.h:306\n[<ffffffff8561464d>] rcu_read_lock include/linux/rcupdate.h:747 [inline]\n[<ffffffff8561464d>] ip6_pol_route+0x15d/0x1440 net/ipv6/route.c:2221\n[<ffffffff85618120>] ip6_pol_route_output+0x50/0x80 net/ipv6/route.c:2606\n[<ffffffff856f65b5>] pol_lookup_func include/net/ip6_fib.h:584 [inline]\n[<ffffffff856f65b5>] fib6_rule_lookup+0x265/0x620 net/ipv6/fib6_rules.c:116\n[<ffffffff85618009>] ip6_route_output_flags_noref+0x2d9/0x3a0 net/ipv6/route.c:2638\n[<ffffffff8561821a>] ip6_route_output_flags+0xca/0x340 net/ipv6/route.c:2651\n[<ffffffff838bd5a3>] ip6_route_output include/net/ip6_route.h:100 [inline]\n[<ffffffff838bd5a3>] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:473 [inline]\n[<ffffffff838bd5a3>] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline]\n[<ffffffff838bd5a3>] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\n[<ffffffff838bd5a3>] ipvlan_queue_xmit+0xc33/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677\n[<ffffffff838c2909>] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229\n[<ffffffff84d03900>] netdev_start_xmit include/linux/netdevice.h:4966 [inline]\n[<ffffffff84d03900>] xmit_one net/core/dev.c:3644 [inline]\n[<ffffffff84d03900>] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660\n[<ffffffff84d080e2>] __dev_queue_xmit+0x16b2/0x3370 net/core/dev.c:4324\n[<ffffffff855ce4cd>] dev_queue_xmit include/linux/netdevice.h:3067 [inline]\n[<ffffffff855ce4cd>] neigh_hh_output include/net/neighbour.h:529 [inline]\n[<f\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52796",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/03cddc4df8c6be47fd27c8f8b87e5f9a989e1458",
            "patch_url": "https://git.kernel.org/stable/p/03cddc4df8c6be47fd27c8f8b87e5f9a989e1458",
            "filename": "CVE-2023-52796-03cddc4df8c6be47fd27c8f8b87e5f9a989e1458.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52796/CVE-2023-52796-03cddc4df8c6be47fd27c8f8b87e5f9a989e1458.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/03cddc4df8c6be47fd27c8f8b87e5f9a989e1458",
                "patch_url": "https://git.kernel.org/stable/p/03cddc4df8c6be47fd27c8f8b87e5f9a989e1458",
                "filename": "CVE-2023-52796-03cddc4df8c6be47fd27c8f8b87e5f9a989e1458.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52796/CVE-2023-52796-03cddc4df8c6be47fd27c8f8b87e5f9a989e1458.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/18f039428c7df183b09c69ebf10ffd4e521035d2",
                "patch_url": "https://git.kernel.org/stable/p/18f039428c7df183b09c69ebf10ffd4e521035d2",
                "filename": "CVE-2023-52796-18f039428c7df183b09c69ebf10ffd4e521035d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52796/CVE-2023-52796-18f039428c7df183b09c69ebf10ffd4e521035d2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1f64cad3ac38ac5978b53c40e6c5e6fd3477c68f",
                "patch_url": "https://git.kernel.org/stable/p/1f64cad3ac38ac5978b53c40e6c5e6fd3477c68f",
                "filename": "CVE-2023-52796-1f64cad3ac38ac5978b53c40e6c5e6fd3477c68f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52796/CVE-2023-52796-1f64cad3ac38ac5978b53c40e6c5e6fd3477c68f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/43b781e7cb5cd0b435de276111953bf2bacd1f02",
                "patch_url": "https://git.kernel.org/stable/p/43b781e7cb5cd0b435de276111953bf2bacd1f02",
                "filename": "CVE-2023-52796-43b781e7cb5cd0b435de276111953bf2bacd1f02.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52796/CVE-2023-52796-43b781e7cb5cd0b435de276111953bf2bacd1f02.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4d2d30f0792b47908af64c4d02ed1ee25ff50542",
                "patch_url": "https://git.kernel.org/stable/p/4d2d30f0792b47908af64c4d02ed1ee25ff50542",
                "filename": "CVE-2023-52796-4d2d30f0792b47908af64c4d02ed1ee25ff50542.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52796/CVE-2023-52796-4d2d30f0792b47908af64c4d02ed1ee25ff50542.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f7f850611aa27aaaf1bf5687702ad2240ae442a",
                "patch_url": "https://git.kernel.org/stable/p/4f7f850611aa27aaaf1bf5687702ad2240ae442a",
                "filename": "CVE-2023-52796-4f7f850611aa27aaaf1bf5687702ad2240ae442a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52796/CVE-2023-52796-4f7f850611aa27aaaf1bf5687702ad2240ae442a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/732a67ca436887b594ebc43bb5a04ffb0971a760",
                "patch_url": "https://git.kernel.org/stable/p/732a67ca436887b594ebc43bb5a04ffb0971a760",
                "filename": "CVE-2023-52796-732a67ca436887b594ebc43bb5a04ffb0971a760.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52796/CVE-2023-52796-732a67ca436887b594ebc43bb5a04ffb0971a760.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8872dc638c24bb774cd2224a69d72a7f661a4d56",
                "patch_url": "https://git.kernel.org/stable/p/8872dc638c24bb774cd2224a69d72a7f661a4d56",
                "filename": "CVE-2023-52796-8872dc638c24bb774cd2224a69d72a7f661a4d56.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52796/CVE-2023-52796-8872dc638c24bb774cd2224a69d72a7f661a4d56.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/03cddc4df8c6be47fd27c8f8b87e5f9a989e1458",
            "https://git.kernel.org/stable/c/18f039428c7df183b09c69ebf10ffd4e521035d2",
            "https://git.kernel.org/stable/c/1f64cad3ac38ac5978b53c40e6c5e6fd3477c68f",
            "https://git.kernel.org/stable/c/43b781e7cb5cd0b435de276111953bf2bacd1f02",
            "https://git.kernel.org/stable/c/4d2d30f0792b47908af64c4d02ed1ee25ff50542",
            "https://git.kernel.org/stable/c/4f7f850611aa27aaaf1bf5687702ad2240ae442a",
            "https://git.kernel.org/stable/c/732a67ca436887b594ebc43bb5a04ffb0971a760",
            "https://git.kernel.org/stable/c/8872dc638c24bb774cd2224a69d72a7f661a4d56",
            "https://www.cve.org/CVERecord?id=CVE-2023-52796\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52796\nhttps://lore.kernel.org/linux-cve-announce/2024052158-CVE-2023-52796-860d@gregkh/T"
        ]
    },
    "CVE-2023-52798": {
        "cve": "CVE-2023-52798",
        "cvss_v2": null,
        "cvss_v3": 8.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix dfs radar event locking\n\nThe ath11k active pdevs are protected by RCU but the DFS radar event\nhandling code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a\nread-side critical section.\n\nMark the code in question as an RCU read-side critical section to avoid\nany potential use-after-free issues.\n\nCompile tested only.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52798",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ca420ac4f9451f22347bae44b18ab47ba2c267ec",
            "patch_url": "https://git.kernel.org/stable/p/ca420ac4f9451f22347bae44b18ab47ba2c267ec",
            "filename": "CVE-2023-52798-ca420ac4f9451f22347bae44b18ab47ba2c267ec.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52798/CVE-2023-52798-ca420ac4f9451f22347bae44b18ab47ba2c267ec.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1fd878e1750190a612b5de2af357cca422ec0822",
                "patch_url": "https://git.kernel.org/stable/p/1fd878e1750190a612b5de2af357cca422ec0822",
                "filename": "CVE-2023-52798-1fd878e1750190a612b5de2af357cca422ec0822.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52798/CVE-2023-52798-1fd878e1750190a612b5de2af357cca422ec0822.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/21ebb0aba580d347e12f01ce5f6e75044427b3d5",
                "patch_url": "https://git.kernel.org/stable/p/21ebb0aba580d347e12f01ce5f6e75044427b3d5",
                "filename": "CVE-2023-52798-21ebb0aba580d347e12f01ce5f6e75044427b3d5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52798/CVE-2023-52798-21ebb0aba580d347e12f01ce5f6e75044427b3d5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3b6c14833165f689cc5928574ebafe52bbce5f1e",
                "patch_url": "https://git.kernel.org/stable/p/3b6c14833165f689cc5928574ebafe52bbce5f1e",
                "filename": "CVE-2023-52798-3b6c14833165f689cc5928574ebafe52bbce5f1e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52798/CVE-2023-52798-3b6c14833165f689cc5928574ebafe52bbce5f1e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/426e718ce9ba60013364a54233feee309356cb82",
                "patch_url": "https://git.kernel.org/stable/p/426e718ce9ba60013364a54233feee309356cb82",
                "filename": "CVE-2023-52798-426e718ce9ba60013364a54233feee309356cb82.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52798/CVE-2023-52798-426e718ce9ba60013364a54233feee309356cb82.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ca420ac4f9451f22347bae44b18ab47ba2c267ec",
                "patch_url": "https://git.kernel.org/stable/p/ca420ac4f9451f22347bae44b18ab47ba2c267ec",
                "filename": "CVE-2023-52798-ca420ac4f9451f22347bae44b18ab47ba2c267ec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52798/CVE-2023-52798-ca420ac4f9451f22347bae44b18ab47ba2c267ec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f882f51905517575c9f793a3dff567af90ef9a10",
                "patch_url": "https://git.kernel.org/stable/p/f882f51905517575c9f793a3dff567af90ef9a10",
                "filename": "CVE-2023-52798-f882f51905517575c9f793a3dff567af90ef9a10.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52798/CVE-2023-52798-f882f51905517575c9f793a3dff567af90ef9a10.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1fd878e1750190a612b5de2af357cca422ec0822",
            "https://git.kernel.org/stable/c/21ebb0aba580d347e12f01ce5f6e75044427b3d5",
            "https://git.kernel.org/stable/c/3b6c14833165f689cc5928574ebafe52bbce5f1e",
            "https://git.kernel.org/stable/c/426e718ce9ba60013364a54233feee309356cb82",
            "https://git.kernel.org/stable/c/ca420ac4f9451f22347bae44b18ab47ba2c267ec",
            "https://git.kernel.org/stable/c/f882f51905517575c9f793a3dff567af90ef9a10",
            "https://www.cve.org/CVERecord?id=CVE-2023-52798\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52798\nhttps://lore.kernel.org/linux-cve-announce/2024052158-CVE-2023-52798-374e@gregkh/T"
        ]
    },
    "CVE-2023-52800": {
        "cve": "CVE-2023-52800",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix htt pktlog locking\n\nThe ath11k active pdevs are protected by RCU but the htt pktlog handling\ncode calling ath11k_mac_get_ar_by_pdev_id() was not marked as a\nread-side critical section.\n\nMark the code in question as an RCU read-side critical section to avoid\nany potential use-after-free issues.\n\nCompile tested only.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52800",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/423762f021825b5e57c3d6f01ff96a9ff19cdcd8",
            "patch_url": "https://git.kernel.org/stable/p/423762f021825b5e57c3d6f01ff96a9ff19cdcd8",
            "filename": "CVE-2023-52800-423762f021825b5e57c3d6f01ff96a9ff19cdcd8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52800/CVE-2023-52800-423762f021825b5e57c3d6f01ff96a9ff19cdcd8.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/03ed26935bebf6b6fd8a656490bf3dcc71b72679",
                "patch_url": "https://git.kernel.org/stable/p/03ed26935bebf6b6fd8a656490bf3dcc71b72679",
                "filename": "CVE-2023-52800-03ed26935bebf6b6fd8a656490bf3dcc71b72679.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52800/CVE-2023-52800-03ed26935bebf6b6fd8a656490bf3dcc71b72679.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3a51e6b4da71fdfa43ec006d6abc020f3e22d14e",
                "patch_url": "https://git.kernel.org/stable/p/3a51e6b4da71fdfa43ec006d6abc020f3e22d14e",
                "filename": "CVE-2023-52800-3a51e6b4da71fdfa43ec006d6abc020f3e22d14e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52800/CVE-2023-52800-3a51e6b4da71fdfa43ec006d6abc020f3e22d14e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3f77c7d605b29df277d77e9ee75d96e7ad145d2d",
                "patch_url": "https://git.kernel.org/stable/p/3f77c7d605b29df277d77e9ee75d96e7ad145d2d",
                "filename": "CVE-2023-52800-3f77c7d605b29df277d77e9ee75d96e7ad145d2d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52800/CVE-2023-52800-3f77c7d605b29df277d77e9ee75d96e7ad145d2d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/423762f021825b5e57c3d6f01ff96a9ff19cdcd8",
                "patch_url": "https://git.kernel.org/stable/p/423762f021825b5e57c3d6f01ff96a9ff19cdcd8",
                "filename": "CVE-2023-52800-423762f021825b5e57c3d6f01ff96a9ff19cdcd8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52800/CVE-2023-52800-423762f021825b5e57c3d6f01ff96a9ff19cdcd8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/69cede2a5a5f60e3f5602b901b52cb64edd2ea6c",
                "patch_url": "https://git.kernel.org/stable/p/69cede2a5a5f60e3f5602b901b52cb64edd2ea6c",
                "filename": "CVE-2023-52800-69cede2a5a5f60e3f5602b901b52cb64edd2ea6c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52800/CVE-2023-52800-69cede2a5a5f60e3f5602b901b52cb64edd2ea6c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e3199b3fac65c9f103055390b6fd07c5cffa5961",
                "patch_url": "https://git.kernel.org/stable/p/e3199b3fac65c9f103055390b6fd07c5cffa5961",
                "filename": "CVE-2023-52800-e3199b3fac65c9f103055390b6fd07c5cffa5961.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52800/CVE-2023-52800-e3199b3fac65c9f103055390b6fd07c5cffa5961.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/03ed26935bebf6b6fd8a656490bf3dcc71b72679",
            "https://git.kernel.org/stable/c/3a51e6b4da71fdfa43ec006d6abc020f3e22d14e",
            "https://git.kernel.org/stable/c/3f77c7d605b29df277d77e9ee75d96e7ad145d2d",
            "https://git.kernel.org/stable/c/423762f021825b5e57c3d6f01ff96a9ff19cdcd8",
            "https://git.kernel.org/stable/c/69cede2a5a5f60e3f5602b901b52cb64edd2ea6c",
            "https://git.kernel.org/stable/c/e3199b3fac65c9f103055390b6fd07c5cffa5961",
            "https://www.cve.org/CVERecord?id=CVE-2023-52800\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52800\nhttps://lore.kernel.org/linux-cve-announce/2024052159-CVE-2023-52800-63da@gregkh/T"
        ]
    },
    "CVE-2023-52803": {
        "cve": "CVE-2023-52803",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix RPC client cleaned up the freed pipefs dentries\n\nRPC client pipefs dentries cleanup is in separated rpc_remove_pipedir()\nworkqueue,which takes care about pipefs superblock locking.\nIn some special scenarios, when kernel frees the pipefs sb of the\ncurrent client and immediately alloctes a new pipefs sb,\nrpc_remove_pipedir function would misjudge the existence of pipefs\nsb which is not the one it used to hold. As a result,\nthe rpc_remove_pipedir would clean the released freed pipefs dentries.\n\nTo fix this issue, rpc_remove_pipedir should check whether the\ncurrent pipefs sb is consistent with the original pipefs sb.\n\nThis error can be catched by KASAN:\n=========================================================\n[  250.497700] BUG: KASAN: slab-use-after-free in dget_parent+0x195/0x200\n[  250.498315] Read of size 4 at addr ffff88800a2ab804 by task kworker/0:18/106503\n[  250.500549] Workqueue: events rpc_free_client_work\n[  250.501001] Call Trace:\n[  250.502880]  kasan_report+0xb6/0xf0\n[  250.503209]  ? dget_parent+0x195/0x200\n[  250.503561]  dget_parent+0x195/0x200\n[  250.503897]  ? __pfx_rpc_clntdir_depopulate+0x10/0x10\n[  250.504384]  rpc_rmdir_depopulate+0x1b/0x90\n[  250.504781]  rpc_remove_client_dir+0xf5/0x150\n[  250.505195]  rpc_free_client_work+0xe4/0x230\n[  250.505598]  process_one_work+0x8ee/0x13b0\n...\n[   22.039056] Allocated by task 244:\n[   22.039390]  kasan_save_stack+0x22/0x50\n[   22.039758]  kasan_set_track+0x25/0x30\n[   22.040109]  __kasan_slab_alloc+0x59/0x70\n[   22.040487]  kmem_cache_alloc_lru+0xf0/0x240\n[   22.040889]  __d_alloc+0x31/0x8e0\n[   22.041207]  d_alloc+0x44/0x1f0\n[   22.041514]  __rpc_lookup_create_exclusive+0x11c/0x140\n[   22.041987]  rpc_mkdir_populate.constprop.0+0x5f/0x110\n[   22.042459]  rpc_create_client_dir+0x34/0x150\n[   22.042874]  rpc_setup_pipedir_sb+0x102/0x1c0\n[   22.043284]  rpc_client_register+0x136/0x4e0\n[   22.043689]  rpc_new_client+0x911/0x1020\n[   22.044057]  rpc_create_xprt+0xcb/0x370\n[   22.044417]  rpc_create+0x36b/0x6c0\n...\n[   22.049524] Freed by task 0:\n[   22.049803]  kasan_save_stack+0x22/0x50\n[   22.050165]  kasan_set_track+0x25/0x30\n[   22.050520]  kasan_save_free_info+0x2b/0x50\n[   22.050921]  __kasan_slab_free+0x10e/0x1a0\n[   22.051306]  kmem_cache_free+0xa5/0x390\n[   22.051667]  rcu_core+0x62c/0x1930\n[   22.051995]  __do_softirq+0x165/0x52a\n[   22.052347]\n[   22.052503] Last potentially related work creation:\n[   22.052952]  kasan_save_stack+0x22/0x50\n[   22.053313]  __kasan_record_aux_stack+0x8e/0xa0\n[   22.053739]  __call_rcu_common.constprop.0+0x6b/0x8b0\n[   22.054209]  dentry_free+0xb2/0x140\n[   22.054540]  __dentry_kill+0x3be/0x540\n[   22.054900]  shrink_dentry_list+0x199/0x510\n[   22.055293]  shrink_dcache_parent+0x190/0x240\n[   22.055703]  do_one_tree+0x11/0x40\n[   22.056028]  shrink_dcache_for_umount+0x61/0x140\n[   22.056461]  generic_shutdown_super+0x70/0x590\n[   22.056879]  kill_anon_super+0x3a/0x60\n[   22.057234]  rpc_kill_sb+0x121/0x200",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52803",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/7749fd2dbef72a52b5c9ffdbf877691950ed4680",
            "patch_url": "https://git.kernel.org/stable/p/7749fd2dbef72a52b5c9ffdbf877691950ed4680",
            "filename": "CVE-2023-52803-7749fd2dbef72a52b5c9ffdbf877691950ed4680.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52803/CVE-2023-52803-7749fd2dbef72a52b5c9ffdbf877691950ed4680.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/17866066b8ac1cc38fb449670bc15dc9fee4b40a",
                "patch_url": "https://git.kernel.org/stable/p/17866066b8ac1cc38fb449670bc15dc9fee4b40a",
                "filename": "CVE-2023-52803-17866066b8ac1cc38fb449670bc15dc9fee4b40a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52803/CVE-2023-52803-17866066b8ac1cc38fb449670bc15dc9fee4b40a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/194454afa6aa9d6ed74f0c57127bc8beb27c20df",
                "patch_url": "https://git.kernel.org/stable/p/194454afa6aa9d6ed74f0c57127bc8beb27c20df",
                "filename": "CVE-2023-52803-194454afa6aa9d6ed74f0c57127bc8beb27c20df.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52803/CVE-2023-52803-194454afa6aa9d6ed74f0c57127bc8beb27c20df.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1cdb52ffd6600a37bd355d8dce58ecd03e55e618",
                "patch_url": "https://git.kernel.org/stable/p/1cdb52ffd6600a37bd355d8dce58ecd03e55e618",
                "filename": "CVE-2023-52803-1cdb52ffd6600a37bd355d8dce58ecd03e55e618.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52803/CVE-2023-52803-1cdb52ffd6600a37bd355d8dce58ecd03e55e618.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7749fd2dbef72a52b5c9ffdbf877691950ed4680",
                "patch_url": "https://git.kernel.org/stable/p/7749fd2dbef72a52b5c9ffdbf877691950ed4680",
                "filename": "CVE-2023-52803-7749fd2dbef72a52b5c9ffdbf877691950ed4680.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52803/CVE-2023-52803-7749fd2dbef72a52b5c9ffdbf877691950ed4680.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7d61d1da2ed1f682c41cae0c8d4719cdaccee5c5",
                "patch_url": "https://git.kernel.org/stable/p/7d61d1da2ed1f682c41cae0c8d4719cdaccee5c5",
                "filename": "CVE-2023-52803-7d61d1da2ed1f682c41cae0c8d4719cdaccee5c5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52803/CVE-2023-52803-7d61d1da2ed1f682c41cae0c8d4719cdaccee5c5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bfca5fb4e97c46503ddfc582335917b0cc228264",
                "patch_url": "https://git.kernel.org/stable/p/bfca5fb4e97c46503ddfc582335917b0cc228264",
                "filename": "CVE-2023-52803-bfca5fb4e97c46503ddfc582335917b0cc228264.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52803/CVE-2023-52803-bfca5fb4e97c46503ddfc582335917b0cc228264.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cc2e7ebbeb1d0601f7f3c8d93b78fcc03a95e44a",
                "patch_url": "https://git.kernel.org/stable/p/cc2e7ebbeb1d0601f7f3c8d93b78fcc03a95e44a",
                "filename": "CVE-2023-52803-cc2e7ebbeb1d0601f7f3c8d93b78fcc03a95e44a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52803/CVE-2023-52803-cc2e7ebbeb1d0601f7f3c8d93b78fcc03a95e44a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dedf2a0eb9448ae73b270743e6ea9b108189df46",
                "patch_url": "https://git.kernel.org/stable/p/dedf2a0eb9448ae73b270743e6ea9b108189df46",
                "filename": "CVE-2023-52803-dedf2a0eb9448ae73b270743e6ea9b108189df46.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52803/CVE-2023-52803-dedf2a0eb9448ae73b270743e6ea9b108189df46.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/17866066b8ac1cc38fb449670bc15dc9fee4b40a",
            "https://git.kernel.org/stable/c/194454afa6aa9d6ed74f0c57127bc8beb27c20df",
            "https://git.kernel.org/stable/c/1cdb52ffd6600a37bd355d8dce58ecd03e55e618",
            "https://git.kernel.org/stable/c/7749fd2dbef72a52b5c9ffdbf877691950ed4680",
            "https://git.kernel.org/stable/c/7d61d1da2ed1f682c41cae0c8d4719cdaccee5c5",
            "https://git.kernel.org/stable/c/bfca5fb4e97c46503ddfc582335917b0cc228264",
            "https://git.kernel.org/stable/c/cc2e7ebbeb1d0601f7f3c8d93b78fcc03a95e44a",
            "https://git.kernel.org/stable/c/dedf2a0eb9448ae73b270743e6ea9b108189df46",
            "https://www.cve.org/CVERecord?id=CVE-2023-52803\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52803\nhttps://lore.kernel.org/linux-cve-announce/2024052100-CVE-2023-52803-1f43@gregkh/T"
        ]
    },
    "CVE-2023-52809": {
        "cve": "CVE-2023-52809",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()\n\nfc_lport_ptp_setup() did not check the return value of fc_rport_create()\nwhich can return NULL and would cause a NULL pointer dereference. Address\nthis issue by checking return value of fc_rport_create() and log error\nmessage on fc_rport_create() failed.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52809",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba",
            "patch_url": "https://git.kernel.org/stable/p/442fd24d7b6b29e4a9cd9225afba4142d5f522ba",
            "filename": "CVE-2023-52809-442fd24d7b6b29e4a9cd9225afba4142d5f522ba.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52809/CVE-2023-52809-442fd24d7b6b29e4a9cd9225afba4142d5f522ba.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba",
                "patch_url": "https://git.kernel.org/stable/p/442fd24d7b6b29e4a9cd9225afba4142d5f522ba",
                "filename": "CVE-2023-52809-442fd24d7b6b29e4a9cd9225afba4142d5f522ba.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52809/CVE-2023-52809-442fd24d7b6b29e4a9cd9225afba4142d5f522ba.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f",
                "patch_url": "https://git.kernel.org/stable/p/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f",
                "filename": "CVE-2023-52809-4df105f0ce9f6f30cda4e99f577150d23f0c9c5f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52809/CVE-2023-52809-4df105f0ce9f6f30cda4e99f577150d23f0c9c5f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b",
                "patch_url": "https://git.kernel.org/stable/p/56d78b5495ebecbb9395101f3be177cd0a52450b",
                "filename": "CVE-2023-52809-56d78b5495ebecbb9395101f3be177cd0a52450b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52809/CVE-2023-52809-56d78b5495ebecbb9395101f3be177cd0a52450b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106",
                "patch_url": "https://git.kernel.org/stable/p/6b9ecf4e1032e645873933e5b43cbb84cac19106",
                "filename": "CVE-2023-52809-6b9ecf4e1032e645873933e5b43cbb84cac19106.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52809/CVE-2023-52809-6b9ecf4e1032e645873933e5b43cbb84cac19106.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa",
                "patch_url": "https://git.kernel.org/stable/p/77072ec41d6ab3718c3fc639bc149b8037caedfa",
                "filename": "CVE-2023-52809-77072ec41d6ab3718c3fc639bc149b8037caedfa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52809/CVE-2023-52809-77072ec41d6ab3718c3fc639bc149b8037caedfa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e",
                "patch_url": "https://git.kernel.org/stable/p/930f0aaba4820d6362de4e6ed569eaf444f1ea4e",
                "filename": "CVE-2023-52809-930f0aaba4820d6362de4e6ed569eaf444f1ea4e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52809/CVE-2023-52809-930f0aaba4820d6362de4e6ed569eaf444f1ea4e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00",
                "patch_url": "https://git.kernel.org/stable/p/b549acf999824d4f751ca57965700372f2f3ad00",
                "filename": "CVE-2023-52809-b549acf999824d4f751ca57965700372f2f3ad00.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52809/CVE-2023-52809-b549acf999824d4f751ca57965700372f2f3ad00.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01",
                "patch_url": "https://git.kernel.org/stable/p/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01",
                "filename": "CVE-2023-52809-bb83f79f90e92f46466adcfd4fd264a7ae0f0f01.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52809/CVE-2023-52809-bb83f79f90e92f46466adcfd4fd264a7ae0f0f01.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34",
                "patch_url": "https://git.kernel.org/stable/p/f6fe7261b92b21109678747f36df9fdab1e30c34",
                "filename": "CVE-2023-52809-f6fe7261b92b21109678747f36df9fdab1e30c34.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52809/CVE-2023-52809-f6fe7261b92b21109678747f36df9fdab1e30c34.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba",
            "https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f",
            "https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b",
            "https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106",
            "https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa",
            "https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e",
            "https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00",
            "https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01",
            "https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34",
            "https://www.cve.org/CVERecord?id=CVE-2023-52809\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52809\nhttps://lore.kernel.org/linux-cve-announce/2024052102-CVE-2023-52809-f07c@gregkh/T"
        ]
    },
    "CVE-2023-52811": {
        "cve": "CVE-2023-52811",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ibmvfc: Remove BUG_ON in the case of an empty event pool\n\nIn practice the driver should never send more commands than are allocated\nto a queue's event pool. In the unlikely event that this happens, the code\nasserts a BUG_ON, and in the case that the kernel is not configured to\ncrash on panic returns a junk event pointer from the empty event list\ncausing things to spiral from there. This BUG_ON is a historical artifact\nof the ibmvfc driver first being upstreamed, and it is well known now that\nthe use of BUG_ON is bad practice except in the most unrecoverable\nscenario. There is nothing about this scenario that prevents the driver\nfrom recovering and carrying on.\n\nRemove the BUG_ON in question from ibmvfc_get_event() and return a NULL\npointer in the case of an empty event pool. Update all call sites to\nibmvfc_get_event() to check for a NULL pointer and perfrom the appropriate\nfailure or recovery action.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52811",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/e1d1f79b1929dce470a5dc9281c574cd58e8c6c0",
            "patch_url": "https://git.kernel.org/stable/p/e1d1f79b1929dce470a5dc9281c574cd58e8c6c0",
            "filename": "CVE-2023-52811-e1d1f79b1929dce470a5dc9281c574cd58e8c6c0.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52811/CVE-2023-52811-e1d1f79b1929dce470a5dc9281c574cd58e8c6c0.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/88984ec4792766df5a9de7a2ff2b5f281f94c7d4",
                "patch_url": "https://git.kernel.org/stable/p/88984ec4792766df5a9de7a2ff2b5f281f94c7d4",
                "filename": "CVE-2023-52811-88984ec4792766df5a9de7a2ff2b5f281f94c7d4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52811/CVE-2023-52811-88984ec4792766df5a9de7a2ff2b5f281f94c7d4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8bbe784c2ff28d56ca0c548aaf3e584edc77052d",
                "patch_url": "https://git.kernel.org/stable/p/8bbe784c2ff28d56ca0c548aaf3e584edc77052d",
                "filename": "CVE-2023-52811-8bbe784c2ff28d56ca0c548aaf3e584edc77052d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52811/CVE-2023-52811-8bbe784c2ff28d56ca0c548aaf3e584edc77052d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b39f2d10b86d0af353ea339e5815820026bca48f",
                "patch_url": "https://git.kernel.org/stable/p/b39f2d10b86d0af353ea339e5815820026bca48f",
                "filename": "CVE-2023-52811-b39f2d10b86d0af353ea339e5815820026bca48f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52811/CVE-2023-52811-b39f2d10b86d0af353ea339e5815820026bca48f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d2af4ef80601224b90630c1ddc7cd2c7c8ab4dd8",
                "patch_url": "https://git.kernel.org/stable/p/d2af4ef80601224b90630c1ddc7cd2c7c8ab4dd8",
                "filename": "CVE-2023-52811-d2af4ef80601224b90630c1ddc7cd2c7c8ab4dd8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52811/CVE-2023-52811-d2af4ef80601224b90630c1ddc7cd2c7c8ab4dd8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e1d1f79b1929dce470a5dc9281c574cd58e8c6c0",
                "patch_url": "https://git.kernel.org/stable/p/e1d1f79b1929dce470a5dc9281c574cd58e8c6c0",
                "filename": "CVE-2023-52811-e1d1f79b1929dce470a5dc9281c574cd58e8c6c0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52811/CVE-2023-52811-e1d1f79b1929dce470a5dc9281c574cd58e8c6c0.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/88984ec4792766df5a9de7a2ff2b5f281f94c7d4",
            "https://git.kernel.org/stable/c/8bbe784c2ff28d56ca0c548aaf3e584edc77052d",
            "https://git.kernel.org/stable/c/b39f2d10b86d0af353ea339e5815820026bca48f",
            "https://git.kernel.org/stable/c/d2af4ef80601224b90630c1ddc7cd2c7c8ab4dd8",
            "https://git.kernel.org/stable/c/e1d1f79b1929dce470a5dc9281c574cd58e8c6c0",
            "https://www.cve.org/CVERecord?id=CVE-2023-52811\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52811\nhttps://lore.kernel.org/linux-cve-announce/2024052102-CVE-2023-52811-2a5f@gregkh/T"
        ]
    },
    "CVE-2023-52813": {
        "cve": "CVE-2023-52813",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: pcrypt - Fix hungtask for PADATA_RESET\n\nWe found a hungtask bug in test_aead_vec_cfg as follows:\n\nINFO: task cryptomgr_test:391009 blocked for more than 120 seconds.\n\"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\nCall trace:\n __switch_to+0x98/0xe0\n __schedule+0x6c4/0xf40\n schedule+0xd8/0x1b4\n schedule_timeout+0x474/0x560\n wait_for_common+0x368/0x4e0\n wait_for_completion+0x20/0x30\n wait_for_completion+0x20/0x30\n test_aead_vec_cfg+0xab4/0xd50\n test_aead+0x144/0x1f0\n alg_test_aead+0xd8/0x1e0\n alg_test+0x634/0x890\n cryptomgr_test+0x40/0x70\n kthread+0x1e0/0x220\n ret_from_fork+0x10/0x18\n Kernel panic - not syncing: hung_task: blocked tasks\n\nFor padata_do_parallel, when the return err is 0 or -EBUSY, it will call\nwait_for_completion(&wait->completion) in test_aead_vec_cfg. In normal\ncase, aead_request_complete() will be called in pcrypt_aead_serial and the\nreturn err is 0 for padata_do_parallel. But, when pinst->flags is\nPADATA_RESET, the return err is -EBUSY for padata_do_parallel, and it\nwon't call aead_request_complete(). Therefore, test_aead_vec_cfg will\nhung at wait_for_completion(&wait->completion), which will cause\nhungtask.\n\nThe problem comes as following:\n(padata_do_parallel)                 |\n    rcu_read_lock_bh();              |\n    err = -EINVAL;                   |   (padata_replace)\n                                     |     pinst->flags |= PADATA_RESET;\n    err = -EBUSY                     |\n    if (pinst->flags & PADATA_RESET) |\n        rcu_read_unlock_bh()         |\n        return err\n\nIn order to resolve the problem, we replace the return err -EBUSY with\n-EAGAIN, which means parallel_data is changing, and the caller should call\nit again.\n\nv3:\nremove retry and just change the return err.\nv2:\nintroduce padata_try_do_parallel() in pcrypt_aead_encrypt and\npcrypt_aead_decrypt to solve the hungtask.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52813",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/e97bf4ada7dddacd184c3e196bd063b0dc71b41d",
            "patch_url": "https://git.kernel.org/stable/p/e97bf4ada7dddacd184c3e196bd063b0dc71b41d",
            "filename": "CVE-2023-52813-e97bf4ada7dddacd184c3e196bd063b0dc71b41d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52813/CVE-2023-52813-e97bf4ada7dddacd184c3e196bd063b0dc71b41d.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/039fec48e062504f14845124a1a25eb199b2ddc0",
                "patch_url": "https://git.kernel.org/stable/p/039fec48e062504f14845124a1a25eb199b2ddc0",
                "filename": "CVE-2023-52813-039fec48e062504f14845124a1a25eb199b2ddc0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52813/CVE-2023-52813-039fec48e062504f14845124a1a25eb199b2ddc0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/372636debe852913529b1716f44addd94fff2d28",
                "patch_url": "https://git.kernel.org/stable/p/372636debe852913529b1716f44addd94fff2d28",
                "filename": "CVE-2023-52813-372636debe852913529b1716f44addd94fff2d28.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52813/CVE-2023-52813-372636debe852913529b1716f44addd94fff2d28.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/546c1796ad1ed0d87dab3c4b5156d75819be2316",
                "patch_url": "https://git.kernel.org/stable/p/546c1796ad1ed0d87dab3c4b5156d75819be2316",
                "filename": "CVE-2023-52813-546c1796ad1ed0d87dab3c4b5156d75819be2316.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52813/CVE-2023-52813-546c1796ad1ed0d87dab3c4b5156d75819be2316.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8f4f68e788c3a7a696546291258bfa5fdb215523",
                "patch_url": "https://git.kernel.org/stable/p/8f4f68e788c3a7a696546291258bfa5fdb215523",
                "filename": "CVE-2023-52813-8f4f68e788c3a7a696546291258bfa5fdb215523.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52813/CVE-2023-52813-8f4f68e788c3a7a696546291258bfa5fdb215523.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c55fc098fd9d2dca475b82d00ffbcaf97879d77e",
                "patch_url": "https://git.kernel.org/stable/p/c55fc098fd9d2dca475b82d00ffbcaf97879d77e",
                "filename": "CVE-2023-52813-c55fc098fd9d2dca475b82d00ffbcaf97879d77e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52813/CVE-2023-52813-c55fc098fd9d2dca475b82d00ffbcaf97879d77e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c9c1334697301c10e6918d747ed38abfbc0c96e7",
                "patch_url": "https://git.kernel.org/stable/p/c9c1334697301c10e6918d747ed38abfbc0c96e7",
                "filename": "CVE-2023-52813-c9c1334697301c10e6918d747ed38abfbc0c96e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52813/CVE-2023-52813-c9c1334697301c10e6918d747ed38abfbc0c96e7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e134f3aba98e6c801a693f540912c2d493718ddf",
                "patch_url": "https://git.kernel.org/stable/p/e134f3aba98e6c801a693f540912c2d493718ddf",
                "filename": "CVE-2023-52813-e134f3aba98e6c801a693f540912c2d493718ddf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52813/CVE-2023-52813-e134f3aba98e6c801a693f540912c2d493718ddf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e97bf4ada7dddacd184c3e196bd063b0dc71b41d",
                "patch_url": "https://git.kernel.org/stable/p/e97bf4ada7dddacd184c3e196bd063b0dc71b41d",
                "filename": "CVE-2023-52813-e97bf4ada7dddacd184c3e196bd063b0dc71b41d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52813/CVE-2023-52813-e97bf4ada7dddacd184c3e196bd063b0dc71b41d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fb2d3a50a8f29a3c66682bb426144f40e32ab818",
                "patch_url": "https://git.kernel.org/stable/p/fb2d3a50a8f29a3c66682bb426144f40e32ab818",
                "filename": "CVE-2023-52813-fb2d3a50a8f29a3c66682bb426144f40e32ab818.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52813/CVE-2023-52813-fb2d3a50a8f29a3c66682bb426144f40e32ab818.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/039fec48e062504f14845124a1a25eb199b2ddc0",
            "https://git.kernel.org/stable/c/372636debe852913529b1716f44addd94fff2d28",
            "https://git.kernel.org/stable/c/546c1796ad1ed0d87dab3c4b5156d75819be2316",
            "https://git.kernel.org/stable/c/8f4f68e788c3a7a696546291258bfa5fdb215523",
            "https://git.kernel.org/stable/c/c55fc098fd9d2dca475b82d00ffbcaf97879d77e",
            "https://git.kernel.org/stable/c/c9c1334697301c10e6918d747ed38abfbc0c96e7",
            "https://git.kernel.org/stable/c/e134f3aba98e6c801a693f540912c2d493718ddf",
            "https://git.kernel.org/stable/c/e97bf4ada7dddacd184c3e196bd063b0dc71b41d",
            "https://git.kernel.org/stable/c/fb2d3a50a8f29a3c66682bb426144f40e32ab818",
            "https://www.cve.org/CVERecord?id=CVE-2023-52813\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52813\nhttps://lore.kernel.org/linux-cve-announce/2024052103-CVE-2023-52813-0704@gregkh/T"
        ]
    },
    "CVE-2023-52817": {
        "cve": "CVE-2023-52817",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL\n\nIn certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_rreg pointer is NULL. Below are the steps to reproduce this issue and the corresponding exception log:\n\n1. Navigate to the directory: /sys/kernel/debug/dri/0\n2. Execute command: cat amdgpu_regs_smc\n3. Exception Log::\n[4005007.702554] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[4005007.702562] #PF: supervisor instruction fetch in kernel mode\n[4005007.702567] #PF: error_code(0x0010) - not-present page\n[4005007.702570] PGD 0 P4D 0\n[4005007.702576] Oops: 0010 [#1] SMP NOPTI\n[4005007.702581] CPU: 4 PID: 62563 Comm: cat Tainted: G           OE     5.15.0-43-generic #46-Ubunt       u\n[4005007.702590] RIP: 0010:0x0\n[4005007.702598] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.\n[4005007.702600] RSP: 0018:ffffa82b46d27da0 EFLAGS: 00010206\n[4005007.702605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa82b46d27e68\n[4005007.702609] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9940656e0000\n[4005007.702612] RBP: ffffa82b46d27dd8 R08: 0000000000000000 R09: ffff994060c07980\n[4005007.702615] R10: 0000000000020000 R11: 0000000000000000 R12: 00007f5e06753000\n[4005007.702618] R13: ffff9940656e0000 R14: ffffa82b46d27e68 R15: 00007f5e06753000\n[4005007.702622] FS:  00007f5e0755b740(0000) GS:ffff99479d300000(0000) knlGS:0000000000000000\n[4005007.702626] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[4005007.702629] CR2: ffffffffffffffd6 CR3: 00000003253fc000 CR4: 00000000003506e0\n[4005007.702633] Call Trace:\n[4005007.702636]  <TASK>\n[4005007.702640]  amdgpu_debugfs_regs_smc_read+0xb0/0x120 [amdgpu]\n[4005007.703002]  full_proxy_read+0x5c/0x80\n[4005007.703011]  vfs_read+0x9f/0x1a0\n[4005007.703019]  ksys_read+0x67/0xe0\n[4005007.703023]  __x64_sys_read+0x19/0x20\n[4005007.703028]  do_syscall_64+0x5c/0xc0\n[4005007.703034]  ? do_user_addr_fault+0x1e3/0x670\n[4005007.703040]  ? exit_to_user_mode_prepare+0x37/0xb0\n[4005007.703047]  ? irqentry_exit_to_user_mode+0x9/0x20\n[4005007.703052]  ? irqentry_exit+0x19/0x30\n[4005007.703057]  ? exc_page_fault+0x89/0x160\n[4005007.703062]  ? asm_exc_page_fault+0x8/0x30\n[4005007.703068]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[4005007.703075] RIP: 0033:0x7f5e07672992\n[4005007.703079] Code: c0 e9 b2 fe ff ff 50 48 8d 3d fa b2 0c 00 e8 c5 1d 02 00 0f 1f 44 00 00 f3 0f        1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 e       c 28 48 89 54 24\n[4005007.703083] RSP: 002b:00007ffe03097898 EFLAGS: 00000246 ORIG_RAX: 0000000000000000\n[4005007.703088] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f5e07672992\n[4005007.703091] RDX: 0000000000020000 RSI: 00007f5e06753000 RDI: 0000000000000003\n[4005007.703094] RBP: 00007f5e06753000 R08: 00007f5e06752010 R09: 00007f5e06752010\n[4005007.703096] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000022000\n[4005007.703099] R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000\n[4005007.703105]  </TASK>\n[4005007.703107] Modules linked in: nf_tables libcrc32c nfnetlink algif_hash af_alg binfmt_misc nls_       iso8859_1 ipmi_ssif ast intel_rapl_msr intel_rapl_common drm_vram_helper drm_ttm_helper amd64_edac t       tm edac_mce_amd kvm_amd ccp mac_hid k10temp kvm acpi_ipmi ipmi_si rapl sch_fq_codel ipmi_devintf ipm       i_msghandler msr parport_pc ppdev lp parport mtd pstore_blk efi_pstore ramoops pstore_zone reed_solo       mon ip_tables x_tables autofs4 ib_uverbs ib_core amdgpu(OE) amddrm_ttm_helper(OE) amdttm(OE) iommu_v       2 amd_sched(OE) amdkcl(OE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops cec rc_core        drm igb ahci xhci_pci libahci i2c_piix4 i2c_algo_bit xhci_pci_renesas dca\n[4005007.703184] CR2: 0000000000000000\n[4005007.703188] ---[ en\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52817",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6c1b3d89a2dda79881726bb6e37af19c0936d736",
            "patch_url": "https://git.kernel.org/stable/p/6c1b3d89a2dda79881726bb6e37af19c0936d736",
            "filename": "CVE-2023-52817-6c1b3d89a2dda79881726bb6e37af19c0936d736.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52817/CVE-2023-52817-6c1b3d89a2dda79881726bb6e37af19c0936d736.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/174f62a0aa15c211e60208b41ee9e7cdfb73d455",
                "patch_url": "https://git.kernel.org/stable/p/174f62a0aa15c211e60208b41ee9e7cdfb73d455",
                "filename": "CVE-2023-52817-174f62a0aa15c211e60208b41ee9e7cdfb73d455.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52817/CVE-2023-52817-174f62a0aa15c211e60208b41ee9e7cdfb73d455.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/437e0fa907ba39b4d7eda863c03ea9cf48bd93a9",
                "patch_url": "https://git.kernel.org/stable/p/437e0fa907ba39b4d7eda863c03ea9cf48bd93a9",
                "filename": "CVE-2023-52817-437e0fa907ba39b4d7eda863c03ea9cf48bd93a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52817/CVE-2023-52817-437e0fa907ba39b4d7eda863c03ea9cf48bd93a9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5104fdf50d326db2c1a994f8b35dcd46e63ae4ad",
                "patch_url": "https://git.kernel.org/stable/p/5104fdf50d326db2c1a994f8b35dcd46e63ae4ad",
                "filename": "CVE-2023-52817-5104fdf50d326db2c1a994f8b35dcd46e63ae4ad.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52817/CVE-2023-52817-5104fdf50d326db2c1a994f8b35dcd46e63ae4ad.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6c1b3d89a2dda79881726bb6e37af19c0936d736",
                "patch_url": "https://git.kernel.org/stable/p/6c1b3d89a2dda79881726bb6e37af19c0936d736",
                "filename": "CVE-2023-52817-6c1b3d89a2dda79881726bb6e37af19c0936d736.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52817/CVE-2023-52817-6c1b3d89a2dda79881726bb6e37af19c0936d736.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/820daf9ffe2b0afb804567b10983fb38bc5ae288",
                "patch_url": "https://git.kernel.org/stable/p/820daf9ffe2b0afb804567b10983fb38bc5ae288",
                "filename": "CVE-2023-52817-820daf9ffe2b0afb804567b10983fb38bc5ae288.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52817/CVE-2023-52817-820daf9ffe2b0afb804567b10983fb38bc5ae288.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ba3c0796d292de84f2932cc5bbb0f771fc720996",
                "patch_url": "https://git.kernel.org/stable/p/ba3c0796d292de84f2932cc5bbb0f771fc720996",
                "filename": "CVE-2023-52817-ba3c0796d292de84f2932cc5bbb0f771fc720996.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52817/CVE-2023-52817-ba3c0796d292de84f2932cc5bbb0f771fc720996.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bf2d51eedf03bd61e3556e35d74d49e2e6112398",
                "patch_url": "https://git.kernel.org/stable/p/bf2d51eedf03bd61e3556e35d74d49e2e6112398",
                "filename": "CVE-2023-52817-bf2d51eedf03bd61e3556e35d74d49e2e6112398.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52817/CVE-2023-52817-bf2d51eedf03bd61e3556e35d74d49e2e6112398.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f475d5502f33a6c5b149b0afe96316ad1962a64a",
                "patch_url": "https://git.kernel.org/stable/p/f475d5502f33a6c5b149b0afe96316ad1962a64a",
                "filename": "CVE-2023-52817-f475d5502f33a6c5b149b0afe96316ad1962a64a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52817/CVE-2023-52817-f475d5502f33a6c5b149b0afe96316ad1962a64a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/174f62a0aa15c211e60208b41ee9e7cdfb73d455",
            "https://git.kernel.org/stable/c/437e0fa907ba39b4d7eda863c03ea9cf48bd93a9",
            "https://git.kernel.org/stable/c/5104fdf50d326db2c1a994f8b35dcd46e63ae4ad",
            "https://git.kernel.org/stable/c/6c1b3d89a2dda79881726bb6e37af19c0936d736",
            "https://git.kernel.org/stable/c/820daf9ffe2b0afb804567b10983fb38bc5ae288",
            "https://git.kernel.org/stable/c/ba3c0796d292de84f2932cc5bbb0f771fc720996",
            "https://git.kernel.org/stable/c/bf2d51eedf03bd61e3556e35d74d49e2e6112398",
            "https://git.kernel.org/stable/c/f475d5502f33a6c5b149b0afe96316ad1962a64a",
            "https://www.cve.org/CVERecord?id=CVE-2023-52817\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52817\nhttps://lore.kernel.org/linux-cve-announce/2024052104-CVE-2023-52817-ba29@gregkh/T"
        ]
    },
    "CVE-2023-52832": {
        "cve": "CVE-2023-52832",
        "cvss_v2": null,
        "cvss_v3": 9.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: don't return unset power in ieee80211_get_tx_power()\n\nWe can get a UBSAN warning if ieee80211_get_tx_power() returns the\nINT_MIN value mac80211 internally uses for \"unset power level\".\n\n UBSAN: signed-integer-overflow in net/wireless/nl80211.c:3816:5\n -2147483648 * 100 cannot be represented in type 'int'\n CPU: 0 PID: 20433 Comm: insmod Tainted: G        WC OE\n Call Trace:\n  dump_stack+0x74/0x92\n  ubsan_epilogue+0x9/0x50\n  handle_overflow+0x8d/0xd0\n  __ubsan_handle_mul_overflow+0xe/0x10\n  nl80211_send_iface+0x688/0x6b0 [cfg80211]\n  [...]\n  cfg80211_register_wdev+0x78/0xb0 [cfg80211]\n  cfg80211_netdev_notifier_call+0x200/0x620 [cfg80211]\n  [...]\n  ieee80211_if_add+0x60e/0x8f0 [mac80211]\n  ieee80211_register_hw+0xda5/0x1170 [mac80211]\n\nIn this case, simply return an error instead, to indicate\nthat no data is available.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52832",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2be24c47ac19bf639c48c082486c08888bd603c6",
            "patch_url": "https://git.kernel.org/stable/p/2be24c47ac19bf639c48c082486c08888bd603c6",
            "filename": "CVE-2023-52832-2be24c47ac19bf639c48c082486c08888bd603c6.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52832/CVE-2023-52832-2be24c47ac19bf639c48c082486c08888bd603c6.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1571120c44dbe5757aee1612c5b6097cdc42710f",
                "patch_url": "https://git.kernel.org/stable/p/1571120c44dbe5757aee1612c5b6097cdc42710f",
                "filename": "CVE-2023-52832-1571120c44dbe5757aee1612c5b6097cdc42710f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52832/CVE-2023-52832-1571120c44dbe5757aee1612c5b6097cdc42710f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/21a0f310a9f3bfd2b4cf4f382430e638607db846",
                "patch_url": "https://git.kernel.org/stable/p/21a0f310a9f3bfd2b4cf4f382430e638607db846",
                "filename": "CVE-2023-52832-21a0f310a9f3bfd2b4cf4f382430e638607db846.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52832/CVE-2023-52832-21a0f310a9f3bfd2b4cf4f382430e638607db846.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/298e767362cade639b7121ecb3cc5345b6529f62",
                "patch_url": "https://git.kernel.org/stable/p/298e767362cade639b7121ecb3cc5345b6529f62",
                "filename": "CVE-2023-52832-298e767362cade639b7121ecb3cc5345b6529f62.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52832/CVE-2023-52832-298e767362cade639b7121ecb3cc5345b6529f62.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2be24c47ac19bf639c48c082486c08888bd603c6",
                "patch_url": "https://git.kernel.org/stable/p/2be24c47ac19bf639c48c082486c08888bd603c6",
                "filename": "CVE-2023-52832-2be24c47ac19bf639c48c082486c08888bd603c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52832/CVE-2023-52832-2be24c47ac19bf639c48c082486c08888bd603c6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5a94cffe90e20e8fade0b9abd4370bd671fe87c7",
                "patch_url": "https://git.kernel.org/stable/p/5a94cffe90e20e8fade0b9abd4370bd671fe87c7",
                "filename": "CVE-2023-52832-5a94cffe90e20e8fade0b9abd4370bd671fe87c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52832/CVE-2023-52832-5a94cffe90e20e8fade0b9abd4370bd671fe87c7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/717de20abdcd1d4993fa450e28b8086a352620ea",
                "patch_url": "https://git.kernel.org/stable/p/717de20abdcd1d4993fa450e28b8086a352620ea",
                "filename": "CVE-2023-52832-717de20abdcd1d4993fa450e28b8086a352620ea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52832/CVE-2023-52832-717de20abdcd1d4993fa450e28b8086a352620ea.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/adc2474d823fe81d8da759207f4f1d3691aa775a",
                "patch_url": "https://git.kernel.org/stable/p/adc2474d823fe81d8da759207f4f1d3691aa775a",
                "filename": "CVE-2023-52832-adc2474d823fe81d8da759207f4f1d3691aa775a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52832/CVE-2023-52832-adc2474d823fe81d8da759207f4f1d3691aa775a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e160ab85166e77347d0cbe5149045cb25e83937f",
                "patch_url": "https://git.kernel.org/stable/p/e160ab85166e77347d0cbe5149045cb25e83937f",
                "filename": "CVE-2023-52832-e160ab85166e77347d0cbe5149045cb25e83937f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52832/CVE-2023-52832-e160ab85166e77347d0cbe5149045cb25e83937f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/efeae5f4972f75d50002bc50eb112ab9e7069b18",
                "patch_url": "https://git.kernel.org/stable/p/efeae5f4972f75d50002bc50eb112ab9e7069b18",
                "filename": "CVE-2023-52832-efeae5f4972f75d50002bc50eb112ab9e7069b18.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52832/CVE-2023-52832-efeae5f4972f75d50002bc50eb112ab9e7069b18.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1571120c44dbe5757aee1612c5b6097cdc42710f",
            "https://git.kernel.org/stable/c/21a0f310a9f3bfd2b4cf4f382430e638607db846",
            "https://git.kernel.org/stable/c/298e767362cade639b7121ecb3cc5345b6529f62",
            "https://git.kernel.org/stable/c/2be24c47ac19bf639c48c082486c08888bd603c6",
            "https://git.kernel.org/stable/c/5a94cffe90e20e8fade0b9abd4370bd671fe87c7",
            "https://git.kernel.org/stable/c/717de20abdcd1d4993fa450e28b8086a352620ea",
            "https://git.kernel.org/stable/c/adc2474d823fe81d8da759207f4f1d3691aa775a",
            "https://git.kernel.org/stable/c/e160ab85166e77347d0cbe5149045cb25e83937f",
            "https://git.kernel.org/stable/c/efeae5f4972f75d50002bc50eb112ab9e7069b18",
            "https://www.cve.org/CVERecord?id=CVE-2023-52832\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52832\nhttps://lore.kernel.org/linux-cve-announce/2024052108-CVE-2023-52832-b9d9@gregkh/T"
        ]
    },
    "CVE-2023-52834": {
        "cve": "CVE-2023-52834",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\natl1c: Work around the DMA RX overflow issue\n\nThis is based on alx driver commit 881d0327db37 (\"net: alx: Work around\nthe DMA RX overflow issue\").\n\nThe alx and atl1c drivers had RX overflow error which was why a custom\nallocator was created to avoid certain addresses. The simpler workaround\nthen created for alx driver, but not for atl1c due to lack of tester.\n\nInstead of using a custom allocator, check the allocated skb address and\nuse skb_reserve() to move away from problematic 0x...fc0 address.\n\nTested on AR8131 on Acer 4540.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52834",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/32f08b7b430ee01ec47d730f961a3306c1c7b6fb",
            "patch_url": "https://git.kernel.org/stable/p/32f08b7b430ee01ec47d730f961a3306c1c7b6fb",
            "filename": "CVE-2023-52834-32f08b7b430ee01ec47d730f961a3306c1c7b6fb.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52834/CVE-2023-52834-32f08b7b430ee01ec47d730f961a3306c1c7b6fb.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/32f08b7b430ee01ec47d730f961a3306c1c7b6fb",
                "patch_url": "https://git.kernel.org/stable/p/32f08b7b430ee01ec47d730f961a3306c1c7b6fb",
                "filename": "CVE-2023-52834-32f08b7b430ee01ec47d730f961a3306c1c7b6fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52834/CVE-2023-52834-32f08b7b430ee01ec47d730f961a3306c1c7b6fb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/54a6152da4993ec8e4b53dc3cf577f5a2c829afa",
                "patch_url": "https://git.kernel.org/stable/p/54a6152da4993ec8e4b53dc3cf577f5a2c829afa",
                "filename": "CVE-2023-52834-54a6152da4993ec8e4b53dc3cf577f5a2c829afa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52834/CVE-2023-52834-54a6152da4993ec8e4b53dc3cf577f5a2c829afa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/57e44ff9c2c9747b2b1a53556810b0e5192655d6",
                "patch_url": "https://git.kernel.org/stable/p/57e44ff9c2c9747b2b1a53556810b0e5192655d6",
                "filename": "CVE-2023-52834-57e44ff9c2c9747b2b1a53556810b0e5192655d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52834/CVE-2023-52834-57e44ff9c2c9747b2b1a53556810b0e5192655d6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/86565682e9053e5deb128193ea9e88531bbae9cf",
                "patch_url": "https://git.kernel.org/stable/p/86565682e9053e5deb128193ea9e88531bbae9cf",
                "filename": "CVE-2023-52834-86565682e9053e5deb128193ea9e88531bbae9cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52834/CVE-2023-52834-86565682e9053e5deb128193ea9e88531bbae9cf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c29a89b23f67ee592f4dee61f9d7efbf86d60315",
                "patch_url": "https://git.kernel.org/stable/p/c29a89b23f67ee592f4dee61f9d7efbf86d60315",
                "filename": "CVE-2023-52834-c29a89b23f67ee592f4dee61f9d7efbf86d60315.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52834/CVE-2023-52834-c29a89b23f67ee592f4dee61f9d7efbf86d60315.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/32f08b7b430ee01ec47d730f961a3306c1c7b6fb",
            "https://git.kernel.org/stable/c/54a6152da4993ec8e4b53dc3cf577f5a2c829afa",
            "https://git.kernel.org/stable/c/57e44ff9c2c9747b2b1a53556810b0e5192655d6",
            "https://git.kernel.org/stable/c/86565682e9053e5deb128193ea9e88531bbae9cf",
            "https://git.kernel.org/stable/c/c29a89b23f67ee592f4dee61f9d7efbf86d60315",
            "https://www.cve.org/CVERecord?id=CVE-2023-52834\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52834\nhttps://lore.kernel.org/linux-cve-announce/2024052109-CVE-2023-52834-4c46@gregkh/T"
        ]
    },
    "CVE-2023-52835": {
        "cve": "CVE-2023-52835",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Bail out early if the request AUX area is out of bound\n\nWhen perf-record with a large AUX area, e.g 4GB, it fails with:\n\n    #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1\n    failed to mmap with 12 (Cannot allocate memory)\n\nand it reveals a WARNING with __alloc_pages():\n\n\t------------[ cut here ]------------\n\tWARNING: CPU: 44 PID: 17573 at mm/page_alloc.c:5568 __alloc_pages+0x1ec/0x248\n\tCall trace:\n\t __alloc_pages+0x1ec/0x248\n\t __kmalloc_large_node+0xc0/0x1f8\n\t __kmalloc_node+0x134/0x1e8\n\t rb_alloc_aux+0xe0/0x298\n\t perf_mmap+0x440/0x660\n\t mmap_region+0x308/0x8a8\n\t do_mmap+0x3c0/0x528\n\t vm_mmap_pgoff+0xf4/0x1b8\n\t ksys_mmap_pgoff+0x18c/0x218\n\t __arm64_sys_mmap+0x38/0x58\n\t invoke_syscall+0x50/0x128\n\t el0_svc_common.constprop.0+0x58/0x188\n\t do_el0_svc+0x34/0x50\n\t el0_svc+0x34/0x108\n\t el0t_64_sync_handler+0xb8/0xc0\n\t el0t_64_sync+0x1a4/0x1a8\n\n'rb->aux_pages' allocated by kcalloc() is a pointer array which is used to\nmaintains AUX trace pages. The allocated page for this array is physically\ncontiguous (and virtually contiguous) with an order of 0..MAX_ORDER. If the\nsize of pointer array crosses the limitation set by MAX_ORDER, it reveals a\nWARNING.\n\nSo bail out early with -ENOMEM if the request AUX area is out of bound,\ne.g.:\n\n    #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1\n    failed to mmap with 12 (Cannot allocate memory)",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52835",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/fd0df3f8719201dbe61a4d39083d5aecd705399a",
            "patch_url": "https://git.kernel.org/stable/p/fd0df3f8719201dbe61a4d39083d5aecd705399a",
            "filename": "CVE-2023-52835-fd0df3f8719201dbe61a4d39083d5aecd705399a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52835/CVE-2023-52835-fd0df3f8719201dbe61a4d39083d5aecd705399a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1a2a4202c60fcdffbf04f259002ce9bff39edece",
                "patch_url": "https://git.kernel.org/stable/p/1a2a4202c60fcdffbf04f259002ce9bff39edece",
                "filename": "CVE-2023-52835-1a2a4202c60fcdffbf04f259002ce9bff39edece.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52835/CVE-2023-52835-1a2a4202c60fcdffbf04f259002ce9bff39edece.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2424410f94a94d91230ced094062d859714c984a",
                "patch_url": "https://git.kernel.org/stable/p/2424410f94a94d91230ced094062d859714c984a",
                "filename": "CVE-2023-52835-2424410f94a94d91230ced094062d859714c984a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52835/CVE-2023-52835-2424410f94a94d91230ced094062d859714c984a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2e905e608e38cf7f8dcddcf8a6036e91a78444cb",
                "patch_url": "https://git.kernel.org/stable/p/2e905e608e38cf7f8dcddcf8a6036e91a78444cb",
                "filename": "CVE-2023-52835-2e905e608e38cf7f8dcddcf8a6036e91a78444cb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52835/CVE-2023-52835-2e905e608e38cf7f8dcddcf8a6036e91a78444cb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/54aee5f15b83437f23b2b2469bcf21bdd9823916",
                "patch_url": "https://git.kernel.org/stable/p/54aee5f15b83437f23b2b2469bcf21bdd9823916",
                "filename": "CVE-2023-52835-54aee5f15b83437f23b2b2469bcf21bdd9823916.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52835/CVE-2023-52835-54aee5f15b83437f23b2b2469bcf21bdd9823916.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/788c0b3442ead737008934947730a6d1ff703734",
                "patch_url": "https://git.kernel.org/stable/p/788c0b3442ead737008934947730a6d1ff703734",
                "filename": "CVE-2023-52835-788c0b3442ead737008934947730a6d1ff703734.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52835/CVE-2023-52835-788c0b3442ead737008934947730a6d1ff703734.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8c504f615d7ed60ae035c51d0c789137ced6797f",
                "patch_url": "https://git.kernel.org/stable/p/8c504f615d7ed60ae035c51d0c789137ced6797f",
                "filename": "CVE-2023-52835-8c504f615d7ed60ae035c51d0c789137ced6797f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52835/CVE-2023-52835-8c504f615d7ed60ae035c51d0c789137ced6797f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ce4e87a8efd37c85766ec08b15e885cab08553a",
                "patch_url": "https://git.kernel.org/stable/p/9ce4e87a8efd37c85766ec08b15e885cab08553a",
                "filename": "CVE-2023-52835-9ce4e87a8efd37c85766ec08b15e885cab08553a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52835/CVE-2023-52835-9ce4e87a8efd37c85766ec08b15e885cab08553a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fd0df3f8719201dbe61a4d39083d5aecd705399a",
                "patch_url": "https://git.kernel.org/stable/p/fd0df3f8719201dbe61a4d39083d5aecd705399a",
                "filename": "CVE-2023-52835-fd0df3f8719201dbe61a4d39083d5aecd705399a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52835/CVE-2023-52835-fd0df3f8719201dbe61a4d39083d5aecd705399a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1a2a4202c60fcdffbf04f259002ce9bff39edece",
            "https://git.kernel.org/stable/c/2424410f94a94d91230ced094062d859714c984a",
            "https://git.kernel.org/stable/c/2e905e608e38cf7f8dcddcf8a6036e91a78444cb",
            "https://git.kernel.org/stable/c/54aee5f15b83437f23b2b2469bcf21bdd9823916",
            "https://git.kernel.org/stable/c/788c0b3442ead737008934947730a6d1ff703734",
            "https://git.kernel.org/stable/c/8c504f615d7ed60ae035c51d0c789137ced6797f",
            "https://git.kernel.org/stable/c/9ce4e87a8efd37c85766ec08b15e885cab08553a",
            "https://git.kernel.org/stable/c/fd0df3f8719201dbe61a4d39083d5aecd705399a",
            "https://www.cve.org/CVERecord?id=CVE-2023-52835\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52835\nhttps://lore.kernel.org/linux-cve-announce/2024052109-CVE-2023-52835-80ee@gregkh/T"
        ]
    },
    "CVE-2023-52840": {
        "cve": "CVE-2023-52840",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: synaptics-rmi4 - fix use after free in rmi_unregister_function()\n\nThe put_device() calls rmi_release_function() which frees \"fn\" so the\ndereference on the next line \"fn->num_of_irqs\" is a use after free.\nMove the put_device() to the end to fix this.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52840",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/303766bb92c5c225cf40f9bbbe7e29749406e2f2",
            "patch_url": "https://git.kernel.org/stable/p/303766bb92c5c225cf40f9bbbe7e29749406e2f2",
            "filename": "CVE-2023-52840-303766bb92c5c225cf40f9bbbe7e29749406e2f2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52840/CVE-2023-52840-303766bb92c5c225cf40f9bbbe7e29749406e2f2.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2f236d8638f5b43e0c72919a6a27fe286c32053f",
                "patch_url": "https://git.kernel.org/stable/p/2f236d8638f5b43e0c72919a6a27fe286c32053f",
                "filename": "CVE-2023-52840-2f236d8638f5b43e0c72919a6a27fe286c32053f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52840/CVE-2023-52840-2f236d8638f5b43e0c72919a6a27fe286c32053f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/303766bb92c5c225cf40f9bbbe7e29749406e2f2",
                "patch_url": "https://git.kernel.org/stable/p/303766bb92c5c225cf40f9bbbe7e29749406e2f2",
                "filename": "CVE-2023-52840-303766bb92c5c225cf40f9bbbe7e29749406e2f2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52840/CVE-2023-52840-303766bb92c5c225cf40f9bbbe7e29749406e2f2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/50d12253666195a14c6cd2b81c376e2dbeedbdff",
                "patch_url": "https://git.kernel.org/stable/p/50d12253666195a14c6cd2b81c376e2dbeedbdff",
                "filename": "CVE-2023-52840-50d12253666195a14c6cd2b81c376e2dbeedbdff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52840/CVE-2023-52840-50d12253666195a14c6cd2b81c376e2dbeedbdff.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6c71e065befb2fae8f1461559b940c04e1071bd5",
                "patch_url": "https://git.kernel.org/stable/p/6c71e065befb2fae8f1461559b940c04e1071bd5",
                "filename": "CVE-2023-52840-6c71e065befb2fae8f1461559b940c04e1071bd5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52840/CVE-2023-52840-6c71e065befb2fae8f1461559b940c04e1071bd5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7082b1fb5321037bc11ba1cf2d7ed23c6b2b521f",
                "patch_url": "https://git.kernel.org/stable/p/7082b1fb5321037bc11ba1cf2d7ed23c6b2b521f",
                "filename": "CVE-2023-52840-7082b1fb5321037bc11ba1cf2d7ed23c6b2b521f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52840/CVE-2023-52840-7082b1fb5321037bc11ba1cf2d7ed23c6b2b521f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c8e639f5743cf4b01f8c65e0df075fe4d782b585",
                "patch_url": "https://git.kernel.org/stable/p/c8e639f5743cf4b01f8c65e0df075fe4d782b585",
                "filename": "CVE-2023-52840-c8e639f5743cf4b01f8c65e0df075fe4d782b585.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52840/CVE-2023-52840-c8e639f5743cf4b01f8c65e0df075fe4d782b585.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cc56c4d17721dcb10ad4e9c9266e449be1462683",
                "patch_url": "https://git.kernel.org/stable/p/cc56c4d17721dcb10ad4e9c9266e449be1462683",
                "filename": "CVE-2023-52840-cc56c4d17721dcb10ad4e9c9266e449be1462683.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52840/CVE-2023-52840-cc56c4d17721dcb10ad4e9c9266e449be1462683.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eb988e46da2e4eae89f5337e047ce372fe33d5b1",
                "patch_url": "https://git.kernel.org/stable/p/eb988e46da2e4eae89f5337e047ce372fe33d5b1",
                "filename": "CVE-2023-52840-eb988e46da2e4eae89f5337e047ce372fe33d5b1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52840/CVE-2023-52840-eb988e46da2e4eae89f5337e047ce372fe33d5b1.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2f236d8638f5b43e0c72919a6a27fe286c32053f",
            "https://git.kernel.org/stable/c/303766bb92c5c225cf40f9bbbe7e29749406e2f2",
            "https://git.kernel.org/stable/c/50d12253666195a14c6cd2b81c376e2dbeedbdff",
            "https://git.kernel.org/stable/c/6c71e065befb2fae8f1461559b940c04e1071bd5",
            "https://git.kernel.org/stable/c/7082b1fb5321037bc11ba1cf2d7ed23c6b2b521f",
            "https://git.kernel.org/stable/c/c8e639f5743cf4b01f8c65e0df075fe4d782b585",
            "https://git.kernel.org/stable/c/cc56c4d17721dcb10ad4e9c9266e449be1462683",
            "https://git.kernel.org/stable/c/eb988e46da2e4eae89f5337e047ce372fe33d5b1",
            "https://www.cve.org/CVERecord?id=CVE-2023-52840\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52840\nhttps://lore.kernel.org/linux-cve-announce/2024052111-CVE-2023-52840-8a3d@gregkh/T"
        ]
    },
    "CVE-2023-52845": {
        "cve": "CVE-2023-52845",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Change nla_policy for bearer-related names to NLA_NUL_STRING\n\nsyzbot reported the following uninit-value access issue [1]:\n\n=====================================================\nBUG: KMSAN: uninit-value in strlen lib/string.c:418 [inline]\nBUG: KMSAN: uninit-value in strstr+0xb8/0x2f0 lib/string.c:756\n strlen lib/string.c:418 [inline]\n strstr+0xb8/0x2f0 lib/string.c:756\n tipc_nl_node_reset_link_stats+0x3ea/0xb50 net/tipc/node.c:2595\n genl_family_rcv_msg_doit net/netlink/genetlink.c:971 [inline]\n genl_family_rcv_msg net/netlink/genetlink.c:1051 [inline]\n genl_rcv_msg+0x11ec/0x1290 net/netlink/genetlink.c:1066\n netlink_rcv_skb+0x371/0x650 net/netlink/af_netlink.c:2545\n genl_rcv+0x40/0x60 net/netlink/genetlink.c:1075\n netlink_unicast_kernel net/netlink/af_netlink.c:1342 [inline]\n netlink_unicast+0xf47/0x1250 net/netlink/af_netlink.c:1368\n netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910\n sock_sendmsg_nosec net/socket.c:730 [inline]\n sock_sendmsg net/socket.c:753 [inline]\n ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595\n __sys_sendmsg net/socket.c:2624 [inline]\n __do_sys_sendmsg net/socket.c:2633 [inline]\n __se_sys_sendmsg net/socket.c:2631 [inline]\n __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUninit was created at:\n slab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767\n slab_alloc_node mm/slub.c:3478 [inline]\n kmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:559\n __alloc_skb+0x318/0x740 net/core/skbuff.c:650\n alloc_skb include/linux/skbuff.h:1286 [inline]\n netlink_alloc_large_skb net/netlink/af_netlink.c:1214 [inline]\n netlink_sendmsg+0xb34/0x13d0 net/netlink/af_netlink.c:1885\n sock_sendmsg_nosec net/socket.c:730 [inline]\n sock_sendmsg net/socket.c:753 [inline]\n ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595\n __sys_sendmsg net/socket.c:2624 [inline]\n __do_sys_sendmsg net/socket.c:2633 [inline]\n __se_sys_sendmsg net/socket.c:2631 [inline]\n __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nTIPC bearer-related names including link names must be null-terminated\nstrings. If a link name which is not null-terminated is passed through\nnetlink, strstr() and similar functions can cause buffer overrun. This\ncauses the above issue.\n\nThis patch changes the nla_policy for bearer-related names from NLA_STRING\nto NLA_NUL_STRING. This resolves the issue by ensuring that only\nnull-terminated strings are accepted as bearer-related names.\n\nsyzbot reported similar uninit-value issue related to bearer names [2]. The\nroot cause of this issue is that a non-null-terminated bearer name was\npassed. This patch also resolved this issue.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52845",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/19b3f72a41a8751e26bffc093bb7e1cef29ad579",
            "patch_url": "https://git.kernel.org/stable/p/19b3f72a41a8751e26bffc093bb7e1cef29ad579",
            "filename": "CVE-2023-52845-19b3f72a41a8751e26bffc093bb7e1cef29ad579.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52845/CVE-2023-52845-19b3f72a41a8751e26bffc093bb7e1cef29ad579.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/19b3f72a41a8751e26bffc093bb7e1cef29ad579",
                "patch_url": "https://git.kernel.org/stable/p/19b3f72a41a8751e26bffc093bb7e1cef29ad579",
                "filename": "CVE-2023-52845-19b3f72a41a8751e26bffc093bb7e1cef29ad579.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52845/CVE-2023-52845-19b3f72a41a8751e26bffc093bb7e1cef29ad579.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2199260c42e6fbc5af8adae3bf78e623407c91b0",
                "patch_url": "https://git.kernel.org/stable/p/2199260c42e6fbc5af8adae3bf78e623407c91b0",
                "filename": "CVE-2023-52845-2199260c42e6fbc5af8adae3bf78e623407c91b0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52845/CVE-2023-52845-2199260c42e6fbc5af8adae3bf78e623407c91b0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2426425d686b43adbc4f2f4a367b494f06f159d6",
                "patch_url": "https://git.kernel.org/stable/p/2426425d686b43adbc4f2f4a367b494f06f159d6",
                "filename": "CVE-2023-52845-2426425d686b43adbc4f2f4a367b494f06f159d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52845/CVE-2023-52845-2426425d686b43adbc4f2f4a367b494f06f159d6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3907b89cd17fcc23e9a80789c36856f00ece0ba8",
                "patch_url": "https://git.kernel.org/stable/p/3907b89cd17fcc23e9a80789c36856f00ece0ba8",
                "filename": "CVE-2023-52845-3907b89cd17fcc23e9a80789c36856f00ece0ba8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52845/CVE-2023-52845-3907b89cd17fcc23e9a80789c36856f00ece0ba8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4c731e98fe4d678e87ba3e4d45d3cf0a5a193dc4",
                "patch_url": "https://git.kernel.org/stable/p/4c731e98fe4d678e87ba3e4d45d3cf0a5a193dc4",
                "filename": "CVE-2023-52845-4c731e98fe4d678e87ba3e4d45d3cf0a5a193dc4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52845/CVE-2023-52845-4c731e98fe4d678e87ba3e4d45d3cf0a5a193dc4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/560992f41c0cea44b7603bc9e6c73bffbf6b5709",
                "patch_url": "https://git.kernel.org/stable/p/560992f41c0cea44b7603bc9e6c73bffbf6b5709",
                "filename": "CVE-2023-52845-560992f41c0cea44b7603bc9e6c73bffbf6b5709.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52845/CVE-2023-52845-560992f41c0cea44b7603bc9e6c73bffbf6b5709.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6744008c354bca2e4686a5b6056ee6b535d9f67d",
                "patch_url": "https://git.kernel.org/stable/p/6744008c354bca2e4686a5b6056ee6b535d9f67d",
                "filename": "CVE-2023-52845-6744008c354bca2e4686a5b6056ee6b535d9f67d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52845/CVE-2023-52845-6744008c354bca2e4686a5b6056ee6b535d9f67d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/abc1582119e8c4af14cedb0db6541fd603f45a04",
                "patch_url": "https://git.kernel.org/stable/p/abc1582119e8c4af14cedb0db6541fd603f45a04",
                "filename": "CVE-2023-52845-abc1582119e8c4af14cedb0db6541fd603f45a04.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52845/CVE-2023-52845-abc1582119e8c4af14cedb0db6541fd603f45a04.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b33d130f07f1decd756b849ab03c23d11d4dd294",
                "patch_url": "https://git.kernel.org/stable/p/b33d130f07f1decd756b849ab03c23d11d4dd294",
                "filename": "CVE-2023-52845-b33d130f07f1decd756b849ab03c23d11d4dd294.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52845/CVE-2023-52845-b33d130f07f1decd756b849ab03c23d11d4dd294.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/19b3f72a41a8751e26bffc093bb7e1cef29ad579",
            "https://git.kernel.org/stable/c/2199260c42e6fbc5af8adae3bf78e623407c91b0",
            "https://git.kernel.org/stable/c/2426425d686b43adbc4f2f4a367b494f06f159d6",
            "https://git.kernel.org/stable/c/3907b89cd17fcc23e9a80789c36856f00ece0ba8",
            "https://git.kernel.org/stable/c/4c731e98fe4d678e87ba3e4d45d3cf0a5a193dc4",
            "https://git.kernel.org/stable/c/560992f41c0cea44b7603bc9e6c73bffbf6b5709",
            "https://git.kernel.org/stable/c/6744008c354bca2e4686a5b6056ee6b535d9f67d",
            "https://git.kernel.org/stable/c/abc1582119e8c4af14cedb0db6541fd603f45a04",
            "https://git.kernel.org/stable/c/b33d130f07f1decd756b849ab03c23d11d4dd294",
            "https://www.cve.org/CVERecord?id=CVE-2023-52845\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52845\nhttps://lore.kernel.org/linux-cve-announce/2024052112-CVE-2023-52845-0245@gregkh/T"
        ]
    },
    "CVE-2023-52847": {
        "cve": "CVE-2023-52847",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: bttv: fix use after free error due to btv->timeout timer\n\nThere may be some a race condition between timer function\nbttv_irq_timeout and bttv_remove. The timer is setup in\nprobe and there is no timer_delete operation in remove\nfunction. When it hit kfree btv, the function might still be\ninvoked, which will cause use after free bug.\n\nThis bug is found by static analysis, it may be false positive.\n\nFix it by adding del_timer_sync invoking to the remove function.\n\ncpu0                cpu1\n                  bttv_probe\n                    ->timer_setup\n                      ->bttv_set_dma\n                        ->mod_timer;\nbttv_remove\n  ->kfree(btv);\n                  ->bttv_irq_timeout\n                    ->USE btv",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52847",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9",
            "patch_url": "https://git.kernel.org/stable/p/bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9",
            "filename": "CVE-2023-52847-bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52847/CVE-2023-52847-bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1871014d6ef4812ad11ef7d838d73ce09d632267",
                "patch_url": "https://git.kernel.org/stable/p/1871014d6ef4812ad11ef7d838d73ce09d632267",
                "filename": "CVE-2023-52847-1871014d6ef4812ad11ef7d838d73ce09d632267.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52847/CVE-2023-52847-1871014d6ef4812ad11ef7d838d73ce09d632267.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/20568d06f6069cb835e05eed432edf962645d226",
                "patch_url": "https://git.kernel.org/stable/p/20568d06f6069cb835e05eed432edf962645d226",
                "filename": "CVE-2023-52847-20568d06f6069cb835e05eed432edf962645d226.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52847/CVE-2023-52847-20568d06f6069cb835e05eed432edf962645d226.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f3d9198cdae1cb079ec8652f4defacd481eab2b",
                "patch_url": "https://git.kernel.org/stable/p/2f3d9198cdae1cb079ec8652f4defacd481eab2b",
                "filename": "CVE-2023-52847-2f3d9198cdae1cb079ec8652f4defacd481eab2b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52847/CVE-2023-52847-2f3d9198cdae1cb079ec8652f4defacd481eab2b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/51c94256a83fe4e17406c66ff3e1ad7d242d8574",
                "patch_url": "https://git.kernel.org/stable/p/51c94256a83fe4e17406c66ff3e1ad7d242d8574",
                "filename": "CVE-2023-52847-51c94256a83fe4e17406c66ff3e1ad7d242d8574.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52847/CVE-2023-52847-51c94256a83fe4e17406c66ff3e1ad7d242d8574.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/847599fffa528b2cdec4e21b6bf7586dad982132",
                "patch_url": "https://git.kernel.org/stable/p/847599fffa528b2cdec4e21b6bf7586dad982132",
                "filename": "CVE-2023-52847-847599fffa528b2cdec4e21b6bf7586dad982132.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52847/CVE-2023-52847-847599fffa528b2cdec4e21b6bf7586dad982132.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b35fdade92c5058a5e727e233fe263b828de2c9a",
                "patch_url": "https://git.kernel.org/stable/p/b35fdade92c5058a5e727e233fe263b828de2c9a",
                "filename": "CVE-2023-52847-b35fdade92c5058a5e727e233fe263b828de2c9a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52847/CVE-2023-52847-b35fdade92c5058a5e727e233fe263b828de2c9a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9",
                "patch_url": "https://git.kernel.org/stable/p/bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9",
                "filename": "CVE-2023-52847-bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52847/CVE-2023-52847-bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bd5b50b329e850d467e7bcc07b2b6bde3752fbda",
                "patch_url": "https://git.kernel.org/stable/p/bd5b50b329e850d467e7bcc07b2b6bde3752fbda",
                "filename": "CVE-2023-52847-bd5b50b329e850d467e7bcc07b2b6bde3752fbda.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52847/CVE-2023-52847-bd5b50b329e850d467e7bcc07b2b6bde3752fbda.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1871014d6ef4812ad11ef7d838d73ce09d632267",
            "https://git.kernel.org/stable/c/20568d06f6069cb835e05eed432edf962645d226",
            "https://git.kernel.org/stable/c/2f3d9198cdae1cb079ec8652f4defacd481eab2b",
            "https://git.kernel.org/stable/c/51c94256a83fe4e17406c66ff3e1ad7d242d8574",
            "https://git.kernel.org/stable/c/847599fffa528b2cdec4e21b6bf7586dad982132",
            "https://git.kernel.org/stable/c/b35fdade92c5058a5e727e233fe263b828de2c9a",
            "https://git.kernel.org/stable/c/bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9",
            "https://git.kernel.org/stable/c/bd5b50b329e850d467e7bcc07b2b6bde3752fbda",
            "https://www.cve.org/CVERecord?id=CVE-2023-52847\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52847\nhttps://lore.kernel.org/linux-cve-announce/2024052113-CVE-2023-52847-a551@gregkh/T"
        ]
    },
    "CVE-2023-52864": {
        "cve": "CVE-2023-52864",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: wmi: Fix opening of char device\n\nSince commit fa1f68db6ca7 (\"drivers: misc: pass miscdevice pointer via\nfile private data\"), the miscdevice stores a pointer to itself inside\nfilp->private_data, which means that private_data will not be NULL when\nwmi_char_open() is called. This might cause memory corruption should\nwmi_char_open() be unable to find its driver, something which can\nhappen when the associated WMI device is deleted in wmi_free_devices().\n\nFix the problem by using the miscdevice pointer to retrieve the WMI\ndevice data associated with a char device using container_of(). This\nalso avoids wmi_char_open() picking a wrong WMI device bound to a\ndriver with the same name as the original driver.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52864",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/36d85fa7ae0d6be651c1a745191fa7ef055db43e",
            "patch_url": "https://git.kernel.org/stable/p/36d85fa7ae0d6be651c1a745191fa7ef055db43e",
            "filename": "CVE-2023-52864-36d85fa7ae0d6be651c1a745191fa7ef055db43e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52864/CVE-2023-52864-36d85fa7ae0d6be651c1a745191fa7ef055db43e.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/36d85fa7ae0d6be651c1a745191fa7ef055db43e",
                "patch_url": "https://git.kernel.org/stable/p/36d85fa7ae0d6be651c1a745191fa7ef055db43e",
                "filename": "CVE-2023-52864-36d85fa7ae0d6be651c1a745191fa7ef055db43e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52864/CVE-2023-52864-36d85fa7ae0d6be651c1a745191fa7ef055db43e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/44a96796d25809502c75771d40ee693c2e44724e",
                "patch_url": "https://git.kernel.org/stable/p/44a96796d25809502c75771d40ee693c2e44724e",
                "filename": "CVE-2023-52864-44a96796d25809502c75771d40ee693c2e44724e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52864/CVE-2023-52864-44a96796d25809502c75771d40ee693c2e44724e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9fb0eed09e1470cd4021ff52b2b9dfcbcee4c203",
                "patch_url": "https://git.kernel.org/stable/p/9fb0eed09e1470cd4021ff52b2b9dfcbcee4c203",
                "filename": "CVE-2023-52864-9fb0eed09e1470cd4021ff52b2b9dfcbcee4c203.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52864/CVE-2023-52864-9fb0eed09e1470cd4021ff52b2b9dfcbcee4c203.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf098e937dd125c0317a0d6f261ac2a950a233d6",
                "patch_url": "https://git.kernel.org/stable/p/cf098e937dd125c0317a0d6f261ac2a950a233d6",
                "filename": "CVE-2023-52864-cf098e937dd125c0317a0d6f261ac2a950a233d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52864/CVE-2023-52864-cf098e937dd125c0317a0d6f261ac2a950a233d6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d426a2955e45a95b2282764105fcfb110a540453",
                "patch_url": "https://git.kernel.org/stable/p/d426a2955e45a95b2282764105fcfb110a540453",
                "filename": "CVE-2023-52864-d426a2955e45a95b2282764105fcfb110a540453.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52864/CVE-2023-52864-d426a2955e45a95b2282764105fcfb110a540453.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e0bf076b734a2fab92d8fddc2b8b03462eee7097",
                "patch_url": "https://git.kernel.org/stable/p/e0bf076b734a2fab92d8fddc2b8b03462eee7097",
                "filename": "CVE-2023-52864-e0bf076b734a2fab92d8fddc2b8b03462eee7097.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52864/CVE-2023-52864-e0bf076b734a2fab92d8fddc2b8b03462eee7097.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eba9ac7abab91c8f6d351460239108bef5e7a0b6",
                "patch_url": "https://git.kernel.org/stable/p/eba9ac7abab91c8f6d351460239108bef5e7a0b6",
                "filename": "CVE-2023-52864-eba9ac7abab91c8f6d351460239108bef5e7a0b6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52864/CVE-2023-52864-eba9ac7abab91c8f6d351460239108bef5e7a0b6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fb7b06b59c6887659c6ed0ecd3110835eecbb6a3",
                "patch_url": "https://git.kernel.org/stable/p/fb7b06b59c6887659c6ed0ecd3110835eecbb6a3",
                "filename": "CVE-2023-52864-fb7b06b59c6887659c6ed0ecd3110835eecbb6a3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52864/CVE-2023-52864-fb7b06b59c6887659c6ed0ecd3110835eecbb6a3.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/36d85fa7ae0d6be651c1a745191fa7ef055db43e",
            "https://git.kernel.org/stable/c/44a96796d25809502c75771d40ee693c2e44724e",
            "https://git.kernel.org/stable/c/9fb0eed09e1470cd4021ff52b2b9dfcbcee4c203",
            "https://git.kernel.org/stable/c/cf098e937dd125c0317a0d6f261ac2a950a233d6",
            "https://git.kernel.org/stable/c/d426a2955e45a95b2282764105fcfb110a540453",
            "https://git.kernel.org/stable/c/e0bf076b734a2fab92d8fddc2b8b03462eee7097",
            "https://git.kernel.org/stable/c/eba9ac7abab91c8f6d351460239108bef5e7a0b6",
            "https://git.kernel.org/stable/c/fb7b06b59c6887659c6ed0ecd3110835eecbb6a3",
            "https://www.cve.org/CVERecord?id=CVE-2023-52864\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52864\nhttps://lore.kernel.org/linux-cve-announce/2024052118-CVE-2023-52864-15cd@gregkh/T"
        ]
    },
    "CVE-2023-52877": {
        "cve": "CVE-2023-52877",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()\n\nIt is possible that typec_register_partner() returns ERR_PTR on failure.\nWhen port->partner is an error, a NULL pointer dereference may occur as\nshown below.\n\n[91222.095236][  T319] typec port0: failed to register partner (-17)\n...\n[91225.061491][  T319] Unable to handle kernel NULL pointer dereference\nat virtual address 000000000000039f\n[91225.274642][  T319] pc : tcpm_pd_data_request+0x310/0x13fc\n[91225.274646][  T319] lr : tcpm_pd_data_request+0x298/0x13fc\n[91225.308067][  T319] Call trace:\n[91225.308070][  T319]  tcpm_pd_data_request+0x310/0x13fc\n[91225.308073][  T319]  tcpm_pd_rx_handler+0x100/0x9e8\n[91225.355900][  T319]  kthread_worker_fn+0x178/0x58c\n[91225.355902][  T319]  kthread+0x150/0x200\n[91225.355905][  T319]  ret_from_fork+0x10/0x30\n\nAdd a check for port->partner to avoid dereferencing a NULL pointer.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52877",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/e5f53a68a596e04df3fde3099273435a30b6fdac",
            "patch_url": "https://git.kernel.org/stable/p/e5f53a68a596e04df3fde3099273435a30b6fdac",
            "filename": "CVE-2023-52877-e5f53a68a596e04df3fde3099273435a30b6fdac.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52877/CVE-2023-52877-e5f53a68a596e04df3fde3099273435a30b6fdac.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4987daf86c152ff882d51572d154ad12e4ff3a4b",
                "patch_url": "https://git.kernel.org/stable/p/4987daf86c152ff882d51572d154ad12e4ff3a4b",
                "filename": "CVE-2023-52877-4987daf86c152ff882d51572d154ad12e4ff3a4b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52877/CVE-2023-52877-4987daf86c152ff882d51572d154ad12e4ff3a4b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ee038590d808a95d16adf92818dcd4752273c08",
                "patch_url": "https://git.kernel.org/stable/p/9ee038590d808a95d16adf92818dcd4752273c08",
                "filename": "CVE-2023-52877-9ee038590d808a95d16adf92818dcd4752273c08.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52877/CVE-2023-52877-9ee038590d808a95d16adf92818dcd4752273c08.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b37a168c0137156042a0ca9626651b5a789e822b",
                "patch_url": "https://git.kernel.org/stable/p/b37a168c0137156042a0ca9626651b5a789e822b",
                "filename": "CVE-2023-52877-b37a168c0137156042a0ca9626651b5a789e822b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52877/CVE-2023-52877-b37a168c0137156042a0ca9626651b5a789e822b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e5f53a68a596e04df3fde3099273435a30b6fdac",
                "patch_url": "https://git.kernel.org/stable/p/e5f53a68a596e04df3fde3099273435a30b6fdac",
                "filename": "CVE-2023-52877-e5f53a68a596e04df3fde3099273435a30b6fdac.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52877/CVE-2023-52877-e5f53a68a596e04df3fde3099273435a30b6fdac.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e7a802447c491903aa7cb45967aa2a934a4e63fc",
                "patch_url": "https://git.kernel.org/stable/p/e7a802447c491903aa7cb45967aa2a934a4e63fc",
                "filename": "CVE-2023-52877-e7a802447c491903aa7cb45967aa2a934a4e63fc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52877/CVE-2023-52877-e7a802447c491903aa7cb45967aa2a934a4e63fc.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4987daf86c152ff882d51572d154ad12e4ff3a4b",
            "https://git.kernel.org/stable/c/9ee038590d808a95d16adf92818dcd4752273c08",
            "https://git.kernel.org/stable/c/b37a168c0137156042a0ca9626651b5a789e822b",
            "https://git.kernel.org/stable/c/e5f53a68a596e04df3fde3099273435a30b6fdac",
            "https://git.kernel.org/stable/c/e7a802447c491903aa7cb45967aa2a934a4e63fc",
            "https://www.cve.org/CVERecord?id=CVE-2023-52877\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52877\nhttps://lore.kernel.org/linux-cve-announce/2024052122-CVE-2023-52877-0826@gregkh/T"
        ]
    },
    "CVE-2023-52878": {
        "cve": "CVE-2023-52878",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds\n\nIf the \"struct can_priv::echoo_skb\" is accessed out of bounds, this\nwould cause a kernel crash. Instead, issue a meaningful warning\nmessage and return with an error.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52878",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4",
            "patch_url": "https://git.kernel.org/stable/p/0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4",
            "filename": "CVE-2023-52878-0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52878/CVE-2023-52878-0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4",
                "patch_url": "https://git.kernel.org/stable/p/0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4",
                "filename": "CVE-2023-52878-0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52878/CVE-2023-52878-0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/53c468008a7c9ca3f5fc985951f35ec2acae85bc",
                "patch_url": "https://git.kernel.org/stable/p/53c468008a7c9ca3f5fc985951f35ec2acae85bc",
                "filename": "CVE-2023-52878-53c468008a7c9ca3f5fc985951f35ec2acae85bc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52878/CVE-2023-52878-53c468008a7c9ca3f5fc985951f35ec2acae85bc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6411959c10fe917288cbb1038886999148560057",
                "patch_url": "https://git.kernel.org/stable/p/6411959c10fe917288cbb1038886999148560057",
                "filename": "CVE-2023-52878-6411959c10fe917288cbb1038886999148560057.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52878/CVE-2023-52878-6411959c10fe917288cbb1038886999148560057.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/826120c9ba68f2d0dbae58e99013929c883d1444",
                "patch_url": "https://git.kernel.org/stable/p/826120c9ba68f2d0dbae58e99013929c883d1444",
                "filename": "CVE-2023-52878-826120c9ba68f2d0dbae58e99013929c883d1444.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52878/CVE-2023-52878-826120c9ba68f2d0dbae58e99013929c883d1444.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8ab67da060157362b2e0926692c659808784708f",
                "patch_url": "https://git.kernel.org/stable/p/8ab67da060157362b2e0926692c659808784708f",
                "filename": "CVE-2023-52878-8ab67da060157362b2e0926692c659808784708f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52878/CVE-2023-52878-8ab67da060157362b2e0926692c659808784708f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4",
            "https://git.kernel.org/stable/c/53c468008a7c9ca3f5fc985951f35ec2acae85bc",
            "https://git.kernel.org/stable/c/6411959c10fe917288cbb1038886999148560057",
            "https://git.kernel.org/stable/c/826120c9ba68f2d0dbae58e99013929c883d1444",
            "https://git.kernel.org/stable/c/8ab67da060157362b2e0926692c659808784708f",
            "https://www.cve.org/CVERecord?id=CVE-2023-52878\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52878\nhttps://lore.kernel.org/linux-cve-announce/2024052122-CVE-2023-52878-d433@gregkh/T"
        ]
    },
    "CVE-2023-52881": {
        "cve": "CVE-2023-52881",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: do not accept ACK of bytes we never sent\n\nThis patch is based on a detailed report and ideas from Yepeng Pan\nand Christian Rossow.\n\nACK seq validation is currently following RFC 5961 5.2 guidelines:\n\n   The ACK value is considered acceptable only if\n   it is in the range of ((SND.UNA - MAX.SND.WND) <= SEG.ACK <=\n   SND.NXT).  All incoming segments whose ACK value doesn't satisfy the\n   above condition MUST be discarded and an ACK sent back.  It needs to\n   be noted that RFC 793 on page 72 (fifth check) says: \"If the ACK is a\n   duplicate (SEG.ACK < SND.UNA), it can be ignored.  If the ACK\n   acknowledges something not yet sent (SEG.ACK > SND.NXT) then send an\n   ACK, drop the segment, and return\".  The \"ignored\" above implies that\n   the processing of the incoming data segment continues, which means\n   the ACK value is treated as acceptable.  This mitigation makes the\n   ACK check more stringent since any ACK < SND.UNA wouldn't be\n   accepted, instead only ACKs that are in the range ((SND.UNA -\n   MAX.SND.WND) <= SEG.ACK <= SND.NXT) get through.\n\nThis can be refined for new (and possibly spoofed) flows,\nby not accepting ACK for bytes that were never sent.\n\nThis greatly improves TCP security at a little cost.\n\nI added a Fixes: tag to make sure this patch will reach stable trees,\neven if the 'blamed' patch was adhering to the RFC.\n\ntp->bytes_acked was added in linux-4.2\n\nFollowing packetdrill test (courtesy of Yepeng Pan) shows\nthe issue at hand:\n\n0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3\n+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0\n+0 bind(3, ..., ...) = 0\n+0 listen(3, 1024) = 0\n\n// ---------------- Handshake ------------------- //\n\n// when window scale is set to 14 the window size can be extended to\n// 65535 * (2^14) = 1073725440. Linux would accept an ACK packet\n// with ack number in (Server_ISN+1-1073725440. Server_ISN+1)\n// ,though this ack number acknowledges some data never\n// sent by the server.\n\n+0 < S 0:0(0) win 65535 <mss 1400,nop,wscale 14>\n+0 > S. 0:0(0) ack 1 <...>\n+0 < . 1:1(0) ack 1 win 65535\n+0 accept(3, ..., ...) = 4\n\n// For the established connection, we send an ACK packet,\n// the ack packet uses ack number 1 - 1073725300 + 2^32,\n// where 2^32 is used to wrap around.\n// Note: we used 1073725300 instead of 1073725440 to avoid possible\n// edge cases.\n// 1 - 1073725300 + 2^32 = 3221241997\n\n// Oops, old kernels happily accept this packet.\n+0 < . 1:1001(1000) ack 3221241997 win 65535\n\n// After the kernel fix the following will be replaced by a challenge ACK,\n// and prior malicious frame would be dropped.\n+0 > . 1:1(0) ack 1001",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52881",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/008b807fe487e0b15a3a6c39add4eb477f73e440",
            "patch_url": "https://git.kernel.org/stable/p/008b807fe487e0b15a3a6c39add4eb477f73e440",
            "filename": "CVE-2023-52881-008b807fe487e0b15a3a6c39add4eb477f73e440.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52881/CVE-2023-52881-008b807fe487e0b15a3a6c39add4eb477f73e440.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/008b807fe487e0b15a3a6c39add4eb477f73e440",
                "patch_url": "https://git.kernel.org/stable/p/008b807fe487e0b15a3a6c39add4eb477f73e440",
                "filename": "CVE-2023-52881-008b807fe487e0b15a3a6c39add4eb477f73e440.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52881/CVE-2023-52881-008b807fe487e0b15a3a6c39add4eb477f73e440.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0d4e0afdd6658cd21dd5be61880411a2553fd1fc",
                "patch_url": "https://git.kernel.org/stable/p/0d4e0afdd6658cd21dd5be61880411a2553fd1fc",
                "filename": "CVE-2023-52881-0d4e0afdd6658cd21dd5be61880411a2553fd1fc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52881/CVE-2023-52881-0d4e0afdd6658cd21dd5be61880411a2553fd1fc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2087d53a66e97a5eb5d1bf558d5bef9e5f891757",
                "patch_url": "https://git.kernel.org/stable/p/2087d53a66e97a5eb5d1bf558d5bef9e5f891757",
                "filename": "CVE-2023-52881-2087d53a66e97a5eb5d1bf558d5bef9e5f891757.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52881/CVE-2023-52881-2087d53a66e97a5eb5d1bf558d5bef9e5f891757.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3d501dd326fb1c73f1b8206d4c6e1d7b15c07e27",
                "patch_url": "https://git.kernel.org/stable/p/3d501dd326fb1c73f1b8206d4c6e1d7b15c07e27",
                "filename": "CVE-2023-52881-3d501dd326fb1c73f1b8206d4c6e1d7b15c07e27.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52881/CVE-2023-52881-3d501dd326fb1c73f1b8206d4c6e1d7b15c07e27.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/458f07ffeccd17f99942311e09ef574ddf4a414a",
                "patch_url": "https://git.kernel.org/stable/p/458f07ffeccd17f99942311e09ef574ddf4a414a",
                "filename": "CVE-2023-52881-458f07ffeccd17f99942311e09ef574ddf4a414a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52881/CVE-2023-52881-458f07ffeccd17f99942311e09ef574ddf4a414a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/69eae75ca5255e876628ac5cee9eaab31f644b57",
                "patch_url": "https://git.kernel.org/stable/p/69eae75ca5255e876628ac5cee9eaab31f644b57",
                "filename": "CVE-2023-52881-69eae75ca5255e876628ac5cee9eaab31f644b57.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52881/CVE-2023-52881-69eae75ca5255e876628ac5cee9eaab31f644b57.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7ffff0cc929fdfc62a74b384c4903d6496c910f0",
                "patch_url": "https://git.kernel.org/stable/p/7ffff0cc929fdfc62a74b384c4903d6496c910f0",
                "filename": "CVE-2023-52881-7ffff0cc929fdfc62a74b384c4903d6496c910f0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52881/CVE-2023-52881-7ffff0cc929fdfc62a74b384c4903d6496c910f0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b17a886ed29f3b70b78ccf632dad03e0c69e3c1a",
                "patch_url": "https://git.kernel.org/stable/p/b17a886ed29f3b70b78ccf632dad03e0c69e3c1a",
                "filename": "CVE-2023-52881-b17a886ed29f3b70b78ccf632dad03e0c69e3c1a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52881/CVE-2023-52881-b17a886ed29f3b70b78ccf632dad03e0c69e3c1a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/008b807fe487e0b15a3a6c39add4eb477f73e440",
            "https://git.kernel.org/stable/c/0d4e0afdd6658cd21dd5be61880411a2553fd1fc",
            "https://git.kernel.org/stable/c/2087d53a66e97a5eb5d1bf558d5bef9e5f891757",
            "https://git.kernel.org/stable/c/3d501dd326fb1c73f1b8206d4c6e1d7b15c07e27",
            "https://git.kernel.org/stable/c/458f07ffeccd17f99942311e09ef574ddf4a414a",
            "https://git.kernel.org/stable/c/69eae75ca5255e876628ac5cee9eaab31f644b57",
            "https://git.kernel.org/stable/c/7ffff0cc929fdfc62a74b384c4903d6496c910f0",
            "https://git.kernel.org/stable/c/b17a886ed29f3b70b78ccf632dad03e0c69e3c1a",
            "https://www.cve.org/CVERecord?id=CVE-2023-52881\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52881\nhttps://lore.kernel.org/all/20231205161841.2702925-1-edumazet@google.com/\nhttps://lore.kernel.org/linux-cve-announce/2024052941-CVE-2023-52881-4283@gregkh/T/#u"
        ]
    },
    "CVE-2023-52922": {
        "cve": "CVE-2023-52922",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: Fix UAF in bcm_proc_show()\n\nBUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80\nRead of size 8 at addr ffff888155846230 by task cat/7862\n\nCPU: 1 PID: 7862 Comm: cat Not tainted 6.5.0-rc1-00153-gc8746099c197 #230\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl+0xd5/0x150\n print_report+0xc1/0x5e0\n kasan_report+0xba/0xf0\n bcm_proc_show+0x969/0xa80\n seq_read_iter+0x4f6/0x1260\n seq_read+0x165/0x210\n proc_reg_read+0x227/0x300\n vfs_read+0x1d5/0x8d0\n ksys_read+0x11e/0x240\n do_syscall_64+0x35/0xb0\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nAllocated by task 7846:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n __kasan_kmalloc+0x9e/0xa0\n bcm_sendmsg+0x264b/0x44e0\n sock_sendmsg+0xda/0x180\n ____sys_sendmsg+0x735/0x920\n ___sys_sendmsg+0x11d/0x1b0\n __sys_sendmsg+0xfa/0x1d0\n do_syscall_64+0x35/0xb0\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nFreed by task 7846:\n kasan_save_stack+0x1e/0x40\n kasan_set_track+0x21/0x30\n kasan_save_free_info+0x27/0x40\n ____kasan_slab_free+0x161/0x1c0\n slab_free_freelist_hook+0x119/0x220\n __kmem_cache_free+0xb4/0x2e0\n rcu_core+0x809/0x1bd0\n\nbcm_op is freed before procfs entry be removed in bcm_release(),\nthis lead to bcm_proc_show() may read the freed bcm_op.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-52922",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9b58d36d0c1ea29a9571e0222a9c29df0ccfb7ff",
            "patch_url": "https://git.kernel.org/stable/p/9b58d36d0c1ea29a9571e0222a9c29df0ccfb7ff",
            "filename": "CVE-2023-52922-9b58d36d0c1ea29a9571e0222a9c29df0ccfb7ff.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52922/CVE-2023-52922-9b58d36d0c1ea29a9571e0222a9c29df0ccfb7ff.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/11b8e27ed448baa385d90154a141466bd5e92f18",
                "patch_url": "https://git.kernel.org/stable/p/11b8e27ed448baa385d90154a141466bd5e92f18",
                "filename": "CVE-2023-52922-11b8e27ed448baa385d90154a141466bd5e92f18.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52922/CVE-2023-52922-11b8e27ed448baa385d90154a141466bd5e92f18.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3c3941bb1eb53abe7d640ffee5c4d6b559829ab3",
                "patch_url": "https://git.kernel.org/stable/p/3c3941bb1eb53abe7d640ffee5c4d6b559829ab3",
                "filename": "CVE-2023-52922-3c3941bb1eb53abe7d640ffee5c4d6b559829ab3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52922/CVE-2023-52922-3c3941bb1eb53abe7d640ffee5c4d6b559829ab3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/55c3b96074f3f9b0aee19bf93cd71af7516582bb",
                "patch_url": "https://git.kernel.org/stable/p/55c3b96074f3f9b0aee19bf93cd71af7516582bb",
                "filename": "CVE-2023-52922-55c3b96074f3f9b0aee19bf93cd71af7516582bb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52922/CVE-2023-52922-55c3b96074f3f9b0aee19bf93cd71af7516582bb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9533dbfac0ff7edd77a5fa2c24974b1d66c8b0a6",
                "patch_url": "https://git.kernel.org/stable/p/9533dbfac0ff7edd77a5fa2c24974b1d66c8b0a6",
                "filename": "CVE-2023-52922-9533dbfac0ff7edd77a5fa2c24974b1d66c8b0a6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52922/CVE-2023-52922-9533dbfac0ff7edd77a5fa2c24974b1d66c8b0a6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/995f47d76647708ec26c6e388663ad4f3f264787",
                "patch_url": "https://git.kernel.org/stable/p/995f47d76647708ec26c6e388663ad4f3f264787",
                "filename": "CVE-2023-52922-995f47d76647708ec26c6e388663ad4f3f264787.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52922/CVE-2023-52922-995f47d76647708ec26c6e388663ad4f3f264787.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9b58d36d0c1ea29a9571e0222a9c29df0ccfb7ff",
                "patch_url": "https://git.kernel.org/stable/p/9b58d36d0c1ea29a9571e0222a9c29df0ccfb7ff",
                "filename": "CVE-2023-52922-9b58d36d0c1ea29a9571e0222a9c29df0ccfb7ff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52922/CVE-2023-52922-9b58d36d0c1ea29a9571e0222a9c29df0ccfb7ff.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf254b4f68e480e73dab055014e002b77aed30ed",
                "patch_url": "https://git.kernel.org/stable/p/cf254b4f68e480e73dab055014e002b77aed30ed",
                "filename": "CVE-2023-52922-cf254b4f68e480e73dab055014e002b77aed30ed.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52922/CVE-2023-52922-cf254b4f68e480e73dab055014e002b77aed30ed.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dfd0aa26e9a07f2ce546ccf8304ead6a2914e8a7",
                "patch_url": "https://git.kernel.org/stable/p/dfd0aa26e9a07f2ce546ccf8304ead6a2914e8a7",
                "filename": "CVE-2023-52922-dfd0aa26e9a07f2ce546ccf8304ead6a2914e8a7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-52922/CVE-2023-52922-dfd0aa26e9a07f2ce546ccf8304ead6a2914e8a7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/11b8e27ed448baa385d90154a141466bd5e92f18",
            "https://git.kernel.org/stable/c/3c3941bb1eb53abe7d640ffee5c4d6b559829ab3",
            "https://git.kernel.org/stable/c/55c3b96074f3f9b0aee19bf93cd71af7516582bb",
            "https://git.kernel.org/stable/c/9533dbfac0ff7edd77a5fa2c24974b1d66c8b0a6",
            "https://git.kernel.org/stable/c/995f47d76647708ec26c6e388663ad4f3f264787",
            "https://git.kernel.org/stable/c/9b58d36d0c1ea29a9571e0222a9c29df0ccfb7ff",
            "https://git.kernel.org/stable/c/cf254b4f68e480e73dab055014e002b77aed30ed",
            "https://git.kernel.org/stable/c/dfd0aa26e9a07f2ce546ccf8304ead6a2914e8a7",
            "https://www.cve.org/CVERecord?id=CVE-2023-52922\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-52922\nhttps://lore.kernel.org/linux-cve-announce/2024112856-CVE-2023-52922-39e1@gregkh/T"
        ]
    },
    "CVE-2023-53125": {
        "cve": "CVE-2023-53125",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: smsc75xx: Limit packet length to skb->len\n\nPacket length retrieved from skb data may be larger than\nthe actual socket buffer length (up to 9026 bytes). In such\ncase the cloned skb passed up the network stack will leak\nkernel memory contents.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-53125",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/8ee5df9c039e37b9d8eb5e3de08bfb7f53d31cb6",
            "patch_url": "https://git.kernel.org/stable/p/8ee5df9c039e37b9d8eb5e3de08bfb7f53d31cb6",
            "filename": "CVE-2023-53125-8ee5df9c039e37b9d8eb5e3de08bfb7f53d31cb6.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53125/CVE-2023-53125-8ee5df9c039e37b9d8eb5e3de08bfb7f53d31cb6.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/105db6574281e1e03fcbf87983f4fee111682306",
                "patch_url": "https://git.kernel.org/stable/p/105db6574281e1e03fcbf87983f4fee111682306",
                "filename": "CVE-2023-53125-105db6574281e1e03fcbf87983f4fee111682306.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53125/CVE-2023-53125-105db6574281e1e03fcbf87983f4fee111682306.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4a4de0a68b18485c68ab4f0cfa665b1633c6d277",
                "patch_url": "https://git.kernel.org/stable/p/4a4de0a68b18485c68ab4f0cfa665b1633c6d277",
                "filename": "CVE-2023-53125-4a4de0a68b18485c68ab4f0cfa665b1633c6d277.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53125/CVE-2023-53125-4a4de0a68b18485c68ab4f0cfa665b1633c6d277.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/53966d572d056d6b234cfe76a5f9d60049d3c178",
                "patch_url": "https://git.kernel.org/stable/p/53966d572d056d6b234cfe76a5f9d60049d3c178",
                "filename": "CVE-2023-53125-53966d572d056d6b234cfe76a5f9d60049d3c178.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53125/CVE-2023-53125-53966d572d056d6b234cfe76a5f9d60049d3c178.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8ee5df9c039e37b9d8eb5e3de08bfb7f53d31cb6",
                "patch_url": "https://git.kernel.org/stable/p/8ee5df9c039e37b9d8eb5e3de08bfb7f53d31cb6",
                "filename": "CVE-2023-53125-8ee5df9c039e37b9d8eb5e3de08bfb7f53d31cb6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53125/CVE-2023-53125-8ee5df9c039e37b9d8eb5e3de08bfb7f53d31cb6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9fabdd79051a9fe51388df099aff6e4b660fedd2",
                "patch_url": "https://git.kernel.org/stable/p/9fabdd79051a9fe51388df099aff6e4b660fedd2",
                "filename": "CVE-2023-53125-9fabdd79051a9fe51388df099aff6e4b660fedd2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53125/CVE-2023-53125-9fabdd79051a9fe51388df099aff6e4b660fedd2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c7bdc137ca163b90917c1eeba4f1937684bd4f8b",
                "patch_url": "https://git.kernel.org/stable/p/c7bdc137ca163b90917c1eeba4f1937684bd4f8b",
                "filename": "CVE-2023-53125-c7bdc137ca163b90917c1eeba4f1937684bd4f8b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53125/CVE-2023-53125-c7bdc137ca163b90917c1eeba4f1937684bd4f8b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d8b228318935044dafe3a5bc07ee71a1f1424b8d",
                "patch_url": "https://git.kernel.org/stable/p/d8b228318935044dafe3a5bc07ee71a1f1424b8d",
                "filename": "CVE-2023-53125-d8b228318935044dafe3a5bc07ee71a1f1424b8d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53125/CVE-2023-53125-d8b228318935044dafe3a5bc07ee71a1f1424b8d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e294f0aa47e4844f3d3c8766c02accd5a76a7d4e",
                "patch_url": "https://git.kernel.org/stable/p/e294f0aa47e4844f3d3c8766c02accd5a76a7d4e",
                "filename": "CVE-2023-53125-e294f0aa47e4844f3d3c8766c02accd5a76a7d4e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53125/CVE-2023-53125-e294f0aa47e4844f3d3c8766c02accd5a76a7d4e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/105db6574281e1e03fcbf87983f4fee111682306",
            "https://git.kernel.org/stable/c/4a4de0a68b18485c68ab4f0cfa665b1633c6d277",
            "https://git.kernel.org/stable/c/53966d572d056d6b234cfe76a5f9d60049d3c178",
            "https://git.kernel.org/stable/c/8ee5df9c039e37b9d8eb5e3de08bfb7f53d31cb6",
            "https://git.kernel.org/stable/c/9fabdd79051a9fe51388df099aff6e4b660fedd2",
            "https://git.kernel.org/stable/c/c7bdc137ca163b90917c1eeba4f1937684bd4f8b",
            "https://git.kernel.org/stable/c/d8b228318935044dafe3a5bc07ee71a1f1424b8d",
            "https://git.kernel.org/stable/c/e294f0aa47e4844f3d3c8766c02accd5a76a7d4e",
            "https://www.cve.org/CVERecord?id=CVE-2023-53125\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53125\nhttps://lore.kernel.org/linux-cve-announce/2025050232-CVE-2023-53125-67cf@gregkh/T"
        ]
    },
    "CVE-2023-53178": {
        "cve": "CVE-2023-53178",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: fix zswap writeback race condition\n\nThe zswap writeback mechanism can cause a race condition resulting in\nmemory corruption, where a swapped out page gets swapped in with data that\nwas written to a different page.\n\nThe race unfolds like this:\n1. a page with data A and swap offset X is stored in zswap\n2. page A is removed off the LRU by zpool driver for writeback in\n   zswap-shrink work, data for A is mapped by zpool driver\n3. user space program faults and invalidates page entry A, offset X is\n   considered free\n4. kswapd stores page B at offset X in zswap (zswap could also be\n   full, if so, page B would then be IOed to X, then skip step 5.)\n5. entry A is replaced by B in tree->rbroot, this doesn't affect the\n   local reference held by zswap-shrink work\n6. zswap-shrink work writes back A at X, and frees zswap entry A\n7. swapin of slot X brings A in memory instead of B\n\nThe fix:\nOnce the swap page cache has been allocated (case ZSWAP_SWAPCACHE_NEW),\nzswap-shrink work just checks that the local zswap_entry reference is\nstill the same as the one in the tree.  If it's not the same it means that\nit's either been invalidated or replaced, in both cases the writeback is\naborted because the local entry contains stale data.\n\nReproducer:\nI originally found this by running `stress` overnight to validate my work\non the zswap writeback mechanism, it manifested after hours on my test\nmachine.  The key to make it happen is having zswap writebacks, so\nwhatever setup pumps /sys/kernel/debug/zswap/written_back_pages should do\nthe trick.\n\nIn order to reproduce this faster on a vm, I setup a system with ~100M of\navailable memory and a 500M swap file, then running `stress --vm 1\n--vm-bytes 300000000 --vm-stride 4000` makes it happen in matter of tens\nof minutes.  One can speed things up even more by swinging\n/sys/module/zswap/parameters/max_pool_percent up and down between, say, 20\nand 1; this makes it reproduce in tens of seconds.  It's crucial to set\n`--vm-stride` to something other than 4096 otherwise `stress` won't\nrealize that memory has been corrupted because all pages would have the\nsame data.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-53178",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ba700ea13bf0105a4773c654f7d3bef8adb64ab2",
            "patch_url": "https://git.kernel.org/stable/p/ba700ea13bf0105a4773c654f7d3bef8adb64ab2",
            "filename": "CVE-2023-53178-ba700ea13bf0105a4773c654f7d3bef8adb64ab2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53178/CVE-2023-53178-ba700ea13bf0105a4773c654f7d3bef8adb64ab2.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/04fc7816089c5a32c29a04ec94b998e219dfb946",
                "patch_url": "https://git.kernel.org/stable/p/04fc7816089c5a32c29a04ec94b998e219dfb946",
                "filename": "CVE-2023-53178-04fc7816089c5a32c29a04ec94b998e219dfb946.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53178/CVE-2023-53178-04fc7816089c5a32c29a04ec94b998e219dfb946.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2cab13f500a6333bd2b853783ac76be9e4956f8a",
                "patch_url": "https://git.kernel.org/stable/p/2cab13f500a6333bd2b853783ac76be9e4956f8a",
                "filename": "CVE-2023-53178-2cab13f500a6333bd2b853783ac76be9e4956f8a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53178/CVE-2023-53178-2cab13f500a6333bd2b853783ac76be9e4956f8a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ba700ea13bf0105a4773c654f7d3bef8adb64ab2",
                "patch_url": "https://git.kernel.org/stable/p/ba700ea13bf0105a4773c654f7d3bef8adb64ab2",
                "filename": "CVE-2023-53178-ba700ea13bf0105a4773c654f7d3bef8adb64ab2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53178/CVE-2023-53178-ba700ea13bf0105a4773c654f7d3bef8adb64ab2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/04fc7816089c5a32c29a04ec94b998e219dfb946",
            "https://git.kernel.org/stable/c/2cab13f500a6333bd2b853783ac76be9e4956f8a",
            "https://git.kernel.org/stable/c/ba700ea13bf0105a4773c654f7d3bef8adb64ab2",
            "https://www.cve.org/CVERecord?id=CVE-2023-53178\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53178\nhttps://lore.kernel.org/linux-cve-announce/2025091555-CVE-2023-53178-9d27@gregkh/T"
        ]
    },
    "CVE-2023-53226": {
        "cve": "CVE-2023-53226",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mwifiex: Fix OOB and integer underflow when rx packets\n\nMake sure mwifiex_process_mgmt_packet,\nmwifiex_process_sta_rx_packet and mwifiex_process_uap_rx_packet,\nmwifiex_uap_queue_bridged_pkt and mwifiex_process_rx_packet\nnot out-of-bounds access the skb->data buffer.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-53226",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/11958528161731c58e105b501ed60b83a91ea941",
            "patch_url": "https://git.kernel.org/stable/p/11958528161731c58e105b501ed60b83a91ea941",
            "filename": "CVE-2023-53226-11958528161731c58e105b501ed60b83a91ea941.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53226/CVE-2023-53226-11958528161731c58e105b501ed60b83a91ea941.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/11958528161731c58e105b501ed60b83a91ea941",
                "patch_url": "https://git.kernel.org/stable/p/11958528161731c58e105b501ed60b83a91ea941",
                "filename": "CVE-2023-53226-11958528161731c58e105b501ed60b83a91ea941.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53226/CVE-2023-53226-11958528161731c58e105b501ed60b83a91ea941.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/29eca8b7863d1d7de6c5b746b374e3487d14f154",
                "patch_url": "https://git.kernel.org/stable/p/29eca8b7863d1d7de6c5b746b374e3487d14f154",
                "filename": "CVE-2023-53226-29eca8b7863d1d7de6c5b746b374e3487d14f154.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53226/CVE-2023-53226-29eca8b7863d1d7de6c5b746b374e3487d14f154.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3975e21d4d01efaf0296ded40d11c06589c49245",
                "patch_url": "https://git.kernel.org/stable/p/3975e21d4d01efaf0296ded40d11c06589c49245",
                "filename": "CVE-2023-53226-3975e21d4d01efaf0296ded40d11c06589c49245.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53226/CVE-2023-53226-3975e21d4d01efaf0296ded40d11c06589c49245.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3fe3923d092e22d87d1ed03e2729db444b8c1331",
                "patch_url": "https://git.kernel.org/stable/p/3fe3923d092e22d87d1ed03e2729db444b8c1331",
                "filename": "CVE-2023-53226-3fe3923d092e22d87d1ed03e2729db444b8c1331.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53226/CVE-2023-53226-3fe3923d092e22d87d1ed03e2729db444b8c1331.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/650d1bc02fba7b42f476d8b6643324abac5921ed",
                "patch_url": "https://git.kernel.org/stable/p/650d1bc02fba7b42f476d8b6643324abac5921ed",
                "filename": "CVE-2023-53226-650d1bc02fba7b42f476d8b6643324abac5921ed.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53226/CVE-2023-53226-650d1bc02fba7b42f476d8b6643324abac5921ed.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02",
                "patch_url": "https://git.kernel.org/stable/p/7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02",
                "filename": "CVE-2023-53226-7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53226/CVE-2023-53226-7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8824aa4ab62c800f75d96f48e1883a5f56ec5869",
                "patch_url": "https://git.kernel.org/stable/p/8824aa4ab62c800f75d96f48e1883a5f56ec5869",
                "filename": "CVE-2023-53226-8824aa4ab62c800f75d96f48e1883a5f56ec5869.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53226/CVE-2023-53226-8824aa4ab62c800f75d96f48e1883a5f56ec5869.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a7300e3800e9fd5405e88ce67709c1a97783b9c8",
                "patch_url": "https://git.kernel.org/stable/p/a7300e3800e9fd5405e88ce67709c1a97783b9c8",
                "filename": "CVE-2023-53226-a7300e3800e9fd5405e88ce67709c1a97783b9c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53226/CVE-2023-53226-a7300e3800e9fd5405e88ce67709c1a97783b9c8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f517c97fc129995de77dd06aa5a74f909ebf568f",
                "patch_url": "https://git.kernel.org/stable/p/f517c97fc129995de77dd06aa5a74f909ebf568f",
                "filename": "CVE-2023-53226-f517c97fc129995de77dd06aa5a74f909ebf568f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53226/CVE-2023-53226-f517c97fc129995de77dd06aa5a74f909ebf568f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/11958528161731c58e105b501ed60b83a91ea941",
            "https://git.kernel.org/stable/c/29eca8b7863d1d7de6c5b746b374e3487d14f154",
            "https://git.kernel.org/stable/c/3975e21d4d01efaf0296ded40d11c06589c49245",
            "https://git.kernel.org/stable/c/3fe3923d092e22d87d1ed03e2729db444b8c1331",
            "https://git.kernel.org/stable/c/650d1bc02fba7b42f476d8b6643324abac5921ed",
            "https://git.kernel.org/stable/c/7c54b6fc39eb1aac51cf2945f8a25e2a47fdca02",
            "https://git.kernel.org/stable/c/8824aa4ab62c800f75d96f48e1883a5f56ec5869",
            "https://git.kernel.org/stable/c/a7300e3800e9fd5405e88ce67709c1a97783b9c8",
            "https://git.kernel.org/stable/c/f517c97fc129995de77dd06aa5a74f909ebf568f",
            "https://www.cve.org/CVERecord?id=CVE-2023-53226\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53226\nhttps://lore.kernel.org/linux-cve-announce/2025091513-CVE-2023-53226-a44a@gregkh/T"
        ]
    },
    "CVE-2023-53257": {
        "cve": "CVE-2023-53257",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: check S1G action frame size\n\nBefore checking the action code, check that it even\nexists in the frame.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-53257",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/7ae7a1378a119780c8c17a6b5fc03011c3bb7029",
            "patch_url": "https://git.kernel.org/stable/p/7ae7a1378a119780c8c17a6b5fc03011c3bb7029",
            "filename": "CVE-2023-53257-7ae7a1378a119780c8c17a6b5fc03011c3bb7029.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53257/CVE-2023-53257-7ae7a1378a119780c8c17a6b5fc03011c3bb7029.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/19e4a47ee74718a22e963e8a647c8c3bfe8bb05c",
                "patch_url": "https://git.kernel.org/stable/p/19e4a47ee74718a22e963e8a647c8c3bfe8bb05c",
                "filename": "CVE-2023-53257-19e4a47ee74718a22e963e8a647c8c3bfe8bb05c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53257/CVE-2023-53257-19e4a47ee74718a22e963e8a647c8c3bfe8bb05c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5e030a2509be72b452b6f4a800786d43229414db",
                "patch_url": "https://git.kernel.org/stable/p/5e030a2509be72b452b6f4a800786d43229414db",
                "filename": "CVE-2023-53257-5e030a2509be72b452b6f4a800786d43229414db.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53257/CVE-2023-53257-5e030a2509be72b452b6f4a800786d43229414db.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7ae7a1378a119780c8c17a6b5fc03011c3bb7029",
                "patch_url": "https://git.kernel.org/stable/p/7ae7a1378a119780c8c17a6b5fc03011c3bb7029",
                "filename": "CVE-2023-53257-7ae7a1378a119780c8c17a6b5fc03011c3bb7029.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53257/CVE-2023-53257-7ae7a1378a119780c8c17a6b5fc03011c3bb7029.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fedd9377dd9c71a950d432fbe1628eebfbed70a1",
                "patch_url": "https://git.kernel.org/stable/p/fedd9377dd9c71a950d432fbe1628eebfbed70a1",
                "filename": "CVE-2023-53257-fedd9377dd9c71a950d432fbe1628eebfbed70a1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53257/CVE-2023-53257-fedd9377dd9c71a950d432fbe1628eebfbed70a1.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/19e4a47ee74718a22e963e8a647c8c3bfe8bb05c",
            "https://git.kernel.org/stable/c/5e030a2509be72b452b6f4a800786d43229414db",
            "https://git.kernel.org/stable/c/7ae7a1378a119780c8c17a6b5fc03011c3bb7029",
            "https://git.kernel.org/stable/c/fedd9377dd9c71a950d432fbe1628eebfbed70a1",
            "https://www.cve.org/CVERecord?id=CVE-2023-53257\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53257\nhttps://lore.kernel.org/linux-cve-announce/2025091503-CVE-2023-53257-6162@gregkh/T"
        ]
    },
    "CVE-2023-53297": {
        "cve": "CVE-2023-53297",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: fix \"bad unlock balance\" in l2cap_disconnect_rsp\n\nconn->chan_lock isn't acquired before l2cap_get_chan_by_scid,\nif l2cap_get_chan_by_scid returns NULL, then 'bad unlock balance'\nis triggered.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-53297",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/55410a9144c76ecda126e6cdec556dfcd8f343b2",
            "patch_url": "https://git.kernel.org/stable/p/55410a9144c76ecda126e6cdec556dfcd8f343b2",
            "filename": "CVE-2023-53297-55410a9144c76ecda126e6cdec556dfcd8f343b2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53297/CVE-2023-53297-55410a9144c76ecda126e6cdec556dfcd8f343b2.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/116b9c002c894097adc2b8684db2d1da4229ed46",
                "patch_url": "https://git.kernel.org/stable/p/116b9c002c894097adc2b8684db2d1da4229ed46",
                "filename": "CVE-2023-53297-116b9c002c894097adc2b8684db2d1da4229ed46.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53297/CVE-2023-53297-116b9c002c894097adc2b8684db2d1da4229ed46.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2112c4c47d36bc5aba3ddeb9afedce6ae6a67e7d",
                "patch_url": "https://git.kernel.org/stable/p/2112c4c47d36bc5aba3ddeb9afedce6ae6a67e7d",
                "filename": "CVE-2023-53297-2112c4c47d36bc5aba3ddeb9afedce6ae6a67e7d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53297/CVE-2023-53297-2112c4c47d36bc5aba3ddeb9afedce6ae6a67e7d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/25e97f7b1866e6b8503be349eeea44bb52d661ce",
                "patch_url": "https://git.kernel.org/stable/p/25e97f7b1866e6b8503be349eeea44bb52d661ce",
                "filename": "CVE-2023-53297-25e97f7b1866e6b8503be349eeea44bb52d661ce.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53297/CVE-2023-53297-25e97f7b1866e6b8503be349eeea44bb52d661ce.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5134556c9be582793f30695c09d18a26fe1ff2d7",
                "patch_url": "https://git.kernel.org/stable/p/5134556c9be582793f30695c09d18a26fe1ff2d7",
                "filename": "CVE-2023-53297-5134556c9be582793f30695c09d18a26fe1ff2d7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53297/CVE-2023-53297-5134556c9be582793f30695c09d18a26fe1ff2d7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/55410a9144c76ecda126e6cdec556dfcd8f343b2",
                "patch_url": "https://git.kernel.org/stable/p/55410a9144c76ecda126e6cdec556dfcd8f343b2",
                "filename": "CVE-2023-53297-55410a9144c76ecda126e6cdec556dfcd8f343b2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53297/CVE-2023-53297-55410a9144c76ecda126e6cdec556dfcd8f343b2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5f352a56f0e607e6ff539cbf12156bfd8af232be",
                "patch_url": "https://git.kernel.org/stable/p/5f352a56f0e607e6ff539cbf12156bfd8af232be",
                "filename": "CVE-2023-53297-5f352a56f0e607e6ff539cbf12156bfd8af232be.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53297/CVE-2023-53297-5f352a56f0e607e6ff539cbf12156bfd8af232be.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6a27762340ad08643de3bc17fe1646ea489ca2e2",
                "patch_url": "https://git.kernel.org/stable/p/6a27762340ad08643de3bc17fe1646ea489ca2e2",
                "filename": "CVE-2023-53297-6a27762340ad08643de3bc17fe1646ea489ca2e2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53297/CVE-2023-53297-6a27762340ad08643de3bc17fe1646ea489ca2e2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fd269a0435f8e9943b7a57c5a59688848d42d449",
                "patch_url": "https://git.kernel.org/stable/p/fd269a0435f8e9943b7a57c5a59688848d42d449",
                "filename": "CVE-2023-53297-fd269a0435f8e9943b7a57c5a59688848d42d449.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53297/CVE-2023-53297-fd269a0435f8e9943b7a57c5a59688848d42d449.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/116b9c002c894097adc2b8684db2d1da4229ed46",
            "https://git.kernel.org/stable/c/2112c4c47d36bc5aba3ddeb9afedce6ae6a67e7d",
            "https://git.kernel.org/stable/c/25e97f7b1866e6b8503be349eeea44bb52d661ce",
            "https://git.kernel.org/stable/c/5134556c9be582793f30695c09d18a26fe1ff2d7",
            "https://git.kernel.org/stable/c/55410a9144c76ecda126e6cdec556dfcd8f343b2",
            "https://git.kernel.org/stable/c/5f352a56f0e607e6ff539cbf12156bfd8af232be",
            "https://git.kernel.org/stable/c/6a27762340ad08643de3bc17fe1646ea489ca2e2",
            "https://git.kernel.org/stable/c/fd269a0435f8e9943b7a57c5a59688848d42d449",
            "https://www.cve.org/CVERecord?id=CVE-2023-53297\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53297\nhttps://lore.kernel.org/linux-cve-announce/2025091627-CVE-2023-53297-8746@gregkh/T"
        ]
    },
    "CVE-2023-53305": {
        "cve": "CVE-2023-53305",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix use-after-free\n\nFix potential use-after-free in l2cap_le_command_rej.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-53305",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e",
            "patch_url": "https://git.kernel.org/stable/p/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e",
            "filename": "CVE-2023-53305-2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53305/CVE-2023-53305-2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/149daab45922ab1ac7f0cbeacab7251a46bf5e63",
                "patch_url": "https://git.kernel.org/stable/p/149daab45922ab1ac7f0cbeacab7251a46bf5e63",
                "filename": "CVE-2023-53305-149daab45922ab1ac7f0cbeacab7251a46bf5e63.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53305/CVE-2023-53305-149daab45922ab1ac7f0cbeacab7251a46bf5e63.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1a40c56e8bff3e424724d78a9a6b3272dd8a371d",
                "patch_url": "https://git.kernel.org/stable/p/1a40c56e8bff3e424724d78a9a6b3272dd8a371d",
                "filename": "CVE-2023-53305-1a40c56e8bff3e424724d78a9a6b3272dd8a371d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53305/CVE-2023-53305-1a40c56e8bff3e424724d78a9a6b3272dd8a371d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/255be68150291440657b2cdb09420b69441af3d8",
                "patch_url": "https://git.kernel.org/stable/p/255be68150291440657b2cdb09420b69441af3d8",
                "filename": "CVE-2023-53305-255be68150291440657b2cdb09420b69441af3d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53305/CVE-2023-53305-255be68150291440657b2cdb09420b69441af3d8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e",
                "patch_url": "https://git.kernel.org/stable/p/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e",
                "filename": "CVE-2023-53305-2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53305/CVE-2023-53305-2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/548a6b64b3c0688f01119a6fcccceb41f8c984e4",
                "patch_url": "https://git.kernel.org/stable/p/548a6b64b3c0688f01119a6fcccceb41f8c984e4",
                "filename": "CVE-2023-53305-548a6b64b3c0688f01119a6fcccceb41f8c984e4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53305/CVE-2023-53305-548a6b64b3c0688f01119a6fcccceb41f8c984e4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e76bab1b7afa580cd76362540fc37551ada4359b",
                "patch_url": "https://git.kernel.org/stable/p/e76bab1b7afa580cd76362540fc37551ada4359b",
                "filename": "CVE-2023-53305-e76bab1b7afa580cd76362540fc37551ada4359b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53305/CVE-2023-53305-e76bab1b7afa580cd76362540fc37551ada4359b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f752a0b334bb95fe9b42ecb511e0864e2768046f",
                "patch_url": "https://git.kernel.org/stable/p/f752a0b334bb95fe9b42ecb511e0864e2768046f",
                "filename": "CVE-2023-53305-f752a0b334bb95fe9b42ecb511e0864e2768046f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53305/CVE-2023-53305-f752a0b334bb95fe9b42ecb511e0864e2768046f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fe49aa73cca6608714477b74bfc6874b9db979df",
                "patch_url": "https://git.kernel.org/stable/p/fe49aa73cca6608714477b74bfc6874b9db979df",
                "filename": "CVE-2023-53305-fe49aa73cca6608714477b74bfc6874b9db979df.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53305/CVE-2023-53305-fe49aa73cca6608714477b74bfc6874b9db979df.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/149daab45922ab1ac7f0cbeacab7251a46bf5e63",
            "https://git.kernel.org/stable/c/1a40c56e8bff3e424724d78a9a6b3272dd8a371d",
            "https://git.kernel.org/stable/c/255be68150291440657b2cdb09420b69441af3d8",
            "https://git.kernel.org/stable/c/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e",
            "https://git.kernel.org/stable/c/548a6b64b3c0688f01119a6fcccceb41f8c984e4",
            "https://git.kernel.org/stable/c/e76bab1b7afa580cd76362540fc37551ada4359b",
            "https://git.kernel.org/stable/c/f752a0b334bb95fe9b42ecb511e0864e2768046f",
            "https://git.kernel.org/stable/c/fe49aa73cca6608714477b74bfc6874b9db979df",
            "https://www.cve.org/CVERecord?id=CVE-2023-53305\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53305\nhttps://lore.kernel.org/linux-cve-announce/2025091641-CVE-2023-53305-b8fe@gregkh/T"
        ]
    },
    "CVE-2023-53373": {
        "cve": "CVE-2023-53373",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: seqiv - Handle EBUSY correctly\n\nAs it is seqiv only handles the special return value of EINPROGERSS,\nwhich means that in all other cases it will free data related to the\nrequest.\n\nHowever, as the caller of seqiv may specify MAY_BACKLOG, we also need\nto expect EBUSY and treat it in the same way.  Otherwise backlogged\nrequests will trigger a use-after-free.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-53373",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1effbddaff60eeef8017c6dea1ee0ed970164d14",
            "patch_url": "https://git.kernel.org/stable/p/1effbddaff60eeef8017c6dea1ee0ed970164d14",
            "filename": "CVE-2023-53373-1effbddaff60eeef8017c6dea1ee0ed970164d14.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53373/CVE-2023-53373-1effbddaff60eeef8017c6dea1ee0ed970164d14.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1effbddaff60eeef8017c6dea1ee0ed970164d14",
                "patch_url": "https://git.kernel.org/stable/p/1effbddaff60eeef8017c6dea1ee0ed970164d14",
                "filename": "CVE-2023-53373-1effbddaff60eeef8017c6dea1ee0ed970164d14.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53373/CVE-2023-53373-1effbddaff60eeef8017c6dea1ee0ed970164d14.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/32e62025e5e52fbe4812ef044759de7010b15dbc",
                "patch_url": "https://git.kernel.org/stable/p/32e62025e5e52fbe4812ef044759de7010b15dbc",
                "filename": "CVE-2023-53373-32e62025e5e52fbe4812ef044759de7010b15dbc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53373/CVE-2023-53373-32e62025e5e52fbe4812ef044759de7010b15dbc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/36ec108b7bd7e280edb22de028467bd09d644620",
                "patch_url": "https://git.kernel.org/stable/p/36ec108b7bd7e280edb22de028467bd09d644620",
                "filename": "CVE-2023-53373-36ec108b7bd7e280edb22de028467bd09d644620.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53373/CVE-2023-53373-36ec108b7bd7e280edb22de028467bd09d644620.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4d497e8b200a175094e0ac252ed878add39b8771",
                "patch_url": "https://git.kernel.org/stable/p/4d497e8b200a175094e0ac252ed878add39b8771",
                "filename": "CVE-2023-53373-4d497e8b200a175094e0ac252ed878add39b8771.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53373/CVE-2023-53373-4d497e8b200a175094e0ac252ed878add39b8771.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/63551e4b7cbcd9914258827699eb2cb6ed6e4a16",
                "patch_url": "https://git.kernel.org/stable/p/63551e4b7cbcd9914258827699eb2cb6ed6e4a16",
                "filename": "CVE-2023-53373-63551e4b7cbcd9914258827699eb2cb6ed6e4a16.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53373/CVE-2023-53373-63551e4b7cbcd9914258827699eb2cb6ed6e4a16.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9477db935eb690f697d9bcc4f608927841bc8b36",
                "patch_url": "https://git.kernel.org/stable/p/9477db935eb690f697d9bcc4f608927841bc8b36",
                "filename": "CVE-2023-53373-9477db935eb690f697d9bcc4f608927841bc8b36.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53373/CVE-2023-53373-9477db935eb690f697d9bcc4f608927841bc8b36.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ae849d2f48019ff9c104e32bf588ccbfb200e971",
                "patch_url": "https://git.kernel.org/stable/p/ae849d2f48019ff9c104e32bf588ccbfb200e971",
                "filename": "CVE-2023-53373-ae849d2f48019ff9c104e32bf588ccbfb200e971.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53373/CVE-2023-53373-ae849d2f48019ff9c104e32bf588ccbfb200e971.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cc4d0d4251748a8a68026938f4055d2ac47c5719",
                "patch_url": "https://git.kernel.org/stable/p/cc4d0d4251748a8a68026938f4055d2ac47c5719",
                "filename": "CVE-2023-53373-cc4d0d4251748a8a68026938f4055d2ac47c5719.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53373/CVE-2023-53373-cc4d0d4251748a8a68026938f4055d2ac47c5719.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1effbddaff60eeef8017c6dea1ee0ed970164d14",
            "https://git.kernel.org/stable/c/32e62025e5e52fbe4812ef044759de7010b15dbc",
            "https://git.kernel.org/stable/c/36ec108b7bd7e280edb22de028467bd09d644620",
            "https://git.kernel.org/stable/c/4d497e8b200a175094e0ac252ed878add39b8771",
            "https://git.kernel.org/stable/c/63551e4b7cbcd9914258827699eb2cb6ed6e4a16",
            "https://git.kernel.org/stable/c/9477db935eb690f697d9bcc4f608927841bc8b36",
            "https://git.kernel.org/stable/c/ae849d2f48019ff9c104e32bf588ccbfb200e971",
            "https://git.kernel.org/stable/c/cc4d0d4251748a8a68026938f4055d2ac47c5719",
            "https://www.cve.org/CVERecord?id=CVE-2023-53373\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53373\nhttps://lore.kernel.org/linux-cve-announce/2025091855-CVE-2023-53373-087e@gregkh/T"
        ]
    },
    "CVE-2023-53386": {
        "cve": "CVE-2023-53386",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix potential use-after-free when clear keys\n\nSimilar to commit c5d2b6fa26b5 (\"Bluetooth: Fix use-after-free in\nhci_remove_ltk/hci_remove_irk\"). We can not access k after kfree_rcu()\ncall.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-53386",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/e87da6a0ac6e631454e7da53a76aa9fe44aaa5dd",
            "patch_url": "https://git.kernel.org/stable/p/e87da6a0ac6e631454e7da53a76aa9fe44aaa5dd",
            "filename": "CVE-2023-53386-e87da6a0ac6e631454e7da53a76aa9fe44aaa5dd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53386/CVE-2023-53386-e87da6a0ac6e631454e7da53a76aa9fe44aaa5dd.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/35cc42f04bc49f0656f6840cb7451b3df6049649",
                "patch_url": "https://git.kernel.org/stable/p/35cc42f04bc49f0656f6840cb7451b3df6049649",
                "filename": "CVE-2023-53386-35cc42f04bc49f0656f6840cb7451b3df6049649.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53386/CVE-2023-53386-35cc42f04bc49f0656f6840cb7451b3df6049649.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3673952cf0c6cf81b06c66a0b788abeeb02ff3ae",
                "patch_url": "https://git.kernel.org/stable/p/3673952cf0c6cf81b06c66a0b788abeeb02ff3ae",
                "filename": "CVE-2023-53386-3673952cf0c6cf81b06c66a0b788abeeb02ff3ae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53386/CVE-2023-53386-3673952cf0c6cf81b06c66a0b788abeeb02ff3ae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/942d8cefb022f384d5424f8b90c7878f3f93726f",
                "patch_url": "https://git.kernel.org/stable/p/942d8cefb022f384d5424f8b90c7878f3f93726f",
                "filename": "CVE-2023-53386-942d8cefb022f384d5424f8b90c7878f3f93726f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53386/CVE-2023-53386-942d8cefb022f384d5424f8b90c7878f3f93726f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/94617b736c25091b60e514e2e7aeafcbbee6b700",
                "patch_url": "https://git.kernel.org/stable/p/94617b736c25091b60e514e2e7aeafcbbee6b700",
                "filename": "CVE-2023-53386-94617b736c25091b60e514e2e7aeafcbbee6b700.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53386/CVE-2023-53386-94617b736c25091b60e514e2e7aeafcbbee6b700.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/da19f35868dfbecfff4f81166c054d2656cb1be4",
                "patch_url": "https://git.kernel.org/stable/p/da19f35868dfbecfff4f81166c054d2656cb1be4",
                "filename": "CVE-2023-53386-da19f35868dfbecfff4f81166c054d2656cb1be4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53386/CVE-2023-53386-da19f35868dfbecfff4f81166c054d2656cb1be4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e87da6a0ac6e631454e7da53a76aa9fe44aaa5dd",
                "patch_url": "https://git.kernel.org/stable/p/e87da6a0ac6e631454e7da53a76aa9fe44aaa5dd",
                "filename": "CVE-2023-53386-e87da6a0ac6e631454e7da53a76aa9fe44aaa5dd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53386/CVE-2023-53386-e87da6a0ac6e631454e7da53a76aa9fe44aaa5dd.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/35cc42f04bc49f0656f6840cb7451b3df6049649",
            "https://git.kernel.org/stable/c/3673952cf0c6cf81b06c66a0b788abeeb02ff3ae",
            "https://git.kernel.org/stable/c/942d8cefb022f384d5424f8b90c7878f3f93726f",
            "https://git.kernel.org/stable/c/94617b736c25091b60e514e2e7aeafcbbee6b700",
            "https://git.kernel.org/stable/c/da19f35868dfbecfff4f81166c054d2656cb1be4",
            "https://git.kernel.org/stable/c/e87da6a0ac6e631454e7da53a76aa9fe44aaa5dd",
            "https://www.cve.org/CVERecord?id=CVE-2023-53386\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53386\nhttps://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53386-8ab2@gregkh/T"
        ]
    },
    "CVE-2023-53401": {
        "cve": "CVE-2023-53401",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: kmem: fix a NULL pointer dereference in obj_stock_flush_required()\n\nKCSAN found an issue in obj_stock_flush_required():\nstock->cached_objcg can be reset between the check and dereference:\n\n==================================================================\nBUG: KCSAN: data-race in drain_all_stock / drain_obj_stock\n\nwrite to 0xffff888237c2a2f8 of 8 bytes by task 19625 on cpu 0:\n drain_obj_stock+0x408/0x4e0 mm/memcontrol.c:3306\n refill_obj_stock+0x9c/0x1e0 mm/memcontrol.c:3340\n obj_cgroup_uncharge+0xe/0x10 mm/memcontrol.c:3408\n memcg_slab_free_hook mm/slab.h:587 [inline]\n __cache_free mm/slab.c:3373 [inline]\n __do_kmem_cache_free mm/slab.c:3577 [inline]\n kmem_cache_free+0x105/0x280 mm/slab.c:3602\n __d_free fs/dcache.c:298 [inline]\n dentry_free fs/dcache.c:375 [inline]\n __dentry_kill+0x422/0x4a0 fs/dcache.c:621\n dentry_kill+0x8d/0x1e0\n dput+0x118/0x1f0 fs/dcache.c:913\n __fput+0x3bf/0x570 fs/file_table.c:329\n ____fput+0x15/0x20 fs/file_table.c:349\n task_work_run+0x123/0x160 kernel/task_work.c:179\n resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]\n exit_to_user_mode_loop+0xcf/0xe0 kernel/entry/common.c:171\n exit_to_user_mode_prepare+0x6a/0xa0 kernel/entry/common.c:203\n __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]\n syscall_exit_to_user_mode+0x26/0x140 kernel/entry/common.c:296\n do_syscall_64+0x4d/0xc0 arch/x86/entry/common.c:86\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nread to 0xffff888237c2a2f8 of 8 bytes by task 19632 on cpu 1:\n obj_stock_flush_required mm/memcontrol.c:3319 [inline]\n drain_all_stock+0x174/0x2a0 mm/memcontrol.c:2361\n try_charge_memcg+0x6d0/0xd10 mm/memcontrol.c:2703\n try_charge mm/memcontrol.c:2837 [inline]\n mem_cgroup_charge_skmem+0x51/0x140 mm/memcontrol.c:7290\n sock_reserve_memory+0xb1/0x390 net/core/sock.c:1025\n sk_setsockopt+0x800/0x1e70 net/core/sock.c:1525\n udp_lib_setsockopt+0x99/0x6c0 net/ipv4/udp.c:2692\n udp_setsockopt+0x73/0xa0 net/ipv4/udp.c:2817\n sock_common_setsockopt+0x61/0x70 net/core/sock.c:3668\n __sys_setsockopt+0x1c3/0x230 net/socket.c:2271\n __do_sys_setsockopt net/socket.c:2282 [inline]\n __se_sys_setsockopt net/socket.c:2279 [inline]\n __x64_sys_setsockopt+0x66/0x80 net/socket.c:2279\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nvalue changed: 0xffff8881382d52c0 -> 0xffff888138893740\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 1 PID: 19632 Comm: syz-executor.0 Not tainted 6.3.0-rc2-syzkaller-00387-g534293368afa #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023\n\nFix it by using READ_ONCE()/WRITE_ONCE() for all accesses to\nstock->cached_objcg.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-53401",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/33391c7e1a2ad612bf3922cc168cb09a46bbe236",
            "patch_url": "https://git.kernel.org/stable/p/33391c7e1a2ad612bf3922cc168cb09a46bbe236",
            "filename": "CVE-2023-53401-33391c7e1a2ad612bf3922cc168cb09a46bbe236.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53401/CVE-2023-53401-33391c7e1a2ad612bf3922cc168cb09a46bbe236.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/33391c7e1a2ad612bf3922cc168cb09a46bbe236",
                "patch_url": "https://git.kernel.org/stable/p/33391c7e1a2ad612bf3922cc168cb09a46bbe236",
                "filename": "CVE-2023-53401-33391c7e1a2ad612bf3922cc168cb09a46bbe236.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53401/CVE-2023-53401-33391c7e1a2ad612bf3922cc168cb09a46bbe236.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/33d9490b27e5d8da4444aefd714a4f50189db978",
                "patch_url": "https://git.kernel.org/stable/p/33d9490b27e5d8da4444aefd714a4f50189db978",
                "filename": "CVE-2023-53401-33d9490b27e5d8da4444aefd714a4f50189db978.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53401/CVE-2023-53401-33d9490b27e5d8da4444aefd714a4f50189db978.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3b8abb3239530c423c0b97e42af7f7e856e1ee96",
                "patch_url": "https://git.kernel.org/stable/p/3b8abb3239530c423c0b97e42af7f7e856e1ee96",
                "filename": "CVE-2023-53401-3b8abb3239530c423c0b97e42af7f7e856e1ee96.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53401/CVE-2023-53401-3b8abb3239530c423c0b97e42af7f7e856e1ee96.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/33391c7e1a2ad612bf3922cc168cb09a46bbe236",
            "https://git.kernel.org/stable/c/33d9490b27e5d8da4444aefd714a4f50189db978",
            "https://git.kernel.org/stable/c/3b8abb3239530c423c0b97e42af7f7e856e1ee96",
            "https://www.cve.org/CVERecord?id=CVE-2023-53401\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53401\nhttps://lore.kernel.org/linux-cve-announce/2025091800-CVE-2023-53401-b668@gregkh/T"
        ]
    },
    "CVE-2023-53513": {
        "cve": "CVE-2023-53513",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: fix incomplete validation of ioctl arg\n\nWe tested and found an alarm caused by nbd_ioctl arg without verification.\nThe UBSAN warning calltrace like below:\n\nUBSAN: Undefined behaviour in fs/buffer.c:1709:35\nsigned integer overflow:\n-9223372036854775808 - 1 cannot be represented in type 'long long int'\nCPU: 3 PID: 2523 Comm: syz-executor.0 Not tainted 4.19.90 #1\nHardware name: linux,dummy-virt (DT)\nCall trace:\n dump_backtrace+0x0/0x3f0 arch/arm64/kernel/time.c:78\n show_stack+0x28/0x38 arch/arm64/kernel/traps.c:158\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x170/0x1dc lib/dump_stack.c:118\n ubsan_epilogue+0x18/0xb4 lib/ubsan.c:161\n handle_overflow+0x188/0x1dc lib/ubsan.c:192\n __ubsan_handle_sub_overflow+0x34/0x44 lib/ubsan.c:206\n __block_write_full_page+0x94c/0xa20 fs/buffer.c:1709\n block_write_full_page+0x1f0/0x280 fs/buffer.c:2934\n blkdev_writepage+0x34/0x40 fs/block_dev.c:607\n __writepage+0x68/0xe8 mm/page-writeback.c:2305\n write_cache_pages+0x44c/0xc70 mm/page-writeback.c:2240\n generic_writepages+0xdc/0x148 mm/page-writeback.c:2329\n blkdev_writepages+0x2c/0x38 fs/block_dev.c:2114\n do_writepages+0xd4/0x250 mm/page-writeback.c:2344\n\nThe reason for triggering this warning is __block_write_full_page()\n-> i_size_read(inode) - 1 overflow.\ninode->i_size is assigned in __nbd_ioctl() -> nbd_set_size() -> bytesize.\nWe think it is necessary to limit the size of arg to prevent errors.\n\nMoreover, __nbd_ioctl() -> nbd_add_socket(), arg will be cast to int.\nAssuming the value of arg is 0x80000000000000001) (on a 64-bit machine),\nit will become 1 after the coercion, which will return unexpected results.\n\nFix it by adding checks to prevent passing in too large numbers.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-53513",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/52851d0c3354b397c11d31dfeb8b2a2fc85a0002",
            "patch_url": "https://git.kernel.org/stable/p/52851d0c3354b397c11d31dfeb8b2a2fc85a0002",
            "filename": "CVE-2023-53513-52851d0c3354b397c11d31dfeb8b2a2fc85a0002.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53513/CVE-2023-53513-52851d0c3354b397c11d31dfeb8b2a2fc85a0002.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/52851d0c3354b397c11d31dfeb8b2a2fc85a0002",
                "patch_url": "https://git.kernel.org/stable/p/52851d0c3354b397c11d31dfeb8b2a2fc85a0002",
                "filename": "CVE-2023-53513-52851d0c3354b397c11d31dfeb8b2a2fc85a0002.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53513/CVE-2023-53513-52851d0c3354b397c11d31dfeb8b2a2fc85a0002.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/55793ea54d77719a071b1ccc05a05056e3b5e009",
                "patch_url": "https://git.kernel.org/stable/p/55793ea54d77719a071b1ccc05a05056e3b5e009",
                "filename": "CVE-2023-53513-55793ea54d77719a071b1ccc05a05056e3b5e009.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53513/CVE-2023-53513-55793ea54d77719a071b1ccc05a05056e3b5e009.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fab766c8a1aff715bce7075aab40e780266f8e1a",
                "patch_url": "https://git.kernel.org/stable/p/fab766c8a1aff715bce7075aab40e780266f8e1a",
                "filename": "CVE-2023-53513-fab766c8a1aff715bce7075aab40e780266f8e1a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53513/CVE-2023-53513-fab766c8a1aff715bce7075aab40e780266f8e1a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ffb75ffaa68723276365d0f9d00b03362b750657",
                "patch_url": "https://git.kernel.org/stable/p/ffb75ffaa68723276365d0f9d00b03362b750657",
                "filename": "CVE-2023-53513-ffb75ffaa68723276365d0f9d00b03362b750657.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53513/CVE-2023-53513-ffb75ffaa68723276365d0f9d00b03362b750657.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/52851d0c3354b397c11d31dfeb8b2a2fc85a0002",
            "https://git.kernel.org/stable/c/55793ea54d77719a071b1ccc05a05056e3b5e009",
            "https://git.kernel.org/stable/c/fab766c8a1aff715bce7075aab40e780266f8e1a",
            "https://git.kernel.org/stable/c/ffb75ffaa68723276365d0f9d00b03362b750657",
            "https://www.cve.org/CVERecord?id=CVE-2023-53513\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53513\nhttps://lore.kernel.org/linux-cve-announce/2025100130-CVE-2023-53513-4667@gregkh/T"
        ]
    },
    "CVE-2023-53539": {
        "cve": "CVE-2023-53539",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix incomplete state save in rxe_requester\n\nIf a send packet is dropped by the IP layer in rxe_requester()\nthe call to rxe_xmit_packet() can fail with err == -EAGAIN.\nTo recover, the state of the wqe is restored to the state before\nthe packet was sent so it can be resent. However, the routines\nthat save and restore the state miss a significnt part of the\nvariable state in the wqe, the dma struct which is used to process\nthrough the sge table. And, the state is not saved before the packet\nis built which modifies the dma struct.\n\nUnder heavy stress testing with many QPs on a fast node sending\nlarge messages to a slow node dropped packets are observed and\nthe resent packets are corrupted because the dma struct was not\nrestored. This patch fixes this behavior and allows the test cases\nto succeed.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-53539",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/255c0e60e1d16874fc151358d94bc8df661600dd",
            "patch_url": "https://git.kernel.org/stable/p/255c0e60e1d16874fc151358d94bc8df661600dd",
            "filename": "CVE-2023-53539-255c0e60e1d16874fc151358d94bc8df661600dd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53539/CVE-2023-53539-255c0e60e1d16874fc151358d94bc8df661600dd.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/255c0e60e1d16874fc151358d94bc8df661600dd",
                "patch_url": "https://git.kernel.org/stable/p/255c0e60e1d16874fc151358d94bc8df661600dd",
                "filename": "CVE-2023-53539-255c0e60e1d16874fc151358d94bc8df661600dd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53539/CVE-2023-53539-255c0e60e1d16874fc151358d94bc8df661600dd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f2a6422287fe29f9343247d77b645100ece0652",
                "patch_url": "https://git.kernel.org/stable/p/2f2a6422287fe29f9343247d77b645100ece0652",
                "filename": "CVE-2023-53539-2f2a6422287fe29f9343247d77b645100ece0652.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53539/CVE-2023-53539-2f2a6422287fe29f9343247d77b645100ece0652.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5d122db2ff80cd2aed4dcd630befb56b51ddf947",
                "patch_url": "https://git.kernel.org/stable/p/5d122db2ff80cd2aed4dcd630befb56b51ddf947",
                "filename": "CVE-2023-53539-5d122db2ff80cd2aed4dcd630befb56b51ddf947.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53539/CVE-2023-53539-5d122db2ff80cd2aed4dcd630befb56b51ddf947.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/70518f3aaf5a059b691867d7d2d46b999319656a",
                "patch_url": "https://git.kernel.org/stable/p/70518f3aaf5a059b691867d7d2d46b999319656a",
                "filename": "CVE-2023-53539-70518f3aaf5a059b691867d7d2d46b999319656a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53539/CVE-2023-53539-70518f3aaf5a059b691867d7d2d46b999319656a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/255c0e60e1d16874fc151358d94bc8df661600dd",
            "https://git.kernel.org/stable/c/2f2a6422287fe29f9343247d77b645100ece0652",
            "https://git.kernel.org/stable/c/5d122db2ff80cd2aed4dcd630befb56b51ddf947",
            "https://git.kernel.org/stable/c/70518f3aaf5a059b691867d7d2d46b999319656a",
            "https://www.cve.org/CVERecord?id=CVE-2023-53539\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53539\nhttps://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53539-4411@gregkh/T"
        ]
    },
    "CVE-2023-53552": {
        "cve": "CVE-2023-53552",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: mark requests for GuC virtual engines to avoid use-after-free\n\nReferences to i915_requests may be trapped by userspace inside a\nsync_file or dmabuf (dma-resv) and held indefinitely across different\nproceses. To counter-act the memory leaks, we try to not to keep\nreferences from the request past their completion.\nOn the other side on fence release we need to know if rq->engine\nis valid and points to hw engine (true for non-virtual requests).\nTo make it possible extra bit has been added to rq->execution_mask,\nfor marking virtual engines.\n\n(cherry picked from commit 280410677af763f3871b93e794a199cfcf6fb580)",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-53552",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/8017a27cec32eac8c8f9430b0a3055840136b856",
            "patch_url": "https://git.kernel.org/stable/p/8017a27cec32eac8c8f9430b0a3055840136b856",
            "filename": "CVE-2023-53552-8017a27cec32eac8c8f9430b0a3055840136b856.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53552/CVE-2023-53552-8017a27cec32eac8c8f9430b0a3055840136b856.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/5eefc5307c983b59344a4cb89009819f580c84fa",
                "patch_url": "https://git.kernel.org/stable/p/5eefc5307c983b59344a4cb89009819f580c84fa",
                "filename": "CVE-2023-53552-5eefc5307c983b59344a4cb89009819f580c84fa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53552/CVE-2023-53552-5eefc5307c983b59344a4cb89009819f580c84fa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7fb464d52fa41c31a6fd1ad82888e67c65935d94",
                "patch_url": "https://git.kernel.org/stable/p/7fb464d52fa41c31a6fd1ad82888e67c65935d94",
                "filename": "CVE-2023-53552-7fb464d52fa41c31a6fd1ad82888e67c65935d94.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53552/CVE-2023-53552-7fb464d52fa41c31a6fd1ad82888e67c65935d94.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8017a27cec32eac8c8f9430b0a3055840136b856",
                "patch_url": "https://git.kernel.org/stable/p/8017a27cec32eac8c8f9430b0a3055840136b856",
                "filename": "CVE-2023-53552-8017a27cec32eac8c8f9430b0a3055840136b856.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53552/CVE-2023-53552-8017a27cec32eac8c8f9430b0a3055840136b856.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/5eefc5307c983b59344a4cb89009819f580c84fa",
            "https://git.kernel.org/stable/c/7fb464d52fa41c31a6fd1ad82888e67c65935d94",
            "https://git.kernel.org/stable/c/8017a27cec32eac8c8f9430b0a3055840136b856",
            "https://www.cve.org/CVERecord?id=CVE-2023-53552\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53552\nhttps://lore.kernel.org/linux-cve-announce/2025100447-CVE-2023-53552-5ba9@gregkh/T"
        ]
    },
    "CVE-2023-53673": {
        "cve": "CVE-2023-53673",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_event: call disconnect callback before deleting conn\n\nIn hci_cs_disconnect, we do hci_conn_del even if disconnection failed.\n\nISO, L2CAP and SCO connections refer to the hci_conn without\nhci_conn_get, so disconn_cfm must be called so they can clean up their\nconn, otherwise use-after-free occurs.\n\nISO:\n==========================================================\niso_sock_connect:880: sk 00000000eabd6557\niso_connect_cis:356: 70:1a:b8:98:ff:a2 -> 28:3d:c2:4a:7e:da\n...\niso_conn_add:140: hcon 000000001696f1fd conn 00000000b6251073\nhci_dev_put:1487: hci0 orig refcnt 17\n__iso_chan_add:214: conn 00000000b6251073\niso_sock_clear_timer:117: sock 00000000eabd6557 state 3\n...\nhci_rx_work:4085: hci0 Event packet\nhci_event_packet:7601: hci0: event 0x0f\nhci_cmd_status_evt:4346: hci0: opcode 0x0406\nhci_cs_disconnect:2760: hci0: status 0x0c\nhci_sent_cmd_data:3107: hci0 opcode 0x0406\nhci_conn_del:1151: hci0 hcon 000000001696f1fd handle 2560\nhci_conn_unlink:1102: hci0: hcon 000000001696f1fd\nhci_conn_drop:1451: hcon 00000000d8521aaf orig refcnt 2\nhci_chan_list_flush:2780: hcon 000000001696f1fd\nhci_dev_put:1487: hci0 orig refcnt 21\nhci_dev_put:1487: hci0 orig refcnt 20\nhci_req_cmd_complete:3978: opcode 0x0406 status 0x0c\n... <no iso_* activity on sk/conn> ...\niso_sock_sendmsg:1098: sock 00000000dea5e2e0, sk 00000000eabd6557\nBUG: kernel NULL pointer dereference, address: 0000000000000668\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP PTI\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014\nRIP: 0010:iso_sock_sendmsg (net/bluetooth/iso.c:1112) bluetooth\n==========================================================\n\nL2CAP:\n==================================================================\nhci_cmd_status_evt:4359: hci0: opcode 0x0406\nhci_cs_disconnect:2760: hci0: status 0x0c\nhci_sent_cmd_data:3085: hci0 opcode 0x0406\nhci_conn_del:1151: hci0 hcon ffff88800c999000 handle 3585\nhci_conn_unlink:1102: hci0: hcon ffff88800c999000\nhci_chan_list_flush:2780: hcon ffff88800c999000\nhci_chan_del:2761: hci0 hcon ffff88800c999000 chan ffff888018ddd280\n...\nBUG: KASAN: slab-use-after-free in hci_send_acl+0x2d/0x540 [bluetooth]\nRead of size 8 at addr ffff888018ddd298 by task bluetoothd/1175\n\nCPU: 0 PID: 1175 Comm: bluetoothd Tainted: G            E      6.4.0-rc4+ #2\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl+0x5b/0x90\n print_report+0xcf/0x670\n ? __virt_addr_valid+0xf8/0x180\n ? hci_send_acl+0x2d/0x540 [bluetooth]\n kasan_report+0xa8/0xe0\n ? hci_send_acl+0x2d/0x540 [bluetooth]\n hci_send_acl+0x2d/0x540 [bluetooth]\n ? __pfx___lock_acquire+0x10/0x10\n l2cap_chan_send+0x1fd/0x1300 [bluetooth]\n ? l2cap_sock_sendmsg+0xf2/0x170 [bluetooth]\n ? __pfx_l2cap_chan_send+0x10/0x10 [bluetooth]\n ? lock_release+0x1d5/0x3c0\n ? mark_held_locks+0x1a/0x90\n l2cap_sock_sendmsg+0x100/0x170 [bluetooth]\n sock_write_iter+0x275/0x280\n ? __pfx_sock_write_iter+0x10/0x10\n ? __pfx___lock_acquire+0x10/0x10\n do_iter_readv_writev+0x176/0x220\n ? __pfx_do_iter_readv_writev+0x10/0x10\n ? find_held_lock+0x83/0xa0\n ? selinux_file_permission+0x13e/0x210\n do_iter_write+0xda/0x340\n vfs_writev+0x1b4/0x400\n ? __pfx_vfs_writev+0x10/0x10\n ? __seccomp_filter+0x112/0x750\n ? populate_seccomp_data+0x182/0x220\n ? __fget_light+0xdf/0x100\n ? do_writev+0x19d/0x210\n do_writev+0x19d/0x210\n ? __pfx_do_writev+0x10/0x10\n ? mark_held_locks+0x1a/0x90\n do_syscall_64+0x60/0x90\n ? lockdep_hardirqs_on_prepare+0x149/0x210\n ? do_syscall_64+0x6c/0x90\n ? lockdep_hardirqs_on_prepare+0x149/0x210\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7ff45cb23e64\nCode: 15 d1 1f 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 80 3d 9d a7 0d 00 00 74 13 b8 14 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89\nRSP: 002b:00007fff21ae09b8 EFLAGS: 00000202 ORIG_RAX: 0000000000000014\nRAX: ffffffffffffffda RBX: \n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-53673",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1ecf6dc2676ead4b927c50b1be0851fa4d756574",
            "patch_url": "https://git.kernel.org/stable/p/1ecf6dc2676ead4b927c50b1be0851fa4d756574",
            "filename": "CVE-2023-53673-1ecf6dc2676ead4b927c50b1be0851fa4d756574.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53673/CVE-2023-53673-1ecf6dc2676ead4b927c50b1be0851fa4d756574.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/093a07052406b363b1b2ab489e17dbadaf3e509b",
                "patch_url": "https://git.kernel.org/stable/p/093a07052406b363b1b2ab489e17dbadaf3e509b",
                "filename": "CVE-2023-53673-093a07052406b363b1b2ab489e17dbadaf3e509b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53673/CVE-2023-53673-093a07052406b363b1b2ab489e17dbadaf3e509b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1ecf6dc2676ead4b927c50b1be0851fa4d756574",
                "patch_url": "https://git.kernel.org/stable/p/1ecf6dc2676ead4b927c50b1be0851fa4d756574",
                "filename": "CVE-2023-53673-1ecf6dc2676ead4b927c50b1be0851fa4d756574.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53673/CVE-2023-53673-1ecf6dc2676ead4b927c50b1be0851fa4d756574.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/59bd1e476bbc7bc6dff3c61bba787095a4839796",
                "patch_url": "https://git.kernel.org/stable/p/59bd1e476bbc7bc6dff3c61bba787095a4839796",
                "filename": "CVE-2023-53673-59bd1e476bbc7bc6dff3c61bba787095a4839796.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53673/CVE-2023-53673-59bd1e476bbc7bc6dff3c61bba787095a4839796.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7f7cfcb6f0825652973b780f248603e23f16ee90",
                "patch_url": "https://git.kernel.org/stable/p/7f7cfcb6f0825652973b780f248603e23f16ee90",
                "filename": "CVE-2023-53673-7f7cfcb6f0825652973b780f248603e23f16ee90.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53673/CVE-2023-53673-7f7cfcb6f0825652973b780f248603e23f16ee90.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/093a07052406b363b1b2ab489e17dbadaf3e509b",
            "https://git.kernel.org/stable/c/1ecf6dc2676ead4b927c50b1be0851fa4d756574",
            "https://git.kernel.org/stable/c/59bd1e476bbc7bc6dff3c61bba787095a4839796",
            "https://git.kernel.org/stable/c/7f7cfcb6f0825652973b780f248603e23f16ee90",
            "https://www.cve.org/CVERecord?id=CVE-2023-53673\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53673\nhttps://lore.kernel.org/linux-cve-announce/2025100706-CVE-2023-53673-36b9@gregkh/T"
        ]
    },
    "CVE-2023-53751": {
        "cve": "CVE-2023-53751",
        "cvss_v2": null,
        "cvss_v3": "7.1",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix potential use-after-free bugs in TCP_Server_Info::hostname\n\nTCP_Server_Info::hostname may be updated once or many times during\nreconnect, so protect its access outside reconnect path as well and\nthen prevent any potential use-after-free bugs.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-53751",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0b08c4c499200be67d54c439d56e5ea866869945",
            "patch_url": "https://git.kernel.org/stable/p/0b08c4c499200be67d54c439d56e5ea866869945",
            "filename": "CVE-2023-53751-0b08c4c499200be67d54c439d56e5ea866869945.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53751/CVE-2023-53751-0b08c4c499200be67d54c439d56e5ea866869945.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0b08c4c499200be67d54c439d56e5ea866869945",
                "patch_url": "https://git.kernel.org/stable/p/0b08c4c499200be67d54c439d56e5ea866869945",
                "filename": "CVE-2023-53751-0b08c4c499200be67d54c439d56e5ea866869945.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53751/CVE-2023-53751-0b08c4c499200be67d54c439d56e5ea866869945.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/64d62ac6d6514cba1305bd08e271ec1843bdd612",
                "patch_url": "https://git.kernel.org/stable/p/64d62ac6d6514cba1305bd08e271ec1843bdd612",
                "filename": "CVE-2023-53751-64d62ac6d6514cba1305bd08e271ec1843bdd612.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53751/CVE-2023-53751-64d62ac6d6514cba1305bd08e271ec1843bdd612.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/90c49fce1c43e1cc152695e20363ff5087897c09",
                "patch_url": "https://git.kernel.org/stable/p/90c49fce1c43e1cc152695e20363ff5087897c09",
                "filename": "CVE-2023-53751-90c49fce1c43e1cc152695e20363ff5087897c09.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53751/CVE-2023-53751-90c49fce1c43e1cc152695e20363ff5087897c09.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c511954bf142fe1995aec3c739a9f1a76990283a",
                "patch_url": "https://git.kernel.org/stable/p/c511954bf142fe1995aec3c739a9f1a76990283a",
                "filename": "CVE-2023-53751-c511954bf142fe1995aec3c739a9f1a76990283a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53751/CVE-2023-53751-c511954bf142fe1995aec3c739a9f1a76990283a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0b08c4c499200be67d54c439d56e5ea866869945",
            "https://git.kernel.org/stable/c/64d62ac6d6514cba1305bd08e271ec1843bdd612",
            "https://git.kernel.org/stable/c/90c49fce1c43e1cc152695e20363ff5087897c09",
            "https://git.kernel.org/stable/c/c511954bf142fe1995aec3c739a9f1a76990283a",
            "https://www.cve.org/CVERecord?id=CVE-2023-53751\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53751\nhttps://lore.kernel.org/linux-cve-announce/2025120842-CVE-2023-53751-2ff2@gregkh/T"
        ]
    },
    "CVE-2023-53762": {
        "cve": "CVE-2023-53762",
        "cvss_v2": null,
        "cvss_v3": "7.0",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync\n\nUse-after-free can occur in hci_disconnect_all_sync if a connection is\ndeleted by concurrent processing of a controller event.\n\nTo prevent this the code now tries to iterate over the list backwards\nto ensure the links are cleanup before its parents, also it no longer\nrelies on a cursor, instead it always uses the last element since\nhci_abort_conn_sync is guaranteed to call hci_conn_del.\n\nUAF crash log:\n==================================================================\nBUG: KASAN: slab-use-after-free in hci_set_powered_sync\n(net/bluetooth/hci_sync.c:5424) [bluetooth]\nRead of size 8 at addr ffff888009d9c000 by task kworker/u9:0/124\n\nCPU: 0 PID: 124 Comm: kworker/u9:0 Tainted: G        W\n6.5.0-rc1+ #10\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS\n1.16.2-1.fc38 04/01/2014\nWorkqueue: hci0 hci_cmd_sync_work [bluetooth]\nCall Trace:\n <TASK>\n dump_stack_lvl+0x5b/0x90\n print_report+0xcf/0x670\n ? __virt_addr_valid+0xdd/0x160\n ? hci_set_powered_sync+0x2c9/0x4a0 [bluetooth]\n kasan_report+0xa6/0xe0\n ? hci_set_powered_sync+0x2c9/0x4a0 [bluetooth]\n ? __pfx_set_powered_sync+0x10/0x10 [bluetooth]\n hci_set_powered_sync+0x2c9/0x4a0 [bluetooth]\n ? __pfx_hci_set_powered_sync+0x10/0x10 [bluetooth]\n ? __pfx_lock_release+0x10/0x10\n ? __pfx_set_powered_sync+0x10/0x10 [bluetooth]\n hci_cmd_sync_work+0x137/0x220 [bluetooth]\n process_one_work+0x526/0x9d0\n ? __pfx_process_one_work+0x10/0x10\n ? __pfx_do_raw_spin_lock+0x10/0x10\n ? mark_held_locks+0x1a/0x90\n worker_thread+0x92/0x630\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x196/0x1e0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x2c/0x50\n </TASK>\n\nAllocated by task 1782:\n kasan_save_stack+0x33/0x60\n kasan_set_track+0x25/0x30\n __kasan_kmalloc+0x8f/0xa0\n hci_conn_add+0xa5/0xa80 [bluetooth]\n hci_bind_cis+0x881/0x9b0 [bluetooth]\n iso_connect_cis+0x121/0x520 [bluetooth]\n iso_sock_connect+0x3f6/0x790 [bluetooth]\n __sys_connect+0x109/0x130\n __x64_sys_connect+0x40/0x50\n do_syscall_64+0x60/0x90\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nFreed by task 695:\n kasan_save_stack+0x33/0x60\n kasan_set_track+0x25/0x30\n kasan_save_free_info+0x2b/0x50\n __kasan_slab_free+0x10a/0x180\n __kmem_cache_free+0x14d/0x2e0\n device_release+0x5d/0xf0\n kobject_put+0xdf/0x270\n hci_disconn_complete_evt+0x274/0x3a0 [bluetooth]\n hci_event_packet+0x579/0x7e0 [bluetooth]\n hci_rx_work+0x287/0xaa0 [bluetooth]\n process_one_work+0x526/0x9d0\n worker_thread+0x92/0x630\n kthread+0x196/0x1e0\n ret_from_fork+0x2c/0x50\n==================================================================",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-53762",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/94d9ba9f9888b748d4abd2aa1547af56ae85f772",
            "patch_url": "https://git.kernel.org/stable/p/94d9ba9f9888b748d4abd2aa1547af56ae85f772",
            "filename": "CVE-2023-53762-94d9ba9f9888b748d4abd2aa1547af56ae85f772.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53762/CVE-2023-53762-94d9ba9f9888b748d4abd2aa1547af56ae85f772.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/94d9ba9f9888b748d4abd2aa1547af56ae85f772",
                "patch_url": "https://git.kernel.org/stable/p/94d9ba9f9888b748d4abd2aa1547af56ae85f772",
                "filename": "CVE-2023-53762-94d9ba9f9888b748d4abd2aa1547af56ae85f772.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53762/CVE-2023-53762-94d9ba9f9888b748d4abd2aa1547af56ae85f772.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a30c074f0b5b7f909a15c978fbc96a29e2f94e42",
                "patch_url": "https://git.kernel.org/stable/p/a30c074f0b5b7f909a15c978fbc96a29e2f94e42",
                "filename": "CVE-2023-53762-a30c074f0b5b7f909a15c978fbc96a29e2f94e42.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53762/CVE-2023-53762-a30c074f0b5b7f909a15c978fbc96a29e2f94e42.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ba3ba53ce1f76fc372b8f918fece4f9b1e41acd4",
                "patch_url": "https://git.kernel.org/stable/p/ba3ba53ce1f76fc372b8f918fece4f9b1e41acd4",
                "filename": "CVE-2023-53762-ba3ba53ce1f76fc372b8f918fece4f9b1e41acd4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-53762/CVE-2023-53762-ba3ba53ce1f76fc372b8f918fece4f9b1e41acd4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/94d9ba9f9888b748d4abd2aa1547af56ae85f772",
            "https://git.kernel.org/stable/c/a30c074f0b5b7f909a15c978fbc96a29e2f94e42",
            "https://git.kernel.org/stable/c/ba3ba53ce1f76fc372b8f918fece4f9b1e41acd4",
            "https://www.cve.org/CVERecord?id=CVE-2023-53762\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53762\nhttps://lore.kernel.org/linux-cve-announce/2025120845-CVE-2023-53762-01bc@gregkh/T"
        ]
    },
    "CVE-2023-5633": {
        "cve": "CVE-2023-5633",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-5633",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-5717": {
        "cve": "CVE-2023-5717",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\n\nIf perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.\n\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-5717",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06",
            "https://www.cve.org/CVERecord?id=CVE-2023-5717\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-5717\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06"
        ]
    },
    "CVE-2023-5981": {
        "cve": "CVE-2023-5981",
        "cvss_v2": null,
        "cvss_v3": 5.9,
        "description": "A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-5981",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-6004": {
        "cve": "CVE-2023-6004",
        "cvss_v2": null,
        "cvss_v3": 4.8,
        "description": "A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6004",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-6040": {
        "cve": "CVE-2023-6040",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6040",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-6121": {
        "cve": "CVE-2023-6121",
        "cvss_v2": null,
        "cvss_v3": 4.3,
        "description": "An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6121",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-6176": {
        "cve": "CVE-2023-6176",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6176",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066",
            "filename": "CVE-2023-6176-cfaa80c91f6f99b9342b6557f0f0e1143e434066.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-6176/CVE-2023-6176-cfaa80c91f6f99b9342b6557f0f0e1143e434066.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066",
                "filename": "CVE-2023-6176-cfaa80c91f6f99b9342b6557f0f0e1143e434066.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-6176/CVE-2023-6176-cfaa80c91f6f99b9342b6557f0f0e1143e434066.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066",
            "https://www.cve.org/CVERecord?id=CVE-2023-6176\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-6176\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066"
        ]
    },
    "CVE-2023-6240": {
        "cve": "CVE-2023-6240",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "A Marvin vulnerability side-channel leakage was found in the RSA decryption operation in the Linux Kernel. This issue may allow a network attacker to decrypt ciphertexts or forge signatures, limiting the services that use that private key.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6240",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-6356": {
        "cve": "CVE-2023-6356",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6356",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-6535": {
        "cve": "CVE-2023-6535",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6535",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-6536": {
        "cve": "CVE-2023-6536",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6536",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-6546": {
        "cve": "CVE-2023-6546",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci while restarting the gsm mux. This could allow a local unprivileged user to escalate their privileges on the system.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6546",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/3c4f8333b582487a2d1e02171f1465531cde53e3",
            "patch_url": "https://github.com/torvalds/linux/commit/3c4f8333b582487a2d1e02171f1465531cde53e3.patch",
            "filename": "CVE-2023-6546-3c4f8333b582487a2d1e02171f1465531cde53e3.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-6546/CVE-2023-6546-3c4f8333b582487a2d1e02171f1465531cde53e3.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/3c4f8333b582487a2d1e02171f1465531cde53e3",
                "patch_url": "https://github.com/torvalds/linux/commit/3c4f8333b582487a2d1e02171f1465531cde53e3.patch",
                "filename": "CVE-2023-6546-3c4f8333b582487a2d1e02171f1465531cde53e3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-6546/CVE-2023-6546-3c4f8333b582487a2d1e02171f1465531cde53e3.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/3c4f8333b582487a2d1e02171f1465531cde53e3"
        ]
    },
    "CVE-2023-6606": {
        "cve": "CVE-2023-6606",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6606",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://bugzilla.kernel.org/show_bug.cgi?id=218218",
            "https://www.cve.org/CVERecord?id=CVE-2023-6606\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-6606\nhttps://bugzilla.kernel.org/show_bug.cgi?id=218218"
        ]
    },
    "CVE-2023-6610": {
        "cve": "CVE-2023-6610",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6610",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://bugzilla.kernel.org/show_bug.cgi?id=218219",
            "https://www.cve.org/CVERecord?id=CVE-2023-6610\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-6610\nhttps://bugzilla.kernel.org/show_bug.cgi?id=218219"
        ]
    },
    "CVE-2023-6622": {
        "cve": "CVE-2023-6622",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue may allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6622",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea",
            "patch_url": "https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea.patch",
            "filename": "CVE-2023-6622-3701cd390fd731ee7ae8b8006246c8db82c72bea.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-6622/CVE-2023-6622-3701cd390fd731ee7ae8b8006246c8db82c72bea.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea",
                "patch_url": "https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea.patch",
                "filename": "CVE-2023-6622-3701cd390fd731ee7ae8b8006246c8db82c72bea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-6622/CVE-2023-6622-3701cd390fd731ee7ae8b8006246c8db82c72bea.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea"
        ]
    },
    "CVE-2023-6817": {
        "cve": "CVE-2023-6817",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6817",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=317eb9685095678f2c9f5a8189de698c5354316a",
            "filename": "CVE-2023-6817-317eb9685095678f2c9f5a8189de698c5354316a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-6817/CVE-2023-6817-317eb9685095678f2c9f5a8189de698c5354316a.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=317eb9685095678f2c9f5a8189de698c5354316a",
                "filename": "CVE-2023-6817-317eb9685095678f2c9f5a8189de698c5354316a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-6817/CVE-2023-6817-317eb9685095678f2c9f5a8189de698c5354316a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a",
            "https://www.cve.org/CVERecord?id=CVE-2023-6817\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-6817\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a"
        ]
    },
    "CVE-2023-6915": {
        "cve": "CVE-2023-6915",
        "cvss_v2": null,
        "cvss_v3": 6.2,
        "description": "A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6915",
        "selected_patch": {
            "url": "https://github.com/torvalds/linux/commit/af73483f4e8b6f5c68c9aa63257bdd929a9c194a",
            "patch_url": "https://github.com/torvalds/linux/commit/af73483f4e8b6f5c68c9aa63257bdd929a9c194a.patch",
            "filename": "CVE-2023-6915-af73483f4e8b6f5c68c9aa63257bdd929a9c194a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-6915/CVE-2023-6915-af73483f4e8b6f5c68c9aa63257bdd929a9c194a.patch",
            "type": "github",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://github.com/torvalds/linux/commit/af73483f4e8b6f5c68c9aa63257bdd929a9c194a",
                "patch_url": "https://github.com/torvalds/linux/commit/af73483f4e8b6f5c68c9aa63257bdd929a9c194a.patch",
                "filename": "CVE-2023-6915-af73483f4e8b6f5c68c9aa63257bdd929a9c194a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-6915/CVE-2023-6915-af73483f4e8b6f5c68c9aa63257bdd929a9c194a.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/torvalds/linux/commit/af73483f4e8b6f5c68c9aa63257bdd929a9c194a"
        ]
    },
    "CVE-2023-6918": {
        "cve": "CVE-2023-6918",
        "cvss_v2": null,
        "cvss_v3": 3.7,
        "description": "A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6918",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-6931": {
        "cve": "CVE-2023-6931",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6931",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b",
            "filename": "CVE-2023-6931-382c27f4ed28f803b1f1473ac2d8db0afc795a1b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-6931/CVE-2023-6931-382c27f4ed28f803b1f1473ac2d8db0afc795a1b.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/patch/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b",
                "filename": "CVE-2023-6931-382c27f4ed28f803b1f1473ac2d8db0afc795a1b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-6931/CVE-2023-6931-382c27f4ed28f803b1f1473ac2d8db0afc795a1b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b",
            "https://www.cve.org/CVERecord?id=CVE-2023-6931\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-6931\nhttps://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b"
        ]
    },
    "CVE-2023-6932": {
        "cve": "CVE-2023-6932",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-6932",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch?id=e2b706c691905fe78468c361aaabc719d0a496f1",
            "filename": "CVE-2023-6932-e2b706c691905fe78468c361aaabc719d0a496f1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-6932/CVE-2023-6932-e2b706c691905fe78468c361aaabc719d0a496f1.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch?id=e2b706c691905fe78468c361aaabc719d0a496f1",
                "filename": "CVE-2023-6932-e2b706c691905fe78468c361aaabc719d0a496f1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2023-6932/CVE-2023-6932-e2b706c691905fe78468c361aaabc719d0a496f1.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1"
        ]
    },
    "CVE-2023-7008": {
        "cve": "CVE-2023-7008",
        "cvss_v2": null,
        "cvss_v3": 5.9,
        "description": "A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-7008",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2023-7104": {
        "cve": "CVE-2023-7104",
        "cvss_v2": 5.2,
        "cvss_v3": 5.5,
        "description": "A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2023-7104",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-0340": {
        "cve": "CVE-2024-0340",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-0340",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://lore.kernel.org/lkml/5kn47peabxjrptkqa6dwtyus35ahf4pcj4qm4pumse33kxqpjw@mec4se5relrc/T/",
            "https://www.cve.org/CVERecord?id=CVE-2024-0340\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-0340\nhttps://lore.kernel.org/lkml/5kn47peabxjrptkqa6dwtyus35ahf4pcj4qm4pumse33kxqpjw@mec4se5relrc/T/"
        ]
    },
    "CVE-2024-0553": {
        "cve": "CVE-2024-0553",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-0553",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-0565": {
        "cve": "CVE-2024-0565",
        "cvss_v2": null,
        "cvss_v3": 6.8,
        "description": "An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-0565",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-0646": {
        "cve": "CVE-2024-0646",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-0646",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5a595000e267",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=c5a595000e267",
            "filename": "CVE-2024-0646-c5a595000e267.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-0646/CVE-2024-0646-c5a595000e267.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5a595000e267",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=c5a595000e267",
                "filename": "CVE-2024-0646-c5a595000e267.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-0646/CVE-2024-0646-c5a595000e267.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5a595000e267",
            "https://www.cve.org/CVERecord?id=CVE-2024-0646\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-0646\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5a595000e267"
        ]
    },
    "CVE-2024-0841": {
        "cve": "CVE-2024-0841",
        "cvss_v2": null,
        "cvss_v3": 6.6,
        "description": "A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-0841",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-10041": {
        "cve": "CVE-2024-10041",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-10041",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-1048": {
        "cve": "CVE-2024-1048",
        "cvss_v2": null,
        "cvss_v3": 3.3,
        "description": "A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the temporary file will not be removed and may fill the filesystem when invoked multiple times, resulting in a filesystem out of free inodes or blocks.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-1048",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-1086": {
        "cve": "CVE-2024-1086",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.\n\nWe recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-1086",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f342de4e2f33e0e39165d8639387aa6c19dff660",
            "filename": "CVE-2024-1086-f342de4e2f33e0e39165d8639387aa6c19dff660.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-1086/CVE-2024-1086-f342de4e2f33e0e39165d8639387aa6c19dff660.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f342de4e2f33e0e39165d8639387aa6c19dff660",
                "filename": "CVE-2024-1086-f342de4e2f33e0e39165d8639387aa6c19dff660.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-1086/CVE-2024-1086-f342de4e2f33e0e39165d8639387aa6c19dff660.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660",
            "https://www.cve.org/CVERecord?id=CVE-2024-1086\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-1086\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660\nhttps://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660\nhttps://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        ]
    },
    "CVE-2024-10963": {
        "cve": "CVE-2024-10963",
        "cvss_v2": null,
        "cvss_v3": 7.4,
        "description": "A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-10963",
        "selected_patch": {
            "url": "https://github.com/linux-pam/linux-pam/pull/835",
            "patch_url": "https://github.com/linux-pam/linux-pam/pull/835.patch",
            "filename": "CVE-2024-10963-https___github_com_linux_pam_linux_pam_pull_835_patch.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-10963/CVE-2024-10963-https___github_com_linux_pam_linux_pam_pull_835_patch.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/linux-pam/linux-pam/pull/835",
                "patch_url": "https://github.com/linux-pam/linux-pam/pull/835.patch",
                "filename": "CVE-2024-10963-https___github_com_linux_pam_linux_pam_pull_835_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-10963/CVE-2024-10963-https___github_com_linux_pam_linux_pam_pull_835_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/linux-pam/linux-pam/pull/835"
        ]
    },
    "CVE-2024-12243": {
        "cve": "CVE-2024-12243",
        "cvss_v2": null,
        "cvss_v3": 5.3,
        "description": "A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-12243",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-1488": {
        "cve": "CVE-2024-1488",
        "cvss_v2": null,
        "cvss_v3": 8,
        "description": "A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged attacker to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-1488",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-21823": {
        "cve": "CVE-2024-21823",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-21823",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-2201": {
        "cve": "CVE-2024-2201",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-2201",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-22365": {
        "cve": "CVE-2024-22365",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-22365",
        "selected_patch": {
            "url": "https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb",
            "patch_url": "https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb.patch",
            "filename": "CVE-2024-22365-031bb5a5d0d950253b68138b498dc93be69a64cb.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-22365/CVE-2024-22365-031bb5a5d0d950253b68138b498dc93be69a64cb.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb",
                "patch_url": "https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb.patch",
                "filename": "CVE-2024-22365-031bb5a5d0d950253b68138b498dc93be69a64cb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-22365/CVE-2024-22365-031bb5a5d0d950253b68138b498dc93be69a64cb.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb"
        ]
    },
    "CVE-2024-23307": {
        "cve": "CVE-2024-23307",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-23307",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://www.cve.org/CVERecord?id=CVE-2024-23307\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-23307\nhttps://bugzilla.openanolis.cn/show_bug.cgi?id=7975\nhttps://lore.kernel.org/linux-raid/20240112071017.16313-1-2045gemini@gmail.com/#r\nhttps://patchwork.kernel.org/project/linux-raid/patch/20240112071017.16313-1-2045gemini@gmail.com/"
        ]
    },
    "CVE-2024-23848": {
        "cve": "CVE-2024-23848",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-23848",
        "selected_patch": null,
        "available_patches": [],
        "all_links": [
            "https://lore.kernel.org/lkml/e9f42704-2f99-4f2c-ade5-f952e5fd53e5%40xs4all.nl/",
            "https://www.cve.org/CVERecord?id=CVE-2024-23848\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-23848\nhttps://lore.kernel.org/lkml/e9f42704-2f99-4f2c-ade5-f952e5fd53e5%40xs4all.nl/"
        ]
    },
    "CVE-2024-2398": {
        "cve": "CVE-2024-2398",
        "cvss_v2": null,
        "cvss_v3": 8.6,
        "description": "When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory.  Further, this error condition fails silently and is therefore not easily detected by an application.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-2398",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-24857": {
        "cve": "CVE-2024-24857",
        "cvss_v2": null,
        "cvss_v3": 4.6,
        "description": "A race condition was found in the Linux kernel's net/bluetooth device driver in conn_info_{min,max}_age_set() function. This can result in integrity overflow issue, possibly leading to bluetooth connection abnormality or denial of service.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-24857",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-25062": {
        "cve": "CVE-2024-25062",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-25062",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-25629": {
        "cve": "CVE-2024-25629",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-25629",
        "selected_patch": {
            "url": "https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183",
            "patch_url": "https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183.patch",
            "filename": "CVE-2024-25629-a804c04ddc8245fc8adf0e92368709639125e183.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-25629/CVE-2024-25629-a804c04ddc8245fc8adf0e92368709639125e183.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183",
                "patch_url": "https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183.patch",
                "filename": "CVE-2024-25629-a804c04ddc8245fc8adf0e92368709639125e183.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-25629/CVE-2024-25629-a804c04ddc8245fc8adf0e92368709639125e183.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183"
        ]
    },
    "CVE-2024-25739": {
        "cve": "CVE-2024-25739",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "create_empty_lvol in drivers/mtd/ubi/vtbl.c in the Linux kernel through 6.7.4 can attempt to allocate zero bytes, and crash, because of a missing check for ubi->leb_size.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-25739",
        "selected_patch": {
            "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=68a24aba7c593eafa8fd00f2f76407b9b32b47a9",
            "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=68a24aba7c593eafa8fd00f2f76407b9b32b47a9",
            "filename": "CVE-2024-25739-68a24aba7c593eafa8fd00f2f76407b9b32b47a9.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-25739/CVE-2024-25739-68a24aba7c593eafa8fd00f2f76407b9b32b47a9.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=68a24aba7c593eafa8fd00f2f76407b9b32b47a9",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=68a24aba7c593eafa8fd00f2f76407b9b32b47a9",
                "filename": "CVE-2024-25739-68a24aba7c593eafa8fd00f2f76407b9b32b47a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-25739/CVE-2024-25739-68a24aba7c593eafa8fd00f2f76407b9b32b47a9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=68a24aba7c593eafa8fd00f2f76407b9b32b47a9",
            "https://web.git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/drivers/mtd/ubi/vtbl.c?h=v6.6.24&id=d1b505c988b7"
        ]
    },
    "CVE-2024-25742": {
        "cve": "CVE-2024-25742",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This affects AMD SEV-SNP and AMD SEV-ES.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-25742",
        "selected_patch": {
            "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f",
            "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f",
            "filename": "CVE-2024-25742-e3ef461af35a8c74f2f4ce6616491ddb355a208f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-25742/CVE-2024-25742-e3ef461af35a8c74f2f4ce6616491ddb355a208f.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f",
                "filename": "CVE-2024-25742-e3ef461af35a8c74f2f4ce6616491ddb355a208f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-25742/CVE-2024-25742-e3ef461af35a8c74f2f4ce6616491ddb355a208f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208f",
                "patch_url": "https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208f.patch",
                "filename": "CVE-2024-25742-e3ef461af35a8c74f2f4ce6616491ddb355a208f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-25742/CVE-2024-25742-e3ef461af35a8c74f2f4ce6616491ddb355a208f.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9",
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f",
            "https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208f"
        ]
    },
    "CVE-2024-25743": {
        "cve": "CVE-2024-25743",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel through 6.9, an untrusted hypervisor can inject virtual interrupts 0 and 14 at any point in time and can trigger the SIGFPE signal handler in userspace applications. This affects AMD SEV-SNP and AMD SEV-ES.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-25743",
        "selected_patch": {
            "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f35e46631b28a63ca3887d7afef1a65a5544da52",
            "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=f35e46631b28a63ca3887d7afef1a65a5544da52",
            "filename": "CVE-2024-25743-f35e46631b28a63ca3887d7afef1a65a5544da52.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-25743/CVE-2024-25743-f35e46631b28a63ca3887d7afef1a65a5544da52.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f35e46631b28a63ca3887d7afef1a65a5544da52",
                "patch_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/patch/?id=f35e46631b28a63ca3887d7afef1a65a5544da52",
                "filename": "CVE-2024-25743-f35e46631b28a63ca3887d7afef1a65a5544da52.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-25743/CVE-2024-25743-f35e46631b28a63ca3887d7afef1a65a5544da52.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f35e46631b28a63ca3887d7afef1a65a5544da52"
        ]
    },
    "CVE-2024-25744": {
        "cve": "CVE-2024-25744",
        "cvss_v2": null,
        "cvss_v3": 8.8,
        "description": "In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-25744",
        "selected_patch": {
            "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30",
            "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30",
            "filename": "CVE-2024-25744-b82a8dbd3d2f4563156f7150c6f2ecab6e960b30.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-25744/CVE-2024-25744-b82a8dbd3d2f4563156f7150c6f2ecab6e960b30.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30",
                "patch_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30",
                "filename": "CVE-2024-25744-b82a8dbd3d2f4563156f7150c6f2ecab6e960b30.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-25744/CVE-2024-25744-b82a8dbd3d2f4563156f7150c6f2ecab6e960b30.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.7",
            "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30",
            "https://www.cve.org/CVERecord?id=CVE-2024-25744\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-25744\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30"
        ]
    },
    "CVE-2024-26583": {
        "cve": "CVE-2024-26583",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix race between async notify and socket close\n\nThe submitting thread (one which called recvmsg/sendmsg)\nmay exit as soon as the async crypto handler calls complete()\nso any code past that point risks touching already freed data.\n\nTry to avoid the locking and extra flags altogether.\nHave the main thread hold an extra reference, this way\nwe can depend solely on the atomic ref counter for\nsynchronization.\n\nDon't futz with reiniting the completion, either, we are now\ntightly controlling when completion fires.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26583",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6209319b2efdd8524691187ee99c40637558fa33",
            "patch_url": "https://git.kernel.org/stable/p/6209319b2efdd8524691187ee99c40637558fa33",
            "filename": "CVE-2024-26583-6209319b2efdd8524691187ee99c40637558fa33.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26583/CVE-2024-26583-6209319b2efdd8524691187ee99c40637558fa33.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/6209319b2efdd8524691187ee99c40637558fa33",
                "patch_url": "https://git.kernel.org/stable/p/6209319b2efdd8524691187ee99c40637558fa33",
                "filename": "CVE-2024-26583-6209319b2efdd8524691187ee99c40637558fa33.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26583/CVE-2024-26583-6209319b2efdd8524691187ee99c40637558fa33.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7a3ca06d04d589deec81f56229a9a9d62352ce01",
                "patch_url": "https://git.kernel.org/stable/p/7a3ca06d04d589deec81f56229a9a9d62352ce01",
                "filename": "CVE-2024-26583-7a3ca06d04d589deec81f56229a9a9d62352ce01.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26583/CVE-2024-26583-7a3ca06d04d589deec81f56229a9a9d62352ce01.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/86dc27ee36f558fe223dbdfbfcb6856247356f4a",
                "patch_url": "https://git.kernel.org/stable/p/86dc27ee36f558fe223dbdfbfcb6856247356f4a",
                "filename": "CVE-2024-26583-86dc27ee36f558fe223dbdfbfcb6856247356f4a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26583/CVE-2024-26583-86dc27ee36f558fe223dbdfbfcb6856247356f4a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aec7961916f3f9e88766e2688992da6980f11b8d",
                "patch_url": "https://git.kernel.org/stable/p/aec7961916f3f9e88766e2688992da6980f11b8d",
                "filename": "CVE-2024-26583-aec7961916f3f9e88766e2688992da6980f11b8d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26583/CVE-2024-26583-aec7961916f3f9e88766e2688992da6980f11b8d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f17d21ea73918ace8afb9c2d8e734dbf71c2c9d7",
                "patch_url": "https://git.kernel.org/stable/p/f17d21ea73918ace8afb9c2d8e734dbf71c2c9d7",
                "filename": "CVE-2024-26583-f17d21ea73918ace8afb9c2d8e734dbf71c2c9d7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26583/CVE-2024-26583-f17d21ea73918ace8afb9c2d8e734dbf71c2c9d7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/6209319b2efdd8524691187ee99c40637558fa33",
            "https://git.kernel.org/stable/c/7a3ca06d04d589deec81f56229a9a9d62352ce01",
            "https://git.kernel.org/stable/c/86dc27ee36f558fe223dbdfbfcb6856247356f4a",
            "https://git.kernel.org/stable/c/aec7961916f3f9e88766e2688992da6980f11b8d",
            "https://git.kernel.org/stable/c/f17d21ea73918ace8afb9c2d8e734dbf71c2c9d7",
            "https://www.cve.org/CVERecord?id=CVE-2024-26583\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26583\nhttps://lore.kernel.org/linux-cve-announce/2024022146-traction-unjustly-f451@gregkh/T/#u"
        ]
    },
    "CVE-2024-26584": {
        "cve": "CVE-2024-26584",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tls: handle backlogging of crypto requests\n\nSince we're setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our\nrequests to the crypto API, crypto_aead_{encrypt,decrypt} can return\n -EBUSY instead of -EINPROGRESS in valid situations. For example, when\nthe cryptd queue for AESNI is full (easy to trigger with an\nartificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued\nto the backlog but still processed. In that case, the async callback\nwill also be called twice: first with err == -EINPROGRESS, which it\nseems we can just ignore, then with err == 0.\n\nCompared to Sabrina's original patch this version uses the new\ntls_*crypt_async_wait() helpers and converts the EBUSY to\nEINPROGRESS to avoid having to modify all the error handling\npaths. The handling is identical.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26584",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3ade391adc584f17b5570fd205de3ad029090368",
            "patch_url": "https://git.kernel.org/stable/p/3ade391adc584f17b5570fd205de3ad029090368",
            "filename": "CVE-2024-26584-3ade391adc584f17b5570fd205de3ad029090368.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26584/CVE-2024-26584-3ade391adc584f17b5570fd205de3ad029090368.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754",
                "patch_url": "https://git.kernel.org/stable/p/13eca403876bbea3716e82cdfe6f1e6febb38754",
                "filename": "CVE-2024-26584-13eca403876bbea3716e82cdfe6f1e6febb38754.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26584/CVE-2024-26584-13eca403876bbea3716e82cdfe6f1e6febb38754.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3ade391adc584f17b5570fd205de3ad029090368",
                "patch_url": "https://git.kernel.org/stable/p/3ade391adc584f17b5570fd205de3ad029090368",
                "filename": "CVE-2024-26584-3ade391adc584f17b5570fd205de3ad029090368.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26584/CVE-2024-26584-3ade391adc584f17b5570fd205de3ad029090368.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3",
                "patch_url": "https://git.kernel.org/stable/p/8590541473188741055d27b955db0777569438e3",
                "filename": "CVE-2024-26584-8590541473188741055d27b955db0777569438e3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26584/CVE-2024-26584-8590541473188741055d27b955db0777569438e3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694",
                "patch_url": "https://git.kernel.org/stable/p/ab6397f072e5097f267abf5cb08a8004e6b17694",
                "filename": "CVE-2024-26584-ab6397f072e5097f267abf5cb08a8004e6b17694.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26584/CVE-2024-26584-ab6397f072e5097f267abf5cb08a8004e6b17694.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72",
                "patch_url": "https://git.kernel.org/stable/p/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72",
                "filename": "CVE-2024-26584-cd1bbca03f3c1d845ce274c0d0a66de8e5929f72.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26584/CVE-2024-26584-cd1bbca03f3c1d845ce274c0d0a66de8e5929f72.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754",
            "https://git.kernel.org/stable/c/3ade391adc584f17b5570fd205de3ad029090368",
            "https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3",
            "https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694",
            "https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72",
            "https://www.cve.org/CVERecord?id=CVE-2024-26584\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26584\nhttps://lore.kernel.org/linux-cve-announce/2024022148-showpiece-yanking-107c@gregkh/T/#u"
        ]
    },
    "CVE-2024-26585": {
        "cve": "CVE-2024-26585",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix race between tx work scheduling and socket close\n\nSimilarly to previous commit, the submitting thread (recvmsg/sendmsg)\nmay exit as soon as the async crypto handler calls complete().\nReorder scheduling the work before calling complete().\nThis seems more logical in the first place, as it's\nthe inverse order of what the submitting thread will do.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26585",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/196f198ca6fce04ba6ce262f5a0e4d567d7d219d",
            "patch_url": "https://git.kernel.org/stable/p/196f198ca6fce04ba6ce262f5a0e4d567d7d219d",
            "filename": "CVE-2024-26585-196f198ca6fce04ba6ce262f5a0e4d567d7d219d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26585/CVE-2024-26585-196f198ca6fce04ba6ce262f5a0e4d567d7d219d.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/196f198ca6fce04ba6ce262f5a0e4d567d7d219d",
                "patch_url": "https://git.kernel.org/stable/p/196f198ca6fce04ba6ce262f5a0e4d567d7d219d",
                "filename": "CVE-2024-26585-196f198ca6fce04ba6ce262f5a0e4d567d7d219d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26585/CVE-2024-26585-196f198ca6fce04ba6ce262f5a0e4d567d7d219d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6db22d6c7a6dc914b12c0469b94eb639b6a8a146",
                "patch_url": "https://git.kernel.org/stable/p/6db22d6c7a6dc914b12c0469b94eb639b6a8a146",
                "filename": "CVE-2024-26585-6db22d6c7a6dc914b12c0469b94eb639b6a8a146.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26585/CVE-2024-26585-6db22d6c7a6dc914b12c0469b94eb639b6a8a146.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dd32621f19243f89ce830919496a5dcc2158aa33",
                "patch_url": "https://git.kernel.org/stable/p/dd32621f19243f89ce830919496a5dcc2158aa33",
                "filename": "CVE-2024-26585-dd32621f19243f89ce830919496a5dcc2158aa33.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26585/CVE-2024-26585-dd32621f19243f89ce830919496a5dcc2158aa33.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb",
                "patch_url": "https://git.kernel.org/stable/p/e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb",
                "filename": "CVE-2024-26585-e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26585/CVE-2024-26585-e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e327ed60bff4a991cd7a709c47c4f0c5b4a4fd57",
                "patch_url": "https://git.kernel.org/stable/p/e327ed60bff4a991cd7a709c47c4f0c5b4a4fd57",
                "filename": "CVE-2024-26585-e327ed60bff4a991cd7a709c47c4f0c5b4a4fd57.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26585/CVE-2024-26585-e327ed60bff4a991cd7a709c47c4f0c5b4a4fd57.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/196f198ca6fce04ba6ce262f5a0e4d567d7d219d",
            "https://git.kernel.org/stable/c/6db22d6c7a6dc914b12c0469b94eb639b6a8a146",
            "https://git.kernel.org/stable/c/dd32621f19243f89ce830919496a5dcc2158aa33",
            "https://git.kernel.org/stable/c/e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb",
            "https://git.kernel.org/stable/c/e327ed60bff4a991cd7a709c47c4f0c5b4a4fd57",
            "https://www.cve.org/CVERecord?id=CVE-2024-26585\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26585\nhttps://lore.kernel.org/linux-cve-announce/2024022150-fancy-numerate-94ab@gregkh/T/#u"
        ]
    },
    "CVE-2024-26586": {
        "cve": "CVE-2024-26586",
        "cvss_v2": null,
        "cvss_v3": 6.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix stack corruption\n\nWhen tc filters are first added to a net device, the corresponding local\nport gets bound to an ACL group in the device. The group contains a list\nof ACLs. In turn, each ACL points to a different TCAM region where the\nfilters are stored. During forwarding, the ACLs are sequentially\nevaluated until a match is found.\n\nOne reason to place filters in different regions is when they are added\nwith decreasing priorities and in an alternating order so that two\nconsecutive filters can never fit in the same region because of their\nkey usage.\n\nIn Spectrum-2 and newer ASICs the firmware started to report that the\nmaximum number of ACLs in a group is more than 16, but the layout of the\nregister that configures ACL groups (PAGT) was not updated to account\nfor that. It is therefore possible to hit stack corruption [1] in the\nrare case where more than 16 ACLs in a group are required.\n\nFix by limiting the maximum ACL group size to the minimum between what\nthe firmware reports and the maximum ACLs that fit in the PAGT register.\n\nAdd a test case to make sure the machine does not crash when this\ncondition is hit.\n\n[1]\nKernel panic - not syncing: stack-protector: Kernel stack is corrupted in: mlxsw_sp_acl_tcam_group_update+0x116/0x120\n[...]\n dump_stack_lvl+0x36/0x50\n panic+0x305/0x330\n __stack_chk_fail+0x15/0x20\n mlxsw_sp_acl_tcam_group_update+0x116/0x120\n mlxsw_sp_acl_tcam_group_region_attach+0x69/0x110\n mlxsw_sp_acl_tcam_vchunk_get+0x492/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26586",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2f5e1565740490706332c06f36211d4ce0f88e62",
            "patch_url": "https://git.kernel.org/stable/p/2f5e1565740490706332c06f36211d4ce0f88e62",
            "filename": "CVE-2024-26586-2f5e1565740490706332c06f36211d4ce0f88e62.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26586/CVE-2024-26586-2f5e1565740490706332c06f36211d4ce0f88e62.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2f5e1565740490706332c06f36211d4ce0f88e62",
                "patch_url": "https://git.kernel.org/stable/p/2f5e1565740490706332c06f36211d4ce0f88e62",
                "filename": "CVE-2024-26586-2f5e1565740490706332c06f36211d4ce0f88e62.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26586/CVE-2024-26586-2f5e1565740490706332c06f36211d4ce0f88e62.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/348112522a35527c5bcba933b9fefb40a4f44f15",
                "patch_url": "https://git.kernel.org/stable/p/348112522a35527c5bcba933b9fefb40a4f44f15",
                "filename": "CVE-2024-26586-348112522a35527c5bcba933b9fefb40a4f44f15.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26586/CVE-2024-26586-348112522a35527c5bcba933b9fefb40a4f44f15.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/483ae90d8f976f8339cf81066312e1329f2d3706",
                "patch_url": "https://git.kernel.org/stable/p/483ae90d8f976f8339cf81066312e1329f2d3706",
                "filename": "CVE-2024-26586-483ae90d8f976f8339cf81066312e1329f2d3706.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26586/CVE-2024-26586-483ae90d8f976f8339cf81066312e1329f2d3706.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/56750ea5d15426b5f307554e7699e8b5f76c3182",
                "patch_url": "https://git.kernel.org/stable/p/56750ea5d15426b5f307554e7699e8b5f76c3182",
                "filename": "CVE-2024-26586-56750ea5d15426b5f307554e7699e8b5f76c3182.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26586/CVE-2024-26586-56750ea5d15426b5f307554e7699e8b5f76c3182.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6fd24675188d354b1cad47462969afa2ab09d819",
                "patch_url": "https://git.kernel.org/stable/p/6fd24675188d354b1cad47462969afa2ab09d819",
                "filename": "CVE-2024-26586-6fd24675188d354b1cad47462969afa2ab09d819.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26586/CVE-2024-26586-6fd24675188d354b1cad47462969afa2ab09d819.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a361c2c1da5dbb13ca67601cf961ab3ad68af383",
                "patch_url": "https://git.kernel.org/stable/p/a361c2c1da5dbb13ca67601cf961ab3ad68af383",
                "filename": "CVE-2024-26586-a361c2c1da5dbb13ca67601cf961ab3ad68af383.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26586/CVE-2024-26586-a361c2c1da5dbb13ca67601cf961ab3ad68af383.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2f5e1565740490706332c06f36211d4ce0f88e62",
            "https://git.kernel.org/stable/c/348112522a35527c5bcba933b9fefb40a4f44f15",
            "https://git.kernel.org/stable/c/483ae90d8f976f8339cf81066312e1329f2d3706",
            "https://git.kernel.org/stable/c/56750ea5d15426b5f307554e7699e8b5f76c3182",
            "https://git.kernel.org/stable/c/6fd24675188d354b1cad47462969afa2ab09d819",
            "https://git.kernel.org/stable/c/a361c2c1da5dbb13ca67601cf961ab3ad68af383",
            "https://www.cve.org/CVERecord?id=CVE-2024-26586\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26586\nhttps://lore.kernel.org/linux-cve-announce/2024022253-CVE-2024-26586-6632@gregkh/T/#u"
        ]
    },
    "CVE-2024-26593": {
        "cve": "CVE-2024-26593",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: i801: Fix block process call transactions\n\nAccording to the Intel datasheets, software must reset the block\nbuffer index twice for block process call transactions: once before\nwriting the outgoing data to the buffer, and once again before\nreading the incoming data from the buffer.\n\nThe driver is currently missing the second reset, causing the wrong\nportion of the block buffer to be read.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26593",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1f8d0691c50581ba6043f009ec9e8b9f78f09d5a",
            "patch_url": "https://git.kernel.org/stable/p/1f8d0691c50581ba6043f009ec9e8b9f78f09d5a",
            "filename": "CVE-2024-26593-1f8d0691c50581ba6043f009ec9e8b9f78f09d5a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26593/CVE-2024-26593-1f8d0691c50581ba6043f009ec9e8b9f78f09d5a.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1f8d0691c50581ba6043f009ec9e8b9f78f09d5a",
                "patch_url": "https://git.kernel.org/stable/p/1f8d0691c50581ba6043f009ec9e8b9f78f09d5a",
                "filename": "CVE-2024-26593-1f8d0691c50581ba6043f009ec9e8b9f78f09d5a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26593/CVE-2024-26593-1f8d0691c50581ba6043f009ec9e8b9f78f09d5a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/491528935c9c48bf341d8b40eabc6c4fc5df6f2c",
                "patch_url": "https://git.kernel.org/stable/p/491528935c9c48bf341d8b40eabc6c4fc5df6f2c",
                "filename": "CVE-2024-26593-491528935c9c48bf341d8b40eabc6c4fc5df6f2c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26593/CVE-2024-26593-491528935c9c48bf341d8b40eabc6c4fc5df6f2c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/609c7c1cc976e740d0fed4dbeec688b3ecb5dce2",
                "patch_url": "https://git.kernel.org/stable/p/609c7c1cc976e740d0fed4dbeec688b3ecb5dce2",
                "filename": "CVE-2024-26593-609c7c1cc976e740d0fed4dbeec688b3ecb5dce2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26593/CVE-2024-26593-609c7c1cc976e740d0fed4dbeec688b3ecb5dce2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6be99c51829b24c914cef5bff6164877178e84d9",
                "patch_url": "https://git.kernel.org/stable/p/6be99c51829b24c914cef5bff6164877178e84d9",
                "filename": "CVE-2024-26593-6be99c51829b24c914cef5bff6164877178e84d9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26593/CVE-2024-26593-6be99c51829b24c914cef5bff6164877178e84d9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7a14b8a477b88607d157c24aeb23e7389ec3319f",
                "patch_url": "https://git.kernel.org/stable/p/7a14b8a477b88607d157c24aeb23e7389ec3319f",
                "filename": "CVE-2024-26593-7a14b8a477b88607d157c24aeb23e7389ec3319f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26593/CVE-2024-26593-7a14b8a477b88607d157c24aeb23e7389ec3319f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c1c9d0f6f7f1dbf29db996bd8e166242843a5f21",
                "patch_url": "https://git.kernel.org/stable/p/c1c9d0f6f7f1dbf29db996bd8e166242843a5f21",
                "filename": "CVE-2024-26593-c1c9d0f6f7f1dbf29db996bd8e166242843a5f21.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26593/CVE-2024-26593-c1c9d0f6f7f1dbf29db996bd8e166242843a5f21.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d074d5ff5ae77b18300e5079c6bda6342a4d44b7",
                "patch_url": "https://git.kernel.org/stable/p/d074d5ff5ae77b18300e5079c6bda6342a4d44b7",
                "filename": "CVE-2024-26593-d074d5ff5ae77b18300e5079c6bda6342a4d44b7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26593/CVE-2024-26593-d074d5ff5ae77b18300e5079c6bda6342a4d44b7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1f8d0691c50581ba6043f009ec9e8b9f78f09d5a",
            "https://git.kernel.org/stable/c/491528935c9c48bf341d8b40eabc6c4fc5df6f2c",
            "https://git.kernel.org/stable/c/609c7c1cc976e740d0fed4dbeec688b3ecb5dce2",
            "https://git.kernel.org/stable/c/6be99c51829b24c914cef5bff6164877178e84d9",
            "https://git.kernel.org/stable/c/7a14b8a477b88607d157c24aeb23e7389ec3319f",
            "https://git.kernel.org/stable/c/c1c9d0f6f7f1dbf29db996bd8e166242843a5f21",
            "https://git.kernel.org/stable/c/d074d5ff5ae77b18300e5079c6bda6342a4d44b7",
            "https://www.cve.org/CVERecord?id=CVE-2024-26593\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26593\nhttps://lore.kernel.org/linux-cve-announce/2024022315-CVE-2024-26593-9d89@gregkh/T/#u"
        ]
    },
    "CVE-2024-26595": {
        "cve": "CVE-2024-26595",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path\n\nWhen calling mlxsw_sp_acl_tcam_region_destroy() from an error path after\nfailing to attach the region to an ACL group, we hit a NULL pointer\ndereference upon 'region->group->tcam' [1].\n\nFix by retrieving the 'tcam' pointer using mlxsw_sp_acl_to_tcam().\n\n[1]\nBUG: kernel NULL pointer dereference, address: 0000000000000000\n[...]\nRIP: 0010:mlxsw_sp_acl_tcam_region_destroy+0xa0/0xd0\n[...]\nCall Trace:\n mlxsw_sp_acl_tcam_vchunk_get+0x88b/0xa20\n mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0\n mlxsw_sp_acl_rule_add+0x47/0x240\n mlxsw_sp_flower_replace+0x1a9/0x1d0\n tc_setup_cb_add+0xdc/0x1c0\n fl_hw_replace_filter+0x146/0x1f0\n fl_change+0xc17/0x1360\n tc_new_tfilter+0x472/0xb90\n rtnetlink_rcv_msg+0x313/0x3b0\n netlink_rcv_skb+0x58/0x100\n netlink_unicast+0x244/0x390\n netlink_sendmsg+0x1e4/0x440\n ____sys_sendmsg+0x164/0x260\n ___sys_sendmsg+0x9a/0xe0\n __sys_sendmsg+0x7a/0xc0\n do_syscall_64+0x40/0xe0\n entry_SYSCALL_64_after_hwframe+0x63/0x6b",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26595",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f",
            "patch_url": "https://git.kernel.org/stable/p/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f",
            "filename": "CVE-2024-26595-d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26595/CVE-2024-26595-d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/75fa2d8b3c0175b519c99ace54ab8474cfd0077e",
                "patch_url": "https://git.kernel.org/stable/p/75fa2d8b3c0175b519c99ace54ab8474cfd0077e",
                "filename": "CVE-2024-26595-75fa2d8b3c0175b519c99ace54ab8474cfd0077e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26595/CVE-2024-26595-75fa2d8b3c0175b519c99ace54ab8474cfd0077e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39",
                "patch_url": "https://git.kernel.org/stable/p/817840d125a370626895df269c50c923b79b0a39",
                "filename": "CVE-2024-26595-817840d125a370626895df269c50c923b79b0a39.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26595/CVE-2024-26595-817840d125a370626895df269c50c923b79b0a39.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f",
                "patch_url": "https://git.kernel.org/stable/p/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f",
                "filename": "CVE-2024-26595-d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26595/CVE-2024-26595-d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809",
                "patch_url": "https://git.kernel.org/stable/p/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809",
                "filename": "CVE-2024-26595-efeb7dfea8ee10cdec11b6b6ba4e405edbe75809.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26595/CVE-2024-26595-efeb7dfea8ee10cdec11b6b6ba4e405edbe75809.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/75fa2d8b3c0175b519c99ace54ab8474cfd0077e",
            "https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39",
            "https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f",
            "https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809",
            "https://www.cve.org/CVERecord?id=CVE-2024-26595\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26595\nhttps://lore.kernel.org/linux-cve-announce/2024022336-CVE-2024-26595-9a8d@gregkh/T/#u"
        ]
    },
    "CVE-2024-26600": {
        "cve": "CVE-2024-26600",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP\n\nIf the external phy working together with phy-omap-usb2 does not implement\nsend_srp(), we may still attempt to call it. This can happen on an idle\nEthernet gadget triggering a wakeup for example:\n\nconfigfs-gadget.g1 gadget.0: ECM Suspend\nconfigfs-gadget.g1 gadget.0: Port suspended. Triggering wakeup\n...\nUnable to handle kernel NULL pointer dereference at virtual address\n00000000 when execute\n...\nPC is at 0x0\nLR is at musb_gadget_wakeup+0x1d4/0x254 [musb_hdrc]\n...\nmusb_gadget_wakeup [musb_hdrc] from usb_gadget_wakeup+0x1c/0x3c [udc_core]\nusb_gadget_wakeup [udc_core] from eth_start_xmit+0x3b0/0x3d4 [u_ether]\neth_start_xmit [u_ether] from dev_hard_start_xmit+0x94/0x24c\ndev_hard_start_xmit from sch_direct_xmit+0x104/0x2e4\nsch_direct_xmit from __dev_queue_xmit+0x334/0xd88\n__dev_queue_xmit from arp_solicit+0xf0/0x268\narp_solicit from neigh_probe+0x54/0x7c\nneigh_probe from __neigh_event_send+0x22c/0x47c\n__neigh_event_send from neigh_resolve_output+0x14c/0x1c0\nneigh_resolve_output from ip_finish_output2+0x1c8/0x628\nip_finish_output2 from ip_send_skb+0x40/0xd8\nip_send_skb from udp_send_skb+0x124/0x340\nudp_send_skb from udp_sendmsg+0x780/0x984\nudp_sendmsg from __sys_sendto+0xd8/0x158\n__sys_sendto from ret_fast_syscall+0x0/0x58\n\nLet's fix the issue by checking for send_srp() and set_vbus() before\ncalling them. For USB peripheral only cases these both could be NULL.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26600",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b",
            "patch_url": "https://git.kernel.org/stable/p/486218c11e8d1c8f515a3bdd70d62203609d4b6b",
            "filename": "CVE-2024-26600-486218c11e8d1c8f515a3bdd70d62203609d4b6b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26600/CVE-2024-26600-486218c11e8d1c8f515a3bdd70d62203609d4b6b.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4",
                "patch_url": "https://git.kernel.org/stable/p/0430bfcd46657d9116a26cd377f112cbc40826a4",
                "filename": "CVE-2024-26600-0430bfcd46657d9116a26cd377f112cbc40826a4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26600/CVE-2024-26600-0430bfcd46657d9116a26cd377f112cbc40826a4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4",
                "patch_url": "https://git.kernel.org/stable/p/14ef61594a5a286ae0d493b8acbf9eac46fd04c4",
                "filename": "CVE-2024-26600-14ef61594a5a286ae0d493b8acbf9eac46fd04c4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26600/CVE-2024-26600-14ef61594a5a286ae0d493b8acbf9eac46fd04c4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1",
                "patch_url": "https://git.kernel.org/stable/p/396e17af6761b3cc9e6e4ca94b4de7f642bfece1",
                "filename": "CVE-2024-26600-396e17af6761b3cc9e6e4ca94b4de7f642bfece1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26600/CVE-2024-26600-396e17af6761b3cc9e6e4ca94b4de7f642bfece1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b",
                "patch_url": "https://git.kernel.org/stable/p/486218c11e8d1c8f515a3bdd70d62203609d4b6b",
                "filename": "CVE-2024-26600-486218c11e8d1c8f515a3bdd70d62203609d4b6b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26600/CVE-2024-26600-486218c11e8d1c8f515a3bdd70d62203609d4b6b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d",
                "patch_url": "https://git.kernel.org/stable/p/7104ba0f1958adb250319e68a15eff89ec4fd36d",
                "filename": "CVE-2024-26600-7104ba0f1958adb250319e68a15eff89ec4fd36d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26600/CVE-2024-26600-7104ba0f1958adb250319e68a15eff89ec4fd36d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5",
                "patch_url": "https://git.kernel.org/stable/p/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5",
                "filename": "CVE-2024-26600-8398d8d735ee93a04fb9e9f490e8cacd737e3bf5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26600/CVE-2024-26600-8398d8d735ee93a04fb9e9f490e8cacd737e3bf5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462",
                "patch_url": "https://git.kernel.org/stable/p/8cc889b9dea0579726be9520fcc766077890b462",
                "filename": "CVE-2024-26600-8cc889b9dea0579726be9520fcc766077890b462.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26600/CVE-2024-26600-8cc889b9dea0579726be9520fcc766077890b462.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3",
                "patch_url": "https://git.kernel.org/stable/p/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3",
                "filename": "CVE-2024-26600-be3b82e4871ba00e9b5d0ede92d396d579d7b3b3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26600/CVE-2024-26600-be3b82e4871ba00e9b5d0ede92d396d579d7b3b3.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4",
            "https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4",
            "https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1",
            "https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b",
            "https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d",
            "https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5",
            "https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462",
            "https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3",
            "https://www.cve.org/CVERecord?id=CVE-2024-26600\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26600\nhttps://lore.kernel.org/linux-cve-announce/2024022405-CVE-2024-26600-44a2@gregkh/T/#u"
        ]
    },
    "CVE-2024-26602": {
        "cve": "CVE-2024-26602",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/membarrier: reduce the ability to hammer on sys_membarrier\n\nOn some systems, sys_membarrier can be very expensive, causing overall\nslowdowns for everything.  So put a lock on the path in order to\nserialize the accesses to prevent the ability for this to be called at\ntoo high of a frequency and saturate the machine.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26602",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2441a64070b85c14eecc3728cc87e883f953f265",
            "patch_url": "https://git.kernel.org/stable/p/2441a64070b85c14eecc3728cc87e883f953f265",
            "filename": "CVE-2024-26602-2441a64070b85c14eecc3728cc87e883f953f265.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26602/CVE-2024-26602-2441a64070b85c14eecc3728cc87e883f953f265.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2441a64070b85c14eecc3728cc87e883f953f265",
                "patch_url": "https://git.kernel.org/stable/p/2441a64070b85c14eecc3728cc87e883f953f265",
                "filename": "CVE-2024-26602-2441a64070b85c14eecc3728cc87e883f953f265.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26602/CVE-2024-26602-2441a64070b85c14eecc3728cc87e883f953f265.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/24ec7504a08a67247fbe798d1de995208a8c128a",
                "patch_url": "https://git.kernel.org/stable/p/24ec7504a08a67247fbe798d1de995208a8c128a",
                "filename": "CVE-2024-26602-24ec7504a08a67247fbe798d1de995208a8c128a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26602/CVE-2024-26602-24ec7504a08a67247fbe798d1de995208a8c128a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3cd139875e9a7688b3fc715264032620812a5fa3",
                "patch_url": "https://git.kernel.org/stable/p/3cd139875e9a7688b3fc715264032620812a5fa3",
                "filename": "CVE-2024-26602-3cd139875e9a7688b3fc715264032620812a5fa3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26602/CVE-2024-26602-3cd139875e9a7688b3fc715264032620812a5fa3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/50fb4e17df319bb33be6f14e2a856950c1577dee",
                "patch_url": "https://git.kernel.org/stable/p/50fb4e17df319bb33be6f14e2a856950c1577dee",
                "filename": "CVE-2024-26602-50fb4e17df319bb33be6f14e2a856950c1577dee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26602/CVE-2024-26602-50fb4e17df319bb33be6f14e2a856950c1577dee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/944d5fe50f3f03daacfea16300e656a1691c4a23",
                "patch_url": "https://git.kernel.org/stable/p/944d5fe50f3f03daacfea16300e656a1691c4a23",
                "filename": "CVE-2024-26602-944d5fe50f3f03daacfea16300e656a1691c4a23.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26602/CVE-2024-26602-944d5fe50f3f03daacfea16300e656a1691c4a23.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b6a2a9cbb67545c825ec95f06adb7ff300a2ad71",
                "patch_url": "https://git.kernel.org/stable/p/b6a2a9cbb67545c825ec95f06adb7ff300a2ad71",
                "filename": "CVE-2024-26602-b6a2a9cbb67545c825ec95f06adb7ff300a2ad71.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26602/CVE-2024-26602-b6a2a9cbb67545c825ec95f06adb7ff300a2ad71.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c5b2063c65d05e79fad8029324581d86cfba7eea",
                "patch_url": "https://git.kernel.org/stable/p/c5b2063c65d05e79fad8029324581d86cfba7eea",
                "filename": "CVE-2024-26602-c5b2063c65d05e79fad8029324581d86cfba7eea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26602/CVE-2024-26602-c5b2063c65d05e79fad8029324581d86cfba7eea.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/db896bbe4a9c67cee377e5f6a743350d3ae4acf6",
                "patch_url": "https://git.kernel.org/stable/p/db896bbe4a9c67cee377e5f6a743350d3ae4acf6",
                "filename": "CVE-2024-26602-db896bbe4a9c67cee377e5f6a743350d3ae4acf6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26602/CVE-2024-26602-db896bbe4a9c67cee377e5f6a743350d3ae4acf6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2441a64070b85c14eecc3728cc87e883f953f265",
            "https://git.kernel.org/stable/c/24ec7504a08a67247fbe798d1de995208a8c128a",
            "https://git.kernel.org/stable/c/3cd139875e9a7688b3fc715264032620812a5fa3",
            "https://git.kernel.org/stable/c/50fb4e17df319bb33be6f14e2a856950c1577dee",
            "https://git.kernel.org/stable/c/944d5fe50f3f03daacfea16300e656a1691c4a23",
            "https://git.kernel.org/stable/c/b6a2a9cbb67545c825ec95f06adb7ff300a2ad71",
            "https://git.kernel.org/stable/c/c5b2063c65d05e79fad8029324581d86cfba7eea",
            "https://git.kernel.org/stable/c/db896bbe4a9c67cee377e5f6a743350d3ae4acf6",
            "https://www.cve.org/CVERecord?id=CVE-2024-26602\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26602\nhttps://github.com/torvalds/linux/commit/944d5fe50f3f03daacfea16300e656a1691c4a23\nhttps://lore.kernel.org/linux-cve-announce/2024022414-CVE-2024-26602-5e76@gregkh/"
        ]
    },
    "CVE-2024-26603": {
        "cve": "CVE-2024-26603",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Stop relying on userspace for info to fault in xsave buffer\n\nBefore this change, the expected size of the user space buffer was\ntaken from fx_sw->xstate_size. fx_sw->xstate_size can be changed\nfrom user-space, so it is possible construct a sigreturn frame where:\n\n * fx_sw->xstate_size is smaller than the size required by valid bits in\n   fx_sw->xfeatures.\n * user-space unmaps parts of the sigrame fpu buffer so that not all of\n   the buffer required by xrstor is accessible.\n\nIn this case, xrstor tries to restore and accesses the unmapped area\nwhich results in a fault. But fault_in_readable succeeds because buf +\nfx_sw->xstate_size is within the still mapped area, so it goes back and\ntries xrstor again. It will spin in this loop forever.\n\nInstead, fault in the maximum size which can be touched by XRSTOR (taken\nfrom fpstate->user_size).\n\n[ dhansen: tweak subject / changelog ]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26603",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/627339cccdc9166792ecf96bc3c9f711a60ce996",
            "patch_url": "https://git.kernel.org/stable/p/627339cccdc9166792ecf96bc3c9f711a60ce996",
            "filename": "CVE-2024-26603-627339cccdc9166792ecf96bc3c9f711a60ce996.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26603/CVE-2024-26603-627339cccdc9166792ecf96bc3c9f711a60ce996.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/627339cccdc9166792ecf96bc3c9f711a60ce996",
                "patch_url": "https://git.kernel.org/stable/p/627339cccdc9166792ecf96bc3c9f711a60ce996",
                "filename": "CVE-2024-26603-627339cccdc9166792ecf96bc3c9f711a60ce996.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26603/CVE-2024-26603-627339cccdc9166792ecf96bc3c9f711a60ce996.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/627e28cbb65564e55008315d9e02fbb90478beda",
                "patch_url": "https://git.kernel.org/stable/p/627e28cbb65564e55008315d9e02fbb90478beda",
                "filename": "CVE-2024-26603-627e28cbb65564e55008315d9e02fbb90478beda.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26603/CVE-2024-26603-627e28cbb65564e55008315d9e02fbb90478beda.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8bd3eee7720c14b59a206bd05b98d7586bccf99a",
                "patch_url": "https://git.kernel.org/stable/p/8bd3eee7720c14b59a206bd05b98d7586bccf99a",
                "filename": "CVE-2024-26603-8bd3eee7720c14b59a206bd05b98d7586bccf99a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26603/CVE-2024-26603-8bd3eee7720c14b59a206bd05b98d7586bccf99a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b2479ab426cef7ab79a13005650eff956223ced2",
                "patch_url": "https://git.kernel.org/stable/p/b2479ab426cef7ab79a13005650eff956223ced2",
                "filename": "CVE-2024-26603-b2479ab426cef7ab79a13005650eff956223ced2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26603/CVE-2024-26603-b2479ab426cef7ab79a13005650eff956223ced2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d877550eaf2dc9090d782864c96939397a3c6835",
                "patch_url": "https://git.kernel.org/stable/p/d877550eaf2dc9090d782864c96939397a3c6835",
                "filename": "CVE-2024-26603-d877550eaf2dc9090d782864c96939397a3c6835.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26603/CVE-2024-26603-d877550eaf2dc9090d782864c96939397a3c6835.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/627339cccdc9166792ecf96bc3c9f711a60ce996",
            "https://git.kernel.org/stable/c/627e28cbb65564e55008315d9e02fbb90478beda",
            "https://git.kernel.org/stable/c/8bd3eee7720c14b59a206bd05b98d7586bccf99a",
            "https://git.kernel.org/stable/c/b2479ab426cef7ab79a13005650eff956223ced2",
            "https://git.kernel.org/stable/c/d877550eaf2dc9090d782864c96939397a3c6835",
            "https://www.cve.org/CVERecord?id=CVE-2024-26603\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26603\nhttps://lore.kernel.org/linux-cve-announce/2024022415-CVE-2024-26603-42c2@gregkh/T/#u"
        ]
    },
    "CVE-2024-26609": {
        "cve": "CVE-2024-26609",
        "cvss_v2": null,
        "cvss_v3": null,
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26609",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4e66422f1b56149761dc76030e6345d1cca6f869",
            "patch_url": "https://git.kernel.org/stable/p/4e66422f1b56149761dc76030e6345d1cca6f869",
            "filename": "CVE-2024-26609-4e66422f1b56149761dc76030e6345d1cca6f869.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26609/CVE-2024-26609-4e66422f1b56149761dc76030e6345d1cca6f869.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4e66422f1b56149761dc76030e6345d1cca6f869",
                "patch_url": "https://git.kernel.org/stable/p/4e66422f1b56149761dc76030e6345d1cca6f869",
                "filename": "CVE-2024-26609-4e66422f1b56149761dc76030e6345d1cca6f869.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26609/CVE-2024-26609-4e66422f1b56149761dc76030e6345d1cca6f869.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/55a60251fa50d4e68175e36666b536a602ce4f6c",
                "patch_url": "https://git.kernel.org/stable/p/55a60251fa50d4e68175e36666b536a602ce4f6c",
                "filename": "CVE-2024-26609-55a60251fa50d4e68175e36666b536a602ce4f6c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26609/CVE-2024-26609-55a60251fa50d4e68175e36666b536a602ce4f6c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6653118b176a00915125521c6572ae8e507621db",
                "patch_url": "https://git.kernel.org/stable/p/6653118b176a00915125521c6572ae8e507621db",
                "filename": "CVE-2024-26609-6653118b176a00915125521c6572ae8e507621db.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26609/CVE-2024-26609-6653118b176a00915125521c6572ae8e507621db.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8365e9d92b85fda975a5ece7a3a139cb964018c8",
                "patch_url": "https://git.kernel.org/stable/p/8365e9d92b85fda975a5ece7a3a139cb964018c8",
                "filename": "CVE-2024-26609-8365e9d92b85fda975a5ece7a3a139cb964018c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26609/CVE-2024-26609-8365e9d92b85fda975a5ece7a3a139cb964018c8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8e34430e33b8a80bc014f3efe29cac76bc30a4b4",
                "patch_url": "https://git.kernel.org/stable/p/8e34430e33b8a80bc014f3efe29cac76bc30a4b4",
                "filename": "CVE-2024-26609-8e34430e33b8a80bc014f3efe29cac76bc30a4b4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26609/CVE-2024-26609-8e34430e33b8a80bc014f3efe29cac76bc30a4b4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/960cf4f812530f01f6acc6878ceaa5404c06af7b",
                "patch_url": "https://git.kernel.org/stable/p/960cf4f812530f01f6acc6878ceaa5404c06af7b",
                "filename": "CVE-2024-26609-960cf4f812530f01f6acc6878ceaa5404c06af7b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26609/CVE-2024-26609-960cf4f812530f01f6acc6878ceaa5404c06af7b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f05a497e7bc8851eeeb3a58da180ba469efebb05",
                "patch_url": "https://git.kernel.org/stable/p/f05a497e7bc8851eeeb3a58da180ba469efebb05",
                "filename": "CVE-2024-26609-f05a497e7bc8851eeeb3a58da180ba469efebb05.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26609/CVE-2024-26609-f05a497e7bc8851eeeb3a58da180ba469efebb05.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f342de4e2f33e0e39165d8639387aa6c19dff660",
                "patch_url": "https://git.kernel.org/stable/p/f342de4e2f33e0e39165d8639387aa6c19dff660",
                "filename": "CVE-2024-26609-f342de4e2f33e0e39165d8639387aa6c19dff660.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26609/CVE-2024-26609-f342de4e2f33e0e39165d8639387aa6c19dff660.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4e66422f1b56149761dc76030e6345d1cca6f869",
            "https://git.kernel.org/stable/c/55a60251fa50d4e68175e36666b536a602ce4f6c",
            "https://git.kernel.org/stable/c/6653118b176a00915125521c6572ae8e507621db",
            "https://git.kernel.org/stable/c/8365e9d92b85fda975a5ece7a3a139cb964018c8",
            "https://git.kernel.org/stable/c/8e34430e33b8a80bc014f3efe29cac76bc30a4b4",
            "https://git.kernel.org/stable/c/960cf4f812530f01f6acc6878ceaa5404c06af7b",
            "https://git.kernel.org/stable/c/f05a497e7bc8851eeeb3a58da180ba469efebb05",
            "https://git.kernel.org/stable/c/f342de4e2f33e0e39165d8639387aa6c19dff660"
        ]
    },
    "CVE-2024-26610": {
        "cve": "CVE-2024-26610",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: fix a memory corruption\n\niwl_fw_ini_trigger_tlv::data is a pointer to a __le32, which means that\nif we copy to iwl_fw_ini_trigger_tlv::data + offset while offset is in\nbytes, we'll write past the buffer.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26610",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/aa2cc9363926991ba74411e3aa0a0ea82c1ffe32",
            "patch_url": "https://git.kernel.org/stable/p/aa2cc9363926991ba74411e3aa0a0ea82c1ffe32",
            "filename": "CVE-2024-26610-aa2cc9363926991ba74411e3aa0a0ea82c1ffe32.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26610/CVE-2024-26610-aa2cc9363926991ba74411e3aa0a0ea82c1ffe32.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/05dd9facfb9a1e056752c0901c6e86416037d15a",
                "patch_url": "https://git.kernel.org/stable/p/05dd9facfb9a1e056752c0901c6e86416037d15a",
                "filename": "CVE-2024-26610-05dd9facfb9a1e056752c0901c6e86416037d15a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26610/CVE-2024-26610-05dd9facfb9a1e056752c0901c6e86416037d15a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/870171899d75d43e3d14360f3a4850e90a9c289b",
                "patch_url": "https://git.kernel.org/stable/p/870171899d75d43e3d14360f3a4850e90a9c289b",
                "filename": "CVE-2024-26610-870171899d75d43e3d14360f3a4850e90a9c289b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26610/CVE-2024-26610-870171899d75d43e3d14360f3a4850e90a9c289b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/99a23462fe1a6f709f0fda3ebbe8b6b193ac75bd",
                "patch_url": "https://git.kernel.org/stable/p/99a23462fe1a6f709f0fda3ebbe8b6b193ac75bd",
                "filename": "CVE-2024-26610-99a23462fe1a6f709f0fda3ebbe8b6b193ac75bd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26610/CVE-2024-26610-99a23462fe1a6f709f0fda3ebbe8b6b193ac75bd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aa2cc9363926991ba74411e3aa0a0ea82c1ffe32",
                "patch_url": "https://git.kernel.org/stable/p/aa2cc9363926991ba74411e3aa0a0ea82c1ffe32",
                "filename": "CVE-2024-26610-aa2cc9363926991ba74411e3aa0a0ea82c1ffe32.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26610/CVE-2024-26610-aa2cc9363926991ba74411e3aa0a0ea82c1ffe32.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf4a0d840ecc72fcf16198d5e9c505ab7d5a5e4d",
                "patch_url": "https://git.kernel.org/stable/p/cf4a0d840ecc72fcf16198d5e9c505ab7d5a5e4d",
                "filename": "CVE-2024-26610-cf4a0d840ecc72fcf16198d5e9c505ab7d5a5e4d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26610/CVE-2024-26610-cf4a0d840ecc72fcf16198d5e9c505ab7d5a5e4d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f32a81999d0b8e5ce60afb5f6a3dd7241c17dd67",
                "patch_url": "https://git.kernel.org/stable/p/f32a81999d0b8e5ce60afb5f6a3dd7241c17dd67",
                "filename": "CVE-2024-26610-f32a81999d0b8e5ce60afb5f6a3dd7241c17dd67.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26610/CVE-2024-26610-f32a81999d0b8e5ce60afb5f6a3dd7241c17dd67.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/05dd9facfb9a1e056752c0901c6e86416037d15a",
            "https://git.kernel.org/stable/c/870171899d75d43e3d14360f3a4850e90a9c289b",
            "https://git.kernel.org/stable/c/99a23462fe1a6f709f0fda3ebbe8b6b193ac75bd",
            "https://git.kernel.org/stable/c/aa2cc9363926991ba74411e3aa0a0ea82c1ffe32",
            "https://git.kernel.org/stable/c/cf4a0d840ecc72fcf16198d5e9c505ab7d5a5e4d",
            "https://git.kernel.org/stable/c/f32a81999d0b8e5ce60afb5f6a3dd7241c17dd67",
            "https://www.cve.org/CVERecord?id=CVE-2024-26610\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26610\nhttps://lore.kernel.org/linux-cve-announce/20240229155245.1571576-42-lee@kernel.org/T"
        ]
    },
    "CVE-2024-26614": {
        "cve": "CVE-2024-26614",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: make sure init the accept_queue's spinlocks once\n\nWhen I run syz's reproduction C program locally, it causes the following\nissue:\npvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0!\nWARNING: CPU: 19 PID: 21160 at __pv_queued_spin_unlock_slowpath (kernel/locking/qspinlock_paravirt.h:508)\nHardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\nRIP: 0010:__pv_queued_spin_unlock_slowpath (kernel/locking/qspinlock_paravirt.h:508)\nCode: 73 56 3a ff 90 c3 cc cc cc cc 8b 05 bb 1f 48 01 85 c0 74 05 c3 cc cc cc cc 8b 17 48 89 fe 48 c7 c7\n30 20 ce 8f e8 ad 56 42 ff <0f> 0b c3 cc cc cc cc 0f 0b 0f 1f 40 00 90 90 90 90 90 90 90 90 90\nRSP: 0018:ffffa8d200604cb8 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9d1ef60e0908\nRDX: 00000000ffffffd8 RSI: 0000000000000027 RDI: ffff9d1ef60e0900\nRBP: ffff9d181cd5c280 R08: 0000000000000000 R09: 00000000ffff7fff\nR10: ffffa8d200604b68 R11: ffffffff907dcdc8 R12: 0000000000000000\nR13: ffff9d181cd5c660 R14: ffff9d1813a3f330 R15: 0000000000001000\nFS:  00007fa110184640(0000) GS:ffff9d1ef60c0000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000000 CR3: 000000011f65e000 CR4: 00000000000006f0\nCall Trace:\n<IRQ>\n  _raw_spin_unlock (kernel/locking/spinlock.c:186)\n  inet_csk_reqsk_queue_add (net/ipv4/inet_connection_sock.c:1321)\n  inet_csk_complete_hashdance (net/ipv4/inet_connection_sock.c:1358)\n  tcp_check_req (net/ipv4/tcp_minisocks.c:868)\n  tcp_v4_rcv (net/ipv4/tcp_ipv4.c:2260)\n  ip_protocol_deliver_rcu (net/ipv4/ip_input.c:205)\n  ip_local_deliver_finish (net/ipv4/ip_input.c:234)\n  __netif_receive_skb_one_core (net/core/dev.c:5529)\n  process_backlog (./include/linux/rcupdate.h:779)\n  __napi_poll (net/core/dev.c:6533)\n  net_rx_action (net/core/dev.c:6604)\n  __do_softirq (./arch/x86/include/asm/jump_label.h:27)\n  do_softirq (kernel/softirq.c:454 kernel/softirq.c:441)\n</IRQ>\n<TASK>\n  __local_bh_enable_ip (kernel/softirq.c:381)\n  __dev_queue_xmit (net/core/dev.c:4374)\n  ip_finish_output2 (./include/net/neighbour.h:540 net/ipv4/ip_output.c:235)\n  __ip_queue_xmit (net/ipv4/ip_output.c:535)\n  __tcp_transmit_skb (net/ipv4/tcp_output.c:1462)\n  tcp_rcv_synsent_state_process (net/ipv4/tcp_input.c:6469)\n  tcp_rcv_state_process (net/ipv4/tcp_input.c:6657)\n  tcp_v4_do_rcv (net/ipv4/tcp_ipv4.c:1929)\n  __release_sock (./include/net/sock.h:1121 net/core/sock.c:2968)\n  release_sock (net/core/sock.c:3536)\n  inet_wait_for_connect (net/ipv4/af_inet.c:609)\n  __inet_stream_connect (net/ipv4/af_inet.c:702)\n  inet_stream_connect (net/ipv4/af_inet.c:748)\n  __sys_connect (./include/linux/file.h:45 net/socket.c:2064)\n  __x64_sys_connect (net/socket.c:2073 net/socket.c:2070 net/socket.c:2070)\n  do_syscall_64 (arch/x86/entry/common.c:51 arch/x86/entry/common.c:82)\n  entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129)\n  RIP: 0033:0x7fa10ff05a3d\n  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89\n  c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d ab a3 0e 00 f7 d8 64 89 01 48\n  RSP: 002b:00007fa110183de8 EFLAGS: 00000202 ORIG_RAX: 000000000000002a\n  RAX: ffffffffffffffda RBX: 0000000020000054 RCX: 00007fa10ff05a3d\n  RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000003\n  RBP: 00007fa110183e20 R08: 0000000000000000 R09: 0000000000000000\n  R10: 0000000000000000 R11: 0000000000000202 R12: 00007fa110184640\n  R13: 0000000000000000 R14: 00007fa10fe8b060 R15: 00007fff73e23b20\n</TASK>\n\nThe issue triggering process is analyzed as follows:\nThread A                                       Thread B\ntcp_v4_rcv\t//receive ack TCP packet       inet_shutdown\n  tcp_check_req                                  tcp_disconnect //disconnect sock\n  ...                                              tcp_set_state(sk, TCP_CLOSE)\n    inet_csk_complete_hashdance                ...\n      inet_csk_reqsk_queue_add         \n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26614",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882",
            "patch_url": "https://git.kernel.org/stable/p/bc99dcedd2f422d602516762b96c8ef1ae6b2882",
            "filename": "CVE-2024-26614-bc99dcedd2f422d602516762b96c8ef1ae6b2882.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26614/CVE-2024-26614-bc99dcedd2f422d602516762b96c8ef1ae6b2882.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02",
                "patch_url": "https://git.kernel.org/stable/p/168e7e599860654876c2a1102a82610285c02f02",
                "filename": "CVE-2024-26614-168e7e599860654876c2a1102a82610285c02f02.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26614/CVE-2024-26614-168e7e599860654876c2a1102a82610285c02f02.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2",
                "patch_url": "https://git.kernel.org/stable/p/198bc90e0e734e5f98c3d2833e8390cac3df61b2",
                "filename": "CVE-2024-26614-198bc90e0e734e5f98c3d2833e8390cac3df61b2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26614/CVE-2024-26614-198bc90e0e734e5f98c3d2833e8390cac3df61b2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a",
                "patch_url": "https://git.kernel.org/stable/p/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a",
                "filename": "CVE-2024-26614-3982fe726a63fb3de6005e534e2ac8ca7e0aca2a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26614/CVE-2024-26614-3982fe726a63fb3de6005e534e2ac8ca7e0aca2a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855",
                "patch_url": "https://git.kernel.org/stable/p/b1e0a68a0cd2a83259c444f638b417a8fffc6855",
                "filename": "CVE-2024-26614-b1e0a68a0cd2a83259c444f638b417a8fffc6855.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26614/CVE-2024-26614-b1e0a68a0cd2a83259c444f638b417a8fffc6855.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882",
                "patch_url": "https://git.kernel.org/stable/p/bc99dcedd2f422d602516762b96c8ef1ae6b2882",
                "filename": "CVE-2024-26614-bc99dcedd2f422d602516762b96c8ef1ae6b2882.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26614/CVE-2024-26614-bc99dcedd2f422d602516762b96c8ef1ae6b2882.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3",
                "patch_url": "https://git.kernel.org/stable/p/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3",
                "filename": "CVE-2024-26614-d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26614/CVE-2024-26614-d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02",
            "https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2",
            "https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a",
            "https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855",
            "https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882",
            "https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3",
            "https://www.cve.org/CVERecord?id=CVE-2024-26614\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26614\nhttps://lore.kernel.org/linux-cve-announce/20240229155245.1571576-46-lee@kernel.org/T"
        ]
    },
    "CVE-2024-26615": {
        "cve": "CVE-2024-26615",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: fix illegal rmb_desc access in SMC-D connection dump\n\nA crash was found when dumping SMC-D connections. It can be reproduced\nby following steps:\n\n- run nginx/wrk test:\n  smc_run nginx\n  smc_run wrk -t 16 -c 1000 -d <duration> -H 'Connection: Close' <URL>\n\n- continuously dump SMC-D connections in parallel:\n  watch -n 1 'smcss -D'\n\n BUG: kernel NULL pointer dereference, address: 0000000000000030\n CPU: 2 PID: 7204 Comm: smcss Kdump: loaded Tainted: G\tE      6.7.0+ #55\n RIP: 0010:__smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]\n Call Trace:\n  <TASK>\n  ? __die+0x24/0x70\n  ? page_fault_oops+0x66/0x150\n  ? exc_page_fault+0x69/0x140\n  ? asm_exc_page_fault+0x26/0x30\n  ? __smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]\n  ? __kmalloc_node_track_caller+0x35d/0x430\n  ? __alloc_skb+0x77/0x170\n  smc_diag_dump_proto+0xd0/0xf0 [smc_diag]\n  smc_diag_dump+0x26/0x60 [smc_diag]\n  netlink_dump+0x19f/0x320\n  __netlink_dump_start+0x1dc/0x300\n  smc_diag_handler_dump+0x6a/0x80 [smc_diag]\n  ? __pfx_smc_diag_dump+0x10/0x10 [smc_diag]\n  sock_diag_rcv_msg+0x121/0x140\n  ? __pfx_sock_diag_rcv_msg+0x10/0x10\n  netlink_rcv_skb+0x5a/0x110\n  sock_diag_rcv+0x28/0x40\n  netlink_unicast+0x22a/0x330\n  netlink_sendmsg+0x1f8/0x420\n  __sock_sendmsg+0xb0/0xc0\n  ____sys_sendmsg+0x24e/0x300\n  ? copy_msghdr_from_user+0x62/0x80\n  ___sys_sendmsg+0x7c/0xd0\n  ? __do_fault+0x34/0x160\n  ? do_read_fault+0x5f/0x100\n  ? do_fault+0xb0/0x110\n  ? __handle_mm_fault+0x2b0/0x6c0\n  __sys_sendmsg+0x4d/0x80\n  do_syscall_64+0x69/0x180\n  entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nIt is possible that the connection is in process of being established\nwhen we dump it. Assumed that the connection has been registered in a\nlink group by smc_conn_create() but the rmb_desc has not yet been\ninitialized by smc_buf_create(), thus causing the illegal access to\nconn->rmb_desc. So fix it by checking before dump.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26615",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6994dba06321e3c48fdad0ba796a063d9d82183a",
            "patch_url": "https://git.kernel.org/stable/p/6994dba06321e3c48fdad0ba796a063d9d82183a",
            "filename": "CVE-2024-26615-6994dba06321e3c48fdad0ba796a063d9d82183a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26615/CVE-2024-26615-6994dba06321e3c48fdad0ba796a063d9d82183a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1fea9969b81c67d0cb1611d1b8b7d19049d937be",
                "patch_url": "https://git.kernel.org/stable/p/1fea9969b81c67d0cb1611d1b8b7d19049d937be",
                "filename": "CVE-2024-26615-1fea9969b81c67d0cb1611d1b8b7d19049d937be.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26615/CVE-2024-26615-1fea9969b81c67d0cb1611d1b8b7d19049d937be.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/27aea64838914c6122db5b8bd4bed865c9736f22",
                "patch_url": "https://git.kernel.org/stable/p/27aea64838914c6122db5b8bd4bed865c9736f22",
                "filename": "CVE-2024-26615-27aea64838914c6122db5b8bd4bed865c9736f22.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26615/CVE-2024-26615-27aea64838914c6122db5b8bd4bed865c9736f22.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5fed92ca32eafbfae8b6bee8ca34cca71c6a8b6d",
                "patch_url": "https://git.kernel.org/stable/p/5fed92ca32eafbfae8b6bee8ca34cca71c6a8b6d",
                "filename": "CVE-2024-26615-5fed92ca32eafbfae8b6bee8ca34cca71c6a8b6d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26615/CVE-2024-26615-5fed92ca32eafbfae8b6bee8ca34cca71c6a8b6d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/68b888d51ac82f2b96bf5e077a31d76afcdef25a",
                "patch_url": "https://git.kernel.org/stable/p/68b888d51ac82f2b96bf5e077a31d76afcdef25a",
                "filename": "CVE-2024-26615-68b888d51ac82f2b96bf5e077a31d76afcdef25a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26615/CVE-2024-26615-68b888d51ac82f2b96bf5e077a31d76afcdef25a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6994dba06321e3c48fdad0ba796a063d9d82183a",
                "patch_url": "https://git.kernel.org/stable/p/6994dba06321e3c48fdad0ba796a063d9d82183a",
                "filename": "CVE-2024-26615-6994dba06321e3c48fdad0ba796a063d9d82183a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26615/CVE-2024-26615-6994dba06321e3c48fdad0ba796a063d9d82183a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8f3f9186e5bb96a9c9654c41653210e3ea7e48a6",
                "patch_url": "https://git.kernel.org/stable/p/8f3f9186e5bb96a9c9654c41653210e3ea7e48a6",
                "filename": "CVE-2024-26615-8f3f9186e5bb96a9c9654c41653210e3ea7e48a6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26615/CVE-2024-26615-8f3f9186e5bb96a9c9654c41653210e3ea7e48a6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a164c2922675d7051805cdaf2b07daffe44f20d9",
                "patch_url": "https://git.kernel.org/stable/p/a164c2922675d7051805cdaf2b07daffe44f20d9",
                "filename": "CVE-2024-26615-a164c2922675d7051805cdaf2b07daffe44f20d9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26615/CVE-2024-26615-a164c2922675d7051805cdaf2b07daffe44f20d9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dbc153fd3c142909e564bb256da087e13fbf239c",
                "patch_url": "https://git.kernel.org/stable/p/dbc153fd3c142909e564bb256da087e13fbf239c",
                "filename": "CVE-2024-26615-dbc153fd3c142909e564bb256da087e13fbf239c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26615/CVE-2024-26615-dbc153fd3c142909e564bb256da087e13fbf239c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1fea9969b81c67d0cb1611d1b8b7d19049d937be",
            "https://git.kernel.org/stable/c/27aea64838914c6122db5b8bd4bed865c9736f22",
            "https://git.kernel.org/stable/c/5fed92ca32eafbfae8b6bee8ca34cca71c6a8b6d",
            "https://git.kernel.org/stable/c/68b888d51ac82f2b96bf5e077a31d76afcdef25a",
            "https://git.kernel.org/stable/c/6994dba06321e3c48fdad0ba796a063d9d82183a",
            "https://git.kernel.org/stable/c/8f3f9186e5bb96a9c9654c41653210e3ea7e48a6",
            "https://git.kernel.org/stable/c/a164c2922675d7051805cdaf2b07daffe44f20d9",
            "https://git.kernel.org/stable/c/dbc153fd3c142909e564bb256da087e13fbf239c",
            "https://www.cve.org/CVERecord?id=CVE-2024-26615\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26615\nhttps://lore.kernel.org/linux-cve-announce/20240229155245.1571576-47-lee@kernel.org/T/#u"
        ]
    },
    "CVE-2024-26638": {
        "cve": "CVE-2024-26638",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: always initialize struct msghdr completely\n\nsyzbot complains that msg->msg_get_inq value can be uninitialized [1]\n\nstruct msghdr got many new fields recently, we should always make\nsure their values is zero by default.\n\n[1]\n BUG: KMSAN: uninit-value in tcp_recvmsg+0x686/0xac0 net/ipv4/tcp.c:2571\n  tcp_recvmsg+0x686/0xac0 net/ipv4/tcp.c:2571\n  inet_recvmsg+0x131/0x580 net/ipv4/af_inet.c:879\n  sock_recvmsg_nosec net/socket.c:1044 [inline]\n  sock_recvmsg+0x12b/0x1e0 net/socket.c:1066\n  __sock_xmit+0x236/0x5c0 drivers/block/nbd.c:538\n  nbd_read_reply drivers/block/nbd.c:732 [inline]\n  recv_work+0x262/0x3100 drivers/block/nbd.c:863\n  process_one_work kernel/workqueue.c:2627 [inline]\n  process_scheduled_works+0x104e/0x1e70 kernel/workqueue.c:2700\n  worker_thread+0xf45/0x1490 kernel/workqueue.c:2781\n  kthread+0x3ed/0x540 kernel/kthread.c:388\n  ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147\n  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242\n\nLocal variable msg created at:\n  __sock_xmit+0x4c/0x5c0 drivers/block/nbd.c:513\n  nbd_read_reply drivers/block/nbd.c:732 [inline]\n  recv_work+0x262/0x3100 drivers/block/nbd.c:863\n\nCPU: 1 PID: 7465 Comm: kworker/u5:1 Not tainted 6.7.0-rc7-syzkaller-00041-gf016f7547aee #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\nWorkqueue: nbd5-recv recv_work",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26638",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/d9c54763e5cdbbd3f81868597fe8aca3c96e6387",
            "patch_url": "https://git.kernel.org/stable/p/d9c54763e5cdbbd3f81868597fe8aca3c96e6387",
            "filename": "CVE-2024-26638-d9c54763e5cdbbd3f81868597fe8aca3c96e6387.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26638/CVE-2024-26638-d9c54763e5cdbbd3f81868597fe8aca3c96e6387.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1960f2b534da1e6c65fb96f9e98bda773495f406",
                "patch_url": "https://git.kernel.org/stable/p/1960f2b534da1e6c65fb96f9e98bda773495f406",
                "filename": "CVE-2024-26638-1960f2b534da1e6c65fb96f9e98bda773495f406.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26638/CVE-2024-26638-1960f2b534da1e6c65fb96f9e98bda773495f406.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/78fbb92af27d0982634116c7a31065f24d092826",
                "patch_url": "https://git.kernel.org/stable/p/78fbb92af27d0982634116c7a31065f24d092826",
                "filename": "CVE-2024-26638-78fbb92af27d0982634116c7a31065f24d092826.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26638/CVE-2024-26638-78fbb92af27d0982634116c7a31065f24d092826.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b0028f333420a65a53a63978522db680b37379dd",
                "patch_url": "https://git.kernel.org/stable/p/b0028f333420a65a53a63978522db680b37379dd",
                "filename": "CVE-2024-26638-b0028f333420a65a53a63978522db680b37379dd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26638/CVE-2024-26638-b0028f333420a65a53a63978522db680b37379dd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d9c54763e5cdbbd3f81868597fe8aca3c96e6387",
                "patch_url": "https://git.kernel.org/stable/p/d9c54763e5cdbbd3f81868597fe8aca3c96e6387",
                "filename": "CVE-2024-26638-d9c54763e5cdbbd3f81868597fe8aca3c96e6387.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26638/CVE-2024-26638-d9c54763e5cdbbd3f81868597fe8aca3c96e6387.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1960f2b534da1e6c65fb96f9e98bda773495f406",
            "https://git.kernel.org/stable/c/78fbb92af27d0982634116c7a31065f24d092826",
            "https://git.kernel.org/stable/c/b0028f333420a65a53a63978522db680b37379dd",
            "https://git.kernel.org/stable/c/d9c54763e5cdbbd3f81868597fe8aca3c96e6387",
            "https://www.cve.org/CVERecord?id=CVE-2024-26638\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26638\nhttps://lore.kernel.org/linux-cve-announce/20240318101458.2835626-16-lee@kernel.org/T"
        ]
    },
    "CVE-2024-26640": {
        "cve": "CVE-2024-26640",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: add sanity checks to rx zerocopy\n\nTCP rx zerocopy intent is to map pages initially allocated\nfrom NIC drivers, not pages owned by a fs.\n\nThis patch adds to can_map_frag() these additional checks:\n\n- Page must not be a compound one.\n- page->mapping must be NULL.\n\nThis fixes the panic reported by ZhangPeng.\n\nsyzbot was able to loopback packets built with sendfile(),\nmapping pages owned by an ext4 file to TCP rx zerocopy.\n\nr3 = socket$inet_tcp(0x2, 0x1, 0x0)\nmmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0)\nr4 = socket$inet_tcp(0x2, 0x1, 0x0)\nbind$inet(r4, &(0x7f0000000000)={0x2, 0x4e24, @multicast1}, 0x10)\nconnect$inet(r4, &(0x7f00000006c0)={0x2, 0x4e24, @empty}, 0x10)\nr5 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\\x00',\n    0x181e42, 0x0)\nfallocate(r5, 0x0, 0x0, 0x85b8)\nsendfile(r4, r5, 0x0, 0x8ba0)\ngetsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23,\n    &(0x7f00000001c0)={&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0,\n    0x0, 0x0, 0x0, 0x0}, &(0x7f0000000440)=0x40)\nr6 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\\x00',\n    0x181e42, 0x0)",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26640",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1b8adcc0e2c584fec778add7777fe28e20781e60",
            "patch_url": "https://git.kernel.org/stable/p/1b8adcc0e2c584fec778add7777fe28e20781e60",
            "filename": "CVE-2024-26640-1b8adcc0e2c584fec778add7777fe28e20781e60.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26640/CVE-2024-26640-1b8adcc0e2c584fec778add7777fe28e20781e60.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1b8adcc0e2c584fec778add7777fe28e20781e60",
                "patch_url": "https://git.kernel.org/stable/p/1b8adcc0e2c584fec778add7777fe28e20781e60",
                "filename": "CVE-2024-26640-1b8adcc0e2c584fec778add7777fe28e20781e60.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26640/CVE-2024-26640-1b8adcc0e2c584fec778add7777fe28e20781e60.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/577e4432f3ac810049cb7e6b71f4d96ec7c6e894",
                "patch_url": "https://git.kernel.org/stable/p/577e4432f3ac810049cb7e6b71f4d96ec7c6e894",
                "filename": "CVE-2024-26640-577e4432f3ac810049cb7e6b71f4d96ec7c6e894.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26640/CVE-2024-26640-577e4432f3ac810049cb7e6b71f4d96ec7c6e894.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/718f446e60316bf606946f7f42367d691d21541e",
                "patch_url": "https://git.kernel.org/stable/p/718f446e60316bf606946f7f42367d691d21541e",
                "filename": "CVE-2024-26640-718f446e60316bf606946f7f42367d691d21541e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26640/CVE-2024-26640-718f446e60316bf606946f7f42367d691d21541e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b383d4ea272fe5795877506dcce5aad1f6330e5e",
                "patch_url": "https://git.kernel.org/stable/p/b383d4ea272fe5795877506dcce5aad1f6330e5e",
                "filename": "CVE-2024-26640-b383d4ea272fe5795877506dcce5aad1f6330e5e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26640/CVE-2024-26640-b383d4ea272fe5795877506dcce5aad1f6330e5e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d15cc0f66884ef2bed28c7ccbb11c102aa3a0760",
                "patch_url": "https://git.kernel.org/stable/p/d15cc0f66884ef2bed28c7ccbb11c102aa3a0760",
                "filename": "CVE-2024-26640-d15cc0f66884ef2bed28c7ccbb11c102aa3a0760.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26640/CVE-2024-26640-d15cc0f66884ef2bed28c7ccbb11c102aa3a0760.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f48bf9a83b1666d934247cb58a9887d7b3127b6f",
                "patch_url": "https://git.kernel.org/stable/p/f48bf9a83b1666d934247cb58a9887d7b3127b6f",
                "filename": "CVE-2024-26640-f48bf9a83b1666d934247cb58a9887d7b3127b6f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26640/CVE-2024-26640-f48bf9a83b1666d934247cb58a9887d7b3127b6f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1b8adcc0e2c584fec778add7777fe28e20781e60",
            "https://git.kernel.org/stable/c/577e4432f3ac810049cb7e6b71f4d96ec7c6e894",
            "https://git.kernel.org/stable/c/718f446e60316bf606946f7f42367d691d21541e",
            "https://git.kernel.org/stable/c/b383d4ea272fe5795877506dcce5aad1f6330e5e",
            "https://git.kernel.org/stable/c/d15cc0f66884ef2bed28c7ccbb11c102aa3a0760",
            "https://git.kernel.org/stable/c/f48bf9a83b1666d934247cb58a9887d7b3127b6f",
            "https://www.cve.org/CVERecord?id=CVE-2024-26640\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26640\nhttps://lore.kernel.org/linux-cve-announce/20240318102117.2839904-11-lee@kernel.org/T"
        ]
    },
    "CVE-2024-26642": {
        "cve": "CVE-2024-26642",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: disallow anonymous set with timeout flag\n\nAnonymous sets are never used with timeout from userspace, reject this.\nException to this rule is NFT_SET_EVAL to ensure legacy meters still work.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26642",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/e9a0d3f376eb356d54ffce36e7cc37514cbfbd6f",
            "patch_url": "https://git.kernel.org/stable/p/e9a0d3f376eb356d54ffce36e7cc37514cbfbd6f",
            "filename": "CVE-2024-26642-e9a0d3f376eb356d54ffce36e7cc37514cbfbd6f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26642/CVE-2024-26642-e9a0d3f376eb356d54ffce36e7cc37514cbfbd6f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/16603605b667b70da974bea8216c93e7db043bf1",
                "patch_url": "https://git.kernel.org/stable/p/16603605b667b70da974bea8216c93e7db043bf1",
                "filename": "CVE-2024-26642-16603605b667b70da974bea8216c93e7db043bf1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26642/CVE-2024-26642-16603605b667b70da974bea8216c93e7db043bf1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/72c1efe3f247a581667b7d368fff3bd9a03cd57a",
                "patch_url": "https://git.kernel.org/stable/p/72c1efe3f247a581667b7d368fff3bd9a03cd57a",
                "filename": "CVE-2024-26642-72c1efe3f247a581667b7d368fff3bd9a03cd57a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26642/CVE-2024-26642-72c1efe3f247a581667b7d368fff3bd9a03cd57a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7cdc1be24cc1bcd56a3e89ac4aef20e31ad09199",
                "patch_url": "https://git.kernel.org/stable/p/7cdc1be24cc1bcd56a3e89ac4aef20e31ad09199",
                "filename": "CVE-2024-26642-7cdc1be24cc1bcd56a3e89ac4aef20e31ad09199.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26642/CVE-2024-26642-7cdc1be24cc1bcd56a3e89ac4aef20e31ad09199.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8e07c16695583a66e81f67ce4c46e94dece47ba7",
                "patch_url": "https://git.kernel.org/stable/p/8e07c16695583a66e81f67ce4c46e94dece47ba7",
                "filename": "CVE-2024-26642-8e07c16695583a66e81f67ce4c46e94dece47ba7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26642/CVE-2024-26642-8e07c16695583a66e81f67ce4c46e94dece47ba7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c0c2176d1814b92ea4c8e7eb7c9cd94cd99c1b12",
                "patch_url": "https://git.kernel.org/stable/p/c0c2176d1814b92ea4c8e7eb7c9cd94cd99c1b12",
                "filename": "CVE-2024-26642-c0c2176d1814b92ea4c8e7eb7c9cd94cd99c1b12.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26642/CVE-2024-26642-c0c2176d1814b92ea4c8e7eb7c9cd94cd99c1b12.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e4988d8415bd0294d6f9f4a1e7095f8b50a97ca9",
                "patch_url": "https://git.kernel.org/stable/p/e4988d8415bd0294d6f9f4a1e7095f8b50a97ca9",
                "filename": "CVE-2024-26642-e4988d8415bd0294d6f9f4a1e7095f8b50a97ca9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26642/CVE-2024-26642-e4988d8415bd0294d6f9f4a1e7095f8b50a97ca9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e9a0d3f376eb356d54ffce36e7cc37514cbfbd6f",
                "patch_url": "https://git.kernel.org/stable/p/e9a0d3f376eb356d54ffce36e7cc37514cbfbd6f",
                "filename": "CVE-2024-26642-e9a0d3f376eb356d54ffce36e7cc37514cbfbd6f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26642/CVE-2024-26642-e9a0d3f376eb356d54ffce36e7cc37514cbfbd6f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fe40ffbca19dc70d7c6b1e3c77b9ccb404c57351",
                "patch_url": "https://git.kernel.org/stable/p/fe40ffbca19dc70d7c6b1e3c77b9ccb404c57351",
                "filename": "CVE-2024-26642-fe40ffbca19dc70d7c6b1e3c77b9ccb404c57351.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26642/CVE-2024-26642-fe40ffbca19dc70d7c6b1e3c77b9ccb404c57351.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/16603605b667b70da974bea8216c93e7db043bf1",
            "https://git.kernel.org/stable/c/72c1efe3f247a581667b7d368fff3bd9a03cd57a",
            "https://git.kernel.org/stable/c/7cdc1be24cc1bcd56a3e89ac4aef20e31ad09199",
            "https://git.kernel.org/stable/c/8e07c16695583a66e81f67ce4c46e94dece47ba7",
            "https://git.kernel.org/stable/c/c0c2176d1814b92ea4c8e7eb7c9cd94cd99c1b12",
            "https://git.kernel.org/stable/c/e4988d8415bd0294d6f9f4a1e7095f8b50a97ca9",
            "https://git.kernel.org/stable/c/e9a0d3f376eb356d54ffce36e7cc37514cbfbd6f",
            "https://git.kernel.org/stable/c/fe40ffbca19dc70d7c6b1e3c77b9ccb404c57351",
            "https://www.cve.org/CVERecord?id=CVE-2024-26642\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26642\nhttps://lore.kernel.org/linux-cve-announce/2024032150-CVE-2024-26642-3549@gregkh/T"
        ]
    },
    "CVE-2024-26643": {
        "cve": "CVE-2024-26643",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout\n\nWhile the rhashtable set gc runs asynchronously, a race allows it to\ncollect elements from anonymous sets with timeouts while it is being\nreleased from the commit path.\n\nMingi Cho originally reported this issue in a different path in 6.1.x\nwith a pipapo set with low timeouts which is not possible upstream since\n7395dfacfff6 (\"netfilter: nf_tables: use timestamp to check for set\nelement timeout\").\n\nFix this by setting on the dead flag for anonymous sets to skip async gc\nin this case.\n\nAccording to 08e4c8c5919f (\"netfilter: nf_tables: mark newset as dead on\ntransaction abort\"), Florian plans to accelerate abort path by releasing\nobjects via workqueue, therefore, this sets on the dead flag for abort\npath too.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26643",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/e2d45f467096e931044f0ab7634499879d851a5c",
            "patch_url": "https://git.kernel.org/stable/p/e2d45f467096e931044f0ab7634499879d851a5c",
            "filename": "CVE-2024-26643-e2d45f467096e931044f0ab7634499879d851a5c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26643/CVE-2024-26643-e2d45f467096e931044f0ab7634499879d851a5c.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/291cca35818bd52a407bc37ab45a15816039e363",
                "patch_url": "https://git.kernel.org/stable/p/291cca35818bd52a407bc37ab45a15816039e363",
                "filename": "CVE-2024-26643-291cca35818bd52a407bc37ab45a15816039e363.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26643/CVE-2024-26643-291cca35818bd52a407bc37ab45a15816039e363.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/406b0241d0eb598a0b330ab20ae325537d8d8163",
                "patch_url": "https://git.kernel.org/stable/p/406b0241d0eb598a0b330ab20ae325537d8d8163",
                "filename": "CVE-2024-26643-406b0241d0eb598a0b330ab20ae325537d8d8163.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26643/CVE-2024-26643-406b0241d0eb598a0b330ab20ae325537d8d8163.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5224afbc30c3ca9ba23e752f0f138729b2c48dd8",
                "patch_url": "https://git.kernel.org/stable/p/5224afbc30c3ca9ba23e752f0f138729b2c48dd8",
                "filename": "CVE-2024-26643-5224afbc30c3ca9ba23e752f0f138729b2c48dd8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26643/CVE-2024-26643-5224afbc30c3ca9ba23e752f0f138729b2c48dd8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/552705a3650bbf46a22b1adedc1b04181490fc36",
                "patch_url": "https://git.kernel.org/stable/p/552705a3650bbf46a22b1adedc1b04181490fc36",
                "filename": "CVE-2024-26643-552705a3650bbf46a22b1adedc1b04181490fc36.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26643/CVE-2024-26643-552705a3650bbf46a22b1adedc1b04181490fc36.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b2d6f9a5b1cf968f1eaa71085ceeb09c2cb276b1",
                "patch_url": "https://git.kernel.org/stable/p/b2d6f9a5b1cf968f1eaa71085ceeb09c2cb276b1",
                "filename": "CVE-2024-26643-b2d6f9a5b1cf968f1eaa71085ceeb09c2cb276b1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26643/CVE-2024-26643-b2d6f9a5b1cf968f1eaa71085ceeb09c2cb276b1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d75a589bb92af1abf3b779cfcd1977ca11b27033",
                "patch_url": "https://git.kernel.org/stable/p/d75a589bb92af1abf3b779cfcd1977ca11b27033",
                "filename": "CVE-2024-26643-d75a589bb92af1abf3b779cfcd1977ca11b27033.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26643/CVE-2024-26643-d75a589bb92af1abf3b779cfcd1977ca11b27033.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e2d45f467096e931044f0ab7634499879d851a5c",
                "patch_url": "https://git.kernel.org/stable/p/e2d45f467096e931044f0ab7634499879d851a5c",
                "filename": "CVE-2024-26643-e2d45f467096e931044f0ab7634499879d851a5c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26643/CVE-2024-26643-e2d45f467096e931044f0ab7634499879d851a5c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/edcf1a3f182ecf8b6b805f0ce90570ea98c5f6bf",
                "patch_url": "https://git.kernel.org/stable/p/edcf1a3f182ecf8b6b805f0ce90570ea98c5f6bf",
                "filename": "CVE-2024-26643-edcf1a3f182ecf8b6b805f0ce90570ea98c5f6bf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26643/CVE-2024-26643-edcf1a3f182ecf8b6b805f0ce90570ea98c5f6bf.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/291cca35818bd52a407bc37ab45a15816039e363",
            "https://git.kernel.org/stable/c/406b0241d0eb598a0b330ab20ae325537d8d8163",
            "https://git.kernel.org/stable/c/5224afbc30c3ca9ba23e752f0f138729b2c48dd8",
            "https://git.kernel.org/stable/c/552705a3650bbf46a22b1adedc1b04181490fc36",
            "https://git.kernel.org/stable/c/b2d6f9a5b1cf968f1eaa71085ceeb09c2cb276b1",
            "https://git.kernel.org/stable/c/d75a589bb92af1abf3b779cfcd1977ca11b27033",
            "https://git.kernel.org/stable/c/e2d45f467096e931044f0ab7634499879d851a5c",
            "https://git.kernel.org/stable/c/edcf1a3f182ecf8b6b805f0ce90570ea98c5f6bf",
            "https://www.cve.org/CVERecord?id=CVE-2024-26643\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26643\nhttps://lore.kernel.org/linux-cve-announce/2024032150-CVE-2024-26643-4f9d@gregkh/T"
        ]
    },
    "CVE-2024-26645": {
        "cve": "CVE-2024-26645",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Ensure visibility when inserting an element into tracing_map\n\nRunning the following two commands in parallel on a multi-processor\nAArch64 machine can sporadically produce an unexpected warning about\nduplicate histogram entries:\n\n $ while true; do\n     echo hist:key=id.syscall:val=hitcount > \\\n       /sys/kernel/debug/tracing/events/raw_syscalls/sys_enter/trigger\n     cat /sys/kernel/debug/tracing/events/raw_syscalls/sys_enter/hist\n     sleep 0.001\n   done\n $ stress-ng --sysbadaddr $(nproc)\n\nThe warning looks as follows:\n\n[ 2911.172474] ------------[ cut here ]------------\n[ 2911.173111] Duplicates detected: 1\n[ 2911.173574] WARNING: CPU: 2 PID: 12247 at kernel/trace/tracing_map.c:983 tracing_map_sort_entries+0x3e0/0x408\n[ 2911.174702] Modules linked in: iscsi_ibft(E) iscsi_boot_sysfs(E) rfkill(E) af_packet(E) nls_iso8859_1(E) nls_cp437(E) vfat(E) fat(E) ena(E) tiny_power_button(E) qemu_fw_cfg(E) button(E) fuse(E) efi_pstore(E) ip_tables(E) x_tables(E) xfs(E) libcrc32c(E) aes_ce_blk(E) aes_ce_cipher(E) crct10dif_ce(E) polyval_ce(E) polyval_generic(E) ghash_ce(E) gf128mul(E) sm4_ce_gcm(E) sm4_ce_ccm(E) sm4_ce(E) sm4_ce_cipher(E) sm4(E) sm3_ce(E) sm3(E) sha3_ce(E) sha512_ce(E) sha512_arm64(E) sha2_ce(E) sha256_arm64(E) nvme(E) sha1_ce(E) nvme_core(E) nvme_auth(E) t10_pi(E) sg(E) scsi_mod(E) scsi_common(E) efivarfs(E)\n[ 2911.174738] Unloaded tainted modules: cppc_cpufreq(E):1\n[ 2911.180985] CPU: 2 PID: 12247 Comm: cat Kdump: loaded Tainted: G            E      6.7.0-default #2 1b58bbb22c97e4399dc09f92d309344f69c44a01\n[ 2911.182398] Hardware name: Amazon EC2 c7g.8xlarge/, BIOS 1.0 11/1/2018\n[ 2911.183208] pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n[ 2911.184038] pc : tracing_map_sort_entries+0x3e0/0x408\n[ 2911.184667] lr : tracing_map_sort_entries+0x3e0/0x408\n[ 2911.185310] sp : ffff8000a1513900\n[ 2911.185750] x29: ffff8000a1513900 x28: ffff0003f272fe80 x27: 0000000000000001\n[ 2911.186600] x26: ffff0003f272fe80 x25: 0000000000000030 x24: 0000000000000008\n[ 2911.187458] x23: ffff0003c5788000 x22: ffff0003c16710c8 x21: ffff80008017f180\n[ 2911.188310] x20: ffff80008017f000 x19: ffff80008017f180 x18: ffffffffffffffff\n[ 2911.189160] x17: 0000000000000000 x16: 0000000000000000 x15: ffff8000a15134b8\n[ 2911.190015] x14: 0000000000000000 x13: 205d373432323154 x12: 5b5d313131333731\n[ 2911.190844] x11: 00000000fffeffff x10: 00000000fffeffff x9 : ffffd1b78274a13c\n[ 2911.191716] x8 : 000000000017ffe8 x7 : c0000000fffeffff x6 : 000000000057ffa8\n[ 2911.192554] x5 : ffff0012f6c24ec0 x4 : 0000000000000000 x3 : ffff2e5b72b5d000\n[ 2911.193404] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0003ff254480\n[ 2911.194259] Call trace:\n[ 2911.194626]  tracing_map_sort_entries+0x3e0/0x408\n[ 2911.195220]  hist_show+0x124/0x800\n[ 2911.195692]  seq_read_iter+0x1d4/0x4e8\n[ 2911.196193]  seq_read+0xe8/0x138\n[ 2911.196638]  vfs_read+0xc8/0x300\n[ 2911.197078]  ksys_read+0x70/0x108\n[ 2911.197534]  __arm64_sys_read+0x24/0x38\n[ 2911.198046]  invoke_syscall+0x78/0x108\n[ 2911.198553]  el0_svc_common.constprop.0+0xd0/0xf8\n[ 2911.199157]  do_el0_svc+0x28/0x40\n[ 2911.199613]  el0_svc+0x40/0x178\n[ 2911.200048]  el0t_64_sync_handler+0x13c/0x158\n[ 2911.200621]  el0t_64_sync+0x1a8/0x1b0\n[ 2911.201115] ---[ end trace 0000000000000000 ]---\n\nThe problem appears to be caused by CPU reordering of writes issued from\n__tracing_map_insert().\n\nThe check for the presence of an element with a given key in this\nfunction is:\n\n val = READ_ONCE(entry->val);\n if (val && keys_match(key, val->key, map->key_size)) ...\n\nThe write of a new entry is:\n\n elt = get_free_elt(map);\n memcpy(elt->key, key, map->key_size);\n entry->val = elt;\n\nThe \"memcpy(elt->key, key, map->key_size);\" and \"entry->val = elt;\"\nstores may become visible in the reversed order on another CPU. This\nsecond CPU might then incorrectly determine that a new key doesn't match\nan already present val->key and subse\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26645",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2b44760609e9eaafc9d234a6883d042fc21132a7",
            "patch_url": "https://git.kernel.org/stable/p/2b44760609e9eaafc9d234a6883d042fc21132a7",
            "filename": "CVE-2024-26645-2b44760609e9eaafc9d234a6883d042fc21132a7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26645/CVE-2024-26645-2b44760609e9eaafc9d234a6883d042fc21132a7.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2b44760609e9eaafc9d234a6883d042fc21132a7",
                "patch_url": "https://git.kernel.org/stable/p/2b44760609e9eaafc9d234a6883d042fc21132a7",
                "filename": "CVE-2024-26645-2b44760609e9eaafc9d234a6883d042fc21132a7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26645/CVE-2024-26645-2b44760609e9eaafc9d234a6883d042fc21132a7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5022b331c041e8c54b9a6a3251579bd1e8c0fc0b",
                "patch_url": "https://git.kernel.org/stable/p/5022b331c041e8c54b9a6a3251579bd1e8c0fc0b",
                "filename": "CVE-2024-26645-5022b331c041e8c54b9a6a3251579bd1e8c0fc0b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26645/CVE-2024-26645-5022b331c041e8c54b9a6a3251579bd1e8c0fc0b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a1eebe76e187dbe11ca299f8dbb6e45d5b1889e7",
                "patch_url": "https://git.kernel.org/stable/p/a1eebe76e187dbe11ca299f8dbb6e45d5b1889e7",
                "filename": "CVE-2024-26645-a1eebe76e187dbe11ca299f8dbb6e45d5b1889e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26645/CVE-2024-26645-a1eebe76e187dbe11ca299f8dbb6e45d5b1889e7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aef1cb00856ccfd614467cfb50b791278992e177",
                "patch_url": "https://git.kernel.org/stable/p/aef1cb00856ccfd614467cfb50b791278992e177",
                "filename": "CVE-2024-26645-aef1cb00856ccfd614467cfb50b791278992e177.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26645/CVE-2024-26645-aef1cb00856ccfd614467cfb50b791278992e177.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bf4aeff7da85c3becd39fb73bac94122331c30fb",
                "patch_url": "https://git.kernel.org/stable/p/bf4aeff7da85c3becd39fb73bac94122331c30fb",
                "filename": "CVE-2024-26645-bf4aeff7da85c3becd39fb73bac94122331c30fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26645/CVE-2024-26645-bf4aeff7da85c3becd39fb73bac94122331c30fb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dad9b28f675ed99b4dec261db2a397efeb80b74c",
                "patch_url": "https://git.kernel.org/stable/p/dad9b28f675ed99b4dec261db2a397efeb80b74c",
                "filename": "CVE-2024-26645-dad9b28f675ed99b4dec261db2a397efeb80b74c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26645/CVE-2024-26645-dad9b28f675ed99b4dec261db2a397efeb80b74c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ef70dfa0b1e5084f32635156c9a5c795352ad860",
                "patch_url": "https://git.kernel.org/stable/p/ef70dfa0b1e5084f32635156c9a5c795352ad860",
                "filename": "CVE-2024-26645-ef70dfa0b1e5084f32635156c9a5c795352ad860.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26645/CVE-2024-26645-ef70dfa0b1e5084f32635156c9a5c795352ad860.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f4f7e696db0274ff560482cc52eddbf0551d4b7a",
                "patch_url": "https://git.kernel.org/stable/p/f4f7e696db0274ff560482cc52eddbf0551d4b7a",
                "filename": "CVE-2024-26645-f4f7e696db0274ff560482cc52eddbf0551d4b7a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26645/CVE-2024-26645-f4f7e696db0274ff560482cc52eddbf0551d4b7a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2b44760609e9eaafc9d234a6883d042fc21132a7",
            "https://git.kernel.org/stable/c/5022b331c041e8c54b9a6a3251579bd1e8c0fc0b",
            "https://git.kernel.org/stable/c/a1eebe76e187dbe11ca299f8dbb6e45d5b1889e7",
            "https://git.kernel.org/stable/c/aef1cb00856ccfd614467cfb50b791278992e177",
            "https://git.kernel.org/stable/c/bf4aeff7da85c3becd39fb73bac94122331c30fb",
            "https://git.kernel.org/stable/c/dad9b28f675ed99b4dec261db2a397efeb80b74c",
            "https://git.kernel.org/stable/c/ef70dfa0b1e5084f32635156c9a5c795352ad860",
            "https://git.kernel.org/stable/c/f4f7e696db0274ff560482cc52eddbf0551d4b7a",
            "https://www.cve.org/CVERecord?id=CVE-2024-26645\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26645\nhttps://lore.kernel.org/linux-cve-announce/20240326151722.1258576-4-lee@kernel.org/T"
        ]
    },
    "CVE-2024-26649": {
        "cve": "CVE-2024-26649",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix the null pointer when load rlc firmware\n\nIf the RLC firmware is invalid because of wrong header size,\nthe pointer to the rlc firmware is released in function\namdgpu_ucode_request. There will be a null pointer error\nin subsequent use. So skip validation to fix it.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26649",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/8b5bacce2d13dbe648f0bfd3f738ecce8db4978c",
            "patch_url": "https://git.kernel.org/stable/p/8b5bacce2d13dbe648f0bfd3f738ecce8db4978c",
            "filename": "CVE-2024-26649-8b5bacce2d13dbe648f0bfd3f738ecce8db4978c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26649/CVE-2024-26649-8b5bacce2d13dbe648f0bfd3f738ecce8db4978c.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/8b5bacce2d13dbe648f0bfd3f738ecce8db4978c",
                "patch_url": "https://git.kernel.org/stable/p/8b5bacce2d13dbe648f0bfd3f738ecce8db4978c",
                "filename": "CVE-2024-26649-8b5bacce2d13dbe648f0bfd3f738ecce8db4978c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26649/CVE-2024-26649-8b5bacce2d13dbe648f0bfd3f738ecce8db4978c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bc03c02cc1991a066b23e69bbcc0f66e8f1f7453",
                "patch_url": "https://git.kernel.org/stable/p/bc03c02cc1991a066b23e69bbcc0f66e8f1f7453",
                "filename": "CVE-2024-26649-bc03c02cc1991a066b23e69bbcc0f66e8f1f7453.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26649/CVE-2024-26649-bc03c02cc1991a066b23e69bbcc0f66e8f1f7453.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d3887448486caeef9687fb5dfebd4ff91e0f25aa",
                "patch_url": "https://git.kernel.org/stable/p/d3887448486caeef9687fb5dfebd4ff91e0f25aa",
                "filename": "CVE-2024-26649-d3887448486caeef9687fb5dfebd4ff91e0f25aa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26649/CVE-2024-26649-d3887448486caeef9687fb5dfebd4ff91e0f25aa.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/8b5bacce2d13dbe648f0bfd3f738ecce8db4978c",
            "https://git.kernel.org/stable/c/bc03c02cc1991a066b23e69bbcc0f66e8f1f7453",
            "https://git.kernel.org/stable/c/d3887448486caeef9687fb5dfebd4ff91e0f25aa",
            "https://www.cve.org/CVERecord?id=CVE-2024-26649\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26649\nhttps://lore.kernel.org/linux-cve-announce/20240326175007.1388794-17-lee@kernel.org/T"
        ]
    },
    "CVE-2024-26656": {
        "cve": "CVE-2024-26656",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix use-after-free bug\n\nThe bug can be triggered by sending a single amdgpu_gem_userptr_ioctl\nto the AMDGPU DRM driver on any ASICs with an invalid address and size.\nThe bug was reported by Joonkyo Jung <joonkyoj@yonsei.ac.kr>.\nFor example the following code:\n\nstatic void Syzkaller1(int fd)\n{\n\tstruct drm_amdgpu_gem_userptr arg;\n\tint ret;\n\n\targ.addr = 0xffffffffffff0000;\n\targ.size = 0x80000000; /*2 Gb*/\n\targ.flags = 0x7;\n\tret = drmIoctl(fd, 0xc1186451/*amdgpu_gem_userptr_ioctl*/, &arg);\n}\n\nDue to the address and size are not valid there is a failure in\namdgpu_hmm_register->mmu_interval_notifier_insert->__mmu_interval_notifier_insert->\ncheck_shl_overflow, but we even the amdgpu_hmm_register failure we still call\namdgpu_hmm_unregister into  amdgpu_gem_object_free which causes access to a bad address.\nThe following stack is below when the issue is reproduced when Kazan is enabled:\n\n[  +0.000014] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020\n[  +0.000009] RIP: 0010:mmu_interval_notifier_remove+0x327/0x340\n[  +0.000017] Code: ff ff 49 89 44 24 08 48 b8 00 01 00 00 00 00 ad de 4c 89 f7 49 89 47 40 48 83 c0 22 49 89 47 48 e8 ce d1 2d 01 e9 32 ff ff ff <0f> 0b e9 16 ff ff ff 4c 89 ef e8 fa 14 b3 ff e9 36 ff ff ff e8 80\n[  +0.000014] RSP: 0018:ffffc90002657988 EFLAGS: 00010246\n[  +0.000013] RAX: 0000000000000000 RBX: 1ffff920004caf35 RCX: ffffffff8160565b\n[  +0.000011] RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff8881a9f78260\n[  +0.000010] RBP: ffffc90002657a70 R08: 0000000000000001 R09: fffff520004caf25\n[  +0.000010] R10: 0000000000000003 R11: ffffffff8161d1d6 R12: ffff88810e988c00\n[  +0.000010] R13: ffff888126fb5a00 R14: ffff88810e988c0c R15: ffff8881a9f78260\n[  +0.000011] FS:  00007ff9ec848540(0000) GS:ffff8883cc880000(0000) knlGS:0000000000000000\n[  +0.000012] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  +0.000010] CR2: 000055b3f7e14328 CR3: 00000001b5770000 CR4: 0000000000350ef0\n[  +0.000010] Call Trace:\n[  +0.000006]  <TASK>\n[  +0.000007]  ? show_regs+0x6a/0x80\n[  +0.000018]  ? __warn+0xa5/0x1b0\n[  +0.000019]  ? mmu_interval_notifier_remove+0x327/0x340\n[  +0.000018]  ? report_bug+0x24a/0x290\n[  +0.000022]  ? handle_bug+0x46/0x90\n[  +0.000015]  ? exc_invalid_op+0x19/0x50\n[  +0.000016]  ? asm_exc_invalid_op+0x1b/0x20\n[  +0.000017]  ? kasan_save_stack+0x26/0x50\n[  +0.000017]  ? mmu_interval_notifier_remove+0x23b/0x340\n[  +0.000019]  ? mmu_interval_notifier_remove+0x327/0x340\n[  +0.000019]  ? mmu_interval_notifier_remove+0x23b/0x340\n[  +0.000020]  ? __pfx_mmu_interval_notifier_remove+0x10/0x10\n[  +0.000017]  ? kasan_save_alloc_info+0x1e/0x30\n[  +0.000018]  ? srso_return_thunk+0x5/0x5f\n[  +0.000014]  ? __kasan_kmalloc+0xb1/0xc0\n[  +0.000018]  ? srso_return_thunk+0x5/0x5f\n[  +0.000013]  ? __kasan_check_read+0x11/0x20\n[  +0.000020]  amdgpu_hmm_unregister+0x34/0x50 [amdgpu]\n[  +0.004695]  amdgpu_gem_object_free+0x66/0xa0 [amdgpu]\n[  +0.004534]  ? __pfx_amdgpu_gem_object_free+0x10/0x10 [amdgpu]\n[  +0.004291]  ? do_syscall_64+0x5f/0xe0\n[  +0.000023]  ? srso_return_thunk+0x5/0x5f\n[  +0.000017]  drm_gem_object_free+0x3b/0x50 [drm]\n[  +0.000489]  amdgpu_gem_userptr_ioctl+0x306/0x500 [amdgpu]\n[  +0.004295]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]\n[  +0.004270]  ? srso_return_thunk+0x5/0x5f\n[  +0.000014]  ? __this_cpu_preempt_check+0x13/0x20\n[  +0.000015]  ? srso_return_thunk+0x5/0x5f\n[  +0.000013]  ? sysvec_apic_timer_interrupt+0x57/0xc0\n[  +0.000020]  ? srso_return_thunk+0x5/0x5f\n[  +0.000014]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20\n[  +0.000022]  ? drm_ioctl_kernel+0x17b/0x1f0 [drm]\n[  +0.000496]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]\n[  +0.004272]  ? drm_ioctl_kernel+0x190/0x1f0 [drm]\n[  +0.000492]  drm_ioctl_kernel+0x140/0x1f0 [drm]\n[  +0.000497]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]\n[  +0.004297]  ? __pfx_drm_ioctl_kernel+0x10/0x10 [d\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26656",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2e13f88e01ae7e28a7e831bf5c2409c4748e0a60",
            "patch_url": "https://git.kernel.org/stable/p/2e13f88e01ae7e28a7e831bf5c2409c4748e0a60",
            "filename": "CVE-2024-26656-2e13f88e01ae7e28a7e831bf5c2409c4748e0a60.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26656/CVE-2024-26656-2e13f88e01ae7e28a7e831bf5c2409c4748e0a60.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/22207fd5c80177b860279653d017474b2812af5e",
                "patch_url": "https://git.kernel.org/stable/p/22207fd5c80177b860279653d017474b2812af5e",
                "filename": "CVE-2024-26656-22207fd5c80177b860279653d017474b2812af5e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26656/CVE-2024-26656-22207fd5c80177b860279653d017474b2812af5e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/22f665ecfd1225afa1309ace623157d12bb9bb0c",
                "patch_url": "https://git.kernel.org/stable/p/22f665ecfd1225afa1309ace623157d12bb9bb0c",
                "filename": "CVE-2024-26656-22f665ecfd1225afa1309ace623157d12bb9bb0c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26656/CVE-2024-26656-22f665ecfd1225afa1309ace623157d12bb9bb0c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2e13f88e01ae7e28a7e831bf5c2409c4748e0a60",
                "patch_url": "https://git.kernel.org/stable/p/2e13f88e01ae7e28a7e831bf5c2409c4748e0a60",
                "filename": "CVE-2024-26656-2e13f88e01ae7e28a7e831bf5c2409c4748e0a60.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26656/CVE-2024-26656-2e13f88e01ae7e28a7e831bf5c2409c4748e0a60.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/af054a5fb24a144f99895afce9519d709891894c",
                "patch_url": "https://git.kernel.org/stable/p/af054a5fb24a144f99895afce9519d709891894c",
                "filename": "CVE-2024-26656-af054a5fb24a144f99895afce9519d709891894c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26656/CVE-2024-26656-af054a5fb24a144f99895afce9519d709891894c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e87e08c94c9541b4e18c4c13f2f605935f512605",
                "patch_url": "https://git.kernel.org/stable/p/e87e08c94c9541b4e18c4c13f2f605935f512605",
                "filename": "CVE-2024-26656-e87e08c94c9541b4e18c4c13f2f605935f512605.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26656/CVE-2024-26656-e87e08c94c9541b4e18c4c13f2f605935f512605.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/22207fd5c80177b860279653d017474b2812af5e",
            "https://git.kernel.org/stable/c/22f665ecfd1225afa1309ace623157d12bb9bb0c",
            "https://git.kernel.org/stable/c/2e13f88e01ae7e28a7e831bf5c2409c4748e0a60",
            "https://git.kernel.org/stable/c/af054a5fb24a144f99895afce9519d709891894c",
            "https://git.kernel.org/stable/c/e87e08c94c9541b4e18c4c13f2f605935f512605",
            "https://www.cve.org/CVERecord?id=CVE-2024-26656\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26656\nhttps://lore.kernel.org/linux-cve-announce/2024040247-CVE-2024-26656-ffaa@gregkh/T"
        ]
    },
    "CVE-2024-26659": {
        "cve": "CVE-2024-26659",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nxhci: handle isoc Babble and Buffer Overrun events properly\n\nxHCI 4.9 explicitly forbids assuming that the xHC has released its\nownership of a multi-TRB TD when it reports an error on one of the\nearly TRBs. Yet the driver makes such assumption and releases the TD,\nallowing the remaining TRBs to be freed or overwritten by new TDs.\n\nThe xHC should also report completion of the final TRB due to its IOC\nflag being set by us, regardless of prior errors. This event cannot\nbe recognized if the TD has already been freed earlier, resulting in\n\"Transfer event TRB DMA ptr not part of current TD\" error message.\n\nFix this by reusing the logic for processing isoc Transaction Errors.\nThis also handles hosts which fail to report the final completion.\n\nFix transfer length reporting on Babble errors. They may be caused by\ndevice malfunction, no guarantee that the buffer has been filled.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26659",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/f5e7ffa9269a448a720e21f1ed1384d118298c97",
            "patch_url": "https://git.kernel.org/stable/p/f5e7ffa9269a448a720e21f1ed1384d118298c97",
            "filename": "CVE-2024-26659-f5e7ffa9269a448a720e21f1ed1384d118298c97.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26659/CVE-2024-26659-f5e7ffa9269a448a720e21f1ed1384d118298c97.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2aa7bcfdbb46241c701811bbc0d64d7884e3346c",
                "patch_url": "https://git.kernel.org/stable/p/2aa7bcfdbb46241c701811bbc0d64d7884e3346c",
                "filename": "CVE-2024-26659-2aa7bcfdbb46241c701811bbc0d64d7884e3346c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26659/CVE-2024-26659-2aa7bcfdbb46241c701811bbc0d64d7884e3346c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2e3ec80ea7ba58bbb210e83b5a0afefee7c171d3",
                "patch_url": "https://git.kernel.org/stable/p/2e3ec80ea7ba58bbb210e83b5a0afefee7c171d3",
                "filename": "CVE-2024-26659-2e3ec80ea7ba58bbb210e83b5a0afefee7c171d3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26659/CVE-2024-26659-2e3ec80ea7ba58bbb210e83b5a0afefee7c171d3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/418456c0ce56209610523f21734c5612ee634134",
                "patch_url": "https://git.kernel.org/stable/p/418456c0ce56209610523f21734c5612ee634134",
                "filename": "CVE-2024-26659-418456c0ce56209610523f21734c5612ee634134.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26659/CVE-2024-26659-418456c0ce56209610523f21734c5612ee634134.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/696e4112e5c1ee61996198f0ebb6ca3fab55166e",
                "patch_url": "https://git.kernel.org/stable/p/696e4112e5c1ee61996198f0ebb6ca3fab55166e",
                "filename": "CVE-2024-26659-696e4112e5c1ee61996198f0ebb6ca3fab55166e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26659/CVE-2024-26659-696e4112e5c1ee61996198f0ebb6ca3fab55166e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7c4650ded49e5b88929ecbbb631efb8b0838e811",
                "patch_url": "https://git.kernel.org/stable/p/7c4650ded49e5b88929ecbbb631efb8b0838e811",
                "filename": "CVE-2024-26659-7c4650ded49e5b88929ecbbb631efb8b0838e811.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26659/CVE-2024-26659-7c4650ded49e5b88929ecbbb631efb8b0838e811.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f5e7ffa9269a448a720e21f1ed1384d118298c97",
                "patch_url": "https://git.kernel.org/stable/p/f5e7ffa9269a448a720e21f1ed1384d118298c97",
                "filename": "CVE-2024-26659-f5e7ffa9269a448a720e21f1ed1384d118298c97.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26659/CVE-2024-26659-f5e7ffa9269a448a720e21f1ed1384d118298c97.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2aa7bcfdbb46241c701811bbc0d64d7884e3346c",
            "https://git.kernel.org/stable/c/2e3ec80ea7ba58bbb210e83b5a0afefee7c171d3",
            "https://git.kernel.org/stable/c/418456c0ce56209610523f21734c5612ee634134",
            "https://git.kernel.org/stable/c/696e4112e5c1ee61996198f0ebb6ca3fab55166e",
            "https://git.kernel.org/stable/c/7c4650ded49e5b88929ecbbb631efb8b0838e811",
            "https://git.kernel.org/stable/c/f5e7ffa9269a448a720e21f1ed1384d118298c97",
            "https://www.cve.org/CVERecord?id=CVE-2024-26659\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26659\nhttps://lore.kernel.org/linux-cve-announce/2024040222-CVE-2024-26659-e4f6@gregkh/T"
        ]
    },
    "CVE-2024-26660": {
        "cve": "CVE-2024-26660",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Implement bounds check for stream encoder creation in DCN301\n\n'stream_enc_regs' array is an array of dcn10_stream_enc_registers\nstructures. The array is initialized with four elements, corresponding\nto the four calls to stream_enc_regs() in the array initializer. This\nmeans that valid indices for this array are 0, 1, 2, and 3.\n\nThe error message 'stream_enc_regs' 4 <= 5 below, is indicating that\nthere is an attempt to access this array with an index of 5, which is\nout of bounds. This could lead to undefined behavior\n\nHere, eng_id is used as an index to access the stream_enc_regs array. If\neng_id is 5, this would result in an out-of-bounds access on the\nstream_enc_regs array.\n\nThus fixing Buffer overflow error in dcn301_stream_encoder_create\nreported by Smatch:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn301/dcn301_resource.c:1011 dcn301_stream_encoder_create() error: buffer overflow 'stream_enc_regs' 4 <= 5",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26660",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a",
            "patch_url": "https://git.kernel.org/stable/p/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a",
            "filename": "CVE-2024-26660-efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26660/CVE-2024-26660-efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054",
                "patch_url": "https://git.kernel.org/stable/p/42442f74314d41ddc68227047036fa3e78940054",
                "filename": "CVE-2024-26660-42442f74314d41ddc68227047036fa3e78940054.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26660/CVE-2024-26660-42442f74314d41ddc68227047036fa3e78940054.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2",
                "patch_url": "https://git.kernel.org/stable/p/58fca355ad37dcb5f785d9095db5f748b79c5dc2",
                "filename": "CVE-2024-26660-58fca355ad37dcb5f785d9095db5f748b79c5dc2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26660/CVE-2024-26660-58fca355ad37dcb5f785d9095db5f748b79c5dc2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738",
                "patch_url": "https://git.kernel.org/stable/p/a938eab9586eea31cfd129a507f552efae14d738",
                "filename": "CVE-2024-26660-a938eab9586eea31cfd129a507f552efae14d738.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26660/CVE-2024-26660-a938eab9586eea31cfd129a507f552efae14d738.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d",
                "patch_url": "https://git.kernel.org/stable/p/cd9bd10c59e3c1446680514fd3097c5b00d3712d",
                "filename": "CVE-2024-26660-cd9bd10c59e3c1446680514fd3097c5b00d3712d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26660/CVE-2024-26660-cd9bd10c59e3c1446680514fd3097c5b00d3712d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a",
                "patch_url": "https://git.kernel.org/stable/p/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a",
                "filename": "CVE-2024-26660-efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26660/CVE-2024-26660-efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054",
            "https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2",
            "https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738",
            "https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d",
            "https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a",
            "https://www.cve.org/CVERecord?id=CVE-2024-26660\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26660\nhttps://lore.kernel.org/linux-cve-announce/2024040222-CVE-2024-26660-3f40@gregkh/T"
        ]
    },
    "CVE-2024-26664": {
        "cve": "CVE-2024-26664",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (coretemp) Fix out-of-bounds memory access\n\nFix a bug that pdata->cpu_map[] is set before out-of-bounds check.\nThe problem might be triggered on systems with more than 128 cores per\npackage.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26664",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/93f0f4e846fcb682c3ec436e3b2e30e5a3a8ee6a",
            "patch_url": "https://git.kernel.org/stable/p/93f0f4e846fcb682c3ec436e3b2e30e5a3a8ee6a",
            "filename": "CVE-2024-26664-93f0f4e846fcb682c3ec436e3b2e30e5a3a8ee6a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26664/CVE-2024-26664-93f0f4e846fcb682c3ec436e3b2e30e5a3a8ee6a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1eb74c00c9c3b13cb65e508c5d5a2f11afb96b8b",
                "patch_url": "https://git.kernel.org/stable/p/1eb74c00c9c3b13cb65e508c5d5a2f11afb96b8b",
                "filename": "CVE-2024-26664-1eb74c00c9c3b13cb65e508c5d5a2f11afb96b8b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26664/CVE-2024-26664-1eb74c00c9c3b13cb65e508c5d5a2f11afb96b8b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3a7753bda55985dc26fae17795cb10d825453ad1",
                "patch_url": "https://git.kernel.org/stable/p/3a7753bda55985dc26fae17795cb10d825453ad1",
                "filename": "CVE-2024-26664-3a7753bda55985dc26fae17795cb10d825453ad1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26664/CVE-2024-26664-3a7753bda55985dc26fae17795cb10d825453ad1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4e440abc894585a34c2904a32cd54af1742311b3",
                "patch_url": "https://git.kernel.org/stable/p/4e440abc894585a34c2904a32cd54af1742311b3",
                "filename": "CVE-2024-26664-4e440abc894585a34c2904a32cd54af1742311b3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26664/CVE-2024-26664-4e440abc894585a34c2904a32cd54af1742311b3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/853a6503c586a71abf27e60a7f8c4fb28092976d",
                "patch_url": "https://git.kernel.org/stable/p/853a6503c586a71abf27e60a7f8c4fb28092976d",
                "filename": "CVE-2024-26664-853a6503c586a71abf27e60a7f8c4fb28092976d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26664/CVE-2024-26664-853a6503c586a71abf27e60a7f8c4fb28092976d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/93f0f4e846fcb682c3ec436e3b2e30e5a3a8ee6a",
                "patch_url": "https://git.kernel.org/stable/p/93f0f4e846fcb682c3ec436e3b2e30e5a3a8ee6a",
                "filename": "CVE-2024-26664-93f0f4e846fcb682c3ec436e3b2e30e5a3a8ee6a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26664/CVE-2024-26664-93f0f4e846fcb682c3ec436e3b2e30e5a3a8ee6a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9bce69419271eb8b2b3ab467387cb59c99d80deb",
                "patch_url": "https://git.kernel.org/stable/p/9bce69419271eb8b2b3ab467387cb59c99d80deb",
                "filename": "CVE-2024-26664-9bce69419271eb8b2b3ab467387cb59c99d80deb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26664/CVE-2024-26664-9bce69419271eb8b2b3ab467387cb59c99d80deb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a16afec8e83c56b14a4a73d2e3fb8eec3a8a057e",
                "patch_url": "https://git.kernel.org/stable/p/a16afec8e83c56b14a4a73d2e3fb8eec3a8a057e",
                "filename": "CVE-2024-26664-a16afec8e83c56b14a4a73d2e3fb8eec3a8a057e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26664/CVE-2024-26664-a16afec8e83c56b14a4a73d2e3fb8eec3a8a057e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f0da068c75c20ffc5ba28243ff577531dc2af1fd",
                "patch_url": "https://git.kernel.org/stable/p/f0da068c75c20ffc5ba28243ff577531dc2af1fd",
                "filename": "CVE-2024-26664-f0da068c75c20ffc5ba28243ff577531dc2af1fd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26664/CVE-2024-26664-f0da068c75c20ffc5ba28243ff577531dc2af1fd.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1eb74c00c9c3b13cb65e508c5d5a2f11afb96b8b",
            "https://git.kernel.org/stable/c/3a7753bda55985dc26fae17795cb10d825453ad1",
            "https://git.kernel.org/stable/c/4e440abc894585a34c2904a32cd54af1742311b3",
            "https://git.kernel.org/stable/c/853a6503c586a71abf27e60a7f8c4fb28092976d",
            "https://git.kernel.org/stable/c/93f0f4e846fcb682c3ec436e3b2e30e5a3a8ee6a",
            "https://git.kernel.org/stable/c/9bce69419271eb8b2b3ab467387cb59c99d80deb",
            "https://git.kernel.org/stable/c/a16afec8e83c56b14a4a73d2e3fb8eec3a8a057e",
            "https://git.kernel.org/stable/c/f0da068c75c20ffc5ba28243ff577531dc2af1fd",
            "https://www.cve.org/CVERecord?id=CVE-2024-26664\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26664\nhttps://lore.kernel.org/linux-cve-announce/2024040223-CVE-2024-26664-03db@gregkh/T"
        ]
    },
    "CVE-2024-26665": {
        "cve": "CVE-2024-26665",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntunnels: fix out of bounds access when building IPv6 PMTU error\n\nIf the ICMPv6 error is built from a non-linear skb we get the following\nsplat,\n\n  BUG: KASAN: slab-out-of-bounds in do_csum+0x220/0x240\n  Read of size 4 at addr ffff88811d402c80 by task netperf/820\n  CPU: 0 PID: 820 Comm: netperf Not tainted 6.8.0-rc1+ #543\n  ...\n   kasan_report+0xd8/0x110\n   do_csum+0x220/0x240\n   csum_partial+0xc/0x20\n   skb_tunnel_check_pmtu+0xeb9/0x3280\n   vxlan_xmit_one+0x14c2/0x4080\n   vxlan_xmit+0xf61/0x5c00\n   dev_hard_start_xmit+0xfb/0x510\n   __dev_queue_xmit+0x7cd/0x32a0\n   br_dev_queue_push_xmit+0x39d/0x6a0\n\nUse skb_checksum instead of csum_partial who cannot deal with non-linear\nSKBs.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26665",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/510c869ffa4068c5f19ff4df51d1e2f3a30aaac1",
            "patch_url": "https://git.kernel.org/stable/p/510c869ffa4068c5f19ff4df51d1e2f3a30aaac1",
            "filename": "CVE-2024-26665-510c869ffa4068c5f19ff4df51d1e2f3a30aaac1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26665/CVE-2024-26665-510c869ffa4068c5f19ff4df51d1e2f3a30aaac1.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/510c869ffa4068c5f19ff4df51d1e2f3a30aaac1",
                "patch_url": "https://git.kernel.org/stable/p/510c869ffa4068c5f19ff4df51d1e2f3a30aaac1",
                "filename": "CVE-2024-26665-510c869ffa4068c5f19ff4df51d1e2f3a30aaac1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26665/CVE-2024-26665-510c869ffa4068c5f19ff4df51d1e2f3a30aaac1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7dc9feb8b1705cf00de20563b6bc4831f4c99dab",
                "patch_url": "https://git.kernel.org/stable/p/7dc9feb8b1705cf00de20563b6bc4831f4c99dab",
                "filename": "CVE-2024-26665-7dc9feb8b1705cf00de20563b6bc4831f4c99dab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26665/CVE-2024-26665-7dc9feb8b1705cf00de20563b6bc4831f4c99dab.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d75abeec401f8c86b470e7028a13fcdc87e5dd06",
                "patch_url": "https://git.kernel.org/stable/p/d75abeec401f8c86b470e7028a13fcdc87e5dd06",
                "filename": "CVE-2024-26665-d75abeec401f8c86b470e7028a13fcdc87e5dd06.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26665/CVE-2024-26665-d75abeec401f8c86b470e7028a13fcdc87e5dd06.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d964dd1bc1452594b4207d9229c157d9386e5d8a",
                "patch_url": "https://git.kernel.org/stable/p/d964dd1bc1452594b4207d9229c157d9386e5d8a",
                "filename": "CVE-2024-26665-d964dd1bc1452594b4207d9229c157d9386e5d8a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26665/CVE-2024-26665-d964dd1bc1452594b4207d9229c157d9386e5d8a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e37cde7a5716466ff2a76f7f27f0a29b05b9a732",
                "patch_url": "https://git.kernel.org/stable/p/e37cde7a5716466ff2a76f7f27f0a29b05b9a732",
                "filename": "CVE-2024-26665-e37cde7a5716466ff2a76f7f27f0a29b05b9a732.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26665/CVE-2024-26665-e37cde7a5716466ff2a76f7f27f0a29b05b9a732.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d",
                "patch_url": "https://git.kernel.org/stable/p/e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d",
                "filename": "CVE-2024-26665-e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26665/CVE-2024-26665-e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/510c869ffa4068c5f19ff4df51d1e2f3a30aaac1",
            "https://git.kernel.org/stable/c/7dc9feb8b1705cf00de20563b6bc4831f4c99dab",
            "https://git.kernel.org/stable/c/d75abeec401f8c86b470e7028a13fcdc87e5dd06",
            "https://git.kernel.org/stable/c/d964dd1bc1452594b4207d9229c157d9386e5d8a",
            "https://git.kernel.org/stable/c/e37cde7a5716466ff2a76f7f27f0a29b05b9a732",
            "https://git.kernel.org/stable/c/e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d",
            "https://www.cve.org/CVERecord?id=CVE-2024-26665\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26665\nhttps://lore.kernel.org/linux-cve-announce/2024040224-CVE-2024-26665-5daa@gregkh/T"
        ]
    },
    "CVE-2024-26669": {
        "cve": "CVE-2024-26669",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: flower: Fix chain template offload\n\nWhen a qdisc is deleted from a net device the stack instructs the\nunderlying driver to remove its flow offload callback from the\nassociated filter block using the 'FLOW_BLOCK_UNBIND' command. The stack\nthen continues to replay the removal of the filters in the block for\nthis driver by iterating over the chains in the block and invoking the\n'reoffload' operation of the classifier being used. In turn, the\nclassifier in its 'reoffload' operation prepares and emits a\n'FLOW_CLS_DESTROY' command for each filter.\n\nHowever, the stack does not do the same for chain templates and the\nunderlying driver never receives a 'FLOW_CLS_TMPLT_DESTROY' command when\na qdisc is deleted. This results in a memory leak [1] which can be\nreproduced using [2].\n\nFix by introducing a 'tmplt_reoffload' operation and have the stack\ninvoke it with the appropriate arguments as part of the replay.\nImplement the operation in the sole classifier that supports chain\ntemplates (flower) by emitting the 'FLOW_CLS_TMPLT_{CREATE,DESTROY}'\ncommand based on whether a flow offload callback is being bound to a\nfilter block or being unbound from one.\n\nAs far as I can tell, the issue happens since cited commit which\nreordered tcf_block_offload_unbind() before tcf_block_flush_all_chains()\nin __tcf_block_put(). The order cannot be reversed as the filter block\nis expected to be freed after flushing all the chains.\n\n[1]\nunreferenced object 0xffff888107e28800 (size 2048):\n  comm \"tc\", pid 1079, jiffies 4294958525 (age 3074.287s)\n  hex dump (first 32 bytes):\n    b1 a6 7c 11 81 88 ff ff e0 5b b3 10 81 88 ff ff  ..|......[......\n    01 00 00 00 00 00 00 00 e0 aa b0 84 ff ff ff ff  ................\n  backtrace:\n    [<ffffffff81c06a68>] __kmem_cache_alloc_node+0x1e8/0x320\n    [<ffffffff81ab374e>] __kmalloc+0x4e/0x90\n    [<ffffffff832aec6d>] mlxsw_sp_acl_ruleset_get+0x34d/0x7a0\n    [<ffffffff832bc195>] mlxsw_sp_flower_tmplt_create+0x145/0x180\n    [<ffffffff832b2e1a>] mlxsw_sp_flow_block_cb+0x1ea/0x280\n    [<ffffffff83a10613>] tc_setup_cb_call+0x183/0x340\n    [<ffffffff83a9f85a>] fl_tmplt_create+0x3da/0x4c0\n    [<ffffffff83a22435>] tc_ctl_chain+0xa15/0x1170\n    [<ffffffff838a863c>] rtnetlink_rcv_msg+0x3cc/0xed0\n    [<ffffffff83ac87f0>] netlink_rcv_skb+0x170/0x440\n    [<ffffffff83ac6270>] netlink_unicast+0x540/0x820\n    [<ffffffff83ac6e28>] netlink_sendmsg+0x8d8/0xda0\n    [<ffffffff83793def>] ____sys_sendmsg+0x30f/0xa80\n    [<ffffffff8379d29a>] ___sys_sendmsg+0x13a/0x1e0\n    [<ffffffff8379d50c>] __sys_sendmsg+0x11c/0x1f0\n    [<ffffffff843b9ce0>] do_syscall_64+0x40/0xe0\nunreferenced object 0xffff88816d2c0400 (size 1024):\n  comm \"tc\", pid 1079, jiffies 4294958525 (age 3074.287s)\n  hex dump (first 32 bytes):\n    40 00 00 00 00 00 00 00 57 f6 38 be 00 00 00 00  @.......W.8.....\n    10 04 2c 6d 81 88 ff ff 10 04 2c 6d 81 88 ff ff  ..,m......,m....\n  backtrace:\n    [<ffffffff81c06a68>] __kmem_cache_alloc_node+0x1e8/0x320\n    [<ffffffff81ab36c1>] __kmalloc_node+0x51/0x90\n    [<ffffffff81a8ed96>] kvmalloc_node+0xa6/0x1f0\n    [<ffffffff82827d03>] bucket_table_alloc.isra.0+0x83/0x460\n    [<ffffffff82828d2b>] rhashtable_init+0x43b/0x7c0\n    [<ffffffff832aed48>] mlxsw_sp_acl_ruleset_get+0x428/0x7a0\n    [<ffffffff832bc195>] mlxsw_sp_flower_tmplt_create+0x145/0x180\n    [<ffffffff832b2e1a>] mlxsw_sp_flow_block_cb+0x1ea/0x280\n    [<ffffffff83a10613>] tc_setup_cb_call+0x183/0x340\n    [<ffffffff83a9f85a>] fl_tmplt_create+0x3da/0x4c0\n    [<ffffffff83a22435>] tc_ctl_chain+0xa15/0x1170\n    [<ffffffff838a863c>] rtnetlink_rcv_msg+0x3cc/0xed0\n    [<ffffffff83ac87f0>] netlink_rcv_skb+0x170/0x440\n    [<ffffffff83ac6270>] netlink_unicast+0x540/0x820\n    [<ffffffff83ac6e28>] netlink_sendmsg+0x8d8/0xda0\n    [<ffffffff83793def>] ____sys_sendmsg+0x30f/0xa80\n\n[2]\n # tc qdisc add dev swp1 clsact\n # tc chain add dev swp1 ingress proto ip chain 1 flower dst_ip 0.0.0.0/32\n # tc qdisc del dev\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26669",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/32f2a0afa95fae0d1ceec2ff06e0e816939964b8",
            "patch_url": "https://git.kernel.org/stable/p/32f2a0afa95fae0d1ceec2ff06e0e816939964b8",
            "filename": "CVE-2024-26669-32f2a0afa95fae0d1ceec2ff06e0e816939964b8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26669/CVE-2024-26669-32f2a0afa95fae0d1ceec2ff06e0e816939964b8.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/32f2a0afa95fae0d1ceec2ff06e0e816939964b8",
                "patch_url": "https://git.kernel.org/stable/p/32f2a0afa95fae0d1ceec2ff06e0e816939964b8",
                "filename": "CVE-2024-26669-32f2a0afa95fae0d1ceec2ff06e0e816939964b8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26669/CVE-2024-26669-32f2a0afa95fae0d1ceec2ff06e0e816939964b8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ed46144cff3598a5cf79955630e795ff9af5b97",
                "patch_url": "https://git.kernel.org/stable/p/9ed46144cff3598a5cf79955630e795ff9af5b97",
                "filename": "CVE-2024-26669-9ed46144cff3598a5cf79955630e795ff9af5b97.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26669/CVE-2024-26669-9ed46144cff3598a5cf79955630e795ff9af5b97.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c04709b2cc99ae31c346f79f0211752d7b74df01",
                "patch_url": "https://git.kernel.org/stable/p/c04709b2cc99ae31c346f79f0211752d7b74df01",
                "filename": "CVE-2024-26669-c04709b2cc99ae31c346f79f0211752d7b74df01.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26669/CVE-2024-26669-c04709b2cc99ae31c346f79f0211752d7b74df01.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/32f2a0afa95fae0d1ceec2ff06e0e816939964b8",
            "https://git.kernel.org/stable/c/9ed46144cff3598a5cf79955630e795ff9af5b97",
            "https://git.kernel.org/stable/c/c04709b2cc99ae31c346f79f0211752d7b74df01",
            "https://www.cve.org/CVERecord?id=CVE-2024-26669\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26669\nhttps://lore.kernel.org/linux-cve-announce/2024040237-CVE-2024-26669-ca3c@gregkh/T"
        ]
    },
    "CVE-2024-26671": {
        "cve": "CVE-2024-26671",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-mq: fix IO hang from sbitmap wakeup race\n\nIn blk_mq_mark_tag_wait(), __add_wait_queue() may be re-ordered\nwith the following blk_mq_get_driver_tag() in case of getting driver\ntag failure.\n\nThen in __sbitmap_queue_wake_up(), waitqueue_active() may not observe\nthe added waiter in blk_mq_mark_tag_wait() and wake up nothing, meantime\nblk_mq_mark_tag_wait() can't get driver tag successfully.\n\nThis issue can be reproduced by running the following test in loop, and\nfio hang can be observed in < 30min when running it on my test VM\nin laptop.\n\n\tmodprobe -r scsi_debug\n\tmodprobe scsi_debug delay=0 dev_size_mb=4096 max_queue=1 host_max_queue=1 submit_queues=4\n\tdev=`ls -d /sys/bus/pseudo/drivers/scsi_debug/adapter*/host*/target*/*/block/* | head -1 | xargs basename`\n\tfio --filename=/dev/\"$dev\" --direct=1 --rw=randrw --bs=4k --iodepth=1 \\\n       \t\t--runtime=100 --numjobs=40 --time_based --name=test \\\n        \t--ioengine=libaio\n\nFix the issue by adding one explicit barrier in blk_mq_mark_tag_wait(), which\nis just fine in case of running out of tag.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26671",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/7610ba1319253225a9ba8a9d28d472fc883b4e2f",
            "patch_url": "https://git.kernel.org/stable/p/7610ba1319253225a9ba8a9d28d472fc883b4e2f",
            "filename": "CVE-2024-26671-7610ba1319253225a9ba8a9d28d472fc883b4e2f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26671/CVE-2024-26671-7610ba1319253225a9ba8a9d28d472fc883b4e2f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1d9c777d3e70bdc57dddf7a14a80059d65919e56",
                "patch_url": "https://git.kernel.org/stable/p/1d9c777d3e70bdc57dddf7a14a80059d65919e56",
                "filename": "CVE-2024-26671-1d9c777d3e70bdc57dddf7a14a80059d65919e56.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26671/CVE-2024-26671-1d9c777d3e70bdc57dddf7a14a80059d65919e56.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5266caaf5660529e3da53004b8b7174cab6374ed",
                "patch_url": "https://git.kernel.org/stable/p/5266caaf5660529e3da53004b8b7174cab6374ed",
                "filename": "CVE-2024-26671-5266caaf5660529e3da53004b8b7174cab6374ed.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26671/CVE-2024-26671-5266caaf5660529e3da53004b8b7174cab6374ed.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6d8b01624a2540336a32be91f25187a433af53a0",
                "patch_url": "https://git.kernel.org/stable/p/6d8b01624a2540336a32be91f25187a433af53a0",
                "filename": "CVE-2024-26671-6d8b01624a2540336a32be91f25187a433af53a0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26671/CVE-2024-26671-6d8b01624a2540336a32be91f25187a433af53a0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7610ba1319253225a9ba8a9d28d472fc883b4e2f",
                "patch_url": "https://git.kernel.org/stable/p/7610ba1319253225a9ba8a9d28d472fc883b4e2f",
                "filename": "CVE-2024-26671-7610ba1319253225a9ba8a9d28d472fc883b4e2f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26671/CVE-2024-26671-7610ba1319253225a9ba8a9d28d472fc883b4e2f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/89e0e66682e1538aeeaa3109503473663cd24c8b",
                "patch_url": "https://git.kernel.org/stable/p/89e0e66682e1538aeeaa3109503473663cd24c8b",
                "filename": "CVE-2024-26671-89e0e66682e1538aeeaa3109503473663cd24c8b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26671/CVE-2024-26671-89e0e66682e1538aeeaa3109503473663cd24c8b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9525b38180e2753f0daa1a522b7767a2aa969676",
                "patch_url": "https://git.kernel.org/stable/p/9525b38180e2753f0daa1a522b7767a2aa969676",
                "filename": "CVE-2024-26671-9525b38180e2753f0daa1a522b7767a2aa969676.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26671/CVE-2024-26671-9525b38180e2753f0daa1a522b7767a2aa969676.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ecd7744a1446eb02ccc63e493e2eb6ede4ef1e10",
                "patch_url": "https://git.kernel.org/stable/p/ecd7744a1446eb02ccc63e493e2eb6ede4ef1e10",
                "filename": "CVE-2024-26671-ecd7744a1446eb02ccc63e493e2eb6ede4ef1e10.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26671/CVE-2024-26671-ecd7744a1446eb02ccc63e493e2eb6ede4ef1e10.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f1bc0d8163f8ee84a8d5affdf624cfad657df1d2",
                "patch_url": "https://git.kernel.org/stable/p/f1bc0d8163f8ee84a8d5affdf624cfad657df1d2",
                "filename": "CVE-2024-26671-f1bc0d8163f8ee84a8d5affdf624cfad657df1d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26671/CVE-2024-26671-f1bc0d8163f8ee84a8d5affdf624cfad657df1d2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1d9c777d3e70bdc57dddf7a14a80059d65919e56",
            "https://git.kernel.org/stable/c/5266caaf5660529e3da53004b8b7174cab6374ed",
            "https://git.kernel.org/stable/c/6d8b01624a2540336a32be91f25187a433af53a0",
            "https://git.kernel.org/stable/c/7610ba1319253225a9ba8a9d28d472fc883b4e2f",
            "https://git.kernel.org/stable/c/89e0e66682e1538aeeaa3109503473663cd24c8b",
            "https://git.kernel.org/stable/c/9525b38180e2753f0daa1a522b7767a2aa969676",
            "https://git.kernel.org/stable/c/ecd7744a1446eb02ccc63e493e2eb6ede4ef1e10",
            "https://git.kernel.org/stable/c/f1bc0d8163f8ee84a8d5affdf624cfad657df1d2",
            "https://www.cve.org/CVERecord?id=CVE-2024-26671\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26671\nhttps://lore.kernel.org/linux-cve-announce/2024040219-CVE-2024-26671-2543@gregkh/T"
        ]
    },
    "CVE-2024-26675": {
        "cve": "CVE-2024-26675",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp_async: limit MRU to 64K\n\nsyzbot triggered a warning [1] in __alloc_pages():\n\nWARN_ON_ONCE_GFP(order > MAX_PAGE_ORDER, gfp)\n\nWillem fixed a similar issue in commit c0a2a1b0d631 (\"ppp: limit MRU to 64K\")\n\nAdopt the same sanity check for ppp_async_ioctl(PPPIOCSMRU)\n\n[1]:\n\n WARNING: CPU: 1 PID: 11 at mm/page_alloc.c:4543 __alloc_pages+0x308/0x698 mm/page_alloc.c:4543\nModules linked in:\nCPU: 1 PID: 11 Comm: kworker/u4:0 Not tainted 6.8.0-rc2-syzkaller-g41bccc98fb79 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\nWorkqueue: events_unbound flush_to_ldisc\npstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : __alloc_pages+0x308/0x698 mm/page_alloc.c:4543\n lr : __alloc_pages+0xc8/0x698 mm/page_alloc.c:4537\nsp : ffff800093967580\nx29: ffff800093967660 x28: ffff8000939675a0 x27: dfff800000000000\nx26: ffff70001272ceb4 x25: 0000000000000000 x24: ffff8000939675c0\nx23: 0000000000000000 x22: 0000000000060820 x21: 1ffff0001272ceb8\nx20: ffff8000939675e0 x19: 0000000000000010 x18: ffff800093967120\nx17: ffff800083bded5c x16: ffff80008ac97500 x15: 0000000000000005\nx14: 1ffff0001272cebc x13: 0000000000000000 x12: 0000000000000000\nx11: ffff70001272cec1 x10: 1ffff0001272cec0 x9 : 0000000000000001\nx8 : ffff800091c91000 x7 : 0000000000000000 x6 : 000000000000003f\nx5 : 00000000ffffffff x4 : 0000000000000000 x3 : 0000000000000020\nx2 : 0000000000000008 x1 : 0000000000000000 x0 : ffff8000939675e0\nCall trace:\n  __alloc_pages+0x308/0x698 mm/page_alloc.c:4543\n  __alloc_pages_node include/linux/gfp.h:238 [inline]\n  alloc_pages_node include/linux/gfp.h:261 [inline]\n  __kmalloc_large_node+0xbc/0x1fc mm/slub.c:3926\n  __do_kmalloc_node mm/slub.c:3969 [inline]\n  __kmalloc_node_track_caller+0x418/0x620 mm/slub.c:4001\n  kmalloc_reserve+0x17c/0x23c net/core/skbuff.c:590\n  __alloc_skb+0x1c8/0x3d8 net/core/skbuff.c:651\n  __netdev_alloc_skb+0xb8/0x3e8 net/core/skbuff.c:715\n  netdev_alloc_skb include/linux/skbuff.h:3235 [inline]\n  dev_alloc_skb include/linux/skbuff.h:3248 [inline]\n  ppp_async_input drivers/net/ppp/ppp_async.c:863 [inline]\n  ppp_asynctty_receive+0x588/0x186c drivers/net/ppp/ppp_async.c:341\n  tty_ldisc_receive_buf+0x12c/0x15c drivers/tty/tty_buffer.c:390\n  tty_port_default_receive_buf+0x74/0xac drivers/tty/tty_port.c:37\n  receive_buf drivers/tty/tty_buffer.c:444 [inline]\n  flush_to_ldisc+0x284/0x6e4 drivers/tty/tty_buffer.c:494\n  process_one_work+0x694/0x1204 kernel/workqueue.c:2633\n  process_scheduled_works kernel/workqueue.c:2706 [inline]\n  worker_thread+0x938/0xef4 kernel/workqueue.c:2787\n  kthread+0x288/0x310 kernel/kthread.c:388\n  ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26675",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4fdb14ba89faff6e6969a4dffdc8e54235d6e5ed",
            "patch_url": "https://git.kernel.org/stable/p/4fdb14ba89faff6e6969a4dffdc8e54235d6e5ed",
            "filename": "CVE-2024-26675-4fdb14ba89faff6e6969a4dffdc8e54235d6e5ed.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26675/CVE-2024-26675-4fdb14ba89faff6e6969a4dffdc8e54235d6e5ed.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/210d938f963dddc543b07e66a79b7d8d4bd00bd8",
                "patch_url": "https://git.kernel.org/stable/p/210d938f963dddc543b07e66a79b7d8d4bd00bd8",
                "filename": "CVE-2024-26675-210d938f963dddc543b07e66a79b7d8d4bd00bd8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26675/CVE-2024-26675-210d938f963dddc543b07e66a79b7d8d4bd00bd8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4e2c4846b2507f6dfc9bea72b7567c2693a82a16",
                "patch_url": "https://git.kernel.org/stable/p/4e2c4846b2507f6dfc9bea72b7567c2693a82a16",
                "filename": "CVE-2024-26675-4e2c4846b2507f6dfc9bea72b7567c2693a82a16.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26675/CVE-2024-26675-4e2c4846b2507f6dfc9bea72b7567c2693a82a16.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4fdb14ba89faff6e6969a4dffdc8e54235d6e5ed",
                "patch_url": "https://git.kernel.org/stable/p/4fdb14ba89faff6e6969a4dffdc8e54235d6e5ed",
                "filename": "CVE-2024-26675-4fdb14ba89faff6e6969a4dffdc8e54235d6e5ed.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26675/CVE-2024-26675-4fdb14ba89faff6e6969a4dffdc8e54235d6e5ed.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/56fae81633ccee307cfcb032f706bf1863a56982",
                "patch_url": "https://git.kernel.org/stable/p/56fae81633ccee307cfcb032f706bf1863a56982",
                "filename": "CVE-2024-26675-56fae81633ccee307cfcb032f706bf1863a56982.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26675/CVE-2024-26675-56fae81633ccee307cfcb032f706bf1863a56982.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/58fbe665b097bf7b3144da7e7b91fb27aa8d0ae3",
                "patch_url": "https://git.kernel.org/stable/p/58fbe665b097bf7b3144da7e7b91fb27aa8d0ae3",
                "filename": "CVE-2024-26675-58fbe665b097bf7b3144da7e7b91fb27aa8d0ae3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26675/CVE-2024-26675-58fbe665b097bf7b3144da7e7b91fb27aa8d0ae3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7e5ef49670766c9742ffcd9cead7cdb018268719",
                "patch_url": "https://git.kernel.org/stable/p/7e5ef49670766c9742ffcd9cead7cdb018268719",
                "filename": "CVE-2024-26675-7e5ef49670766c9742ffcd9cead7cdb018268719.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26675/CVE-2024-26675-7e5ef49670766c9742ffcd9cead7cdb018268719.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b06e067e93fa4b98acfd3a9f38a398ab91bbc58b",
                "patch_url": "https://git.kernel.org/stable/p/b06e067e93fa4b98acfd3a9f38a398ab91bbc58b",
                "filename": "CVE-2024-26675-b06e067e93fa4b98acfd3a9f38a398ab91bbc58b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26675/CVE-2024-26675-b06e067e93fa4b98acfd3a9f38a398ab91bbc58b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cb88cb53badb8aeb3955ad6ce80b07b598e310b8",
                "patch_url": "https://git.kernel.org/stable/p/cb88cb53badb8aeb3955ad6ce80b07b598e310b8",
                "filename": "CVE-2024-26675-cb88cb53badb8aeb3955ad6ce80b07b598e310b8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26675/CVE-2024-26675-cb88cb53badb8aeb3955ad6ce80b07b598e310b8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/210d938f963dddc543b07e66a79b7d8d4bd00bd8",
            "https://git.kernel.org/stable/c/4e2c4846b2507f6dfc9bea72b7567c2693a82a16",
            "https://git.kernel.org/stable/c/4fdb14ba89faff6e6969a4dffdc8e54235d6e5ed",
            "https://git.kernel.org/stable/c/56fae81633ccee307cfcb032f706bf1863a56982",
            "https://git.kernel.org/stable/c/58fbe665b097bf7b3144da7e7b91fb27aa8d0ae3",
            "https://git.kernel.org/stable/c/7e5ef49670766c9742ffcd9cead7cdb018268719",
            "https://git.kernel.org/stable/c/b06e067e93fa4b98acfd3a9f38a398ab91bbc58b",
            "https://git.kernel.org/stable/c/cb88cb53badb8aeb3955ad6ce80b07b598e310b8",
            "https://www.cve.org/CVERecord?id=CVE-2024-26675\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26675\nhttps://lore.kernel.org/linux-cve-announce/2024040252-CVE-2024-26675-5b19@gregkh/T"
        ]
    },
    "CVE-2024-26686": {
        "cve": "CVE-2024-26686",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats\n\nlock_task_sighand() can trigger a hard lockup.  If NR_CPUS threads call\ndo_task_stat() at the same time and the process has NR_THREADS, it will\nspin with irqs disabled O(NR_CPUS * NR_THREADS) time.\n\nChange do_task_stat() to use sig->stats_lock to gather the statistics\noutside of ->siglock protected section, in the likely case this code will\nrun lockless.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26686",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4fe85bdaabd63f8f8579b24a10ed597c9c482164",
            "patch_url": "https://git.kernel.org/stable/p/4fe85bdaabd63f8f8579b24a10ed597c9c482164",
            "filename": "CVE-2024-26686-4fe85bdaabd63f8f8579b24a10ed597c9c482164.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26686/CVE-2024-26686-4fe85bdaabd63f8f8579b24a10ed597c9c482164.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0c35d1914353799c54fa1843fe7dea6fcbcdbac5",
                "patch_url": "https://git.kernel.org/stable/p/0c35d1914353799c54fa1843fe7dea6fcbcdbac5",
                "filename": "CVE-2024-26686-0c35d1914353799c54fa1843fe7dea6fcbcdbac5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26686/CVE-2024-26686-0c35d1914353799c54fa1843fe7dea6fcbcdbac5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/27978243f165b44e342f28f449b91327944ea071",
                "patch_url": "https://git.kernel.org/stable/p/27978243f165b44e342f28f449b91327944ea071",
                "filename": "CVE-2024-26686-27978243f165b44e342f28f449b91327944ea071.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26686/CVE-2024-26686-27978243f165b44e342f28f449b91327944ea071.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3820b0fac7732a653bcc6f6ac20c1d72e697f8f6",
                "patch_url": "https://git.kernel.org/stable/p/3820b0fac7732a653bcc6f6ac20c1d72e697f8f6",
                "filename": "CVE-2024-26686-3820b0fac7732a653bcc6f6ac20c1d72e697f8f6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26686/CVE-2024-26686-3820b0fac7732a653bcc6f6ac20c1d72e697f8f6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4fe85bdaabd63f8f8579b24a10ed597c9c482164",
                "patch_url": "https://git.kernel.org/stable/p/4fe85bdaabd63f8f8579b24a10ed597c9c482164",
                "filename": "CVE-2024-26686-4fe85bdaabd63f8f8579b24a10ed597c9c482164.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26686/CVE-2024-26686-4fe85bdaabd63f8f8579b24a10ed597c9c482164.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7601df8031fd67310af891897ef6cc0df4209305",
                "patch_url": "https://git.kernel.org/stable/p/7601df8031fd67310af891897ef6cc0df4209305",
                "filename": "CVE-2024-26686-7601df8031fd67310af891897ef6cc0df4209305.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26686/CVE-2024-26686-7601df8031fd67310af891897ef6cc0df4209305.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d",
                "patch_url": "https://git.kernel.org/stable/p/cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d",
                "filename": "CVE-2024-26686-cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26686/CVE-2024-26686-cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0c35d1914353799c54fa1843fe7dea6fcbcdbac5",
            "https://git.kernel.org/stable/c/27978243f165b44e342f28f449b91327944ea071",
            "https://git.kernel.org/stable/c/3820b0fac7732a653bcc6f6ac20c1d72e697f8f6",
            "https://git.kernel.org/stable/c/4fe85bdaabd63f8f8579b24a10ed597c9c482164",
            "https://git.kernel.org/stable/c/7601df8031fd67310af891897ef6cc0df4209305",
            "https://git.kernel.org/stable/c/cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d",
            "https://www.cve.org/CVERecord?id=CVE-2024-26686\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26686\nhttps://lore.kernel.org/linux-cve-announce/2024040335-CVE-2024-26686-b22f@gregkh/T"
        ]
    },
    "CVE-2024-26693": {
        "cve": "CVE-2024-26693",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: fix a crash when we run out of stations\n\nA DoS tool that injects loads of authentication frames made our AP\ncrash. The iwl_mvm_is_dup() function couldn't find the per-queue\ndup_data which was not allocated.\n\nThe root cause for that is that we ran out of stations in the firmware\nand we didn't really add the station to the firmware, yet we didn't\nreturn an error to mac80211.\nMac80211 was thinking that we have the station and because of that,\nsta_info::uploaded was set to 1. This allowed\nieee80211_find_sta_by_ifaddr() to return a valid station object, but\nthat ieee80211_sta didn't have any iwl_mvm_sta object initialized and\nthat caused the crash mentioned earlier when we got Rx on that station.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26693",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/00f4eb31b8193f6070ce24df636883f9c104ca95",
            "patch_url": "https://git.kernel.org/stable/p/00f4eb31b8193f6070ce24df636883f9c104ca95",
            "filename": "CVE-2024-26693-00f4eb31b8193f6070ce24df636883f9c104ca95.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26693/CVE-2024-26693-00f4eb31b8193f6070ce24df636883f9c104ca95.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/00f4eb31b8193f6070ce24df636883f9c104ca95",
                "patch_url": "https://git.kernel.org/stable/p/00f4eb31b8193f6070ce24df636883f9c104ca95",
                "filename": "CVE-2024-26693-00f4eb31b8193f6070ce24df636883f9c104ca95.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26693/CVE-2024-26693-00f4eb31b8193f6070ce24df636883f9c104ca95.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7198383ef2debe748118996f627452281cf27d7",
                "patch_url": "https://git.kernel.org/stable/p/b7198383ef2debe748118996f627452281cf27d7",
                "filename": "CVE-2024-26693-b7198383ef2debe748118996f627452281cf27d7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26693/CVE-2024-26693-b7198383ef2debe748118996f627452281cf27d7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c12f0f4d4caf23b1bfdc2602b6b70d56bdcd6aa7",
                "patch_url": "https://git.kernel.org/stable/p/c12f0f4d4caf23b1bfdc2602b6b70d56bdcd6aa7",
                "filename": "CVE-2024-26693-c12f0f4d4caf23b1bfdc2602b6b70d56bdcd6aa7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26693/CVE-2024-26693-c12f0f4d4caf23b1bfdc2602b6b70d56bdcd6aa7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/00f4eb31b8193f6070ce24df636883f9c104ca95",
            "https://git.kernel.org/stable/c/b7198383ef2debe748118996f627452281cf27d7",
            "https://git.kernel.org/stable/c/c12f0f4d4caf23b1bfdc2602b6b70d56bdcd6aa7",
            "https://www.cve.org/CVERecord?id=CVE-2024-26693\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26693\nhttps://lore.kernel.org/linux-cve-announce/2024040337-CVE-2024-26693-9c3b@gregkh/T"
        ]
    },
    "CVE-2024-26694": {
        "cve": "CVE-2024-26694",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: fix double-free bug\n\nThe storage for the TLV PC register data wasn't done like all\nthe other storage in the drv->fw area, which is cleared at the\nend of deallocation. Therefore, the freeing must also be done\ndifferently, explicitly NULL'ing it out after the free, since\notherwise there's a nasty double-free bug here if a file fails\nto load after this has been parsed, and we get another free\nlater (e.g. because no other file exists.) Fix that by adding\nthe missing NULL assignment.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26694",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/353d321f63f7dbfc9ef58498cc732c9fe886a596",
            "patch_url": "https://git.kernel.org/stable/p/353d321f63f7dbfc9ef58498cc732c9fe886a596",
            "filename": "CVE-2024-26694-353d321f63f7dbfc9ef58498cc732c9fe886a596.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26694/CVE-2024-26694-353d321f63f7dbfc9ef58498cc732c9fe886a596.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/353d321f63f7dbfc9ef58498cc732c9fe886a596",
                "patch_url": "https://git.kernel.org/stable/p/353d321f63f7dbfc9ef58498cc732c9fe886a596",
                "filename": "CVE-2024-26694-353d321f63f7dbfc9ef58498cc732c9fe886a596.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26694/CVE-2024-26694-353d321f63f7dbfc9ef58498cc732c9fe886a596.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ab9d4bb9a1892439b3123fc52b19e32b9cdf80ad",
                "patch_url": "https://git.kernel.org/stable/p/ab9d4bb9a1892439b3123fc52b19e32b9cdf80ad",
                "filename": "CVE-2024-26694-ab9d4bb9a1892439b3123fc52b19e32b9cdf80ad.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26694/CVE-2024-26694-ab9d4bb9a1892439b3123fc52b19e32b9cdf80ad.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d24eb9a27bea8fe5237fa71be274391d9d51eff2",
                "patch_url": "https://git.kernel.org/stable/p/d24eb9a27bea8fe5237fa71be274391d9d51eff2",
                "filename": "CVE-2024-26694-d24eb9a27bea8fe5237fa71be274391d9d51eff2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26694/CVE-2024-26694-d24eb9a27bea8fe5237fa71be274391d9d51eff2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/353d321f63f7dbfc9ef58498cc732c9fe886a596",
            "https://git.kernel.org/stable/c/ab9d4bb9a1892439b3123fc52b19e32b9cdf80ad",
            "https://git.kernel.org/stable/c/d24eb9a27bea8fe5237fa71be274391d9d51eff2",
            "https://www.cve.org/CVERecord?id=CVE-2024-26694\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26694\nhttps://lore.kernel.org/linux-cve-announce/2024040337-CVE-2024-26694-b216@gregkh/T"
        ]
    },
    "CVE-2024-26698": {
        "cve": "CVE-2024-26698",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nhv_netvsc: Fix race condition between netvsc_probe and netvsc_remove\n\nIn commit ac5047671758 (\"hv_netvsc: Disable NAPI before closing the\nVMBus channel\"), napi_disable was getting called for all channels,\nincluding all subchannels without confirming if they are enabled or not.\n\nThis caused hv_netvsc getting hung at napi_disable, when netvsc_probe()\nhas finished running but nvdev->subchan_work has not started yet.\nnetvsc_subchan_work() -> rndis_set_subchannel() has not created the\nsub-channels and because of that netvsc_sc_open() is not running.\nnetvsc_remove() calls cancel_work_sync(&nvdev->subchan_work), for which\nnetvsc_subchan_work did not run.\n\nnetif_napi_add() sets the bit NAPI_STATE_SCHED because it ensures NAPI\ncannot be scheduled. Then netvsc_sc_open() -> napi_enable will clear the\nNAPIF_STATE_SCHED bit, so it can be scheduled. napi_disable() does the\nopposite.\n\nNow during netvsc_device_remove(), when napi_disable is called for those\nsubchannels, napi_disable gets stuck on infinite msleep.\n\nThis fix addresses this problem by ensuring that napi_disable() is not\ngetting called for non-enabled NAPI struct.\nBut netif_napi_del() is still necessary for these non-enabled NAPI struct\nfor cleanup purpose.\n\nCall trace:\n[  654.559417] task:modprobe        state:D stack:    0 pid: 2321 ppid:  1091 flags:0x00004002\n[  654.568030] Call Trace:\n[  654.571221]  <TASK>\n[  654.573790]  __schedule+0x2d6/0x960\n[  654.577733]  schedule+0x69/0xf0\n[  654.581214]  schedule_timeout+0x87/0x140\n[  654.585463]  ? __bpf_trace_tick_stop+0x20/0x20\n[  654.590291]  msleep+0x2d/0x40\n[  654.593625]  napi_disable+0x2b/0x80\n[  654.597437]  netvsc_device_remove+0x8a/0x1f0 [hv_netvsc]\n[  654.603935]  rndis_filter_device_remove+0x194/0x1c0 [hv_netvsc]\n[  654.611101]  ? do_wait_intr+0xb0/0xb0\n[  654.615753]  netvsc_remove+0x7c/0x120 [hv_netvsc]\n[  654.621675]  vmbus_remove+0x27/0x40 [hv_vmbus]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26698",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/48a8ccccffbae10c91d31fc872db5c31aba07518",
            "patch_url": "https://git.kernel.org/stable/p/48a8ccccffbae10c91d31fc872db5c31aba07518",
            "filename": "CVE-2024-26698-48a8ccccffbae10c91d31fc872db5c31aba07518.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26698/CVE-2024-26698-48a8ccccffbae10c91d31fc872db5c31aba07518.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0e8875de9dad12805ff66e92cd5edea6a421f1cd",
                "patch_url": "https://git.kernel.org/stable/p/0e8875de9dad12805ff66e92cd5edea6a421f1cd",
                "filename": "CVE-2024-26698-0e8875de9dad12805ff66e92cd5edea6a421f1cd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26698/CVE-2024-26698-0e8875de9dad12805ff66e92cd5edea6a421f1cd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/22a77c0f5b8233237731df3288d067af51a2fd7b",
                "patch_url": "https://git.kernel.org/stable/p/22a77c0f5b8233237731df3288d067af51a2fd7b",
                "filename": "CVE-2024-26698-22a77c0f5b8233237731df3288d067af51a2fd7b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26698/CVE-2024-26698-22a77c0f5b8233237731df3288d067af51a2fd7b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/48a8ccccffbae10c91d31fc872db5c31aba07518",
                "patch_url": "https://git.kernel.org/stable/p/48a8ccccffbae10c91d31fc872db5c31aba07518",
                "filename": "CVE-2024-26698-48a8ccccffbae10c91d31fc872db5c31aba07518.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26698/CVE-2024-26698-48a8ccccffbae10c91d31fc872db5c31aba07518.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7656372ae190e54e8c8cf1039725a5ea59fdf84a",
                "patch_url": "https://git.kernel.org/stable/p/7656372ae190e54e8c8cf1039725a5ea59fdf84a",
                "filename": "CVE-2024-26698-7656372ae190e54e8c8cf1039725a5ea59fdf84a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26698/CVE-2024-26698-7656372ae190e54e8c8cf1039725a5ea59fdf84a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ec807e7b6f5fcf9499f3baa69f254bb239a847f",
                "patch_url": "https://git.kernel.org/stable/p/9ec807e7b6f5fcf9499f3baa69f254bb239a847f",
                "filename": "CVE-2024-26698-9ec807e7b6f5fcf9499f3baa69f254bb239a847f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26698/CVE-2024-26698-9ec807e7b6f5fcf9499f3baa69f254bb239a847f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e0526ec5360a48ad3ab2e26e802b0532302a7e11",
                "patch_url": "https://git.kernel.org/stable/p/e0526ec5360a48ad3ab2e26e802b0532302a7e11",
                "filename": "CVE-2024-26698-e0526ec5360a48ad3ab2e26e802b0532302a7e11.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26698/CVE-2024-26698-e0526ec5360a48ad3ab2e26e802b0532302a7e11.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0e8875de9dad12805ff66e92cd5edea6a421f1cd",
            "https://git.kernel.org/stable/c/22a77c0f5b8233237731df3288d067af51a2fd7b",
            "https://git.kernel.org/stable/c/48a8ccccffbae10c91d31fc872db5c31aba07518",
            "https://git.kernel.org/stable/c/7656372ae190e54e8c8cf1039725a5ea59fdf84a",
            "https://git.kernel.org/stable/c/9ec807e7b6f5fcf9499f3baa69f254bb239a847f",
            "https://git.kernel.org/stable/c/e0526ec5360a48ad3ab2e26e802b0532302a7e11",
            "https://www.cve.org/CVERecord?id=CVE-2024-26698\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26698\nhttps://lore.kernel.org/linux-cve-announce/2024040338-CVE-2024-26698-36ac@gregkh/T"
        ]
    },
    "CVE-2024-26704": {
        "cve": "CVE-2024-26704",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix double-free of blocks due to wrong extents moved_len\n\nIn ext4_move_extents(), moved_len is only updated when all moves are\nsuccessfully executed, and only discards orig_inode and donor_inode\npreallocations when moved_len is not zero. When the loop fails to exit\nafter successfully moving some extents, moved_len is not updated and\nremains at 0, so it does not discard the preallocations.\n\nIf the moved extents overlap with the preallocated extents, the\noverlapped extents are freed twice in ext4_mb_release_inode_pa() and\next4_process_freed_data() (as described in commit 94d7c16cbbbd (\"ext4:\nFix double-free of blocks with EXT4_IOC_MOVE_EXT\")), and bb_free is\nincremented twice. Hence when trim is executed, a zero-division bug is\ntriggered in mb_update_avg_fragment_size() because bb_free is not zero\nand bb_fragments is zero.\n\nTherefore, update move_len after each extent move to avoid the issue.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26704",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/afba9d11320dad5ce222ac8964caf64b7b4bedb1",
            "patch_url": "https://git.kernel.org/stable/p/afba9d11320dad5ce222ac8964caf64b7b4bedb1",
            "filename": "CVE-2024-26704-afba9d11320dad5ce222ac8964caf64b7b4bedb1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26704/CVE-2024-26704-afba9d11320dad5ce222ac8964caf64b7b4bedb1.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/185eab30486ba3e7bf8b9c2e049c79a06ffd2bc1",
                "patch_url": "https://git.kernel.org/stable/p/185eab30486ba3e7bf8b9c2e049c79a06ffd2bc1",
                "filename": "CVE-2024-26704-185eab30486ba3e7bf8b9c2e049c79a06ffd2bc1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26704/CVE-2024-26704-185eab30486ba3e7bf8b9c2e049c79a06ffd2bc1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2883940b19c38d5884c8626483811acf4d7e148f",
                "patch_url": "https://git.kernel.org/stable/p/2883940b19c38d5884c8626483811acf4d7e148f",
                "filename": "CVE-2024-26704-2883940b19c38d5884c8626483811acf4d7e148f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26704/CVE-2024-26704-2883940b19c38d5884c8626483811acf4d7e148f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/55583e899a5357308274601364741a83e78d6ac4",
                "patch_url": "https://git.kernel.org/stable/p/55583e899a5357308274601364741a83e78d6ac4",
                "filename": "CVE-2024-26704-55583e899a5357308274601364741a83e78d6ac4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26704/CVE-2024-26704-55583e899a5357308274601364741a83e78d6ac4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/559ddacb90da1d8786dd8ec4fd76bbfa404eaef6",
                "patch_url": "https://git.kernel.org/stable/p/559ddacb90da1d8786dd8ec4fd76bbfa404eaef6",
                "filename": "CVE-2024-26704-559ddacb90da1d8786dd8ec4fd76bbfa404eaef6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26704/CVE-2024-26704-559ddacb90da1d8786dd8ec4fd76bbfa404eaef6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/afba9d11320dad5ce222ac8964caf64b7b4bedb1",
                "patch_url": "https://git.kernel.org/stable/p/afba9d11320dad5ce222ac8964caf64b7b4bedb1",
                "filename": "CVE-2024-26704-afba9d11320dad5ce222ac8964caf64b7b4bedb1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26704/CVE-2024-26704-afba9d11320dad5ce222ac8964caf64b7b4bedb1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/afbcad9ae7d6d11608399188f03a837451b6b3a1",
                "patch_url": "https://git.kernel.org/stable/p/afbcad9ae7d6d11608399188f03a837451b6b3a1",
                "filename": "CVE-2024-26704-afbcad9ae7d6d11608399188f03a837451b6b3a1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26704/CVE-2024-26704-afbcad9ae7d6d11608399188f03a837451b6b3a1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b4fbb89d722cbb16beaaea234b7230faaaf68c71",
                "patch_url": "https://git.kernel.org/stable/p/b4fbb89d722cbb16beaaea234b7230faaaf68c71",
                "filename": "CVE-2024-26704-b4fbb89d722cbb16beaaea234b7230faaaf68c71.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26704/CVE-2024-26704-b4fbb89d722cbb16beaaea234b7230faaaf68c71.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d033a555d9a1cf53dbf3301af7199cc4a4c8f537",
                "patch_url": "https://git.kernel.org/stable/p/d033a555d9a1cf53dbf3301af7199cc4a4c8f537",
                "filename": "CVE-2024-26704-d033a555d9a1cf53dbf3301af7199cc4a4c8f537.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26704/CVE-2024-26704-d033a555d9a1cf53dbf3301af7199cc4a4c8f537.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/185eab30486ba3e7bf8b9c2e049c79a06ffd2bc1",
            "https://git.kernel.org/stable/c/2883940b19c38d5884c8626483811acf4d7e148f",
            "https://git.kernel.org/stable/c/55583e899a5357308274601364741a83e78d6ac4",
            "https://git.kernel.org/stable/c/559ddacb90da1d8786dd8ec4fd76bbfa404eaef6",
            "https://git.kernel.org/stable/c/afba9d11320dad5ce222ac8964caf64b7b4bedb1",
            "https://git.kernel.org/stable/c/afbcad9ae7d6d11608399188f03a837451b6b3a1",
            "https://git.kernel.org/stable/c/b4fbb89d722cbb16beaaea234b7230faaaf68c71",
            "https://git.kernel.org/stable/c/d033a555d9a1cf53dbf3301af7199cc4a4c8f537",
            "https://www.cve.org/CVERecord?id=CVE-2024-26704\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26704\nhttps://lore.kernel.org/linux-cve-announce/2024040340-CVE-2024-26704-a082@gregkh/T"
        ]
    },
    "CVE-2024-26717": {
        "cve": "CVE-2024-26717",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: i2c-hid-of: fix NULL-deref on failed power up\n\nA while back the I2C HID implementation was split in an ACPI and OF\npart, but the new OF driver never initialises the client pointer which\nis dereferenced on power-up failures.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26717",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/62f5d219edbd174829aa18d4b3d97cd5fefbb783",
            "patch_url": "https://git.kernel.org/stable/p/62f5d219edbd174829aa18d4b3d97cd5fefbb783",
            "filename": "CVE-2024-26717-62f5d219edbd174829aa18d4b3d97cd5fefbb783.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26717/CVE-2024-26717-62f5d219edbd174829aa18d4b3d97cd5fefbb783.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/00aab7dcb2267f2aef59447602f34501efe1a07f",
                "patch_url": "https://git.kernel.org/stable/p/00aab7dcb2267f2aef59447602f34501efe1a07f",
                "filename": "CVE-2024-26717-00aab7dcb2267f2aef59447602f34501efe1a07f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26717/CVE-2024-26717-00aab7dcb2267f2aef59447602f34501efe1a07f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4cad91344a62536a2949873bad6365fbb6232776",
                "patch_url": "https://git.kernel.org/stable/p/4cad91344a62536a2949873bad6365fbb6232776",
                "filename": "CVE-2024-26717-4cad91344a62536a2949873bad6365fbb6232776.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26717/CVE-2024-26717-4cad91344a62536a2949873bad6365fbb6232776.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/62f5d219edbd174829aa18d4b3d97cd5fefbb783",
                "patch_url": "https://git.kernel.org/stable/p/62f5d219edbd174829aa18d4b3d97cd5fefbb783",
                "filename": "CVE-2024-26717-62f5d219edbd174829aa18d4b3d97cd5fefbb783.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26717/CVE-2024-26717-62f5d219edbd174829aa18d4b3d97cd5fefbb783.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d7d7a0e3b6f5adc45f23667cbb919e99093a5b5c",
                "patch_url": "https://git.kernel.org/stable/p/d7d7a0e3b6f5adc45f23667cbb919e99093a5b5c",
                "filename": "CVE-2024-26717-d7d7a0e3b6f5adc45f23667cbb919e99093a5b5c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26717/CVE-2024-26717-d7d7a0e3b6f5adc45f23667cbb919e99093a5b5c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e28d6b63aeecbda450935fb58db0e682ea8212d3",
                "patch_url": "https://git.kernel.org/stable/p/e28d6b63aeecbda450935fb58db0e682ea8212d3",
                "filename": "CVE-2024-26717-e28d6b63aeecbda450935fb58db0e682ea8212d3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26717/CVE-2024-26717-e28d6b63aeecbda450935fb58db0e682ea8212d3.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/00aab7dcb2267f2aef59447602f34501efe1a07f",
            "https://git.kernel.org/stable/c/4cad91344a62536a2949873bad6365fbb6232776",
            "https://git.kernel.org/stable/c/62f5d219edbd174829aa18d4b3d97cd5fefbb783",
            "https://git.kernel.org/stable/c/d7d7a0e3b6f5adc45f23667cbb919e99093a5b5c",
            "https://git.kernel.org/stable/c/e28d6b63aeecbda450935fb58db0e682ea8212d3",
            "https://www.cve.org/CVERecord?id=CVE-2024-26717\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26717\nhttps://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26717-0d01@gregkh/T"
        ]
    },
    "CVE-2024-26720": {
        "cve": "CVE-2024-26720",
        "cvss_v2": null,
        "cvss_v3": "0.0",
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26720",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1f12e4b3284d6c863f272eb2de0d4248ed211cf4",
            "patch_url": "https://git.kernel.org/stable/p/1f12e4b3284d6c863f272eb2de0d4248ed211cf4",
            "filename": "CVE-2024-26720-1f12e4b3284d6c863f272eb2de0d4248ed211cf4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-1f12e4b3284d6c863f272eb2de0d4248ed211cf4.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/000099d71648504fb9c7a4616f92c2b70c3e44ec",
                "patch_url": "https://git.kernel.org/stable/p/000099d71648504fb9c7a4616f92c2b70c3e44ec",
                "filename": "CVE-2024-26720-000099d71648504fb9c7a4616f92c2b70c3e44ec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-000099d71648504fb9c7a4616f92c2b70c3e44ec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/145faa3d03688cbb7bbaaecbd84c01539852942c",
                "patch_url": "https://git.kernel.org/stable/p/145faa3d03688cbb7bbaaecbd84c01539852942c",
                "filename": "CVE-2024-26720-145faa3d03688cbb7bbaaecbd84c01539852942c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-145faa3d03688cbb7bbaaecbd84c01539852942c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/16b1025eaa8fc223ab4273ece20d1c3a4211a95d",
                "patch_url": "https://git.kernel.org/stable/p/16b1025eaa8fc223ab4273ece20d1c3a4211a95d",
                "filename": "CVE-2024-26720-16b1025eaa8fc223ab4273ece20d1c3a4211a95d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-16b1025eaa8fc223ab4273ece20d1c3a4211a95d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1f12e4b3284d6c863f272eb2de0d4248ed211cf4",
                "patch_url": "https://git.kernel.org/stable/p/1f12e4b3284d6c863f272eb2de0d4248ed211cf4",
                "filename": "CVE-2024-26720-1f12e4b3284d6c863f272eb2de0d4248ed211cf4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-1f12e4b3284d6c863f272eb2de0d4248ed211cf4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807",
                "patch_url": "https://git.kernel.org/stable/p/23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807",
                "filename": "CVE-2024-26720-23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/253f9ea7e8e53a5176bd80ceb174907b10724c1a",
                "patch_url": "https://git.kernel.org/stable/p/253f9ea7e8e53a5176bd80ceb174907b10724c1a",
                "filename": "CVE-2024-26720-253f9ea7e8e53a5176bd80ceb174907b10724c1a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-253f9ea7e8e53a5176bd80ceb174907b10724c1a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2820005edae13b140f2d54267d1bd6bb23915f59",
                "patch_url": "https://git.kernel.org/stable/p/2820005edae13b140f2d54267d1bd6bb23915f59",
                "filename": "CVE-2024-26720-2820005edae13b140f2d54267d1bd6bb23915f59.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-2820005edae13b140f2d54267d1bd6bb23915f59.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5099871b370335809c0fd1abad74d9c7c205d43f",
                "patch_url": "https://git.kernel.org/stable/p/5099871b370335809c0fd1abad74d9c7c205d43f",
                "filename": "CVE-2024-26720-5099871b370335809c0fd1abad74d9c7c205d43f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-5099871b370335809c0fd1abad74d9c7c205d43f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/65977bed167a92e87085e757fffa5798f7314c9f",
                "patch_url": "https://git.kernel.org/stable/p/65977bed167a92e87085e757fffa5798f7314c9f",
                "filename": "CVE-2024-26720-65977bed167a92e87085e757fffa5798f7314c9f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-65977bed167a92e87085e757fffa5798f7314c9f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/81e7d2530d458548b90a5c5e76b77ad5e5d1c0df",
                "patch_url": "https://git.kernel.org/stable/p/81e7d2530d458548b90a5c5e76b77ad5e5d1c0df",
                "filename": "CVE-2024-26720-81e7d2530d458548b90a5c5e76b77ad5e5d1c0df.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-81e7d2530d458548b90a5c5e76b77ad5e5d1c0df.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9319b647902cbd5cc884ac08a8a6d54ce111fc78",
                "patch_url": "https://git.kernel.org/stable/p/9319b647902cbd5cc884ac08a8a6d54ce111fc78",
                "filename": "CVE-2024-26720-9319b647902cbd5cc884ac08a8a6d54ce111fc78.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-9319b647902cbd5cc884ac08a8a6d54ce111fc78.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c593d26fb5d577ef31b6e49a31e08ae3ebc1bc1e",
                "patch_url": "https://git.kernel.org/stable/p/c593d26fb5d577ef31b6e49a31e08ae3ebc1bc1e",
                "filename": "CVE-2024-26720-c593d26fb5d577ef31b6e49a31e08ae3ebc1bc1e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-c593d26fb5d577ef31b6e49a31e08ae3ebc1bc1e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cbbe17a324437c0ff99881a3ee453da45b228a00",
                "patch_url": "https://git.kernel.org/stable/p/cbbe17a324437c0ff99881a3ee453da45b228a00",
                "filename": "CVE-2024-26720-cbbe17a324437c0ff99881a3ee453da45b228a00.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-cbbe17a324437c0ff99881a3ee453da45b228a00.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ec18ec230301583395576915d274b407743d8f6c",
                "patch_url": "https://git.kernel.org/stable/p/ec18ec230301583395576915d274b407743d8f6c",
                "filename": "CVE-2024-26720-ec18ec230301583395576915d274b407743d8f6c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-ec18ec230301583395576915d274b407743d8f6c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f6620df12cb6bdcad671d269debbb23573502f9d",
                "patch_url": "https://git.kernel.org/stable/p/f6620df12cb6bdcad671d269debbb23573502f9d",
                "filename": "CVE-2024-26720-f6620df12cb6bdcad671d269debbb23573502f9d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26720/CVE-2024-26720-f6620df12cb6bdcad671d269debbb23573502f9d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/000099d71648504fb9c7a4616f92c2b70c3e44ec",
            "https://git.kernel.org/stable/c/145faa3d03688cbb7bbaaecbd84c01539852942c",
            "https://git.kernel.org/stable/c/16b1025eaa8fc223ab4273ece20d1c3a4211a95d",
            "https://git.kernel.org/stable/c/1f12e4b3284d6c863f272eb2de0d4248ed211cf4",
            "https://git.kernel.org/stable/c/23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807",
            "https://git.kernel.org/stable/c/253f9ea7e8e53a5176bd80ceb174907b10724c1a",
            "https://git.kernel.org/stable/c/2820005edae13b140f2d54267d1bd6bb23915f59",
            "https://git.kernel.org/stable/c/5099871b370335809c0fd1abad74d9c7c205d43f",
            "https://git.kernel.org/stable/c/65977bed167a92e87085e757fffa5798f7314c9f",
            "https://git.kernel.org/stable/c/81e7d2530d458548b90a5c5e76b77ad5e5d1c0df",
            "https://git.kernel.org/stable/c/9319b647902cbd5cc884ac08a8a6d54ce111fc78",
            "https://git.kernel.org/stable/c/c593d26fb5d577ef31b6e49a31e08ae3ebc1bc1e",
            "https://git.kernel.org/stable/c/cbbe17a324437c0ff99881a3ee453da45b228a00",
            "https://git.kernel.org/stable/c/ec18ec230301583395576915d274b407743d8f6c",
            "https://git.kernel.org/stable/c/f6620df12cb6bdcad671d269debbb23573502f9d",
            "https://www.cve.org/CVERecord?id=CVE-2024-26720\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26720\nhttps://lore.kernel.org/linux-cve-announce/2024040344-CVE-2024-26720-06fa@gregkh/T"
        ]
    },
    "CVE-2024-26733": {
        "cve": "CVE-2024-26733",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\narp: Prevent overflow in arp_req_get().\n\nsyzkaller reported an overflown write in arp_req_get(). [0]\n\nWhen ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour\nentry and copies neigh->ha to struct arpreq.arp_ha.sa_data.\n\nThe arp_ha here is struct sockaddr, not struct sockaddr_storage, so\nthe sa_data buffer is just 14 bytes.\n\nIn the splat below, 2 bytes are overflown to the next int field,\narp_flags.  We initialise the field just after the memcpy(), so it's\nnot a problem.\n\nHowever, when dev->addr_len is greater than 22 (e.g. MAX_ADDR_LEN),\narp_netmask is overwritten, which could be set as htonl(0xFFFFFFFFUL)\nin arp_ioctl() before calling arp_req_get().\n\nTo avoid the overflow, let's limit the max length of memcpy().\n\nNote that commit b5f0de6df6dc (\"net: dev: Convert sa_data to flexible\narray in struct sockaddr\") just silenced syzkaller.\n\n[0]:\nmemcpy: detected field-spanning write (size 16) of single field \"r->arp_ha.sa_data\" at net/ipv4/arp.c:1128 (size 14)\nWARNING: CPU: 0 PID: 144638 at net/ipv4/arp.c:1128 arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128\nModules linked in:\nCPU: 0 PID: 144638 Comm: syz-executor.4 Not tainted 6.1.74 #31\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 04/01/2014\nRIP: 0010:arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128\nCode: fd ff ff e8 41 42 de fb b9 0e 00 00 00 4c 89 fe 48 c7 c2 20 6d ab 87 48 c7 c7 80 6d ab 87 c6 05 25 af 72 04 01 e8 5f 8d ad fb <0f> 0b e9 6c fd ff ff e8 13 42 de fb be 03 00 00 00 4c 89 e7 e8 a6\nRSP: 0018:ffffc900050b7998 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff88803a815000 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffffffff8641a44a RDI: 0000000000000001\nRBP: ffffc900050b7a98 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 203a7970636d656d R12: ffff888039c54000\nR13: 1ffff92000a16f37 R14: ffff88803a815084 R15: 0000000000000010\nFS:  00007f172bf306c0(0000) GS:ffff88805aa00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f172b3569f0 CR3: 0000000057f12005 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n <TASK>\n arp_ioctl+0x33f/0x4b0 net/ipv4/arp.c:1261\n inet_ioctl+0x314/0x3a0 net/ipv4/af_inet.c:981\n sock_do_ioctl+0xdf/0x260 net/socket.c:1204\n sock_ioctl+0x3ef/0x650 net/socket.c:1321\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:870 [inline]\n __se_sys_ioctl fs/ioctl.c:856 [inline]\n __x64_sys_ioctl+0x18e/0x220 fs/ioctl.c:856\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x37/0x90 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x64/0xce\nRIP: 0033:0x7f172b262b8d\nCode: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f172bf300b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007f172b3abf80 RCX: 00007f172b262b8d\nRDX: 0000000020000000 RSI: 0000000000008954 RDI: 0000000000000003\nRBP: 00007f172b2d3493 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007f172b3abf80 R15: 00007f172bf10000\n </TASK>",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26733",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/97eaa2955db4120ce6ec2ef123e860bc32232c50",
            "patch_url": "https://git.kernel.org/stable/p/97eaa2955db4120ce6ec2ef123e860bc32232c50",
            "filename": "CVE-2024-26733-97eaa2955db4120ce6ec2ef123e860bc32232c50.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26733/CVE-2024-26733-97eaa2955db4120ce6ec2ef123e860bc32232c50.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3ab0d6f8289ba8402ca95a9fc61a34909d5e1f3a",
                "patch_url": "https://git.kernel.org/stable/p/3ab0d6f8289ba8402ca95a9fc61a34909d5e1f3a",
                "filename": "CVE-2024-26733-3ab0d6f8289ba8402ca95a9fc61a34909d5e1f3a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26733/CVE-2024-26733-3ab0d6f8289ba8402ca95a9fc61a34909d5e1f3a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/97eaa2955db4120ce6ec2ef123e860bc32232c50",
                "patch_url": "https://git.kernel.org/stable/p/97eaa2955db4120ce6ec2ef123e860bc32232c50",
                "filename": "CVE-2024-26733-97eaa2955db4120ce6ec2ef123e860bc32232c50.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26733/CVE-2024-26733-97eaa2955db4120ce6ec2ef123e860bc32232c50.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a3f2c083cb575d80a7627baf3339e78fedccbb91",
                "patch_url": "https://git.kernel.org/stable/p/a3f2c083cb575d80a7627baf3339e78fedccbb91",
                "filename": "CVE-2024-26733-a3f2c083cb575d80a7627baf3339e78fedccbb91.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26733/CVE-2024-26733-a3f2c083cb575d80a7627baf3339e78fedccbb91.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a7d6027790acea24446ddd6632d394096c0f4667",
                "patch_url": "https://git.kernel.org/stable/p/a7d6027790acea24446ddd6632d394096c0f4667",
                "filename": "CVE-2024-26733-a7d6027790acea24446ddd6632d394096c0f4667.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26733/CVE-2024-26733-a7d6027790acea24446ddd6632d394096c0f4667.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dbc9b22d0ed319b4e29034ce0a3fe32a3ee2c587",
                "patch_url": "https://git.kernel.org/stable/p/dbc9b22d0ed319b4e29034ce0a3fe32a3ee2c587",
                "filename": "CVE-2024-26733-dbc9b22d0ed319b4e29034ce0a3fe32a3ee2c587.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26733/CVE-2024-26733-dbc9b22d0ed319b4e29034ce0a3fe32a3ee2c587.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f119f2325ba70cbfdec701000dcad4d88805d5b0",
                "patch_url": "https://git.kernel.org/stable/p/f119f2325ba70cbfdec701000dcad4d88805d5b0",
                "filename": "CVE-2024-26733-f119f2325ba70cbfdec701000dcad4d88805d5b0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26733/CVE-2024-26733-f119f2325ba70cbfdec701000dcad4d88805d5b0.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3ab0d6f8289ba8402ca95a9fc61a34909d5e1f3a",
            "https://git.kernel.org/stable/c/97eaa2955db4120ce6ec2ef123e860bc32232c50",
            "https://git.kernel.org/stable/c/a3f2c083cb575d80a7627baf3339e78fedccbb91",
            "https://git.kernel.org/stable/c/a7d6027790acea24446ddd6632d394096c0f4667",
            "https://git.kernel.org/stable/c/dbc9b22d0ed319b4e29034ce0a3fe32a3ee2c587",
            "https://git.kernel.org/stable/c/f119f2325ba70cbfdec701000dcad4d88805d5b0",
            "https://www.cve.org/CVERecord?id=CVE-2024-26733\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26733\nhttps://lore.kernel.org/linux-cve-announce/2024040358-CVE-2024-26733-617f@gregkh/T"
        ]
    },
    "CVE-2024-26735": {
        "cve": "CVE-2024-26735",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix possible use-after-free and null-ptr-deref\n\nThe pernet operations structure for the subsystem must be registered\nbefore registering the generic netlink family.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26735",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/953f42934533c151f440cd32390044d2396b87aa",
            "patch_url": "https://git.kernel.org/stable/p/953f42934533c151f440cd32390044d2396b87aa",
            "filename": "CVE-2024-26735-953f42934533c151f440cd32390044d2396b87aa.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26735/CVE-2024-26735-953f42934533c151f440cd32390044d2396b87aa.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/02b08db594e8218cfbc0e4680d4331b457968a9b",
                "patch_url": "https://git.kernel.org/stable/p/02b08db594e8218cfbc0e4680d4331b457968a9b",
                "filename": "CVE-2024-26735-02b08db594e8218cfbc0e4680d4331b457968a9b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26735/CVE-2024-26735-02b08db594e8218cfbc0e4680d4331b457968a9b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5559cea2d5aa3018a5f00dd2aca3427ba09b386b",
                "patch_url": "https://git.kernel.org/stable/p/5559cea2d5aa3018a5f00dd2aca3427ba09b386b",
                "filename": "CVE-2024-26735-5559cea2d5aa3018a5f00dd2aca3427ba09b386b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26735/CVE-2024-26735-5559cea2d5aa3018a5f00dd2aca3427ba09b386b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/65c38f23d10ff79feea1e5d50b76dc7af383c1e6",
                "patch_url": "https://git.kernel.org/stable/p/65c38f23d10ff79feea1e5d50b76dc7af383c1e6",
                "filename": "CVE-2024-26735-65c38f23d10ff79feea1e5d50b76dc7af383c1e6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26735/CVE-2024-26735-65c38f23d10ff79feea1e5d50b76dc7af383c1e6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/82831e3ff76ef09fb184eb93b79a3eb3fb284f1d",
                "patch_url": "https://git.kernel.org/stable/p/82831e3ff76ef09fb184eb93b79a3eb3fb284f1d",
                "filename": "CVE-2024-26735-82831e3ff76ef09fb184eb93b79a3eb3fb284f1d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26735/CVE-2024-26735-82831e3ff76ef09fb184eb93b79a3eb3fb284f1d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8391b9b651cfdf80ab0f1dc4a489f9d67386e197",
                "patch_url": "https://git.kernel.org/stable/p/8391b9b651cfdf80ab0f1dc4a489f9d67386e197",
                "filename": "CVE-2024-26735-8391b9b651cfdf80ab0f1dc4a489f9d67386e197.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26735/CVE-2024-26735-8391b9b651cfdf80ab0f1dc4a489f9d67386e197.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/91b020aaa1e59bfb669d34c968e3db3d5416bcee",
                "patch_url": "https://git.kernel.org/stable/p/91b020aaa1e59bfb669d34c968e3db3d5416bcee",
                "filename": "CVE-2024-26735-91b020aaa1e59bfb669d34c968e3db3d5416bcee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26735/CVE-2024-26735-91b020aaa1e59bfb669d34c968e3db3d5416bcee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/953f42934533c151f440cd32390044d2396b87aa",
                "patch_url": "https://git.kernel.org/stable/p/953f42934533c151f440cd32390044d2396b87aa",
                "filename": "CVE-2024-26735-953f42934533c151f440cd32390044d2396b87aa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26735/CVE-2024-26735-953f42934533c151f440cd32390044d2396b87aa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9e02973dbc6a91e40aa4f5d87b8c47446fbfce44",
                "patch_url": "https://git.kernel.org/stable/p/9e02973dbc6a91e40aa4f5d87b8c47446fbfce44",
                "filename": "CVE-2024-26735-9e02973dbc6a91e40aa4f5d87b8c47446fbfce44.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26735/CVE-2024-26735-9e02973dbc6a91e40aa4f5d87b8c47446fbfce44.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/02b08db594e8218cfbc0e4680d4331b457968a9b",
            "https://git.kernel.org/stable/c/5559cea2d5aa3018a5f00dd2aca3427ba09b386b",
            "https://git.kernel.org/stable/c/65c38f23d10ff79feea1e5d50b76dc7af383c1e6",
            "https://git.kernel.org/stable/c/82831e3ff76ef09fb184eb93b79a3eb3fb284f1d",
            "https://git.kernel.org/stable/c/8391b9b651cfdf80ab0f1dc4a489f9d67386e197",
            "https://git.kernel.org/stable/c/91b020aaa1e59bfb669d34c968e3db3d5416bcee",
            "https://git.kernel.org/stable/c/953f42934533c151f440cd32390044d2396b87aa",
            "https://git.kernel.org/stable/c/9e02973dbc6a91e40aa4f5d87b8c47446fbfce44",
            "https://www.cve.org/CVERecord?id=CVE-2024-26735\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26735\nhttps://lore.kernel.org/linux-cve-announce/2024040359-CVE-2024-26735-462f@gregkh/T"
        ]
    },
    "CVE-2024-26740": {
        "cve": "CVE-2024-26740",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_mirred: use the backlog for mirred ingress\n\nThe test Davide added in commit ca22da2fbd69 (\"act_mirred: use the backlog\nfor nested calls to mirred ingress\") hangs our testing VMs every 10 or so\nruns, with the familiar tcp_v4_rcv -> tcp_v4_rcv deadlock reported by\nlockdep.\n\nThe problem as previously described by Davide (see Link) is that\nif we reverse flow of traffic with the redirect (egress -> ingress)\nwe may reach the same socket which generated the packet. And we may\nstill be holding its socket lock. The common solution to such deadlocks\nis to put the packet in the Rx backlog, rather than run the Rx path\ninline. Do that for all egress -> ingress reversals, not just once\nwe started to nest mirred calls.\n\nIn the past there was a concern that the backlog indirection will\nlead to loss of error reporting / less accurate stats. But the current\nworkaround does not seem to address the issue.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26740",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/52f671db18823089a02f07efc04efdb2272ddc17",
            "patch_url": "https://git.kernel.org/stable/p/52f671db18823089a02f07efc04efdb2272ddc17",
            "filename": "CVE-2024-26740-52f671db18823089a02f07efc04efdb2272ddc17.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26740/CVE-2024-26740-52f671db18823089a02f07efc04efdb2272ddc17.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/52f671db18823089a02f07efc04efdb2272ddc17",
                "patch_url": "https://git.kernel.org/stable/p/52f671db18823089a02f07efc04efdb2272ddc17",
                "filename": "CVE-2024-26740-52f671db18823089a02f07efc04efdb2272ddc17.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26740/CVE-2024-26740-52f671db18823089a02f07efc04efdb2272ddc17.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/60ddea1600bc476e0f5e02bce0e29a460ccbf0be",
                "patch_url": "https://git.kernel.org/stable/p/60ddea1600bc476e0f5e02bce0e29a460ccbf0be",
                "filename": "CVE-2024-26740-60ddea1600bc476e0f5e02bce0e29a460ccbf0be.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26740/CVE-2024-26740-60ddea1600bc476e0f5e02bce0e29a460ccbf0be.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7c787888d164689da8b1b115f3ef562c1e843af4",
                "patch_url": "https://git.kernel.org/stable/p/7c787888d164689da8b1b115f3ef562c1e843af4",
                "filename": "CVE-2024-26740-7c787888d164689da8b1b115f3ef562c1e843af4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26740/CVE-2024-26740-7c787888d164689da8b1b115f3ef562c1e843af4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/52f671db18823089a02f07efc04efdb2272ddc17",
            "https://git.kernel.org/stable/c/60ddea1600bc476e0f5e02bce0e29a460ccbf0be",
            "https://git.kernel.org/stable/c/7c787888d164689da8b1b115f3ef562c1e843af4",
            "https://www.cve.org/CVERecord?id=CVE-2024-26740\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26740\nhttps://lore.kernel.org/linux-cve-announce/2024040300-CVE-2024-26740-4d6f@gregkh/T"
        ]
    },
    "CVE-2024-26743": {
        "cve": "CVE-2024-26743",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/qedr: Fix qedr_create_user_qp error flow\n\nAvoid the following warning by making sure to free the allocated\nresources in case that qedr_init_user_queue() fail.\n\n-----------[ cut here ]-----------\nWARNING: CPU: 0 PID: 143192 at drivers/infiniband/core/rdma_core.c:874 uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\nModules linked in: tls target_core_user uio target_core_pscsi target_core_file target_core_iblock ib_srpt ib_srp scsi_transport_srp nfsd nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs 8021q garp mrp stp llc ext4 mbcache jbd2 opa_vnic ib_umad ib_ipoib sunrpc rdma_ucm ib_isert iscsi_target_mod target_core_mod ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_cm hfi1 intel_rapl_msr intel_rapl_common mgag200 qedr sb_edac drm_shmem_helper rdmavt x86_pkg_temp_thermal drm_kms_helper intel_powerclamp ib_uverbs coretemp i2c_algo_bit kvm_intel dell_wmi_descriptor ipmi_ssif sparse_keymap kvm ib_core rfkill syscopyarea sysfillrect video sysimgblt irqbypass ipmi_si ipmi_devintf fb_sys_fops rapl iTCO_wdt mxm_wmi iTCO_vendor_support intel_cstate pcspkr dcdbas intel_uncore ipmi_msghandler lpc_ich acpi_power_meter mei_me mei fuse drm xfs libcrc32c qede sd_mod ahci libahci t10_pi sg crct10dif_pclmul crc32_pclmul crc32c_intel qed libata tg3\nghash_clmulni_intel megaraid_sas crc8 wmi [last unloaded: ib_srpt]\nCPU: 0 PID: 143192 Comm: fi_rdm_tagged_p Kdump: loaded Not tainted 5.14.0-408.el9.x86_64 #1\nHardware name: Dell Inc. PowerEdge R430/03XKDV, BIOS 2.14.0 01/25/2022\nRIP: 0010:uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\nCode: 5d 41 5c 41 5d 41 5e e9 0f 26 1b dd 48 89 df e8 67 6a ff ff 49 8b 86 10 01 00 00 48 85 c0 74 9c 4c 89 e7 e8 83 c0 cb dd eb 92 <0f> 0b eb be 0f 0b be 04 00 00 00 48 89 df e8 8e f5 ff ff e9 6d ff\nRSP: 0018:ffffb7c6cadfbc60 EFLAGS: 00010286\nRAX: ffff8f0889ee3f60 RBX: ffff8f088c1a5200 RCX: 00000000802a0016\nRDX: 00000000802a0017 RSI: 0000000000000001 RDI: ffff8f0880042600\nRBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000\nR10: ffff8f11fffd5000 R11: 0000000000039000 R12: ffff8f0d5b36cd80\nR13: ffff8f088c1a5250 R14: ffff8f1206d91000 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffff8f11d7c00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000147069200e20 CR3: 00000001c7210002 CR4: 00000000001706f0\nCall Trace:\n<TASK>\n? show_trace_log_lvl+0x1c4/0x2df\n? show_trace_log_lvl+0x1c4/0x2df\n? ib_uverbs_close+0x1f/0xb0 [ib_uverbs]\n? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\n? __warn+0x81/0x110\n? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\n? report_bug+0x10a/0x140\n? handle_bug+0x3c/0x70\n? exc_invalid_op+0x14/0x70\n? asm_exc_invalid_op+0x16/0x20\n? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]\nib_uverbs_close+0x1f/0xb0 [ib_uverbs]\n__fput+0x94/0x250\ntask_work_run+0x5c/0x90\ndo_exit+0x270/0x4a0\ndo_group_exit+0x2d/0x90\nget_signal+0x87c/0x8c0\narch_do_signal_or_restart+0x25/0x100\n? ib_uverbs_ioctl+0xc2/0x110 [ib_uverbs]\nexit_to_user_mode_loop+0x9c/0x130\nexit_to_user_mode_prepare+0xb6/0x100\nsyscall_exit_to_user_mode+0x12/0x40\ndo_syscall_64+0x69/0x90\n? syscall_exit_work+0x103/0x130\n? syscall_exit_to_user_mode+0x22/0x40\n? do_syscall_64+0x69/0x90\n? syscall_exit_work+0x103/0x130\n? syscall_exit_to_user_mode+0x22/0x40\n? do_syscall_64+0x69/0x90\n? do_syscall_64+0x69/0x90\n? common_interrupt+0x43/0xa0\nentry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x1470abe3ec6b\nCode: Unable to access opcode bytes at RIP 0x1470abe3ec41.\nRSP: 002b:00007fff13ce9108 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: fffffffffffffffc RBX: 00007fff13ce9218 RCX: 00001470abe3ec6b\nRDX: 00007fff13ce9200 RSI: 00000000c0181b01 RDI: 0000000000000004\nRBP: 00007fff13ce91e0 R08: 0000558d9655da10 R09: 0000558d9655dd00\nR10: 00007fff13ce95c0 R11: 0000000000000246 R12: 00007fff13ce9358\nR13: 0000000000000013 R14: 0000558d9655db50 R15: 00007fff13ce9470\n</TASK>\n--[ end trace 888a9b92e04c5c97 ]--",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26743",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/5ba4e6d5863c53e937f49932dee0ecb004c65928",
            "patch_url": "https://git.kernel.org/stable/p/5ba4e6d5863c53e937f49932dee0ecb004c65928",
            "filename": "CVE-2024-26743-5ba4e6d5863c53e937f49932dee0ecb004c65928.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26743/CVE-2024-26743-5ba4e6d5863c53e937f49932dee0ecb004c65928.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/135e5465fefa463c5ec93c4eede48b9fedac894a",
                "patch_url": "https://git.kernel.org/stable/p/135e5465fefa463c5ec93c4eede48b9fedac894a",
                "filename": "CVE-2024-26743-135e5465fefa463c5ec93c4eede48b9fedac894a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26743/CVE-2024-26743-135e5465fefa463c5ec93c4eede48b9fedac894a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5639414a52a29336ffa1ede80a67c6d927acbc5a",
                "patch_url": "https://git.kernel.org/stable/p/5639414a52a29336ffa1ede80a67c6d927acbc5a",
                "filename": "CVE-2024-26743-5639414a52a29336ffa1ede80a67c6d927acbc5a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26743/CVE-2024-26743-5639414a52a29336ffa1ede80a67c6d927acbc5a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5ba4e6d5863c53e937f49932dee0ecb004c65928",
                "patch_url": "https://git.kernel.org/stable/p/5ba4e6d5863c53e937f49932dee0ecb004c65928",
                "filename": "CVE-2024-26743-5ba4e6d5863c53e937f49932dee0ecb004c65928.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26743/CVE-2024-26743-5ba4e6d5863c53e937f49932dee0ecb004c65928.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7f31a244c753aacf40b71d01f03ca6742f81bbbc",
                "patch_url": "https://git.kernel.org/stable/p/7f31a244c753aacf40b71d01f03ca6742f81bbbc",
                "filename": "CVE-2024-26743-7f31a244c753aacf40b71d01f03ca6742f81bbbc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26743/CVE-2024-26743-7f31a244c753aacf40b71d01f03ca6742f81bbbc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/95175dda017cd4982cd47960536fa1de003d3298",
                "patch_url": "https://git.kernel.org/stable/p/95175dda017cd4982cd47960536fa1de003d3298",
                "filename": "CVE-2024-26743-95175dda017cd4982cd47960536fa1de003d3298.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26743/CVE-2024-26743-95175dda017cd4982cd47960536fa1de003d3298.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bab8875c06ebda5e01c5c4cab30022aed85c14e6",
                "patch_url": "https://git.kernel.org/stable/p/bab8875c06ebda5e01c5c4cab30022aed85c14e6",
                "filename": "CVE-2024-26743-bab8875c06ebda5e01c5c4cab30022aed85c14e6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26743/CVE-2024-26743-bab8875c06ebda5e01c5c4cab30022aed85c14e6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/135e5465fefa463c5ec93c4eede48b9fedac894a",
            "https://git.kernel.org/stable/c/5639414a52a29336ffa1ede80a67c6d927acbc5a",
            "https://git.kernel.org/stable/c/5ba4e6d5863c53e937f49932dee0ecb004c65928",
            "https://git.kernel.org/stable/c/7f31a244c753aacf40b71d01f03ca6742f81bbbc",
            "https://git.kernel.org/stable/c/95175dda017cd4982cd47960536fa1de003d3298",
            "https://git.kernel.org/stable/c/bab8875c06ebda5e01c5c4cab30022aed85c14e6",
            "https://www.cve.org/CVERecord?id=CVE-2024-26743\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26743\nhttps://lore.kernel.org/linux-cve-announce/2024040301-CVE-2024-26743-6034@gregkh/T"
        ]
    },
    "CVE-2024-26744": {
        "cve": "CVE-2024-26744",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Support specifying the srpt_service_guid parameter\n\nMake loading ib_srpt with this parameter set work. The current behavior is\nthat setting that parameter while loading the ib_srpt kernel module\ntriggers the following kernel crash:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nCall Trace:\n <TASK>\n parse_one+0x18c/0x1d0\n parse_args+0xe1/0x230\n load_module+0x8de/0xa60\n init_module_from_file+0x8b/0xd0\n idempotent_init_module+0x181/0x240\n __x64_sys_finit_module+0x5a/0xb0\n do_syscall_64+0x5f/0xe0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26744",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82",
            "patch_url": "https://git.kernel.org/stable/p/5a5c039dac1b1b7ba3e91c791f4421052bf79b82",
            "filename": "CVE-2024-26744-5a5c039dac1b1b7ba3e91c791f4421052bf79b82.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26744/CVE-2024-26744-5a5c039dac1b1b7ba3e91c791f4421052bf79b82.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82",
                "patch_url": "https://git.kernel.org/stable/p/5a5c039dac1b1b7ba3e91c791f4421052bf79b82",
                "filename": "CVE-2024-26744-5a5c039dac1b1b7ba3e91c791f4421052bf79b82.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26744/CVE-2024-26744-5a5c039dac1b1b7ba3e91c791f4421052bf79b82.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/84f1dac960cfa210a3b7a7522e6c2320ae91932b",
                "patch_url": "https://git.kernel.org/stable/p/84f1dac960cfa210a3b7a7522e6c2320ae91932b",
                "filename": "CVE-2024-26744-84f1dac960cfa210a3b7a7522e6c2320ae91932b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26744/CVE-2024-26744-84f1dac960cfa210a3b7a7522e6c2320ae91932b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/989af2f29342a9a7c7515523d879b698ac8465f4",
                "patch_url": "https://git.kernel.org/stable/p/989af2f29342a9a7c7515523d879b698ac8465f4",
                "filename": "CVE-2024-26744-989af2f29342a9a7c7515523d879b698ac8465f4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26744/CVE-2024-26744-989af2f29342a9a7c7515523d879b698ac8465f4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aee4dcfe17219fe60f2821923adea98549060af8",
                "patch_url": "https://git.kernel.org/stable/p/aee4dcfe17219fe60f2821923adea98549060af8",
                "filename": "CVE-2024-26744-aee4dcfe17219fe60f2821923adea98549060af8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26744/CVE-2024-26744-aee4dcfe17219fe60f2821923adea98549060af8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c99a827d3cff9f84e1cb997b7cc6386d107aa74d",
                "patch_url": "https://git.kernel.org/stable/p/c99a827d3cff9f84e1cb997b7cc6386d107aa74d",
                "filename": "CVE-2024-26744-c99a827d3cff9f84e1cb997b7cc6386d107aa74d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26744/CVE-2024-26744-c99a827d3cff9f84e1cb997b7cc6386d107aa74d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e0055d6461b36bfc25a9d2ab974eef78d36a6738",
                "patch_url": "https://git.kernel.org/stable/p/e0055d6461b36bfc25a9d2ab974eef78d36a6738",
                "filename": "CVE-2024-26744-e0055d6461b36bfc25a9d2ab974eef78d36a6738.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26744/CVE-2024-26744-e0055d6461b36bfc25a9d2ab974eef78d36a6738.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fdfa083549de5d50ebf7f6811f33757781e838c0",
                "patch_url": "https://git.kernel.org/stable/p/fdfa083549de5d50ebf7f6811f33757781e838c0",
                "filename": "CVE-2024-26744-fdfa083549de5d50ebf7f6811f33757781e838c0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26744/CVE-2024-26744-fdfa083549de5d50ebf7f6811f33757781e838c0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fe2a73d57319feab4b3b175945671ce43492172f",
                "patch_url": "https://git.kernel.org/stable/p/fe2a73d57319feab4b3b175945671ce43492172f",
                "filename": "CVE-2024-26744-fe2a73d57319feab4b3b175945671ce43492172f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26744/CVE-2024-26744-fe2a73d57319feab4b3b175945671ce43492172f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82",
            "https://git.kernel.org/stable/c/84f1dac960cfa210a3b7a7522e6c2320ae91932b",
            "https://git.kernel.org/stable/c/989af2f29342a9a7c7515523d879b698ac8465f4",
            "https://git.kernel.org/stable/c/aee4dcfe17219fe60f2821923adea98549060af8",
            "https://git.kernel.org/stable/c/c99a827d3cff9f84e1cb997b7cc6386d107aa74d",
            "https://git.kernel.org/stable/c/e0055d6461b36bfc25a9d2ab974eef78d36a6738",
            "https://git.kernel.org/stable/c/fdfa083549de5d50ebf7f6811f33757781e838c0",
            "https://git.kernel.org/stable/c/fe2a73d57319feab4b3b175945671ce43492172f",
            "https://www.cve.org/CVERecord?id=CVE-2024-26744\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26744\nhttps://lore.kernel.org/linux-cve-announce/2024040301-CVE-2024-26744-d344@gregkh/T"
        ]
    },
    "CVE-2024-26759": {
        "cve": "CVE-2024-26759",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/swap: fix race when skipping swapcache\n\nWhen skipping swapcache for SWP_SYNCHRONOUS_IO, if two or more threads\nswapin the same entry at the same time, they get different pages (A, B). \nBefore one thread (T0) finishes the swapin and installs page (A) to the\nPTE, another thread (T1) could finish swapin of page (B), swap_free the\nentry, then swap out the possibly modified page reusing the same entry. \nIt breaks the pte_same check in (T0) because PTE value is unchanged,\ncausing ABA problem.  Thread (T0) will install a stalled page (A) into the\nPTE and cause data corruption.\n\nOne possible callstack is like this:\n\nCPU0                                 CPU1\n----                                 ----\ndo_swap_page()                       do_swap_page() with same entry\n<direct swapin path>                 <direct swapin path>\n<alloc page A>                       <alloc page B>\nswap_read_folio() <- read to page A  swap_read_folio() <- read to page B\n<slow on later locks or interrupt>   <finished swapin first>\n...                                  set_pte_at()\n                                     swap_free() <- entry is free\n                                     <write to page B, now page A stalled>\n                                     <swap out page B to same swap entry>\npte_same() <- Check pass, PTE seems\n              unchanged, but page A\n              is stalled!\nswap_free() <- page B content lost!\nset_pte_at() <- staled page A installed!\n\nAnd besides, for ZRAM, swap_free() allows the swap device to discard the\nentry content, so even if page (B) is not modified, if swap_read_folio()\non CPU0 happens later than swap_free() on CPU1, it may also cause data\nloss.\n\nTo fix this, reuse swapcache_prepare which will pin the swap entry using\nthe cache flag, and allow only one thread to swap it in, also prevent any\nparallel code from putting the entry in the cache.  Release the pin after\nPT unlocked.\n\nRacers just loop and wait since it's a rare and very short event.  A\nschedule_timeout_uninterruptible(1) call is added to avoid repeated page\nfaults wasting too much CPU, causing livelock or adding too much noise to\nperf statistics.  A similar livelock issue was described in commit\n029c4628b2eb (\"mm: swap: get rid of livelock in swapin readahead\")\n\nReproducer:\n\nThis race issue can be triggered easily using a well constructed\nreproducer and patched brd (with a delay in read path) [1]:\n\nWith latest 6.8 mainline, race caused data loss can be observed easily:\n$ gcc -g -lpthread test-thread-swap-race.c && ./a.out\n  Polulating 32MB of memory region...\n  Keep swapping out...\n  Starting round 0...\n  Spawning 65536 workers...\n  32746 workers spawned, wait for done...\n  Round 0: Error on 0x5aa00, expected 32746, got 32743, 3 data loss!\n  Round 0: Error on 0x395200, expected 32746, got 32743, 3 data loss!\n  Round 0: Error on 0x3fd000, expected 32746, got 32737, 9 data loss!\n  Round 0 Failed, 15 data loss!\n\nThis reproducer spawns multiple threads sharing the same memory region\nusing a small swap device.  Every two threads updates mapped pages one by\none in opposite direction trying to create a race, with one dedicated\nthread keep swapping out the data out using madvise.\n\nThe reproducer created a reproduce rate of about once every 5 minutes, so\nthe race should be totally possible in production.\n\nAfter this patch, I ran the reproducer for over a few hundred rounds and\nno data loss observed.\n\nPerformance overhead is minimal, microbenchmark swapin 10G from 32G\nzram:\n\nBefore:     10934698 us\nAfter:      11157121 us\nCached:     13155355 us (Dropping SWP_SYNCHRONOUS_IO flag)\n\n[kasong@tencent.com: v4]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26759",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/13ddaf26be324a7f951891ecd9ccd04466d27458",
            "patch_url": "https://git.kernel.org/stable/p/13ddaf26be324a7f951891ecd9ccd04466d27458",
            "filename": "CVE-2024-26759-13ddaf26be324a7f951891ecd9ccd04466d27458.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26759/CVE-2024-26759-13ddaf26be324a7f951891ecd9ccd04466d27458.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/13ddaf26be324a7f951891ecd9ccd04466d27458",
                "patch_url": "https://git.kernel.org/stable/p/13ddaf26be324a7f951891ecd9ccd04466d27458",
                "filename": "CVE-2024-26759-13ddaf26be324a7f951891ecd9ccd04466d27458.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26759/CVE-2024-26759-13ddaf26be324a7f951891ecd9ccd04466d27458.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2dedda77d4493f3e92e414b272bfa60f1f51ed95",
                "patch_url": "https://git.kernel.org/stable/p/2dedda77d4493f3e92e414b272bfa60f1f51ed95",
                "filename": "CVE-2024-26759-2dedda77d4493f3e92e414b272bfa60f1f51ed95.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26759/CVE-2024-26759-2dedda77d4493f3e92e414b272bfa60f1f51ed95.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/305152314df82b22cf9b181f3dc5fc411002079a",
                "patch_url": "https://git.kernel.org/stable/p/305152314df82b22cf9b181f3dc5fc411002079a",
                "filename": "CVE-2024-26759-305152314df82b22cf9b181f3dc5fc411002079a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26759/CVE-2024-26759-305152314df82b22cf9b181f3dc5fc411002079a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d183a4631acfc7af955c02a02e739cec15f5234d",
                "patch_url": "https://git.kernel.org/stable/p/d183a4631acfc7af955c02a02e739cec15f5234d",
                "filename": "CVE-2024-26759-d183a4631acfc7af955c02a02e739cec15f5234d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26759/CVE-2024-26759-d183a4631acfc7af955c02a02e739cec15f5234d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/13ddaf26be324a7f951891ecd9ccd04466d27458",
            "https://git.kernel.org/stable/c/2dedda77d4493f3e92e414b272bfa60f1f51ed95",
            "https://git.kernel.org/stable/c/305152314df82b22cf9b181f3dc5fc411002079a",
            "https://git.kernel.org/stable/c/d183a4631acfc7af955c02a02e739cec15f5234d",
            "https://lkml.kernel.org/r/",
            "https://www.cve.org/CVERecord?id=CVE-2024-26759\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26759\nhttps://lore.kernel.org/linux-cve-announce/2024040304-CVE-2024-26759-45f1@gregkh/T"
        ]
    },
    "CVE-2024-26766": {
        "cve": "CVE-2024-26766",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix sdma.h tx->num_descs off-by-one error\n\nUnfortunately the commit `fd8958efe877` introduced another error\ncausing the `descs` array to overflow. This reults in further crashes\neasily reproducible by `sendmsg` system call.\n\n[ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI\n[ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1]\n--\n[ 1080.974535] Call Trace:\n[ 1080.976990]  <TASK>\n[ 1081.021929]  hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1]\n[ 1081.027364]  hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1]\n[ 1081.032633]  hfi1_ipoib_send+0x112/0x300 [hfi1]\n[ 1081.042001]  ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib]\n[ 1081.046978]  dev_hard_start_xmit+0xc4/0x210\n--\n[ 1081.148347]  __sys_sendmsg+0x59/0xa0\n\ncrash> ipoib_txreq 0xffff9cfeba229f00\nstruct ipoib_txreq {\n  txreq = {\n    list = {\n      next = 0xffff9cfeba229f00,\n      prev = 0xffff9cfeba229f00\n    },\n    descp = 0xffff9cfeba229f40,\n    coalesce_buf = 0x0,\n    wait = 0xffff9cfea4e69a48,\n    complete = 0xffffffffc0fe0760 <hfi1_ipoib_sdma_complete>,\n    packet_len = 0x46d,\n    tlen = 0x0,\n    num_desc = 0x0,\n    desc_limit = 0x6,\n    next_descq_idx = 0x45c,\n    coalesce_idx = 0x0,\n    flags = 0x0,\n    descs = {{\n        qw = {0x8024000120dffb00, 0x4}  # SDMA_DESC0_FIRST_DESC_FLAG (bit 63)\n      }, {\n        qw = {  0x3800014231b108, 0x4}\n      }, {\n        qw = { 0x310000e4ee0fcf0, 0x8}\n      }, {\n        qw = {  0x3000012e9f8000, 0x8}\n      }, {\n        qw = {  0x59000dfb9d0000, 0x8}\n      }, {\n        qw = {  0x78000e02e40000, 0x8}\n      }}\n  },\n  sdma_hdr =  0x400300015528b000,  <<< invalid pointer in the tx request structure\n  sdma_status = 0x0,                   SDMA_DESC0_LAST_DESC_FLAG (bit 62)\n  complete = 0x0,\n  priv = 0x0,\n  txq = 0xffff9cfea4e69880,\n  skb = 0xffff9d099809f400\n}\n\nIf an SDMA send consists of exactly 6 descriptors and requires dword\npadding (in the 7th descriptor), the sdma_txreq descriptor array is not\nproperly expanded and the packet will overflow into the container\nstructure. This results in a panic when the send completion runs. The\nexact panic varies depending on what elements of the container structure\nget corrupted. The fix is to use the correct expression in\n_pad_sdma_tx_descs() to test the need to expand the descriptor array.\n\nWith this patch the crashes are no longer reproducible and the machine is\nstable.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26766",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/115b7f3bc1dce590a6851a2dcf23dc1100c49790",
            "patch_url": "https://git.kernel.org/stable/p/115b7f3bc1dce590a6851a2dcf23dc1100c49790",
            "filename": "CVE-2024-26766-115b7f3bc1dce590a6851a2dcf23dc1100c49790.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26766/CVE-2024-26766-115b7f3bc1dce590a6851a2dcf23dc1100c49790.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/115b7f3bc1dce590a6851a2dcf23dc1100c49790",
                "patch_url": "https://git.kernel.org/stable/p/115b7f3bc1dce590a6851a2dcf23dc1100c49790",
                "filename": "CVE-2024-26766-115b7f3bc1dce590a6851a2dcf23dc1100c49790.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26766/CVE-2024-26766-115b7f3bc1dce590a6851a2dcf23dc1100c49790.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3f38d22e645e2e994979426ea5a35186102ff3c2",
                "patch_url": "https://git.kernel.org/stable/p/3f38d22e645e2e994979426ea5a35186102ff3c2",
                "filename": "CVE-2024-26766-3f38d22e645e2e994979426ea5a35186102ff3c2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26766/CVE-2024-26766-3f38d22e645e2e994979426ea5a35186102ff3c2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/47ae64df23ed1318e27bd9844e135a5e1c0e6e39",
                "patch_url": "https://git.kernel.org/stable/p/47ae64df23ed1318e27bd9844e135a5e1c0e6e39",
                "filename": "CVE-2024-26766-47ae64df23ed1318e27bd9844e135a5e1c0e6e39.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26766/CVE-2024-26766-47ae64df23ed1318e27bd9844e135a5e1c0e6e39.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/52dc9a7a573dbf778625a0efca0fca55489f084b",
                "patch_url": "https://git.kernel.org/stable/p/52dc9a7a573dbf778625a0efca0fca55489f084b",
                "filename": "CVE-2024-26766-52dc9a7a573dbf778625a0efca0fca55489f084b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26766/CVE-2024-26766-52dc9a7a573dbf778625a0efca0fca55489f084b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5833024a9856f454a964a198c63a57e59e07baf5",
                "patch_url": "https://git.kernel.org/stable/p/5833024a9856f454a964a198c63a57e59e07baf5",
                "filename": "CVE-2024-26766-5833024a9856f454a964a198c63a57e59e07baf5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26766/CVE-2024-26766-5833024a9856f454a964a198c63a57e59e07baf5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9034a1bec35e9f725315a3bb6002ef39666114d9",
                "patch_url": "https://git.kernel.org/stable/p/9034a1bec35e9f725315a3bb6002ef39666114d9",
                "filename": "CVE-2024-26766-9034a1bec35e9f725315a3bb6002ef39666114d9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26766/CVE-2024-26766-9034a1bec35e9f725315a3bb6002ef39666114d9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a2fef1d81becf4ff60e1a249477464eae3c3bc2a",
                "patch_url": "https://git.kernel.org/stable/p/a2fef1d81becf4ff60e1a249477464eae3c3bc2a",
                "filename": "CVE-2024-26766-a2fef1d81becf4ff60e1a249477464eae3c3bc2a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26766/CVE-2024-26766-a2fef1d81becf4ff60e1a249477464eae3c3bc2a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e6f57c6881916df39db7d95981a8ad2b9c3458d6",
                "patch_url": "https://git.kernel.org/stable/p/e6f57c6881916df39db7d95981a8ad2b9c3458d6",
                "filename": "CVE-2024-26766-e6f57c6881916df39db7d95981a8ad2b9c3458d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26766/CVE-2024-26766-e6f57c6881916df39db7d95981a8ad2b9c3458d6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/115b7f3bc1dce590a6851a2dcf23dc1100c49790",
            "https://git.kernel.org/stable/c/3f38d22e645e2e994979426ea5a35186102ff3c2",
            "https://git.kernel.org/stable/c/47ae64df23ed1318e27bd9844e135a5e1c0e6e39",
            "https://git.kernel.org/stable/c/52dc9a7a573dbf778625a0efca0fca55489f084b",
            "https://git.kernel.org/stable/c/5833024a9856f454a964a198c63a57e59e07baf5",
            "https://git.kernel.org/stable/c/9034a1bec35e9f725315a3bb6002ef39666114d9",
            "https://git.kernel.org/stable/c/a2fef1d81becf4ff60e1a249477464eae3c3bc2a",
            "https://git.kernel.org/stable/c/e6f57c6881916df39db7d95981a8ad2b9c3458d6",
            "https://www.cve.org/CVERecord?id=CVE-2024-26766\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26766\nhttps://lore.kernel.org/linux-cve-announce/2024040306-CVE-2024-26766-6b6a@gregkh/T"
        ]
    },
    "CVE-2024-26769": {
        "cve": "CVE-2024-26769",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: avoid deadlock on delete association path\n\nWhen deleting an association the shutdown path is deadlocking because we\ntry to flush the nvmet_wq nested. Avoid this by deadlock by deferring\nthe put work into its own work item.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26769",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1d86f79287206deec36d63b89c741cf542b6cadd",
            "patch_url": "https://git.kernel.org/stable/p/1d86f79287206deec36d63b89c741cf542b6cadd",
            "filename": "CVE-2024-26769-1d86f79287206deec36d63b89c741cf542b6cadd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26769/CVE-2024-26769-1d86f79287206deec36d63b89c741cf542b6cadd.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1d86f79287206deec36d63b89c741cf542b6cadd",
                "patch_url": "https://git.kernel.org/stable/p/1d86f79287206deec36d63b89c741cf542b6cadd",
                "filename": "CVE-2024-26769-1d86f79287206deec36d63b89c741cf542b6cadd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26769/CVE-2024-26769-1d86f79287206deec36d63b89c741cf542b6cadd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5e0bc09a52b6169ce90f7ac6e195791adb16cec4",
                "patch_url": "https://git.kernel.org/stable/p/5e0bc09a52b6169ce90f7ac6e195791adb16cec4",
                "filename": "CVE-2024-26769-5e0bc09a52b6169ce90f7ac6e195791adb16cec4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26769/CVE-2024-26769-5e0bc09a52b6169ce90f7ac6e195791adb16cec4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/710c69dbaccdac312e32931abcb8499c1525d397",
                "patch_url": "https://git.kernel.org/stable/p/710c69dbaccdac312e32931abcb8499c1525d397",
                "filename": "CVE-2024-26769-710c69dbaccdac312e32931abcb8499c1525d397.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26769/CVE-2024-26769-710c69dbaccdac312e32931abcb8499c1525d397.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9e6987f8937a7bd7516aa52f25cb7e12c0c92ee8",
                "patch_url": "https://git.kernel.org/stable/p/9e6987f8937a7bd7516aa52f25cb7e12c0c92ee8",
                "filename": "CVE-2024-26769-9e6987f8937a7bd7516aa52f25cb7e12c0c92ee8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26769/CVE-2024-26769-9e6987f8937a7bd7516aa52f25cb7e12c0c92ee8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eaf0971fdabf2a93c1429dc6bedf3bbe85dffa30",
                "patch_url": "https://git.kernel.org/stable/p/eaf0971fdabf2a93c1429dc6bedf3bbe85dffa30",
                "filename": "CVE-2024-26769-eaf0971fdabf2a93c1429dc6bedf3bbe85dffa30.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26769/CVE-2024-26769-eaf0971fdabf2a93c1429dc6bedf3bbe85dffa30.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1d86f79287206deec36d63b89c741cf542b6cadd",
            "https://git.kernel.org/stable/c/5e0bc09a52b6169ce90f7ac6e195791adb16cec4",
            "https://git.kernel.org/stable/c/710c69dbaccdac312e32931abcb8499c1525d397",
            "https://git.kernel.org/stable/c/9e6987f8937a7bd7516aa52f25cb7e12c0c92ee8",
            "https://git.kernel.org/stable/c/eaf0971fdabf2a93c1429dc6bedf3bbe85dffa30",
            "https://www.cve.org/CVERecord?id=CVE-2024-26769\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26769\nhttps://lore.kernel.org/linux-cve-announce/2024040307-CVE-2024-26769-e9cc@gregkh/T"
        ]
    },
    "CVE-2024-26772": {
        "cve": "CVE-2024-26772",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()\n\nPlaces the logic for checking if the group's block bitmap is corrupt under\nthe protection of the group lock to avoid allocating blocks from the group\nwith a corrupted block bitmap.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26772",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ffeb72a80a82aba59a6774b0611f792e0ed3b0b7",
            "patch_url": "https://git.kernel.org/stable/p/ffeb72a80a82aba59a6774b0611f792e0ed3b0b7",
            "filename": "CVE-2024-26772-ffeb72a80a82aba59a6774b0611f792e0ed3b0b7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26772/CVE-2024-26772-ffeb72a80a82aba59a6774b0611f792e0ed3b0b7.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/21dbe20589c7f48e9c5d336ce6402bcebfa6d76a",
                "patch_url": "https://git.kernel.org/stable/p/21dbe20589c7f48e9c5d336ce6402bcebfa6d76a",
                "filename": "CVE-2024-26772-21dbe20589c7f48e9c5d336ce6402bcebfa6d76a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26772/CVE-2024-26772-21dbe20589c7f48e9c5d336ce6402bcebfa6d76a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43",
                "patch_url": "https://git.kernel.org/stable/p/5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43",
                "filename": "CVE-2024-26772-5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26772/CVE-2024-26772-5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6b92b1bc16d691c95b152c6dbf027ad64315668d",
                "patch_url": "https://git.kernel.org/stable/p/6b92b1bc16d691c95b152c6dbf027ad64315668d",
                "filename": "CVE-2024-26772-6b92b1bc16d691c95b152c6dbf027ad64315668d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26772/CVE-2024-26772-6b92b1bc16d691c95b152c6dbf027ad64315668d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/832698373a25950942c04a512daa652c18a9b513",
                "patch_url": "https://git.kernel.org/stable/p/832698373a25950942c04a512daa652c18a9b513",
                "filename": "CVE-2024-26772-832698373a25950942c04a512daa652c18a9b513.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26772/CVE-2024-26772-832698373a25950942c04a512daa652c18a9b513.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8de8305a25bfda607fc13475ebe84b978c96d7ff",
                "patch_url": "https://git.kernel.org/stable/p/8de8305a25bfda607fc13475ebe84b978c96d7ff",
                "filename": "CVE-2024-26772-8de8305a25bfda607fc13475ebe84b978c96d7ff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26772/CVE-2024-26772-8de8305a25bfda607fc13475ebe84b978c96d7ff.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d3bbe77a76bc52e9d4d0a120f1509be36e25c916",
                "patch_url": "https://git.kernel.org/stable/p/d3bbe77a76bc52e9d4d0a120f1509be36e25c916",
                "filename": "CVE-2024-26772-d3bbe77a76bc52e9d4d0a120f1509be36e25c916.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26772/CVE-2024-26772-d3bbe77a76bc52e9d4d0a120f1509be36e25c916.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d639102f4cbd4cb65d1225dba3b9265596aab586",
                "patch_url": "https://git.kernel.org/stable/p/d639102f4cbd4cb65d1225dba3b9265596aab586",
                "filename": "CVE-2024-26772-d639102f4cbd4cb65d1225dba3b9265596aab586.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26772/CVE-2024-26772-d639102f4cbd4cb65d1225dba3b9265596aab586.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ffeb72a80a82aba59a6774b0611f792e0ed3b0b7",
                "patch_url": "https://git.kernel.org/stable/p/ffeb72a80a82aba59a6774b0611f792e0ed3b0b7",
                "filename": "CVE-2024-26772-ffeb72a80a82aba59a6774b0611f792e0ed3b0b7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26772/CVE-2024-26772-ffeb72a80a82aba59a6774b0611f792e0ed3b0b7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/21dbe20589c7f48e9c5d336ce6402bcebfa6d76a",
            "https://git.kernel.org/stable/c/5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43",
            "https://git.kernel.org/stable/c/6b92b1bc16d691c95b152c6dbf027ad64315668d",
            "https://git.kernel.org/stable/c/832698373a25950942c04a512daa652c18a9b513",
            "https://git.kernel.org/stable/c/8de8305a25bfda607fc13475ebe84b978c96d7ff",
            "https://git.kernel.org/stable/c/d3bbe77a76bc52e9d4d0a120f1509be36e25c916",
            "https://git.kernel.org/stable/c/d639102f4cbd4cb65d1225dba3b9265596aab586",
            "https://git.kernel.org/stable/c/ffeb72a80a82aba59a6774b0611f792e0ed3b0b7",
            "https://www.cve.org/CVERecord?id=CVE-2024-26772\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26772\nhttps://lore.kernel.org/linux-cve-announce/2024040308-CVE-2024-26772-5168@gregkh/T"
        ]
    },
    "CVE-2024-26773": {
        "cve": "CVE-2024-26773",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()\n\nDetermine if the group block bitmap is corrupted before using ac_b_ex in\next4_mb_try_best_found() to avoid allocating blocks from a group with a\ncorrupted block bitmap in the following concurrency and making the\nsituation worse.\n\next4_mb_regular_allocator\n  ext4_lock_group(sb, group)\n  ext4_mb_good_group\n   // check if the group bbitmap is corrupted\n  ext4_mb_complex_scan_group\n   // Scan group gets ac_b_ex but doesn't use it\n  ext4_unlock_group(sb, group)\n                           ext4_mark_group_bitmap_corrupted(group)\n                           // The block bitmap was corrupted during\n                           // the group unlock gap.\n  ext4_mb_try_best_found\n    ext4_lock_group(ac->ac_sb, group)\n    ext4_mb_use_best_found\n      mb_mark_used\n      // Allocating blocks in block bitmap corrupted group",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26773",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/927794a02169778c9c2e7b25c768ab3ea8c1dc03",
            "patch_url": "https://git.kernel.org/stable/p/927794a02169778c9c2e7b25c768ab3ea8c1dc03",
            "filename": "CVE-2024-26773-927794a02169778c9c2e7b25c768ab3ea8c1dc03.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26773/CVE-2024-26773-927794a02169778c9c2e7b25c768ab3ea8c1dc03.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0184747b552d6b5a14db3b7fcc3b792ce64dedd1",
                "patch_url": "https://git.kernel.org/stable/p/0184747b552d6b5a14db3b7fcc3b792ce64dedd1",
                "filename": "CVE-2024-26773-0184747b552d6b5a14db3b7fcc3b792ce64dedd1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26773/CVE-2024-26773-0184747b552d6b5a14db3b7fcc3b792ce64dedd1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/21f8cfe79f776287459343e9cfa6055af61328ea",
                "patch_url": "https://git.kernel.org/stable/p/21f8cfe79f776287459343e9cfa6055af61328ea",
                "filename": "CVE-2024-26773-21f8cfe79f776287459343e9cfa6055af61328ea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26773/CVE-2024-26773-21f8cfe79f776287459343e9cfa6055af61328ea.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/260fc96283c0f594de18a1b045faf6d8fb42874d",
                "patch_url": "https://git.kernel.org/stable/p/260fc96283c0f594de18a1b045faf6d8fb42874d",
                "filename": "CVE-2024-26773-260fc96283c0f594de18a1b045faf6d8fb42874d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26773/CVE-2024-26773-260fc96283c0f594de18a1b045faf6d8fb42874d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4530b3660d396a646aad91a787b6ab37cf604b53",
                "patch_url": "https://git.kernel.org/stable/p/4530b3660d396a646aad91a787b6ab37cf604b53",
                "filename": "CVE-2024-26773-4530b3660d396a646aad91a787b6ab37cf604b53.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26773/CVE-2024-26773-4530b3660d396a646aad91a787b6ab37cf604b53.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4c21fa60a6f4606f6214a38f50612b17b2f738f5",
                "patch_url": "https://git.kernel.org/stable/p/4c21fa60a6f4606f6214a38f50612b17b2f738f5",
                "filename": "CVE-2024-26773-4c21fa60a6f4606f6214a38f50612b17b2f738f5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26773/CVE-2024-26773-4c21fa60a6f4606f6214a38f50612b17b2f738f5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/927794a02169778c9c2e7b25c768ab3ea8c1dc03",
                "patch_url": "https://git.kernel.org/stable/p/927794a02169778c9c2e7b25c768ab3ea8c1dc03",
                "filename": "CVE-2024-26773-927794a02169778c9c2e7b25c768ab3ea8c1dc03.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26773/CVE-2024-26773-927794a02169778c9c2e7b25c768ab3ea8c1dc03.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a2576ae9a35c078e488f2c573e9e6821d651fbbe",
                "patch_url": "https://git.kernel.org/stable/p/a2576ae9a35c078e488f2c573e9e6821d651fbbe",
                "filename": "CVE-2024-26773-a2576ae9a35c078e488f2c573e9e6821d651fbbe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26773/CVE-2024-26773-a2576ae9a35c078e488f2c573e9e6821d651fbbe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f97e75fa4e12b0aa0224e83fcbda8853ac2adf36",
                "patch_url": "https://git.kernel.org/stable/p/f97e75fa4e12b0aa0224e83fcbda8853ac2adf36",
                "filename": "CVE-2024-26773-f97e75fa4e12b0aa0224e83fcbda8853ac2adf36.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26773/CVE-2024-26773-f97e75fa4e12b0aa0224e83fcbda8853ac2adf36.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0184747b552d6b5a14db3b7fcc3b792ce64dedd1",
            "https://git.kernel.org/stable/c/21f8cfe79f776287459343e9cfa6055af61328ea",
            "https://git.kernel.org/stable/c/260fc96283c0f594de18a1b045faf6d8fb42874d",
            "https://git.kernel.org/stable/c/4530b3660d396a646aad91a787b6ab37cf604b53",
            "https://git.kernel.org/stable/c/4c21fa60a6f4606f6214a38f50612b17b2f738f5",
            "https://git.kernel.org/stable/c/927794a02169778c9c2e7b25c768ab3ea8c1dc03",
            "https://git.kernel.org/stable/c/a2576ae9a35c078e488f2c573e9e6821d651fbbe",
            "https://git.kernel.org/stable/c/f97e75fa4e12b0aa0224e83fcbda8853ac2adf36",
            "https://www.cve.org/CVERecord?id=CVE-2024-26773\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26773\nhttps://lore.kernel.org/linux-cve-announce/2024040308-CVE-2024-26773-a314@gregkh/T"
        ]
    },
    "CVE-2024-26779": {
        "cve": "CVE-2024-26779",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix race condition on enabling fast-xmit\n\nfast-xmit must only be enabled after the sta has been uploaded to the driver,\notherwise it could end up passing the not-yet-uploaded sta via drv_tx calls\nto the driver, leading to potential crashes because of uninitialized drv_priv\ndata.\nAdd a missing sta->uploaded check and re-check fast xmit after inserting a sta.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26779",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/eb39bb548bf974acad7bd6780fe11f9e6652d696",
            "patch_url": "https://git.kernel.org/stable/p/eb39bb548bf974acad7bd6780fe11f9e6652d696",
            "filename": "CVE-2024-26779-eb39bb548bf974acad7bd6780fe11f9e6652d696.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26779/CVE-2024-26779-eb39bb548bf974acad7bd6780fe11f9e6652d696.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9",
                "patch_url": "https://git.kernel.org/stable/p/281280276b70c822f55ce15b661f6d1d3228aaa9",
                "filename": "CVE-2024-26779-281280276b70c822f55ce15b661f6d1d3228aaa9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26779/CVE-2024-26779-281280276b70c822f55ce15b661f6d1d3228aaa9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/54b79d8786964e2f840e8a2ec4a9f9a50f3d4954",
                "patch_url": "https://git.kernel.org/stable/p/54b79d8786964e2f840e8a2ec4a9f9a50f3d4954",
                "filename": "CVE-2024-26779-54b79d8786964e2f840e8a2ec4a9f9a50f3d4954.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26779/CVE-2024-26779-54b79d8786964e2f840e8a2ec4a9f9a50f3d4954.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5ffab99e070b9f8ae0cf60c3c3602b84eee818dd",
                "patch_url": "https://git.kernel.org/stable/p/5ffab99e070b9f8ae0cf60c3c3602b84eee818dd",
                "filename": "CVE-2024-26779-5ffab99e070b9f8ae0cf60c3c3602b84eee818dd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26779/CVE-2024-26779-5ffab99e070b9f8ae0cf60c3c3602b84eee818dd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/76fad1174a0cae6fc857b9f88b261a2e4f07d587",
                "patch_url": "https://git.kernel.org/stable/p/76fad1174a0cae6fc857b9f88b261a2e4f07d587",
                "filename": "CVE-2024-26779-76fad1174a0cae6fc857b9f88b261a2e4f07d587.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26779/CVE-2024-26779-76fad1174a0cae6fc857b9f88b261a2e4f07d587.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/85720b69aef177318f4a18efbcc4302228a340e5",
                "patch_url": "https://git.kernel.org/stable/p/85720b69aef177318f4a18efbcc4302228a340e5",
                "filename": "CVE-2024-26779-85720b69aef177318f4a18efbcc4302228a340e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26779/CVE-2024-26779-85720b69aef177318f4a18efbcc4302228a340e5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/88c18fd06608b3adee547102505d715f21075c9d",
                "patch_url": "https://git.kernel.org/stable/p/88c18fd06608b3adee547102505d715f21075c9d",
                "filename": "CVE-2024-26779-88c18fd06608b3adee547102505d715f21075c9d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26779/CVE-2024-26779-88c18fd06608b3adee547102505d715f21075c9d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f",
                "patch_url": "https://git.kernel.org/stable/p/bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f",
                "filename": "CVE-2024-26779-bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26779/CVE-2024-26779-bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eb39bb548bf974acad7bd6780fe11f9e6652d696",
                "patch_url": "https://git.kernel.org/stable/p/eb39bb548bf974acad7bd6780fe11f9e6652d696",
                "filename": "CVE-2024-26779-eb39bb548bf974acad7bd6780fe11f9e6652d696.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26779/CVE-2024-26779-eb39bb548bf974acad7bd6780fe11f9e6652d696.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9",
            "https://git.kernel.org/stable/c/54b79d8786964e2f840e8a2ec4a9f9a50f3d4954",
            "https://git.kernel.org/stable/c/5ffab99e070b9f8ae0cf60c3c3602b84eee818dd",
            "https://git.kernel.org/stable/c/76fad1174a0cae6fc857b9f88b261a2e4f07d587",
            "https://git.kernel.org/stable/c/85720b69aef177318f4a18efbcc4302228a340e5",
            "https://git.kernel.org/stable/c/88c18fd06608b3adee547102505d715f21075c9d",
            "https://git.kernel.org/stable/c/bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f",
            "https://git.kernel.org/stable/c/eb39bb548bf974acad7bd6780fe11f9e6652d696",
            "https://www.cve.org/CVERecord?id=CVE-2024-26779\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26779\nhttps://lore.kernel.org/linux-cve-announce/2024040310-CVE-2024-26779-8030@gregkh/T"
        ]
    },
    "CVE-2024-26782": {
        "cve": "CVE-2024-26782",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix double-free on socket dismantle\n\nwhen MPTCP server accepts an incoming connection, it clones its listener\nsocket. However, the pointer to 'inet_opt' for the new socket has the same\nvalue as the original one: as a consequence, on program exit it's possible\nto observe the following splat:\n\n  BUG: KASAN: double-free in inet_sock_destruct+0x54f/0x8b0\n  Free of addr ffff888485950880 by task swapper/25/0\n\n  CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Not tainted 6.8.0-rc1+ #609\n  Hardware name: Supermicro SYS-6027R-72RF/X9DRH-7TF/7F/iTF/iF, BIOS 3.0  07/26/2013\n  Call Trace:\n   <IRQ>\n   dump_stack_lvl+0x32/0x50\n   print_report+0xca/0x620\n   kasan_report_invalid_free+0x64/0x90\n   __kasan_slab_free+0x1aa/0x1f0\n   kfree+0xed/0x2e0\n   inet_sock_destruct+0x54f/0x8b0\n   __sk_destruct+0x48/0x5b0\n   rcu_do_batch+0x34e/0xd90\n   rcu_core+0x559/0xac0\n   __do_softirq+0x183/0x5a4\n   irq_exit_rcu+0x12d/0x170\n   sysvec_apic_timer_interrupt+0x6b/0x80\n   </IRQ>\n   <TASK>\n   asm_sysvec_apic_timer_interrupt+0x16/0x20\n  RIP: 0010:cpuidle_enter_state+0x175/0x300\n  Code: 30 00 0f 84 1f 01 00 00 83 e8 01 83 f8 ff 75 e5 48 83 c4 18 44 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc fb 45 85 ed <0f> 89 60 ff ff ff 48 c1 e5 06 48 c7 43 18 00 00 00 00 48 83 44 2b\n  RSP: 0018:ffff888481cf7d90 EFLAGS: 00000202\n  RAX: 0000000000000000 RBX: ffff88887facddc8 RCX: 0000000000000000\n  RDX: 1ffff1110ff588b1 RSI: 0000000000000019 RDI: ffff88887fac4588\n  RBP: 0000000000000004 R08: 0000000000000002 R09: 0000000000043080\n  R10: 0009b02ea273363f R11: ffff88887fabf42b R12: ffffffff932592e0\n  R13: 0000000000000004 R14: 0000000000000000 R15: 00000022c880ec80\n   cpuidle_enter+0x4a/0xa0\n   do_idle+0x310/0x410\n   cpu_startup_entry+0x51/0x60\n   start_secondary+0x211/0x270\n   secondary_startup_64_no_verify+0x184/0x18b\n   </TASK>\n\n  Allocated by task 6853:\n   kasan_save_stack+0x1c/0x40\n   kasan_save_track+0x10/0x30\n   __kasan_kmalloc+0xa6/0xb0\n   __kmalloc+0x1eb/0x450\n   cipso_v4_sock_setattr+0x96/0x360\n   netlbl_sock_setattr+0x132/0x1f0\n   selinux_netlbl_socket_post_create+0x6c/0x110\n   selinux_socket_post_create+0x37b/0x7f0\n   security_socket_post_create+0x63/0xb0\n   __sock_create+0x305/0x450\n   __sys_socket_create.part.23+0xbd/0x130\n   __sys_socket+0x37/0xb0\n   __x64_sys_socket+0x6f/0xb0\n   do_syscall_64+0x83/0x160\n   entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\n  Freed by task 6858:\n   kasan_save_stack+0x1c/0x40\n   kasan_save_track+0x10/0x30\n   kasan_save_free_info+0x3b/0x60\n   __kasan_slab_free+0x12c/0x1f0\n   kfree+0xed/0x2e0\n   inet_sock_destruct+0x54f/0x8b0\n   __sk_destruct+0x48/0x5b0\n   subflow_ulp_release+0x1f0/0x250\n   tcp_cleanup_ulp+0x6e/0x110\n   tcp_v4_destroy_sock+0x5a/0x3a0\n   inet_csk_destroy_sock+0x135/0x390\n   tcp_fin+0x416/0x5c0\n   tcp_data_queue+0x1bc8/0x4310\n   tcp_rcv_state_process+0x15a3/0x47b0\n   tcp_v4_do_rcv+0x2c1/0x990\n   tcp_v4_rcv+0x41fb/0x5ed0\n   ip_protocol_deliver_rcu+0x6d/0x9f0\n   ip_local_deliver_finish+0x278/0x360\n   ip_local_deliver+0x182/0x2c0\n   ip_rcv+0xb5/0x1c0\n   __netif_receive_skb_one_core+0x16e/0x1b0\n   process_backlog+0x1e3/0x650\n   __napi_poll+0xa6/0x500\n   net_rx_action+0x740/0xbb0\n   __do_softirq+0x183/0x5a4\n\n  The buggy address belongs to the object at ffff888485950880\n   which belongs to the cache kmalloc-64 of size 64\n  The buggy address is located 0 bytes inside of\n   64-byte region [ffff888485950880, ffff8884859508c0)\n\n  The buggy address belongs to the physical page:\n  page:0000000056d1e95e refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888485950700 pfn:0x485950\n  flags: 0x57ffffc0000800(slab|node=1|zone=2|lastcpupid=0x1fffff)\n  page_type: 0xffffffff()\n  raw: 0057ffffc0000800 ffff88810004c640 ffffea00121b8ac0 dead000000000006\n  raw: ffff888485950700 0000000000200019 00000001ffffffff 0000000000000000\n  page dumped because: kasan: bad access detected\n\n  Memory state around the buggy address:\n   ffff888485950780: fa fb fb\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26782",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4a4eeb6912538c2d0b158e8d11b62d96c1dada4e",
            "patch_url": "https://git.kernel.org/stable/p/4a4eeb6912538c2d0b158e8d11b62d96c1dada4e",
            "filename": "CVE-2024-26782-4a4eeb6912538c2d0b158e8d11b62d96c1dada4e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26782/CVE-2024-26782-4a4eeb6912538c2d0b158e8d11b62d96c1dada4e.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/10048689def7e40a4405acda16fdc6477d4ecc5c",
                "patch_url": "https://git.kernel.org/stable/p/10048689def7e40a4405acda16fdc6477d4ecc5c",
                "filename": "CVE-2024-26782-10048689def7e40a4405acda16fdc6477d4ecc5c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26782/CVE-2024-26782-10048689def7e40a4405acda16fdc6477d4ecc5c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4a4eeb6912538c2d0b158e8d11b62d96c1dada4e",
                "patch_url": "https://git.kernel.org/stable/p/4a4eeb6912538c2d0b158e8d11b62d96c1dada4e",
                "filename": "CVE-2024-26782-4a4eeb6912538c2d0b158e8d11b62d96c1dada4e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26782/CVE-2024-26782-4a4eeb6912538c2d0b158e8d11b62d96c1dada4e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/85933e80d077c9ae2227226beb86c22f464059cc",
                "patch_url": "https://git.kernel.org/stable/p/85933e80d077c9ae2227226beb86c22f464059cc",
                "filename": "CVE-2024-26782-85933e80d077c9ae2227226beb86c22f464059cc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26782/CVE-2024-26782-85933e80d077c9ae2227226beb86c22f464059cc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ce0809ada38dca8d6d41bb57ab40494855c30582",
                "patch_url": "https://git.kernel.org/stable/p/ce0809ada38dca8d6d41bb57ab40494855c30582",
                "filename": "CVE-2024-26782-ce0809ada38dca8d6d41bb57ab40494855c30582.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26782/CVE-2024-26782-ce0809ada38dca8d6d41bb57ab40494855c30582.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d93fd40c62397326046902a2c5cb75af50882a85",
                "patch_url": "https://git.kernel.org/stable/p/d93fd40c62397326046902a2c5cb75af50882a85",
                "filename": "CVE-2024-26782-d93fd40c62397326046902a2c5cb75af50882a85.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26782/CVE-2024-26782-d93fd40c62397326046902a2c5cb75af50882a85.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f74362a004225df935863dea6eb7d82daaa5b16e",
                "patch_url": "https://git.kernel.org/stable/p/f74362a004225df935863dea6eb7d82daaa5b16e",
                "filename": "CVE-2024-26782-f74362a004225df935863dea6eb7d82daaa5b16e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26782/CVE-2024-26782-f74362a004225df935863dea6eb7d82daaa5b16e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/10048689def7e40a4405acda16fdc6477d4ecc5c",
            "https://git.kernel.org/stable/c/4a4eeb6912538c2d0b158e8d11b62d96c1dada4e",
            "https://git.kernel.org/stable/c/85933e80d077c9ae2227226beb86c22f464059cc",
            "https://git.kernel.org/stable/c/ce0809ada38dca8d6d41bb57ab40494855c30582",
            "https://git.kernel.org/stable/c/d93fd40c62397326046902a2c5cb75af50882a85",
            "https://git.kernel.org/stable/c/f74362a004225df935863dea6eb7d82daaa5b16e",
            "https://www.cve.org/CVERecord?id=CVE-2024-26782\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26782\nhttps://lore.kernel.org/linux-cve-announce/2024040458-CVE-2024-26782-71ca@gregkh/T"
        ]
    },
    "CVE-2024-26801": {
        "cve": "CVE-2024-26801",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Avoid potential use-after-free in hci_error_reset\n\nWhile handling the HCI_EV_HARDWARE_ERROR event, if the underlying\nBT controller is not responding, the GPIO reset mechanism would\nfree the hci_dev and lead to a use-after-free in hci_error_reset.\n\nHere's the call trace observed on a ChromeOS device with Intel AX201:\n   queue_work_on+0x3e/0x6c\n   __hci_cmd_sync_sk+0x2ee/0x4c0 [bluetooth <HASH:3b4a6>]\n   ? init_wait_entry+0x31/0x31\n   __hci_cmd_sync+0x16/0x20 [bluetooth <HASH:3b4a 6>]\n   hci_error_reset+0x4f/0xa4 [bluetooth <HASH:3b4a 6>]\n   process_one_work+0x1d8/0x33f\n   worker_thread+0x21b/0x373\n   kthread+0x13a/0x152\n   ? pr_cont_work+0x54/0x54\n   ? kthread_blkcg+0x31/0x31\n    ret_from_fork+0x1f/0x30\n\nThis patch holds the reference count on the hci_dev while processing\na HCI_EV_HARDWARE_ERROR event to avoid potential crash.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26801",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2",
            "patch_url": "https://git.kernel.org/stable/p/6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2",
            "filename": "CVE-2024-26801-6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26801/CVE-2024-26801-6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2449007d3f73b2842c9734f45f0aadb522daf592",
                "patch_url": "https://git.kernel.org/stable/p/2449007d3f73b2842c9734f45f0aadb522daf592",
                "filename": "CVE-2024-26801-2449007d3f73b2842c9734f45f0aadb522daf592.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26801/CVE-2024-26801-2449007d3f73b2842c9734f45f0aadb522daf592.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2ab9a19d896f5a0dd386e1f001c5309bc35f433b",
                "patch_url": "https://git.kernel.org/stable/p/2ab9a19d896f5a0dd386e1f001c5309bc35f433b",
                "filename": "CVE-2024-26801-2ab9a19d896f5a0dd386e1f001c5309bc35f433b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26801/CVE-2024-26801-2ab9a19d896f5a0dd386e1f001c5309bc35f433b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/45085686b9559bfbe3a4f41d3d695a520668f5e1",
                "patch_url": "https://git.kernel.org/stable/p/45085686b9559bfbe3a4f41d3d695a520668f5e1",
                "filename": "CVE-2024-26801-45085686b9559bfbe3a4f41d3d695a520668f5e1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26801/CVE-2024-26801-45085686b9559bfbe3a4f41d3d695a520668f5e1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2",
                "patch_url": "https://git.kernel.org/stable/p/6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2",
                "filename": "CVE-2024-26801-6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26801/CVE-2024-26801-6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/98fb98fd37e42fd4ce13ff657ea64503e24b6090",
                "patch_url": "https://git.kernel.org/stable/p/98fb98fd37e42fd4ce13ff657ea64503e24b6090",
                "filename": "CVE-2024-26801-98fb98fd37e42fd4ce13ff657ea64503e24b6090.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26801/CVE-2024-26801-98fb98fd37e42fd4ce13ff657ea64503e24b6090.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/da4569d450b193e39e87119fd316c0291b585d14",
                "patch_url": "https://git.kernel.org/stable/p/da4569d450b193e39e87119fd316c0291b585d14",
                "filename": "CVE-2024-26801-da4569d450b193e39e87119fd316c0291b585d14.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26801/CVE-2024-26801-da4569d450b193e39e87119fd316c0291b585d14.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dd594cdc24f2e48dab441732e6dfcafd6b0711d1",
                "patch_url": "https://git.kernel.org/stable/p/dd594cdc24f2e48dab441732e6dfcafd6b0711d1",
                "filename": "CVE-2024-26801-dd594cdc24f2e48dab441732e6dfcafd6b0711d1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26801/CVE-2024-26801-dd594cdc24f2e48dab441732e6dfcafd6b0711d1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e0b278650f07acf2e0932149183458468a731c03",
                "patch_url": "https://git.kernel.org/stable/p/e0b278650f07acf2e0932149183458468a731c03",
                "filename": "CVE-2024-26801-e0b278650f07acf2e0932149183458468a731c03.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26801/CVE-2024-26801-e0b278650f07acf2e0932149183458468a731c03.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2449007d3f73b2842c9734f45f0aadb522daf592",
            "https://git.kernel.org/stable/c/2ab9a19d896f5a0dd386e1f001c5309bc35f433b",
            "https://git.kernel.org/stable/c/45085686b9559bfbe3a4f41d3d695a520668f5e1",
            "https://git.kernel.org/stable/c/6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2",
            "https://git.kernel.org/stable/c/98fb98fd37e42fd4ce13ff657ea64503e24b6090",
            "https://git.kernel.org/stable/c/da4569d450b193e39e87119fd316c0291b585d14",
            "https://git.kernel.org/stable/c/dd594cdc24f2e48dab441732e6dfcafd6b0711d1",
            "https://git.kernel.org/stable/c/e0b278650f07acf2e0932149183458468a731c03",
            "https://www.cve.org/CVERecord?id=CVE-2024-26801\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26801\nhttps://lore.kernel.org/linux-cve-announce/2024040403-CVE-2024-26801-da9f@gregkh/T"
        ]
    },
    "CVE-2024-26802": {
        "cve": "CVE-2024-26802",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nstmmac: Clear variable when destroying workqueue\n\nCurrently when suspending driver and stopping workqueue it is checked whether\nworkqueue is not NULL and if so, it is destroyed.\nFunction destroy_workqueue() does drain queue and does clear variable, but\nit does not set workqueue variable to NULL. This can cause kernel/module\npanic if code attempts to clear workqueue that was not initialized.\n\nThis scenario is possible when resuming suspended driver in stmmac_resume(),\nbecause there is no handling for failed stmmac_hw_setup(),\nwhich can fail and return if DMA engine has failed to initialize,\nand workqueue is initialized after DMA engine.\nShould DMA engine fail to initialize, resume will proceed normally,\nbut interface won't work and TX queue will eventually timeout,\ncausing 'Reset adapter' error.\nThis then does destroy workqueue during reset process.\nAnd since workqueue is initialized after DMA engine and can be skipped,\nit will cause kernel/module panic.\n\nTo secure against this possible crash, set workqueue variable to NULL when\ndestroying workqueue.\n\nLog/backtrace from crash goes as follows:\n[88.031977]------------[ cut here ]------------\n[88.031985]NETDEV WATCHDOG: eth0 (sxgmac): transmit queue 1 timed out\n[88.032017]WARNING: CPU: 0 PID: 0 at net/sched/sch_generic.c:477 dev_watchdog+0x390/0x398\n           <Skipping backtrace for watchdog timeout>\n[88.032251]---[ end trace e70de432e4d5c2c0 ]---\n[88.032282]sxgmac 16d88000.ethernet eth0: Reset adapter.\n[88.036359]------------[ cut here ]------------\n[88.036519]Call trace:\n[88.036523] flush_workqueue+0x3e4/0x430\n[88.036528] drain_workqueue+0xc4/0x160\n[88.036533] destroy_workqueue+0x40/0x270\n[88.036537] stmmac_fpe_stop_wq+0x4c/0x70\n[88.036541] stmmac_release+0x278/0x280\n[88.036546] __dev_close_many+0xcc/0x158\n[88.036551] dev_close_many+0xbc/0x190\n[88.036555] dev_close.part.0+0x70/0xc0\n[88.036560] dev_close+0x24/0x30\n[88.036564] stmmac_service_task+0x110/0x140\n[88.036569] process_one_work+0x1d8/0x4a0\n[88.036573] worker_thread+0x54/0x408\n[88.036578] kthread+0x164/0x170\n[88.036583] ret_from_fork+0x10/0x20\n[88.036588]---[ end trace e70de432e4d5c2c1 ]---\n[88.036597]Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26802",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/8e99556301172465c8fe33c7f78c39a3d4ce8462",
            "patch_url": "https://git.kernel.org/stable/p/8e99556301172465c8fe33c7f78c39a3d4ce8462",
            "filename": "CVE-2024-26802-8e99556301172465c8fe33c7f78c39a3d4ce8462.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26802/CVE-2024-26802-8e99556301172465c8fe33c7f78c39a3d4ce8462.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/17ccd9798fe0beda3db212cfa3ebe373f605cbd6",
                "patch_url": "https://git.kernel.org/stable/p/17ccd9798fe0beda3db212cfa3ebe373f605cbd6",
                "filename": "CVE-2024-26802-17ccd9798fe0beda3db212cfa3ebe373f605cbd6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26802/CVE-2024-26802-17ccd9798fe0beda3db212cfa3ebe373f605cbd6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/699b103e48ce32d03fc86c35b37ee8ae4288c7e3",
                "patch_url": "https://git.kernel.org/stable/p/699b103e48ce32d03fc86c35b37ee8ae4288c7e3",
                "filename": "CVE-2024-26802-699b103e48ce32d03fc86c35b37ee8ae4288c7e3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26802/CVE-2024-26802-699b103e48ce32d03fc86c35b37ee8ae4288c7e3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8af411bbba1f457c33734795f024d0ef26d0963f",
                "patch_url": "https://git.kernel.org/stable/p/8af411bbba1f457c33734795f024d0ef26d0963f",
                "filename": "CVE-2024-26802-8af411bbba1f457c33734795f024d0ef26d0963f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26802/CVE-2024-26802-8af411bbba1f457c33734795f024d0ef26d0963f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8e99556301172465c8fe33c7f78c39a3d4ce8462",
                "patch_url": "https://git.kernel.org/stable/p/8e99556301172465c8fe33c7f78c39a3d4ce8462",
                "filename": "CVE-2024-26802-8e99556301172465c8fe33c7f78c39a3d4ce8462.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26802/CVE-2024-26802-8e99556301172465c8fe33c7f78c39a3d4ce8462.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f72cf22dccc94038cbbaa1029cb575bf52e5cbc8",
                "patch_url": "https://git.kernel.org/stable/p/f72cf22dccc94038cbbaa1029cb575bf52e5cbc8",
                "filename": "CVE-2024-26802-f72cf22dccc94038cbbaa1029cb575bf52e5cbc8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26802/CVE-2024-26802-f72cf22dccc94038cbbaa1029cb575bf52e5cbc8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/17ccd9798fe0beda3db212cfa3ebe373f605cbd6",
            "https://git.kernel.org/stable/c/699b103e48ce32d03fc86c35b37ee8ae4288c7e3",
            "https://git.kernel.org/stable/c/8af411bbba1f457c33734795f024d0ef26d0963f",
            "https://git.kernel.org/stable/c/8e99556301172465c8fe33c7f78c39a3d4ce8462",
            "https://git.kernel.org/stable/c/f72cf22dccc94038cbbaa1029cb575bf52e5cbc8",
            "https://www.cve.org/CVERecord?id=CVE-2024-26802\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26802\nhttps://lore.kernel.org/linux-cve-announce/2024040403-CVE-2024-26802-b3da@gregkh/T"
        ]
    },
    "CVE-2024-26804": {
        "cve": "CVE-2024-26804",
        "cvss_v2": null,
        "cvss_v3": 5.3,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ip_tunnel: prevent perpetual headroom growth\n\nsyzkaller triggered following kasan splat:\nBUG: KASAN: use-after-free in __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170\nRead of size 1 at addr ffff88812fb4000e by task syz-executor183/5191\n[..]\n kasan_report+0xda/0x110 mm/kasan/report.c:588\n __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170\n skb_flow_dissect_flow_keys include/linux/skbuff.h:1514 [inline]\n ___skb_get_hash net/core/flow_dissector.c:1791 [inline]\n __skb_get_hash+0xc7/0x540 net/core/flow_dissector.c:1856\n skb_get_hash include/linux/skbuff.h:1556 [inline]\n ip_tunnel_xmit+0x1855/0x33c0 net/ipv4/ip_tunnel.c:748\n ipip_tunnel_xmit+0x3cc/0x4e0 net/ipv4/ipip.c:308\n __netdev_start_xmit include/linux/netdevice.h:4940 [inline]\n netdev_start_xmit include/linux/netdevice.h:4954 [inline]\n xmit_one net/core/dev.c:3548 [inline]\n dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564\n __dev_queue_xmit+0x7c1/0x3d60 net/core/dev.c:4349\n dev_queue_xmit include/linux/netdevice.h:3134 [inline]\n neigh_connected_output+0x42c/0x5d0 net/core/neighbour.c:1592\n ...\n ip_finish_output2+0x833/0x2550 net/ipv4/ip_output.c:235\n ip_finish_output+0x31/0x310 net/ipv4/ip_output.c:323\n ..\n iptunnel_xmit+0x5b4/0x9b0 net/ipv4/ip_tunnel_core.c:82\n ip_tunnel_xmit+0x1dbc/0x33c0 net/ipv4/ip_tunnel.c:831\n ipgre_xmit+0x4a1/0x980 net/ipv4/ip_gre.c:665\n __netdev_start_xmit include/linux/netdevice.h:4940 [inline]\n netdev_start_xmit include/linux/netdevice.h:4954 [inline]\n xmit_one net/core/dev.c:3548 [inline]\n dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564\n ...\n\nThe splat occurs because skb->data points past skb->head allocated area.\nThis is because neigh layer does:\n  __skb_pull(skb, skb_network_offset(skb));\n\n... but skb_network_offset() returns a negative offset and __skb_pull()\narg is unsigned.  IOW, we skb->data gets \"adjusted\" by a huge value.\n\nThe negative value is returned because skb->head and skb->data distance is\nmore than 64k and skb->network_header (u16) has wrapped around.\n\nThe bug is in the ip_tunnel infrastructure, which can cause\ndev->needed_headroom to increment ad infinitum.\n\nThe syzkaller reproducer consists of packets getting routed via a gre\ntunnel, and route of gre encapsulated packets pointing at another (ipip)\ntunnel.  The ipip encapsulation finds gre0 as next output device.\n\nThis results in the following pattern:\n\n1). First packet is to be sent out via gre0.\nRoute lookup found an output device, ipip0.\n\n2).\nip_tunnel_xmit for gre0 bumps gre0->needed_headroom based on the future\noutput device, rt.dev->needed_headroom (ipip0).\n\n3).\nip output / start_xmit moves skb on to ipip0. which runs the same\ncode path again (xmit recursion).\n\n4).\nRouting step for the post-gre0-encap packet finds gre0 as output device\nto use for ipip0 encapsulated packet.\n\ntunl0->needed_headroom is then incremented based on the (already bumped)\ngre0 device headroom.\n\nThis repeats for every future packet:\n\ngre0->needed_headroom gets inflated because previous packets' ipip0 step\nincremented rt->dev (gre0) headroom, and ipip0 incremented because gre0\nneeded_headroom was increased.\n\nFor each subsequent packet, gre/ipip0->needed_headroom grows until\npost-expand-head reallocations result in a skb->head/data distance of\nmore than 64k.\n\nOnce that happens, skb->network_header (u16) wraps around when\npskb_expand_head tries to make sure that skb_network_offset() is unchanged\nafter the headroom expansion/reallocation.\n\nAfter this skb_network_offset(skb) returns a different (and negative)\nresult post headroom expansion.\n\nThe next trip to neigh layer (or anything else that would __skb_pull the\nnetwork header) makes skb->data point to a memory location outside\nskb->head area.\n\nv2: Cap the needed_headroom update to an arbitarily chosen upperlimit to\nprevent perpetual increase instead of dropping the headroom increment\ncompletely.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26804",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/049d7989c67e8dd50f07a2096dbafdb41331fb9b",
            "patch_url": "https://git.kernel.org/stable/p/049d7989c67e8dd50f07a2096dbafdb41331fb9b",
            "filename": "CVE-2024-26804-049d7989c67e8dd50f07a2096dbafdb41331fb9b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26804/CVE-2024-26804-049d7989c67e8dd50f07a2096dbafdb41331fb9b.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/049d7989c67e8dd50f07a2096dbafdb41331fb9b",
                "patch_url": "https://git.kernel.org/stable/p/049d7989c67e8dd50f07a2096dbafdb41331fb9b",
                "filename": "CVE-2024-26804-049d7989c67e8dd50f07a2096dbafdb41331fb9b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26804/CVE-2024-26804-049d7989c67e8dd50f07a2096dbafdb41331fb9b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2e95350fe9db9d53c701075060ac8ac883b68aee",
                "patch_url": "https://git.kernel.org/stable/p/2e95350fe9db9d53c701075060ac8ac883b68aee",
                "filename": "CVE-2024-26804-2e95350fe9db9d53c701075060ac8ac883b68aee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26804/CVE-2024-26804-2e95350fe9db9d53c701075060ac8ac883b68aee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5ae1e9922bbdbaeb9cfbe91085ab75927488ac0f",
                "patch_url": "https://git.kernel.org/stable/p/5ae1e9922bbdbaeb9cfbe91085ab75927488ac0f",
                "filename": "CVE-2024-26804-5ae1e9922bbdbaeb9cfbe91085ab75927488ac0f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26804/CVE-2024-26804-5ae1e9922bbdbaeb9cfbe91085ab75927488ac0f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a0a1db40b23e8ff86dea2786c5ea1470bb23ecb9",
                "patch_url": "https://git.kernel.org/stable/p/a0a1db40b23e8ff86dea2786c5ea1470bb23ecb9",
                "filename": "CVE-2024-26804-a0a1db40b23e8ff86dea2786c5ea1470bb23ecb9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26804/CVE-2024-26804-a0a1db40b23e8ff86dea2786c5ea1470bb23ecb9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ab63de24ebea36fe73ac7121738595d704b66d96",
                "patch_url": "https://git.kernel.org/stable/p/ab63de24ebea36fe73ac7121738595d704b66d96",
                "filename": "CVE-2024-26804-ab63de24ebea36fe73ac7121738595d704b66d96.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26804/CVE-2024-26804-ab63de24ebea36fe73ac7121738595d704b66d96.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/afec0c5cd2ed71ca95a8b36a5e6d03333bf34282",
                "patch_url": "https://git.kernel.org/stable/p/afec0c5cd2ed71ca95a8b36a5e6d03333bf34282",
                "filename": "CVE-2024-26804-afec0c5cd2ed71ca95a8b36a5e6d03333bf34282.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26804/CVE-2024-26804-afec0c5cd2ed71ca95a8b36a5e6d03333bf34282.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f81e94d2dcd2397137edcb8b85f4c5bed5d22383",
                "patch_url": "https://git.kernel.org/stable/p/f81e94d2dcd2397137edcb8b85f4c5bed5d22383",
                "filename": "CVE-2024-26804-f81e94d2dcd2397137edcb8b85f4c5bed5d22383.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26804/CVE-2024-26804-f81e94d2dcd2397137edcb8b85f4c5bed5d22383.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/049d7989c67e8dd50f07a2096dbafdb41331fb9b",
            "https://git.kernel.org/stable/c/2e95350fe9db9d53c701075060ac8ac883b68aee",
            "https://git.kernel.org/stable/c/5ae1e9922bbdbaeb9cfbe91085ab75927488ac0f",
            "https://git.kernel.org/stable/c/a0a1db40b23e8ff86dea2786c5ea1470bb23ecb9",
            "https://git.kernel.org/stable/c/ab63de24ebea36fe73ac7121738595d704b66d96",
            "https://git.kernel.org/stable/c/afec0c5cd2ed71ca95a8b36a5e6d03333bf34282",
            "https://git.kernel.org/stable/c/f81e94d2dcd2397137edcb8b85f4c5bed5d22383",
            "https://www.cve.org/CVERecord?id=CVE-2024-26804\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26804\nhttps://lore.kernel.org/linux-cve-announce/2024040404-CVE-2024-26804-a6ff@gregkh/T"
        ]
    },
    "CVE-2024-26810": {
        "cve": "CVE-2024-26810",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Lock external INTx masking ops\n\nMask operations through config space changes to DisINTx may race INTx\nconfiguration changes via ioctl.  Create wrappers that add locking for\npaths outside of the core interrupt code.\n\nIn particular, irq_type is updated holding igate, therefore testing\nis_intx() requires holding igate.  For example clearing DisINTx from\nconfig space can otherwise race changes of the interrupt configuration.\n\nThis aligns interfaces which may trigger the INTx eventfd into two\ncamps, one side serialized by igate and the other only enabled while\nINTx is configured.  A subsequent patch introduces synchronization for\nthe latter flows.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26810",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1e71b6449d55179170efc8dee8664510bb813b42",
            "patch_url": "https://git.kernel.org/stable/p/1e71b6449d55179170efc8dee8664510bb813b42",
            "filename": "CVE-2024-26810-1e71b6449d55179170efc8dee8664510bb813b42.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26810/CVE-2024-26810-1e71b6449d55179170efc8dee8664510bb813b42.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/03505e3344b0576fd619416793a31eae9c5b73bf",
                "patch_url": "https://git.kernel.org/stable/p/03505e3344b0576fd619416793a31eae9c5b73bf",
                "filename": "CVE-2024-26810-03505e3344b0576fd619416793a31eae9c5b73bf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26810/CVE-2024-26810-03505e3344b0576fd619416793a31eae9c5b73bf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/04a4a017b9ffd7b0f427b8c376688d14cb614651",
                "patch_url": "https://git.kernel.org/stable/p/04a4a017b9ffd7b0f427b8c376688d14cb614651",
                "filename": "CVE-2024-26810-04a4a017b9ffd7b0f427b8c376688d14cb614651.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26810/CVE-2024-26810-04a4a017b9ffd7b0f427b8c376688d14cb614651.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1e71b6449d55179170efc8dee8664510bb813b42",
                "patch_url": "https://git.kernel.org/stable/p/1e71b6449d55179170efc8dee8664510bb813b42",
                "filename": "CVE-2024-26810-1e71b6449d55179170efc8dee8664510bb813b42.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26810/CVE-2024-26810-1e71b6449d55179170efc8dee8664510bb813b42.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3dd9be6cb55e0f47544e7cdda486413f7134e3b3",
                "patch_url": "https://git.kernel.org/stable/p/3dd9be6cb55e0f47544e7cdda486413f7134e3b3",
                "filename": "CVE-2024-26810-3dd9be6cb55e0f47544e7cdda486413f7134e3b3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26810/CVE-2024-26810-3dd9be6cb55e0f47544e7cdda486413f7134e3b3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3fe0ac10bd117df847c93408a9d428a453cd60e5",
                "patch_url": "https://git.kernel.org/stable/p/3fe0ac10bd117df847c93408a9d428a453cd60e5",
                "filename": "CVE-2024-26810-3fe0ac10bd117df847c93408a9d428a453cd60e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26810/CVE-2024-26810-3fe0ac10bd117df847c93408a9d428a453cd60e5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6fe478d855b20ac1eb5da724afe16af5a2aaaa40",
                "patch_url": "https://git.kernel.org/stable/p/6fe478d855b20ac1eb5da724afe16af5a2aaaa40",
                "filename": "CVE-2024-26810-6fe478d855b20ac1eb5da724afe16af5a2aaaa40.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26810/CVE-2024-26810-6fe478d855b20ac1eb5da724afe16af5a2aaaa40.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/810cd4bb53456d0503cc4e7934e063835152c1b7",
                "patch_url": "https://git.kernel.org/stable/p/810cd4bb53456d0503cc4e7934e063835152c1b7",
                "filename": "CVE-2024-26810-810cd4bb53456d0503cc4e7934e063835152c1b7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26810/CVE-2024-26810-810cd4bb53456d0503cc4e7934e063835152c1b7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ec73e079729258a05452356cf6d098bf1504d5a6",
                "patch_url": "https://git.kernel.org/stable/p/ec73e079729258a05452356cf6d098bf1504d5a6",
                "filename": "CVE-2024-26810-ec73e079729258a05452356cf6d098bf1504d5a6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26810/CVE-2024-26810-ec73e079729258a05452356cf6d098bf1504d5a6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/03505e3344b0576fd619416793a31eae9c5b73bf",
            "https://git.kernel.org/stable/c/04a4a017b9ffd7b0f427b8c376688d14cb614651",
            "https://git.kernel.org/stable/c/1e71b6449d55179170efc8dee8664510bb813b42",
            "https://git.kernel.org/stable/c/3dd9be6cb55e0f47544e7cdda486413f7134e3b3",
            "https://git.kernel.org/stable/c/3fe0ac10bd117df847c93408a9d428a453cd60e5",
            "https://git.kernel.org/stable/c/6fe478d855b20ac1eb5da724afe16af5a2aaaa40",
            "https://git.kernel.org/stable/c/810cd4bb53456d0503cc4e7934e063835152c1b7",
            "https://git.kernel.org/stable/c/ec73e079729258a05452356cf6d098bf1504d5a6",
            "https://www.cve.org/CVERecord?id=CVE-2024-26810\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26810\nhttps://lore.kernel.org/linux-cve-announce/2024040548-CVE-2024-26810-4371@gregkh/T"
        ]
    },
    "CVE-2024-26826": {
        "cve": "CVE-2024-26826",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix data re-injection from stale subflow\n\nWhen the MPTCP PM detects that a subflow is stale, all the packet\nscheduler must re-inject all the mptcp-level unacked data. To avoid\nacquiring unneeded locks, it first try to check if any unacked data\nis present at all in the RTX queue, but such check is currently\nbroken, as it uses TCP-specific helper on an MPTCP socket.\n\nFunnily enough fuzzers and static checkers are happy, as the accessed\nmemory still belongs to the mptcp_sock struct, and even from a\nfunctional perspective the recovery completed successfully, as\nthe short-cut test always failed.\n\nA recent unrelated TCP change - commit d5fed5addb2b (\"tcp: reorganize\ntcp_sock fast path variables\") - exposed the issue, as the tcp field\nreorganization makes the mptcp code always skip the re-inection.\n\nFix the issue dropping the bogus call: we are on a slow path, the early\noptimization proved once again to be evil.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26826",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6f95120f898b40d13fd441225ef511307853c9c2",
            "patch_url": "https://git.kernel.org/stable/p/6f95120f898b40d13fd441225ef511307853c9c2",
            "filename": "CVE-2024-26826-6f95120f898b40d13fd441225ef511307853c9c2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26826/CVE-2024-26826-6f95120f898b40d13fd441225ef511307853c9c2.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/624902eab7abcb8731b333ec73f206d38d839cd8",
                "patch_url": "https://git.kernel.org/stable/p/624902eab7abcb8731b333ec73f206d38d839cd8",
                "filename": "CVE-2024-26826-624902eab7abcb8731b333ec73f206d38d839cd8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26826/CVE-2024-26826-624902eab7abcb8731b333ec73f206d38d839cd8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6673d9f1c2cd984390550dbdf7d5ae07b20abbf8",
                "patch_url": "https://git.kernel.org/stable/p/6673d9f1c2cd984390550dbdf7d5ae07b20abbf8",
                "filename": "CVE-2024-26826-6673d9f1c2cd984390550dbdf7d5ae07b20abbf8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26826/CVE-2024-26826-6673d9f1c2cd984390550dbdf7d5ae07b20abbf8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6f95120f898b40d13fd441225ef511307853c9c2",
                "patch_url": "https://git.kernel.org/stable/p/6f95120f898b40d13fd441225ef511307853c9c2",
                "filename": "CVE-2024-26826-6f95120f898b40d13fd441225ef511307853c9c2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26826/CVE-2024-26826-6f95120f898b40d13fd441225ef511307853c9c2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b609c783c535493aa3fca22c7e40a120370b1ca5",
                "patch_url": "https://git.kernel.org/stable/p/b609c783c535493aa3fca22c7e40a120370b1ca5",
                "filename": "CVE-2024-26826-b609c783c535493aa3fca22c7e40a120370b1ca5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26826/CVE-2024-26826-b609c783c535493aa3fca22c7e40a120370b1ca5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b6c620dc43ccb4e802894e54b651cf81495e9598",
                "patch_url": "https://git.kernel.org/stable/p/b6c620dc43ccb4e802894e54b651cf81495e9598",
                "filename": "CVE-2024-26826-b6c620dc43ccb4e802894e54b651cf81495e9598.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26826/CVE-2024-26826-b6c620dc43ccb4e802894e54b651cf81495e9598.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/624902eab7abcb8731b333ec73f206d38d839cd8",
            "https://git.kernel.org/stable/c/6673d9f1c2cd984390550dbdf7d5ae07b20abbf8",
            "https://git.kernel.org/stable/c/6f95120f898b40d13fd441225ef511307853c9c2",
            "https://git.kernel.org/stable/c/b609c783c535493aa3fca22c7e40a120370b1ca5",
            "https://git.kernel.org/stable/c/b6c620dc43ccb4e802894e54b651cf81495e9598",
            "https://www.cve.org/CVERecord?id=CVE-2024-26826\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26826\nhttps://lore.kernel.org/linux-cve-announce/2024041703-CVE-2024-26826-b984@gregkh/T"
        ]
    },
    "CVE-2024-26837": {
        "cve": "CVE-2024-26837",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: switchdev: Skip MDB replays of deferred events on offload\n\nBefore this change, generation of the list of MDB events to replay\nwould race against the creation of new group memberships, either from\nthe IGMP/MLD snooping logic or from user configuration.\n\nWhile new memberships are immediately visible to walkers of\nbr->mdb_list, the notification of their existence to switchdev event\nsubscribers is deferred until a later point in time. So if a replay\nlist was generated during a time that overlapped with such a window,\nit would also contain a replay of the not-yet-delivered event.\n\nThe driver would thus receive two copies of what the bridge internally\nconsidered to be one single event. On destruction of the bridge, only\na single membership deletion event was therefore sent. As a\nconsequence of this, drivers which reference count memberships (at\nleast DSA), would be left with orphan groups in their hardware\ndatabase when the bridge was destroyed.\n\nThis is only an issue when replaying additions. While deletion events\nmay still be pending on the deferred queue, they will already have\nbeen removed from br->mdb_list, so no duplicates can be generated in\nthat scenario.\n\nTo a user this meant that old group memberships, from a bridge in\nwhich a port was previously attached, could be reanimated (in\nhardware) when the port joined a new bridge, without the new bridge's\nknowledge.\n\nFor example, on an mv88e6xxx system, create a snooping bridge and\nimmediately add a port to it:\n\n    root@infix-06-0b-00:~$ ip link add dev br0 up type bridge mcast_snooping 1 && \\\n    > ip link set dev x3 up master br0\n\nAnd then destroy the bridge:\n\n    root@infix-06-0b-00:~$ ip link del dev br0\n    root@infix-06-0b-00:~$ mvls atu\n    ADDRESS             FID  STATE      Q  F  0  1  2  3  4  5  6  7  8  9  a\n    DEV:0 Marvell 88E6393X\n    33:33:00:00:00:6a     1  static     -  -  0  .  .  .  .  .  .  .  .  .  .\n    33:33:ff:87:e4:3f     1  static     -  -  0  .  .  .  .  .  .  .  .  .  .\n    ff:ff:ff:ff:ff:ff     1  static     -  -  0  1  2  3  4  5  6  7  8  9  a\n    root@infix-06-0b-00:~$\n\nThe two IPv6 groups remain in the hardware database because the\nport (x3) is notified of the host's membership twice: once via the\noriginal event and once via a replay. Since only a single delete\nnotification is sent, the count remains at 1 when the bridge is\ndestroyed.\n\nThen add the same port (or another port belonging to the same hardware\ndomain) to a new bridge, this time with snooping disabled:\n\n    root@infix-06-0b-00:~$ ip link add dev br1 up type bridge mcast_snooping 0 && \\\n    > ip link set dev x3 up master br1\n\nAll multicast, including the two IPv6 groups from br0, should now be\nflooded, according to the policy of br1. But instead the old\nmemberships are still active in the hardware database, causing the\nswitch to only forward traffic to those groups towards the CPU (port\n0).\n\nEliminate the race in two steps:\n\n1. Grab the write-side lock of the MDB while generating the replay\n   list.\n\nThis prevents new memberships from showing up while we are generating\nthe replay list. But it leaves the scenario in which a deferred event\nwas already generated, but not delivered, before we grabbed the\nlock. Therefore:\n\n2. Make sure that no deferred version of a replay event is already\n   enqueued to the switchdev deferred queue, before adding it to the\n   replay list, when replaying additions.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26837",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/dc489f86257cab5056e747344f17a164f63bff4b",
            "patch_url": "https://git.kernel.org/stable/p/dc489f86257cab5056e747344f17a164f63bff4b",
            "filename": "CVE-2024-26837-dc489f86257cab5056e747344f17a164f63bff4b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26837/CVE-2024-26837-dc489f86257cab5056e747344f17a164f63bff4b.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2d5b4b3376fa146a23917b8577064906d643925f",
                "patch_url": "https://git.kernel.org/stable/p/2d5b4b3376fa146a23917b8577064906d643925f",
                "filename": "CVE-2024-26837-2d5b4b3376fa146a23917b8577064906d643925f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26837/CVE-2024-26837-2d5b4b3376fa146a23917b8577064906d643925f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/603be95437e7fd85ba694e75918067fb9e7754db",
                "patch_url": "https://git.kernel.org/stable/p/603be95437e7fd85ba694e75918067fb9e7754db",
                "filename": "CVE-2024-26837-603be95437e7fd85ba694e75918067fb9e7754db.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26837/CVE-2024-26837-603be95437e7fd85ba694e75918067fb9e7754db.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dc489f86257cab5056e747344f17a164f63bff4b",
                "patch_url": "https://git.kernel.org/stable/p/dc489f86257cab5056e747344f17a164f63bff4b",
                "filename": "CVE-2024-26837-dc489f86257cab5056e747344f17a164f63bff4b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26837/CVE-2024-26837-dc489f86257cab5056e747344f17a164f63bff4b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e0b4c5b1d760008f1dd18c07c35af0442e54f9c8",
                "patch_url": "https://git.kernel.org/stable/p/e0b4c5b1d760008f1dd18c07c35af0442e54f9c8",
                "filename": "CVE-2024-26837-e0b4c5b1d760008f1dd18c07c35af0442e54f9c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26837/CVE-2024-26837-e0b4c5b1d760008f1dd18c07c35af0442e54f9c8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2d5b4b3376fa146a23917b8577064906d643925f",
            "https://git.kernel.org/stable/c/603be95437e7fd85ba694e75918067fb9e7754db",
            "https://git.kernel.org/stable/c/dc489f86257cab5056e747344f17a164f63bff4b",
            "https://git.kernel.org/stable/c/e0b4c5b1d760008f1dd18c07c35af0442e54f9c8",
            "https://www.cve.org/CVERecord?id=CVE-2024-26837\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26837\nhttps://lore.kernel.org/linux-cve-announce/2024041715-CVE-2024-26837-753c@gregkh/T"
        ]
    },
    "CVE-2024-26840": {
        "cve": "CVE-2024-26840",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: fix memory leak in cachefiles_add_cache()\n\nThe following memory leak was reported after unbinding /dev/cachefiles:\n\n==================================================================\nunreferenced object 0xffff9b674176e3c0 (size 192):\n  comm \"cachefilesd2\", pid 680, jiffies 4294881224\n  hex dump (first 32 bytes):\n    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace (crc ea38a44b):\n    [<ffffffff8eb8a1a5>] kmem_cache_alloc+0x2d5/0x370\n    [<ffffffff8e917f86>] prepare_creds+0x26/0x2e0\n    [<ffffffffc002eeef>] cachefiles_determine_cache_security+0x1f/0x120\n    [<ffffffffc00243ec>] cachefiles_add_cache+0x13c/0x3a0\n    [<ffffffffc0025216>] cachefiles_daemon_write+0x146/0x1c0\n    [<ffffffff8ebc4a3b>] vfs_write+0xcb/0x520\n    [<ffffffff8ebc5069>] ksys_write+0x69/0xf0\n    [<ffffffff8f6d4662>] do_syscall_64+0x72/0x140\n    [<ffffffff8f8000aa>] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n==================================================================\n\nPut the reference count of cache_cred in cachefiles_daemon_unbind() to\nfix the problem. And also put cache_cred in cachefiles_add_cache() error\nbranch to avoid memory leaks.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26840",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/94965be37add0983672e48ecb33cdbda92b62579",
            "patch_url": "https://git.kernel.org/stable/p/94965be37add0983672e48ecb33cdbda92b62579",
            "filename": "CVE-2024-26840-94965be37add0983672e48ecb33cdbda92b62579.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26840/CVE-2024-26840-94965be37add0983672e48ecb33cdbda92b62579.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/037d5a949b0455540ef9aab34c10ddf54b65d285",
                "patch_url": "https://git.kernel.org/stable/p/037d5a949b0455540ef9aab34c10ddf54b65d285",
                "filename": "CVE-2024-26840-037d5a949b0455540ef9aab34c10ddf54b65d285.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26840/CVE-2024-26840-037d5a949b0455540ef9aab34c10ddf54b65d285.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/38e921616320d159336b0ffadb09e9fb4945c7c3",
                "patch_url": "https://git.kernel.org/stable/p/38e921616320d159336b0ffadb09e9fb4945c7c3",
                "filename": "CVE-2024-26840-38e921616320d159336b0ffadb09e9fb4945c7c3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26840/CVE-2024-26840-38e921616320d159336b0ffadb09e9fb4945c7c3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/43eccc5823732ba6daab2511ed32dfc545a666d8",
                "patch_url": "https://git.kernel.org/stable/p/43eccc5823732ba6daab2511ed32dfc545a666d8",
                "filename": "CVE-2024-26840-43eccc5823732ba6daab2511ed32dfc545a666d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26840/CVE-2024-26840-43eccc5823732ba6daab2511ed32dfc545a666d8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8b218e2f0a27a9f09428b1847b4580640b9d1e58",
                "patch_url": "https://git.kernel.org/stable/p/8b218e2f0a27a9f09428b1847b4580640b9d1e58",
                "filename": "CVE-2024-26840-8b218e2f0a27a9f09428b1847b4580640b9d1e58.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26840/CVE-2024-26840-8b218e2f0a27a9f09428b1847b4580640b9d1e58.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/94965be37add0983672e48ecb33cdbda92b62579",
                "patch_url": "https://git.kernel.org/stable/p/94965be37add0983672e48ecb33cdbda92b62579",
                "filename": "CVE-2024-26840-94965be37add0983672e48ecb33cdbda92b62579.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26840/CVE-2024-26840-94965be37add0983672e48ecb33cdbda92b62579.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9cac69912052a4def571fedf1cb9bb4ec590e25a",
                "patch_url": "https://git.kernel.org/stable/p/9cac69912052a4def571fedf1cb9bb4ec590e25a",
                "filename": "CVE-2024-26840-9cac69912052a4def571fedf1cb9bb4ec590e25a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26840/CVE-2024-26840-9cac69912052a4def571fedf1cb9bb4ec590e25a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cb5466783793e66272624cf71925ae1d1ba32083",
                "patch_url": "https://git.kernel.org/stable/p/cb5466783793e66272624cf71925ae1d1ba32083",
                "filename": "CVE-2024-26840-cb5466783793e66272624cf71925ae1d1ba32083.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26840/CVE-2024-26840-cb5466783793e66272624cf71925ae1d1ba32083.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e21a2f17566cbd64926fb8f16323972f7a064444",
                "patch_url": "https://git.kernel.org/stable/p/e21a2f17566cbd64926fb8f16323972f7a064444",
                "filename": "CVE-2024-26840-e21a2f17566cbd64926fb8f16323972f7a064444.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26840/CVE-2024-26840-e21a2f17566cbd64926fb8f16323972f7a064444.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/037d5a949b0455540ef9aab34c10ddf54b65d285",
            "https://git.kernel.org/stable/c/38e921616320d159336b0ffadb09e9fb4945c7c3",
            "https://git.kernel.org/stable/c/43eccc5823732ba6daab2511ed32dfc545a666d8",
            "https://git.kernel.org/stable/c/8b218e2f0a27a9f09428b1847b4580640b9d1e58",
            "https://git.kernel.org/stable/c/94965be37add0983672e48ecb33cdbda92b62579",
            "https://git.kernel.org/stable/c/9cac69912052a4def571fedf1cb9bb4ec590e25a",
            "https://git.kernel.org/stable/c/cb5466783793e66272624cf71925ae1d1ba32083",
            "https://git.kernel.org/stable/c/e21a2f17566cbd64926fb8f16323972f7a064444",
            "https://www.cve.org/CVERecord?id=CVE-2024-26840\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26840\nhttps://lore.kernel.org/linux-cve-announce/2024041715-CVE-2024-26840-057d@gregkh/T"
        ]
    },
    "CVE-2024-26843": {
        "cve": "CVE-2024-26843",
        "cvss_v2": null,
        "cvss_v3": 6,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nefi: runtime: Fix potential overflow of soft-reserved region size\n\nmd_size will have been narrowed if we have >= 4GB worth of pages in a\nsoft-reserved region.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26843",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/156cb12ffdcf33883304f0db645e1eadae712fe0",
            "patch_url": "https://git.kernel.org/stable/p/156cb12ffdcf33883304f0db645e1eadae712fe0",
            "filename": "CVE-2024-26843-156cb12ffdcf33883304f0db645e1eadae712fe0.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26843/CVE-2024-26843-156cb12ffdcf33883304f0db645e1eadae712fe0.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/156cb12ffdcf33883304f0db645e1eadae712fe0",
                "patch_url": "https://git.kernel.org/stable/p/156cb12ffdcf33883304f0db645e1eadae712fe0",
                "filename": "CVE-2024-26843-156cb12ffdcf33883304f0db645e1eadae712fe0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26843/CVE-2024-26843-156cb12ffdcf33883304f0db645e1eadae712fe0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4aa36b62c3eaa869860bf78b1146e9f2b5f782a9",
                "patch_url": "https://git.kernel.org/stable/p/4aa36b62c3eaa869860bf78b1146e9f2b5f782a9",
                "filename": "CVE-2024-26843-4aa36b62c3eaa869860bf78b1146e9f2b5f782a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26843/CVE-2024-26843-4aa36b62c3eaa869860bf78b1146e9f2b5f782a9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4fff3d735baea104017f2e3c245e27cdc79f2426",
                "patch_url": "https://git.kernel.org/stable/p/4fff3d735baea104017f2e3c245e27cdc79f2426",
                "filename": "CVE-2024-26843-4fff3d735baea104017f2e3c245e27cdc79f2426.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26843/CVE-2024-26843-4fff3d735baea104017f2e3c245e27cdc79f2426.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/700c3f642c32721f246e09d3a9511acf40ae42be",
                "patch_url": "https://git.kernel.org/stable/p/700c3f642c32721f246e09d3a9511acf40ae42be",
                "filename": "CVE-2024-26843-700c3f642c32721f246e09d3a9511acf40ae42be.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26843/CVE-2024-26843-700c3f642c32721f246e09d3a9511acf40ae42be.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf3d6813601fe496de7f023435e31bfffa74ae70",
                "patch_url": "https://git.kernel.org/stable/p/cf3d6813601fe496de7f023435e31bfffa74ae70",
                "filename": "CVE-2024-26843-cf3d6813601fe496de7f023435e31bfffa74ae70.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26843/CVE-2024-26843-cf3d6813601fe496de7f023435e31bfffa74ae70.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/de1034b38a346ef6be25fe8792f5d1e0684d5ff4",
                "patch_url": "https://git.kernel.org/stable/p/de1034b38a346ef6be25fe8792f5d1e0684d5ff4",
                "filename": "CVE-2024-26843-de1034b38a346ef6be25fe8792f5d1e0684d5ff4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26843/CVE-2024-26843-de1034b38a346ef6be25fe8792f5d1e0684d5ff4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/156cb12ffdcf33883304f0db645e1eadae712fe0",
            "https://git.kernel.org/stable/c/4aa36b62c3eaa869860bf78b1146e9f2b5f782a9",
            "https://git.kernel.org/stable/c/4fff3d735baea104017f2e3c245e27cdc79f2426",
            "https://git.kernel.org/stable/c/700c3f642c32721f246e09d3a9511acf40ae42be",
            "https://git.kernel.org/stable/c/cf3d6813601fe496de7f023435e31bfffa74ae70",
            "https://git.kernel.org/stable/c/de1034b38a346ef6be25fe8792f5d1e0684d5ff4",
            "https://www.cve.org/CVERecord?id=CVE-2024-26843\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26843\nhttps://lore.kernel.org/linux-cve-announce/2024041716-CVE-2024-26843-51a0@gregkh/T"
        ]
    },
    "CVE-2024-26846": {
        "cve": "CVE-2024-26846",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-fc: do not wait in vain when unloading module\n\nThe module exit path has race between deleting all controllers and\nfreeing 'left over IDs'. To prevent double free a synchronization\nbetween nvme_delete_ctrl and ida_destroy has been added by the initial\ncommit.\n\nThere is some logic around trying to prevent from hanging forever in\nwait_for_completion, though it does not handling all cases. E.g.\nblktests is able to reproduce the situation where the module unload\nhangs forever.\n\nIf we completely rely on the cleanup code executed from the\nnvme_delete_ctrl path, all IDs will be freed eventually. This makes\ncalling ida_destroy unnecessary. We only have to ensure that all\nnvme_delete_ctrl code has been executed before we leave\nnvme_fc_exit_module. This is done by flushing the nvme_delete_wq\nworkqueue.\n\nWhile at it, remove the unused nvme_fc_wq workqueue too.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26846",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0bf567d6d9ffe09e059bbdfb4d07143cef42c75c",
            "patch_url": "https://git.kernel.org/stable/p/0bf567d6d9ffe09e059bbdfb4d07143cef42c75c",
            "filename": "CVE-2024-26846-0bf567d6d9ffe09e059bbdfb4d07143cef42c75c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26846/CVE-2024-26846-0bf567d6d9ffe09e059bbdfb4d07143cef42c75c.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/085195aa90a924c79e35569bcdad860d764a8e17",
                "patch_url": "https://git.kernel.org/stable/p/085195aa90a924c79e35569bcdad860d764a8e17",
                "filename": "CVE-2024-26846-085195aa90a924c79e35569bcdad860d764a8e17.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26846/CVE-2024-26846-085195aa90a924c79e35569bcdad860d764a8e17.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0bf567d6d9ffe09e059bbdfb4d07143cef42c75c",
                "patch_url": "https://git.kernel.org/stable/p/0bf567d6d9ffe09e059bbdfb4d07143cef42c75c",
                "filename": "CVE-2024-26846-0bf567d6d9ffe09e059bbdfb4d07143cef42c75c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26846/CVE-2024-26846-0bf567d6d9ffe09e059bbdfb4d07143cef42c75c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f2c95015ec2a1899161be6c0bdaecedd5a7bfb2",
                "patch_url": "https://git.kernel.org/stable/p/4f2c95015ec2a1899161be6c0bdaecedd5a7bfb2",
                "filename": "CVE-2024-26846-4f2c95015ec2a1899161be6c0bdaecedd5a7bfb2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26846/CVE-2024-26846-4f2c95015ec2a1899161be6c0bdaecedd5a7bfb2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/70fbfc47a392b98e5f8dba70c6efc6839205c982",
                "patch_url": "https://git.kernel.org/stable/p/70fbfc47a392b98e5f8dba70c6efc6839205c982",
                "filename": "CVE-2024-26846-70fbfc47a392b98e5f8dba70c6efc6839205c982.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26846/CVE-2024-26846-70fbfc47a392b98e5f8dba70c6efc6839205c982.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/baa6b7eb8c66486bd64608adc63fe03b30d3c0b9",
                "patch_url": "https://git.kernel.org/stable/p/baa6b7eb8c66486bd64608adc63fe03b30d3c0b9",
                "filename": "CVE-2024-26846-baa6b7eb8c66486bd64608adc63fe03b30d3c0b9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26846/CVE-2024-26846-baa6b7eb8c66486bd64608adc63fe03b30d3c0b9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c0882c366418bf9c19e1ba7f270fe377a9bf5d67",
                "patch_url": "https://git.kernel.org/stable/p/c0882c366418bf9c19e1ba7f270fe377a9bf5d67",
                "filename": "CVE-2024-26846-c0882c366418bf9c19e1ba7f270fe377a9bf5d67.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26846/CVE-2024-26846-c0882c366418bf9c19e1ba7f270fe377a9bf5d67.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/085195aa90a924c79e35569bcdad860d764a8e17",
            "https://git.kernel.org/stable/c/0bf567d6d9ffe09e059bbdfb4d07143cef42c75c",
            "https://git.kernel.org/stable/c/4f2c95015ec2a1899161be6c0bdaecedd5a7bfb2",
            "https://git.kernel.org/stable/c/70fbfc47a392b98e5f8dba70c6efc6839205c982",
            "https://git.kernel.org/stable/c/baa6b7eb8c66486bd64608adc63fe03b30d3c0b9",
            "https://git.kernel.org/stable/c/c0882c366418bf9c19e1ba7f270fe377a9bf5d67",
            "https://www.cve.org/CVERecord?id=CVE-2024-26846\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26846\nhttps://lore.kernel.org/linux-cve-announce/2024041717-CVE-2024-26846-9593@gregkh/T"
        ]
    },
    "CVE-2024-26851": {
        "cve": "CVE-2024-26851",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_conntrack_h323: Add protection for bmp length out of range\n\nUBSAN load reports an exception of BRK#5515 SHIFT_ISSUE:Bitwise shifts\nthat are out of bounds for their data type.\n\nvmlinux   get_bitmap(b=75) + 712\n<net/netfilter/nf_conntrack_h323_asn1.c:0>\nvmlinux   decode_seq(bs=0xFFFFFFD008037000, f=0xFFFFFFD008037018, level=134443100) + 1956\n<net/netfilter/nf_conntrack_h323_asn1.c:592>\nvmlinux   decode_choice(base=0xFFFFFFD0080370F0, level=23843636) + 1216\n<net/netfilter/nf_conntrack_h323_asn1.c:814>\nvmlinux   decode_seq(f=0xFFFFFFD0080371A8, level=134443500) + 812\n<net/netfilter/nf_conntrack_h323_asn1.c:576>\nvmlinux   decode_choice(base=0xFFFFFFD008037280, level=0) + 1216\n<net/netfilter/nf_conntrack_h323_asn1.c:814>\nvmlinux   DecodeRasMessage() + 304\n<net/netfilter/nf_conntrack_h323_asn1.c:833>\nvmlinux   ras_help() + 684\n<net/netfilter/nf_conntrack_h323_main.c:1728>\nvmlinux   nf_confirm() + 188\n<net/netfilter/nf_conntrack_proto.c:137>\n\nDue to abnormal data in skb->data, the extension bitmap length\nexceeds 32 when decoding ras message then uses the length to make\na shift operation. It will change into negative after several loop.\nUBSAN load could detect a negative shift as an undefined behaviour\nand reports exception.\nSo we add the protection to avoid the length exceeding 32. Or else\nit will return out of range error and stop decoding.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26851",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/98db42191329c679f4ca52bec0b319689e1ad8cb",
            "patch_url": "https://git.kernel.org/stable/p/98db42191329c679f4ca52bec0b319689e1ad8cb",
            "filename": "CVE-2024-26851-98db42191329c679f4ca52bec0b319689e1ad8cb.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26851/CVE-2024-26851-98db42191329c679f4ca52bec0b319689e1ad8cb.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/014a807f1cc9c9d5173c1cd935835553b00d211c",
                "patch_url": "https://git.kernel.org/stable/p/014a807f1cc9c9d5173c1cd935835553b00d211c",
                "filename": "CVE-2024-26851-014a807f1cc9c9d5173c1cd935835553b00d211c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26851/CVE-2024-26851-014a807f1cc9c9d5173c1cd935835553b00d211c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/39001e3c42000e7c2038717af0d33c32319ad591",
                "patch_url": "https://git.kernel.org/stable/p/39001e3c42000e7c2038717af0d33c32319ad591",
                "filename": "CVE-2024-26851-39001e3c42000e7c2038717af0d33c32319ad591.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26851/CVE-2024-26851-39001e3c42000e7c2038717af0d33c32319ad591.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4bafcc43baf7bcf93566394dbd15726b5b456b7a",
                "patch_url": "https://git.kernel.org/stable/p/4bafcc43baf7bcf93566394dbd15726b5b456b7a",
                "filename": "CVE-2024-26851-4bafcc43baf7bcf93566394dbd15726b5b456b7a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26851/CVE-2024-26851-4bafcc43baf7bcf93566394dbd15726b5b456b7a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/767146637efc528b5e3d31297df115e85a2fd362",
                "patch_url": "https://git.kernel.org/stable/p/767146637efc528b5e3d31297df115e85a2fd362",
                "filename": "CVE-2024-26851-767146637efc528b5e3d31297df115e85a2fd362.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26851/CVE-2024-26851-767146637efc528b5e3d31297df115e85a2fd362.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/80ee5054435a11c87c9a4f30f1ff750080c96416",
                "patch_url": "https://git.kernel.org/stable/p/80ee5054435a11c87c9a4f30f1ff750080c96416",
                "filename": "CVE-2024-26851-80ee5054435a11c87c9a4f30f1ff750080c96416.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26851/CVE-2024-26851-80ee5054435a11c87c9a4f30f1ff750080c96416.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/98db42191329c679f4ca52bec0b319689e1ad8cb",
                "patch_url": "https://git.kernel.org/stable/p/98db42191329c679f4ca52bec0b319689e1ad8cb",
                "filename": "CVE-2024-26851-98db42191329c679f4ca52bec0b319689e1ad8cb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26851/CVE-2024-26851-98db42191329c679f4ca52bec0b319689e1ad8cb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b3c0f553820516ad4b62a9390ecd28d6f73a7b13",
                "patch_url": "https://git.kernel.org/stable/p/b3c0f553820516ad4b62a9390ecd28d6f73a7b13",
                "filename": "CVE-2024-26851-b3c0f553820516ad4b62a9390ecd28d6f73a7b13.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26851/CVE-2024-26851-b3c0f553820516ad4b62a9390ecd28d6f73a7b13.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ccd1108b16ab572d9bf635586b0925635dbd6bbc",
                "patch_url": "https://git.kernel.org/stable/p/ccd1108b16ab572d9bf635586b0925635dbd6bbc",
                "filename": "CVE-2024-26851-ccd1108b16ab572d9bf635586b0925635dbd6bbc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26851/CVE-2024-26851-ccd1108b16ab572d9bf635586b0925635dbd6bbc.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/014a807f1cc9c9d5173c1cd935835553b00d211c",
            "https://git.kernel.org/stable/c/39001e3c42000e7c2038717af0d33c32319ad591",
            "https://git.kernel.org/stable/c/4bafcc43baf7bcf93566394dbd15726b5b456b7a",
            "https://git.kernel.org/stable/c/767146637efc528b5e3d31297df115e85a2fd362",
            "https://git.kernel.org/stable/c/80ee5054435a11c87c9a4f30f1ff750080c96416",
            "https://git.kernel.org/stable/c/98db42191329c679f4ca52bec0b319689e1ad8cb",
            "https://git.kernel.org/stable/c/b3c0f553820516ad4b62a9390ecd28d6f73a7b13",
            "https://git.kernel.org/stable/c/ccd1108b16ab572d9bf635586b0925635dbd6bbc",
            "https://www.cve.org/CVERecord?id=CVE-2024-26851\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26851\nhttps://lore.kernel.org/linux-cve-announce/2024041723-CVE-2024-26851-4652@gregkh/T"
        ]
    },
    "CVE-2024-26852": {
        "cve": "CVE-2024-26852",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ipv6: avoid possible UAF in ip6_route_mpath_notify()\n\nsyzbot found another use-after-free in ip6_route_mpath_notify() [1]\n\nCommit f7225172f25a (\"net/ipv6: prevent use after free in\nip6_route_mpath_notify\") was not able to fix the root cause.\n\nWe need to defer the fib6_info_release() calls after\nip6_route_mpath_notify(), in the cleanup phase.\n\n[1]\nBUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0\nRead of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037\n\nCPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\nCall Trace:\n <TASK>\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106\n  print_address_description mm/kasan/report.c:377 [inline]\n  print_report+0x167/0x540 mm/kasan/report.c:488\n  kasan_report+0x142/0x180 mm/kasan/report.c:601\n rt6_fill_node+0x1460/0x1ac0\n  inet6_rt_notify+0x13b/0x290 net/ipv6/route.c:6184\n  ip6_route_mpath_notify net/ipv6/route.c:5198 [inline]\n  ip6_route_multipath_add net/ipv6/route.c:5404 [inline]\n  inet6_rtm_newroute+0x1d0f/0x2300 net/ipv6/route.c:5517\n  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597\n  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543\n  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367\n  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x221/0x270 net/socket.c:745\n  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584\n  ___sys_sendmsg net/socket.c:2638 [inline]\n  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667\n do_syscall_64+0xf9/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\nRIP: 0033:0x7f73dd87dda9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f73de6550c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 00007f73dd9ac050 RCX: 00007f73dd87dda9\nRDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005\nRBP: 00007f73dd8ca47a R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000006e R14: 00007f73dd9ac050 R15: 00007ffdbdeb7858\n </TASK>\n\nAllocated by task 23037:\n  kasan_save_stack mm/kasan/common.c:47 [inline]\n  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n  poison_kmalloc_redzone mm/kasan/common.c:372 [inline]\n  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:389\n  kasan_kmalloc include/linux/kasan.h:211 [inline]\n  __do_kmalloc_node mm/slub.c:3981 [inline]\n  __kmalloc+0x22e/0x490 mm/slub.c:3994\n  kmalloc include/linux/slab.h:594 [inline]\n  kzalloc include/linux/slab.h:711 [inline]\n  fib6_info_alloc+0x2e/0xf0 net/ipv6/ip6_fib.c:155\n  ip6_route_info_create+0x445/0x12b0 net/ipv6/route.c:3758\n  ip6_route_multipath_add net/ipv6/route.c:5298 [inline]\n  inet6_rtm_newroute+0x744/0x2300 net/ipv6/route.c:5517\n  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597\n  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543\n  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367\n  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x221/0x270 net/socket.c:745\n  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584\n  ___sys_sendmsg net/socket.c:2638 [inline]\n  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667\n do_syscall_64+0xf9/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\n\nFreed by task 16:\n  kasan_save_stack mm/kasan/common.c:47 [inline]\n  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n  kasan_save_free_info+0x4e/0x60 mm/kasan/generic.c:640\n  poison_slab_object+0xa6/0xe0 m\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26852",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/31ea5bcc7d4cd1423de6be327a2c034725704136",
            "patch_url": "https://git.kernel.org/stable/p/31ea5bcc7d4cd1423de6be327a2c034725704136",
            "filename": "CVE-2024-26852-31ea5bcc7d4cd1423de6be327a2c034725704136.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26852/CVE-2024-26852-31ea5bcc7d4cd1423de6be327a2c034725704136.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/31ea5bcc7d4cd1423de6be327a2c034725704136",
                "patch_url": "https://git.kernel.org/stable/p/31ea5bcc7d4cd1423de6be327a2c034725704136",
                "filename": "CVE-2024-26852-31ea5bcc7d4cd1423de6be327a2c034725704136.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26852/CVE-2024-26852-31ea5bcc7d4cd1423de6be327a2c034725704136.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/394334fe2ae3b9f1e2332b873857e84cb28aac18",
                "patch_url": "https://git.kernel.org/stable/p/394334fe2ae3b9f1e2332b873857e84cb28aac18",
                "filename": "CVE-2024-26852-394334fe2ae3b9f1e2332b873857e84cb28aac18.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26852/CVE-2024-26852-394334fe2ae3b9f1e2332b873857e84cb28aac18.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/61b34f73cdbdb8eaf9ea12e9e2eb3b29716c4dda",
                "patch_url": "https://git.kernel.org/stable/p/61b34f73cdbdb8eaf9ea12e9e2eb3b29716c4dda",
                "filename": "CVE-2024-26852-61b34f73cdbdb8eaf9ea12e9e2eb3b29716c4dda.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26852/CVE-2024-26852-61b34f73cdbdb8eaf9ea12e9e2eb3b29716c4dda.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/664f9c647260cc9d68b4e31d9899530d89dd045e",
                "patch_url": "https://git.kernel.org/stable/p/664f9c647260cc9d68b4e31d9899530d89dd045e",
                "filename": "CVE-2024-26852-664f9c647260cc9d68b4e31d9899530d89dd045e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26852/CVE-2024-26852-664f9c647260cc9d68b4e31d9899530d89dd045e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/685f7d531264599b3f167f1e94bbd22f120e5fab",
                "patch_url": "https://git.kernel.org/stable/p/685f7d531264599b3f167f1e94bbd22f120e5fab",
                "filename": "CVE-2024-26852-685f7d531264599b3f167f1e94bbd22f120e5fab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26852/CVE-2024-26852-685f7d531264599b3f167f1e94bbd22f120e5fab.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/79ce2e54cc0ae366f45516c00bf1b19aa43e9abe",
                "patch_url": "https://git.kernel.org/stable/p/79ce2e54cc0ae366f45516c00bf1b19aa43e9abe",
                "filename": "CVE-2024-26852-79ce2e54cc0ae366f45516c00bf1b19aa43e9abe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26852/CVE-2024-26852-79ce2e54cc0ae366f45516c00bf1b19aa43e9abe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cae3303257950d03ffec2df4a45e836f10d26c24",
                "patch_url": "https://git.kernel.org/stable/p/cae3303257950d03ffec2df4a45e836f10d26c24",
                "filename": "CVE-2024-26852-cae3303257950d03ffec2df4a45e836f10d26c24.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26852/CVE-2024-26852-cae3303257950d03ffec2df4a45e836f10d26c24.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ed883060c38721ed828061f6c0c30e5147326c9a",
                "patch_url": "https://git.kernel.org/stable/p/ed883060c38721ed828061f6c0c30e5147326c9a",
                "filename": "CVE-2024-26852-ed883060c38721ed828061f6c0c30e5147326c9a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26852/CVE-2024-26852-ed883060c38721ed828061f6c0c30e5147326c9a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/31ea5bcc7d4cd1423de6be327a2c034725704136",
            "https://git.kernel.org/stable/c/394334fe2ae3b9f1e2332b873857e84cb28aac18",
            "https://git.kernel.org/stable/c/61b34f73cdbdb8eaf9ea12e9e2eb3b29716c4dda",
            "https://git.kernel.org/stable/c/664f9c647260cc9d68b4e31d9899530d89dd045e",
            "https://git.kernel.org/stable/c/685f7d531264599b3f167f1e94bbd22f120e5fab",
            "https://git.kernel.org/stable/c/79ce2e54cc0ae366f45516c00bf1b19aa43e9abe",
            "https://git.kernel.org/stable/c/cae3303257950d03ffec2df4a45e836f10d26c24",
            "https://git.kernel.org/stable/c/ed883060c38721ed828061f6c0c30e5147326c9a",
            "https://www.cve.org/CVERecord?id=CVE-2024-26852\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26852\nhttps://lore.kernel.org/linux-cve-announce/2024041723-CVE-2024-26852-0057@gregkh/T"
        ]
    },
    "CVE-2024-26853": {
        "cve": "CVE-2024-26853",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nigc: avoid returning frame twice in XDP_REDIRECT\n\nWhen a frame can not be transmitted in XDP_REDIRECT\n(e.g. due to a full queue), it is necessary to free\nit by calling xdp_return_frame_rx_napi.\n\nHowever, this is the responsibility of the caller of\nthe ndo_xdp_xmit (see for example bq_xmit_all in\nkernel/bpf/devmap.c) and thus calling it inside\nigc_xdp_xmit (which is the ndo_xdp_xmit of the igc\ndriver) as well will lead to memory corruption.\n\nIn fact, bq_xmit_all expects that it can return all\nframes after the last successfully transmitted one.\nTherefore, break for the first not transmitted frame,\nbut do not call xdp_return_frame_rx_napi in igc_xdp_xmit.\nThis is equally implemented in other Intel drivers\nsuch as the igb.\n\nThere are two alternatives to this that were rejected:\n1. Return num_frames as all the frames would have been\n   transmitted and release them inside igc_xdp_xmit.\n   While it might work technically, it is not what\n   the return value is meant to represent (i.e. the\n   number of SUCCESSFULLY transmitted packets).\n2. Rework kernel/bpf/devmap.c and all drivers to\n   support non-consecutively dropped packets.\n   Besides being complex, it likely has a negative\n   performance impact without a significant gain\n   since it is anyway unlikely that the next frame\n   can be transmitted if the previous one was dropped.\n\nThe memory corruption can be reproduced with\nthe following script which leads to a kernel panic\nafter a few seconds.  It basically generates more\ntraffic than a i225 NIC can transmit and pushes it\nvia XDP_REDIRECT from a virtual interface to the\nphysical interface where frames get dropped.\n\n   #!/bin/bash\n   INTERFACE=enp4s0\n   INTERFACE_IDX=`cat /sys/class/net/$INTERFACE/ifindex`\n\n   sudo ip link add dev veth1 type veth peer name veth2\n   sudo ip link set up $INTERFACE\n   sudo ip link set up veth1\n   sudo ip link set up veth2\n\n   cat << EOF > redirect.bpf.c\n\n   SEC(\"prog\")\n   int redirect(struct xdp_md *ctx)\n   {\n       return bpf_redirect($INTERFACE_IDX, 0);\n   }\n\n   char _license[] SEC(\"license\") = \"GPL\";\n   EOF\n   clang -O2 -g -Wall -target bpf -c redirect.bpf.c -o redirect.bpf.o\n   sudo ip link set veth2 xdp obj redirect.bpf.o\n\n   cat << EOF > pass.bpf.c\n\n   SEC(\"prog\")\n   int pass(struct xdp_md *ctx)\n   {\n       return XDP_PASS;\n   }\n\n   char _license[] SEC(\"license\") = \"GPL\";\n   EOF\n   clang -O2 -g -Wall -target bpf -c pass.bpf.c -o pass.bpf.o\n   sudo ip link set $INTERFACE xdp obj pass.bpf.o\n\n   cat << EOF > trafgen.cfg\n\n   {\n     /* Ethernet Header */\n     0xe8, 0x6a, 0x64, 0x41, 0xbf, 0x46,\n     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,\n     const16(ETH_P_IP),\n\n     /* IPv4 Header */\n     0b01000101, 0,   # IPv4 version, IHL, TOS\n     const16(1028),   # IPv4 total length (UDP length + 20 bytes (IP header))\n     const16(2),      # IPv4 ident\n     0b01000000, 0,   # IPv4 flags, fragmentation off\n     64,              # IPv4 TTL\n     17,              # Protocol UDP\n     csumip(14, 33),  # IPv4 checksum\n\n     /* UDP Header */\n     10,  0, 1, 1,    # IP Src - adapt as needed\n     10,  0, 1, 2,    # IP Dest - adapt as needed\n     const16(6666),   # UDP Src Port\n     const16(6666),   # UDP Dest Port\n     const16(1008),   # UDP length (UDP header 8 bytes + payload length)\n     csumudp(14, 34), # UDP checksum\n\n     /* Payload */\n     fill('W', 1000),\n   }\n   EOF\n\n   sudo trafgen -i trafgen.cfg -b3000MB -o veth1 --cpp",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26853",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/63a3c1f3c9ecc654d851e7906d05334cd0c236e2",
            "patch_url": "https://git.kernel.org/stable/p/63a3c1f3c9ecc654d851e7906d05334cd0c236e2",
            "filename": "CVE-2024-26853-63a3c1f3c9ecc654d851e7906d05334cd0c236e2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26853/CVE-2024-26853-63a3c1f3c9ecc654d851e7906d05334cd0c236e2.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1b3b8231386a572bac8cd5b6fd7e944b84f9bb1f",
                "patch_url": "https://git.kernel.org/stable/p/1b3b8231386a572bac8cd5b6fd7e944b84f9bb1f",
                "filename": "CVE-2024-26853-1b3b8231386a572bac8cd5b6fd7e944b84f9bb1f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26853/CVE-2024-26853-1b3b8231386a572bac8cd5b6fd7e944b84f9bb1f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/63a3c1f3c9ecc654d851e7906d05334cd0c236e2",
                "patch_url": "https://git.kernel.org/stable/p/63a3c1f3c9ecc654d851e7906d05334cd0c236e2",
                "filename": "CVE-2024-26853-63a3c1f3c9ecc654d851e7906d05334cd0c236e2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26853/CVE-2024-26853-63a3c1f3c9ecc654d851e7906d05334cd0c236e2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8df393af9e7e8dfd62e9c41dbaa4d2ff53bf794a",
                "patch_url": "https://git.kernel.org/stable/p/8df393af9e7e8dfd62e9c41dbaa4d2ff53bf794a",
                "filename": "CVE-2024-26853-8df393af9e7e8dfd62e9c41dbaa4d2ff53bf794a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26853/CVE-2024-26853-8df393af9e7e8dfd62e9c41dbaa4d2ff53bf794a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ef27f655b438bed4c83680e4f01e1cde2739854b",
                "patch_url": "https://git.kernel.org/stable/p/ef27f655b438bed4c83680e4f01e1cde2739854b",
                "filename": "CVE-2024-26853-ef27f655b438bed4c83680e4f01e1cde2739854b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26853/CVE-2024-26853-ef27f655b438bed4c83680e4f01e1cde2739854b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1b3b8231386a572bac8cd5b6fd7e944b84f9bb1f",
            "https://git.kernel.org/stable/c/63a3c1f3c9ecc654d851e7906d05334cd0c236e2",
            "https://git.kernel.org/stable/c/8df393af9e7e8dfd62e9c41dbaa4d2ff53bf794a",
            "https://git.kernel.org/stable/c/ef27f655b438bed4c83680e4f01e1cde2739854b",
            "https://www.cve.org/CVERecord?id=CVE-2024-26853\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26853\nhttps://lore.kernel.org/linux-cve-announce/2024041723-CVE-2024-26853-b549@gregkh/T"
        ]
    },
    "CVE-2024-26855": {
        "cve": "CVE-2024-26855",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()\n\nThe function ice_bridge_setlink() may encounter a NULL pointer dereference\nif nlmsg_find_attr() returns NULL and br_spec is dereferenced subsequently\nin nla_for_each_nested(). To address this issue, add a check to ensure that\nbr_spec is not NULL before proceeding with the nested attribute iteration.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26855",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/afdd29726a6de4ba27cd15590661424c888dc596",
            "patch_url": "https://git.kernel.org/stable/p/afdd29726a6de4ba27cd15590661424c888dc596",
            "filename": "CVE-2024-26855-afdd29726a6de4ba27cd15590661424c888dc596.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26855/CVE-2024-26855-afdd29726a6de4ba27cd15590661424c888dc596.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/06e456a05d669ca30b224b8ed962421770c1496c",
                "patch_url": "https://git.kernel.org/stable/p/06e456a05d669ca30b224b8ed962421770c1496c",
                "filename": "CVE-2024-26855-06e456a05d669ca30b224b8ed962421770c1496c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26855/CVE-2024-26855-06e456a05d669ca30b224b8ed962421770c1496c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0e296067ae0d74a10b4933601f9aa9f0ec8f157f",
                "patch_url": "https://git.kernel.org/stable/p/0e296067ae0d74a10b4933601f9aa9f0ec8f157f",
                "filename": "CVE-2024-26855-0e296067ae0d74a10b4933601f9aa9f0ec8f157f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26855/CVE-2024-26855-0e296067ae0d74a10b4933601f9aa9f0ec8f157f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1a770927dc1d642b22417c3e668c871689fc58b3",
                "patch_url": "https://git.kernel.org/stable/p/1a770927dc1d642b22417c3e668c871689fc58b3",
                "filename": "CVE-2024-26855-1a770927dc1d642b22417c3e668c871689fc58b3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26855/CVE-2024-26855-1a770927dc1d642b22417c3e668c871689fc58b3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/37fe99016b12d32100ce670216816dba6c48b309",
                "patch_url": "https://git.kernel.org/stable/p/37fe99016b12d32100ce670216816dba6c48b309",
                "filename": "CVE-2024-26855-37fe99016b12d32100ce670216816dba6c48b309.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26855/CVE-2024-26855-37fe99016b12d32100ce670216816dba6c48b309.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8d95465d9a424200485792858c5b3be54658ce19",
                "patch_url": "https://git.kernel.org/stable/p/8d95465d9a424200485792858c5b3be54658ce19",
                "filename": "CVE-2024-26855-8d95465d9a424200485792858c5b3be54658ce19.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26855/CVE-2024-26855-8d95465d9a424200485792858c5b3be54658ce19.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/afdd29726a6de4ba27cd15590661424c888dc596",
                "patch_url": "https://git.kernel.org/stable/p/afdd29726a6de4ba27cd15590661424c888dc596",
                "filename": "CVE-2024-26855-afdd29726a6de4ba27cd15590661424c888dc596.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26855/CVE-2024-26855-afdd29726a6de4ba27cd15590661424c888dc596.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d9fefc51133107e59d192d773be86c1150cfeebb",
                "patch_url": "https://git.kernel.org/stable/p/d9fefc51133107e59d192d773be86c1150cfeebb",
                "filename": "CVE-2024-26855-d9fefc51133107e59d192d773be86c1150cfeebb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26855/CVE-2024-26855-d9fefc51133107e59d192d773be86c1150cfeebb.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/06e456a05d669ca30b224b8ed962421770c1496c",
            "https://git.kernel.org/stable/c/0e296067ae0d74a10b4933601f9aa9f0ec8f157f",
            "https://git.kernel.org/stable/c/1a770927dc1d642b22417c3e668c871689fc58b3",
            "https://git.kernel.org/stable/c/37fe99016b12d32100ce670216816dba6c48b309",
            "https://git.kernel.org/stable/c/8d95465d9a424200485792858c5b3be54658ce19",
            "https://git.kernel.org/stable/c/afdd29726a6de4ba27cd15590661424c888dc596",
            "https://git.kernel.org/stable/c/d9fefc51133107e59d192d773be86c1150cfeebb",
            "https://www.cve.org/CVERecord?id=CVE-2024-26855\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26855\nhttps://lore.kernel.org/linux-cve-announce/2024041724-CVE-2024-26855-ac0d@gregkh/T"
        ]
    },
    "CVE-2024-26859": {
        "cve": "CVE-2024-26859",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/bnx2x: Prevent access to a freed page in page_pool\n\nFix race condition leading to system crash during EEH error handling\n\nDuring EEH error recovery, the bnx2x driver's transmit timeout logic\ncould cause a race condition when handling reset tasks. The\nbnx2x_tx_timeout() schedules reset tasks via bnx2x_sp_rtnl_task(),\nwhich ultimately leads to bnx2x_nic_unload(). In bnx2x_nic_unload()\nSGEs are freed using bnx2x_free_rx_sge_range(). However, this could\noverlap with the EEH driver's attempt to reset the device using\nbnx2x_io_slot_reset(), which also tries to free SGEs. This race\ncondition can result in system crashes due to accessing freed memory\nlocations in bnx2x_free_rx_sge()\n\n799  static inline void bnx2x_free_rx_sge(struct bnx2x *bp,\n800\t\t\t\tstruct bnx2x_fastpath *fp, u16 index)\n801  {\n802\tstruct sw_rx_page *sw_buf = &fp->rx_page_ring[index];\n803     struct page *page = sw_buf->page;\n....\nwhere sw_buf was set to NULL after the call to dma_unmap_page()\nby the preceding thread.\n\n    EEH: Beginning: 'slot_reset'\n    PCI 0011:01:00.0#10000: EEH: Invoking bnx2x->slot_reset()\n    bnx2x: [bnx2x_io_slot_reset:14228(eth1)]IO slot reset initializing...\n    bnx2x 0011:01:00.0: enabling device (0140 -> 0142)\n    bnx2x: [bnx2x_io_slot_reset:14244(eth1)]IO slot reset --> driver unload\n    Kernel attempted to read user page (0) - exploit attempt? (uid: 0)\n    BUG: Kernel NULL pointer dereference on read at 0x00000000\n    Faulting instruction address: 0xc0080000025065fc\n    Oops: Kernel access of bad area, sig: 11 [#1]\n    .....\n    Call Trace:\n    [c000000003c67a20] [c00800000250658c] bnx2x_io_slot_reset+0x204/0x610 [bnx2x] (unreliable)\n    [c000000003c67af0] [c0000000000518a8] eeh_report_reset+0xb8/0xf0\n    [c000000003c67b60] [c000000000052130] eeh_pe_report+0x180/0x550\n    [c000000003c67c70] [c00000000005318c] eeh_handle_normal_event+0x84c/0xa60\n    [c000000003c67d50] [c000000000053a84] eeh_event_handler+0xf4/0x170\n    [c000000003c67da0] [c000000000194c58] kthread+0x1c8/0x1d0\n    [c000000003c67e10] [c00000000000cf64] ret_from_kernel_thread+0x5c/0x64\n\nTo solve this issue, we need to verify page pool allocations before\nfreeing.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26859",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3a9f78b297e08ca8e88ae3ecff1f6fe2766dc5eb",
            "patch_url": "https://git.kernel.org/stable/p/3a9f78b297e08ca8e88ae3ecff1f6fe2766dc5eb",
            "filename": "CVE-2024-26859-3a9f78b297e08ca8e88ae3ecff1f6fe2766dc5eb.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26859/CVE-2024-26859-3a9f78b297e08ca8e88ae3ecff1f6fe2766dc5eb.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3a9f78b297e08ca8e88ae3ecff1f6fe2766dc5eb",
                "patch_url": "https://git.kernel.org/stable/p/3a9f78b297e08ca8e88ae3ecff1f6fe2766dc5eb",
                "filename": "CVE-2024-26859-3a9f78b297e08ca8e88ae3ecff1f6fe2766dc5eb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26859/CVE-2024-26859-3a9f78b297e08ca8e88ae3ecff1f6fe2766dc5eb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/44f9f1abb0ecc43023225ab9539167facbabf0ec",
                "patch_url": "https://git.kernel.org/stable/p/44f9f1abb0ecc43023225ab9539167facbabf0ec",
                "filename": "CVE-2024-26859-44f9f1abb0ecc43023225ab9539167facbabf0ec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26859/CVE-2024-26859-44f9f1abb0ecc43023225ab9539167facbabf0ec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f37d3a7e004bbf560c21441ca9c022168017ec4",
                "patch_url": "https://git.kernel.org/stable/p/4f37d3a7e004bbf560c21441ca9c022168017ec4",
                "filename": "CVE-2024-26859-4f37d3a7e004bbf560c21441ca9c022168017ec4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26859/CVE-2024-26859-4f37d3a7e004bbf560c21441ca9c022168017ec4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7bcc090c81116c66936a7415f2c6b1483a4bcfd9",
                "patch_url": "https://git.kernel.org/stable/p/7bcc090c81116c66936a7415f2c6b1483a4bcfd9",
                "filename": "CVE-2024-26859-7bcc090c81116c66936a7415f2c6b1483a4bcfd9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26859/CVE-2024-26859-7bcc090c81116c66936a7415f2c6b1483a4bcfd9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8eebff95ce9558be66a36aa7cfb43223f3ab4699",
                "patch_url": "https://git.kernel.org/stable/p/8eebff95ce9558be66a36aa7cfb43223f3ab4699",
                "filename": "CVE-2024-26859-8eebff95ce9558be66a36aa7cfb43223f3ab4699.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26859/CVE-2024-26859-8eebff95ce9558be66a36aa7cfb43223f3ab4699.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8ffcd3ccdbda0c918c4a0f922ef1c17010f1b598",
                "patch_url": "https://git.kernel.org/stable/p/8ffcd3ccdbda0c918c4a0f922ef1c17010f1b598",
                "filename": "CVE-2024-26859-8ffcd3ccdbda0c918c4a0f922ef1c17010f1b598.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26859/CVE-2024-26859-8ffcd3ccdbda0c918c4a0f922ef1c17010f1b598.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c51f8b6930db3f259b8820b589f2459d2df3fc68",
                "patch_url": "https://git.kernel.org/stable/p/c51f8b6930db3f259b8820b589f2459d2df3fc68",
                "filename": "CVE-2024-26859-c51f8b6930db3f259b8820b589f2459d2df3fc68.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26859/CVE-2024-26859-c51f8b6930db3f259b8820b589f2459d2df3fc68.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf7d8cba639ae792a42c2a137b495eac262ac36c",
                "patch_url": "https://git.kernel.org/stable/p/cf7d8cba639ae792a42c2a137b495eac262ac36c",
                "filename": "CVE-2024-26859-cf7d8cba639ae792a42c2a137b495eac262ac36c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26859/CVE-2024-26859-cf7d8cba639ae792a42c2a137b495eac262ac36c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d27e2da94a42655861ca4baea30c8cd65546f25d",
                "patch_url": "https://git.kernel.org/stable/p/d27e2da94a42655861ca4baea30c8cd65546f25d",
                "filename": "CVE-2024-26859-d27e2da94a42655861ca4baea30c8cd65546f25d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26859/CVE-2024-26859-d27e2da94a42655861ca4baea30c8cd65546f25d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3a9f78b297e08ca8e88ae3ecff1f6fe2766dc5eb",
            "https://git.kernel.org/stable/c/44f9f1abb0ecc43023225ab9539167facbabf0ec",
            "https://git.kernel.org/stable/c/4f37d3a7e004bbf560c21441ca9c022168017ec4",
            "https://git.kernel.org/stable/c/7bcc090c81116c66936a7415f2c6b1483a4bcfd9",
            "https://git.kernel.org/stable/c/8eebff95ce9558be66a36aa7cfb43223f3ab4699",
            "https://git.kernel.org/stable/c/8ffcd3ccdbda0c918c4a0f922ef1c17010f1b598",
            "https://git.kernel.org/stable/c/c51f8b6930db3f259b8820b589f2459d2df3fc68",
            "https://git.kernel.org/stable/c/cf7d8cba639ae792a42c2a137b495eac262ac36c",
            "https://git.kernel.org/stable/c/d27e2da94a42655861ca4baea30c8cd65546f25d",
            "https://www.cve.org/CVERecord?id=CVE-2024-26859\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26859\nhttps://lore.kernel.org/linux-cve-announce/2024041735-CVE-2024-26859-a906@gregkh/T"
        ]
    },
    "CVE-2024-26870": {
        "cve": "CVE-2024-26870",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102\n\nA call to listxattr() with a buffer size = 0 returns the actual\nsize of the buffer needed for a subsequent call. When size > 0,\nnfs4_listxattr() does not return an error because either\ngeneric_listxattr() or nfs4_listxattr_nfs4_label() consumes\nexactly all the bytes then size is 0 when calling\nnfs4_listxattr_nfs4_user() which then triggers the following\nkernel BUG:\n\n  [   99.403778] kernel BUG at mm/usercopy.c:102!\n  [   99.404063] Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n  [   99.408463] CPU: 0 PID: 3310 Comm: python3 Not tainted 6.6.0-61.fc40.aarch64 #1\n  [   99.415827] Call trace:\n  [   99.415985]  usercopy_abort+0x70/0xa0\n  [   99.416227]  __check_heap_object+0x134/0x158\n  [   99.416505]  check_heap_object+0x150/0x188\n  [   99.416696]  __check_object_size.part.0+0x78/0x168\n  [   99.416886]  __check_object_size+0x28/0x40\n  [   99.417078]  listxattr+0x8c/0x120\n  [   99.417252]  path_listxattr+0x78/0xe0\n  [   99.417476]  __arm64_sys_listxattr+0x28/0x40\n  [   99.417723]  invoke_syscall+0x78/0x100\n  [   99.417929]  el0_svc_common.constprop.0+0x48/0xf0\n  [   99.418186]  do_el0_svc+0x24/0x38\n  [   99.418376]  el0_svc+0x3c/0x110\n  [   99.418554]  el0t_64_sync_handler+0x120/0x130\n  [   99.418788]  el0t_64_sync+0x194/0x198\n  [   99.418994] Code: aa0003e3 d000a3e0 91310000 97f49bdb (d4210000)\n\nIssue is reproduced when generic_listxattr() returns 'system.nfs4_acl',\nthus calling lisxattr() with size = 16 will trigger the bug.\n\nAdd check on nfs4_listxattr() to return ERANGE error when it is\ncalled with size > 0 and the return value is greater than size.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26870",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4403438eaca6e91f02d272211c4d6b045092396b",
            "patch_url": "https://git.kernel.org/stable/p/4403438eaca6e91f02d272211c4d6b045092396b",
            "filename": "CVE-2024-26870-4403438eaca6e91f02d272211c4d6b045092396b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26870/CVE-2024-26870-4403438eaca6e91f02d272211c4d6b045092396b.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/06e828b3f1b206de08ef520fc46a40b22e1869cb",
                "patch_url": "https://git.kernel.org/stable/p/06e828b3f1b206de08ef520fc46a40b22e1869cb",
                "filename": "CVE-2024-26870-06e828b3f1b206de08ef520fc46a40b22e1869cb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26870/CVE-2024-26870-06e828b3f1b206de08ef520fc46a40b22e1869cb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/23bfecb4d852751d5e403557dd500bb563313baf",
                "patch_url": "https://git.kernel.org/stable/p/23bfecb4d852751d5e403557dd500bb563313baf",
                "filename": "CVE-2024-26870-23bfecb4d852751d5e403557dd500bb563313baf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26870/CVE-2024-26870-23bfecb4d852751d5e403557dd500bb563313baf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/251a658bbfceafb4d58c76b77682c8bf7bcfad65",
                "patch_url": "https://git.kernel.org/stable/p/251a658bbfceafb4d58c76b77682c8bf7bcfad65",
                "filename": "CVE-2024-26870-251a658bbfceafb4d58c76b77682c8bf7bcfad65.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26870/CVE-2024-26870-251a658bbfceafb4d58c76b77682c8bf7bcfad65.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4403438eaca6e91f02d272211c4d6b045092396b",
                "patch_url": "https://git.kernel.org/stable/p/4403438eaca6e91f02d272211c4d6b045092396b",
                "filename": "CVE-2024-26870-4403438eaca6e91f02d272211c4d6b045092396b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26870/CVE-2024-26870-4403438eaca6e91f02d272211c4d6b045092396b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/79cdcc765969d23f4e3d6ea115660c3333498768",
                "patch_url": "https://git.kernel.org/stable/p/79cdcc765969d23f4e3d6ea115660c3333498768",
                "filename": "CVE-2024-26870-79cdcc765969d23f4e3d6ea115660c3333498768.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26870/CVE-2024-26870-79cdcc765969d23f4e3d6ea115660c3333498768.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/80365c9f96015bbf048fdd6c8705d3f8770132bf",
                "patch_url": "https://git.kernel.org/stable/p/80365c9f96015bbf048fdd6c8705d3f8770132bf",
                "filename": "CVE-2024-26870-80365c9f96015bbf048fdd6c8705d3f8770132bf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26870/CVE-2024-26870-80365c9f96015bbf048fdd6c8705d3f8770132bf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9d52865ff28245fc2134da9f99baff603a24407a",
                "patch_url": "https://git.kernel.org/stable/p/9d52865ff28245fc2134da9f99baff603a24407a",
                "filename": "CVE-2024-26870-9d52865ff28245fc2134da9f99baff603a24407a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26870/CVE-2024-26870-9d52865ff28245fc2134da9f99baff603a24407a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/06e828b3f1b206de08ef520fc46a40b22e1869cb",
            "https://git.kernel.org/stable/c/23bfecb4d852751d5e403557dd500bb563313baf",
            "https://git.kernel.org/stable/c/251a658bbfceafb4d58c76b77682c8bf7bcfad65",
            "https://git.kernel.org/stable/c/4403438eaca6e91f02d272211c4d6b045092396b",
            "https://git.kernel.org/stable/c/79cdcc765969d23f4e3d6ea115660c3333498768",
            "https://git.kernel.org/stable/c/80365c9f96015bbf048fdd6c8705d3f8770132bf",
            "https://git.kernel.org/stable/c/9d52865ff28245fc2134da9f99baff603a24407a",
            "https://www.cve.org/CVERecord?id=CVE-2024-26870\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26870\nhttps://lore.kernel.org/linux-cve-announce/2024041738-CVE-2024-26870-7aea@gregkh/T"
        ]
    },
    "CVE-2024-26872": {
        "cve": "CVE-2024-26872",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Do not register event handler until srpt device is fully setup\n\nUpon rare occasions, KASAN reports a use-after-free Write\nin srpt_refresh_port().\n\nThis seems to be because an event handler is registered before the\nsrpt device is fully setup and a race condition upon error may leave a\npartially setup event handler in place.\n\nInstead, only register the event handler after srpt device initialization\nis complete.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26872",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/c21a8870c98611e8f892511825c9607f1e2cd456",
            "patch_url": "https://git.kernel.org/stable/p/c21a8870c98611e8f892511825c9607f1e2cd456",
            "filename": "CVE-2024-26872-c21a8870c98611e8f892511825c9607f1e2cd456.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26872/CVE-2024-26872-c21a8870c98611e8f892511825c9607f1e2cd456.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/6413e78086caf7bf15639923740da0d91fdfd090",
                "patch_url": "https://git.kernel.org/stable/p/6413e78086caf7bf15639923740da0d91fdfd090",
                "filename": "CVE-2024-26872-6413e78086caf7bf15639923740da0d91fdfd090.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26872/CVE-2024-26872-6413e78086caf7bf15639923740da0d91fdfd090.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7104a00fa37ae898a827381f1161fa3286c8b346",
                "patch_url": "https://git.kernel.org/stable/p/7104a00fa37ae898a827381f1161fa3286c8b346",
                "filename": "CVE-2024-26872-7104a00fa37ae898a827381f1161fa3286c8b346.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26872/CVE-2024-26872-7104a00fa37ae898a827381f1161fa3286c8b346.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/85570b91e4820a0db9d9432098778cafafa7d217",
                "patch_url": "https://git.kernel.org/stable/p/85570b91e4820a0db9d9432098778cafafa7d217",
                "filename": "CVE-2024-26872-85570b91e4820a0db9d9432098778cafafa7d217.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26872/CVE-2024-26872-85570b91e4820a0db9d9432098778cafafa7d217.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bdd895e0190c464f54f84579e7535d80276f0fc5",
                "patch_url": "https://git.kernel.org/stable/p/bdd895e0190c464f54f84579e7535d80276f0fc5",
                "filename": "CVE-2024-26872-bdd895e0190c464f54f84579e7535d80276f0fc5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26872/CVE-2024-26872-bdd895e0190c464f54f84579e7535d80276f0fc5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c21a8870c98611e8f892511825c9607f1e2cd456",
                "patch_url": "https://git.kernel.org/stable/p/c21a8870c98611e8f892511825c9607f1e2cd456",
                "filename": "CVE-2024-26872-c21a8870c98611e8f892511825c9607f1e2cd456.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26872/CVE-2024-26872-c21a8870c98611e8f892511825c9607f1e2cd456.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e362d007294955a4fb929e1c8978154a64efdcb6",
                "patch_url": "https://git.kernel.org/stable/p/e362d007294955a4fb929e1c8978154a64efdcb6",
                "filename": "CVE-2024-26872-e362d007294955a4fb929e1c8978154a64efdcb6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26872/CVE-2024-26872-e362d007294955a4fb929e1c8978154a64efdcb6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ec77fa12da41260c6bf9e060b89234b980c5130f",
                "patch_url": "https://git.kernel.org/stable/p/ec77fa12da41260c6bf9e060b89234b980c5130f",
                "filename": "CVE-2024-26872-ec77fa12da41260c6bf9e060b89234b980c5130f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26872/CVE-2024-26872-ec77fa12da41260c6bf9e060b89234b980c5130f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/6413e78086caf7bf15639923740da0d91fdfd090",
            "https://git.kernel.org/stable/c/7104a00fa37ae898a827381f1161fa3286c8b346",
            "https://git.kernel.org/stable/c/85570b91e4820a0db9d9432098778cafafa7d217",
            "https://git.kernel.org/stable/c/bdd895e0190c464f54f84579e7535d80276f0fc5",
            "https://git.kernel.org/stable/c/c21a8870c98611e8f892511825c9607f1e2cd456",
            "https://git.kernel.org/stable/c/e362d007294955a4fb929e1c8978154a64efdcb6",
            "https://git.kernel.org/stable/c/ec77fa12da41260c6bf9e060b89234b980c5130f",
            "https://www.cve.org/CVERecord?id=CVE-2024-26872\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26872\nhttps://lore.kernel.org/linux-cve-announce/2024041738-CVE-2024-26872-2d38@gregkh/T"
        ]
    },
    "CVE-2024-26878": {
        "cve": "CVE-2024-26878",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nquota: Fix potential NULL pointer dereference\n\nBelow race may cause NULL pointer dereference\n\nP1\t\t\t\t\tP2\ndquot_free_inode\t\t\tquota_off\n\t\t\t\t\t  drop_dquot_ref\n\t\t\t\t\t   remove_dquot_ref\n\t\t\t\t\t   dquots = i_dquot(inode)\n  dquots = i_dquot(inode)\n  srcu_read_lock\n  dquots[cnt]) != NULL (1)\n\t\t\t\t\t     dquots[type] = NULL (2)\n  spin_lock(&dquots[cnt]->dq_dqb_lock) (3)\n   ....\n\nIf dquot_free_inode(or other routines) checks inode's quota pointers (1)\nbefore quota_off sets it to NULL(2) and use it (3) after that, NULL pointer\ndereference will be triggered.\n\nSo let's fix it by using a temporary pointer to avoid this issue.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26878",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/8514899c1a4edf802f03c408db901063aa3f05a1",
            "patch_url": "https://git.kernel.org/stable/p/8514899c1a4edf802f03c408db901063aa3f05a1",
            "filename": "CVE-2024-26878-8514899c1a4edf802f03c408db901063aa3f05a1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26878/CVE-2024-26878-8514899c1a4edf802f03c408db901063aa3f05a1.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1ca72a3de915f87232c9a4cb9bebbd3af8ed3e25",
                "patch_url": "https://git.kernel.org/stable/p/1ca72a3de915f87232c9a4cb9bebbd3af8ed3e25",
                "filename": "CVE-2024-26878-1ca72a3de915f87232c9a4cb9bebbd3af8ed3e25.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26878/CVE-2024-26878-1ca72a3de915f87232c9a4cb9bebbd3af8ed3e25.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/40a673b4b07efd6f74ff3ab60f38b26aa91ee5d5",
                "patch_url": "https://git.kernel.org/stable/p/40a673b4b07efd6f74ff3ab60f38b26aa91ee5d5",
                "filename": "CVE-2024-26878-40a673b4b07efd6f74ff3ab60f38b26aa91ee5d5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26878/CVE-2024-26878-40a673b4b07efd6f74ff3ab60f38b26aa91ee5d5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/49669f8e7eb053f91d239df7b1bfb4500255a9d0",
                "patch_url": "https://git.kernel.org/stable/p/49669f8e7eb053f91d239df7b1bfb4500255a9d0",
                "filename": "CVE-2024-26878-49669f8e7eb053f91d239df7b1bfb4500255a9d0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26878/CVE-2024-26878-49669f8e7eb053f91d239df7b1bfb4500255a9d0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/61380537aa6dd32d8a723d98b8f1bd1b11d8fee0",
                "patch_url": "https://git.kernel.org/stable/p/61380537aa6dd32d8a723d98b8f1bd1b11d8fee0",
                "filename": "CVE-2024-26878-61380537aa6dd32d8a723d98b8f1bd1b11d8fee0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26878/CVE-2024-26878-61380537aa6dd32d8a723d98b8f1bd1b11d8fee0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6afc9f4434fa8063aa768c2bf5bf98583aee0877",
                "patch_url": "https://git.kernel.org/stable/p/6afc9f4434fa8063aa768c2bf5bf98583aee0877",
                "filename": "CVE-2024-26878-6afc9f4434fa8063aa768c2bf5bf98583aee0877.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26878/CVE-2024-26878-6afc9f4434fa8063aa768c2bf5bf98583aee0877.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7f9e833fc0f9b47be503af012eb5903086939754",
                "patch_url": "https://git.kernel.org/stable/p/7f9e833fc0f9b47be503af012eb5903086939754",
                "filename": "CVE-2024-26878-7f9e833fc0f9b47be503af012eb5903086939754.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26878/CVE-2024-26878-7f9e833fc0f9b47be503af012eb5903086939754.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8514899c1a4edf802f03c408db901063aa3f05a1",
                "patch_url": "https://git.kernel.org/stable/p/8514899c1a4edf802f03c408db901063aa3f05a1",
                "filename": "CVE-2024-26878-8514899c1a4edf802f03c408db901063aa3f05a1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26878/CVE-2024-26878-8514899c1a4edf802f03c408db901063aa3f05a1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d0aa72604fbd80c8aabb46eda00535ed35570f1f",
                "patch_url": "https://git.kernel.org/stable/p/d0aa72604fbd80c8aabb46eda00535ed35570f1f",
                "filename": "CVE-2024-26878-d0aa72604fbd80c8aabb46eda00535ed35570f1f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26878/CVE-2024-26878-d0aa72604fbd80c8aabb46eda00535ed35570f1f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f2649d98aa9ca8623149b3cb8df00c944f5655c7",
                "patch_url": "https://git.kernel.org/stable/p/f2649d98aa9ca8623149b3cb8df00c944f5655c7",
                "filename": "CVE-2024-26878-f2649d98aa9ca8623149b3cb8df00c944f5655c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26878/CVE-2024-26878-f2649d98aa9ca8623149b3cb8df00c944f5655c7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1ca72a3de915f87232c9a4cb9bebbd3af8ed3e25",
            "https://git.kernel.org/stable/c/40a673b4b07efd6f74ff3ab60f38b26aa91ee5d5",
            "https://git.kernel.org/stable/c/49669f8e7eb053f91d239df7b1bfb4500255a9d0",
            "https://git.kernel.org/stable/c/61380537aa6dd32d8a723d98b8f1bd1b11d8fee0",
            "https://git.kernel.org/stable/c/6afc9f4434fa8063aa768c2bf5bf98583aee0877",
            "https://git.kernel.org/stable/c/7f9e833fc0f9b47be503af012eb5903086939754",
            "https://git.kernel.org/stable/c/8514899c1a4edf802f03c408db901063aa3f05a1",
            "https://git.kernel.org/stable/c/d0aa72604fbd80c8aabb46eda00535ed35570f1f",
            "https://git.kernel.org/stable/c/f2649d98aa9ca8623149b3cb8df00c944f5655c7",
            "https://www.cve.org/CVERecord?id=CVE-2024-26878\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26878\nhttps://lore.kernel.org/linux-cve-announce/2024041740-CVE-2024-26878-5748@gregkh/T"
        ]
    },
    "CVE-2024-26880": {
        "cve": "CVE-2024-26880",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: call the resume method on internal suspend\n\nThere is this reported crash when experimenting with the lvm2 testsuite.\nThe list corruption is caused by the fact that the postsuspend and resume\nmethods were not paired correctly; there were two consecutive calls to the\norigin_postsuspend function. The second call attempts to remove the\n\"hash_list\" entry from a list, while it was already removed by the first\ncall.\n\nFix __dm_internal_resume so that it calls the preresume and resume\nmethods of the table's targets.\n\nIf a preresume method of some target fails, we are in a tricky situation.\nWe can't return an error because dm_internal_resume isn't supposed to\nreturn errors. We can't return success, because then the \"resume\" and\n\"postsuspend\" methods would not be paired correctly. So, we set the\nDMF_SUSPENDED flag and we fake normal suspend - it may confuse userspace\ntools, but it won't cause a kernel crash.\n\n------------[ cut here ]------------\nkernel BUG at lib/list_debug.c:56!\ninvalid opcode: 0000 [#1] PREEMPT SMP\nCPU: 1 PID: 8343 Comm: dmsetup Not tainted 6.8.0-rc6 #4\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\nRIP: 0010:__list_del_entry_valid_or_report+0x77/0xc0\n<snip>\nRSP: 0018:ffff8881b831bcc0 EFLAGS: 00010282\nRAX: 000000000000004e RBX: ffff888143b6eb80 RCX: 0000000000000000\nRDX: 0000000000000001 RSI: ffffffff819053d0 RDI: 00000000ffffffff\nRBP: ffff8881b83a3400 R08: 00000000fffeffff R09: 0000000000000058\nR10: 0000000000000000 R11: ffffffff81a24080 R12: 0000000000000001\nR13: ffff88814538e000 R14: ffff888143bc6dc0 R15: ffffffffa02e4bb0\nFS:  00000000f7c0f780(0000) GS:ffff8893f0a40000(0000) knlGS:0000000000000000\nCS:  0010 DS: 002b ES: 002b CR0: 0000000080050033\nCR2: 0000000057fb5000 CR3: 0000000143474000 CR4: 00000000000006b0\nCall Trace:\n <TASK>\n ? die+0x2d/0x80\n ? do_trap+0xeb/0xf0\n ? __list_del_entry_valid_or_report+0x77/0xc0\n ? do_error_trap+0x60/0x80\n ? __list_del_entry_valid_or_report+0x77/0xc0\n ? exc_invalid_op+0x49/0x60\n ? __list_del_entry_valid_or_report+0x77/0xc0\n ? asm_exc_invalid_op+0x16/0x20\n ? table_deps+0x1b0/0x1b0 [dm_mod]\n ? __list_del_entry_valid_or_report+0x77/0xc0\n origin_postsuspend+0x1a/0x50 [dm_snapshot]\n dm_table_postsuspend_targets+0x34/0x50 [dm_mod]\n dm_suspend+0xd8/0xf0 [dm_mod]\n dev_suspend+0x1f2/0x2f0 [dm_mod]\n ? table_deps+0x1b0/0x1b0 [dm_mod]\n ctl_ioctl+0x300/0x5f0 [dm_mod]\n dm_compat_ctl_ioctl+0x7/0x10 [dm_mod]\n __x64_compat_sys_ioctl+0x104/0x170\n do_syscall_64+0x184/0x1b0\n entry_SYSCALL_64_after_hwframe+0x46/0x4e\nRIP: 0033:0xf7e6aead\n<snip>\n---[ end trace 0000000000000000 ]---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26880",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/da7ece2197101b1469853e6b5e915be1e3896d52",
            "patch_url": "https://git.kernel.org/stable/p/da7ece2197101b1469853e6b5e915be1e3896d52",
            "filename": "CVE-2024-26880-da7ece2197101b1469853e6b5e915be1e3896d52.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26880/CVE-2024-26880-da7ece2197101b1469853e6b5e915be1e3896d52.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/03ad5ad53e51abf3a4c7538c1bc67a5982b41dc5",
                "patch_url": "https://git.kernel.org/stable/p/03ad5ad53e51abf3a4c7538c1bc67a5982b41dc5",
                "filename": "CVE-2024-26880-03ad5ad53e51abf3a4c7538c1bc67a5982b41dc5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26880/CVE-2024-26880-03ad5ad53e51abf3a4c7538c1bc67a5982b41dc5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/15a3fc5c8774c17589dabfe1d642d40685c985af",
                "patch_url": "https://git.kernel.org/stable/p/15a3fc5c8774c17589dabfe1d642d40685c985af",
                "filename": "CVE-2024-26880-15a3fc5c8774c17589dabfe1d642d40685c985af.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26880/CVE-2024-26880-15a3fc5c8774c17589dabfe1d642d40685c985af.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/360a7d1be8112654f1fb328ed3862be630bca3f4",
                "patch_url": "https://git.kernel.org/stable/p/360a7d1be8112654f1fb328ed3862be630bca3f4",
                "filename": "CVE-2024-26880-360a7d1be8112654f1fb328ed3862be630bca3f4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26880/CVE-2024-26880-360a7d1be8112654f1fb328ed3862be630bca3f4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/65e8fbde64520001abf1c8d0e573561b4746ef38",
                "patch_url": "https://git.kernel.org/stable/p/65e8fbde64520001abf1c8d0e573561b4746ef38",
                "filename": "CVE-2024-26880-65e8fbde64520001abf1c8d0e573561b4746ef38.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26880/CVE-2024-26880-65e8fbde64520001abf1c8d0e573561b4746ef38.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/69836d9329f0b4c58faaf3d886a7748ddb5bf718",
                "patch_url": "https://git.kernel.org/stable/p/69836d9329f0b4c58faaf3d886a7748ddb5bf718",
                "filename": "CVE-2024-26880-69836d9329f0b4c58faaf3d886a7748ddb5bf718.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26880/CVE-2024-26880-69836d9329f0b4c58faaf3d886a7748ddb5bf718.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ad10289f68f45649816cc68eb93f45fd5ec48a15",
                "patch_url": "https://git.kernel.org/stable/p/ad10289f68f45649816cc68eb93f45fd5ec48a15",
                "filename": "CVE-2024-26880-ad10289f68f45649816cc68eb93f45fd5ec48a15.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26880/CVE-2024-26880-ad10289f68f45649816cc68eb93f45fd5ec48a15.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/da7ece2197101b1469853e6b5e915be1e3896d52",
                "patch_url": "https://git.kernel.org/stable/p/da7ece2197101b1469853e6b5e915be1e3896d52",
                "filename": "CVE-2024-26880-da7ece2197101b1469853e6b5e915be1e3896d52.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26880/CVE-2024-26880-da7ece2197101b1469853e6b5e915be1e3896d52.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ef02d8edf738557af2865c5bfb66a03c4e071be7",
                "patch_url": "https://git.kernel.org/stable/p/ef02d8edf738557af2865c5bfb66a03c4e071be7",
                "filename": "CVE-2024-26880-ef02d8edf738557af2865c5bfb66a03c4e071be7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26880/CVE-2024-26880-ef02d8edf738557af2865c5bfb66a03c4e071be7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f89bd27709376d37ff883067193320c58a8c1d5a",
                "patch_url": "https://git.kernel.org/stable/p/f89bd27709376d37ff883067193320c58a8c1d5a",
                "filename": "CVE-2024-26880-f89bd27709376d37ff883067193320c58a8c1d5a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26880/CVE-2024-26880-f89bd27709376d37ff883067193320c58a8c1d5a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/03ad5ad53e51abf3a4c7538c1bc67a5982b41dc5",
            "https://git.kernel.org/stable/c/15a3fc5c8774c17589dabfe1d642d40685c985af",
            "https://git.kernel.org/stable/c/360a7d1be8112654f1fb328ed3862be630bca3f4",
            "https://git.kernel.org/stable/c/65e8fbde64520001abf1c8d0e573561b4746ef38",
            "https://git.kernel.org/stable/c/69836d9329f0b4c58faaf3d886a7748ddb5bf718",
            "https://git.kernel.org/stable/c/ad10289f68f45649816cc68eb93f45fd5ec48a15",
            "https://git.kernel.org/stable/c/da7ece2197101b1469853e6b5e915be1e3896d52",
            "https://git.kernel.org/stable/c/ef02d8edf738557af2865c5bfb66a03c4e071be7",
            "https://git.kernel.org/stable/c/f89bd27709376d37ff883067193320c58a8c1d5a",
            "https://www.cve.org/CVERecord?id=CVE-2024-26880\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26880\nhttps://lore.kernel.org/linux-cve-announce/2024041740-CVE-2024-26880-25d6@gregkh/T"
        ]
    },
    "CVE-2024-26892": {
        "cve": "CVE-2024-26892",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7921e: fix use-after-free in free_irq()\n\nFrom commit a304e1b82808 (\"[PATCH] Debug shared irqs\"), there is a test\nto make sure the shared irq handler should be able to handle the unexpected\nevent after deregistration. For this case, let's apply MT76_REMOVED flag to\nindicate the device was removed and do not run into the resource access\nanymore.\n\nBUG: KASAN: use-after-free in mt7921_irq_handler+0xd8/0x100 [mt7921e]\nRead of size 8 at addr ffff88824a7d3b78 by task rmmod/11115\nCPU: 28 PID: 11115 Comm: rmmod Tainted: G        W    L    5.17.0 #10\nHardware name: Micro-Star International Co., Ltd. MS-7D73/MPG B650I\nEDGE WIFI (MS-7D73), BIOS 1.81 01/05/2024\nCall Trace:\n <TASK>\n dump_stack_lvl+0x6f/0xa0\n print_address_description.constprop.0+0x1f/0x190\n ? mt7921_irq_handler+0xd8/0x100 [mt7921e]\n ? mt7921_irq_handler+0xd8/0x100 [mt7921e]\n kasan_report.cold+0x7f/0x11b\n ? mt7921_irq_handler+0xd8/0x100 [mt7921e]\n mt7921_irq_handler+0xd8/0x100 [mt7921e]\n free_irq+0x627/0xaa0\n devm_free_irq+0x94/0xd0\n ? devm_request_any_context_irq+0x160/0x160\n ? kobject_put+0x18d/0x4a0\n mt7921_pci_remove+0x153/0x190 [mt7921e]\n pci_device_remove+0xa2/0x1d0\n __device_release_driver+0x346/0x6e0\n driver_detach+0x1ef/0x2c0\n bus_remove_driver+0xe7/0x2d0\n ? __check_object_size+0x57/0x310\n pci_unregister_driver+0x26/0x250\n __do_sys_delete_module+0x307/0x510\n ? free_module+0x6a0/0x6a0\n ? fpregs_assert_state_consistent+0x4b/0xb0\n ? rcu_read_lock_sched_held+0x10/0x70\n ? syscall_enter_from_user_mode+0x20/0x70\n ? trace_hardirqs_on+0x1c/0x130\n do_syscall_64+0x5c/0x80\n ? trace_hardirqs_on_prepare+0x72/0x160\n ? do_syscall_64+0x68/0x80\n ? trace_hardirqs_on_prepare+0x72/0x160\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26892",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/bfe1adf1606f76c180324e53b130f0e76d5cc6c3",
            "patch_url": "https://git.kernel.org/stable/p/bfe1adf1606f76c180324e53b130f0e76d5cc6c3",
            "filename": "CVE-2024-26892-bfe1adf1606f76c180324e53b130f0e76d5cc6c3.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26892/CVE-2024-26892-bfe1adf1606f76c180324e53b130f0e76d5cc6c3.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/bfe1adf1606f76c180324e53b130f0e76d5cc6c3",
                "patch_url": "https://git.kernel.org/stable/p/bfe1adf1606f76c180324e53b130f0e76d5cc6c3",
                "filename": "CVE-2024-26892-bfe1adf1606f76c180324e53b130f0e76d5cc6c3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26892/CVE-2024-26892-bfe1adf1606f76c180324e53b130f0e76d5cc6c3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bfeaef901194c5923ce3330272786eff2fac513a",
                "patch_url": "https://git.kernel.org/stable/p/bfeaef901194c5923ce3330272786eff2fac513a",
                "filename": "CVE-2024-26892-bfeaef901194c5923ce3330272786eff2fac513a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26892/CVE-2024-26892-bfeaef901194c5923ce3330272786eff2fac513a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c7dd42fbebcfb02bef070fd48f774d6412d0b49d",
                "patch_url": "https://git.kernel.org/stable/p/c7dd42fbebcfb02bef070fd48f774d6412d0b49d",
                "filename": "CVE-2024-26892-c7dd42fbebcfb02bef070fd48f774d6412d0b49d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26892/CVE-2024-26892-c7dd42fbebcfb02bef070fd48f774d6412d0b49d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c957280ef6ab6bdf559a91ae693a6b34310697e3",
                "patch_url": "https://git.kernel.org/stable/p/c957280ef6ab6bdf559a91ae693a6b34310697e3",
                "filename": "CVE-2024-26892-c957280ef6ab6bdf559a91ae693a6b34310697e3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26892/CVE-2024-26892-c957280ef6ab6bdf559a91ae693a6b34310697e3.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/bfe1adf1606f76c180324e53b130f0e76d5cc6c3",
            "https://git.kernel.org/stable/c/bfeaef901194c5923ce3330272786eff2fac513a",
            "https://git.kernel.org/stable/c/c7dd42fbebcfb02bef070fd48f774d6412d0b49d",
            "https://git.kernel.org/stable/c/c957280ef6ab6bdf559a91ae693a6b34310697e3",
            "https://www.cve.org/CVERecord?id=CVE-2024-26892\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26892\nhttps://lore.kernel.org/linux-cve-announce/2024041743-CVE-2024-26892-809e@gregkh/T"
        ]
    },
    "CVE-2024-26894": {
        "cve": "CVE-2024-26894",
        "cvss_v2": null,
        "cvss_v3": 6,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()\n\nAfter unregistering the CPU idle device, the memory associated with\nit is not freed, leading to a memory leak:\n\nunreferenced object 0xffff896282f6c000 (size 1024):\n  comm \"swapper/0\", pid 1, jiffies 4294893170\n  hex dump (first 32 bytes):\n    00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace (crc 8836a742):\n    [<ffffffff993495ed>] kmalloc_trace+0x29d/0x340\n    [<ffffffff9972f3b3>] acpi_processor_power_init+0xf3/0x1c0\n    [<ffffffff9972d263>] __acpi_processor_start+0xd3/0xf0\n    [<ffffffff9972d2bc>] acpi_processor_start+0x2c/0x50\n    [<ffffffff99805872>] really_probe+0xe2/0x480\n    [<ffffffff99805c98>] __driver_probe_device+0x78/0x160\n    [<ffffffff99805daf>] driver_probe_device+0x1f/0x90\n    [<ffffffff9980601e>] __driver_attach+0xce/0x1c0\n    [<ffffffff99803170>] bus_for_each_dev+0x70/0xc0\n    [<ffffffff99804822>] bus_add_driver+0x112/0x210\n    [<ffffffff99807245>] driver_register+0x55/0x100\n    [<ffffffff9aee4acb>] acpi_processor_driver_init+0x3b/0xc0\n    [<ffffffff990012d1>] do_one_initcall+0x41/0x300\n    [<ffffffff9ae7c4b0>] kernel_init_freeable+0x320/0x470\n    [<ffffffff99b231f6>] kernel_init+0x16/0x1b0\n    [<ffffffff99042e6d>] ret_from_fork+0x2d/0x50\n\nFix this by freeing the CPU idle device after unregistering it.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26894",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/fad9bcd4d754cc689c19dc04d2c44b82c1a5d6c8",
            "patch_url": "https://git.kernel.org/stable/p/fad9bcd4d754cc689c19dc04d2c44b82c1a5d6c8",
            "filename": "CVE-2024-26894-fad9bcd4d754cc689c19dc04d2c44b82c1a5d6c8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26894/CVE-2024-26894-fad9bcd4d754cc689c19dc04d2c44b82c1a5d6c8.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1cbaf4c793b0808532f4e7b40bc4be7cec2c78f2",
                "patch_url": "https://git.kernel.org/stable/p/1cbaf4c793b0808532f4e7b40bc4be7cec2c78f2",
                "filename": "CVE-2024-26894-1cbaf4c793b0808532f4e7b40bc4be7cec2c78f2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26894/CVE-2024-26894-1cbaf4c793b0808532f4e7b40bc4be7cec2c78f2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3d48e5be107429ff5d824e7f2a00d1b610d36fbc",
                "patch_url": "https://git.kernel.org/stable/p/3d48e5be107429ff5d824e7f2a00d1b610d36fbc",
                "filename": "CVE-2024-26894-3d48e5be107429ff5d824e7f2a00d1b610d36fbc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26894/CVE-2024-26894-3d48e5be107429ff5d824e7f2a00d1b610d36fbc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8d14a4d0afb49a5b8535d414c782bb334860e73e",
                "patch_url": "https://git.kernel.org/stable/p/8d14a4d0afb49a5b8535d414c782bb334860e73e",
                "filename": "CVE-2024-26894-8d14a4d0afb49a5b8535d414c782bb334860e73e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26894/CVE-2024-26894-8d14a4d0afb49a5b8535d414c782bb334860e73e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c2a30c81bf3cb9033fa9f5305baf7c377075e2e5",
                "patch_url": "https://git.kernel.org/stable/p/c2a30c81bf3cb9033fa9f5305baf7c377075e2e5",
                "filename": "CVE-2024-26894-c2a30c81bf3cb9033fa9f5305baf7c377075e2e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26894/CVE-2024-26894-c2a30c81bf3cb9033fa9f5305baf7c377075e2e5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cd5c2d0b09d5b6d3f0a7bbabe6761a4997e9dee9",
                "patch_url": "https://git.kernel.org/stable/p/cd5c2d0b09d5b6d3f0a7bbabe6761a4997e9dee9",
                "filename": "CVE-2024-26894-cd5c2d0b09d5b6d3f0a7bbabe6761a4997e9dee9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26894/CVE-2024-26894-cd5c2d0b09d5b6d3f0a7bbabe6761a4997e9dee9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d351bcadab6caa6d8ce7159ff4b77e2da35c09fa",
                "patch_url": "https://git.kernel.org/stable/p/d351bcadab6caa6d8ce7159ff4b77e2da35c09fa",
                "filename": "CVE-2024-26894-d351bcadab6caa6d8ce7159ff4b77e2da35c09fa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26894/CVE-2024-26894-d351bcadab6caa6d8ce7159ff4b77e2da35c09fa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e18afcb7b2a12b635ac10081f943fcf84ddacc51",
                "patch_url": "https://git.kernel.org/stable/p/e18afcb7b2a12b635ac10081f943fcf84ddacc51",
                "filename": "CVE-2024-26894-e18afcb7b2a12b635ac10081f943fcf84ddacc51.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26894/CVE-2024-26894-e18afcb7b2a12b635ac10081f943fcf84ddacc51.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ea96bf3f80625cddba1391a87613356b1b45716d",
                "patch_url": "https://git.kernel.org/stable/p/ea96bf3f80625cddba1391a87613356b1b45716d",
                "filename": "CVE-2024-26894-ea96bf3f80625cddba1391a87613356b1b45716d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26894/CVE-2024-26894-ea96bf3f80625cddba1391a87613356b1b45716d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fad9bcd4d754cc689c19dc04d2c44b82c1a5d6c8",
                "patch_url": "https://git.kernel.org/stable/p/fad9bcd4d754cc689c19dc04d2c44b82c1a5d6c8",
                "filename": "CVE-2024-26894-fad9bcd4d754cc689c19dc04d2c44b82c1a5d6c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26894/CVE-2024-26894-fad9bcd4d754cc689c19dc04d2c44b82c1a5d6c8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1cbaf4c793b0808532f4e7b40bc4be7cec2c78f2",
            "https://git.kernel.org/stable/c/3d48e5be107429ff5d824e7f2a00d1b610d36fbc",
            "https://git.kernel.org/stable/c/8d14a4d0afb49a5b8535d414c782bb334860e73e",
            "https://git.kernel.org/stable/c/c2a30c81bf3cb9033fa9f5305baf7c377075e2e5",
            "https://git.kernel.org/stable/c/cd5c2d0b09d5b6d3f0a7bbabe6761a4997e9dee9",
            "https://git.kernel.org/stable/c/d351bcadab6caa6d8ce7159ff4b77e2da35c09fa",
            "https://git.kernel.org/stable/c/e18afcb7b2a12b635ac10081f943fcf84ddacc51",
            "https://git.kernel.org/stable/c/ea96bf3f80625cddba1391a87613356b1b45716d",
            "https://git.kernel.org/stable/c/fad9bcd4d754cc689c19dc04d2c44b82c1a5d6c8",
            "https://www.cve.org/CVERecord?id=CVE-2024-26894\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26894\nhttps://lore.kernel.org/linux-cve-announce/2024041743-CVE-2024-26894-53ad@gregkh/T"
        ]
    },
    "CVE-2024-26897": {
        "cve": "CVE-2024-26897",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete\n\nThe ath9k_wmi_event_tasklet() used in ath9k_htc assumes that all the data\nstructures have been fully initialised by the time it runs. However, because of\nthe order in which things are initialised, this is not guaranteed to be the\ncase, because the device is exposed to the USB subsystem before the ath9k driver\ninitialisation is completed.\n\nWe already committed a partial fix for this in commit:\n8b3046abc99e (\"ath9k_htc: fix NULL pointer dereference at ath9k_htc_tx_get_packet()\")\n\nHowever, that commit only aborted the WMI_TXSTATUS_EVENTID command in the event\ntasklet, pairing it with an \"initialisation complete\" bit in the TX struct. It\nseems syzbot managed to trigger the race for one of the other commands as well,\nso let's just move the existing synchronisation bit to cover the whole\ntasklet (setting it at the end of ath9k_htc_probe_device() instead of inside\nath9k_tx_init()).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26897",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/24355fcb0d4cbcb6ddda262596558e8cfba70f11",
            "patch_url": "https://git.kernel.org/stable/p/24355fcb0d4cbcb6ddda262596558e8cfba70f11",
            "filename": "CVE-2024-26897-24355fcb0d4cbcb6ddda262596558e8cfba70f11.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26897/CVE-2024-26897-24355fcb0d4cbcb6ddda262596558e8cfba70f11.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1bc5461a21c56a36e2a7d81e152b90ce019a3905",
                "patch_url": "https://git.kernel.org/stable/p/1bc5461a21c56a36e2a7d81e152b90ce019a3905",
                "filename": "CVE-2024-26897-1bc5461a21c56a36e2a7d81e152b90ce019a3905.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26897/CVE-2024-26897-1bc5461a21c56a36e2a7d81e152b90ce019a3905.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/24355fcb0d4cbcb6ddda262596558e8cfba70f11",
                "patch_url": "https://git.kernel.org/stable/p/24355fcb0d4cbcb6ddda262596558e8cfba70f11",
                "filename": "CVE-2024-26897-24355fcb0d4cbcb6ddda262596558e8cfba70f11.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26897/CVE-2024-26897-24355fcb0d4cbcb6ddda262596558e8cfba70f11.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4afa0246656d5680c8a4c3fb37ba6570c4ab819b",
                "patch_url": "https://git.kernel.org/stable/p/4afa0246656d5680c8a4c3fb37ba6570c4ab819b",
                "filename": "CVE-2024-26897-4afa0246656d5680c8a4c3fb37ba6570c4ab819b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26897/CVE-2024-26897-4afa0246656d5680c8a4c3fb37ba6570c4ab819b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/74d0639261dd795dce958d1b14815bdcbb48a715",
                "patch_url": "https://git.kernel.org/stable/p/74d0639261dd795dce958d1b14815bdcbb48a715",
                "filename": "CVE-2024-26897-74d0639261dd795dce958d1b14815bdcbb48a715.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26897/CVE-2024-26897-74d0639261dd795dce958d1b14815bdcbb48a715.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a015fbf698c8957aa5fbeefc5c59dd2cf3107298",
                "patch_url": "https://git.kernel.org/stable/p/a015fbf698c8957aa5fbeefc5c59dd2cf3107298",
                "filename": "CVE-2024-26897-a015fbf698c8957aa5fbeefc5c59dd2cf3107298.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26897/CVE-2024-26897-a015fbf698c8957aa5fbeefc5c59dd2cf3107298.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ac90e22e735bac44f74b5161fb096fbeb0ff8bc2",
                "patch_url": "https://git.kernel.org/stable/p/ac90e22e735bac44f74b5161fb096fbeb0ff8bc2",
                "filename": "CVE-2024-26897-ac90e22e735bac44f74b5161fb096fbeb0ff8bc2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26897/CVE-2024-26897-ac90e22e735bac44f74b5161fb096fbeb0ff8bc2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f8ff4b4df71e87f609be0cc37d92e918107f9b90",
                "patch_url": "https://git.kernel.org/stable/p/f8ff4b4df71e87f609be0cc37d92e918107f9b90",
                "filename": "CVE-2024-26897-f8ff4b4df71e87f609be0cc37d92e918107f9b90.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26897/CVE-2024-26897-f8ff4b4df71e87f609be0cc37d92e918107f9b90.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1bc5461a21c56a36e2a7d81e152b90ce019a3905",
            "https://git.kernel.org/stable/c/24355fcb0d4cbcb6ddda262596558e8cfba70f11",
            "https://git.kernel.org/stable/c/4afa0246656d5680c8a4c3fb37ba6570c4ab819b",
            "https://git.kernel.org/stable/c/74d0639261dd795dce958d1b14815bdcbb48a715",
            "https://git.kernel.org/stable/c/a015fbf698c8957aa5fbeefc5c59dd2cf3107298",
            "https://git.kernel.org/stable/c/ac90e22e735bac44f74b5161fb096fbeb0ff8bc2",
            "https://git.kernel.org/stable/c/f8ff4b4df71e87f609be0cc37d92e918107f9b90",
            "https://www.cve.org/CVERecord?id=CVE-2024-26897\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26897\nhttps://lore.kernel.org/linux-cve-announce/2024041744-CVE-2024-26897-5382@gregkh/T"
        ]
    },
    "CVE-2024-26901": {
        "cve": "CVE-2024-26901",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndo_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak\n\nsyzbot identified a kernel information leak vulnerability in\ndo_sys_name_to_handle() and issued the following report [1].\n\n[1]\n\"BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\nBUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x100 lib/usercopy.c:40\n instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n _copy_to_user+0xbc/0x100 lib/usercopy.c:40\n copy_to_user include/linux/uaccess.h:191 [inline]\n do_sys_name_to_handle fs/fhandle.c:73 [inline]\n __do_sys_name_to_handle_at fs/fhandle.c:112 [inline]\n __se_sys_name_to_handle_at+0x949/0xb10 fs/fhandle.c:94\n __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94\n ...\n\nUninit was created at:\n slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768\n slab_alloc_node mm/slub.c:3478 [inline]\n __kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517\n __do_kmalloc_node mm/slab_common.c:1006 [inline]\n __kmalloc+0x121/0x3c0 mm/slab_common.c:1020\n kmalloc include/linux/slab.h:604 [inline]\n do_sys_name_to_handle fs/fhandle.c:39 [inline]\n __do_sys_name_to_handle_at fs/fhandle.c:112 [inline]\n __se_sys_name_to_handle_at+0x441/0xb10 fs/fhandle.c:94\n __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94\n ...\n\nBytes 18-19 of 20 are uninitialized\nMemory access of size 20 starts at ffff888128a46380\nData copied to user address 0000000020000240\"\n\nPer Chuck Lever's suggestion, use kzalloc() instead of kmalloc() to\nsolve the problem.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26901",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/423b6bdf19bbc5e1f7e7461045099917378f7e71",
            "patch_url": "https://git.kernel.org/stable/p/423b6bdf19bbc5e1f7e7461045099917378f7e71",
            "filename": "CVE-2024-26901-423b6bdf19bbc5e1f7e7461045099917378f7e71.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26901/CVE-2024-26901-423b6bdf19bbc5e1f7e7461045099917378f7e71.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3948abaa4e2be938ccdfc289385a27342fb13d43",
                "patch_url": "https://git.kernel.org/stable/p/3948abaa4e2be938ccdfc289385a27342fb13d43",
                "filename": "CVE-2024-26901-3948abaa4e2be938ccdfc289385a27342fb13d43.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26901/CVE-2024-26901-3948abaa4e2be938ccdfc289385a27342fb13d43.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/423b6bdf19bbc5e1f7e7461045099917378f7e71",
                "patch_url": "https://git.kernel.org/stable/p/423b6bdf19bbc5e1f7e7461045099917378f7e71",
                "filename": "CVE-2024-26901-423b6bdf19bbc5e1f7e7461045099917378f7e71.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26901/CVE-2024-26901-423b6bdf19bbc5e1f7e7461045099917378f7e71.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4bac28f441e3cc9d3f1a84c8d023228a68d8a7c1",
                "patch_url": "https://git.kernel.org/stable/p/4bac28f441e3cc9d3f1a84c8d023228a68d8a7c1",
                "filename": "CVE-2024-26901-4bac28f441e3cc9d3f1a84c8d023228a68d8a7c1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26901/CVE-2024-26901-4bac28f441e3cc9d3f1a84c8d023228a68d8a7c1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/772a7def9868091da3bcb0d6c6ff9f0c03d7fa8b",
                "patch_url": "https://git.kernel.org/stable/p/772a7def9868091da3bcb0d6c6ff9f0c03d7fa8b",
                "filename": "CVE-2024-26901-772a7def9868091da3bcb0d6c6ff9f0c03d7fa8b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26901/CVE-2024-26901-772a7def9868091da3bcb0d6c6ff9f0c03d7fa8b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bf9ec1b24ab4e94345aa1c60811dd329f069c38b",
                "patch_url": "https://git.kernel.org/stable/p/bf9ec1b24ab4e94345aa1c60811dd329f069c38b",
                "filename": "CVE-2024-26901-bf9ec1b24ab4e94345aa1c60811dd329f069c38b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26901/CVE-2024-26901-bf9ec1b24ab4e94345aa1c60811dd329f069c38b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c1362eae861db28b1608b9dc23e49634fe87b63b",
                "patch_url": "https://git.kernel.org/stable/p/c1362eae861db28b1608b9dc23e49634fe87b63b",
                "filename": "CVE-2024-26901-c1362eae861db28b1608b9dc23e49634fe87b63b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26901/CVE-2024-26901-c1362eae861db28b1608b9dc23e49634fe87b63b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cba138f1ef37ec6f961baeab62f312dedc7cf730",
                "patch_url": "https://git.kernel.org/stable/p/cba138f1ef37ec6f961baeab62f312dedc7cf730",
                "filename": "CVE-2024-26901-cba138f1ef37ec6f961baeab62f312dedc7cf730.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26901/CVE-2024-26901-cba138f1ef37ec6f961baeab62f312dedc7cf730.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cde76b3af247f615447bcfecf610bb76c3529126",
                "patch_url": "https://git.kernel.org/stable/p/cde76b3af247f615447bcfecf610bb76c3529126",
                "filename": "CVE-2024-26901-cde76b3af247f615447bcfecf610bb76c3529126.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26901/CVE-2024-26901-cde76b3af247f615447bcfecf610bb76c3529126.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e6450d5e46a737a008b4885aa223486113bf0ad6",
                "patch_url": "https://git.kernel.org/stable/p/e6450d5e46a737a008b4885aa223486113bf0ad6",
                "filename": "CVE-2024-26901-e6450d5e46a737a008b4885aa223486113bf0ad6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26901/CVE-2024-26901-e6450d5e46a737a008b4885aa223486113bf0ad6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3948abaa4e2be938ccdfc289385a27342fb13d43",
            "https://git.kernel.org/stable/c/423b6bdf19bbc5e1f7e7461045099917378f7e71",
            "https://git.kernel.org/stable/c/4bac28f441e3cc9d3f1a84c8d023228a68d8a7c1",
            "https://git.kernel.org/stable/c/772a7def9868091da3bcb0d6c6ff9f0c03d7fa8b",
            "https://git.kernel.org/stable/c/bf9ec1b24ab4e94345aa1c60811dd329f069c38b",
            "https://git.kernel.org/stable/c/c1362eae861db28b1608b9dc23e49634fe87b63b",
            "https://git.kernel.org/stable/c/cba138f1ef37ec6f961baeab62f312dedc7cf730",
            "https://git.kernel.org/stable/c/cde76b3af247f615447bcfecf610bb76c3529126",
            "https://git.kernel.org/stable/c/e6450d5e46a737a008b4885aa223486113bf0ad6",
            "https://www.cve.org/CVERecord?id=CVE-2024-26901\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26901\nhttps://lore.kernel.org/linux-cve-announce/2024041745-CVE-2024-26901-34e7@gregkh/T"
        ]
    },
    "CVE-2024-26906": {
        "cve": "CVE-2024-26906",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()\n\nWhen trying to use copy_from_kernel_nofault() to read vsyscall page\nthrough a bpf program, the following oops was reported:\n\n  BUG: unable to handle page fault for address: ffffffffff600000\n  #PF: supervisor read access in kernel mode\n  #PF: error_code(0x0000) - not-present page\n  PGD 3231067 P4D 3231067 PUD 3233067 PMD 3235067 PTE 0\n  Oops: 0000 [#1] PREEMPT SMP PTI\n  CPU: 1 PID: 20390 Comm: test_progs ...... 6.7.0+ #58\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......\n  RIP: 0010:copy_from_kernel_nofault+0x6f/0x110\n  ......\n  Call Trace:\n   <TASK>\n   ? copy_from_kernel_nofault+0x6f/0x110\n   bpf_probe_read_kernel+0x1d/0x50\n   bpf_prog_2061065e56845f08_do_probe_read+0x51/0x8d\n   trace_call_bpf+0xc5/0x1c0\n   perf_call_bpf_enter.isra.0+0x69/0xb0\n   perf_syscall_enter+0x13e/0x200\n   syscall_trace_enter+0x188/0x1c0\n   do_syscall_64+0xb5/0xe0\n   entry_SYSCALL_64_after_hwframe+0x6e/0x76\n   </TASK>\n  ......\n  ---[ end trace 0000000000000000 ]---\n\nThe oops is triggered when:\n\n1) A bpf program uses bpf_probe_read_kernel() to read from the vsyscall\npage and invokes copy_from_kernel_nofault() which in turn calls\n__get_user_asm().\n\n2) Because the vsyscall page address is not readable from kernel space,\na page fault exception is triggered accordingly.\n\n3) handle_page_fault() considers the vsyscall page address as a user\nspace address instead of a kernel space address. This results in the\nfix-up setup by bpf not being applied and a page_fault_oops() is invoked\ndue to SMAP.\n\nConsidering handle_page_fault() has already considered the vsyscall page\naddress as a userspace address, fix the problem by disallowing vsyscall\npage read for copy_from_kernel_nofault().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26906",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/29bd6f86904682adafe9affbc7f79b14defcaff8",
            "patch_url": "https://git.kernel.org/stable/p/29bd6f86904682adafe9affbc7f79b14defcaff8",
            "filename": "CVE-2024-26906-29bd6f86904682adafe9affbc7f79b14defcaff8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26906/CVE-2024-26906-29bd6f86904682adafe9affbc7f79b14defcaff8.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/29bd6f86904682adafe9affbc7f79b14defcaff8",
                "patch_url": "https://git.kernel.org/stable/p/29bd6f86904682adafe9affbc7f79b14defcaff8",
                "filename": "CVE-2024-26906-29bd6f86904682adafe9affbc7f79b14defcaff8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26906/CVE-2024-26906-29bd6f86904682adafe9affbc7f79b14defcaff8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/32019c659ecfe1d92e3bf9fcdfbb11a7c70acd58",
                "patch_url": "https://git.kernel.org/stable/p/32019c659ecfe1d92e3bf9fcdfbb11a7c70acd58",
                "filename": "CVE-2024-26906-32019c659ecfe1d92e3bf9fcdfbb11a7c70acd58.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26906/CVE-2024-26906-32019c659ecfe1d92e3bf9fcdfbb11a7c70acd58.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/57f78c46f08198e1be08ffe99c4c1ccc12855bf5",
                "patch_url": "https://git.kernel.org/stable/p/57f78c46f08198e1be08ffe99c4c1ccc12855bf5",
                "filename": "CVE-2024-26906-57f78c46f08198e1be08ffe99c4c1ccc12855bf5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26906/CVE-2024-26906-57f78c46f08198e1be08ffe99c4c1ccc12855bf5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6e4694e65b6db4c3de125115dd4f55848cc48381",
                "patch_url": "https://git.kernel.org/stable/p/6e4694e65b6db4c3de125115dd4f55848cc48381",
                "filename": "CVE-2024-26906-6e4694e65b6db4c3de125115dd4f55848cc48381.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26906/CVE-2024-26906-6e4694e65b6db4c3de125115dd4f55848cc48381.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e8a67fe34b76a49320b33032228a794f40b0316b",
                "patch_url": "https://git.kernel.org/stable/p/e8a67fe34b76a49320b33032228a794f40b0316b",
                "filename": "CVE-2024-26906-e8a67fe34b76a49320b33032228a794f40b0316b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26906/CVE-2024-26906-e8a67fe34b76a49320b33032228a794f40b0316b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f175de546a3eb77614d94d4c02550181c0a8493e",
                "patch_url": "https://git.kernel.org/stable/p/f175de546a3eb77614d94d4c02550181c0a8493e",
                "filename": "CVE-2024-26906-f175de546a3eb77614d94d4c02550181c0a8493e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26906/CVE-2024-26906-f175de546a3eb77614d94d4c02550181c0a8493e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/29bd6f86904682adafe9affbc7f79b14defcaff8",
            "https://git.kernel.org/stable/c/32019c659ecfe1d92e3bf9fcdfbb11a7c70acd58",
            "https://git.kernel.org/stable/c/57f78c46f08198e1be08ffe99c4c1ccc12855bf5",
            "https://git.kernel.org/stable/c/6e4694e65b6db4c3de125115dd4f55848cc48381",
            "https://git.kernel.org/stable/c/e8a67fe34b76a49320b33032228a794f40b0316b",
            "https://git.kernel.org/stable/c/f175de546a3eb77614d94d4c02550181c0a8493e",
            "https://www.cve.org/CVERecord?id=CVE-2024-26906\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26906\nhttps://lore.kernel.org/linux-cve-announce/2024041746-CVE-2024-26906-bb35@gregkh/T"
        ]
    },
    "CVE-2024-26907": {
        "cve": "CVE-2024-26907",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx5: Fix fortify source warning while accessing Eth segment\n\n ------------[ cut here ]------------\n memcpy: detected field-spanning write (size 56) of single field \"eseg->inline_hdr.start\" at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 (size 2)\n WARNING: CPU: 0 PID: 293779 at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]\n Modules linked in: 8021q garp mrp stp llc rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) ib_uverbs(OE) ib_core(OE) mlx5_core(OE) pci_hyperv_intf mlxdevm(OE) mlx_compat(OE) tls mlxfw(OE) psample nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink mst_pciconf(OE) knem(OE) vfio_pci vfio_pci_core vfio_iommu_type1 vfio iommufd irqbypass cuse nfsv3 nfs fscache netfs xfrm_user xfrm_algo ipmi_devintf ipmi_msghandler binfmt_misc crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 snd_pcsp aesni_intel crypto_simd cryptd snd_pcm snd_timer joydev snd soundcore input_leds serio_raw evbug nfsd auth_rpcgss nfs_acl lockd grace sch_fq_codel sunrpc drm efi_pstore ip_tables x_tables autofs4 psmouse virtio_net net_failover failover floppy\n  [last unloaded: mlx_compat(OE)]\n CPU: 0 PID: 293779 Comm: ssh Tainted: G           OE      6.2.0-32-generic #32~22.04.1-Ubuntu\n Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\n RIP: 0010:mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]\n Code: 0c 01 00 a8 01 75 25 48 8b 75 a0 b9 02 00 00 00 48 c7 c2 10 5b fd c0 48 c7 c7 80 5b fd c0 c6 05 57 0c 03 00 01 e8 95 4d 93 da <0f> 0b 44 8b 4d b0 4c 8b 45 c8 48 8b 4d c0 e9 49 fb ff ff 41 0f b7\n RSP: 0018:ffffb5b48478b570 EFLAGS: 00010046\n RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\n RBP: ffffb5b48478b628 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000000 R12: ffffb5b48478b5e8\n R13: ffff963a3c609b5e R14: ffff9639c3fbd800 R15: ffffb5b480475a80\n FS:  00007fc03b444c80(0000) GS:ffff963a3dc00000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000556f46bdf000 CR3: 0000000006ac6003 CR4: 00000000003706f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n  <TASK>\n  ? show_regs+0x72/0x90\n  ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]\n  ? __warn+0x8d/0x160\n  ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]\n  ? report_bug+0x1bb/0x1d0\n  ? handle_bug+0x46/0x90\n  ? exc_invalid_op+0x19/0x80\n  ? asm_exc_invalid_op+0x1b/0x20\n  ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]\n  mlx5_ib_post_send_nodrain+0xb/0x20 [mlx5_ib]\n  ipoib_send+0x2ec/0x770 [ib_ipoib]\n  ipoib_start_xmit+0x5a0/0x770 [ib_ipoib]\n  dev_hard_start_xmit+0x8e/0x1e0\n  ? validate_xmit_skb_list+0x4d/0x80\n  sch_direct_xmit+0x116/0x3a0\n  __dev_xmit_skb+0x1fd/0x580\n  __dev_queue_xmit+0x284/0x6b0\n  ? _raw_spin_unlock_irq+0xe/0x50\n  ? __flush_work.isra.0+0x20d/0x370\n  ? push_pseudo_header+0x17/0x40 [ib_ipoib]\n  neigh_connected_output+0xcd/0x110\n  ip_finish_output2+0x179/0x480\n  ? __smp_call_single_queue+0x61/0xa0\n  __ip_finish_output+0xc3/0x190\n  ip_finish_output+0x2e/0xf0\n  ip_output+0x78/0x110\n  ? __pfx_ip_finish_output+0x10/0x10\n  ip_local_out+0x64/0x70\n  __ip_queue_xmit+0x18a/0x460\n  ip_queue_xmit+0x15/0x30\n  __tcp_transmit_skb+0x914/0x9c0\n  tcp_write_xmit+0x334/0x8d0\n  tcp_push_one+0x3c/0x60\n  tcp_sendmsg_locked+0x2e1/0xac0\n  tcp_sendmsg+0x2d/0x50\n  inet_sendmsg+0x43/0x90\n  sock_sendmsg+0x68/0x80\n  sock_write_iter+0x93/0x100\n  vfs_write+0x326/0x3c0\n  ksys_write+0xbd/0xf0\n  ? do_syscall_64+0x69/0x90\n  __x64_sys_write+0x19/0x30\n  do_syscall_\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26907",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/185fa07000e0a81d54cf8c05414cebff14469a5c",
            "patch_url": "https://git.kernel.org/stable/p/185fa07000e0a81d54cf8c05414cebff14469a5c",
            "filename": "CVE-2024-26907-185fa07000e0a81d54cf8c05414cebff14469a5c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26907/CVE-2024-26907-185fa07000e0a81d54cf8c05414cebff14469a5c.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/185fa07000e0a81d54cf8c05414cebff14469a5c",
                "patch_url": "https://git.kernel.org/stable/p/185fa07000e0a81d54cf8c05414cebff14469a5c",
                "filename": "CVE-2024-26907-185fa07000e0a81d54cf8c05414cebff14469a5c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26907/CVE-2024-26907-185fa07000e0a81d54cf8c05414cebff14469a5c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4d5e86a56615cc387d21c629f9af8fb0e958d350",
                "patch_url": "https://git.kernel.org/stable/p/4d5e86a56615cc387d21c629f9af8fb0e958d350",
                "filename": "CVE-2024-26907-4d5e86a56615cc387d21c629f9af8fb0e958d350.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26907/CVE-2024-26907-4d5e86a56615cc387d21c629f9af8fb0e958d350.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/60ba938a8bc8c90e724c75f98e932f9fb7ae1b9d",
                "patch_url": "https://git.kernel.org/stable/p/60ba938a8bc8c90e724c75f98e932f9fb7ae1b9d",
                "filename": "CVE-2024-26907-60ba938a8bc8c90e724c75f98e932f9fb7ae1b9d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26907/CVE-2024-26907-60ba938a8bc8c90e724c75f98e932f9fb7ae1b9d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9a624a5f95733bac4648ecadb320ca83aa9c08fd",
                "patch_url": "https://git.kernel.org/stable/p/9a624a5f95733bac4648ecadb320ca83aa9c08fd",
                "filename": "CVE-2024-26907-9a624a5f95733bac4648ecadb320ca83aa9c08fd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26907/CVE-2024-26907-9a624a5f95733bac4648ecadb320ca83aa9c08fd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cad82f1671e41094acd3b9a60cd27d67a3c64a21",
                "patch_url": "https://git.kernel.org/stable/p/cad82f1671e41094acd3b9a60cd27d67a3c64a21",
                "filename": "CVE-2024-26907-cad82f1671e41094acd3b9a60cd27d67a3c64a21.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26907/CVE-2024-26907-cad82f1671e41094acd3b9a60cd27d67a3c64a21.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d27c48dc309da72c3b46351a1205d89687272baa",
                "patch_url": "https://git.kernel.org/stable/p/d27c48dc309da72c3b46351a1205d89687272baa",
                "filename": "CVE-2024-26907-d27c48dc309da72c3b46351a1205d89687272baa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26907/CVE-2024-26907-d27c48dc309da72c3b46351a1205d89687272baa.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/185fa07000e0a81d54cf8c05414cebff14469a5c",
            "https://git.kernel.org/stable/c/4d5e86a56615cc387d21c629f9af8fb0e958d350",
            "https://git.kernel.org/stable/c/60ba938a8bc8c90e724c75f98e932f9fb7ae1b9d",
            "https://git.kernel.org/stable/c/9a624a5f95733bac4648ecadb320ca83aa9c08fd",
            "https://git.kernel.org/stable/c/cad82f1671e41094acd3b9a60cd27d67a3c64a21",
            "https://git.kernel.org/stable/c/d27c48dc309da72c3b46351a1205d89687272baa",
            "https://www.cve.org/CVERecord?id=CVE-2024-26907\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26907\nhttps://lore.kernel.org/linux-cve-announce/2024041746-CVE-2024-26907-a02d@gregkh/T"
        ]
    },
    "CVE-2024-26908": {
        "cve": "CVE-2024-26908",
        "cvss_v2": null,
        "cvss_v3": null,
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26908",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc",
            "patch_url": "https://git.kernel.org/stable/p/025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc",
            "filename": "CVE-2024-26908-025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26908/CVE-2024-26908-025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc",
                "patch_url": "https://git.kernel.org/stable/p/025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc",
                "filename": "CVE-2024-26908-025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26908/CVE-2024-26908-025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2",
                "patch_url": "https://git.kernel.org/stable/p/3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2",
                "filename": "CVE-2024-26908-3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26908/CVE-2024-26908-3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/70a33a629090130d731fc1e1ad498bb672eea165",
                "patch_url": "https://git.kernel.org/stable/p/70a33a629090130d731fc1e1ad498bb672eea165",
                "filename": "CVE-2024-26908-70a33a629090130d731fc1e1ad498bb672eea165.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26908/CVE-2024-26908-70a33a629090130d731fc1e1ad498bb672eea165.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8082bccb7ac480ceab89b09c53d20c78ae54f9fa",
                "patch_url": "https://git.kernel.org/stable/p/8082bccb7ac480ceab89b09c53d20c78ae54f9fa",
                "filename": "CVE-2024-26908-8082bccb7ac480ceab89b09c53d20c78ae54f9fa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26908/CVE-2024-26908-8082bccb7ac480ceab89b09c53d20c78ae54f9fa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a9bbb05c0c04b49a1f7f05fd03826321dca2b8d4",
                "patch_url": "https://git.kernel.org/stable/p/a9bbb05c0c04b49a1f7f05fd03826321dca2b8d4",
                "filename": "CVE-2024-26908-a9bbb05c0c04b49a1f7f05fd03826321dca2b8d4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26908/CVE-2024-26908-a9bbb05c0c04b49a1f7f05fd03826321dca2b8d4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d211e8128c0e2122512fa5e859316540349b54af",
                "patch_url": "https://git.kernel.org/stable/p/d211e8128c0e2122512fa5e859316540349b54af",
                "filename": "CVE-2024-26908-d211e8128c0e2122512fa5e859316540349b54af.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26908/CVE-2024-26908-d211e8128c0e2122512fa5e859316540349b54af.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eb279074badac0bbe28749906562d648ca4bc750",
                "patch_url": "https://git.kernel.org/stable/p/eb279074badac0bbe28749906562d648ca4bc750",
                "filename": "CVE-2024-26908-eb279074badac0bbe28749906562d648ca4bc750.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26908/CVE-2024-26908-eb279074badac0bbe28749906562d648ca4bc750.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f49c513f46dc19bf01ffad2aaaf234d7f37f6799",
                "patch_url": "https://git.kernel.org/stable/p/f49c513f46dc19bf01ffad2aaaf234d7f37f6799",
                "filename": "CVE-2024-26908-f49c513f46dc19bf01ffad2aaaf234d7f37f6799.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26908/CVE-2024-26908-f49c513f46dc19bf01ffad2aaaf234d7f37f6799.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc",
            "https://git.kernel.org/stable/c/3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2",
            "https://git.kernel.org/stable/c/70a33a629090130d731fc1e1ad498bb672eea165",
            "https://git.kernel.org/stable/c/8082bccb7ac480ceab89b09c53d20c78ae54f9fa",
            "https://git.kernel.org/stable/c/a9bbb05c0c04b49a1f7f05fd03826321dca2b8d4",
            "https://git.kernel.org/stable/c/d211e8128c0e2122512fa5e859316540349b54af",
            "https://git.kernel.org/stable/c/eb279074badac0bbe28749906562d648ca4bc750",
            "https://git.kernel.org/stable/c/f49c513f46dc19bf01ffad2aaaf234d7f37f6799"
        ]
    },
    "CVE-2024-26919": {
        "cve": "CVE-2024-26919",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: ulpi: Fix debugfs directory leak\n\nThe ULPI per-device debugfs root is named after the ulpi device's\nparent, but ulpi_unregister_interface tries to remove a debugfs\ndirectory named after the ulpi device itself. This results in the\ndirectory sticking around and preventing subsequent (deferred) probes\nfrom succeeding. Change the directory name to match the ulpi device.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26919",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/330d22aba17a4d30a56f007d0f51291d7e00862b",
            "patch_url": "https://git.kernel.org/stable/p/330d22aba17a4d30a56f007d0f51291d7e00862b",
            "filename": "CVE-2024-26919-330d22aba17a4d30a56f007d0f51291d7e00862b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26919/CVE-2024-26919-330d22aba17a4d30a56f007d0f51291d7e00862b.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/330d22aba17a4d30a56f007d0f51291d7e00862b",
                "patch_url": "https://git.kernel.org/stable/p/330d22aba17a4d30a56f007d0f51291d7e00862b",
                "filename": "CVE-2024-26919-330d22aba17a4d30a56f007d0f51291d7e00862b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26919/CVE-2024-26919-330d22aba17a4d30a56f007d0f51291d7e00862b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/33713945cc92ea9c4a1a9479d5c1b7acb7fc4df3",
                "patch_url": "https://git.kernel.org/stable/p/33713945cc92ea9c4a1a9479d5c1b7acb7fc4df3",
                "filename": "CVE-2024-26919-33713945cc92ea9c4a1a9479d5c1b7acb7fc4df3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26919/CVE-2024-26919-33713945cc92ea9c4a1a9479d5c1b7acb7fc4df3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3caf2b2ad7334ef35f55b95f3e1b138c6f77b368",
                "patch_url": "https://git.kernel.org/stable/p/3caf2b2ad7334ef35f55b95f3e1b138c6f77b368",
                "filename": "CVE-2024-26919-3caf2b2ad7334ef35f55b95f3e1b138c6f77b368.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26919/CVE-2024-26919-3caf2b2ad7334ef35f55b95f3e1b138c6f77b368.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d31b886ed6a5095214062ee4fb55037eb930adb6",
                "patch_url": "https://git.kernel.org/stable/p/d31b886ed6a5095214062ee4fb55037eb930adb6",
                "filename": "CVE-2024-26919-d31b886ed6a5095214062ee4fb55037eb930adb6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26919/CVE-2024-26919-d31b886ed6a5095214062ee4fb55037eb930adb6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/330d22aba17a4d30a56f007d0f51291d7e00862b",
            "https://git.kernel.org/stable/c/33713945cc92ea9c4a1a9479d5c1b7acb7fc4df3",
            "https://git.kernel.org/stable/c/3caf2b2ad7334ef35f55b95f3e1b138c6f77b368",
            "https://git.kernel.org/stable/c/d31b886ed6a5095214062ee4fb55037eb930adb6",
            "https://www.cve.org/CVERecord?id=CVE-2024-26919\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26919\nhttps://lore.kernel.org/linux-cve-announce/2024041738-CVE-2024-26919-5100@gregkh/T"
        ]
    },
    "CVE-2024-26921": {
        "cve": "CVE-2024-26921",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: inet_defrag: prevent sk release while still in use\n\nip_local_out() and other functions can pass skb->sk as function argument.\n\nIf the skb is a fragment and reassembly happens before such function call\nreturns, the sk must not be released.\n\nThis affects skb fragments reassembled via netfilter or similar\nmodules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.\n\nEric Dumazet made an initial analysis of this bug.  Quoting Eric:\n  Calling ip_defrag() in output path is also implying skb_orphan(),\n  which is buggy because output path relies on sk not disappearing.\n\n  A relevant old patch about the issue was :\n  8282f27449bf (\"inet: frag: Always orphan skbs inside ip_defrag()\")\n\n  [..]\n\n  net/ipv4/ip_output.c depends on skb->sk being set, and probably to an\n  inet socket, not an arbitrary one.\n\n  If we orphan the packet in ipvlan, then downstream things like FQ\n  packet scheduler will not work properly.\n\n  We need to change ip_defrag() to only use skb_orphan() when really\n  needed, ie whenever frag_list is going to be used.\n\nEric suggested to stash sk in fragment queue and made an initial patch.\nHowever there is a problem with this:\n\nIf skb is refragmented again right after, ip_do_fragment() will copy\nhead->sk to the new fragments, and sets up destructor to sock_wfree.\nIOW, we have no choice but to fix up sk_wmem accouting to reflect the\nfully reassembled skb, else wmem will underflow.\n\nThis change moves the orphan down into the core, to last possible moment.\nAs ip_defrag_offset is aliased with sk_buff->sk member, we must move the\noffset into the FRAG_CB, else skb->sk gets clobbered.\n\nThis allows to delay the orphaning long enough to learn if the skb has\nto be queued or if the skb is completing the reasm queue.\n\nIn the former case, things work as before, skb is orphaned.  This is\nsafe because skb gets queued/stolen and won't continue past reasm engine.\n\nIn the latter case, we will steal the skb->sk reference, reattach it to\nthe head skb, and fix up wmem accouting when inet_frag inflates truesize.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26921",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9705f447bf9a6cd088300ad2c407b5e1c6591091",
            "patch_url": "https://git.kernel.org/stable/p/9705f447bf9a6cd088300ad2c407b5e1c6591091",
            "filename": "CVE-2024-26921-9705f447bf9a6cd088300ad2c407b5e1c6591091.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26921/CVE-2024-26921-9705f447bf9a6cd088300ad2c407b5e1c6591091.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/18685451fc4e546fc0e718580d32df3c0e5c8272",
                "patch_url": "https://git.kernel.org/stable/p/18685451fc4e546fc0e718580d32df3c0e5c8272",
                "filename": "CVE-2024-26921-18685451fc4e546fc0e718580d32df3c0e5c8272.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26921/CVE-2024-26921-18685451fc4e546fc0e718580d32df3c0e5c8272.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1b6de5e6575b56502665c65cf93b0ae6aa0f51ab",
                "patch_url": "https://git.kernel.org/stable/p/1b6de5e6575b56502665c65cf93b0ae6aa0f51ab",
                "filename": "CVE-2024-26921-1b6de5e6575b56502665c65cf93b0ae6aa0f51ab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26921/CVE-2024-26921-1b6de5e6575b56502665c65cf93b0ae6aa0f51ab.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4318608dc28ef184158b4045896740716bea23f0",
                "patch_url": "https://git.kernel.org/stable/p/4318608dc28ef184158b4045896740716bea23f0",
                "filename": "CVE-2024-26921-4318608dc28ef184158b4045896740716bea23f0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26921/CVE-2024-26921-4318608dc28ef184158b4045896740716bea23f0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7d0567842b78390dd9b60f00f1d8f838d540e325",
                "patch_url": "https://git.kernel.org/stable/p/7d0567842b78390dd9b60f00f1d8f838d540e325",
                "filename": "CVE-2024-26921-7d0567842b78390dd9b60f00f1d8f838d540e325.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26921/CVE-2024-26921-7d0567842b78390dd9b60f00f1d8f838d540e325.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9705f447bf9a6cd088300ad2c407b5e1c6591091",
                "patch_url": "https://git.kernel.org/stable/p/9705f447bf9a6cd088300ad2c407b5e1c6591091",
                "filename": "CVE-2024-26921-9705f447bf9a6cd088300ad2c407b5e1c6591091.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26921/CVE-2024-26921-9705f447bf9a6cd088300ad2c407b5e1c6591091.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e09cbe017311508c21e0739e97198a8388b98981",
                "patch_url": "https://git.kernel.org/stable/p/e09cbe017311508c21e0739e97198a8388b98981",
                "filename": "CVE-2024-26921-e09cbe017311508c21e0739e97198a8388b98981.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26921/CVE-2024-26921-e09cbe017311508c21e0739e97198a8388b98981.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f4877225313d474659ee53150ccc3d553a978727",
                "patch_url": "https://git.kernel.org/stable/p/f4877225313d474659ee53150ccc3d553a978727",
                "filename": "CVE-2024-26921-f4877225313d474659ee53150ccc3d553a978727.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26921/CVE-2024-26921-f4877225313d474659ee53150ccc3d553a978727.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/18685451fc4e546fc0e718580d32df3c0e5c8272",
            "https://git.kernel.org/stable/c/1b6de5e6575b56502665c65cf93b0ae6aa0f51ab",
            "https://git.kernel.org/stable/c/4318608dc28ef184158b4045896740716bea23f0",
            "https://git.kernel.org/stable/c/7d0567842b78390dd9b60f00f1d8f838d540e325",
            "https://git.kernel.org/stable/c/9705f447bf9a6cd088300ad2c407b5e1c6591091",
            "https://git.kernel.org/stable/c/e09cbe017311508c21e0739e97198a8388b98981",
            "https://git.kernel.org/stable/c/f4877225313d474659ee53150ccc3d553a978727",
            "https://www.cve.org/CVERecord?id=CVE-2024-26921\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26921\nhttps://lore.kernel.org/linux-cve-announce/2024041819-CVE-2024-26921-e3b3@gregkh/T"
        ]
    },
    "CVE-2024-26923": {
        "cve": "CVE-2024-26923",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Fix garbage collector racing against connect()\n\nGarbage collector does not take into account the risk of embryo getting\nenqueued during the garbage collection. If such embryo has a peer that\ncarries SCM_RIGHTS, two consecutive passes of scan_children() may see a\ndifferent set of children. Leading to an incorrectly elevated inflight\ncount, and then a dangling pointer within the gc_inflight_list.\n\nsockets are AF_UNIX/SOCK_STREAM\nS is an unconnected socket\nL is a listening in-flight socket bound to addr, not in fdtable\nV's fd will be passed via sendmsg(), gets inflight count bumped\n\nconnect(S, addr)\tsendmsg(S, [V]); close(V)\t__unix_gc()\n----------------\t-------------------------\t-----------\n\nNS = unix_create1()\nskb1 = sock_wmalloc(NS)\nL = unix_find_other(addr)\nunix_state_lock(L)\nunix_peer(S) = NS\n\t\t\t// V count=1 inflight=0\n\n \t\t\tNS = unix_peer(S)\n \t\t\tskb2 = sock_alloc()\n\t\t\tskb_queue_tail(NS, skb2[V])\n\n\t\t\t// V became in-flight\n\t\t\t// V count=2 inflight=1\n\n\t\t\tclose(V)\n\n\t\t\t// V count=1 inflight=1\n\t\t\t// GC candidate condition met\n\n\t\t\t\t\t\tfor u in gc_inflight_list:\n\t\t\t\t\t\t  if (total_refs == inflight_refs)\n\t\t\t\t\t\t    add u to gc_candidates\n\n\t\t\t\t\t\t// gc_candidates={L, V}\n\n\t\t\t\t\t\tfor u in gc_candidates:\n\t\t\t\t\t\t  scan_children(u, dec_inflight)\n\n\t\t\t\t\t\t// embryo (skb1) was not\n\t\t\t\t\t\t// reachable from L yet, so V's\n\t\t\t\t\t\t// inflight remains unchanged\n__skb_queue_tail(L, skb1)\nunix_state_unlock(L)\n\t\t\t\t\t\tfor u in gc_candidates:\n\t\t\t\t\t\t  if (u.inflight)\n\t\t\t\t\t\t    scan_children(u, inc_inflight_move_tail)\n\n\t\t\t\t\t\t// V count=1 inflight=2 (!)\n\nIf there is a GC-candidate listening socket, lock/unlock its state. This\nmakes GC wait until the end of any ongoing connect() to that socket. After\nflipping the lock, a possibly SCM-laden embryo is already enqueued. And if\nthere is another embryo coming, it can not possibly carry SCM_RIGHTS. At\nthis point, unix_inflight() can not happen because unix_gc_lock is already\ntaken. Inflight graph remains unaffected.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26923",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2e2a03787f4f0abc0072350654ab0ef3324d9db3",
            "patch_url": "https://git.kernel.org/stable/p/2e2a03787f4f0abc0072350654ab0ef3324d9db3",
            "filename": "CVE-2024-26923-2e2a03787f4f0abc0072350654ab0ef3324d9db3.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26923/CVE-2024-26923-2e2a03787f4f0abc0072350654ab0ef3324d9db3.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2e2a03787f4f0abc0072350654ab0ef3324d9db3",
                "patch_url": "https://git.kernel.org/stable/p/2e2a03787f4f0abc0072350654ab0ef3324d9db3",
                "filename": "CVE-2024-26923-2e2a03787f4f0abc0072350654ab0ef3324d9db3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26923/CVE-2024-26923-2e2a03787f4f0abc0072350654ab0ef3324d9db3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/343c5372d5e17b306db5f8f3c895539b06e3177f",
                "patch_url": "https://git.kernel.org/stable/p/343c5372d5e17b306db5f8f3c895539b06e3177f",
                "filename": "CVE-2024-26923-343c5372d5e17b306db5f8f3c895539b06e3177f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26923/CVE-2024-26923-343c5372d5e17b306db5f8f3c895539b06e3177f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/47d8ac011fe1c9251070e1bd64cb10b48193ec51",
                "patch_url": "https://git.kernel.org/stable/p/47d8ac011fe1c9251070e1bd64cb10b48193ec51",
                "filename": "CVE-2024-26923-47d8ac011fe1c9251070e1bd64cb10b48193ec51.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26923/CVE-2024-26923-47d8ac011fe1c9251070e1bd64cb10b48193ec51.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/507cc232ffe53a352847893f8177d276c3b532a9",
                "patch_url": "https://git.kernel.org/stable/p/507cc232ffe53a352847893f8177d276c3b532a9",
                "filename": "CVE-2024-26923-507cc232ffe53a352847893f8177d276c3b532a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26923/CVE-2024-26923-507cc232ffe53a352847893f8177d276c3b532a9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a36ae0ec2353015f0f6762e59f4c2dbc0c906423",
                "patch_url": "https://git.kernel.org/stable/p/a36ae0ec2353015f0f6762e59f4c2dbc0c906423",
                "filename": "CVE-2024-26923-a36ae0ec2353015f0f6762e59f4c2dbc0c906423.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26923/CVE-2024-26923-a36ae0ec2353015f0f6762e59f4c2dbc0c906423.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b75722be422c276b699200de90527d01c602ea7c",
                "patch_url": "https://git.kernel.org/stable/p/b75722be422c276b699200de90527d01c602ea7c",
                "filename": "CVE-2024-26923-b75722be422c276b699200de90527d01c602ea7c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26923/CVE-2024-26923-b75722be422c276b699200de90527d01c602ea7c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dbdf7bec5c920200077d693193f989cb1513f009",
                "patch_url": "https://git.kernel.org/stable/p/dbdf7bec5c920200077d693193f989cb1513f009",
                "filename": "CVE-2024-26923-dbdf7bec5c920200077d693193f989cb1513f009.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26923/CVE-2024-26923-dbdf7bec5c920200077d693193f989cb1513f009.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e76c2678228f6aec74b305ae30c9374cc2f28a51",
                "patch_url": "https://git.kernel.org/stable/p/e76c2678228f6aec74b305ae30c9374cc2f28a51",
                "filename": "CVE-2024-26923-e76c2678228f6aec74b305ae30c9374cc2f28a51.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26923/CVE-2024-26923-e76c2678228f6aec74b305ae30c9374cc2f28a51.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2e2a03787f4f0abc0072350654ab0ef3324d9db3",
            "https://git.kernel.org/stable/c/343c5372d5e17b306db5f8f3c895539b06e3177f",
            "https://git.kernel.org/stable/c/47d8ac011fe1c9251070e1bd64cb10b48193ec51",
            "https://git.kernel.org/stable/c/507cc232ffe53a352847893f8177d276c3b532a9",
            "https://git.kernel.org/stable/c/a36ae0ec2353015f0f6762e59f4c2dbc0c906423",
            "https://git.kernel.org/stable/c/b75722be422c276b699200de90527d01c602ea7c",
            "https://git.kernel.org/stable/c/dbdf7bec5c920200077d693193f989cb1513f009",
            "https://git.kernel.org/stable/c/e76c2678228f6aec74b305ae30c9374cc2f28a51",
            "https://www.cve.org/CVERecord?id=CVE-2024-26923\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26923\nhttps://lore.kernel.org/linux-cve-announce/2024042418-CVE-2024-26923-f7f6@gregkh/T"
        ]
    },
    "CVE-2024-26924": {
        "cve": "CVE-2024-26924",
        "cvss_v2": null,
        "cvss_v3": 5.9,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: do not free live element\n\nPablo reports a crash with large batches of elements with a\nback-to-back add/remove pattern.  Quoting Pablo:\n\n  add_elem(\"00000000\") timeout 100 ms\n  ...\n  add_elem(\"0000000X\") timeout 100 ms\n  del_elem(\"0000000X\") <---------------- delete one that was just added\n  ...\n  add_elem(\"00005000\") timeout 100 ms\n\n  1) nft_pipapo_remove() removes element 0000000X\n  Then, KASAN shows a splat.\n\nLooking at the remove function there is a chance that we will drop a\nrule that maps to a non-deactivated element.\n\nRemoval happens in two steps, first we do a lookup for key k and return the\nto-be-removed element and mark it as inactive in the next generation.\nThen, in a second step, the element gets removed from the set/map.\n\nThe _remove function does not work correctly if we have more than one\nelement that share the same key.\n\nThis can happen if we insert an element into a set when the set already\nholds an element with same key, but the element mapping to the existing\nkey has timed out or is not active in the next generation.\n\nIn such case its possible that removal will unmap the wrong element.\nIf this happens, we will leak the non-deactivated element, it becomes\nunreachable.\n\nThe element that got deactivated (and will be freed later) will\nremain reachable in the set data structure, this can result in\na crash when such an element is retrieved during lookup (stale\npointer).\n\nAdd a check that the fully matching key does in fact map to the element\nthat we have marked as inactive in the deactivation step.\nIf not, we need to continue searching.\n\nAdd a bug/warn trap at the end of the function as well, the remove\nfunction must not ever be called with an invisible/unreachable/non-existent\nelement.\n\nv2: avoid uneeded temporary variable (Stefano)",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26924",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/14b001ba221136c15f894577253e8db535b99487",
            "patch_url": "https://git.kernel.org/stable/p/14b001ba221136c15f894577253e8db535b99487",
            "filename": "CVE-2024-26924-14b001ba221136c15f894577253e8db535b99487.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26924/CVE-2024-26924-14b001ba221136c15f894577253e8db535b99487.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/14b001ba221136c15f894577253e8db535b99487",
                "patch_url": "https://git.kernel.org/stable/p/14b001ba221136c15f894577253e8db535b99487",
                "filename": "CVE-2024-26924-14b001ba221136c15f894577253e8db535b99487.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26924/CVE-2024-26924-14b001ba221136c15f894577253e8db535b99487.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3cfc9ec039af60dbd8965ae085b2c2ccdcfbe1cc",
                "patch_url": "https://git.kernel.org/stable/p/3cfc9ec039af60dbd8965ae085b2c2ccdcfbe1cc",
                "filename": "CVE-2024-26924-3cfc9ec039af60dbd8965ae085b2c2ccdcfbe1cc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26924/CVE-2024-26924-3cfc9ec039af60dbd8965ae085b2c2ccdcfbe1cc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/41d8fdf3afaff312e17466e4ab732937738d5644",
                "patch_url": "https://git.kernel.org/stable/p/41d8fdf3afaff312e17466e4ab732937738d5644",
                "filename": "CVE-2024-26924-41d8fdf3afaff312e17466e4ab732937738d5644.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26924/CVE-2024-26924-41d8fdf3afaff312e17466e4ab732937738d5644.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7a1679e2d9bfa3b5f8755c2c7113e54b7d42bd46",
                "patch_url": "https://git.kernel.org/stable/p/7a1679e2d9bfa3b5f8755c2c7113e54b7d42bd46",
                "filename": "CVE-2024-26924-7a1679e2d9bfa3b5f8755c2c7113e54b7d42bd46.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26924/CVE-2024-26924-7a1679e2d9bfa3b5f8755c2c7113e54b7d42bd46.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e3b887a9c11caf8357a821260e095f2a694a34f2",
                "patch_url": "https://git.kernel.org/stable/p/e3b887a9c11caf8357a821260e095f2a694a34f2",
                "filename": "CVE-2024-26924-e3b887a9c11caf8357a821260e095f2a694a34f2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26924/CVE-2024-26924-e3b887a9c11caf8357a821260e095f2a694a34f2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ebf7c9746f073035ee26209e38c3a1170f7b349a",
                "patch_url": "https://git.kernel.org/stable/p/ebf7c9746f073035ee26209e38c3a1170f7b349a",
                "filename": "CVE-2024-26924-ebf7c9746f073035ee26209e38c3a1170f7b349a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26924/CVE-2024-26924-ebf7c9746f073035ee26209e38c3a1170f7b349a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/14b001ba221136c15f894577253e8db535b99487",
            "https://git.kernel.org/stable/c/3cfc9ec039af60dbd8965ae085b2c2ccdcfbe1cc",
            "https://git.kernel.org/stable/c/41d8fdf3afaff312e17466e4ab732937738d5644",
            "https://git.kernel.org/stable/c/7a1679e2d9bfa3b5f8755c2c7113e54b7d42bd46",
            "https://git.kernel.org/stable/c/e3b887a9c11caf8357a821260e095f2a694a34f2",
            "https://git.kernel.org/stable/c/ebf7c9746f073035ee26209e38c3a1170f7b349a",
            "https://www.cve.org/CVERecord?id=CVE-2024-26924\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26924\nhttps://lore.kernel.org/linux-cve-announce/2024042420-CVE-2024-26924-4d1e@gregkh/T"
        ]
    },
    "CVE-2024-26925": {
        "cve": "CVE-2024-26925",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: release mutex after nft_gc_seq_end from abort path\n\nThe commit mutex should not be released during the critical section\nbetween nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC\nworker could collect expired objects and get the released commit lock\nwithin the same GC sequence.\n\nnf_tables_module_autoload() temporarily releases the mutex to load\nmodule dependencies, then it goes back to replay the transaction again.\nMove it at the end of the abort phase after nft_gc_seq_end() is called.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26925",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0d459e2ffb541841714839e8228b845458ed3b27",
            "patch_url": "https://git.kernel.org/stable/p/0d459e2ffb541841714839e8228b845458ed3b27",
            "filename": "CVE-2024-26925-0d459e2ffb541841714839e8228b845458ed3b27.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26925/CVE-2024-26925-0d459e2ffb541841714839e8228b845458ed3b27.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0d459e2ffb541841714839e8228b845458ed3b27",
                "patch_url": "https://git.kernel.org/stable/p/0d459e2ffb541841714839e8228b845458ed3b27",
                "filename": "CVE-2024-26925-0d459e2ffb541841714839e8228b845458ed3b27.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26925/CVE-2024-26925-0d459e2ffb541841714839e8228b845458ed3b27.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2cee2ff7f8cce12a63a0a23ffe27f08d99541494",
                "patch_url": "https://git.kernel.org/stable/p/2cee2ff7f8cce12a63a0a23ffe27f08d99541494",
                "filename": "CVE-2024-26925-2cee2ff7f8cce12a63a0a23ffe27f08d99541494.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26925/CVE-2024-26925-2cee2ff7f8cce12a63a0a23ffe27f08d99541494.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/61ac7284346c32f9a8c8ceac56102f7914060428",
                "patch_url": "https://git.kernel.org/stable/p/61ac7284346c32f9a8c8ceac56102f7914060428",
                "filename": "CVE-2024-26925-61ac7284346c32f9a8c8ceac56102f7914060428.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26925/CVE-2024-26925-61ac7284346c32f9a8c8ceac56102f7914060428.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8038ee3c3e5b59bcd78467686db5270c68544e30",
                "patch_url": "https://git.kernel.org/stable/p/8038ee3c3e5b59bcd78467686db5270c68544e30",
                "filename": "CVE-2024-26925-8038ee3c3e5b59bcd78467686db5270c68544e30.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26925/CVE-2024-26925-8038ee3c3e5b59bcd78467686db5270c68544e30.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8d3a58af50e46167b6f1db47adadad03c0045dae",
                "patch_url": "https://git.kernel.org/stable/p/8d3a58af50e46167b6f1db47adadad03c0045dae",
                "filename": "CVE-2024-26925-8d3a58af50e46167b6f1db47adadad03c0045dae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26925/CVE-2024-26925-8d3a58af50e46167b6f1db47adadad03c0045dae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a34ba4bdeec0c3b629160497594908dc820110f1",
                "patch_url": "https://git.kernel.org/stable/p/a34ba4bdeec0c3b629160497594908dc820110f1",
                "filename": "CVE-2024-26925-a34ba4bdeec0c3b629160497594908dc820110f1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26925/CVE-2024-26925-a34ba4bdeec0c3b629160497594908dc820110f1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eb769ff4e281f751adcaf4f4445cbf30817be139",
                "patch_url": "https://git.kernel.org/stable/p/eb769ff4e281f751adcaf4f4445cbf30817be139",
                "filename": "CVE-2024-26925-eb769ff4e281f751adcaf4f4445cbf30817be139.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26925/CVE-2024-26925-eb769ff4e281f751adcaf4f4445cbf30817be139.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0d459e2ffb541841714839e8228b845458ed3b27",
            "https://git.kernel.org/stable/c/2cee2ff7f8cce12a63a0a23ffe27f08d99541494",
            "https://git.kernel.org/stable/c/61ac7284346c32f9a8c8ceac56102f7914060428",
            "https://git.kernel.org/stable/c/8038ee3c3e5b59bcd78467686db5270c68544e30",
            "https://git.kernel.org/stable/c/8d3a58af50e46167b6f1db47adadad03c0045dae",
            "https://git.kernel.org/stable/c/a34ba4bdeec0c3b629160497594908dc820110f1",
            "https://git.kernel.org/stable/c/eb769ff4e281f751adcaf4f4445cbf30817be139",
            "https://www.cve.org/CVERecord?id=CVE-2024-26925\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26925\nhttps://lore.kernel.org/linux-cve-announce/2024042421-CVE-2024-26925-7c19@gregkh/T"
        ]
    },
    "CVE-2024-26929": {
        "cve": "CVE-2024-26929",
        "cvss_v2": null,
        "cvss_v3": null,
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26929",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e",
            "patch_url": "https://git.kernel.org/stable/p/282877633b25d67021a34169c5b5519b1d4ef65e",
            "filename": "CVE-2024-26929-282877633b25d67021a34169c5b5519b1d4ef65e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26929/CVE-2024-26929-282877633b25d67021a34169c5b5519b1d4ef65e.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e",
                "patch_url": "https://git.kernel.org/stable/p/282877633b25d67021a34169c5b5519b1d4ef65e",
                "filename": "CVE-2024-26929-282877633b25d67021a34169c5b5519b1d4ef65e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26929/CVE-2024-26929-282877633b25d67021a34169c5b5519b1d4ef65e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525",
                "patch_url": "https://git.kernel.org/stable/p/82f522ae0d97119a43da53e0f729275691b9c525",
                "filename": "CVE-2024-26929-82f522ae0d97119a43da53e0f729275691b9c525.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26929/CVE-2024-26929-82f522ae0d97119a43da53e0f729275691b9c525.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774",
                "patch_url": "https://git.kernel.org/stable/p/846fb9f112f618ec6ae181d8dae7961652574774",
                "filename": "CVE-2024-26929-846fb9f112f618ec6ae181d8dae7961652574774.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26929/CVE-2024-26929-846fb9f112f618ec6ae181d8dae7961652574774.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b",
                "patch_url": "https://git.kernel.org/stable/p/9b43d2884b54d415caab48878b526dfe2ae9921b",
                "filename": "CVE-2024-26929-9b43d2884b54d415caab48878b526dfe2ae9921b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26929/CVE-2024-26929-9b43d2884b54d415caab48878b526dfe2ae9921b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04",
                "patch_url": "https://git.kernel.org/stable/p/b03e626bd6d3f0684f56ee1890d70fc9ca991c04",
                "filename": "CVE-2024-26929-b03e626bd6d3f0684f56ee1890d70fc9ca991c04.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26929/CVE-2024-26929-b03e626bd6d3f0684f56ee1890d70fc9ca991c04.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862",
                "patch_url": "https://git.kernel.org/stable/p/f85af9f1aa5e2f53694a6cbe72010f754b5ff862",
                "filename": "CVE-2024-26929-f85af9f1aa5e2f53694a6cbe72010f754b5ff862.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26929/CVE-2024-26929-f85af9f1aa5e2f53694a6cbe72010f754b5ff862.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e",
            "https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525",
            "https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774",
            "https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b",
            "https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04",
            "https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862",
            "https://www.cve.org/CVERecord?id=CVE-2024-26929\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26929\nhttps://lore.kernel.org/linux-cve-announce/2024050122-CVE-2024-26929-07f0@gregkh/T"
        ]
    },
    "CVE-2024-26933": {
        "cve": "CVE-2024-26933",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix deadlock in port \"disable\" sysfs attribute\n\nThe show and store callback routines for the \"disable\" sysfs attribute\nfile in port.c acquire the device lock for the port's parent hub\ndevice.  This can cause problems if another process has locked the hub\nto remove it or change its configuration:\n\n\tRemoving the hub or changing its configuration requires the\n\thub interface to be removed, which requires the port device\n\tto be removed, and device_del() waits until all outstanding\n\tsysfs attribute callbacks for the ports have returned.  The\n\tlock can't be released until then.\n\n\tBut the disable_show() or disable_store() routine can't return\n\tuntil after it has acquired the lock.\n\nThe resulting deadlock can be avoided by calling\nsysfs_break_active_protection().  This will cause the sysfs core not\nto wait for the attribute's callback routine to return, allowing the\nremoval to proceed.  The disadvantage is that after making this call,\nthere is no guarantee that the hub structure won't be deallocated at\nany moment.  To prevent this, we have to acquire a reference to it\nfirst by calling hub_get().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26933",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9dac54f08198147f5ec0ec52fcf1bc8ac899ac05",
            "patch_url": "https://git.kernel.org/stable/p/9dac54f08198147f5ec0ec52fcf1bc8ac899ac05",
            "filename": "CVE-2024-26933-9dac54f08198147f5ec0ec52fcf1bc8ac899ac05.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26933/CVE-2024-26933-9dac54f08198147f5ec0ec52fcf1bc8ac899ac05.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4facc9421117ba9d8148c73771b213887fec77f7",
                "patch_url": "https://git.kernel.org/stable/p/4facc9421117ba9d8148c73771b213887fec77f7",
                "filename": "CVE-2024-26933-4facc9421117ba9d8148c73771b213887fec77f7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26933/CVE-2024-26933-4facc9421117ba9d8148c73771b213887fec77f7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/73d1589b91f2099e5f6534a8497b7c6b527e064e",
                "patch_url": "https://git.kernel.org/stable/p/73d1589b91f2099e5f6534a8497b7c6b527e064e",
                "filename": "CVE-2024-26933-73d1589b91f2099e5f6534a8497b7c6b527e064e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26933/CVE-2024-26933-73d1589b91f2099e5f6534a8497b7c6b527e064e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9dac54f08198147f5ec0ec52fcf1bc8ac899ac05",
                "patch_url": "https://git.kernel.org/stable/p/9dac54f08198147f5ec0ec52fcf1bc8ac899ac05",
                "filename": "CVE-2024-26933-9dac54f08198147f5ec0ec52fcf1bc8ac899ac05.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26933/CVE-2024-26933-9dac54f08198147f5ec0ec52fcf1bc8ac899ac05.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f4d1960764d8a70318b02f15203a1be2b2554ca1",
                "patch_url": "https://git.kernel.org/stable/p/f4d1960764d8a70318b02f15203a1be2b2554ca1",
                "filename": "CVE-2024-26933-f4d1960764d8a70318b02f15203a1be2b2554ca1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26933/CVE-2024-26933-f4d1960764d8a70318b02f15203a1be2b2554ca1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f51849833705dea5b4f9b0c8de714dd87bd6c95c",
                "patch_url": "https://git.kernel.org/stable/p/f51849833705dea5b4f9b0c8de714dd87bd6c95c",
                "filename": "CVE-2024-26933-f51849833705dea5b4f9b0c8de714dd87bd6c95c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26933/CVE-2024-26933-f51849833705dea5b4f9b0c8de714dd87bd6c95c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4facc9421117ba9d8148c73771b213887fec77f7",
            "https://git.kernel.org/stable/c/73d1589b91f2099e5f6534a8497b7c6b527e064e",
            "https://git.kernel.org/stable/c/9dac54f08198147f5ec0ec52fcf1bc8ac899ac05",
            "https://git.kernel.org/stable/c/f4d1960764d8a70318b02f15203a1be2b2554ca1",
            "https://git.kernel.org/stable/c/f51849833705dea5b4f9b0c8de714dd87bd6c95c",
            "https://www.cve.org/CVERecord?id=CVE-2024-26933\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26933\nhttps://lore.kernel.org/linux-cve-announce/2024050123-CVE-2024-26933-c18d@gregkh/T"
        ]
    },
    "CVE-2024-26934": {
        "cve": "CVE-2024-26934",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix deadlock in usb_deauthorize_interface()\n\nAmong the attribute file callback routines in\ndrivers/usb/core/sysfs.c, the interface_authorized_store() function is\nthe only one which acquires a device lock on an ancestor device: It\ncalls usb_deauthorize_interface(), which locks the interface's parent\nUSB device.\n\nThe will lead to deadlock if another process already owns that lock\nand tries to remove the interface, whether through a configuration\nchange or because the device has been disconnected.  As part of the\nremoval procedure, device_del() waits for all ongoing sysfs attribute\ncallbacks to complete.  But usb_deauthorize_interface() can't complete\nuntil the device lock has been released, and the lock won't be\nreleased until the removal has finished.\n\nThe mechanism provided by sysfs to prevent this kind of deadlock is\nto use the sysfs_break_active_protection() function, which tells sysfs\nnot to wait for the attribute callback.\n\nReported-and-tested by: Yue Sun <samsun1006219@gmail.com>\nReported by: xingwei lee <xrivendell7@gmail.com>",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26934",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ab062fa3dc69aea88fe62162c5881ba14b50ecc5",
            "patch_url": "https://git.kernel.org/stable/p/ab062fa3dc69aea88fe62162c5881ba14b50ecc5",
            "filename": "CVE-2024-26934-ab062fa3dc69aea88fe62162c5881ba14b50ecc5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26934/CVE-2024-26934-ab062fa3dc69aea88fe62162c5881ba14b50ecc5.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/07acf979da33c721357ff27129edf74c23c036c6",
                "patch_url": "https://git.kernel.org/stable/p/07acf979da33c721357ff27129edf74c23c036c6",
                "filename": "CVE-2024-26934-07acf979da33c721357ff27129edf74c23c036c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26934/CVE-2024-26934-07acf979da33c721357ff27129edf74c23c036c6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/122a06f1068bf5e39089863f4f60b1f5d4273384",
                "patch_url": "https://git.kernel.org/stable/p/122a06f1068bf5e39089863f4f60b1f5d4273384",
                "filename": "CVE-2024-26934-122a06f1068bf5e39089863f4f60b1f5d4273384.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26934/CVE-2024-26934-122a06f1068bf5e39089863f4f60b1f5d4273384.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/12d6a5681a0a5cecc2af7860f0a1613fa7c6e947",
                "patch_url": "https://git.kernel.org/stable/p/12d6a5681a0a5cecc2af7860f0a1613fa7c6e947",
                "filename": "CVE-2024-26934-12d6a5681a0a5cecc2af7860f0a1613fa7c6e947.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26934/CVE-2024-26934-12d6a5681a0a5cecc2af7860f0a1613fa7c6e947.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1b175bc579f46520b11ecda443bcd2ee4904f66a",
                "patch_url": "https://git.kernel.org/stable/p/1b175bc579f46520b11ecda443bcd2ee4904f66a",
                "filename": "CVE-2024-26934-1b175bc579f46520b11ecda443bcd2ee4904f66a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26934/CVE-2024-26934-1b175bc579f46520b11ecda443bcd2ee4904f66a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/80ba43e9f799cbdd83842fc27db667289b3150f5",
                "patch_url": "https://git.kernel.org/stable/p/80ba43e9f799cbdd83842fc27db667289b3150f5",
                "filename": "CVE-2024-26934-80ba43e9f799cbdd83842fc27db667289b3150f5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26934/CVE-2024-26934-80ba43e9f799cbdd83842fc27db667289b3150f5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8cbdd324b41528994027128207fae8100dff094f",
                "patch_url": "https://git.kernel.org/stable/p/8cbdd324b41528994027128207fae8100dff094f",
                "filename": "CVE-2024-26934-8cbdd324b41528994027128207fae8100dff094f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26934/CVE-2024-26934-8cbdd324b41528994027128207fae8100dff094f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ab062fa3dc69aea88fe62162c5881ba14b50ecc5",
                "patch_url": "https://git.kernel.org/stable/p/ab062fa3dc69aea88fe62162c5881ba14b50ecc5",
                "filename": "CVE-2024-26934-ab062fa3dc69aea88fe62162c5881ba14b50ecc5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26934/CVE-2024-26934-ab062fa3dc69aea88fe62162c5881ba14b50ecc5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dbdf66250d2d33e8b27352fcb901de79f3521057",
                "patch_url": "https://git.kernel.org/stable/p/dbdf66250d2d33e8b27352fcb901de79f3521057",
                "filename": "CVE-2024-26934-dbdf66250d2d33e8b27352fcb901de79f3521057.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26934/CVE-2024-26934-dbdf66250d2d33e8b27352fcb901de79f3521057.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e451709573f8be904a8a72d0775bf114d7c291d9",
                "patch_url": "https://git.kernel.org/stable/p/e451709573f8be904a8a72d0775bf114d7c291d9",
                "filename": "CVE-2024-26934-e451709573f8be904a8a72d0775bf114d7c291d9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26934/CVE-2024-26934-e451709573f8be904a8a72d0775bf114d7c291d9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/07acf979da33c721357ff27129edf74c23c036c6",
            "https://git.kernel.org/stable/c/122a06f1068bf5e39089863f4f60b1f5d4273384",
            "https://git.kernel.org/stable/c/12d6a5681a0a5cecc2af7860f0a1613fa7c6e947",
            "https://git.kernel.org/stable/c/1b175bc579f46520b11ecda443bcd2ee4904f66a",
            "https://git.kernel.org/stable/c/80ba43e9f799cbdd83842fc27db667289b3150f5",
            "https://git.kernel.org/stable/c/8cbdd324b41528994027128207fae8100dff094f",
            "https://git.kernel.org/stable/c/ab062fa3dc69aea88fe62162c5881ba14b50ecc5",
            "https://git.kernel.org/stable/c/dbdf66250d2d33e8b27352fcb901de79f3521057",
            "https://git.kernel.org/stable/c/e451709573f8be904a8a72d0775bf114d7c291d9",
            "https://www.cve.org/CVERecord?id=CVE-2024-26934\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26934\nhttps://lore.kernel.org/linux-cve-announce/2024050123-CVE-2024-26934-e2fc@gregkh/T"
        ]
    },
    "CVE-2024-26935": {
        "cve": "CVE-2024-26935",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Fix unremoved procfs host directory regression\n\nCommit fc663711b944 (\"scsi: core: Remove the /proc/scsi/${proc_name}\ndirectory earlier\") fixed a bug related to modules loading/unloading, by\nadding a call to scsi_proc_hostdir_rm() on scsi_remove_host(). But that led\nto a potential duplicate call to the hostdir_rm() routine, since it's also\ncalled from scsi_host_dev_release(). That triggered a regression report,\nwhich was then fixed by commit be03df3d4bfe (\"scsi: core: Fix a procfs host\ndirectory removal regression\"). The fix just dropped the hostdir_rm() call\nfrom dev_release().\n\nBut it happens that this proc directory is created on scsi_host_alloc(),\nand that function \"pairs\" with scsi_host_dev_release(), while\nscsi_remove_host() pairs with scsi_add_host(). In other words, it seems the\nreason for removing the proc directory on dev_release() was meant to cover\ncases in which a SCSI host structure was allocated, but the call to\nscsi_add_host() didn't happen. And that pattern happens to exist in some\nerror paths, for example.\n\nSyzkaller causes that by using USB raw gadget device, error'ing on\nusb-storage driver, at usb_stor_probe2(). By checking that path, we can see\nthat the BadDevice label leads to a scsi_host_put() after a SCSI host\nallocation, but there's no call to scsi_add_host() in such path. That leads\nto messages like this in dmesg (and a leak of the SCSI host proc\nstructure):\n\nusb-storage 4-1:87.51: USB Mass Storage device detected\nproc_dir_entry 'scsi/usb-storage' already registered\nWARNING: CPU: 1 PID: 3519 at fs/proc/generic.c:377 proc_register+0x347/0x4e0 fs/proc/generic.c:376\n\nThe proper fix seems to still call scsi_proc_hostdir_rm() on dev_release(),\nbut guard that with the state check for SHOST_CREATED; there is even a\ncomment in scsi_host_dev_release() detailing that: such conditional is\nmeant for cases where the SCSI host was allocated but there was no calls to\n{add,remove}_host(), like the usb-storage case.\n\nThis is what we propose here and with that, the error path of usb-storage\ndoes not trigger the warning anymore.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26935",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3678cf67ff7136db1dd3bf63c361650db5d92889",
            "patch_url": "https://git.kernel.org/stable/p/3678cf67ff7136db1dd3bf63c361650db5d92889",
            "filename": "CVE-2024-26935-3678cf67ff7136db1dd3bf63c361650db5d92889.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26935/CVE-2024-26935-3678cf67ff7136db1dd3bf63c361650db5d92889.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0053f15d50d50c9312d8ab9c11e2e405812dfcac",
                "patch_url": "https://git.kernel.org/stable/p/0053f15d50d50c9312d8ab9c11e2e405812dfcac",
                "filename": "CVE-2024-26935-0053f15d50d50c9312d8ab9c11e2e405812dfcac.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26935/CVE-2024-26935-0053f15d50d50c9312d8ab9c11e2e405812dfcac.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3678cf67ff7136db1dd3bf63c361650db5d92889",
                "patch_url": "https://git.kernel.org/stable/p/3678cf67ff7136db1dd3bf63c361650db5d92889",
                "filename": "CVE-2024-26935-3678cf67ff7136db1dd3bf63c361650db5d92889.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26935/CVE-2024-26935-3678cf67ff7136db1dd3bf63c361650db5d92889.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5c2386ba80e779a92ec3bb64ccadbedd88f779b1",
                "patch_url": "https://git.kernel.org/stable/p/5c2386ba80e779a92ec3bb64ccadbedd88f779b1",
                "filename": "CVE-2024-26935-5c2386ba80e779a92ec3bb64ccadbedd88f779b1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26935/CVE-2024-26935-5c2386ba80e779a92ec3bb64ccadbedd88f779b1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cea234bb214b17d004dfdccce4491e6ff57c96ee",
                "patch_url": "https://git.kernel.org/stable/p/cea234bb214b17d004dfdccce4491e6ff57c96ee",
                "filename": "CVE-2024-26935-cea234bb214b17d004dfdccce4491e6ff57c96ee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26935/CVE-2024-26935-cea234bb214b17d004dfdccce4491e6ff57c96ee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d4c34782b6d7b1e68d18d9549451b19433bd4c6c",
                "patch_url": "https://git.kernel.org/stable/p/d4c34782b6d7b1e68d18d9549451b19433bd4c6c",
                "filename": "CVE-2024-26935-d4c34782b6d7b1e68d18d9549451b19433bd4c6c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26935/CVE-2024-26935-d4c34782b6d7b1e68d18d9549451b19433bd4c6c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e293c773c13b830cdc251f155df2254981abc320",
                "patch_url": "https://git.kernel.org/stable/p/e293c773c13b830cdc251f155df2254981abc320",
                "filename": "CVE-2024-26935-e293c773c13b830cdc251f155df2254981abc320.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26935/CVE-2024-26935-e293c773c13b830cdc251f155df2254981abc320.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f23a4d6e07570826fe95023ca1aa96a011fa9f84",
                "patch_url": "https://git.kernel.org/stable/p/f23a4d6e07570826fe95023ca1aa96a011fa9f84",
                "filename": "CVE-2024-26935-f23a4d6e07570826fe95023ca1aa96a011fa9f84.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26935/CVE-2024-26935-f23a4d6e07570826fe95023ca1aa96a011fa9f84.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f4ff08fab66eb5c0b97e1a24edac052fb40bf5d7",
                "patch_url": "https://git.kernel.org/stable/p/f4ff08fab66eb5c0b97e1a24edac052fb40bf5d7",
                "filename": "CVE-2024-26935-f4ff08fab66eb5c0b97e1a24edac052fb40bf5d7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26935/CVE-2024-26935-f4ff08fab66eb5c0b97e1a24edac052fb40bf5d7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0053f15d50d50c9312d8ab9c11e2e405812dfcac",
            "https://git.kernel.org/stable/c/3678cf67ff7136db1dd3bf63c361650db5d92889",
            "https://git.kernel.org/stable/c/5c2386ba80e779a92ec3bb64ccadbedd88f779b1",
            "https://git.kernel.org/stable/c/cea234bb214b17d004dfdccce4491e6ff57c96ee",
            "https://git.kernel.org/stable/c/d4c34782b6d7b1e68d18d9549451b19433bd4c6c",
            "https://git.kernel.org/stable/c/e293c773c13b830cdc251f155df2254981abc320",
            "https://git.kernel.org/stable/c/f23a4d6e07570826fe95023ca1aa96a011fa9f84",
            "https://git.kernel.org/stable/c/f4ff08fab66eb5c0b97e1a24edac052fb40bf5d7",
            "https://www.cve.org/CVERecord?id=CVE-2024-26935\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26935\nhttps://lore.kernel.org/linux-cve-announce/2024050124-CVE-2024-26935-8b4e@gregkh/T"
        ]
    },
    "CVE-2024-26939": {
        "cve": "CVE-2024-26939",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/vma: Fix UAF on destroy against retire race\n\nObject debugging tools were sporadically reporting illegal attempts to\nfree a still active i915 VMA object when parking a GT believed to be idle.\n\n[161.359441] ODEBUG: free active (active state 0) object: ffff88811643b958 object type: i915_active hint: __i915_vma_active+0x0/0x50 [i915]\n[161.360082] WARNING: CPU: 5 PID: 276 at lib/debugobjects.c:514 debug_print_object+0x80/0xb0\n...\n[161.360304] CPU: 5 PID: 276 Comm: kworker/5:2 Not tainted 6.5.0-rc1-CI_DRM_13375-g003f860e5577+ #1\n[161.360314] Hardware name: Intel Corporation Rocket Lake Client Platform/RocketLake S UDIMM 6L RVP, BIOS RKLSFWI1.R00.3173.A03.2204210138 04/21/2022\n[161.360322] Workqueue: i915-unordered __intel_wakeref_put_work [i915]\n[161.360592] RIP: 0010:debug_print_object+0x80/0xb0\n...\n[161.361347] debug_object_free+0xeb/0x110\n[161.361362] i915_active_fini+0x14/0x130 [i915]\n[161.361866] release_references+0xfe/0x1f0 [i915]\n[161.362543] i915_vma_parked+0x1db/0x380 [i915]\n[161.363129] __gt_park+0x121/0x230 [i915]\n[161.363515] ____intel_wakeref_put_last+0x1f/0x70 [i915]\n\nThat has been tracked down to be happening when another thread is\ndeactivating the VMA inside __active_retire() helper, after the VMA's\nactive counter has been already decremented to 0, but before deactivation\nof the VMA's object is reported to the object debugging tool.\n\nWe could prevent from that race by serializing i915_active_fini() with\n__active_retire() via ref->tree_lock, but that wouldn't stop the VMA from\nbeing used, e.g. from __i915_vma_retire() called at the end of\n__active_retire(), after that VMA has been already freed by a concurrent\ni915_vma_destroy() on return from the i915_active_fini().  Then, we should\nrather fix the issue at the VMA level, not in i915_active.\n\nSince __i915_vma_parked() is called from __gt_park() on last put of the\nGT's wakeref, the issue could be addressed by holding the GT wakeref long\nenough for __active_retire() to complete before that wakeref is released\nand the GT parked.\n\nI believe the issue was introduced by commit d93939730347 (\"drm/i915:\nRemove the vma refcount\") which moved a call to i915_active_fini() from\na dropped i915_vma_release(), called on last put of the removed VMA kref,\nto i915_vma_parked() processing path called on last put of a GT wakeref.\nHowever, its visibility to the object debugging tool was suppressed by a\nbug in i915_active that was fixed two weeks later with commit e92eb246feb9\n(\"drm/i915/active: Fix missing debug object activation\").\n\nA VMA associated with a request doesn't acquire a GT wakeref by itself.\nInstead, it depends on a wakeref held directly by the request's active\nintel_context for a GT associated with its VM, and indirectly on that\nintel_context's engine wakeref if the engine belongs to the same GT as the\nVMA's VM.  Those wakerefs are released asynchronously to VMA deactivation.\n\nFix the issue by getting a wakeref for the VMA's GT when activating it,\nand putting that wakeref only after the VMA is deactivated.  However,\nexclude global GTT from that processing path, otherwise the GPU never goes\nidle.  Since __i915_vma_retire() may be called from atomic contexts, use\nasync variant of wakeref put.  Also, to avoid circular locking dependency,\ntake care of acquiring the wakeref before VM mutex when both are needed.\n\nv7: Add inline comments with justifications for:\n    - using untracked variants of intel_gt_pm_get/put() (Nirmoy),\n    - using async variant of _put(),\n    - not getting the wakeref in case of a global GTT,\n    - always getting the first wakeref outside vm->mutex.\nv6: Since __i915_vma_active/retire() callbacks are not serialized, storing\n    a wakeref tracking handle inside struct i915_vma is not safe, and\n    there is no other good place for that.  Use untracked variants of\n    intel_gt_pm_get/put_async().\nv5: Replace \"tile\" with \"GT\" across commit description (Rodrigo),\n  - \n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26939",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/704edc9252f4988ae1ad7dafa23d0db8d90d7190",
            "patch_url": "https://git.kernel.org/stable/p/704edc9252f4988ae1ad7dafa23d0db8d90d7190",
            "filename": "CVE-2024-26939-704edc9252f4988ae1ad7dafa23d0db8d90d7190.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26939/CVE-2024-26939-704edc9252f4988ae1ad7dafa23d0db8d90d7190.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0e45882ca829b26b915162e8e86dbb1095768e9e",
                "patch_url": "https://git.kernel.org/stable/p/0e45882ca829b26b915162e8e86dbb1095768e9e",
                "filename": "CVE-2024-26939-0e45882ca829b26b915162e8e86dbb1095768e9e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26939/CVE-2024-26939-0e45882ca829b26b915162e8e86dbb1095768e9e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/59b2626dd8c8a2e13f18054b3530e0c00073d79f",
                "patch_url": "https://git.kernel.org/stable/p/59b2626dd8c8a2e13f18054b3530e0c00073d79f",
                "filename": "CVE-2024-26939-59b2626dd8c8a2e13f18054b3530e0c00073d79f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26939/CVE-2024-26939-59b2626dd8c8a2e13f18054b3530e0c00073d79f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5e3eb862df9f972ab677fb19e0d4b9b1be8db7b5",
                "patch_url": "https://git.kernel.org/stable/p/5e3eb862df9f972ab677fb19e0d4b9b1be8db7b5",
                "filename": "CVE-2024-26939-5e3eb862df9f972ab677fb19e0d4b9b1be8db7b5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26939/CVE-2024-26939-5e3eb862df9f972ab677fb19e0d4b9b1be8db7b5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/704edc9252f4988ae1ad7dafa23d0db8d90d7190",
                "patch_url": "https://git.kernel.org/stable/p/704edc9252f4988ae1ad7dafa23d0db8d90d7190",
                "filename": "CVE-2024-26939-704edc9252f4988ae1ad7dafa23d0db8d90d7190.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26939/CVE-2024-26939-704edc9252f4988ae1ad7dafa23d0db8d90d7190.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0e45882ca829b26b915162e8e86dbb1095768e9e",
            "https://git.kernel.org/stable/c/59b2626dd8c8a2e13f18054b3530e0c00073d79f",
            "https://git.kernel.org/stable/c/5e3eb862df9f972ab677fb19e0d4b9b1be8db7b5",
            "https://git.kernel.org/stable/c/704edc9252f4988ae1ad7dafa23d0db8d90d7190",
            "https://www.cve.org/CVERecord?id=CVE-2024-26939\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26939\nhttps://lore.kernel.org/linux-cve-announce/2024050124-CVE-2024-26939-5314@gregkh/T"
        ]
    },
    "CVE-2024-26940": {
        "cve": "CVE-2024-26940",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed\n\nThe driver creates /sys/kernel/debug/dri/0/mob_ttm even when the\ncorresponding ttm_resource_manager is not allocated.\nThis leads to a crash when trying to read from this file.\n\nAdd a check to create mob_ttm, system_mob_ttm, and gmr_ttm debug file\nonly when the corresponding ttm_resource_manager is allocated.\n\ncrash> bt\nPID: 3133409  TASK: ffff8fe4834a5000  CPU: 3    COMMAND: \"grep\"\n #0 [ffffb954506b3b20] machine_kexec at ffffffffb2a6bec3\n #1 [ffffb954506b3b78] __crash_kexec at ffffffffb2bb598a\n #2 [ffffb954506b3c38] crash_kexec at ffffffffb2bb68c1\n #3 [ffffb954506b3c50] oops_end at ffffffffb2a2a9b1\n #4 [ffffb954506b3c70] no_context at ffffffffb2a7e913\n #5 [ffffb954506b3cc8] __bad_area_nosemaphore at ffffffffb2a7ec8c\n #6 [ffffb954506b3d10] do_page_fault at ffffffffb2a7f887\n #7 [ffffb954506b3d40] page_fault at ffffffffb360116e\n    [exception RIP: ttm_resource_manager_debug+0x11]\n    RIP: ffffffffc04afd11  RSP: ffffb954506b3df0  RFLAGS: 00010246\n    RAX: ffff8fe41a6d1200  RBX: 0000000000000000  RCX: 0000000000000940\n    RDX: 0000000000000000  RSI: ffffffffc04b4338  RDI: 0000000000000000\n    RBP: ffffb954506b3e08   R8: ffff8fee3ffad000   R9: 0000000000000000\n    R10: ffff8fe41a76a000  R11: 0000000000000001  R12: 00000000ffffffff\n    R13: 0000000000000001  R14: ffff8fe5bb6f3900  R15: ffff8fe41a6d1200\n    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018\n #8 [ffffb954506b3e00] ttm_resource_manager_show at ffffffffc04afde7 [ttm]\n #9 [ffffb954506b3e30] seq_read at ffffffffb2d8f9f3\n    RIP: 00007f4c4eda8985  RSP: 00007ffdbba9e9f8  RFLAGS: 00000246\n    RAX: ffffffffffffffda  RBX: 000000000037e000  RCX: 00007f4c4eda8985\n    RDX: 000000000037e000  RSI: 00007f4c41573000  RDI: 0000000000000003\n    RBP: 000000000037e000   R8: 0000000000000000   R9: 000000000037fe30\n    R10: 0000000000000000  R11: 0000000000000246  R12: 00007f4c41573000\n    R13: 0000000000000003  R14: 00007f4c41572010  R15: 0000000000000003\n    ORIG_RAX: 0000000000000000  CS: 0033  SS: 002b",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26940",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/016119154981d81c9e8f2ea3f56b9e2b4ea14500",
            "patch_url": "https://git.kernel.org/stable/p/016119154981d81c9e8f2ea3f56b9e2b4ea14500",
            "filename": "CVE-2024-26940-016119154981d81c9e8f2ea3f56b9e2b4ea14500.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26940/CVE-2024-26940-016119154981d81c9e8f2ea3f56b9e2b4ea14500.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/016119154981d81c9e8f2ea3f56b9e2b4ea14500",
                "patch_url": "https://git.kernel.org/stable/p/016119154981d81c9e8f2ea3f56b9e2b4ea14500",
                "filename": "CVE-2024-26940-016119154981d81c9e8f2ea3f56b9e2b4ea14500.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26940/CVE-2024-26940-016119154981d81c9e8f2ea3f56b9e2b4ea14500.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/042ef0afc40fa1a22b3608f22915b91ce39d128f",
                "patch_url": "https://git.kernel.org/stable/p/042ef0afc40fa1a22b3608f22915b91ce39d128f",
                "filename": "CVE-2024-26940-042ef0afc40fa1a22b3608f22915b91ce39d128f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26940/CVE-2024-26940-042ef0afc40fa1a22b3608f22915b91ce39d128f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/25e3ce59c1200f1f0563e39de151f34962ab0fe1",
                "patch_url": "https://git.kernel.org/stable/p/25e3ce59c1200f1f0563e39de151f34962ab0fe1",
                "filename": "CVE-2024-26940-25e3ce59c1200f1f0563e39de151f34962ab0fe1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26940/CVE-2024-26940-25e3ce59c1200f1f0563e39de151f34962ab0fe1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4be9075fec0a639384ed19975634b662bfab938f",
                "patch_url": "https://git.kernel.org/stable/p/4be9075fec0a639384ed19975634b662bfab938f",
                "filename": "CVE-2024-26940-4be9075fec0a639384ed19975634b662bfab938f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26940/CVE-2024-26940-4be9075fec0a639384ed19975634b662bfab938f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eb08db0fc5354fa17b7ed66dab3c503332423451",
                "patch_url": "https://git.kernel.org/stable/p/eb08db0fc5354fa17b7ed66dab3c503332423451",
                "filename": "CVE-2024-26940-eb08db0fc5354fa17b7ed66dab3c503332423451.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26940/CVE-2024-26940-eb08db0fc5354fa17b7ed66dab3c503332423451.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/016119154981d81c9e8f2ea3f56b9e2b4ea14500",
            "https://git.kernel.org/stable/c/042ef0afc40fa1a22b3608f22915b91ce39d128f",
            "https://git.kernel.org/stable/c/25e3ce59c1200f1f0563e39de151f34962ab0fe1",
            "https://git.kernel.org/stable/c/4be9075fec0a639384ed19975634b662bfab938f",
            "https://git.kernel.org/stable/c/eb08db0fc5354fa17b7ed66dab3c503332423451",
            "https://www.cve.org/CVERecord?id=CVE-2024-26940\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26940\nhttps://lore.kernel.org/linux-cve-announce/2024050125-CVE-2024-26940-1785@gregkh/T"
        ]
    },
    "CVE-2024-26958": {
        "cve": "CVE-2024-26958",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: fix UAF in direct writes\n\nIn production we have been hitting the following warning consistently\n\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 17 PID: 1800359 at lib/refcount.c:28 refcount_warn_saturate+0x9c/0xe0\nWorkqueue: nfsiod nfs_direct_write_schedule_work [nfs]\nRIP: 0010:refcount_warn_saturate+0x9c/0xe0\nPKRU: 55555554\nCall Trace:\n <TASK>\n ? __warn+0x9f/0x130\n ? refcount_warn_saturate+0x9c/0xe0\n ? report_bug+0xcc/0x150\n ? handle_bug+0x3d/0x70\n ? exc_invalid_op+0x16/0x40\n ? asm_exc_invalid_op+0x16/0x20\n ? refcount_warn_saturate+0x9c/0xe0\n nfs_direct_write_schedule_work+0x237/0x250 [nfs]\n process_one_work+0x12f/0x4a0\n worker_thread+0x14e/0x3b0\n ? ZSTD_getCParams_internal+0x220/0x220\n kthread+0xdc/0x120\n ? __btf_name_valid+0xa0/0xa0\n ret_from_fork+0x1f/0x30\n\nThis is because we're completing the nfs_direct_request twice in a row.\n\nThe source of this is when we have our commit requests to submit, we\nprocess them and send them off, and then in the completion path for the\ncommit requests we have\n\nif (nfs_commit_end(cinfo.mds))\n\tnfs_direct_write_complete(dreq);\n\nHowever since we're submitting asynchronous requests we sometimes have\none that completes before we submit the next one, so we end up calling\ncomplete on the nfs_direct_request twice.\n\nThe only other place we use nfs_generic_commit_list() is in\n__nfs_commit_inode, which wraps this call in a\n\nnfs_commit_begin();\nnfs_commit_end();\n\nWhich is a common pattern for this style of completion handling, one\nthat is also repeated in the direct code with get_dreq()/put_dreq()\ncalls around where we process events as well as in the completion paths.\n\nFix this by using the same pattern for the commit requests.\n\nBefore with my 200 node rocksdb stress running this warning would pop\nevery 10ish minutes.  With my patch the stress test has been running for\nseveral hours without popping.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26958",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3abc2d160ed8213948b147295d77d44a22c88fa3",
            "patch_url": "https://git.kernel.org/stable/p/3abc2d160ed8213948b147295d77d44a22c88fa3",
            "filename": "CVE-2024-26958-3abc2d160ed8213948b147295d77d44a22c88fa3.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26958/CVE-2024-26958-3abc2d160ed8213948b147295d77d44a22c88fa3.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/17f46b803d4f23c66cacce81db35fef3adb8f2af",
                "patch_url": "https://git.kernel.org/stable/p/17f46b803d4f23c66cacce81db35fef3adb8f2af",
                "filename": "CVE-2024-26958-17f46b803d4f23c66cacce81db35fef3adb8f2af.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26958/CVE-2024-26958-17f46b803d4f23c66cacce81db35fef3adb8f2af.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1daf52b5ffb24870fbeda20b4967526d8f9e12ab",
                "patch_url": "https://git.kernel.org/stable/p/1daf52b5ffb24870fbeda20b4967526d8f9e12ab",
                "filename": "CVE-2024-26958-1daf52b5ffb24870fbeda20b4967526d8f9e12ab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26958/CVE-2024-26958-1daf52b5ffb24870fbeda20b4967526d8f9e12ab.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3abc2d160ed8213948b147295d77d44a22c88fa3",
                "patch_url": "https://git.kernel.org/stable/p/3abc2d160ed8213948b147295d77d44a22c88fa3",
                "filename": "CVE-2024-26958-3abc2d160ed8213948b147295d77d44a22c88fa3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26958/CVE-2024-26958-3abc2d160ed8213948b147295d77d44a22c88fa3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4595d90b5d2ea5fa4d318d13f59055aa4bf3e7f5",
                "patch_url": "https://git.kernel.org/stable/p/4595d90b5d2ea5fa4d318d13f59055aa4bf3e7f5",
                "filename": "CVE-2024-26958-4595d90b5d2ea5fa4d318d13f59055aa4bf3e7f5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26958/CVE-2024-26958-4595d90b5d2ea5fa4d318d13f59055aa4bf3e7f5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6cd3f13aaa62970b5169d990e936b2e96943bc6a",
                "patch_url": "https://git.kernel.org/stable/p/6cd3f13aaa62970b5169d990e936b2e96943bc6a",
                "filename": "CVE-2024-26958-6cd3f13aaa62970b5169d990e936b2e96943bc6a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26958/CVE-2024-26958-6cd3f13aaa62970b5169d990e936b2e96943bc6a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/80d24b308b7ee7037fc90d8ac99f6f78df0a256f",
                "patch_url": "https://git.kernel.org/stable/p/80d24b308b7ee7037fc90d8ac99f6f78df0a256f",
                "filename": "CVE-2024-26958-80d24b308b7ee7037fc90d8ac99f6f78df0a256f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26958/CVE-2024-26958-80d24b308b7ee7037fc90d8ac99f6f78df0a256f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf54f66e1dd78990ec6b32177bca7e6ea2144a95",
                "patch_url": "https://git.kernel.org/stable/p/cf54f66e1dd78990ec6b32177bca7e6ea2144a95",
                "filename": "CVE-2024-26958-cf54f66e1dd78990ec6b32177bca7e6ea2144a95.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26958/CVE-2024-26958-cf54f66e1dd78990ec6b32177bca7e6ea2144a95.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e25447c35f8745337ea8bc0c9697fcac14df8605",
                "patch_url": "https://git.kernel.org/stable/p/e25447c35f8745337ea8bc0c9697fcac14df8605",
                "filename": "CVE-2024-26958-e25447c35f8745337ea8bc0c9697fcac14df8605.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26958/CVE-2024-26958-e25447c35f8745337ea8bc0c9697fcac14df8605.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/17f46b803d4f23c66cacce81db35fef3adb8f2af",
            "https://git.kernel.org/stable/c/1daf52b5ffb24870fbeda20b4967526d8f9e12ab",
            "https://git.kernel.org/stable/c/3abc2d160ed8213948b147295d77d44a22c88fa3",
            "https://git.kernel.org/stable/c/4595d90b5d2ea5fa4d318d13f59055aa4bf3e7f5",
            "https://git.kernel.org/stable/c/6cd3f13aaa62970b5169d990e936b2e96943bc6a",
            "https://git.kernel.org/stable/c/80d24b308b7ee7037fc90d8ac99f6f78df0a256f",
            "https://git.kernel.org/stable/c/cf54f66e1dd78990ec6b32177bca7e6ea2144a95",
            "https://git.kernel.org/stable/c/e25447c35f8745337ea8bc0c9697fcac14df8605",
            "https://www.cve.org/CVERecord?id=CVE-2024-26958\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26958\nhttps://lore.kernel.org/linux-cve-announce/2024050129-CVE-2024-26958-6c15@gregkh/T"
        ]
    },
    "CVE-2024-26960": {
        "cve": "CVE-2024-26960",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: swap: fix race between free_swap_and_cache() and swapoff()\n\nThere was previously a theoretical window where swapoff() could run and\nteardown a swap_info_struct while a call to free_swap_and_cache() was\nrunning in another thread.  This could cause, amongst other bad\npossibilities, swap_page_trans_huge_swapped() (called by\nfree_swap_and_cache()) to access the freed memory for swap_map.\n\nThis is a theoretical problem and I haven't been able to provoke it from a\ntest case.  But there has been agreement based on code review that this is\npossible (see link below).\n\nFix it by using get_swap_device()/put_swap_device(), which will stall\nswapoff().  There was an extra check in _swap_info_get() to confirm that\nthe swap entry was not free.  This isn't present in get_swap_device()\nbecause it doesn't make sense in general due to the race between getting\nthe reference and swapoff.  So I've added an equivalent check directly in\nfree_swap_and_cache().\n\nDetails of how to provoke one possible issue (thanks to David Hildenbrand\nfor deriving this):\n\n--8<-----\n\n__swap_entry_free() might be the last user and result in\n\"count == SWAP_HAS_CACHE\".\n\nswapoff->try_to_unuse() will stop as soon as soon as si->inuse_pages==0.\n\nSo the question is: could someone reclaim the folio and turn\nsi->inuse_pages==0, before we completed swap_page_trans_huge_swapped().\n\nImagine the following: 2 MiB folio in the swapcache. Only 2 subpages are\nstill references by swap entries.\n\nProcess 1 still references subpage 0 via swap entry.\nProcess 2 still references subpage 1 via swap entry.\n\nProcess 1 quits. Calls free_swap_and_cache().\n-> count == SWAP_HAS_CACHE\n[then, preempted in the hypervisor etc.]\n\nProcess 2 quits. Calls free_swap_and_cache().\n-> count == SWAP_HAS_CACHE\n\nProcess 2 goes ahead, passes swap_page_trans_huge_swapped(), and calls\n__try_to_reclaim_swap().\n\n__try_to_reclaim_swap()->folio_free_swap()->delete_from_swap_cache()->\nput_swap_folio()->free_swap_slot()->swapcache_free_entries()->\nswap_entry_free()->swap_range_free()->\n...\nWRITE_ONCE(si->inuse_pages, si->inuse_pages - nr_entries);\n\nWhat stops swapoff to succeed after process 2 reclaimed the swap cache\nbut before process1 finished its call to swap_page_trans_huge_swapped()?\n\n--8<-----",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26960",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0f98f6d2fb5fad00f8299b84b85b6bc1b6d7d19a",
            "patch_url": "https://git.kernel.org/stable/p/0f98f6d2fb5fad00f8299b84b85b6bc1b6d7d19a",
            "filename": "CVE-2024-26960-0f98f6d2fb5fad00f8299b84b85b6bc1b6d7d19a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26960/CVE-2024-26960-0f98f6d2fb5fad00f8299b84b85b6bc1b6d7d19a.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0f98f6d2fb5fad00f8299b84b85b6bc1b6d7d19a",
                "patch_url": "https://git.kernel.org/stable/p/0f98f6d2fb5fad00f8299b84b85b6bc1b6d7d19a",
                "filename": "CVE-2024-26960-0f98f6d2fb5fad00f8299b84b85b6bc1b6d7d19a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26960/CVE-2024-26960-0f98f6d2fb5fad00f8299b84b85b6bc1b6d7d19a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1ede7f1d7eed1738d1b9333fd1e152ccb450b86a",
                "patch_url": "https://git.kernel.org/stable/p/1ede7f1d7eed1738d1b9333fd1e152ccb450b86a",
                "filename": "CVE-2024-26960-1ede7f1d7eed1738d1b9333fd1e152ccb450b86a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26960/CVE-2024-26960-1ede7f1d7eed1738d1b9333fd1e152ccb450b86a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2da5568ee222ce0541bfe446a07998f92ed1643e",
                "patch_url": "https://git.kernel.org/stable/p/2da5568ee222ce0541bfe446a07998f92ed1643e",
                "filename": "CVE-2024-26960-2da5568ee222ce0541bfe446a07998f92ed1643e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26960/CVE-2024-26960-2da5568ee222ce0541bfe446a07998f92ed1643e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/363d17e7f7907c8e27a9e86968af0eaa2301787b",
                "patch_url": "https://git.kernel.org/stable/p/363d17e7f7907c8e27a9e86968af0eaa2301787b",
                "filename": "CVE-2024-26960-363d17e7f7907c8e27a9e86968af0eaa2301787b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26960/CVE-2024-26960-363d17e7f7907c8e27a9e86968af0eaa2301787b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3ce4c4c653e4e478ecb15d3c88e690f12cbf6b39",
                "patch_url": "https://git.kernel.org/stable/p/3ce4c4c653e4e478ecb15d3c88e690f12cbf6b39",
                "filename": "CVE-2024-26960-3ce4c4c653e4e478ecb15d3c88e690f12cbf6b39.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26960/CVE-2024-26960-3ce4c4c653e4e478ecb15d3c88e690f12cbf6b39.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/82b1c07a0af603e3c47b906c8e991dc96f01688e",
                "patch_url": "https://git.kernel.org/stable/p/82b1c07a0af603e3c47b906c8e991dc96f01688e",
                "filename": "CVE-2024-26960-82b1c07a0af603e3c47b906c8e991dc96f01688e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26960/CVE-2024-26960-82b1c07a0af603e3c47b906c8e991dc96f01688e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d85c11c97ecf92d47a4b29e3faca714dc1f18d0d",
                "patch_url": "https://git.kernel.org/stable/p/d85c11c97ecf92d47a4b29e3faca714dc1f18d0d",
                "filename": "CVE-2024-26960-d85c11c97ecf92d47a4b29e3faca714dc1f18d0d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26960/CVE-2024-26960-d85c11c97ecf92d47a4b29e3faca714dc1f18d0d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0f98f6d2fb5fad00f8299b84b85b6bc1b6d7d19a",
            "https://git.kernel.org/stable/c/1ede7f1d7eed1738d1b9333fd1e152ccb450b86a",
            "https://git.kernel.org/stable/c/2da5568ee222ce0541bfe446a07998f92ed1643e",
            "https://git.kernel.org/stable/c/363d17e7f7907c8e27a9e86968af0eaa2301787b",
            "https://git.kernel.org/stable/c/3ce4c4c653e4e478ecb15d3c88e690f12cbf6b39",
            "https://git.kernel.org/stable/c/82b1c07a0af603e3c47b906c8e991dc96f01688e",
            "https://git.kernel.org/stable/c/d85c11c97ecf92d47a4b29e3faca714dc1f18d0d",
            "https://www.cve.org/CVERecord?id=CVE-2024-26960\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26960\nhttps://lore.kernel.org/linux-cve-announce/2024050129-CVE-2024-26960-ad6b@gregkh/T"
        ]
    },
    "CVE-2024-26961": {
        "cve": "CVE-2024-26961",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac802154: fix llsec key resources release in mac802154_llsec_key_del\n\nmac802154_llsec_key_del() can free resources of a key directly without\nfollowing the RCU rules for waiting before the end of a grace period. This\nmay lead to use-after-free in case llsec_lookup_key() is traversing the\nlist of keys in parallel with a key deletion:\n\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 4 PID: 16000 at lib/refcount.c:25 refcount_warn_saturate+0x162/0x2a0\nModules linked in:\nCPU: 4 PID: 16000 Comm: wpan-ping Not tainted 6.7.0 #19\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nRIP: 0010:refcount_warn_saturate+0x162/0x2a0\nCall Trace:\n <TASK>\n llsec_lookup_key.isra.0+0x890/0x9e0\n mac802154_llsec_encrypt+0x30c/0x9c0\n ieee802154_subif_start_xmit+0x24/0x1e0\n dev_hard_start_xmit+0x13e/0x690\n sch_direct_xmit+0x2ae/0xbc0\n __dev_queue_xmit+0x11dd/0x3c20\n dgram_sendmsg+0x90b/0xd60\n __sys_sendto+0x466/0x4c0\n __x64_sys_sendto+0xe0/0x1c0\n do_syscall_64+0x45/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nAlso, ieee802154_llsec_key_entry structures are not freed by\nmac802154_llsec_key_del():\n\nunreferenced object 0xffff8880613b6980 (size 64):\n  comm \"iwpan\", pid 2176, jiffies 4294761134 (age 60.475s)\n  hex dump (first 32 bytes):\n    78 0d 8f 18 80 88 ff ff 22 01 00 00 00 00 ad de  x.......\".......\n    00 00 00 00 00 00 00 00 03 00 cd ab 00 00 00 00  ................\n  backtrace:\n    [<ffffffff81dcfa62>] __kmem_cache_alloc_node+0x1e2/0x2d0\n    [<ffffffff81c43865>] kmalloc_trace+0x25/0xc0\n    [<ffffffff88968b09>] mac802154_llsec_key_add+0xac9/0xcf0\n    [<ffffffff8896e41a>] ieee802154_add_llsec_key+0x5a/0x80\n    [<ffffffff8892adc6>] nl802154_add_llsec_key+0x426/0x5b0\n    [<ffffffff86ff293e>] genl_family_rcv_msg_doit+0x1fe/0x2f0\n    [<ffffffff86ff46d1>] genl_rcv_msg+0x531/0x7d0\n    [<ffffffff86fee7a9>] netlink_rcv_skb+0x169/0x440\n    [<ffffffff86ff1d88>] genl_rcv+0x28/0x40\n    [<ffffffff86fec15c>] netlink_unicast+0x53c/0x820\n    [<ffffffff86fecd8b>] netlink_sendmsg+0x93b/0xe60\n    [<ffffffff86b91b35>] ____sys_sendmsg+0xac5/0xca0\n    [<ffffffff86b9c3dd>] ___sys_sendmsg+0x11d/0x1c0\n    [<ffffffff86b9c65a>] __sys_sendmsg+0xfa/0x1d0\n    [<ffffffff88eadbf5>] do_syscall_64+0x45/0xf0\n    [<ffffffff890000ea>] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nHandle the proper resource release in the RCU callback function\nmac802154_llsec_key_del_rcu().\n\nNote that if llsec_lookup_key() finds a key, it gets a refcount via\nllsec_key_get() and locally copies key id from key_entry (which is a\nlist element). So it's safe to call llsec_key_put() and free the list\nentry after the RCU grace period elapses.\n\nFound by Linux Verification Center (linuxtesting.org).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26961",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/dcd51ab42b7a0431575689c5f74b8b6efd45fc2f",
            "patch_url": "https://git.kernel.org/stable/p/dcd51ab42b7a0431575689c5f74b8b6efd45fc2f",
            "filename": "CVE-2024-26961-dcd51ab42b7a0431575689c5f74b8b6efd45fc2f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26961/CVE-2024-26961-dcd51ab42b7a0431575689c5f74b8b6efd45fc2f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/068ab2759bc0b4daf0b964de61b2731449c86531",
                "patch_url": "https://git.kernel.org/stable/p/068ab2759bc0b4daf0b964de61b2731449c86531",
                "filename": "CVE-2024-26961-068ab2759bc0b4daf0b964de61b2731449c86531.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26961/CVE-2024-26961-068ab2759bc0b4daf0b964de61b2731449c86531.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/20d3e1c8a1847497269f04d874b2a5818ec29e2d",
                "patch_url": "https://git.kernel.org/stable/p/20d3e1c8a1847497269f04d874b2a5818ec29e2d",
                "filename": "CVE-2024-26961-20d3e1c8a1847497269f04d874b2a5818ec29e2d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26961/CVE-2024-26961-20d3e1c8a1847497269f04d874b2a5818ec29e2d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/49c8951680d7b76fceaee89dcfbab1363fb24fd1",
                "patch_url": "https://git.kernel.org/stable/p/49c8951680d7b76fceaee89dcfbab1363fb24fd1",
                "filename": "CVE-2024-26961-49c8951680d7b76fceaee89dcfbab1363fb24fd1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26961/CVE-2024-26961-49c8951680d7b76fceaee89dcfbab1363fb24fd1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/640297c3e897bd7e1481466a6a5cb9560f1edb88",
                "patch_url": "https://git.kernel.org/stable/p/640297c3e897bd7e1481466a6a5cb9560f1edb88",
                "filename": "CVE-2024-26961-640297c3e897bd7e1481466a6a5cb9560f1edb88.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26961/CVE-2024-26961-640297c3e897bd7e1481466a6a5cb9560f1edb88.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d3d858650933d44ac12c1f31337e7110c2071821",
                "patch_url": "https://git.kernel.org/stable/p/d3d858650933d44ac12c1f31337e7110c2071821",
                "filename": "CVE-2024-26961-d3d858650933d44ac12c1f31337e7110c2071821.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26961/CVE-2024-26961-d3d858650933d44ac12c1f31337e7110c2071821.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dcd51ab42b7a0431575689c5f74b8b6efd45fc2f",
                "patch_url": "https://git.kernel.org/stable/p/dcd51ab42b7a0431575689c5f74b8b6efd45fc2f",
                "filename": "CVE-2024-26961-dcd51ab42b7a0431575689c5f74b8b6efd45fc2f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26961/CVE-2024-26961-dcd51ab42b7a0431575689c5f74b8b6efd45fc2f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e8a1e58345cf40b7b272e08ac7b32328b2543e40",
                "patch_url": "https://git.kernel.org/stable/p/e8a1e58345cf40b7b272e08ac7b32328b2543e40",
                "filename": "CVE-2024-26961-e8a1e58345cf40b7b272e08ac7b32328b2543e40.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26961/CVE-2024-26961-e8a1e58345cf40b7b272e08ac7b32328b2543e40.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/068ab2759bc0b4daf0b964de61b2731449c86531",
            "https://git.kernel.org/stable/c/20d3e1c8a1847497269f04d874b2a5818ec29e2d",
            "https://git.kernel.org/stable/c/49c8951680d7b76fceaee89dcfbab1363fb24fd1",
            "https://git.kernel.org/stable/c/640297c3e897bd7e1481466a6a5cb9560f1edb88",
            "https://git.kernel.org/stable/c/d3d858650933d44ac12c1f31337e7110c2071821",
            "https://git.kernel.org/stable/c/dcd51ab42b7a0431575689c5f74b8b6efd45fc2f",
            "https://git.kernel.org/stable/c/e8a1e58345cf40b7b272e08ac7b32328b2543e40",
            "https://www.cve.org/CVERecord?id=CVE-2024-26961\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26961\nhttps://lore.kernel.org/linux-cve-announce/2024050129-CVE-2024-26961-408d@gregkh/T"
        ]
    },
    "CVE-2024-26964": {
        "cve": "CVE-2024-26964",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Add error handling in xhci_map_urb_for_dma\n\nCurrently xhci_map_urb_for_dma() creates a temporary buffer and copies\nthe SG list to the new linear buffer. But if the kzalloc_node() fails,\nthen the following sg_pcopy_to_buffer() can lead to crash since it\ntries to memcpy to NULL pointer.\n\nSo return -ENOMEM if kzalloc returns null pointer.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26964",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4a49d24fdec0a802aa686a567a3989a9fdf4e5dd",
            "patch_url": "https://git.kernel.org/stable/p/4a49d24fdec0a802aa686a567a3989a9fdf4e5dd",
            "filename": "CVE-2024-26964-4a49d24fdec0a802aa686a567a3989a9fdf4e5dd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26964/CVE-2024-26964-4a49d24fdec0a802aa686a567a3989a9fdf4e5dd.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4a49d24fdec0a802aa686a567a3989a9fdf4e5dd",
                "patch_url": "https://git.kernel.org/stable/p/4a49d24fdec0a802aa686a567a3989a9fdf4e5dd",
                "filename": "CVE-2024-26964-4a49d24fdec0a802aa686a567a3989a9fdf4e5dd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26964/CVE-2024-26964-4a49d24fdec0a802aa686a567a3989a9fdf4e5dd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/620b6cf2f1a270f48d38e6b8ce199c1acb3e90f4",
                "patch_url": "https://git.kernel.org/stable/p/620b6cf2f1a270f48d38e6b8ce199c1acb3e90f4",
                "filename": "CVE-2024-26964-620b6cf2f1a270f48d38e6b8ce199c1acb3e90f4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26964/CVE-2024-26964-620b6cf2f1a270f48d38e6b8ce199c1acb3e90f4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7b6cc33593d7ccfc3011b290849cfa899db46757",
                "patch_url": "https://git.kernel.org/stable/p/7b6cc33593d7ccfc3011b290849cfa899db46757",
                "filename": "CVE-2024-26964-7b6cc33593d7ccfc3011b290849cfa899db46757.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26964/CVE-2024-26964-7b6cc33593d7ccfc3011b290849cfa899db46757.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/962300a360d24c5be5a188cda48da58a37e4304d",
                "patch_url": "https://git.kernel.org/stable/p/962300a360d24c5be5a188cda48da58a37e4304d",
                "filename": "CVE-2024-26964-962300a360d24c5be5a188cda48da58a37e4304d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26964/CVE-2024-26964-962300a360d24c5be5a188cda48da58a37e4304d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b2c898469dfc388f619c6c972a28466cbb1442ea",
                "patch_url": "https://git.kernel.org/stable/p/b2c898469dfc388f619c6c972a28466cbb1442ea",
                "filename": "CVE-2024-26964-b2c898469dfc388f619c6c972a28466cbb1442ea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26964/CVE-2024-26964-b2c898469dfc388f619c6c972a28466cbb1442ea.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/be95cc6d71dfd0cba66e3621c65413321b398052",
                "patch_url": "https://git.kernel.org/stable/p/be95cc6d71dfd0cba66e3621c65413321b398052",
                "filename": "CVE-2024-26964-be95cc6d71dfd0cba66e3621c65413321b398052.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26964/CVE-2024-26964-be95cc6d71dfd0cba66e3621c65413321b398052.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4a49d24fdec0a802aa686a567a3989a9fdf4e5dd",
            "https://git.kernel.org/stable/c/620b6cf2f1a270f48d38e6b8ce199c1acb3e90f4",
            "https://git.kernel.org/stable/c/7b6cc33593d7ccfc3011b290849cfa899db46757",
            "https://git.kernel.org/stable/c/962300a360d24c5be5a188cda48da58a37e4304d",
            "https://git.kernel.org/stable/c/b2c898469dfc388f619c6c972a28466cbb1442ea",
            "https://git.kernel.org/stable/c/be95cc6d71dfd0cba66e3621c65413321b398052",
            "https://www.cve.org/CVERecord?id=CVE-2024-26964\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26964\nhttps://lore.kernel.org/linux-cve-announce/2024050130-CVE-2024-26964-54c8@gregkh/T"
        ]
    },
    "CVE-2024-26973": {
        "cve": "CVE-2024-26973",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfat: fix uninitialized field in nostale filehandles\n\nWhen fat_encode_fh_nostale() encodes file handle without a parent it\nstores only first 10 bytes of the file handle. However the length of the\nfile handle must be a multiple of 4 so the file handle is actually 12\nbytes long and the last two bytes remain uninitialized. This is not\ngreat at we potentially leak uninitialized information with the handle\nto userspace. Properly initialize the full handle length.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26973",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9840d1897e28f8733cc1e38f97e044f987dc0a63",
            "patch_url": "https://git.kernel.org/stable/p/9840d1897e28f8733cc1e38f97e044f987dc0a63",
            "filename": "CVE-2024-26973-9840d1897e28f8733cc1e38f97e044f987dc0a63.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26973/CVE-2024-26973-9840d1897e28f8733cc1e38f97e044f987dc0a63.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/03a7e3f2ba3ca25f1da1d3898709a08db14c1abb",
                "patch_url": "https://git.kernel.org/stable/p/03a7e3f2ba3ca25f1da1d3898709a08db14c1abb",
                "filename": "CVE-2024-26973-03a7e3f2ba3ca25f1da1d3898709a08db14c1abb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26973/CVE-2024-26973-03a7e3f2ba3ca25f1da1d3898709a08db14c1abb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/74f852654b8b7866f15323685f1e178d3386c688",
                "patch_url": "https://git.kernel.org/stable/p/74f852654b8b7866f15323685f1e178d3386c688",
                "filename": "CVE-2024-26973-74f852654b8b7866f15323685f1e178d3386c688.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26973/CVE-2024-26973-74f852654b8b7866f15323685f1e178d3386c688.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9840d1897e28f8733cc1e38f97e044f987dc0a63",
                "patch_url": "https://git.kernel.org/stable/p/9840d1897e28f8733cc1e38f97e044f987dc0a63",
                "filename": "CVE-2024-26973-9840d1897e28f8733cc1e38f97e044f987dc0a63.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26973/CVE-2024-26973-9840d1897e28f8733cc1e38f97e044f987dc0a63.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a276c595c3a629170b0f052a3724f755d7c6adc6",
                "patch_url": "https://git.kernel.org/stable/p/a276c595c3a629170b0f052a3724f755d7c6adc6",
                "filename": "CVE-2024-26973-a276c595c3a629170b0f052a3724f755d7c6adc6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26973/CVE-2024-26973-a276c595c3a629170b0f052a3724f755d7c6adc6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7fb63e807c6dadf7ecc1d43448c4f1711d7eeee",
                "patch_url": "https://git.kernel.org/stable/p/b7fb63e807c6dadf7ecc1d43448c4f1711d7eeee",
                "filename": "CVE-2024-26973-b7fb63e807c6dadf7ecc1d43448c4f1711d7eeee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26973/CVE-2024-26973-b7fb63e807c6dadf7ecc1d43448c4f1711d7eeee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c8cc05de8e6b5612b6e9f92c385c1a064b0db375",
                "patch_url": "https://git.kernel.org/stable/p/c8cc05de8e6b5612b6e9f92c385c1a064b0db375",
                "filename": "CVE-2024-26973-c8cc05de8e6b5612b6e9f92c385c1a064b0db375.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26973/CVE-2024-26973-c8cc05de8e6b5612b6e9f92c385c1a064b0db375.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cdd33d54e789d229d6d5007cbf3f53965ca1a5c6",
                "patch_url": "https://git.kernel.org/stable/p/cdd33d54e789d229d6d5007cbf3f53965ca1a5c6",
                "filename": "CVE-2024-26973-cdd33d54e789d229d6d5007cbf3f53965ca1a5c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26973/CVE-2024-26973-cdd33d54e789d229d6d5007cbf3f53965ca1a5c6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f52d7663a10a1266a2d3871a6dd8fd111edc549f",
                "patch_url": "https://git.kernel.org/stable/p/f52d7663a10a1266a2d3871a6dd8fd111edc549f",
                "filename": "CVE-2024-26973-f52d7663a10a1266a2d3871a6dd8fd111edc549f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26973/CVE-2024-26973-f52d7663a10a1266a2d3871a6dd8fd111edc549f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fde2497d2bc3a063d8af88b258dbadc86bd7b57c",
                "patch_url": "https://git.kernel.org/stable/p/fde2497d2bc3a063d8af88b258dbadc86bd7b57c",
                "filename": "CVE-2024-26973-fde2497d2bc3a063d8af88b258dbadc86bd7b57c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26973/CVE-2024-26973-fde2497d2bc3a063d8af88b258dbadc86bd7b57c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/03a7e3f2ba3ca25f1da1d3898709a08db14c1abb",
            "https://git.kernel.org/stable/c/74f852654b8b7866f15323685f1e178d3386c688",
            "https://git.kernel.org/stable/c/9840d1897e28f8733cc1e38f97e044f987dc0a63",
            "https://git.kernel.org/stable/c/a276c595c3a629170b0f052a3724f755d7c6adc6",
            "https://git.kernel.org/stable/c/b7fb63e807c6dadf7ecc1d43448c4f1711d7eeee",
            "https://git.kernel.org/stable/c/c8cc05de8e6b5612b6e9f92c385c1a064b0db375",
            "https://git.kernel.org/stable/c/cdd33d54e789d229d6d5007cbf3f53965ca1a5c6",
            "https://git.kernel.org/stable/c/f52d7663a10a1266a2d3871a6dd8fd111edc549f",
            "https://git.kernel.org/stable/c/fde2497d2bc3a063d8af88b258dbadc86bd7b57c",
            "https://www.cve.org/CVERecord?id=CVE-2024-26973\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26973\nhttps://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-26973-54a3@gregkh/T"
        ]
    },
    "CVE-2024-26974": {
        "cve": "CVE-2024-26974",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - resolve race condition during AER recovery\n\nDuring the PCI AER system's error recovery process, the kernel driver\nmay encounter a race condition with freeing the reset_data structure's\nmemory. If the device restart will take more than 10 seconds the function\nscheduling that restart will exit due to a timeout, and the reset_data\nstructure will be freed. However, this data structure is used for\ncompletion notification after the restart is completed, which leads\nto a UAF bug.\n\nThis results in a KFENCE bug notice.\n\n  BUG: KFENCE: use-after-free read in adf_device_reset_worker+0x38/0xa0 [intel_qat]\n  Use-after-free read at 0x00000000bc56fddf (in kfence-#142):\n  adf_device_reset_worker+0x38/0xa0 [intel_qat]\n  process_one_work+0x173/0x340\n\nTo resolve this race condition, the memory associated to the container\nof the work_struct is freed on the worker if the timeout expired,\notherwise on the function that schedules the worker.\nThe timeout detection can be done by checking if the caller is\nstill waiting for completion or not by using completion_done() function.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26974",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0c2cf5142bfb634c0ef0a1a69cdf37950747d0be",
            "patch_url": "https://git.kernel.org/stable/p/0c2cf5142bfb634c0ef0a1a69cdf37950747d0be",
            "filename": "CVE-2024-26974-0c2cf5142bfb634c0ef0a1a69cdf37950747d0be.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26974/CVE-2024-26974-0c2cf5142bfb634c0ef0a1a69cdf37950747d0be.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0c2cf5142bfb634c0ef0a1a69cdf37950747d0be",
                "patch_url": "https://git.kernel.org/stable/p/0c2cf5142bfb634c0ef0a1a69cdf37950747d0be",
                "filename": "CVE-2024-26974-0c2cf5142bfb634c0ef0a1a69cdf37950747d0be.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26974/CVE-2024-26974-0c2cf5142bfb634c0ef0a1a69cdf37950747d0be.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/226fc408c5fcd23cc4186f05ea3a09a7a9aef2f7",
                "patch_url": "https://git.kernel.org/stable/p/226fc408c5fcd23cc4186f05ea3a09a7a9aef2f7",
                "filename": "CVE-2024-26974-226fc408c5fcd23cc4186f05ea3a09a7a9aef2f7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26974/CVE-2024-26974-226fc408c5fcd23cc4186f05ea3a09a7a9aef2f7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4ae5a97781ce7d6ecc9c7055396535815b64ca4f",
                "patch_url": "https://git.kernel.org/stable/p/4ae5a97781ce7d6ecc9c7055396535815b64ca4f",
                "filename": "CVE-2024-26974-4ae5a97781ce7d6ecc9c7055396535815b64ca4f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26974/CVE-2024-26974-4ae5a97781ce7d6ecc9c7055396535815b64ca4f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7d42e097607c4d246d99225bf2b195b6167a210c",
                "patch_url": "https://git.kernel.org/stable/p/7d42e097607c4d246d99225bf2b195b6167a210c",
                "filename": "CVE-2024-26974-7d42e097607c4d246d99225bf2b195b6167a210c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26974/CVE-2024-26974-7d42e097607c4d246d99225bf2b195b6167a210c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8a5a7611ccc7b1fba8d933a9f22a2e76859d94dc",
                "patch_url": "https://git.kernel.org/stable/p/8a5a7611ccc7b1fba8d933a9f22a2e76859d94dc",
                "filename": "CVE-2024-26974-8a5a7611ccc7b1fba8d933a9f22a2e76859d94dc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26974/CVE-2024-26974-8a5a7611ccc7b1fba8d933a9f22a2e76859d94dc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8e81cd58aee14a470891733181a47d123193ba81",
                "patch_url": "https://git.kernel.org/stable/p/8e81cd58aee14a470891733181a47d123193ba81",
                "filename": "CVE-2024-26974-8e81cd58aee14a470891733181a47d123193ba81.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26974/CVE-2024-26974-8e81cd58aee14a470891733181a47d123193ba81.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bb279ead42263e9fb09480f02a4247b2c287d828",
                "patch_url": "https://git.kernel.org/stable/p/bb279ead42263e9fb09480f02a4247b2c287d828",
                "filename": "CVE-2024-26974-bb279ead42263e9fb09480f02a4247b2c287d828.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26974/CVE-2024-26974-bb279ead42263e9fb09480f02a4247b2c287d828.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d03092550f526a79cf1ade7f0dfa74906f39eb71",
                "patch_url": "https://git.kernel.org/stable/p/d03092550f526a79cf1ade7f0dfa74906f39eb71",
                "filename": "CVE-2024-26974-d03092550f526a79cf1ade7f0dfa74906f39eb71.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26974/CVE-2024-26974-d03092550f526a79cf1ade7f0dfa74906f39eb71.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/daba62d9eeddcc5b1081be7d348ca836c83c59d7",
                "patch_url": "https://git.kernel.org/stable/p/daba62d9eeddcc5b1081be7d348ca836c83c59d7",
                "filename": "CVE-2024-26974-daba62d9eeddcc5b1081be7d348ca836c83c59d7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26974/CVE-2024-26974-daba62d9eeddcc5b1081be7d348ca836c83c59d7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0c2cf5142bfb634c0ef0a1a69cdf37950747d0be",
            "https://git.kernel.org/stable/c/226fc408c5fcd23cc4186f05ea3a09a7a9aef2f7",
            "https://git.kernel.org/stable/c/4ae5a97781ce7d6ecc9c7055396535815b64ca4f",
            "https://git.kernel.org/stable/c/7d42e097607c4d246d99225bf2b195b6167a210c",
            "https://git.kernel.org/stable/c/8a5a7611ccc7b1fba8d933a9f22a2e76859d94dc",
            "https://git.kernel.org/stable/c/8e81cd58aee14a470891733181a47d123193ba81",
            "https://git.kernel.org/stable/c/bb279ead42263e9fb09480f02a4247b2c287d828",
            "https://git.kernel.org/stable/c/d03092550f526a79cf1ade7f0dfa74906f39eb71",
            "https://git.kernel.org/stable/c/daba62d9eeddcc5b1081be7d348ca836c83c59d7",
            "https://www.cve.org/CVERecord?id=CVE-2024-26974\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26974\nhttps://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-26974-13eb@gregkh/T"
        ]
    },
    "CVE-2024-26976": {
        "cve": "CVE-2024-26976",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Always flush async #PF workqueue when vCPU is being destroyed\n\nAlways flush the per-vCPU async #PF workqueue when a vCPU is clearing its\ncompletion queue, e.g. when a VM and all its vCPUs is being destroyed.\nKVM must ensure that none of its workqueue callbacks is running when the\nlast reference to the KVM _module_ is put.  Gifting a reference to the\nassociated VM prevents the workqueue callback from dereferencing freed\nvCPU/VM memory, but does not prevent the KVM module from being unloaded\nbefore the callback completes.\n\nDrop the misguided VM refcount gifting, as calling kvm_put_kvm() from\nasync_pf_execute() if kvm_put_kvm() flushes the async #PF workqueue will\nresult in deadlock.  async_pf_execute() can't return until kvm_put_kvm()\nfinishes, and kvm_put_kvm() can't return until async_pf_execute() finishes:\n\n WARNING: CPU: 8 PID: 251 at virt/kvm/kvm_main.c:1435 kvm_put_kvm+0x2d/0x320 [kvm]\n Modules linked in: vhost_net vhost vhost_iotlb tap kvm_intel kvm irqbypass\n CPU: 8 PID: 251 Comm: kworker/8:1 Tainted: G        W          6.6.0-rc1-e7af8d17224a-x86/gmem-vm #119\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n Workqueue: events async_pf_execute [kvm]\n RIP: 0010:kvm_put_kvm+0x2d/0x320 [kvm]\n Call Trace:\n  <TASK>\n  async_pf_execute+0x198/0x260 [kvm]\n  process_one_work+0x145/0x2d0\n  worker_thread+0x27e/0x3a0\n  kthread+0xba/0xe0\n  ret_from_fork+0x2d/0x50\n  ret_from_fork_asm+0x11/0x20\n  </TASK>\n ---[ end trace 0000000000000000 ]---\n INFO: task kworker/8:1:251 blocked for more than 120 seconds.\n       Tainted: G        W          6.6.0-rc1-e7af8d17224a-x86/gmem-vm #119\n \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n task:kworker/8:1     state:D stack:0     pid:251   ppid:2      flags:0x00004000\n Workqueue: events async_pf_execute [kvm]\n Call Trace:\n  <TASK>\n  __schedule+0x33f/0xa40\n  schedule+0x53/0xc0\n  schedule_timeout+0x12a/0x140\n  __wait_for_common+0x8d/0x1d0\n  __flush_work.isra.0+0x19f/0x2c0\n  kvm_clear_async_pf_completion_queue+0x129/0x190 [kvm]\n  kvm_arch_destroy_vm+0x78/0x1b0 [kvm]\n  kvm_put_kvm+0x1c1/0x320 [kvm]\n  async_pf_execute+0x198/0x260 [kvm]\n  process_one_work+0x145/0x2d0\n  worker_thread+0x27e/0x3a0\n  kthread+0xba/0xe0\n  ret_from_fork+0x2d/0x50\n  ret_from_fork_asm+0x11/0x20\n  </TASK>\n\nIf kvm_clear_async_pf_completion_queue() actually flushes the workqueue,\nthen there's no need to gift async_pf_execute() a reference because all\ninvocations of async_pf_execute() will be forced to complete before the\nvCPU and its VM are destroyed/freed.  And that in turn fixes the module\nunloading bug as __fput() won't do module_put() on the last vCPU reference\nuntil the vCPU has been freed, e.g. if closing the vCPU file also puts the\nlast reference to the KVM module.\n\nNote that kvm_check_async_pf_completion() may also take the work item off\nthe completion queue and so also needs to flush the work queue, as the\nwork will not be seen by kvm_clear_async_pf_completion_queue().  Waiting\non the workqueue could theoretically delay a vCPU due to waiting for the\nwork to complete, but that's a very, very small chance, and likely a very\nsmall delay.  kvm_arch_async_page_present_queued() unconditionally makes a\nnew request, i.e. will effectively delay entering the guest, so the\nremaining work is really just:\n\n        trace_kvm_async_pf_completed(addr, cr2_or_gpa);\n\n        __kvm_vcpu_wake_up(vcpu);\n\n        mmput(mm);\n\nand mmput() can't drop the last reference to the page tables if the vCPU is\nstill alive, i.e. the vCPU won't get stuck tearing down page tables.\n\nAdd a helper to do the flushing, specifically to deal with \"wakeup all\"\nwork items, as they aren't actually work items, i.e. are never placed in a\nworkqueue.  Trying to flush a bogus workqueue entry rightly makes\n__flush_work() complain (kudos to whoever added that sanity check).\n\nNote, commit 5f6de5cbebee (\"KVM: Prevent module exit until al\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26976",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/b54478d20375874aeee257744dedfd3e413432ff",
            "patch_url": "https://git.kernel.org/stable/p/b54478d20375874aeee257744dedfd3e413432ff",
            "filename": "CVE-2024-26976-b54478d20375874aeee257744dedfd3e413432ff.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26976/CVE-2024-26976-b54478d20375874aeee257744dedfd3e413432ff.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3d75b8aa5c29058a512db29da7cbee8052724157",
                "patch_url": "https://git.kernel.org/stable/p/3d75b8aa5c29058a512db29da7cbee8052724157",
                "filename": "CVE-2024-26976-3d75b8aa5c29058a512db29da7cbee8052724157.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26976/CVE-2024-26976-3d75b8aa5c29058a512db29da7cbee8052724157.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f3a3bce428fb439c66a578adc447afce7b4a750",
                "patch_url": "https://git.kernel.org/stable/p/4f3a3bce428fb439c66a578adc447afce7b4a750",
                "filename": "CVE-2024-26976-4f3a3bce428fb439c66a578adc447afce7b4a750.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26976/CVE-2024-26976-4f3a3bce428fb439c66a578adc447afce7b4a750.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/82e25cc1c2e93c3023da98be282322fc08b61ffb",
                "patch_url": "https://git.kernel.org/stable/p/82e25cc1c2e93c3023da98be282322fc08b61ffb",
                "filename": "CVE-2024-26976-82e25cc1c2e93c3023da98be282322fc08b61ffb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26976/CVE-2024-26976-82e25cc1c2e93c3023da98be282322fc08b61ffb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/83d3c5e309611ef593e2fcb78444fc8ceedf9bac",
                "patch_url": "https://git.kernel.org/stable/p/83d3c5e309611ef593e2fcb78444fc8ceedf9bac",
                "filename": "CVE-2024-26976-83d3c5e309611ef593e2fcb78444fc8ceedf9bac.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26976/CVE-2024-26976-83d3c5e309611ef593e2fcb78444fc8ceedf9bac.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a75afe480d4349c524d9c659b1a5a544dbc39a98",
                "patch_url": "https://git.kernel.org/stable/p/a75afe480d4349c524d9c659b1a5a544dbc39a98",
                "filename": "CVE-2024-26976-a75afe480d4349c524d9c659b1a5a544dbc39a98.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26976/CVE-2024-26976-a75afe480d4349c524d9c659b1a5a544dbc39a98.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ab2c2f5d9576112ad22cfd3798071cb74693b1f5",
                "patch_url": "https://git.kernel.org/stable/p/ab2c2f5d9576112ad22cfd3798071cb74693b1f5",
                "filename": "CVE-2024-26976-ab2c2f5d9576112ad22cfd3798071cb74693b1f5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26976/CVE-2024-26976-ab2c2f5d9576112ad22cfd3798071cb74693b1f5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b54478d20375874aeee257744dedfd3e413432ff",
                "patch_url": "https://git.kernel.org/stable/p/b54478d20375874aeee257744dedfd3e413432ff",
                "filename": "CVE-2024-26976-b54478d20375874aeee257744dedfd3e413432ff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26976/CVE-2024-26976-b54478d20375874aeee257744dedfd3e413432ff.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/caa9af2e27c275e089d702cfbaaece3b42bca31b",
                "patch_url": "https://git.kernel.org/stable/p/caa9af2e27c275e089d702cfbaaece3b42bca31b",
                "filename": "CVE-2024-26976-caa9af2e27c275e089d702cfbaaece3b42bca31b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26976/CVE-2024-26976-caa9af2e27c275e089d702cfbaaece3b42bca31b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f8730d6335e5f43d09151fca1f0f41922209a264",
                "patch_url": "https://git.kernel.org/stable/p/f8730d6335e5f43d09151fca1f0f41922209a264",
                "filename": "CVE-2024-26976-f8730d6335e5f43d09151fca1f0f41922209a264.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26976/CVE-2024-26976-f8730d6335e5f43d09151fca1f0f41922209a264.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3d75b8aa5c29058a512db29da7cbee8052724157",
            "https://git.kernel.org/stable/c/4f3a3bce428fb439c66a578adc447afce7b4a750",
            "https://git.kernel.org/stable/c/82e25cc1c2e93c3023da98be282322fc08b61ffb",
            "https://git.kernel.org/stable/c/83d3c5e309611ef593e2fcb78444fc8ceedf9bac",
            "https://git.kernel.org/stable/c/a75afe480d4349c524d9c659b1a5a544dbc39a98",
            "https://git.kernel.org/stable/c/ab2c2f5d9576112ad22cfd3798071cb74693b1f5",
            "https://git.kernel.org/stable/c/b54478d20375874aeee257744dedfd3e413432ff",
            "https://git.kernel.org/stable/c/caa9af2e27c275e089d702cfbaaece3b42bca31b",
            "https://git.kernel.org/stable/c/f8730d6335e5f43d09151fca1f0f41922209a264",
            "https://www.cve.org/CVERecord?id=CVE-2024-26976\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26976\nhttps://lore.kernel.org/linux-cve-announce/2024050133-CVE-2024-26976-60d4@gregkh/T"
        ]
    },
    "CVE-2024-26982": {
        "cve": "CVE-2024-26982",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: check the inode number is not the invalid value of zero\n\nSyskiller has produced an out of bounds access in fill_meta_index().\n\nThat out of bounds access is ultimately caused because the inode\nhas an inode number with the invalid value of zero, which was not checked.\n\nThe reason this causes the out of bounds access is due to following\nsequence of events:\n\n1. Fill_meta_index() is called to allocate (via empty_meta_index())\n   and fill a metadata index.  It however suffers a data read error\n   and aborts, invalidating the newly returned empty metadata index.\n   It does this by setting the inode number of the index to zero,\n   which means unused (zero is not a valid inode number).\n\n2. When fill_meta_index() is subsequently called again on another\n   read operation, locate_meta_index() returns the previous index\n   because it matches the inode number of 0.  Because this index\n   has been returned it is expected to have been filled, and because\n   it hasn't been, an out of bounds access is performed.\n\nThis patch adds a sanity check which checks that the inode number\nis not zero when the inode is created and returns -EINVAL if it is.\n\n[phillip@squashfs.org.uk: whitespace fix]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26982",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/32c114a58236fe67141634774559f21f1dc96fd7",
            "patch_url": "https://git.kernel.org/stable/p/32c114a58236fe67141634774559f21f1dc96fd7",
            "filename": "CVE-2024-26982-32c114a58236fe67141634774559f21f1dc96fd7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26982/CVE-2024-26982-32c114a58236fe67141634774559f21f1dc96fd7.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/32c114a58236fe67141634774559f21f1dc96fd7",
                "patch_url": "https://git.kernel.org/stable/p/32c114a58236fe67141634774559f21f1dc96fd7",
                "filename": "CVE-2024-26982-32c114a58236fe67141634774559f21f1dc96fd7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26982/CVE-2024-26982-32c114a58236fe67141634774559f21f1dc96fd7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4a1b6f89825e267e156ccaeba3d235edcac77f94",
                "patch_url": "https://git.kernel.org/stable/p/4a1b6f89825e267e156ccaeba3d235edcac77f94",
                "filename": "CVE-2024-26982-4a1b6f89825e267e156ccaeba3d235edcac77f94.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26982/CVE-2024-26982-4a1b6f89825e267e156ccaeba3d235edcac77f94.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5b99dea79650b50909c50aba24fbae00f203f013",
                "patch_url": "https://git.kernel.org/stable/p/5b99dea79650b50909c50aba24fbae00f203f013",
                "filename": "CVE-2024-26982-5b99dea79650b50909c50aba24fbae00f203f013.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26982/CVE-2024-26982-5b99dea79650b50909c50aba24fbae00f203f013.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5",
                "patch_url": "https://git.kernel.org/stable/p/7def00ebc9f2d6a581ddf46ce4541f84a10680e5",
                "filename": "CVE-2024-26982-7def00ebc9f2d6a581ddf46ce4541f84a10680e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26982/CVE-2024-26982-7def00ebc9f2d6a581ddf46ce4541f84a10680e5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395",
                "patch_url": "https://git.kernel.org/stable/p/9253c54e01b6505d348afbc02abaa4d9f8a01395",
                "filename": "CVE-2024-26982-9253c54e01b6505d348afbc02abaa4d9f8a01395.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26982/CVE-2024-26982-9253c54e01b6505d348afbc02abaa4d9f8a01395.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e",
                "patch_url": "https://git.kernel.org/stable/p/be383effaee3d89034f0828038f95065b518772e",
                "filename": "CVE-2024-26982-be383effaee3d89034f0828038f95065b518772e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26982/CVE-2024-26982-be383effaee3d89034f0828038f95065b518772e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf46f88b92cfc0e32bd8a21ba1273cff13b8745f",
                "patch_url": "https://git.kernel.org/stable/p/cf46f88b92cfc0e32bd8a21ba1273cff13b8745f",
                "filename": "CVE-2024-26982-cf46f88b92cfc0e32bd8a21ba1273cff13b8745f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26982/CVE-2024-26982-cf46f88b92cfc0e32bd8a21ba1273cff13b8745f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/32c114a58236fe67141634774559f21f1dc96fd7",
            "https://git.kernel.org/stable/c/4a1b6f89825e267e156ccaeba3d235edcac77f94",
            "https://git.kernel.org/stable/c/5b99dea79650b50909c50aba24fbae00f203f013",
            "https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5",
            "https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395",
            "https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e",
            "https://git.kernel.org/stable/c/cf46f88b92cfc0e32bd8a21ba1273cff13b8745f",
            "https://lkml.kernel.org/r/",
            "https://www.cve.org/CVERecord?id=CVE-2024-26982\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26982\nhttps://lore.kernel.org/linux-cve-announce/2024050141-CVE-2024-26982-8675@gregkh/T"
        ]
    },
    "CVE-2024-26984": {
        "cve": "CVE-2024-26984",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: fix instmem race condition around ptr stores\n\nRunning a lot of VK CTS in parallel against nouveau, once every\nfew hours you might see something like this crash.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000008\nPGD 8000000114e6e067 P4D 8000000114e6e067 PUD 109046067 PMD 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 7 PID: 53891 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27\nHardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021\nRIP: 0010:gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]\nCode: c7 48 01 c8 49 89 45 58 85 d2 0f 84 95 00 00 00 41 0f b7 46 12 49 8b 7e 08 89 da 42 8d 2c f8 48 8b 47 08 41 83 c7 01 48 89 ee <48> 8b 40 08 ff d0 0f 1f 00 49 8b 7e 08 48 89 d9 48 8d 75 04 48 c1\nRSP: 0000:ffffac20c5857838 EFLAGS: 00010202\nRAX: 0000000000000000 RBX: 00000000004d8001 RCX: 0000000000000001\nRDX: 00000000004d8001 RSI: 00000000000006d8 RDI: ffffa07afe332180\nRBP: 00000000000006d8 R08: ffffac20c5857ad0 R09: 0000000000ffff10\nR10: 0000000000000001 R11: ffffa07af27e2de0 R12: 000000000000001c\nR13: ffffac20c5857ad0 R14: ffffa07a96fe9040 R15: 000000000000001c\nFS:  00007fe395eed7c0(0000) GS:ffffa07e2c980000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000008 CR3: 000000011febe001 CR4: 00000000003706f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\n...\n\n ? gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]\n ? gp100_vmm_pgt_mem+0x37/0x180 [nouveau]\n nvkm_vmm_iter+0x351/0xa20 [nouveau]\n ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n ? __lock_acquire+0x3ed/0x2170\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n nvkm_vmm_ptes_get_map+0xc2/0x100 [nouveau]\n ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]\n ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]\n nvkm_vmm_map_locked+0x224/0x3a0 [nouveau]\n\nAdding any sort of useful debug usually makes it go away, so I hand\nwrote the function in a line, and debugged the asm.\n\nEvery so often pt->memory->ptrs is NULL. This ptrs ptr is set in\nthe nv50_instobj_acquire called from nvkm_kmap.\n\nIf Thread A and Thread B both get to nv50_instobj_acquire around\nthe same time, and Thread A hits the refcount_set line, and in\nlockstep thread B succeeds at refcount_inc_not_zero, there is a\nchance the ptrs value won't have been stored since refcount_set\nis unordered. Force a memory barrier here, I picked smp_mb, since\nwe want it on all CPUs and it's write followed by a read.\n\nv2: use paired smp_rmb/smp_wmb.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26984",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/13d76b2f443dc371842916dd8768009ff1594716",
            "patch_url": "https://git.kernel.org/stable/p/13d76b2f443dc371842916dd8768009ff1594716",
            "filename": "CVE-2024-26984-13d76b2f443dc371842916dd8768009ff1594716.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26984/CVE-2024-26984-13d76b2f443dc371842916dd8768009ff1594716.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/13d76b2f443dc371842916dd8768009ff1594716",
                "patch_url": "https://git.kernel.org/stable/p/13d76b2f443dc371842916dd8768009ff1594716",
                "filename": "CVE-2024-26984-13d76b2f443dc371842916dd8768009ff1594716.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26984/CVE-2024-26984-13d76b2f443dc371842916dd8768009ff1594716.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1bc4825d4c3ec6abe43cf06c3c39d664d044cbf7",
                "patch_url": "https://git.kernel.org/stable/p/1bc4825d4c3ec6abe43cf06c3c39d664d044cbf7",
                "filename": "CVE-2024-26984-1bc4825d4c3ec6abe43cf06c3c39d664d044cbf7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26984/CVE-2024-26984-1bc4825d4c3ec6abe43cf06c3c39d664d044cbf7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/21ca9539f09360fd83654f78f2c361f2f5ddcb52",
                "patch_url": "https://git.kernel.org/stable/p/21ca9539f09360fd83654f78f2c361f2f5ddcb52",
                "filename": "CVE-2024-26984-21ca9539f09360fd83654f78f2c361f2f5ddcb52.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26984/CVE-2024-26984-21ca9539f09360fd83654f78f2c361f2f5ddcb52.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3ab056814cd8ab84744c9a19ef51360b2271c572",
                "patch_url": "https://git.kernel.org/stable/p/3ab056814cd8ab84744c9a19ef51360b2271c572",
                "filename": "CVE-2024-26984-3ab056814cd8ab84744c9a19ef51360b2271c572.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26984/CVE-2024-26984-3ab056814cd8ab84744c9a19ef51360b2271c572.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a019b44b1bc6ed224c46fb5f88a8a10dd116e525",
                "patch_url": "https://git.kernel.org/stable/p/a019b44b1bc6ed224c46fb5f88a8a10dd116e525",
                "filename": "CVE-2024-26984-a019b44b1bc6ed224c46fb5f88a8a10dd116e525.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26984/CVE-2024-26984-a019b44b1bc6ed224c46fb5f88a8a10dd116e525.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ad74d208f213c06d860916ad40f609ade8c13039",
                "patch_url": "https://git.kernel.org/stable/p/ad74d208f213c06d860916ad40f609ade8c13039",
                "filename": "CVE-2024-26984-ad74d208f213c06d860916ad40f609ade8c13039.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26984/CVE-2024-26984-ad74d208f213c06d860916ad40f609ade8c13039.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bba8ec5e9b16649d85bc9e9086bf7ae5b5716ff9",
                "patch_url": "https://git.kernel.org/stable/p/bba8ec5e9b16649d85bc9e9086bf7ae5b5716ff9",
                "filename": "CVE-2024-26984-bba8ec5e9b16649d85bc9e9086bf7ae5b5716ff9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26984/CVE-2024-26984-bba8ec5e9b16649d85bc9e9086bf7ae5b5716ff9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fff1386cc889d8fb4089d285f883f8cba62d82ce",
                "patch_url": "https://git.kernel.org/stable/p/fff1386cc889d8fb4089d285f883f8cba62d82ce",
                "filename": "CVE-2024-26984-fff1386cc889d8fb4089d285f883f8cba62d82ce.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26984/CVE-2024-26984-fff1386cc889d8fb4089d285f883f8cba62d82ce.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/13d76b2f443dc371842916dd8768009ff1594716",
            "https://git.kernel.org/stable/c/1bc4825d4c3ec6abe43cf06c3c39d664d044cbf7",
            "https://git.kernel.org/stable/c/21ca9539f09360fd83654f78f2c361f2f5ddcb52",
            "https://git.kernel.org/stable/c/3ab056814cd8ab84744c9a19ef51360b2271c572",
            "https://git.kernel.org/stable/c/a019b44b1bc6ed224c46fb5f88a8a10dd116e525",
            "https://git.kernel.org/stable/c/ad74d208f213c06d860916ad40f609ade8c13039",
            "https://git.kernel.org/stable/c/bba8ec5e9b16649d85bc9e9086bf7ae5b5716ff9",
            "https://git.kernel.org/stable/c/fff1386cc889d8fb4089d285f883f8cba62d82ce",
            "https://www.cve.org/CVERecord?id=CVE-2024-26984\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26984\nhttps://lore.kernel.org/linux-cve-announce/2024050142-CVE-2024-26984-3028@gregkh/T"
        ]
    },
    "CVE-2024-26993": {
        "cve": "CVE-2024-26993",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: sysfs: Fix reference leak in sysfs_break_active_protection()\n\nThe sysfs_break_active_protection() routine has an obvious reference\nleak in its error path.  If the call to kernfs_find_and_get() fails then\nkn will be NULL, so the companion sysfs_unbreak_active_protection()\nroutine won't get called (and would only cause an access violation by\ntrying to dereference kn->parent if it was called).  As a result, the\nreference to kobj acquired at the start of the function will never be\nreleased.\n\nFix the leak by adding an explicit kobject_put() call when kn is NULL.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-26993",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/57baab0f376bec8f54b0fe6beb8f77a57c228063",
            "patch_url": "https://git.kernel.org/stable/p/57baab0f376bec8f54b0fe6beb8f77a57c228063",
            "filename": "CVE-2024-26993-57baab0f376bec8f54b0fe6beb8f77a57c228063.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26993/CVE-2024-26993-57baab0f376bec8f54b0fe6beb8f77a57c228063.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/43f00210cb257bcb0387e8caeb4b46375d67f30c",
                "patch_url": "https://git.kernel.org/stable/p/43f00210cb257bcb0387e8caeb4b46375d67f30c",
                "filename": "CVE-2024-26993-43f00210cb257bcb0387e8caeb4b46375d67f30c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26993/CVE-2024-26993-43f00210cb257bcb0387e8caeb4b46375d67f30c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/57baab0f376bec8f54b0fe6beb8f77a57c228063",
                "patch_url": "https://git.kernel.org/stable/p/57baab0f376bec8f54b0fe6beb8f77a57c228063",
                "filename": "CVE-2024-26993-57baab0f376bec8f54b0fe6beb8f77a57c228063.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26993/CVE-2024-26993-57baab0f376bec8f54b0fe6beb8f77a57c228063.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5d43e072285e81b0b63cee7189b3357c7768a43b",
                "patch_url": "https://git.kernel.org/stable/p/5d43e072285e81b0b63cee7189b3357c7768a43b",
                "filename": "CVE-2024-26993-5d43e072285e81b0b63cee7189b3357c7768a43b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26993/CVE-2024-26993-5d43e072285e81b0b63cee7189b3357c7768a43b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/84bd4c2ae9c3d0a7d3a5c032ea7efff17af17e17",
                "patch_url": "https://git.kernel.org/stable/p/84bd4c2ae9c3d0a7d3a5c032ea7efff17af17e17",
                "filename": "CVE-2024-26993-84bd4c2ae9c3d0a7d3a5c032ea7efff17af17e17.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26993/CVE-2024-26993-84bd4c2ae9c3d0a7d3a5c032ea7efff17af17e17.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a4c99b57d43bab45225ba92d574a8683f9edc8e4",
                "patch_url": "https://git.kernel.org/stable/p/a4c99b57d43bab45225ba92d574a8683f9edc8e4",
                "filename": "CVE-2024-26993-a4c99b57d43bab45225ba92d574a8683f9edc8e4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26993/CVE-2024-26993-a4c99b57d43bab45225ba92d574a8683f9edc8e4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a90bca2228c0646fc29a72689d308e5fe03e6d78",
                "patch_url": "https://git.kernel.org/stable/p/a90bca2228c0646fc29a72689d308e5fe03e6d78",
                "filename": "CVE-2024-26993-a90bca2228c0646fc29a72689d308e5fe03e6d78.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26993/CVE-2024-26993-a90bca2228c0646fc29a72689d308e5fe03e6d78.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ac107356aabc362aaeb77463e814fc067a5d3957",
                "patch_url": "https://git.kernel.org/stable/p/ac107356aabc362aaeb77463e814fc067a5d3957",
                "filename": "CVE-2024-26993-ac107356aabc362aaeb77463e814fc067a5d3957.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26993/CVE-2024-26993-ac107356aabc362aaeb77463e814fc067a5d3957.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f28bba37fe244889b81bb5c508d3f6e5c6e342c5",
                "patch_url": "https://git.kernel.org/stable/p/f28bba37fe244889b81bb5c508d3f6e5c6e342c5",
                "filename": "CVE-2024-26993-f28bba37fe244889b81bb5c508d3f6e5c6e342c5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-26993/CVE-2024-26993-f28bba37fe244889b81bb5c508d3f6e5c6e342c5.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/43f00210cb257bcb0387e8caeb4b46375d67f30c",
            "https://git.kernel.org/stable/c/57baab0f376bec8f54b0fe6beb8f77a57c228063",
            "https://git.kernel.org/stable/c/5d43e072285e81b0b63cee7189b3357c7768a43b",
            "https://git.kernel.org/stable/c/84bd4c2ae9c3d0a7d3a5c032ea7efff17af17e17",
            "https://git.kernel.org/stable/c/a4c99b57d43bab45225ba92d574a8683f9edc8e4",
            "https://git.kernel.org/stable/c/a90bca2228c0646fc29a72689d308e5fe03e6d78",
            "https://git.kernel.org/stable/c/ac107356aabc362aaeb77463e814fc067a5d3957",
            "https://git.kernel.org/stable/c/f28bba37fe244889b81bb5c508d3f6e5c6e342c5",
            "https://www.cve.org/CVERecord?id=CVE-2024-26993\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26993\nhttps://lore.kernel.org/linux-cve-announce/2024050144-CVE-2024-26993-fe52@gregkh/T"
        ]
    },
    "CVE-2024-27010": {
        "cve": "CVE-2024-27010",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Fix mirred deadlock on device recursion\n\nWhen the mirred action is used on a classful egress qdisc and a packet is\nmirrored or redirected to self we hit a qdisc lock deadlock.\nSee trace below.\n\n[..... other info removed for brevity....]\n[   82.890906]\n[   82.890906] ============================================\n[   82.890906] WARNING: possible recursive locking detected\n[   82.890906] 6.8.0-05205-g77fadd89fe2d-dirty #213 Tainted: G        W\n[   82.890906] --------------------------------------------\n[   82.890906] ping/418 is trying to acquire lock:\n[   82.890906] ffff888006994110 (&sch->q.lock){+.-.}-{3:3}, at:\n__dev_queue_xmit+0x1778/0x3550\n[   82.890906]\n[   82.890906] but task is already holding lock:\n[   82.890906] ffff888006994110 (&sch->q.lock){+.-.}-{3:3}, at:\n__dev_queue_xmit+0x1778/0x3550\n[   82.890906]\n[   82.890906] other info that might help us debug this:\n[   82.890906]  Possible unsafe locking scenario:\n[   82.890906]\n[   82.890906]        CPU0\n[   82.890906]        ----\n[   82.890906]   lock(&sch->q.lock);\n[   82.890906]   lock(&sch->q.lock);\n[   82.890906]\n[   82.890906]  *** DEADLOCK ***\n[   82.890906]\n[..... other info removed for brevity....]\n\nExample setup (eth0->eth0) to recreate\ntc qdisc add dev eth0 root handle 1: htb default 30\ntc filter add dev eth0 handle 1: protocol ip prio 2 matchall \\\n     action mirred egress redirect dev eth0\n\nAnother example(eth0->eth1->eth0) to recreate\ntc qdisc add dev eth0 root handle 1: htb default 30\ntc filter add dev eth0 handle 1: protocol ip prio 2 matchall \\\n     action mirred egress redirect dev eth1\n\ntc qdisc add dev eth1 root handle 1: htb default 30\ntc filter add dev eth1 handle 1: protocol ip prio 2 matchall \\\n     action mirred egress redirect dev eth0\n\nWe fix this by adding an owner field (CPU id) to struct Qdisc set after\nroot qdisc is entered. When the softirq enters it a second time, if the\nqdisc owner is the same CPU, the packet is dropped to break the loop.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27010",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0f022d32c3eca477fbf79a205243a6123ed0fe11",
            "patch_url": "https://git.kernel.org/stable/p/0f022d32c3eca477fbf79a205243a6123ed0fe11",
            "filename": "CVE-2024-27010-0f022d32c3eca477fbf79a205243a6123ed0fe11.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27010/CVE-2024-27010-0f022d32c3eca477fbf79a205243a6123ed0fe11.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0f022d32c3eca477fbf79a205243a6123ed0fe11",
                "patch_url": "https://git.kernel.org/stable/p/0f022d32c3eca477fbf79a205243a6123ed0fe11",
                "filename": "CVE-2024-27010-0f022d32c3eca477fbf79a205243a6123ed0fe11.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27010/CVE-2024-27010-0f022d32c3eca477fbf79a205243a6123ed0fe11.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e6b90468da4dae2281a6e381107f411efb48b0ef",
                "patch_url": "https://git.kernel.org/stable/p/e6b90468da4dae2281a6e381107f411efb48b0ef",
                "filename": "CVE-2024-27010-e6b90468da4dae2281a6e381107f411efb48b0ef.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27010/CVE-2024-27010-e6b90468da4dae2281a6e381107f411efb48b0ef.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0f022d32c3eca477fbf79a205243a6123ed0fe11",
            "https://git.kernel.org/stable/c/e6b90468da4dae2281a6e381107f411efb48b0ef",
            "https://www.cve.org/CVERecord?id=CVE-2024-27010\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27010\nhttps://lore.kernel.org/linux-cve-announce/2024050148-CVE-2024-27010-5a68@gregkh/T"
        ]
    },
    "CVE-2024-27011": {
        "cve": "CVE-2024-27011",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix memleak in map from abort path\n\nThe delete set command does not rely on the transaction object for\nelement removal, therefore, a combination of delete element + delete set\nfrom the abort path could result in restoring twice the refcount of the\nmapping.\n\nCheck for inactive element in the next generation for the delete element\ncommand in the abort path, skip restoring state if next generation bit\nhas been already cleared. This is similar to the activate logic using\nthe set walk iterator.\n\n[ 6170.286929] ------------[ cut here ]------------\n[ 6170.286939] WARNING: CPU: 6 PID: 790302 at net/netfilter/nf_tables_api.c:2086 nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]\n[ 6170.287071] Modules linked in: [...]\n[ 6170.287633] CPU: 6 PID: 790302 Comm: kworker/6:2 Not tainted 6.9.0-rc3+ #365\n[ 6170.287768] RIP: 0010:nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]\n[ 6170.287886] Code: df 48 8d 7d 58 e8 69 2e 3b df 48 8b 7d 58 e8 80 1b 37 df 48 8d 7d 68 e8 57 2e 3b df 48 8b 7d 68 e8 6e 1b 37 df 48 89 ef eb c4 <0f> 0b 48 83 c4 08 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 0f\n[ 6170.287895] RSP: 0018:ffff888134b8fd08 EFLAGS: 00010202\n[ 6170.287904] RAX: 0000000000000001 RBX: ffff888125bffb28 RCX: dffffc0000000000\n[ 6170.287912] RDX: 0000000000000003 RSI: ffffffffa20298ab RDI: ffff88811ebe4750\n[ 6170.287919] RBP: ffff88811ebe4700 R08: ffff88838e812650 R09: fffffbfff0623a55\n[ 6170.287926] R10: ffffffff8311d2af R11: 0000000000000001 R12: ffff888125bffb10\n[ 6170.287933] R13: ffff888125bffb10 R14: dead000000000122 R15: dead000000000100\n[ 6170.287940] FS:  0000000000000000(0000) GS:ffff888390b00000(0000) knlGS:0000000000000000\n[ 6170.287948] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 6170.287955] CR2: 00007fd31fc00710 CR3: 0000000133f60004 CR4: 00000000001706f0\n[ 6170.287962] Call Trace:\n[ 6170.287967]  <TASK>\n[ 6170.287973]  ? __warn+0x9f/0x1a0\n[ 6170.287986]  ? nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]\n[ 6170.288092]  ? report_bug+0x1b1/0x1e0\n[ 6170.287986]  ? nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]\n[ 6170.288092]  ? report_bug+0x1b1/0x1e0\n[ 6170.288104]  ? handle_bug+0x3c/0x70\n[ 6170.288112]  ? exc_invalid_op+0x17/0x40\n[ 6170.288120]  ? asm_exc_invalid_op+0x1a/0x20\n[ 6170.288132]  ? nf_tables_chain_destroy+0x2b/0x220 [nf_tables]\n[ 6170.288243]  ? nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]\n[ 6170.288366]  ? nf_tables_chain_destroy+0x2b/0x220 [nf_tables]\n[ 6170.288483]  nf_tables_trans_destroy_work+0x588/0x590 [nf_tables]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27011",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/49d0e656d19dfb2d4d7c230e4a720d37b3decff6",
            "patch_url": "https://git.kernel.org/stable/p/49d0e656d19dfb2d4d7c230e4a720d37b3decff6",
            "filename": "CVE-2024-27011-49d0e656d19dfb2d4d7c230e4a720d37b3decff6.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27011/CVE-2024-27011-49d0e656d19dfb2d4d7c230e4a720d37b3decff6.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/49d0e656d19dfb2d4d7c230e4a720d37b3decff6",
                "patch_url": "https://git.kernel.org/stable/p/49d0e656d19dfb2d4d7c230e4a720d37b3decff6",
                "filename": "CVE-2024-27011-49d0e656d19dfb2d4d7c230e4a720d37b3decff6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27011/CVE-2024-27011-49d0e656d19dfb2d4d7c230e4a720d37b3decff6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/86a1471d7cde792941109b93b558b5dc078b9ee9",
                "patch_url": "https://git.kernel.org/stable/p/86a1471d7cde792941109b93b558b5dc078b9ee9",
                "filename": "CVE-2024-27011-86a1471d7cde792941109b93b558b5dc078b9ee9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27011/CVE-2024-27011-86a1471d7cde792941109b93b558b5dc078b9ee9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a1bd2a38a1c6388fc8556816dc203c3e9dc52237",
                "patch_url": "https://git.kernel.org/stable/p/a1bd2a38a1c6388fc8556816dc203c3e9dc52237",
                "filename": "CVE-2024-27011-a1bd2a38a1c6388fc8556816dc203c3e9dc52237.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27011/CVE-2024-27011-a1bd2a38a1c6388fc8556816dc203c3e9dc52237.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/49d0e656d19dfb2d4d7c230e4a720d37b3decff6",
            "https://git.kernel.org/stable/c/86a1471d7cde792941109b93b558b5dc078b9ee9",
            "https://git.kernel.org/stable/c/a1bd2a38a1c6388fc8556816dc203c3e9dc52237",
            "https://www.cve.org/CVERecord?id=CVE-2024-27011\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27011\nhttps://lore.kernel.org/linux-cve-announce/2024050148-CVE-2024-27011-2c70@gregkh/T"
        ]
    },
    "CVE-2024-27013": {
        "cve": "CVE-2024-27013",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntun: limit printing rate when illegal packet received by tun dev\n\nvhost_worker will call tun call backs to receive packets. If too many\nillegal packets arrives, tun_do_read will keep dumping packet contents.\nWhen console is enabled, it will costs much more cpu time to dump\npacket and soft lockup will be detected.\n\nnet_ratelimit mechanism can be used to limit the dumping rate.\n\nPID: 33036    TASK: ffff949da6f20000  CPU: 23   COMMAND: \"vhost-32980\"\n #0 [fffffe00003fce50] crash_nmi_callback at ffffffff89249253\n #1 [fffffe00003fce58] nmi_handle at ffffffff89225fa3\n #2 [fffffe00003fceb0] default_do_nmi at ffffffff8922642e\n #3 [fffffe00003fced0] do_nmi at ffffffff8922660d\n #4 [fffffe00003fcef0] end_repeat_nmi at ffffffff89c01663\n    [exception RIP: io_serial_in+20]\n    RIP: ffffffff89792594  RSP: ffffa655314979e8  RFLAGS: 00000002\n    RAX: ffffffff89792500  RBX: ffffffff8af428a0  RCX: 0000000000000000\n    RDX: 00000000000003fd  RSI: 0000000000000005  RDI: ffffffff8af428a0\n    RBP: 0000000000002710   R8: 0000000000000004   R9: 000000000000000f\n    R10: 0000000000000000  R11: ffffffff8acbf64f  R12: 0000000000000020\n    R13: ffffffff8acbf698  R14: 0000000000000058  R15: 0000000000000000\n    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018\n #5 [ffffa655314979e8] io_serial_in at ffffffff89792594\n #6 [ffffa655314979e8] wait_for_xmitr at ffffffff89793470\n #7 [ffffa65531497a08] serial8250_console_putchar at ffffffff897934f6\n #8 [ffffa65531497a20] uart_console_write at ffffffff8978b605\n #9 [ffffa65531497a48] serial8250_console_write at ffffffff89796558\n #10 [ffffa65531497ac8] console_unlock at ffffffff89316124\n #11 [ffffa65531497b10] vprintk_emit at ffffffff89317c07\n #12 [ffffa65531497b68] printk at ffffffff89318306\n #13 [ffffa65531497bc8] print_hex_dump at ffffffff89650765\n #14 [ffffa65531497ca8] tun_do_read at ffffffffc0b06c27 [tun]\n #15 [ffffa65531497d38] tun_recvmsg at ffffffffc0b06e34 [tun]\n #16 [ffffa65531497d68] handle_rx at ffffffffc0c5d682 [vhost_net]\n #17 [ffffa65531497ed0] vhost_worker at ffffffffc0c644dc [vhost]\n #18 [ffffa65531497f10] kthread at ffffffff892d2e72\n #19 [ffffa65531497f50] ret_from_fork at ffffffff89c0022f",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27013",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/62e27ef18eb4f0d33bbae8e9ef56b99696a74713",
            "patch_url": "https://git.kernel.org/stable/p/62e27ef18eb4f0d33bbae8e9ef56b99696a74713",
            "filename": "CVE-2024-27013-62e27ef18eb4f0d33bbae8e9ef56b99696a74713.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27013/CVE-2024-27013-62e27ef18eb4f0d33bbae8e9ef56b99696a74713.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/14cdb43dbc827e18ac7d5b30c5b4c676219f1421",
                "patch_url": "https://git.kernel.org/stable/p/14cdb43dbc827e18ac7d5b30c5b4c676219f1421",
                "filename": "CVE-2024-27013-14cdb43dbc827e18ac7d5b30c5b4c676219f1421.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27013/CVE-2024-27013-14cdb43dbc827e18ac7d5b30c5b4c676219f1421.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/40f4ced305c6c47487d3cd8da54676e2acc1a6ad",
                "patch_url": "https://git.kernel.org/stable/p/40f4ced305c6c47487d3cd8da54676e2acc1a6ad",
                "filename": "CVE-2024-27013-40f4ced305c6c47487d3cd8da54676e2acc1a6ad.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27013/CVE-2024-27013-40f4ced305c6c47487d3cd8da54676e2acc1a6ad.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4b0dcae5c4797bf31c63011ed62917210d3fdac3",
                "patch_url": "https://git.kernel.org/stable/p/4b0dcae5c4797bf31c63011ed62917210d3fdac3",
                "filename": "CVE-2024-27013-4b0dcae5c4797bf31c63011ed62917210d3fdac3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27013/CVE-2024-27013-4b0dcae5c4797bf31c63011ed62917210d3fdac3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/52854101180beccdb9dc2077a3bea31b6ad48dfa",
                "patch_url": "https://git.kernel.org/stable/p/52854101180beccdb9dc2077a3bea31b6ad48dfa",
                "filename": "CVE-2024-27013-52854101180beccdb9dc2077a3bea31b6ad48dfa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27013/CVE-2024-27013-52854101180beccdb9dc2077a3bea31b6ad48dfa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/62e27ef18eb4f0d33bbae8e9ef56b99696a74713",
                "patch_url": "https://git.kernel.org/stable/p/62e27ef18eb4f0d33bbae8e9ef56b99696a74713",
                "filename": "CVE-2024-27013-62e27ef18eb4f0d33bbae8e9ef56b99696a74713.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27013/CVE-2024-27013-62e27ef18eb4f0d33bbae8e9ef56b99696a74713.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/68459b8e3ee554ce71878af9eb69659b9462c588",
                "patch_url": "https://git.kernel.org/stable/p/68459b8e3ee554ce71878af9eb69659b9462c588",
                "filename": "CVE-2024-27013-68459b8e3ee554ce71878af9eb69659b9462c588.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27013/CVE-2024-27013-68459b8e3ee554ce71878af9eb69659b9462c588.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a50dbeca28acf7051dfa92786b85f704c75db6eb",
                "patch_url": "https://git.kernel.org/stable/p/a50dbeca28acf7051dfa92786b85f704c75db6eb",
                "filename": "CVE-2024-27013-a50dbeca28acf7051dfa92786b85f704c75db6eb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27013/CVE-2024-27013-a50dbeca28acf7051dfa92786b85f704c75db6eb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f8bbc07ac535593139c875ffa19af924b1084540",
                "patch_url": "https://git.kernel.org/stable/p/f8bbc07ac535593139c875ffa19af924b1084540",
                "filename": "CVE-2024-27013-f8bbc07ac535593139c875ffa19af924b1084540.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27013/CVE-2024-27013-f8bbc07ac535593139c875ffa19af924b1084540.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/14cdb43dbc827e18ac7d5b30c5b4c676219f1421",
            "https://git.kernel.org/stable/c/40f4ced305c6c47487d3cd8da54676e2acc1a6ad",
            "https://git.kernel.org/stable/c/4b0dcae5c4797bf31c63011ed62917210d3fdac3",
            "https://git.kernel.org/stable/c/52854101180beccdb9dc2077a3bea31b6ad48dfa",
            "https://git.kernel.org/stable/c/62e27ef18eb4f0d33bbae8e9ef56b99696a74713",
            "https://git.kernel.org/stable/c/68459b8e3ee554ce71878af9eb69659b9462c588",
            "https://git.kernel.org/stable/c/a50dbeca28acf7051dfa92786b85f704c75db6eb",
            "https://git.kernel.org/stable/c/f8bbc07ac535593139c875ffa19af924b1084540",
            "https://www.cve.org/CVERecord?id=CVE-2024-27013\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27013\nhttps://lore.kernel.org/linux-cve-announce/2024050149-CVE-2024-27013-2c26@gregkh/T"
        ]
    },
    "CVE-2024-27014": {
        "cve": "CVE-2024-27014",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Prevent deadlock while disabling aRFS\n\nWhen disabling aRFS under the `priv->state_lock`, any scheduled\naRFS works are canceled using the `cancel_work_sync` function,\nwhich waits for the work to end if it has already started.\nHowever, while waiting for the work handler, the handler will\ntry to acquire the `state_lock` which is already acquired.\n\nThe worker acquires the lock to delete the rules if the state\nis down, which is not the worker's responsibility since\ndisabling aRFS deletes the rules.\n\nAdd an aRFS state variable, which indicates whether the aRFS is\nenabled and prevent adding rules when the aRFS is disabled.\n\nKernel log:\n\n======================================================\nWARNING: possible circular locking dependency detected\n6.7.0-rc4_net_next_mlx5_5483eb2 #1 Tainted: G          I\n------------------------------------------------------\nethtool/386089 is trying to acquire lock:\nffff88810f21ce68 ((work_completion)(&rule->arfs_work)){+.+.}-{0:0}, at: __flush_work+0x74/0x4e0\n\nbut task is already holding lock:\nffff8884a1808cc0 (&priv->state_lock){+.+.}-{3:3}, at: mlx5e_ethtool_set_channels+0x53/0x200 [mlx5_core]\n\nwhich lock already depends on the new lock.\n\nthe existing dependency chain (in reverse order) is:\n\n-> #1 (&priv->state_lock){+.+.}-{3:3}:\n       __mutex_lock+0x80/0xc90\n       arfs_handle_work+0x4b/0x3b0 [mlx5_core]\n       process_one_work+0x1dc/0x4a0\n       worker_thread+0x1bf/0x3c0\n       kthread+0xd7/0x100\n       ret_from_fork+0x2d/0x50\n       ret_from_fork_asm+0x11/0x20\n\n-> #0 ((work_completion)(&rule->arfs_work)){+.+.}-{0:0}:\n       __lock_acquire+0x17b4/0x2c80\n       lock_acquire+0xd0/0x2b0\n       __flush_work+0x7a/0x4e0\n       __cancel_work_timer+0x131/0x1c0\n       arfs_del_rules+0x143/0x1e0 [mlx5_core]\n       mlx5e_arfs_disable+0x1b/0x30 [mlx5_core]\n       mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core]\n       ethnl_set_channels+0x28f/0x3b0\n       ethnl_default_set_doit+0xec/0x240\n       genl_family_rcv_msg_doit+0xd0/0x120\n       genl_rcv_msg+0x188/0x2c0\n       netlink_rcv_skb+0x54/0x100\n       genl_rcv+0x24/0x40\n       netlink_unicast+0x1a1/0x270\n       netlink_sendmsg+0x214/0x460\n       __sock_sendmsg+0x38/0x60\n       __sys_sendto+0x113/0x170\n       __x64_sys_sendto+0x20/0x30\n       do_syscall_64+0x40/0xe0\n       entry_SYSCALL_64_after_hwframe+0x46/0x4e\n\nother info that might help us debug this:\n\n Possible unsafe locking scenario:\n\n       CPU0                    CPU1\n       ----                    ----\n  lock(&priv->state_lock);\n                               lock((work_completion)(&rule->arfs_work));\n                               lock(&priv->state_lock);\n  lock((work_completion)(&rule->arfs_work));\n\n *** DEADLOCK ***\n\n3 locks held by ethtool/386089:\n #0: ffffffff82ea7210 (cb_lock){++++}-{3:3}, at: genl_rcv+0x15/0x40\n #1: ffffffff82e94c88 (rtnl_mutex){+.+.}-{3:3}, at: ethnl_default_set_doit+0xd3/0x240\n #2: ffff8884a1808cc0 (&priv->state_lock){+.+.}-{3:3}, at: mlx5e_ethtool_set_channels+0x53/0x200 [mlx5_core]\n\nstack backtrace:\nCPU: 15 PID: 386089 Comm: ethtool Tainted: G          I        6.7.0-rc4_net_next_mlx5_5483eb2 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl+0x60/0xa0\n check_noncircular+0x144/0x160\n __lock_acquire+0x17b4/0x2c80\n lock_acquire+0xd0/0x2b0\n ? __flush_work+0x74/0x4e0\n ? save_trace+0x3e/0x360\n ? __flush_work+0x74/0x4e0\n __flush_work+0x7a/0x4e0\n ? __flush_work+0x74/0x4e0\n ? __lock_acquire+0xa78/0x2c80\n ? lock_acquire+0xd0/0x2b0\n ? mark_held_locks+0x49/0x70\n __cancel_work_timer+0x131/0x1c0\n ? mark_held_locks+0x49/0x70\n arfs_del_rules+0x143/0x1e0 [mlx5_core]\n mlx5e_arfs_disable+0x1b/0x30 [mlx5_core]\n mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core]\n ethnl_set_channels+0x28f/0x3b0\n ethnl_default_set_doit+0xec/0x240\n genl_family_rcv_msg_doit+0xd0/0x120\n genl_rcv_msg+0x188/0x2c0\n ? ethn\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27014",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0080bf99499468030248ebd25dd645e487dcecdc",
            "patch_url": "https://git.kernel.org/stable/p/0080bf99499468030248ebd25dd645e487dcecdc",
            "filename": "CVE-2024-27014-0080bf99499468030248ebd25dd645e487dcecdc.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27014/CVE-2024-27014-0080bf99499468030248ebd25dd645e487dcecdc.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0080bf99499468030248ebd25dd645e487dcecdc",
                "patch_url": "https://git.kernel.org/stable/p/0080bf99499468030248ebd25dd645e487dcecdc",
                "filename": "CVE-2024-27014-0080bf99499468030248ebd25dd645e487dcecdc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27014/CVE-2024-27014-0080bf99499468030248ebd25dd645e487dcecdc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/46efa4d5930cf3c2af8c01f75e0a47e4fc045e3b",
                "patch_url": "https://git.kernel.org/stable/p/46efa4d5930cf3c2af8c01f75e0a47e4fc045e3b",
                "filename": "CVE-2024-27014-46efa4d5930cf3c2af8c01f75e0a47e4fc045e3b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27014/CVE-2024-27014-46efa4d5930cf3c2af8c01f75e0a47e4fc045e3b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/48c4bb81df19402d4346032353d0795260255e3b",
                "patch_url": "https://git.kernel.org/stable/p/48c4bb81df19402d4346032353d0795260255e3b",
                "filename": "CVE-2024-27014-48c4bb81df19402d4346032353d0795260255e3b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27014/CVE-2024-27014-48c4bb81df19402d4346032353d0795260255e3b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fef965764cf562f28afb997b626fc7c3cec99693",
                "patch_url": "https://git.kernel.org/stable/p/fef965764cf562f28afb997b626fc7c3cec99693",
                "filename": "CVE-2024-27014-fef965764cf562f28afb997b626fc7c3cec99693.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27014/CVE-2024-27014-fef965764cf562f28afb997b626fc7c3cec99693.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0080bf99499468030248ebd25dd645e487dcecdc",
            "https://git.kernel.org/stable/c/46efa4d5930cf3c2af8c01f75e0a47e4fc045e3b",
            "https://git.kernel.org/stable/c/48c4bb81df19402d4346032353d0795260255e3b",
            "https://git.kernel.org/stable/c/fef965764cf562f28afb997b626fc7c3cec99693",
            "https://www.cve.org/CVERecord?id=CVE-2024-27014\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27014\nhttps://lore.kernel.org/linux-cve-announce/2024050149-CVE-2024-27014-d2dc@gregkh/T"
        ]
    },
    "CVE-2024-27017": {
        "cve": "CVE-2024-27017",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: walk over current view on netlink dump\n\nThe generation mask can be updated while netlink dump is in progress.\nThe pipapo set backend walk iterator cannot rely on it to infer what\nview of the datastructure is to be used. Add notation to specify if user\nwants to read/update the set.\n\nBased on patch from Florian Westphal.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27017",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/29b359cf6d95fd60730533f7f10464e95bd17c73",
            "patch_url": "https://git.kernel.org/stable/p/29b359cf6d95fd60730533f7f10464e95bd17c73",
            "filename": "CVE-2024-27017-29b359cf6d95fd60730533f7f10464e95bd17c73.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27017/CVE-2024-27017-29b359cf6d95fd60730533f7f10464e95bd17c73.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/29b359cf6d95fd60730533f7f10464e95bd17c73",
                "patch_url": "https://git.kernel.org/stable/p/29b359cf6d95fd60730533f7f10464e95bd17c73",
                "filename": "CVE-2024-27017-29b359cf6d95fd60730533f7f10464e95bd17c73.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27017/CVE-2024-27017-29b359cf6d95fd60730533f7f10464e95bd17c73.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/52735a010f37580b3a569a996f878fdd87425650",
                "patch_url": "https://git.kernel.org/stable/p/52735a010f37580b3a569a996f878fdd87425650",
                "filename": "CVE-2024-27017-52735a010f37580b3a569a996f878fdd87425650.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27017/CVE-2024-27017-52735a010f37580b3a569a996f878fdd87425650.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/721715655c72640567e8742567520c99801148ed",
                "patch_url": "https://git.kernel.org/stable/p/721715655c72640567e8742567520c99801148ed",
                "filename": "CVE-2024-27017-721715655c72640567e8742567520c99801148ed.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27017/CVE-2024-27017-721715655c72640567e8742567520c99801148ed.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ce9fef54c5ec9912a0c9a47bac3195cc41b14679",
                "patch_url": "https://git.kernel.org/stable/p/ce9fef54c5ec9912a0c9a47bac3195cc41b14679",
                "filename": "CVE-2024-27017-ce9fef54c5ec9912a0c9a47bac3195cc41b14679.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27017/CVE-2024-27017-ce9fef54c5ec9912a0c9a47bac3195cc41b14679.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f24d8abc2bb8cbf31ec713336e402eafa8f42f60",
                "patch_url": "https://git.kernel.org/stable/p/f24d8abc2bb8cbf31ec713336e402eafa8f42f60",
                "filename": "CVE-2024-27017-f24d8abc2bb8cbf31ec713336e402eafa8f42f60.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27017/CVE-2024-27017-f24d8abc2bb8cbf31ec713336e402eafa8f42f60.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ff89db14c63a827066446460e39226c0688ef786",
                "patch_url": "https://git.kernel.org/stable/p/ff89db14c63a827066446460e39226c0688ef786",
                "filename": "CVE-2024-27017-ff89db14c63a827066446460e39226c0688ef786.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27017/CVE-2024-27017-ff89db14c63a827066446460e39226c0688ef786.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/29b359cf6d95fd60730533f7f10464e95bd17c73",
            "https://git.kernel.org/stable/c/52735a010f37580b3a569a996f878fdd87425650",
            "https://git.kernel.org/stable/c/721715655c72640567e8742567520c99801148ed",
            "https://git.kernel.org/stable/c/ce9fef54c5ec9912a0c9a47bac3195cc41b14679",
            "https://git.kernel.org/stable/c/f24d8abc2bb8cbf31ec713336e402eafa8f42f60",
            "https://git.kernel.org/stable/c/ff89db14c63a827066446460e39226c0688ef786",
            "https://www.cve.org/CVERecord?id=CVE-2024-27017\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27017\nhttps://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27017-d867@gregkh/T"
        ]
    },
    "CVE-2024-27019": {
        "cve": "CVE-2024-27019",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()\n\nnft_unregister_obj() can concurrent with __nft_obj_type_get(),\nand there is not any protection when iterate over nf_tables_objects\nlist in __nft_obj_type_get(). Therefore, there is potential data-race\nof nf_tables_objects list entry.\n\nUse list_for_each_entry_rcu() to iterate over nf_tables_objects\nlist in __nft_obj_type_get(), and use rcu_read_lock() in the caller\nnft_obj_type_get() to protect the entire type query process.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27019",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/379bf7257bc5f2a1b1ca8514e08a871b7bf6d920",
            "patch_url": "https://git.kernel.org/stable/p/379bf7257bc5f2a1b1ca8514e08a871b7bf6d920",
            "filename": "CVE-2024-27019-379bf7257bc5f2a1b1ca8514e08a871b7bf6d920.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27019/CVE-2024-27019-379bf7257bc5f2a1b1ca8514e08a871b7bf6d920.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/379bf7257bc5f2a1b1ca8514e08a871b7bf6d920",
                "patch_url": "https://git.kernel.org/stable/p/379bf7257bc5f2a1b1ca8514e08a871b7bf6d920",
                "filename": "CVE-2024-27019-379bf7257bc5f2a1b1ca8514e08a871b7bf6d920.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27019/CVE-2024-27019-379bf7257bc5f2a1b1ca8514e08a871b7bf6d920.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4ca946b19caf655a08d5e2266d4d5526025ebb73",
                "patch_url": "https://git.kernel.org/stable/p/4ca946b19caf655a08d5e2266d4d5526025ebb73",
                "filename": "CVE-2024-27019-4ca946b19caf655a08d5e2266d4d5526025ebb73.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27019/CVE-2024-27019-4ca946b19caf655a08d5e2266d4d5526025ebb73.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ad333578f736d56920e090d7db1f8dec891d815e",
                "patch_url": "https://git.kernel.org/stable/p/ad333578f736d56920e090d7db1f8dec891d815e",
                "filename": "CVE-2024-27019-ad333578f736d56920e090d7db1f8dec891d815e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27019/CVE-2024-27019-ad333578f736d56920e090d7db1f8dec891d815e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cade34279c2249eafe528564bd2e203e4ff15f88",
                "patch_url": "https://git.kernel.org/stable/p/cade34279c2249eafe528564bd2e203e4ff15f88",
                "filename": "CVE-2024-27019-cade34279c2249eafe528564bd2e203e4ff15f88.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27019/CVE-2024-27019-cade34279c2249eafe528564bd2e203e4ff15f88.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d78d867dcea69c328db30df665be5be7d0148484",
                "patch_url": "https://git.kernel.org/stable/p/d78d867dcea69c328db30df665be5be7d0148484",
                "filename": "CVE-2024-27019-d78d867dcea69c328db30df665be5be7d0148484.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27019/CVE-2024-27019-d78d867dcea69c328db30df665be5be7d0148484.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/df7c0fb8c2b9f9cac65659332581b19682a71349",
                "patch_url": "https://git.kernel.org/stable/p/df7c0fb8c2b9f9cac65659332581b19682a71349",
                "filename": "CVE-2024-27019-df7c0fb8c2b9f9cac65659332581b19682a71349.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27019/CVE-2024-27019-df7c0fb8c2b9f9cac65659332581b19682a71349.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/379bf7257bc5f2a1b1ca8514e08a871b7bf6d920",
            "https://git.kernel.org/stable/c/4ca946b19caf655a08d5e2266d4d5526025ebb73",
            "https://git.kernel.org/stable/c/ad333578f736d56920e090d7db1f8dec891d815e",
            "https://git.kernel.org/stable/c/cade34279c2249eafe528564bd2e203e4ff15f88",
            "https://git.kernel.org/stable/c/d78d867dcea69c328db30df665be5be7d0148484",
            "https://git.kernel.org/stable/c/df7c0fb8c2b9f9cac65659332581b19682a71349",
            "https://www.cve.org/CVERecord?id=CVE-2024-27019\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27019\nhttps://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27019-e3d4@gregkh/T"
        ]
    },
    "CVE-2024-27020": {
        "cve": "CVE-2024-27020",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()\n\nnft_unregister_expr() can concurrent with __nft_expr_type_get(),\nand there is not any protection when iterate over nf_tables_expressions\nlist in __nft_expr_type_get(). Therefore, there is potential data-race\nof nf_tables_expressions list entry.\n\nUse list_for_each_entry_rcu() to iterate over nf_tables_expressions\nlist in __nft_expr_type_get(), and use rcu_read_lock() in the caller\nnft_expr_type_get() to protect the entire type query process.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27020",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/01f1a678b05ade4b1248019c2dcca773aebbeb7f",
            "patch_url": "https://git.kernel.org/stable/p/01f1a678b05ade4b1248019c2dcca773aebbeb7f",
            "filename": "CVE-2024-27020-01f1a678b05ade4b1248019c2dcca773aebbeb7f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27020/CVE-2024-27020-01f1a678b05ade4b1248019c2dcca773aebbeb7f.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/01f1a678b05ade4b1248019c2dcca773aebbeb7f",
                "patch_url": "https://git.kernel.org/stable/p/01f1a678b05ade4b1248019c2dcca773aebbeb7f",
                "filename": "CVE-2024-27020-01f1a678b05ade4b1248019c2dcca773aebbeb7f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27020/CVE-2024-27020-01f1a678b05ade4b1248019c2dcca773aebbeb7f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0b6de00206adbbfc6373b3ae38d2a6f197987907",
                "patch_url": "https://git.kernel.org/stable/p/0b6de00206adbbfc6373b3ae38d2a6f197987907",
                "filename": "CVE-2024-27020-0b6de00206adbbfc6373b3ae38d2a6f197987907.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27020/CVE-2024-27020-0b6de00206adbbfc6373b3ae38d2a6f197987907.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8d56bad42ac4c43c6c72ddd6a654a2628bf839c5",
                "patch_url": "https://git.kernel.org/stable/p/8d56bad42ac4c43c6c72ddd6a654a2628bf839c5",
                "filename": "CVE-2024-27020-8d56bad42ac4c43c6c72ddd6a654a2628bf839c5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27020/CVE-2024-27020-8d56bad42ac4c43c6c72ddd6a654a2628bf839c5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/934e66e231cff2b18faa2c8aad0b8cec13957e05",
                "patch_url": "https://git.kernel.org/stable/p/934e66e231cff2b18faa2c8aad0b8cec13957e05",
                "filename": "CVE-2024-27020-934e66e231cff2b18faa2c8aad0b8cec13957e05.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27020/CVE-2024-27020-934e66e231cff2b18faa2c8aad0b8cec13957e05.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/939109c0a8e2a006a6cc8209e262d25065f4403a",
                "patch_url": "https://git.kernel.org/stable/p/939109c0a8e2a006a6cc8209e262d25065f4403a",
                "filename": "CVE-2024-27020-939109c0a8e2a006a6cc8209e262d25065f4403a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27020/CVE-2024-27020-939109c0a8e2a006a6cc8209e262d25065f4403a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a9ebf340d123ae12582210407f879d6a5a1bc25b",
                "patch_url": "https://git.kernel.org/stable/p/a9ebf340d123ae12582210407f879d6a5a1bc25b",
                "filename": "CVE-2024-27020-a9ebf340d123ae12582210407f879d6a5a1bc25b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27020/CVE-2024-27020-a9ebf340d123ae12582210407f879d6a5a1bc25b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b38a133d37fa421c8447b383d788c9cc6f5cb34c",
                "patch_url": "https://git.kernel.org/stable/p/b38a133d37fa421c8447b383d788c9cc6f5cb34c",
                "filename": "CVE-2024-27020-b38a133d37fa421c8447b383d788c9cc6f5cb34c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27020/CVE-2024-27020-b38a133d37fa421c8447b383d788c9cc6f5cb34c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f969eb84ce482331a991079ab7a5c4dc3b7f89bf",
                "patch_url": "https://git.kernel.org/stable/p/f969eb84ce482331a991079ab7a5c4dc3b7f89bf",
                "filename": "CVE-2024-27020-f969eb84ce482331a991079ab7a5c4dc3b7f89bf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27020/CVE-2024-27020-f969eb84ce482331a991079ab7a5c4dc3b7f89bf.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/01f1a678b05ade4b1248019c2dcca773aebbeb7f",
            "https://git.kernel.org/stable/c/0b6de00206adbbfc6373b3ae38d2a6f197987907",
            "https://git.kernel.org/stable/c/8d56bad42ac4c43c6c72ddd6a654a2628bf839c5",
            "https://git.kernel.org/stable/c/934e66e231cff2b18faa2c8aad0b8cec13957e05",
            "https://git.kernel.org/stable/c/939109c0a8e2a006a6cc8209e262d25065f4403a",
            "https://git.kernel.org/stable/c/a9ebf340d123ae12582210407f879d6a5a1bc25b",
            "https://git.kernel.org/stable/c/b38a133d37fa421c8447b383d788c9cc6f5cb34c",
            "https://git.kernel.org/stable/c/f969eb84ce482331a991079ab7a5c4dc3b7f89bf",
            "https://www.cve.org/CVERecord?id=CVE-2024-27020\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27020\nhttps://lore.kernel.org/linux-cve-announce/2024050150-CVE-2024-27020-5158@gregkh/T"
        ]
    },
    "CVE-2024-27025": {
        "cve": "CVE-2024-27025",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: null check for nla_nest_start\n\nnla_nest_start() may fail and return NULL. Insert a check and set errno\nbased on other call sites within the same source code.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27025",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/98e60b538e66c90b9a856828c71d4e975ebfa797",
            "patch_url": "https://git.kernel.org/stable/p/98e60b538e66c90b9a856828c71d4e975ebfa797",
            "filename": "CVE-2024-27025-98e60b538e66c90b9a856828c71d4e975ebfa797.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27025/CVE-2024-27025-98e60b538e66c90b9a856828c71d4e975ebfa797.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/31edf4bbe0ba27fd03ac7d87eb2ee3d2a231af6d",
                "patch_url": "https://git.kernel.org/stable/p/31edf4bbe0ba27fd03ac7d87eb2ee3d2a231af6d",
                "filename": "CVE-2024-27025-31edf4bbe0ba27fd03ac7d87eb2ee3d2a231af6d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27025/CVE-2024-27025-31edf4bbe0ba27fd03ac7d87eb2ee3d2a231af6d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/44214d744be32a4769faebba764510888f1eb19e",
                "patch_url": "https://git.kernel.org/stable/p/44214d744be32a4769faebba764510888f1eb19e",
                "filename": "CVE-2024-27025-44214d744be32a4769faebba764510888f1eb19e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27025/CVE-2024-27025-44214d744be32a4769faebba764510888f1eb19e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4af837db0fd3679fabc7b7758397090b0c06dced",
                "patch_url": "https://git.kernel.org/stable/p/4af837db0fd3679fabc7b7758397090b0c06dced",
                "filename": "CVE-2024-27025-4af837db0fd3679fabc7b7758397090b0c06dced.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27025/CVE-2024-27025-4af837db0fd3679fabc7b7758397090b0c06dced.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/96436365e5d80d0106ea785a4f80a58e7c9edff8",
                "patch_url": "https://git.kernel.org/stable/p/96436365e5d80d0106ea785a4f80a58e7c9edff8",
                "filename": "CVE-2024-27025-96436365e5d80d0106ea785a4f80a58e7c9edff8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27025/CVE-2024-27025-96436365e5d80d0106ea785a4f80a58e7c9edff8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/98e60b538e66c90b9a856828c71d4e975ebfa797",
                "patch_url": "https://git.kernel.org/stable/p/98e60b538e66c90b9a856828c71d4e975ebfa797",
                "filename": "CVE-2024-27025-98e60b538e66c90b9a856828c71d4e975ebfa797.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27025/CVE-2024-27025-98e60b538e66c90b9a856828c71d4e975ebfa797.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7f5aed55829f376e4f7e5ea5b80ccdcb023e983",
                "patch_url": "https://git.kernel.org/stable/p/b7f5aed55829f376e4f7e5ea5b80ccdcb023e983",
                "filename": "CVE-2024-27025-b7f5aed55829f376e4f7e5ea5b80ccdcb023e983.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27025/CVE-2024-27025-b7f5aed55829f376e4f7e5ea5b80ccdcb023e983.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ba6a9970ce9e284cbc04099361c58731e308596a",
                "patch_url": "https://git.kernel.org/stable/p/ba6a9970ce9e284cbc04099361c58731e308596a",
                "filename": "CVE-2024-27025-ba6a9970ce9e284cbc04099361c58731e308596a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27025/CVE-2024-27025-ba6a9970ce9e284cbc04099361c58731e308596a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e803040b368d046434fbc8a91945c690332c4fcf",
                "patch_url": "https://git.kernel.org/stable/p/e803040b368d046434fbc8a91945c690332c4fcf",
                "filename": "CVE-2024-27025-e803040b368d046434fbc8a91945c690332c4fcf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27025/CVE-2024-27025-e803040b368d046434fbc8a91945c690332c4fcf.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/31edf4bbe0ba27fd03ac7d87eb2ee3d2a231af6d",
            "https://git.kernel.org/stable/c/44214d744be32a4769faebba764510888f1eb19e",
            "https://git.kernel.org/stable/c/4af837db0fd3679fabc7b7758397090b0c06dced",
            "https://git.kernel.org/stable/c/96436365e5d80d0106ea785a4f80a58e7c9edff8",
            "https://git.kernel.org/stable/c/98e60b538e66c90b9a856828c71d4e975ebfa797",
            "https://git.kernel.org/stable/c/b7f5aed55829f376e4f7e5ea5b80ccdcb023e983",
            "https://git.kernel.org/stable/c/ba6a9970ce9e284cbc04099361c58731e308596a",
            "https://git.kernel.org/stable/c/e803040b368d046434fbc8a91945c690332c4fcf",
            "https://www.cve.org/CVERecord?id=CVE-2024-27025\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27025\nhttps://lore.kernel.org/linux-cve-announce/2024050107-CVE-2024-27025-babd@gregkh/T"
        ]
    },
    "CVE-2024-27042": {
        "cve": "CVE-2024-27042",
        "cvss_v2": null,
        "cvss_v3": "5.5",
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27042",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/8db10cee51e3e11a6658742465edc21986cf1e8d",
            "patch_url": "https://git.kernel.org/stable/p/8db10cee51e3e11a6658742465edc21986cf1e8d",
            "filename": "CVE-2024-27042-8db10cee51e3e11a6658742465edc21986cf1e8d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27042/CVE-2024-27042-8db10cee51e3e11a6658742465edc21986cf1e8d.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/8db10cee51e3e11a6658742465edc21986cf1e8d",
                "patch_url": "https://git.kernel.org/stable/p/8db10cee51e3e11a6658742465edc21986cf1e8d",
                "filename": "CVE-2024-27042-8db10cee51e3e11a6658742465edc21986cf1e8d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27042/CVE-2024-27042-8db10cee51e3e11a6658742465edc21986cf1e8d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8f3e68c6a3fff53c2240762a47a0045d89371775",
                "patch_url": "https://git.kernel.org/stable/p/8f3e68c6a3fff53c2240762a47a0045d89371775",
                "filename": "CVE-2024-27042-8f3e68c6a3fff53c2240762a47a0045d89371775.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27042/CVE-2024-27042-8f3e68c6a3fff53c2240762a47a0045d89371775.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b33d4af102b9c1f7a83d3f0ad3cab7d2bab8f058",
                "patch_url": "https://git.kernel.org/stable/p/b33d4af102b9c1f7a83d3f0ad3cab7d2bab8f058",
                "filename": "CVE-2024-27042-b33d4af102b9c1f7a83d3f0ad3cab7d2bab8f058.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27042/CVE-2024-27042-b33d4af102b9c1f7a83d3f0ad3cab7d2bab8f058.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cdb637d339572398821204a1142d8d615668f1e9",
                "patch_url": "https://git.kernel.org/stable/p/cdb637d339572398821204a1142d8d615668f1e9",
                "filename": "CVE-2024-27042-cdb637d339572398821204a1142d8d615668f1e9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27042/CVE-2024-27042-cdb637d339572398821204a1142d8d615668f1e9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/8db10cee51e3e11a6658742465edc21986cf1e8d",
            "https://git.kernel.org/stable/c/8f3e68c6a3fff53c2240762a47a0045d89371775",
            "https://git.kernel.org/stable/c/b33d4af102b9c1f7a83d3f0ad3cab7d2bab8f058",
            "https://git.kernel.org/stable/c/cdb637d339572398821204a1142d8d615668f1e9",
            "https://www.cve.org/CVERecord?id=CVE-2024-27042\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27042\nhttps://lore.kernel.org/linux-cve-announce/2024050113-CVE-2024-27042-e812@gregkh/T"
        ]
    },
    "CVE-2024-27043": {
        "cve": "CVE-2024-27043",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: edia: dvbdev: fix a use-after-free\n\nIn dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed\nin several error-handling paths. However, *pdvbdev is not set to NULL\nafter dvbdev's deallocation, causing use-after-frees in many places,\nfor example, in the following call chain:\n\nbudget_register\n  |-> dvb_dmxdev_init\n        |-> dvb_register_device\n  |-> dvb_dmxdev_release\n        |-> dvb_unregister_device\n              |-> dvb_remove_device\n                    |-> dvb_device_put\n                          |-> kref_put\n\nWhen calling dvb_unregister_device, dmxdev->dvbdev (i.e. *pdvbdev in\ndvb_register_device) could point to memory that had been freed in\ndvb_register_device. Thereafter, this pointer is transferred to\nkref_put and triggering a use-after-free.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27043",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/096237039d00c839f3e3a5fe6d001bf0db45b644",
            "patch_url": "https://git.kernel.org/stable/p/096237039d00c839f3e3a5fe6d001bf0db45b644",
            "filename": "CVE-2024-27043-096237039d00c839f3e3a5fe6d001bf0db45b644.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27043/CVE-2024-27043-096237039d00c839f3e3a5fe6d001bf0db45b644.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/096237039d00c839f3e3a5fe6d001bf0db45b644",
                "patch_url": "https://git.kernel.org/stable/p/096237039d00c839f3e3a5fe6d001bf0db45b644",
                "filename": "CVE-2024-27043-096237039d00c839f3e3a5fe6d001bf0db45b644.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27043/CVE-2024-27043-096237039d00c839f3e3a5fe6d001bf0db45b644.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0d3fe80b6d175c220b3e252efc6c6777e700e98e",
                "patch_url": "https://git.kernel.org/stable/p/0d3fe80b6d175c220b3e252efc6c6777e700e98e",
                "filename": "CVE-2024-27043-0d3fe80b6d175c220b3e252efc6c6777e700e98e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27043/CVE-2024-27043-0d3fe80b6d175c220b3e252efc6c6777e700e98e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/35674111a043b0482a9bc69da8850a83f465b07d",
                "patch_url": "https://git.kernel.org/stable/p/35674111a043b0482a9bc69da8850a83f465b07d",
                "filename": "CVE-2024-27043-35674111a043b0482a9bc69da8850a83f465b07d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27043/CVE-2024-27043-35674111a043b0482a9bc69da8850a83f465b07d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/437a111f79a2f5b2a5f21e27fdec6f40c8768712",
                "patch_url": "https://git.kernel.org/stable/p/437a111f79a2f5b2a5f21e27fdec6f40c8768712",
                "filename": "CVE-2024-27043-437a111f79a2f5b2a5f21e27fdec6f40c8768712.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27043/CVE-2024-27043-437a111f79a2f5b2a5f21e27fdec6f40c8768712.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/779e8db7efb22316c8581d6c229636d2f5694a62",
                "patch_url": "https://git.kernel.org/stable/p/779e8db7efb22316c8581d6c229636d2f5694a62",
                "filename": "CVE-2024-27043-779e8db7efb22316c8581d6c229636d2f5694a62.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27043/CVE-2024-27043-779e8db7efb22316c8581d6c229636d2f5694a62.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8c64f4cdf4e6cc5682c52523713af8c39c94e6d5",
                "patch_url": "https://git.kernel.org/stable/p/8c64f4cdf4e6cc5682c52523713af8c39c94e6d5",
                "filename": "CVE-2024-27043-8c64f4cdf4e6cc5682c52523713af8c39c94e6d5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27043/CVE-2024-27043-8c64f4cdf4e6cc5682c52523713af8c39c94e6d5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7586e902128e4fb7bfbb661cb52e4215a65637b",
                "patch_url": "https://git.kernel.org/stable/p/b7586e902128e4fb7bfbb661cb52e4215a65637b",
                "filename": "CVE-2024-27043-b7586e902128e4fb7bfbb661cb52e4215a65637b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27043/CVE-2024-27043-b7586e902128e4fb7bfbb661cb52e4215a65637b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d0f5c28333822f9baa5280d813124920720fd856",
                "patch_url": "https://git.kernel.org/stable/p/d0f5c28333822f9baa5280d813124920720fd856",
                "filename": "CVE-2024-27043-d0f5c28333822f9baa5280d813124920720fd856.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27043/CVE-2024-27043-d0f5c28333822f9baa5280d813124920720fd856.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f20c3270f3ed5aa6919a87e4de9bf6c05fb57086",
                "patch_url": "https://git.kernel.org/stable/p/f20c3270f3ed5aa6919a87e4de9bf6c05fb57086",
                "filename": "CVE-2024-27043-f20c3270f3ed5aa6919a87e4de9bf6c05fb57086.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27043/CVE-2024-27043-f20c3270f3ed5aa6919a87e4de9bf6c05fb57086.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/096237039d00c839f3e3a5fe6d001bf0db45b644",
            "https://git.kernel.org/stable/c/0d3fe80b6d175c220b3e252efc6c6777e700e98e",
            "https://git.kernel.org/stable/c/35674111a043b0482a9bc69da8850a83f465b07d",
            "https://git.kernel.org/stable/c/437a111f79a2f5b2a5f21e27fdec6f40c8768712",
            "https://git.kernel.org/stable/c/779e8db7efb22316c8581d6c229636d2f5694a62",
            "https://git.kernel.org/stable/c/8c64f4cdf4e6cc5682c52523713af8c39c94e6d5",
            "https://git.kernel.org/stable/c/b7586e902128e4fb7bfbb661cb52e4215a65637b",
            "https://git.kernel.org/stable/c/d0f5c28333822f9baa5280d813124920720fd856",
            "https://git.kernel.org/stable/c/f20c3270f3ed5aa6919a87e4de9bf6c05fb57086",
            "https://www.cve.org/CVERecord?id=CVE-2024-27043\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27043\nhttps://lore.kernel.org/linux-cve-announce/2024050113-CVE-2024-27043-f2fb@gregkh/T"
        ]
    },
    "CVE-2024-27048": {
        "cve": "CVE-2024-27048",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcm80211: handle pmk_op allocation failure\n\nThe kzalloc() in brcmf_pmksa_v3_op() will return null if the\nphysical memory has run out. As a result, if we dereference\nthe null value, the null pointer dereference bug will happen.\n\nReturn -ENOMEM from brcmf_pmksa_v3_op() if kzalloc() fails\nfor pmk_op.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27048",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6138a82f3bccfc67ed7ac059493579fc326c02e5",
            "patch_url": "https://git.kernel.org/stable/p/6138a82f3bccfc67ed7ac059493579fc326c02e5",
            "filename": "CVE-2024-27048-6138a82f3bccfc67ed7ac059493579fc326c02e5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27048/CVE-2024-27048-6138a82f3bccfc67ed7ac059493579fc326c02e5.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/6138a82f3bccfc67ed7ac059493579fc326c02e5",
                "patch_url": "https://git.kernel.org/stable/p/6138a82f3bccfc67ed7ac059493579fc326c02e5",
                "filename": "CVE-2024-27048-6138a82f3bccfc67ed7ac059493579fc326c02e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27048/CVE-2024-27048-6138a82f3bccfc67ed7ac059493579fc326c02e5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9975908315c13bae2f2ed5ba92870fa935180b0e",
                "patch_url": "https://git.kernel.org/stable/p/9975908315c13bae2f2ed5ba92870fa935180b0e",
                "filename": "CVE-2024-27048-9975908315c13bae2f2ed5ba92870fa935180b0e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27048/CVE-2024-27048-9975908315c13bae2f2ed5ba92870fa935180b0e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b4152222e04cb8afeeca239c90e3fcaf4c553b42",
                "patch_url": "https://git.kernel.org/stable/p/b4152222e04cb8afeeca239c90e3fcaf4c553b42",
                "filename": "CVE-2024-27048-b4152222e04cb8afeeca239c90e3fcaf4c553b42.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27048/CVE-2024-27048-b4152222e04cb8afeeca239c90e3fcaf4c553b42.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/df62e22c2e27420e8990a4f09e30d7bf56c2036f",
                "patch_url": "https://git.kernel.org/stable/p/df62e22c2e27420e8990a4f09e30d7bf56c2036f",
                "filename": "CVE-2024-27048-df62e22c2e27420e8990a4f09e30d7bf56c2036f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27048/CVE-2024-27048-df62e22c2e27420e8990a4f09e30d7bf56c2036f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/6138a82f3bccfc67ed7ac059493579fc326c02e5",
            "https://git.kernel.org/stable/c/9975908315c13bae2f2ed5ba92870fa935180b0e",
            "https://git.kernel.org/stable/c/b4152222e04cb8afeeca239c90e3fcaf4c553b42",
            "https://git.kernel.org/stable/c/df62e22c2e27420e8990a4f09e30d7bf56c2036f",
            "https://www.cve.org/CVERecord?id=CVE-2024-27048\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27048\nhttps://lore.kernel.org/linux-cve-announce/2024050114-CVE-2024-27048-016f@gregkh/T"
        ]
    },
    "CVE-2024-27052": {
        "cve": "CVE-2024-27052",
        "cvss_v2": null,
        "cvss_v3": 7.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work\n\nThe workqueue might still be running, when the driver is stopped. To\navoid a use-after-free, call cancel_work_sync() in rtl8xxxu_stop().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27052",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3518cea837de4d106efa84ddac18a07b6de1384e",
            "patch_url": "https://git.kernel.org/stable/p/3518cea837de4d106efa84ddac18a07b6de1384e",
            "filename": "CVE-2024-27052-3518cea837de4d106efa84ddac18a07b6de1384e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27052/CVE-2024-27052-3518cea837de4d106efa84ddac18a07b6de1384e.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1213acb478a7181cd73eeaf00db430f1e45b1361",
                "patch_url": "https://git.kernel.org/stable/p/1213acb478a7181cd73eeaf00db430f1e45b1361",
                "filename": "CVE-2024-27052-1213acb478a7181cd73eeaf00db430f1e45b1361.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27052/CVE-2024-27052-1213acb478a7181cd73eeaf00db430f1e45b1361.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/156012667b85ca7305cb363790d3ae8519a6f41e",
                "patch_url": "https://git.kernel.org/stable/p/156012667b85ca7305cb363790d3ae8519a6f41e",
                "filename": "CVE-2024-27052-156012667b85ca7305cb363790d3ae8519a6f41e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27052/CVE-2024-27052-156012667b85ca7305cb363790d3ae8519a6f41e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3518cea837de4d106efa84ddac18a07b6de1384e",
                "patch_url": "https://git.kernel.org/stable/p/3518cea837de4d106efa84ddac18a07b6de1384e",
                "filename": "CVE-2024-27052-3518cea837de4d106efa84ddac18a07b6de1384e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27052/CVE-2024-27052-3518cea837de4d106efa84ddac18a07b6de1384e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/58fe3bbddfec10c6b216096d8c0e517cd8463e3a",
                "patch_url": "https://git.kernel.org/stable/p/58fe3bbddfec10c6b216096d8c0e517cd8463e3a",
                "filename": "CVE-2024-27052-58fe3bbddfec10c6b216096d8c0e517cd8463e3a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27052/CVE-2024-27052-58fe3bbddfec10c6b216096d8c0e517cd8463e3a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7059cdb69f8e1a2707dd1e2f363348b507ed7707",
                "patch_url": "https://git.kernel.org/stable/p/7059cdb69f8e1a2707dd1e2f363348b507ed7707",
                "filename": "CVE-2024-27052-7059cdb69f8e1a2707dd1e2f363348b507ed7707.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27052/CVE-2024-27052-7059cdb69f8e1a2707dd1e2f363348b507ed7707.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ac512507ac89c01ed6cd4ca53032f52cdb23ea59",
                "patch_url": "https://git.kernel.org/stable/p/ac512507ac89c01ed6cd4ca53032f52cdb23ea59",
                "filename": "CVE-2024-27052-ac512507ac89c01ed6cd4ca53032f52cdb23ea59.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27052/CVE-2024-27052-ac512507ac89c01ed6cd4ca53032f52cdb23ea59.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dddedfa3b29a63c2ca4336663806a6128b8545b4",
                "patch_url": "https://git.kernel.org/stable/p/dddedfa3b29a63c2ca4336663806a6128b8545b4",
                "filename": "CVE-2024-27052-dddedfa3b29a63c2ca4336663806a6128b8545b4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27052/CVE-2024-27052-dddedfa3b29a63c2ca4336663806a6128b8545b4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1213acb478a7181cd73eeaf00db430f1e45b1361",
            "https://git.kernel.org/stable/c/156012667b85ca7305cb363790d3ae8519a6f41e",
            "https://git.kernel.org/stable/c/3518cea837de4d106efa84ddac18a07b6de1384e",
            "https://git.kernel.org/stable/c/58fe3bbddfec10c6b216096d8c0e517cd8463e3a",
            "https://git.kernel.org/stable/c/7059cdb69f8e1a2707dd1e2f363348b507ed7707",
            "https://git.kernel.org/stable/c/ac512507ac89c01ed6cd4ca53032f52cdb23ea59",
            "https://git.kernel.org/stable/c/dddedfa3b29a63c2ca4336663806a6128b8545b4",
            "https://www.cve.org/CVERecord?id=CVE-2024-27052\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27052\nhttps://lore.kernel.org/linux-cve-announce/2024050115-CVE-2024-27052-fb6d@gregkh/T"
        ]
    },
    "CVE-2024-27056": {
        "cve": "CVE-2024-27056",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: ensure offloading TID queue exists\n\nThe resume code path assumes that the TX queue for the offloading TID\nhas been configured. At resume time it then tries to sync the write\npointer as it may have been updated by the firmware.\n\nIn the unusual event that no packets have been send on TID 0, the queue\nwill not have been allocated and this causes a crash. Fix this by\nensuring the queue exist at suspend time.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27056",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4903303f25f48b5a1e34e6324c7fae9ccd6b959a",
            "patch_url": "https://git.kernel.org/stable/p/4903303f25f48b5a1e34e6324c7fae9ccd6b959a",
            "filename": "CVE-2024-27056-4903303f25f48b5a1e34e6324c7fae9ccd6b959a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27056/CVE-2024-27056-4903303f25f48b5a1e34e6324c7fae9ccd6b959a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/35afffaddbe8d310dc61659da0b1a337b0d0addc",
                "patch_url": "https://git.kernel.org/stable/p/35afffaddbe8d310dc61659da0b1a337b0d0addc",
                "filename": "CVE-2024-27056-35afffaddbe8d310dc61659da0b1a337b0d0addc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27056/CVE-2024-27056-35afffaddbe8d310dc61659da0b1a337b0d0addc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4903303f25f48b5a1e34e6324c7fae9ccd6b959a",
                "patch_url": "https://git.kernel.org/stable/p/4903303f25f48b5a1e34e6324c7fae9ccd6b959a",
                "filename": "CVE-2024-27056-4903303f25f48b5a1e34e6324c7fae9ccd6b959a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27056/CVE-2024-27056-4903303f25f48b5a1e34e6324c7fae9ccd6b959a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/78f65fbf421a61894c14a1b91fe2fb4437b3fe5f",
                "patch_url": "https://git.kernel.org/stable/p/78f65fbf421a61894c14a1b91fe2fb4437b3fe5f",
                "filename": "CVE-2024-27056-78f65fbf421a61894c14a1b91fe2fb4437b3fe5f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27056/CVE-2024-27056-78f65fbf421a61894c14a1b91fe2fb4437b3fe5f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ed35a509390ef4011ea2226da5dd6f62b73873b5",
                "patch_url": "https://git.kernel.org/stable/p/ed35a509390ef4011ea2226da5dd6f62b73873b5",
                "filename": "CVE-2024-27056-ed35a509390ef4011ea2226da5dd6f62b73873b5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27056/CVE-2024-27056-ed35a509390ef4011ea2226da5dd6f62b73873b5.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/35afffaddbe8d310dc61659da0b1a337b0d0addc",
            "https://git.kernel.org/stable/c/4903303f25f48b5a1e34e6324c7fae9ccd6b959a",
            "https://git.kernel.org/stable/c/78f65fbf421a61894c14a1b91fe2fb4437b3fe5f",
            "https://git.kernel.org/stable/c/ed35a509390ef4011ea2226da5dd6f62b73873b5",
            "https://www.cve.org/CVERecord?id=CVE-2024-27056\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27056\nhttps://lore.kernel.org/linux-cve-announce/2024050115-CVE-2024-27056-98c0@gregkh/T"
        ]
    },
    "CVE-2024-27059": {
        "cve": "CVE-2024-27059",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: usb-storage: Prevent divide-by-0 error in isd200_ata_command\n\nThe isd200 sub-driver in usb-storage uses the HEADS and SECTORS values\nin the ATA ID information to calculate cylinder and head values when\ncreating a CDB for READ or WRITE commands.  The calculation involves\ndivision and modulus operations, which will cause a crash if either of\nthese values is 0.  While this never happens with a genuine device, it\ncould happen with a flawed or subversive emulation, as reported by the\nsyzbot fuzzer.\n\nProtect against this possibility by refusing to bind to the device if\neither the ATA_ID_HEADS or ATA_ID_SECTORS value in the device's ID\ninformation is 0.  This requires isd200_Initialization() to return a\nnegative error code when initialization fails; currently it always\nreturns 0 (even when there is an error).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27059",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9968c701cba7eda42e5f0052b040349d6222ae34",
            "patch_url": "https://git.kernel.org/stable/p/9968c701cba7eda42e5f0052b040349d6222ae34",
            "filename": "CVE-2024-27059-9968c701cba7eda42e5f0052b040349d6222ae34.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27059/CVE-2024-27059-9968c701cba7eda42e5f0052b040349d6222ae34.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/014bcf41d946b36a8f0b8e9b5d9529efbb822f49",
                "patch_url": "https://git.kernel.org/stable/p/014bcf41d946b36a8f0b8e9b5d9529efbb822f49",
                "filename": "CVE-2024-27059-014bcf41d946b36a8f0b8e9b5d9529efbb822f49.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27059/CVE-2024-27059-014bcf41d946b36a8f0b8e9b5d9529efbb822f49.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/284fb1003d5da111019b9e0bf99b084fd71ac133",
                "patch_url": "https://git.kernel.org/stable/p/284fb1003d5da111019b9e0bf99b084fd71ac133",
                "filename": "CVE-2024-27059-284fb1003d5da111019b9e0bf99b084fd71ac133.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27059/CVE-2024-27059-284fb1003d5da111019b9e0bf99b084fd71ac133.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3a67d4ab9e730361d183086dfb0ddd8c61f01636",
                "patch_url": "https://git.kernel.org/stable/p/3a67d4ab9e730361d183086dfb0ddd8c61f01636",
                "filename": "CVE-2024-27059-3a67d4ab9e730361d183086dfb0ddd8c61f01636.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27059/CVE-2024-27059-3a67d4ab9e730361d183086dfb0ddd8c61f01636.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6c1f36d92c0a8799569055012665d2bb066fb964",
                "patch_url": "https://git.kernel.org/stable/p/6c1f36d92c0a8799569055012665d2bb066fb964",
                "filename": "CVE-2024-27059-6c1f36d92c0a8799569055012665d2bb066fb964.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27059/CVE-2024-27059-6c1f36d92c0a8799569055012665d2bb066fb964.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/871fd7b10b56d280990b7e754f43d888382ca325",
                "patch_url": "https://git.kernel.org/stable/p/871fd7b10b56d280990b7e754f43d888382ca325",
                "filename": "CVE-2024-27059-871fd7b10b56d280990b7e754f43d888382ca325.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27059/CVE-2024-27059-871fd7b10b56d280990b7e754f43d888382ca325.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9968c701cba7eda42e5f0052b040349d6222ae34",
                "patch_url": "https://git.kernel.org/stable/p/9968c701cba7eda42e5f0052b040349d6222ae34",
                "filename": "CVE-2024-27059-9968c701cba7eda42e5f0052b040349d6222ae34.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27059/CVE-2024-27059-9968c701cba7eda42e5f0052b040349d6222ae34.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eb7b01ca778170654e1c76950024270ba74b121f",
                "patch_url": "https://git.kernel.org/stable/p/eb7b01ca778170654e1c76950024270ba74b121f",
                "filename": "CVE-2024-27059-eb7b01ca778170654e1c76950024270ba74b121f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27059/CVE-2024-27059-eb7b01ca778170654e1c76950024270ba74b121f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f42ba916689f5c7b1642092266d2f53cf527aaaa",
                "patch_url": "https://git.kernel.org/stable/p/f42ba916689f5c7b1642092266d2f53cf527aaaa",
                "filename": "CVE-2024-27059-f42ba916689f5c7b1642092266d2f53cf527aaaa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27059/CVE-2024-27059-f42ba916689f5c7b1642092266d2f53cf527aaaa.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/014bcf41d946b36a8f0b8e9b5d9529efbb822f49",
            "https://git.kernel.org/stable/c/284fb1003d5da111019b9e0bf99b084fd71ac133",
            "https://git.kernel.org/stable/c/3a67d4ab9e730361d183086dfb0ddd8c61f01636",
            "https://git.kernel.org/stable/c/6c1f36d92c0a8799569055012665d2bb066fb964",
            "https://git.kernel.org/stable/c/871fd7b10b56d280990b7e754f43d888382ca325",
            "https://git.kernel.org/stable/c/9968c701cba7eda42e5f0052b040349d6222ae34",
            "https://git.kernel.org/stable/c/eb7b01ca778170654e1c76950024270ba74b121f",
            "https://git.kernel.org/stable/c/f42ba916689f5c7b1642092266d2f53cf527aaaa",
            "https://www.cve.org/CVERecord?id=CVE-2024-27059\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27059\nhttps://lore.kernel.org/linux-cve-announce/2024050130-CVE-2024-27059-baaa@gregkh/T"
        ]
    },
    "CVE-2024-27062": {
        "cve": "CVE-2024-27062",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnouveau: lock the client object tree.\n\nIt appears the client object tree has no locking unless I've missed\nsomething else. Fix races around adding/removing client objects,\nmostly vram bar mappings.\n\n 4562.099306] general protection fault, probably for non-canonical address 0x6677ed422bceb80c: 0000 [#1] PREEMPT SMP PTI\n[ 4562.099314] CPU: 2 PID: 23171 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27\n[ 4562.099324] Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021\n[ 4562.099330] RIP: 0010:nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099503] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 48 89 f8 48 85 f6 74 39 48 8b 87 a0 00 00 00 48 85 c0 74 12 <48> 8b 48 f8 48 39 ce 73 15 48 8b 40 10 48 85 c0 75 ee 48 c7 c0 fe\n[ 4562.099506] RSP: 0000:ffffa94cc420bbf8 EFLAGS: 00010206\n[ 4562.099512] RAX: 6677ed422bceb814 RBX: ffff98108791f400 RCX: ffff9810f26b8f58\n[ 4562.099517] RDX: 0000000000000000 RSI: ffff9810f26b9158 RDI: ffff98108791f400\n[ 4562.099519] RBP: ffff9810f26b9158 R08: 0000000000000000 R09: 0000000000000000\n[ 4562.099521] R10: ffffa94cc420bc48 R11: 0000000000000001 R12: ffff9810f02a7cc0\n[ 4562.099526] R13: 0000000000000000 R14: 00000000000000ff R15: 0000000000000007\n[ 4562.099528] FS:  00007f629c5017c0(0000) GS:ffff98142c700000(0000) knlGS:0000000000000000\n[ 4562.099534] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 4562.099536] CR2: 00007f629a882000 CR3: 000000017019e004 CR4: 00000000003706f0\n[ 4562.099541] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 4562.099542] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 4562.099544] Call Trace:\n[ 4562.099555]  <TASK>\n[ 4562.099573]  ? die_addr+0x36/0x90\n[ 4562.099583]  ? exc_general_protection+0x246/0x4a0\n[ 4562.099593]  ? asm_exc_general_protection+0x26/0x30\n[ 4562.099600]  ? nvkm_object_search+0x1d/0x70 [nouveau]\n[ 4562.099730]  nvkm_ioctl+0xa1/0x250 [nouveau]\n[ 4562.099861]  nvif_object_map_handle+0xc8/0x180 [nouveau]\n[ 4562.099986]  nouveau_ttm_io_mem_reserve+0x122/0x270 [nouveau]\n[ 4562.100156]  ? dma_resv_test_signaled+0x26/0xb0\n[ 4562.100163]  ttm_bo_vm_fault_reserved+0x97/0x3c0 [ttm]\n[ 4562.100182]  ? __mutex_unlock_slowpath+0x2a/0x270\n[ 4562.100189]  nouveau_ttm_fault+0x69/0xb0 [nouveau]\n[ 4562.100356]  __do_fault+0x32/0x150\n[ 4562.100362]  do_fault+0x7c/0x560\n[ 4562.100369]  __handle_mm_fault+0x800/0xc10\n[ 4562.100382]  handle_mm_fault+0x17c/0x3e0\n[ 4562.100388]  do_user_addr_fault+0x208/0x860\n[ 4562.100395]  exc_page_fault+0x7f/0x200\n[ 4562.100402]  asm_exc_page_fault+0x26/0x30\n[ 4562.100412] RIP: 0033:0x9b9870\n[ 4562.100419] Code: 85 a8 f7 ff ff 8b 8d 80 f7 ff ff 89 08 e9 18 f2 ff ff 0f 1f 84 00 00 00 00 00 44 89 32 e9 90 fa ff ff 0f 1f 84 00 00 00 00 00 <44> 89 32 e9 f8 f1 ff ff 0f 1f 84 00 00 00 00 00 66 44 89 32 e9 e7\n[ 4562.100422] RSP: 002b:00007fff9ba2dc70 EFLAGS: 00010246\n[ 4562.100426] RAX: 0000000000000004 RBX: 000000000dd65e10 RCX: 000000fff0000000\n[ 4562.100428] RDX: 00007f629a882000 RSI: 00007f629a882000 RDI: 0000000000000066\n[ 4562.100432] RBP: 00007fff9ba2e570 R08: 0000000000000000 R09: 0000000123ddf000\n[ 4562.100434] R10: 0000000000000001 R11: 0000000000000246 R12: 000000007fffffff\n[ 4562.100436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[ 4562.100446]  </TASK>\n[ 4562.100448] Modules linked in: nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink cmac bnep sunrpc iwlmvm intel_rapl_msr intel_rapl_common snd_sof_pci_intel_cnl x86_pkg_temp_thermal intel_powerclamp snd_sof_intel_hda_common mac80211 coretemp snd_soc_acpi_intel_match kvm_intel snd_soc_acpi snd_soc_hdac_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof_intel_hda_mlink \n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27062",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6887314f5356389fc219b8152e951ac084a10ef7",
            "patch_url": "https://git.kernel.org/stable/p/6887314f5356389fc219b8152e951ac084a10ef7",
            "filename": "CVE-2024-27062-6887314f5356389fc219b8152e951ac084a10ef7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27062/CVE-2024-27062-6887314f5356389fc219b8152e951ac084a10ef7.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/6887314f5356389fc219b8152e951ac084a10ef7",
                "patch_url": "https://git.kernel.org/stable/p/6887314f5356389fc219b8152e951ac084a10ef7",
                "filename": "CVE-2024-27062-6887314f5356389fc219b8152e951ac084a10ef7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27062/CVE-2024-27062-6887314f5356389fc219b8152e951ac084a10ef7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/96c8751844171af4b3898fee3857ee180586f589",
                "patch_url": "https://git.kernel.org/stable/p/96c8751844171af4b3898fee3857ee180586f589",
                "filename": "CVE-2024-27062-96c8751844171af4b3898fee3857ee180586f589.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27062/CVE-2024-27062-96c8751844171af4b3898fee3857ee180586f589.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7cc4ff787a572edf2c55caeffaa88cd801eb135",
                "patch_url": "https://git.kernel.org/stable/p/b7cc4ff787a572edf2c55caeffaa88cd801eb135",
                "filename": "CVE-2024-27062-b7cc4ff787a572edf2c55caeffaa88cd801eb135.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27062/CVE-2024-27062-b7cc4ff787a572edf2c55caeffaa88cd801eb135.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/6887314f5356389fc219b8152e951ac084a10ef7",
            "https://git.kernel.org/stable/c/96c8751844171af4b3898fee3857ee180586f589",
            "https://git.kernel.org/stable/c/b7cc4ff787a572edf2c55caeffaa88cd801eb135",
            "https://www.cve.org/CVERecord?id=CVE-2024-27062\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27062\nhttps://lore.kernel.org/linux-cve-announce/2024050130-CVE-2024-27062-3291@gregkh/T"
        ]
    },
    "CVE-2024-27065": {
        "cve": "CVE-2024-27065",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: do not compare internal table flags on updates\n\nRestore skipping transaction if table update does not modify flags.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27065",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2531f907d3e40a6173090f10670ae76d117ab27b",
            "patch_url": "https://git.kernel.org/stable/p/2531f907d3e40a6173090f10670ae76d117ab27b",
            "filename": "CVE-2024-27065-2531f907d3e40a6173090f10670ae76d117ab27b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27065/CVE-2024-27065-2531f907d3e40a6173090f10670ae76d117ab27b.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2531f907d3e40a6173090f10670ae76d117ab27b",
                "patch_url": "https://git.kernel.org/stable/p/2531f907d3e40a6173090f10670ae76d117ab27b",
                "filename": "CVE-2024-27065-2531f907d3e40a6173090f10670ae76d117ab27b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27065/CVE-2024-27065-2531f907d3e40a6173090f10670ae76d117ab27b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3443e57654f90c9a843ab6a6040c10709fd033aa",
                "patch_url": "https://git.kernel.org/stable/p/3443e57654f90c9a843ab6a6040c10709fd033aa",
                "filename": "CVE-2024-27065-3443e57654f90c9a843ab6a6040c10709fd033aa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27065/CVE-2024-27065-3443e57654f90c9a843ab6a6040c10709fd033aa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4a0e7f2decbf9bd72461226f1f5f7dcc4b08f139",
                "patch_url": "https://git.kernel.org/stable/p/4a0e7f2decbf9bd72461226f1f5f7dcc4b08f139",
                "filename": "CVE-2024-27065-4a0e7f2decbf9bd72461226f1f5f7dcc4b08f139.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27065/CVE-2024-27065-4a0e7f2decbf9bd72461226f1f5f7dcc4b08f139.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4d37f12707ee965d338028732575f0b85f6d9e4f",
                "patch_url": "https://git.kernel.org/stable/p/4d37f12707ee965d338028732575f0b85f6d9e4f",
                "filename": "CVE-2024-27065-4d37f12707ee965d338028732575f0b85f6d9e4f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27065/CVE-2024-27065-4d37f12707ee965d338028732575f0b85f6d9e4f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/640dbf688ba955e83e03de84fbdda8e570b7cce4",
                "patch_url": "https://git.kernel.org/stable/p/640dbf688ba955e83e03de84fbdda8e570b7cce4",
                "filename": "CVE-2024-27065-640dbf688ba955e83e03de84fbdda8e570b7cce4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27065/CVE-2024-27065-640dbf688ba955e83e03de84fbdda8e570b7cce4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/845083249d6a392f3a88804e1669bdb936ee129f",
                "patch_url": "https://git.kernel.org/stable/p/845083249d6a392f3a88804e1669bdb936ee129f",
                "filename": "CVE-2024-27065-845083249d6a392f3a88804e1669bdb936ee129f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27065/CVE-2024-27065-845083249d6a392f3a88804e1669bdb936ee129f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9683cb6c2c6c0f45537bf0b8868b5d38fcb63fc7",
                "patch_url": "https://git.kernel.org/stable/p/9683cb6c2c6c0f45537bf0b8868b5d38fcb63fc7",
                "filename": "CVE-2024-27065-9683cb6c2c6c0f45537bf0b8868b5d38fcb63fc7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27065/CVE-2024-27065-9683cb6c2c6c0f45537bf0b8868b5d38fcb63fc7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/df257c435e51651c43b86326d112ddadda76350e",
                "patch_url": "https://git.kernel.org/stable/p/df257c435e51651c43b86326d112ddadda76350e",
                "filename": "CVE-2024-27065-df257c435e51651c43b86326d112ddadda76350e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27065/CVE-2024-27065-df257c435e51651c43b86326d112ddadda76350e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fcf32a5bfcb8a57ac0ce717fcfa4d688c91f1005",
                "patch_url": "https://git.kernel.org/stable/p/fcf32a5bfcb8a57ac0ce717fcfa4d688c91f1005",
                "filename": "CVE-2024-27065-fcf32a5bfcb8a57ac0ce717fcfa4d688c91f1005.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27065/CVE-2024-27065-fcf32a5bfcb8a57ac0ce717fcfa4d688c91f1005.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2531f907d3e40a6173090f10670ae76d117ab27b",
            "https://git.kernel.org/stable/c/3443e57654f90c9a843ab6a6040c10709fd033aa",
            "https://git.kernel.org/stable/c/4a0e7f2decbf9bd72461226f1f5f7dcc4b08f139",
            "https://git.kernel.org/stable/c/4d37f12707ee965d338028732575f0b85f6d9e4f",
            "https://git.kernel.org/stable/c/640dbf688ba955e83e03de84fbdda8e570b7cce4",
            "https://git.kernel.org/stable/c/845083249d6a392f3a88804e1669bdb936ee129f",
            "https://git.kernel.org/stable/c/9683cb6c2c6c0f45537bf0b8868b5d38fcb63fc7",
            "https://git.kernel.org/stable/c/df257c435e51651c43b86326d112ddadda76350e",
            "https://git.kernel.org/stable/c/fcf32a5bfcb8a57ac0ce717fcfa4d688c91f1005",
            "https://www.cve.org/CVERecord?id=CVE-2024-27065\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27065\nhttps://lore.kernel.org/linux-cve-announce/2024050132-CVE-2024-27065-8c9d@gregkh/T"
        ]
    },
    "CVE-2024-27388": {
        "cve": "CVE-2024-27388",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: fix some memleaks in gssx_dec_option_array\n\nThe creds and oa->data need to be freed in the error-handling paths after\ntheir allocation. So this patch add these deallocations in the\ncorresponding paths.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27388",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/b97c37978ca825557d331c9012e0c1ddc0e42364",
            "patch_url": "https://git.kernel.org/stable/p/b97c37978ca825557d331c9012e0c1ddc0e42364",
            "filename": "CVE-2024-27388-b97c37978ca825557d331c9012e0c1ddc0e42364.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27388/CVE-2024-27388-b97c37978ca825557d331c9012e0c1ddc0e42364.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3cfcfc102a5e57b021b786a755a38935e357797d",
                "patch_url": "https://git.kernel.org/stable/p/3cfcfc102a5e57b021b786a755a38935e357797d",
                "filename": "CVE-2024-27388-3cfcfc102a5e57b021b786a755a38935e357797d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27388/CVE-2024-27388-3cfcfc102a5e57b021b786a755a38935e357797d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5e6013ae2c8d420faea553d363935f65badd32c3",
                "patch_url": "https://git.kernel.org/stable/p/5e6013ae2c8d420faea553d363935f65badd32c3",
                "filename": "CVE-2024-27388-5e6013ae2c8d420faea553d363935f65badd32c3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27388/CVE-2024-27388-5e6013ae2c8d420faea553d363935f65badd32c3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/934212a623cbab851848b6de377eb476718c3e4c",
                "patch_url": "https://git.kernel.org/stable/p/934212a623cbab851848b6de377eb476718c3e4c",
                "filename": "CVE-2024-27388-934212a623cbab851848b6de377eb476718c3e4c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27388/CVE-2024-27388-934212a623cbab851848b6de377eb476718c3e4c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9806c2393cd2ab0a8e7bb9ffae02ce20e3112ec4",
                "patch_url": "https://git.kernel.org/stable/p/9806c2393cd2ab0a8e7bb9ffae02ce20e3112ec4",
                "filename": "CVE-2024-27388-9806c2393cd2ab0a8e7bb9ffae02ce20e3112ec4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27388/CVE-2024-27388-9806c2393cd2ab0a8e7bb9ffae02ce20e3112ec4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/996997d1fb2126feda550d6adcedcbd94911fc69",
                "patch_url": "https://git.kernel.org/stable/p/996997d1fb2126feda550d6adcedcbd94911fc69",
                "filename": "CVE-2024-27388-996997d1fb2126feda550d6adcedcbd94911fc69.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27388/CVE-2024-27388-996997d1fb2126feda550d6adcedcbd94911fc69.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b97c37978ca825557d331c9012e0c1ddc0e42364",
                "patch_url": "https://git.kernel.org/stable/p/b97c37978ca825557d331c9012e0c1ddc0e42364",
                "filename": "CVE-2024-27388-b97c37978ca825557d331c9012e0c1ddc0e42364.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27388/CVE-2024-27388-b97c37978ca825557d331c9012e0c1ddc0e42364.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bb336cd8d5ecb69c430ebe3e7bcff68471d93fa8",
                "patch_url": "https://git.kernel.org/stable/p/bb336cd8d5ecb69c430ebe3e7bcff68471d93fa8",
                "filename": "CVE-2024-27388-bb336cd8d5ecb69c430ebe3e7bcff68471d93fa8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27388/CVE-2024-27388-bb336cd8d5ecb69c430ebe3e7bcff68471d93fa8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bfa9d86d39a0fe4685f90c3529aa9bd62a9d97a8",
                "patch_url": "https://git.kernel.org/stable/p/bfa9d86d39a0fe4685f90c3529aa9bd62a9d97a8",
                "filename": "CVE-2024-27388-bfa9d86d39a0fe4685f90c3529aa9bd62a9d97a8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27388/CVE-2024-27388-bfa9d86d39a0fe4685f90c3529aa9bd62a9d97a8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dd292e884c649f9b1c18af0ec75ca90b390cd044",
                "patch_url": "https://git.kernel.org/stable/p/dd292e884c649f9b1c18af0ec75ca90b390cd044",
                "filename": "CVE-2024-27388-dd292e884c649f9b1c18af0ec75ca90b390cd044.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27388/CVE-2024-27388-dd292e884c649f9b1c18af0ec75ca90b390cd044.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3cfcfc102a5e57b021b786a755a38935e357797d",
            "https://git.kernel.org/stable/c/5e6013ae2c8d420faea553d363935f65badd32c3",
            "https://git.kernel.org/stable/c/934212a623cbab851848b6de377eb476718c3e4c",
            "https://git.kernel.org/stable/c/9806c2393cd2ab0a8e7bb9ffae02ce20e3112ec4",
            "https://git.kernel.org/stable/c/996997d1fb2126feda550d6adcedcbd94911fc69",
            "https://git.kernel.org/stable/c/b97c37978ca825557d331c9012e0c1ddc0e42364",
            "https://git.kernel.org/stable/c/bb336cd8d5ecb69c430ebe3e7bcff68471d93fa8",
            "https://git.kernel.org/stable/c/bfa9d86d39a0fe4685f90c3529aa9bd62a9d97a8",
            "https://git.kernel.org/stable/c/dd292e884c649f9b1c18af0ec75ca90b390cd044",
            "https://www.cve.org/CVERecord?id=CVE-2024-27388\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27388\nhttps://lore.kernel.org/linux-cve-announce/2024050135-CVE-2024-27388-04eb@gregkh/T"
        ]
    },
    "CVE-2024-27395": {
        "cve": "CVE-2024-27395",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: Fix Use-After-Free in ovs_ct_exit\n\nSince kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof ovs_ct_limit_exit, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27395",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9048616553c65e750d43846f225843ed745ec0d4",
            "patch_url": "https://git.kernel.org/stable/p/9048616553c65e750d43846f225843ed745ec0d4",
            "filename": "CVE-2024-27395-9048616553c65e750d43846f225843ed745ec0d4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27395/CVE-2024-27395-9048616553c65e750d43846f225843ed745ec0d4.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2db9a8c0a01fa1c762c1e61a13c212c492752994",
                "patch_url": "https://git.kernel.org/stable/p/2db9a8c0a01fa1c762c1e61a13c212c492752994",
                "filename": "CVE-2024-27395-2db9a8c0a01fa1c762c1e61a13c212c492752994.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27395/CVE-2024-27395-2db9a8c0a01fa1c762c1e61a13c212c492752994.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/35880c3fa6f8fe281a19975d2992644588ca33d3",
                "patch_url": "https://git.kernel.org/stable/p/35880c3fa6f8fe281a19975d2992644588ca33d3",
                "filename": "CVE-2024-27395-35880c3fa6f8fe281a19975d2992644588ca33d3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27395/CVE-2024-27395-35880c3fa6f8fe281a19975d2992644588ca33d3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/589523cf0b384164e445dd5db8d5b1bf97982424",
                "patch_url": "https://git.kernel.org/stable/p/589523cf0b384164e445dd5db8d5b1bf97982424",
                "filename": "CVE-2024-27395-589523cf0b384164e445dd5db8d5b1bf97982424.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27395/CVE-2024-27395-589523cf0b384164e445dd5db8d5b1bf97982424.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5ea7b72d4fac2fdbc0425cd8f2ea33abe95235b2",
                "patch_url": "https://git.kernel.org/stable/p/5ea7b72d4fac2fdbc0425cd8f2ea33abe95235b2",
                "filename": "CVE-2024-27395-5ea7b72d4fac2fdbc0425cd8f2ea33abe95235b2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27395/CVE-2024-27395-5ea7b72d4fac2fdbc0425cd8f2ea33abe95235b2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9048616553c65e750d43846f225843ed745ec0d4",
                "patch_url": "https://git.kernel.org/stable/p/9048616553c65e750d43846f225843ed745ec0d4",
                "filename": "CVE-2024-27395-9048616553c65e750d43846f225843ed745ec0d4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27395/CVE-2024-27395-9048616553c65e750d43846f225843ed745ec0d4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bca6fa2d9a9f560e6b89fd5190b05cc2f5d422c1",
                "patch_url": "https://git.kernel.org/stable/p/bca6fa2d9a9f560e6b89fd5190b05cc2f5d422c1",
                "filename": "CVE-2024-27395-bca6fa2d9a9f560e6b89fd5190b05cc2f5d422c1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27395/CVE-2024-27395-bca6fa2d9a9f560e6b89fd5190b05cc2f5d422c1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eaa5e164a2110d2fb9e16c8a29e4501882235137",
                "patch_url": "https://git.kernel.org/stable/p/eaa5e164a2110d2fb9e16c8a29e4501882235137",
                "filename": "CVE-2024-27395-eaa5e164a2110d2fb9e16c8a29e4501882235137.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27395/CVE-2024-27395-eaa5e164a2110d2fb9e16c8a29e4501882235137.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/edee0758747d7c219e29db9ed1d4eb33e8d32865",
                "patch_url": "https://git.kernel.org/stable/p/edee0758747d7c219e29db9ed1d4eb33e8d32865",
                "filename": "CVE-2024-27395-edee0758747d7c219e29db9ed1d4eb33e8d32865.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27395/CVE-2024-27395-edee0758747d7c219e29db9ed1d4eb33e8d32865.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2db9a8c0a01fa1c762c1e61a13c212c492752994",
            "https://git.kernel.org/stable/c/35880c3fa6f8fe281a19975d2992644588ca33d3",
            "https://git.kernel.org/stable/c/589523cf0b384164e445dd5db8d5b1bf97982424",
            "https://git.kernel.org/stable/c/5ea7b72d4fac2fdbc0425cd8f2ea33abe95235b2",
            "https://git.kernel.org/stable/c/9048616553c65e750d43846f225843ed745ec0d4",
            "https://git.kernel.org/stable/c/bca6fa2d9a9f560e6b89fd5190b05cc2f5d422c1",
            "https://git.kernel.org/stable/c/eaa5e164a2110d2fb9e16c8a29e4501882235137",
            "https://git.kernel.org/stable/c/edee0758747d7c219e29db9ed1d4eb33e8d32865",
            "https://www.cve.org/CVERecord?id=CVE-2024-27395\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27395\nhttps://lore.kernel.org/linux-cve-announce/2024050836-CVE-2024-27395-573e@gregkh/T"
        ]
    },
    "CVE-2024-27397": {
        "cve": "CVE-2024-27397",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: use timestamp to check for set element timeout\n\nAdd a timestamp field at the beginning of the transaction, store it\nin the nftables per-netns area.\n\nUpdate set backend .insert, .deactivate and sync gc path to use the\ntimestamp, this avoids that an element expires while control plane\ntransaction is still unfinished.\n\n.lookup and .update, which are used from packet path, still use the\ncurrent time to check if the element has expired. And .get path and dump\nalso since this runs lockless under rcu read size lock. Then, there is\nasync gc which also needs to check the current time since it runs\nasynchronously from a workqueue.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27397",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0d40e8cb1d1f56a994cdd2e015af622fdca9ed4d",
            "patch_url": "https://git.kernel.org/stable/p/0d40e8cb1d1f56a994cdd2e015af622fdca9ed4d",
            "filename": "CVE-2024-27397-0d40e8cb1d1f56a994cdd2e015af622fdca9ed4d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27397/CVE-2024-27397-0d40e8cb1d1f56a994cdd2e015af622fdca9ed4d.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0d40e8cb1d1f56a994cdd2e015af622fdca9ed4d",
                "patch_url": "https://git.kernel.org/stable/p/0d40e8cb1d1f56a994cdd2e015af622fdca9ed4d",
                "filename": "CVE-2024-27397-0d40e8cb1d1f56a994cdd2e015af622fdca9ed4d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27397/CVE-2024-27397-0d40e8cb1d1f56a994cdd2e015af622fdca9ed4d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/383182db8d58c4237772ba0764cded4938a235c3",
                "patch_url": "https://git.kernel.org/stable/p/383182db8d58c4237772ba0764cded4938a235c3",
                "filename": "CVE-2024-27397-383182db8d58c4237772ba0764cded4938a235c3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27397/CVE-2024-27397-383182db8d58c4237772ba0764cded4938a235c3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7395dfacfff65e9938ac0889dafa1ab01e987d15",
                "patch_url": "https://git.kernel.org/stable/p/7395dfacfff65e9938ac0889dafa1ab01e987d15",
                "filename": "CVE-2024-27397-7395dfacfff65e9938ac0889dafa1ab01e987d15.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27397/CVE-2024-27397-7395dfacfff65e9938ac0889dafa1ab01e987d15.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7b17de2a71e56c10335b565cc7ad238e6d984379",
                "patch_url": "https://git.kernel.org/stable/p/7b17de2a71e56c10335b565cc7ad238e6d984379",
                "filename": "CVE-2024-27397-7b17de2a71e56c10335b565cc7ad238e6d984379.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27397/CVE-2024-27397-7b17de2a71e56c10335b565cc7ad238e6d984379.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7fa2e2960fff8322ce2ded57b5f8e9cbc450b967",
                "patch_url": "https://git.kernel.org/stable/p/7fa2e2960fff8322ce2ded57b5f8e9cbc450b967",
                "filename": "CVE-2024-27397-7fa2e2960fff8322ce2ded57b5f8e9cbc450b967.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27397/CVE-2024-27397-7fa2e2960fff8322ce2ded57b5f8e9cbc450b967.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b45176b869673417ace338b87cf9cdb66e2eeb01",
                "patch_url": "https://git.kernel.org/stable/p/b45176b869673417ace338b87cf9cdb66e2eeb01",
                "filename": "CVE-2024-27397-b45176b869673417ace338b87cf9cdb66e2eeb01.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27397/CVE-2024-27397-b45176b869673417ace338b87cf9cdb66e2eeb01.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eaf1a29ea5d7dba8e84e9e9f3b3f47d0cd540bfe",
                "patch_url": "https://git.kernel.org/stable/p/eaf1a29ea5d7dba8e84e9e9f3b3f47d0cd540bfe",
                "filename": "CVE-2024-27397-eaf1a29ea5d7dba8e84e9e9f3b3f47d0cd540bfe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27397/CVE-2024-27397-eaf1a29ea5d7dba8e84e9e9f3b3f47d0cd540bfe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f8dfda798650241c1692058713ca4fef8e429061",
                "patch_url": "https://git.kernel.org/stable/p/f8dfda798650241c1692058713ca4fef8e429061",
                "filename": "CVE-2024-27397-f8dfda798650241c1692058713ca4fef8e429061.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27397/CVE-2024-27397-f8dfda798650241c1692058713ca4fef8e429061.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0d40e8cb1d1f56a994cdd2e015af622fdca9ed4d",
            "https://git.kernel.org/stable/c/383182db8d58c4237772ba0764cded4938a235c3",
            "https://git.kernel.org/stable/c/7395dfacfff65e9938ac0889dafa1ab01e987d15",
            "https://git.kernel.org/stable/c/7b17de2a71e56c10335b565cc7ad238e6d984379",
            "https://git.kernel.org/stable/c/7fa2e2960fff8322ce2ded57b5f8e9cbc450b967",
            "https://git.kernel.org/stable/c/b45176b869673417ace338b87cf9cdb66e2eeb01",
            "https://git.kernel.org/stable/c/eaf1a29ea5d7dba8e84e9e9f3b3f47d0cd540bfe",
            "https://git.kernel.org/stable/c/f8dfda798650241c1692058713ca4fef8e429061",
            "https://www.cve.org/CVERecord?id=CVE-2024-27397\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27397\nhttps://lore.kernel.org/linux-cve-announce/2024050837-CVE-2024-27397-fd1e@gregkh/T"
        ]
    },
    "CVE-2024-27399": {
        "cve": "CVE-2024-27399",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout\n\nThere is a race condition between l2cap_chan_timeout() and\nl2cap_chan_del(). When we use l2cap_chan_del() to delete the\nchannel, the chan->conn will be set to null. But the conn could\nbe dereferenced again in the mutex_lock() of l2cap_chan_timeout().\nAs a result the null pointer dereference bug will happen. The\nKASAN report triggered by POC is shown below:\n\n[  472.074580] ==================================================================\n[  472.075284] BUG: KASAN: null-ptr-deref in mutex_lock+0x68/0xc0\n[  472.075308] Write of size 8 at addr 0000000000000158 by task kworker/0:0/7\n[  472.075308]\n[  472.075308] CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.9.0-rc5-00356-g78c0094a146b #36\n[  472.075308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4\n[  472.075308] Workqueue: events l2cap_chan_timeout\n[  472.075308] Call Trace:\n[  472.075308]  <TASK>\n[  472.075308]  dump_stack_lvl+0x137/0x1a0\n[  472.075308]  print_report+0x101/0x250\n[  472.075308]  ? __virt_addr_valid+0x77/0x160\n[  472.075308]  ? mutex_lock+0x68/0xc0\n[  472.075308]  kasan_report+0x139/0x170\n[  472.075308]  ? mutex_lock+0x68/0xc0\n[  472.075308]  kasan_check_range+0x2c3/0x2e0\n[  472.075308]  mutex_lock+0x68/0xc0\n[  472.075308]  l2cap_chan_timeout+0x181/0x300\n[  472.075308]  process_one_work+0x5d2/0xe00\n[  472.075308]  worker_thread+0xe1d/0x1660\n[  472.075308]  ? pr_cont_work+0x5e0/0x5e0\n[  472.075308]  kthread+0x2b7/0x350\n[  472.075308]  ? pr_cont_work+0x5e0/0x5e0\n[  472.075308]  ? kthread_blkcg+0xd0/0xd0\n[  472.075308]  ret_from_fork+0x4d/0x80\n[  472.075308]  ? kthread_blkcg+0xd0/0xd0\n[  472.075308]  ret_from_fork_asm+0x11/0x20\n[  472.075308]  </TASK>\n[  472.075308] ==================================================================\n[  472.094860] Disabling lock debugging due to kernel taint\n[  472.096136] BUG: kernel NULL pointer dereference, address: 0000000000000158\n[  472.096136] #PF: supervisor write access in kernel mode\n[  472.096136] #PF: error_code(0x0002) - not-present page\n[  472.096136] PGD 0 P4D 0\n[  472.096136] Oops: 0002 [#1] PREEMPT SMP KASAN NOPTI\n[  472.096136] CPU: 0 PID: 7 Comm: kworker/0:0 Tainted: G    B              6.9.0-rc5-00356-g78c0094a146b #36\n[  472.096136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4\n[  472.096136] Workqueue: events l2cap_chan_timeout\n[  472.096136] RIP: 0010:mutex_lock+0x88/0xc0\n[  472.096136] Code: be 08 00 00 00 e8 f8 23 1f fd 4c 89 f7 be 08 00 00 00 e8 eb 23 1f fd 42 80 3c 23 00 74 08 48 88\n[  472.096136] RSP: 0018:ffff88800744fc78 EFLAGS: 00000246\n[  472.096136] RAX: 0000000000000000 RBX: 1ffff11000e89f8f RCX: ffffffff8457c865\n[  472.096136] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff88800744fc78\n[  472.096136] RBP: 0000000000000158 R08: ffff88800744fc7f R09: 1ffff11000e89f8f\n[  472.096136] R10: dffffc0000000000 R11: ffffed1000e89f90 R12: dffffc0000000000\n[  472.096136] R13: 0000000000000158 R14: ffff88800744fc78 R15: ffff888007405a00\n[  472.096136] FS:  0000000000000000(0000) GS:ffff88806d200000(0000) knlGS:0000000000000000\n[  472.096136] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  472.096136] CR2: 0000000000000158 CR3: 000000000da32000 CR4: 00000000000006f0\n[  472.096136] Call Trace:\n[  472.096136]  <TASK>\n[  472.096136]  ? __die_body+0x8d/0xe0\n[  472.096136]  ? page_fault_oops+0x6b8/0x9a0\n[  472.096136]  ? kernelmode_fixup_or_oops+0x20c/0x2a0\n[  472.096136]  ? do_user_addr_fault+0x1027/0x1340\n[  472.096136]  ? _printk+0x7a/0xa0\n[  472.096136]  ? mutex_lock+0x68/0xc0\n[  472.096136]  ? add_taint+0x42/0xd0\n[  472.096136]  ? exc_page_fault+0x6a/0x1b0\n[  472.096136]  ? asm_exc_page_fault+0x26/0x30\n[  472.096136]  ? mutex_lock+0x75/0xc0\n[  472.096136]  ? mutex_lock+0x88/0xc0\n[  472.096136]  ? mutex_lock+0x75/0xc0\n[  472.096136]  l2cap_chan_timeo\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27399",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/955b5b6c54d95b5e7444dfc81c95c8e013f27ac0",
            "patch_url": "https://git.kernel.org/stable/p/955b5b6c54d95b5e7444dfc81c95c8e013f27ac0",
            "filename": "CVE-2024-27399-955b5b6c54d95b5e7444dfc81c95c8e013f27ac0.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27399/CVE-2024-27399-955b5b6c54d95b5e7444dfc81c95c8e013f27ac0.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/06acb75e7ed600d0bbf7bff5628aa8f24a97978c",
                "patch_url": "https://git.kernel.org/stable/p/06acb75e7ed600d0bbf7bff5628aa8f24a97978c",
                "filename": "CVE-2024-27399-06acb75e7ed600d0bbf7bff5628aa8f24a97978c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27399/CVE-2024-27399-06acb75e7ed600d0bbf7bff5628aa8f24a97978c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6466ee65e5b27161c846c73ef407f49dfa1bd1d9",
                "patch_url": "https://git.kernel.org/stable/p/6466ee65e5b27161c846c73ef407f49dfa1bd1d9",
                "filename": "CVE-2024-27399-6466ee65e5b27161c846c73ef407f49dfa1bd1d9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27399/CVE-2024-27399-6466ee65e5b27161c846c73ef407f49dfa1bd1d9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8960ff650aec70485b40771cd8e6e8c4cb467d33",
                "patch_url": "https://git.kernel.org/stable/p/8960ff650aec70485b40771cd8e6e8c4cb467d33",
                "filename": "CVE-2024-27399-8960ff650aec70485b40771cd8e6e8c4cb467d33.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27399/CVE-2024-27399-8960ff650aec70485b40771cd8e6e8c4cb467d33.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/955b5b6c54d95b5e7444dfc81c95c8e013f27ac0",
                "patch_url": "https://git.kernel.org/stable/p/955b5b6c54d95b5e7444dfc81c95c8e013f27ac0",
                "filename": "CVE-2024-27399-955b5b6c54d95b5e7444dfc81c95c8e013f27ac0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27399/CVE-2024-27399-955b5b6c54d95b5e7444dfc81c95c8e013f27ac0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/adf0398cee86643b8eacde95f17d073d022f782c",
                "patch_url": "https://git.kernel.org/stable/p/adf0398cee86643b8eacde95f17d073d022f782c",
                "filename": "CVE-2024-27399-adf0398cee86643b8eacde95f17d073d022f782c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27399/CVE-2024-27399-adf0398cee86643b8eacde95f17d073d022f782c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e137e2ba96e51902dc2878131823a96bf8e638ae",
                "patch_url": "https://git.kernel.org/stable/p/e137e2ba96e51902dc2878131823a96bf8e638ae",
                "filename": "CVE-2024-27399-e137e2ba96e51902dc2878131823a96bf8e638ae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27399/CVE-2024-27399-e137e2ba96e51902dc2878131823a96bf8e638ae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e97e16433eb4533083b096a3824b93a5ca3aee79",
                "patch_url": "https://git.kernel.org/stable/p/e97e16433eb4533083b096a3824b93a5ca3aee79",
                "filename": "CVE-2024-27399-e97e16433eb4533083b096a3824b93a5ca3aee79.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27399/CVE-2024-27399-e97e16433eb4533083b096a3824b93a5ca3aee79.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eb86f955488c39526534211f2610e48a5cf8ead4",
                "patch_url": "https://git.kernel.org/stable/p/eb86f955488c39526534211f2610e48a5cf8ead4",
                "filename": "CVE-2024-27399-eb86f955488c39526534211f2610e48a5cf8ead4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27399/CVE-2024-27399-eb86f955488c39526534211f2610e48a5cf8ead4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/06acb75e7ed600d0bbf7bff5628aa8f24a97978c",
            "https://git.kernel.org/stable/c/6466ee65e5b27161c846c73ef407f49dfa1bd1d9",
            "https://git.kernel.org/stable/c/8960ff650aec70485b40771cd8e6e8c4cb467d33",
            "https://git.kernel.org/stable/c/955b5b6c54d95b5e7444dfc81c95c8e013f27ac0",
            "https://git.kernel.org/stable/c/adf0398cee86643b8eacde95f17d073d022f782c",
            "https://git.kernel.org/stable/c/e137e2ba96e51902dc2878131823a96bf8e638ae",
            "https://git.kernel.org/stable/c/e97e16433eb4533083b096a3824b93a5ca3aee79",
            "https://git.kernel.org/stable/c/eb86f955488c39526534211f2610e48a5cf8ead4",
            "https://www.cve.org/CVERecord?id=CVE-2024-27399\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27399\nhttps://lore.kernel.org/linux-cve-announce/2024051300-CVE-2024-27399-afa8@gregkh/T"
        ]
    },
    "CVE-2024-27410": {
        "cve": "CVE-2024-27410",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: nl80211: reject iftype change with mesh ID change\n\nIt's currently possible to change the mesh ID when the\ninterface isn't yet in mesh mode, at the same time as\nchanging it into mesh mode. This leads to an overwrite\nof data in the wdev->u union for the interface type it\ncurrently has, causing cfg80211_change_iface() to do\nwrong things when switching.\n\nWe could probably allow setting an interface to mesh\nwhile setting the mesh ID at the same time by doing a\ndifferent order of operations here, but realistically\nthere's no userspace that's going to do this, so just\ndisallow changes in iftype when setting mesh ID.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27410",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/930e826962d9f01dcd2220176134427358d112f2",
            "patch_url": "https://git.kernel.org/stable/p/930e826962d9f01dcd2220176134427358d112f2",
            "filename": "CVE-2024-27410-930e826962d9f01dcd2220176134427358d112f2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27410/CVE-2024-27410-930e826962d9f01dcd2220176134427358d112f2.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/063715c33b4c37587aeca2c83cf08ead0c542995",
                "patch_url": "https://git.kernel.org/stable/p/063715c33b4c37587aeca2c83cf08ead0c542995",
                "filename": "CVE-2024-27410-063715c33b4c37587aeca2c83cf08ead0c542995.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27410/CVE-2024-27410-063715c33b4c37587aeca2c83cf08ead0c542995.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0cfbb26ee5e7b3d6483a73883f9f6157bca22ec9",
                "patch_url": "https://git.kernel.org/stable/p/0cfbb26ee5e7b3d6483a73883f9f6157bca22ec9",
                "filename": "CVE-2024-27410-0cfbb26ee5e7b3d6483a73883f9f6157bca22ec9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27410/CVE-2024-27410-0cfbb26ee5e7b3d6483a73883f9f6157bca22ec9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/177d574be4b58f832354ab1ef5a297aa0c9aa2df",
                "patch_url": "https://git.kernel.org/stable/p/177d574be4b58f832354ab1ef5a297aa0c9aa2df",
                "filename": "CVE-2024-27410-177d574be4b58f832354ab1ef5a297aa0c9aa2df.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27410/CVE-2024-27410-177d574be4b58f832354ab1ef5a297aa0c9aa2df.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/930e826962d9f01dcd2220176134427358d112f2",
                "patch_url": "https://git.kernel.org/stable/p/930e826962d9f01dcd2220176134427358d112f2",
                "filename": "CVE-2024-27410-930e826962d9f01dcd2220176134427358d112f2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27410/CVE-2024-27410-930e826962d9f01dcd2220176134427358d112f2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/99eb2159680af8786104dac80528acd5acd45980",
                "patch_url": "https://git.kernel.org/stable/p/99eb2159680af8786104dac80528acd5acd45980",
                "filename": "CVE-2024-27410-99eb2159680af8786104dac80528acd5acd45980.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27410/CVE-2024-27410-99eb2159680af8786104dac80528acd5acd45980.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a2add961a5ed25cfd6a74f9ffb9e7ab6d6ded838",
                "patch_url": "https://git.kernel.org/stable/p/a2add961a5ed25cfd6a74f9ffb9e7ab6d6ded838",
                "filename": "CVE-2024-27410-a2add961a5ed25cfd6a74f9ffb9e7ab6d6ded838.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27410/CVE-2024-27410-a2add961a5ed25cfd6a74f9ffb9e7ab6d6ded838.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d38d31bbbb9dc0d4d71a45431eafba03d0bc150d",
                "patch_url": "https://git.kernel.org/stable/p/d38d31bbbb9dc0d4d71a45431eafba03d0bc150d",
                "filename": "CVE-2024-27410-d38d31bbbb9dc0d4d71a45431eafba03d0bc150d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27410/CVE-2024-27410-d38d31bbbb9dc0d4d71a45431eafba03d0bc150d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f78c1375339a291cba492a70eaf12ec501d28a8e",
                "patch_url": "https://git.kernel.org/stable/p/f78c1375339a291cba492a70eaf12ec501d28a8e",
                "filename": "CVE-2024-27410-f78c1375339a291cba492a70eaf12ec501d28a8e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27410/CVE-2024-27410-f78c1375339a291cba492a70eaf12ec501d28a8e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/063715c33b4c37587aeca2c83cf08ead0c542995",
            "https://git.kernel.org/stable/c/0cfbb26ee5e7b3d6483a73883f9f6157bca22ec9",
            "https://git.kernel.org/stable/c/177d574be4b58f832354ab1ef5a297aa0c9aa2df",
            "https://git.kernel.org/stable/c/930e826962d9f01dcd2220176134427358d112f2",
            "https://git.kernel.org/stable/c/99eb2159680af8786104dac80528acd5acd45980",
            "https://git.kernel.org/stable/c/a2add961a5ed25cfd6a74f9ffb9e7ab6d6ded838",
            "https://git.kernel.org/stable/c/d38d31bbbb9dc0d4d71a45431eafba03d0bc150d",
            "https://git.kernel.org/stable/c/f78c1375339a291cba492a70eaf12ec501d28a8e",
            "https://www.cve.org/CVERecord?id=CVE-2024-27410\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27410\nhttps://lore.kernel.org/linux-cve-announce/2024051701-CVE-2024-27410-874a@gregkh/T"
        ]
    },
    "CVE-2024-27434": {
        "cve": "CVE-2024-27434",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: don't set the MFP flag for the GTK\n\nThe firmware doesn't need the MFP flag for the GTK, it can even make the\nfirmware crash. in case the AP is configured with: group cipher TKIP and\nMFPC. We would send the GTK with cipher = TKIP and MFP which is of course\nnot possible.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-27434",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/40405cbb20eb6541c603e7b3d54ade0a7be9d715",
            "patch_url": "https://git.kernel.org/stable/p/40405cbb20eb6541c603e7b3d54ade0a7be9d715",
            "filename": "CVE-2024-27434-40405cbb20eb6541c603e7b3d54ade0a7be9d715.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27434/CVE-2024-27434-40405cbb20eb6541c603e7b3d54ade0a7be9d715.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/40405cbb20eb6541c603e7b3d54ade0a7be9d715",
                "patch_url": "https://git.kernel.org/stable/p/40405cbb20eb6541c603e7b3d54ade0a7be9d715",
                "filename": "CVE-2024-27434-40405cbb20eb6541c603e7b3d54ade0a7be9d715.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27434/CVE-2024-27434-40405cbb20eb6541c603e7b3d54ade0a7be9d715.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/60f6d5fc84a9fd26528a24d8a267fc6a6698b628",
                "patch_url": "https://git.kernel.org/stable/p/60f6d5fc84a9fd26528a24d8a267fc6a6698b628",
                "filename": "CVE-2024-27434-60f6d5fc84a9fd26528a24d8a267fc6a6698b628.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27434/CVE-2024-27434-60f6d5fc84a9fd26528a24d8a267fc6a6698b628.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b4f1b0b3b91762edd19bf9d3b2e4c3a0740501f8",
                "patch_url": "https://git.kernel.org/stable/p/b4f1b0b3b91762edd19bf9d3b2e4c3a0740501f8",
                "filename": "CVE-2024-27434-b4f1b0b3b91762edd19bf9d3b2e4c3a0740501f8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27434/CVE-2024-27434-b4f1b0b3b91762edd19bf9d3b2e4c3a0740501f8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e35f316bce9e5733c9826120c1838f4c447b2c4c",
                "patch_url": "https://git.kernel.org/stable/p/e35f316bce9e5733c9826120c1838f4c447b2c4c",
                "filename": "CVE-2024-27434-e35f316bce9e5733c9826120c1838f4c447b2c4c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-27434/CVE-2024-27434-e35f316bce9e5733c9826120c1838f4c447b2c4c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/40405cbb20eb6541c603e7b3d54ade0a7be9d715",
            "https://git.kernel.org/stable/c/60f6d5fc84a9fd26528a24d8a267fc6a6698b628",
            "https://git.kernel.org/stable/c/b4f1b0b3b91762edd19bf9d3b2e4c3a0740501f8",
            "https://git.kernel.org/stable/c/e35f316bce9e5733c9826120c1838f4c447b2c4c",
            "https://www.cve.org/CVERecord?id=CVE-2024-27434\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-27434\nhttps://lore.kernel.org/linux-cve-announce/2024051756-CVE-2024-27434-ac61@gregkh/T"
        ]
    },
    "CVE-2024-28182": {
        "cve": "CVE-2024-28182",
        "cvss_v2": null,
        "cvss_v3": 5.3,
        "description": "nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync.  This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-28182",
        "selected_patch": {
            "url": "https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0",
            "patch_url": "https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0.patch",
            "filename": "CVE-2024-28182-00201ecd8f982da3b67d4f6868af72a1b03b14e0.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-28182/CVE-2024-28182-00201ecd8f982da3b67d4f6868af72a1b03b14e0.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0",
                "patch_url": "https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0.patch",
                "filename": "CVE-2024-28182-00201ecd8f982da3b67d4f6868af72a1b03b14e0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-28182/CVE-2024-28182-00201ecd8f982da3b67d4f6868af72a1b03b14e0.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9",
                "patch_url": "https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9.patch",
                "filename": "CVE-2024-28182-d71a4668c6bead55805d18810d633fbb98315af9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-28182/CVE-2024-28182-d71a4668c6bead55805d18810d633fbb98315af9.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0",
            "https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9"
        ]
    },
    "CVE-2024-28834": {
        "cve": "CVE-2024-28834",
        "cvss_v2": null,
        "cvss_v3": 5.3,
        "description": "A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-28834",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-28956": {
        "cve": "CVE-2024-28956",
        "cvss_v2": null,
        "cvss_v3": 5.6,
        "description": "Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-28956",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-31076": {
        "cve": "CVE-2024-31076",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ngenirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline\n\nThe absence of IRQD_MOVE_PCNTXT prevents immediate effectiveness of\ninterrupt affinity reconfiguration via procfs. Instead, the change is\ndeferred until the next instance of the interrupt being triggered on the\noriginal CPU.\n\nWhen the interrupt next triggers on the original CPU, the new affinity is\nenforced within __irq_move_irq(). A vector is allocated from the new CPU,\nbut the old vector on the original CPU remains and is not immediately\nreclaimed. Instead, apicd->move_in_progress is flagged, and the reclaiming\nprocess is delayed until the next trigger of the interrupt on the new CPU.\n\nUpon the subsequent triggering of the interrupt on the new CPU,\nirq_complete_move() adds a task to the old CPU's vector_cleanup list if it\nremains online. Subsequently, the timer on the old CPU iterates over its\nvector_cleanup list, reclaiming old vectors.\n\nHowever, a rare scenario arises if the old CPU is outgoing before the\ninterrupt triggers again on the new CPU.\n\nIn that case irq_force_complete_move() is not invoked on the outgoing CPU\nto reclaim the old apicd->prev_vector because the interrupt isn't currently\naffine to the outgoing CPU, and irq_needs_fixup() returns false. Even\nthough __vector_schedule_cleanup() is later called on the new CPU, it\ndoesn't reclaim apicd->prev_vector; instead, it simply resets both\napicd->move_in_progress and apicd->prev_vector to 0.\n\nAs a result, the vector remains unreclaimed in vector_matrix, leading to a\nCPU vector leak.\n\nTo address this issue, move the invocation of irq_force_complete_move()\nbefore the irq_needs_fixup() call to reclaim apicd->prev_vector, if the\ninterrupt is currently or used to be affine to the outgoing CPU.\n\nAdditionally, reclaim the vector in __vector_schedule_cleanup() as well,\nfollowing a warning message, although theoretically it should never see\napicd->move_in_progress with apicd->prev_cpu pointing to an offline CPU.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-31076",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6752dfcfff3ac3e16625ebd3f0ad9630900e7e76",
            "patch_url": "https://git.kernel.org/stable/p/6752dfcfff3ac3e16625ebd3f0ad9630900e7e76",
            "filename": "CVE-2024-31076-6752dfcfff3ac3e16625ebd3f0ad9630900e7e76.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-31076/CVE-2024-31076-6752dfcfff3ac3e16625ebd3f0ad9630900e7e76.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/59f86a2908380d09cdc726461c0fbb8d8579c99f",
                "patch_url": "https://git.kernel.org/stable/p/59f86a2908380d09cdc726461c0fbb8d8579c99f",
                "filename": "CVE-2024-31076-59f86a2908380d09cdc726461c0fbb8d8579c99f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-31076/CVE-2024-31076-59f86a2908380d09cdc726461c0fbb8d8579c99f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6752dfcfff3ac3e16625ebd3f0ad9630900e7e76",
                "patch_url": "https://git.kernel.org/stable/p/6752dfcfff3ac3e16625ebd3f0ad9630900e7e76",
                "filename": "CVE-2024-31076-6752dfcfff3ac3e16625ebd3f0ad9630900e7e76.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-31076/CVE-2024-31076-6752dfcfff3ac3e16625ebd3f0ad9630900e7e76.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9eeda3e0071a329af1eba15f4e57dc39576bb420",
                "patch_url": "https://git.kernel.org/stable/p/9eeda3e0071a329af1eba15f4e57dc39576bb420",
                "filename": "CVE-2024-31076-9eeda3e0071a329af1eba15f4e57dc39576bb420.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-31076/CVE-2024-31076-9eeda3e0071a329af1eba15f4e57dc39576bb420.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a40209d355afe4ed6d533507838c9e5cd70a76d8",
                "patch_url": "https://git.kernel.org/stable/p/a40209d355afe4ed6d533507838c9e5cd70a76d8",
                "filename": "CVE-2024-31076-a40209d355afe4ed6d533507838c9e5cd70a76d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-31076/CVE-2024-31076-a40209d355afe4ed6d533507838c9e5cd70a76d8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a6c11c0a5235fb144a65e0cb2ffd360ddc1f6c32",
                "patch_url": "https://git.kernel.org/stable/p/a6c11c0a5235fb144a65e0cb2ffd360ddc1f6c32",
                "filename": "CVE-2024-31076-a6c11c0a5235fb144a65e0cb2ffd360ddc1f6c32.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-31076/CVE-2024-31076-a6c11c0a5235fb144a65e0cb2ffd360ddc1f6c32.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e9c96d01d520498b169ce734a8ad1142bef86a30",
                "patch_url": "https://git.kernel.org/stable/p/e9c96d01d520498b169ce734a8ad1142bef86a30",
                "filename": "CVE-2024-31076-e9c96d01d520498b169ce734a8ad1142bef86a30.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-31076/CVE-2024-31076-e9c96d01d520498b169ce734a8ad1142bef86a30.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ebfb16fc057a016abb46a9720a54abf0d4f6abe1",
                "patch_url": "https://git.kernel.org/stable/p/ebfb16fc057a016abb46a9720a54abf0d4f6abe1",
                "filename": "CVE-2024-31076-ebfb16fc057a016abb46a9720a54abf0d4f6abe1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-31076/CVE-2024-31076-ebfb16fc057a016abb46a9720a54abf0d4f6abe1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f5f4675960609d8c5ee95f027fbf6ce380f98372",
                "patch_url": "https://git.kernel.org/stable/p/f5f4675960609d8c5ee95f027fbf6ce380f98372",
                "filename": "CVE-2024-31076-f5f4675960609d8c5ee95f027fbf6ce380f98372.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-31076/CVE-2024-31076-f5f4675960609d8c5ee95f027fbf6ce380f98372.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/59f86a2908380d09cdc726461c0fbb8d8579c99f",
            "https://git.kernel.org/stable/c/6752dfcfff3ac3e16625ebd3f0ad9630900e7e76",
            "https://git.kernel.org/stable/c/9eeda3e0071a329af1eba15f4e57dc39576bb420",
            "https://git.kernel.org/stable/c/a40209d355afe4ed6d533507838c9e5cd70a76d8",
            "https://git.kernel.org/stable/c/a6c11c0a5235fb144a65e0cb2ffd360ddc1f6c32",
            "https://git.kernel.org/stable/c/e9c96d01d520498b169ce734a8ad1142bef86a30",
            "https://git.kernel.org/stable/c/ebfb16fc057a016abb46a9720a54abf0d4f6abe1",
            "https://git.kernel.org/stable/c/f5f4675960609d8c5ee95f027fbf6ce380f98372",
            "https://www.cve.org/CVERecord?id=CVE-2024-31076\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-31076\nhttps://lore.kernel.org/linux-cve-announce/2024062134-CVE-2024-31076-786e@gregkh/T"
        ]
    },
    "CVE-2024-32487": {
        "cve": "CVE-2024-32487",
        "cvss_v2": null,
        "cvss_v3": 8.6,
        "description": "less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-32487",
        "selected_patch": {
            "url": "https://github.com/gwsw/less/commit/007521ac3c95bc76e3d59c6dbfe75d06c8075c33",
            "patch_url": "https://github.com/gwsw/less/commit/007521ac3c95bc76e3d59c6dbfe75d06c8075c33.patch",
            "filename": "CVE-2024-32487-007521ac3c95bc76e3d59c6dbfe75d06c8075c33.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-32487/CVE-2024-32487-007521ac3c95bc76e3d59c6dbfe75d06c8075c33.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/gwsw/less/commit/007521ac3c95bc76e3d59c6dbfe75d06c8075c33",
                "patch_url": "https://github.com/gwsw/less/commit/007521ac3c95bc76e3d59c6dbfe75d06c8075c33.patch",
                "filename": "CVE-2024-32487-007521ac3c95bc76e3d59c6dbfe75d06c8075c33.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-32487/CVE-2024-32487-007521ac3c95bc76e3d59c6dbfe75d06c8075c33.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/gwsw/less/commit/007521ac3c95bc76e3d59c6dbfe75d06c8075c33"
        ]
    },
    "CVE-2024-33621": {
        "cve": "CVE-2024-33621",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound\n\nRaw packet from PF_PACKET socket ontop of an IPv6-backed ipvlan device will\nhit WARN_ON_ONCE() in sk_mc_loop() through sch_direct_xmit() path.\n\nWARNING: CPU: 2 PID: 0 at net/core/sock.c:775 sk_mc_loop+0x2d/0x70\nModules linked in: sch_netem ipvlan rfkill cirrus drm_shmem_helper sg drm_kms_helper\nCPU: 2 PID: 0 Comm: swapper/2 Kdump: loaded Not tainted 6.9.0+ #279\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nRIP: 0010:sk_mc_loop+0x2d/0x70\nCode: fa 0f 1f 44 00 00 65 0f b7 15 f7 96 a3 4f 31 c0 66 85 d2 75 26 48 85 ff 74 1c\nRSP: 0018:ffffa9584015cd78 EFLAGS: 00010212\nRAX: 0000000000000011 RBX: ffff91e585793e00 RCX: 0000000002c6a001\nRDX: 0000000000000000 RSI: 0000000000000040 RDI: ffff91e589c0f000\nRBP: ffff91e5855bd100 R08: 0000000000000000 R09: 3d00545216f43d00\nR10: ffff91e584fdcc50 R11: 00000060dd8616f4 R12: ffff91e58132d000\nR13: ffff91e584fdcc68 R14: ffff91e5869ce800 R15: ffff91e589c0f000\nFS:  0000000000000000(0000) GS:ffff91e898100000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f788f7c44c0 CR3: 0000000008e1a000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n<IRQ>\n ? __warn (kernel/panic.c:693)\n ? sk_mc_loop (net/core/sock.c:760)\n ? report_bug (lib/bug.c:201 lib/bug.c:219)\n ? handle_bug (arch/x86/kernel/traps.c:239)\n ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))\n ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621)\n ? sk_mc_loop (net/core/sock.c:760)\n ip6_finish_output2 (net/ipv6/ip6_output.c:83 (discriminator 1))\n ? nf_hook_slow (net/netfilter/core.c:626)\n ip6_finish_output (net/ipv6/ip6_output.c:222)\n ? __pfx_ip6_finish_output (net/ipv6/ip6_output.c:215)\n ipvlan_xmit_mode_l3 (drivers/net/ipvlan/ipvlan_core.c:602) ipvlan\n ipvlan_start_xmit (drivers/net/ipvlan/ipvlan_main.c:226) ipvlan\n dev_hard_start_xmit (net/core/dev.c:3594)\n sch_direct_xmit (net/sched/sch_generic.c:343)\n __qdisc_run (net/sched/sch_generic.c:416)\n net_tx_action (net/core/dev.c:5286)\n handle_softirqs (kernel/softirq.c:555)\n __irq_exit_rcu (kernel/softirq.c:589)\n sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1043)\n\nThe warning triggers as this:\npacket_sendmsg\n   packet_snd //skb->sk is packet sk\n      __dev_queue_xmit\n         __dev_xmit_skb //q->enqueue is not NULL\n             __qdisc_run\n               sch_direct_xmit\n                 dev_hard_start_xmit\n                   ipvlan_start_xmit\n                      ipvlan_xmit_mode_l3 //l3 mode\n                        ipvlan_process_outbound //vepa flag\n                          ipvlan_process_v6_outbound\n                            ip6_local_out\n                                __ip6_finish_output\n                                  ip6_finish_output2 //multicast packet\n                                    sk_mc_loop //sk->sk_family is AF_PACKET\n\nCall ip{6}_local_out() with NULL sk in ipvlan as other tunnels to fix this.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-33621",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0049a623dfbbb49888de7f0c2f33a582b5ead989",
            "patch_url": "https://git.kernel.org/stable/p/0049a623dfbbb49888de7f0c2f33a582b5ead989",
            "filename": "CVE-2024-33621-0049a623dfbbb49888de7f0c2f33a582b5ead989.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-33621/CVE-2024-33621-0049a623dfbbb49888de7f0c2f33a582b5ead989.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0049a623dfbbb49888de7f0c2f33a582b5ead989",
                "patch_url": "https://git.kernel.org/stable/p/0049a623dfbbb49888de7f0c2f33a582b5ead989",
                "filename": "CVE-2024-33621-0049a623dfbbb49888de7f0c2f33a582b5ead989.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-33621/CVE-2024-33621-0049a623dfbbb49888de7f0c2f33a582b5ead989.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/13c4543db34e0da5a7d2f550b6262d860f248381",
                "patch_url": "https://git.kernel.org/stable/p/13c4543db34e0da5a7d2f550b6262d860f248381",
                "filename": "CVE-2024-33621-13c4543db34e0da5a7d2f550b6262d860f248381.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-33621/CVE-2024-33621-13c4543db34e0da5a7d2f550b6262d860f248381.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/183c4b416454b9983dc1b8aa0022b748911adc48",
                "patch_url": "https://git.kernel.org/stable/p/183c4b416454b9983dc1b8aa0022b748911adc48",
                "filename": "CVE-2024-33621-183c4b416454b9983dc1b8aa0022b748911adc48.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-33621/CVE-2024-33621-183c4b416454b9983dc1b8aa0022b748911adc48.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1abbf079da59ef559d0ab4219d2a0302f7970761",
                "patch_url": "https://git.kernel.org/stable/p/1abbf079da59ef559d0ab4219d2a0302f7970761",
                "filename": "CVE-2024-33621-1abbf079da59ef559d0ab4219d2a0302f7970761.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-33621/CVE-2024-33621-1abbf079da59ef559d0ab4219d2a0302f7970761.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/54213c09801e0bd2549ac42961093be36f65a7d0",
                "patch_url": "https://git.kernel.org/stable/p/54213c09801e0bd2549ac42961093be36f65a7d0",
                "filename": "CVE-2024-33621-54213c09801e0bd2549ac42961093be36f65a7d0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-33621/CVE-2024-33621-54213c09801e0bd2549ac42961093be36f65a7d0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/54768bacfde60e8e4757968d79f8726711dd2cf5",
                "patch_url": "https://git.kernel.org/stable/p/54768bacfde60e8e4757968d79f8726711dd2cf5",
                "filename": "CVE-2024-33621-54768bacfde60e8e4757968d79f8726711dd2cf5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-33621/CVE-2024-33621-54768bacfde60e8e4757968d79f8726711dd2cf5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b3dc6e8003b500861fa307e9a3400c52e78e4d3a",
                "patch_url": "https://git.kernel.org/stable/p/b3dc6e8003b500861fa307e9a3400c52e78e4d3a",
                "filename": "CVE-2024-33621-b3dc6e8003b500861fa307e9a3400c52e78e4d3a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-33621/CVE-2024-33621-b3dc6e8003b500861fa307e9a3400c52e78e4d3a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cb53706a3403ba67f4040b2a82d9cf79e11b1a48",
                "patch_url": "https://git.kernel.org/stable/p/cb53706a3403ba67f4040b2a82d9cf79e11b1a48",
                "filename": "CVE-2024-33621-cb53706a3403ba67f4040b2a82d9cf79e11b1a48.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-33621/CVE-2024-33621-cb53706a3403ba67f4040b2a82d9cf79e11b1a48.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0049a623dfbbb49888de7f0c2f33a582b5ead989",
            "https://git.kernel.org/stable/c/13c4543db34e0da5a7d2f550b6262d860f248381",
            "https://git.kernel.org/stable/c/183c4b416454b9983dc1b8aa0022b748911adc48",
            "https://git.kernel.org/stable/c/1abbf079da59ef559d0ab4219d2a0302f7970761",
            "https://git.kernel.org/stable/c/54213c09801e0bd2549ac42961093be36f65a7d0",
            "https://git.kernel.org/stable/c/54768bacfde60e8e4757968d79f8726711dd2cf5",
            "https://git.kernel.org/stable/c/b3dc6e8003b500861fa307e9a3400c52e78e4d3a",
            "https://git.kernel.org/stable/c/cb53706a3403ba67f4040b2a82d9cf79e11b1a48",
            "https://www.cve.org/CVERecord?id=CVE-2024-33621\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-33621\nhttps://lore.kernel.org/linux-cve-announce/2024062134-CVE-2024-33621-d3a6@gregkh/T"
        ]
    },
    "CVE-2024-34397": {
        "cve": "CVE-2024-34397",
        "cvss_v2": null,
        "cvss_v3": 5.2,
        "description": "An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-34397",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-3446": {
        "cve": "CVE-2024-3446",
        "cvss_v2": null,
        "cvss_v3": 8.2,
        "description": "A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-3446",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-35789": {
        "cve": "CVE-2024-35789",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes\n\nWhen moving a station out of a VLAN and deleting the VLAN afterwards, the\nfast_rx entry still holds a pointer to the VLAN's netdev, which can cause\nuse-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx\nafter the VLAN change.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35789",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/7eeabcea79b67cc29563e6a9a5c81f9e2c664d5b",
            "patch_url": "https://git.kernel.org/stable/p/7eeabcea79b67cc29563e6a9a5c81f9e2c664d5b",
            "filename": "CVE-2024-35789-7eeabcea79b67cc29563e6a9a5c81f9e2c664d5b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35789/CVE-2024-35789-7eeabcea79b67cc29563e6a9a5c81f9e2c664d5b.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2884a50f52313a7a911de3afcad065ddbb3d78fc",
                "patch_url": "https://git.kernel.org/stable/p/2884a50f52313a7a911de3afcad065ddbb3d78fc",
                "filename": "CVE-2024-35789-2884a50f52313a7a911de3afcad065ddbb3d78fc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35789/CVE-2024-35789-2884a50f52313a7a911de3afcad065ddbb3d78fc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f2bdb3c5e3189297e156b3ff84b140423d64685",
                "patch_url": "https://git.kernel.org/stable/p/4f2bdb3c5e3189297e156b3ff84b140423d64685",
                "filename": "CVE-2024-35789-4f2bdb3c5e3189297e156b3ff84b140423d64685.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35789/CVE-2024-35789-4f2bdb3c5e3189297e156b3ff84b140423d64685.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6b948b54c8bd620725e0c906e44b10c0b13087a7",
                "patch_url": "https://git.kernel.org/stable/p/6b948b54c8bd620725e0c906e44b10c0b13087a7",
                "filename": "CVE-2024-35789-6b948b54c8bd620725e0c906e44b10c0b13087a7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35789/CVE-2024-35789-6b948b54c8bd620725e0c906e44b10c0b13087a7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7eeabcea79b67cc29563e6a9a5c81f9e2c664d5b",
                "patch_url": "https://git.kernel.org/stable/p/7eeabcea79b67cc29563e6a9a5c81f9e2c664d5b",
                "filename": "CVE-2024-35789-7eeabcea79b67cc29563e6a9a5c81f9e2c664d5b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35789/CVE-2024-35789-7eeabcea79b67cc29563e6a9a5c81f9e2c664d5b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/be1dd9254fc115321d6fbee042026d42afc8d931",
                "patch_url": "https://git.kernel.org/stable/p/be1dd9254fc115321d6fbee042026d42afc8d931",
                "filename": "CVE-2024-35789-be1dd9254fc115321d6fbee042026d42afc8d931.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35789/CVE-2024-35789-be1dd9254fc115321d6fbee042026d42afc8d931.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c8bddbd91bc8e42c961a5e2cec20ab879f21100f",
                "patch_url": "https://git.kernel.org/stable/p/c8bddbd91bc8e42c961a5e2cec20ab879f21100f",
                "filename": "CVE-2024-35789-c8bddbd91bc8e42c961a5e2cec20ab879f21100f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35789/CVE-2024-35789-c8bddbd91bc8e42c961a5e2cec20ab879f21100f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e8678551c0243f799b4859448781cbec1bd6f1cb",
                "patch_url": "https://git.kernel.org/stable/p/e8678551c0243f799b4859448781cbec1bd6f1cb",
                "filename": "CVE-2024-35789-e8678551c0243f799b4859448781cbec1bd6f1cb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35789/CVE-2024-35789-e8678551c0243f799b4859448781cbec1bd6f1cb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e8b067c4058c0121ac8ca71559df8e2e08ff1a7e",
                "patch_url": "https://git.kernel.org/stable/p/e8b067c4058c0121ac8ca71559df8e2e08ff1a7e",
                "filename": "CVE-2024-35789-e8b067c4058c0121ac8ca71559df8e2e08ff1a7e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35789/CVE-2024-35789-e8b067c4058c0121ac8ca71559df8e2e08ff1a7e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ea9a0cfc07a7d3601cc680718d9cff0d6927a921",
                "patch_url": "https://git.kernel.org/stable/p/ea9a0cfc07a7d3601cc680718d9cff0d6927a921",
                "filename": "CVE-2024-35789-ea9a0cfc07a7d3601cc680718d9cff0d6927a921.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35789/CVE-2024-35789-ea9a0cfc07a7d3601cc680718d9cff0d6927a921.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2884a50f52313a7a911de3afcad065ddbb3d78fc",
            "https://git.kernel.org/stable/c/4f2bdb3c5e3189297e156b3ff84b140423d64685",
            "https://git.kernel.org/stable/c/6b948b54c8bd620725e0c906e44b10c0b13087a7",
            "https://git.kernel.org/stable/c/7eeabcea79b67cc29563e6a9a5c81f9e2c664d5b",
            "https://git.kernel.org/stable/c/be1dd9254fc115321d6fbee042026d42afc8d931",
            "https://git.kernel.org/stable/c/c8bddbd91bc8e42c961a5e2cec20ab879f21100f",
            "https://git.kernel.org/stable/c/e8678551c0243f799b4859448781cbec1bd6f1cb",
            "https://git.kernel.org/stable/c/e8b067c4058c0121ac8ca71559df8e2e08ff1a7e",
            "https://git.kernel.org/stable/c/ea9a0cfc07a7d3601cc680718d9cff0d6927a921",
            "https://www.cve.org/CVERecord?id=CVE-2024-35789\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35789\nhttps://lore.kernel.org/linux-cve-announce/2024051707-CVE-2024-35789-52e5@gregkh/T"
        ]
    },
    "CVE-2024-35790": {
        "cve": "CVE-2024-35790",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group\n\nThe DisplayPort driver's sysfs nodes may be present to the userspace before\ntypec_altmode_set_drvdata() completes in dp_altmode_probe. This means that\na sysfs read can trigger a NULL pointer error by deferencing dp->hpd in\nhpd_show or dp->lock in pin_assignment_show, as dev_get_drvdata() returns\nNULL in those cases.\n\nRemove manual sysfs node creation in favor of adding attribute group as\ndefault for devices bound to the driver. The ATTRIBUTE_GROUPS() macro is\nnot used here otherwise the path to the sysfs nodes is no longer compliant\nwith the ABI.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35790",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9794ffd9d0c39ee070fbd733f862bbe89b28ba33",
            "patch_url": "https://git.kernel.org/stable/p/9794ffd9d0c39ee070fbd733f862bbe89b28ba33",
            "filename": "CVE-2024-35790-9794ffd9d0c39ee070fbd733f862bbe89b28ba33.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35790/CVE-2024-35790-9794ffd9d0c39ee070fbd733f862bbe89b28ba33.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0ad011776c057ce881b7fd6d8c79ecd459c087e9",
                "patch_url": "https://git.kernel.org/stable/p/0ad011776c057ce881b7fd6d8c79ecd459c087e9",
                "filename": "CVE-2024-35790-0ad011776c057ce881b7fd6d8c79ecd459c087e9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35790/CVE-2024-35790-0ad011776c057ce881b7fd6d8c79ecd459c087e9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/165376f6b23e9a779850e750fb2eb06622e5a531",
                "patch_url": "https://git.kernel.org/stable/p/165376f6b23e9a779850e750fb2eb06622e5a531",
                "filename": "CVE-2024-35790-165376f6b23e9a779850e750fb2eb06622e5a531.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35790/CVE-2024-35790-165376f6b23e9a779850e750fb2eb06622e5a531.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4a22aeac24d0d5f26ba741408e8b5a4be6dc5dc0",
                "patch_url": "https://git.kernel.org/stable/p/4a22aeac24d0d5f26ba741408e8b5a4be6dc5dc0",
                "filename": "CVE-2024-35790-4a22aeac24d0d5f26ba741408e8b5a4be6dc5dc0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35790/CVE-2024-35790-4a22aeac24d0d5f26ba741408e8b5a4be6dc5dc0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6b989ea1c479533ab8dbfbeb1704c94b1d3320da",
                "patch_url": "https://git.kernel.org/stable/p/6b989ea1c479533ab8dbfbeb1704c94b1d3320da",
                "filename": "CVE-2024-35790-6b989ea1c479533ab8dbfbeb1704c94b1d3320da.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35790/CVE-2024-35790-6b989ea1c479533ab8dbfbeb1704c94b1d3320da.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9794ffd9d0c39ee070fbd733f862bbe89b28ba33",
                "patch_url": "https://git.kernel.org/stable/p/9794ffd9d0c39ee070fbd733f862bbe89b28ba33",
                "filename": "CVE-2024-35790-9794ffd9d0c39ee070fbd733f862bbe89b28ba33.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35790/CVE-2024-35790-9794ffd9d0c39ee070fbd733f862bbe89b28ba33.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f1c5ddaef506e3517dce338c08a60663b1521920",
                "patch_url": "https://git.kernel.org/stable/p/f1c5ddaef506e3517dce338c08a60663b1521920",
                "filename": "CVE-2024-35790-f1c5ddaef506e3517dce338c08a60663b1521920.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35790/CVE-2024-35790-f1c5ddaef506e3517dce338c08a60663b1521920.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0ad011776c057ce881b7fd6d8c79ecd459c087e9",
            "https://git.kernel.org/stable/c/165376f6b23e9a779850e750fb2eb06622e5a531",
            "https://git.kernel.org/stable/c/4a22aeac24d0d5f26ba741408e8b5a4be6dc5dc0",
            "https://git.kernel.org/stable/c/6b989ea1c479533ab8dbfbeb1704c94b1d3320da",
            "https://git.kernel.org/stable/c/9794ffd9d0c39ee070fbd733f862bbe89b28ba33",
            "https://git.kernel.org/stable/c/f1c5ddaef506e3517dce338c08a60663b1521920",
            "https://www.cve.org/CVERecord?id=CVE-2024-35790\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35790\nhttps://lore.kernel.org/linux-cve-announce/2024051708-CVE-2024-35790-6a80@gregkh/T"
        ]
    },
    "CVE-2024-35801": {
        "cve": "CVE-2024-35801",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/fpu: Keep xfd_state in sync with MSR_IA32_XFD\n\nCommit 672365477ae8 (\"x86/fpu: Update XFD state where required\") and\ncommit 8bf26758ca96 (\"x86/fpu: Add XFD state to fpstate\") introduced a\nper CPU variable xfd_state to keep the MSR_IA32_XFD value cached, in\norder to avoid unnecessary writes to the MSR.\n\nOn CPU hotplug MSR_IA32_XFD is reset to the init_fpstate.xfd, which\nwipes out any stale state. But the per CPU cached xfd value is not\nreset, which brings them out of sync.\n\nAs a consequence a subsequent xfd_update_state() might fail to update\nthe MSR which in turn can result in XRSTOR raising a #NM in kernel\nspace, which crashes the kernel.\n\nTo fix this, introduce xfd_set_state() to write xfd_state together\nwith MSR_IA32_XFD, and use it in all places that set MSR_IA32_XFD.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35801",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/21c7c00dae55cb0e3810d5f9506b58f68475d41d",
            "patch_url": "https://git.kernel.org/stable/p/21c7c00dae55cb0e3810d5f9506b58f68475d41d",
            "filename": "CVE-2024-35801-21c7c00dae55cb0e3810d5f9506b58f68475d41d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35801/CVE-2024-35801-21c7c00dae55cb0e3810d5f9506b58f68475d41d.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/10e4b5166df9ff7a2d5316138ca668b42d004422",
                "patch_url": "https://git.kernel.org/stable/p/10e4b5166df9ff7a2d5316138ca668b42d004422",
                "filename": "CVE-2024-35801-10e4b5166df9ff7a2d5316138ca668b42d004422.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35801/CVE-2024-35801-10e4b5166df9ff7a2d5316138ca668b42d004422.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1acbca933313aa866e39996904c9aca4d435c4cd",
                "patch_url": "https://git.kernel.org/stable/p/1acbca933313aa866e39996904c9aca4d435c4cd",
                "filename": "CVE-2024-35801-1acbca933313aa866e39996904c9aca4d435c4cd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35801/CVE-2024-35801-1acbca933313aa866e39996904c9aca4d435c4cd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/21c7c00dae55cb0e3810d5f9506b58f68475d41d",
                "patch_url": "https://git.kernel.org/stable/p/21c7c00dae55cb0e3810d5f9506b58f68475d41d",
                "filename": "CVE-2024-35801-21c7c00dae55cb0e3810d5f9506b58f68475d41d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35801/CVE-2024-35801-21c7c00dae55cb0e3810d5f9506b58f68475d41d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/92b0f04e937665bde5768f3fcc622dcce44413d8",
                "patch_url": "https://git.kernel.org/stable/p/92b0f04e937665bde5768f3fcc622dcce44413d8",
                "filename": "CVE-2024-35801-92b0f04e937665bde5768f3fcc622dcce44413d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35801/CVE-2024-35801-92b0f04e937665bde5768f3fcc622dcce44413d8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b61e3b7055ac6edee4be071c52f48c26472d2624",
                "patch_url": "https://git.kernel.org/stable/p/b61e3b7055ac6edee4be071c52f48c26472d2624",
                "filename": "CVE-2024-35801-b61e3b7055ac6edee4be071c52f48c26472d2624.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35801/CVE-2024-35801-b61e3b7055ac6edee4be071c52f48c26472d2624.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/10e4b5166df9ff7a2d5316138ca668b42d004422",
            "https://git.kernel.org/stable/c/1acbca933313aa866e39996904c9aca4d435c4cd",
            "https://git.kernel.org/stable/c/21c7c00dae55cb0e3810d5f9506b58f68475d41d",
            "https://git.kernel.org/stable/c/92b0f04e937665bde5768f3fcc622dcce44413d8",
            "https://git.kernel.org/stable/c/b61e3b7055ac6edee4be071c52f48c26472d2624",
            "https://www.cve.org/CVERecord?id=CVE-2024-35801\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35801\nhttps://lore.kernel.org/linux-cve-announce/2024051738-CVE-2024-35801-8038@gregkh/T"
        ]
    },
    "CVE-2024-35807": {
        "cve": "CVE-2024-35807",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix corruption during on-line resize\n\nWe observed a corruption during on-line resize of a file system that is\nlarger than 16 TiB with 4k block size. With having more then 2^32 blocks\nresize_inode is turned off by default by mke2fs. The issue can be\nreproduced on a smaller file system for convenience by explicitly\nturning off resize_inode. An on-line resize across an 8 GiB boundary (the\nsize of a meta block group in this setup) then leads to a corruption:\n\n  dev=/dev/<some_dev> # should be >= 16 GiB\n  mkdir -p /corruption\n  /sbin/mke2fs -t ext4 -b 4096 -O ^resize_inode $dev $((2 * 2**21 - 2**15))\n  mount -t ext4 $dev /corruption\n\n  dd if=/dev/zero bs=4096 of=/corruption/test count=$((2*2**21 - 4*2**15))\n  sha1sum /corruption/test\n  # 79d2658b39dcfd77274e435b0934028adafaab11  /corruption/test\n\n  /sbin/resize2fs $dev $((2*2**21))\n  # drop page cache to force reload the block from disk\n  echo 1 > /proc/sys/vm/drop_caches\n\n  sha1sum /corruption/test\n  # 3c2abc63cbf1a94c9e6977e0fbd72cd832c4d5c3  /corruption/test\n\n2^21 = 2^15*2^6 equals 8 GiB whereof 2^15 is the number of blocks per\nblock group and 2^6 are the number of block groups that make a meta\nblock group.\n\nThe last checksum might be different depending on how the file is laid\nout across the physical blocks. The actual corruption occurs at physical\nblock 63*2^15 = 2064384 which would be the location of the backup of the\nmeta block group's block descriptor. During the on-line resize the file\nsystem will be converted to meta_bg starting at s_first_meta_bg which is\n2 in the example - meaning all block groups after 16 GiB. However, in\next4_flex_group_add we might add block groups that are not part of the\nfirst meta block group yet. In the reproducer we achieved this by\nsubstracting the size of a whole block group from the point where the\nmeta block group would start. This must be considered when updating the\nbackup block group descriptors to follow the non-meta_bg layout. The fix\nis to add a test whether the group to add is already part of the meta\nblock group or not.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35807",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/239c669edb2bffa1aa2612519b1d438ab35d6be6",
            "patch_url": "https://git.kernel.org/stable/p/239c669edb2bffa1aa2612519b1d438ab35d6be6",
            "filename": "CVE-2024-35807-239c669edb2bffa1aa2612519b1d438ab35d6be6.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35807/CVE-2024-35807-239c669edb2bffa1aa2612519b1d438ab35d6be6.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/239c669edb2bffa1aa2612519b1d438ab35d6be6",
                "patch_url": "https://git.kernel.org/stable/p/239c669edb2bffa1aa2612519b1d438ab35d6be6",
                "filename": "CVE-2024-35807-239c669edb2bffa1aa2612519b1d438ab35d6be6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35807/CVE-2024-35807-239c669edb2bffa1aa2612519b1d438ab35d6be6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/37b6a3ba793bbbae057f5b991970ebcc52cb3db5",
                "patch_url": "https://git.kernel.org/stable/p/37b6a3ba793bbbae057f5b991970ebcc52cb3db5",
                "filename": "CVE-2024-35807-37b6a3ba793bbbae057f5b991970ebcc52cb3db5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35807/CVE-2024-35807-37b6a3ba793bbbae057f5b991970ebcc52cb3db5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/722d2c01b8b108f8283d1b7222209d5b2a5aa7bd",
                "patch_url": "https://git.kernel.org/stable/p/722d2c01b8b108f8283d1b7222209d5b2a5aa7bd",
                "filename": "CVE-2024-35807-722d2c01b8b108f8283d1b7222209d5b2a5aa7bd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35807/CVE-2024-35807-722d2c01b8b108f8283d1b7222209d5b2a5aa7bd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/75cc31c2e7193b69f5d25650bda5bb42ed92f8a1",
                "patch_url": "https://git.kernel.org/stable/p/75cc31c2e7193b69f5d25650bda5bb42ed92f8a1",
                "filename": "CVE-2024-35807-75cc31c2e7193b69f5d25650bda5bb42ed92f8a1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35807/CVE-2024-35807-75cc31c2e7193b69f5d25650bda5bb42ed92f8a1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a6b3bfe176e8a5b05ec4447404e412c2a3fc92cc",
                "patch_url": "https://git.kernel.org/stable/p/a6b3bfe176e8a5b05ec4447404e412c2a3fc92cc",
                "filename": "CVE-2024-35807-a6b3bfe176e8a5b05ec4447404e412c2a3fc92cc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35807/CVE-2024-35807-a6b3bfe176e8a5b05ec4447404e412c2a3fc92cc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b461910af8ba3bed80f48c2bf852686d05c6fc5c",
                "patch_url": "https://git.kernel.org/stable/p/b461910af8ba3bed80f48c2bf852686d05c6fc5c",
                "filename": "CVE-2024-35807-b461910af8ba3bed80f48c2bf852686d05c6fc5c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35807/CVE-2024-35807-b461910af8ba3bed80f48c2bf852686d05c6fc5c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e8e8b197317228b5089ed9e7802dadf3ccaa027a",
                "patch_url": "https://git.kernel.org/stable/p/e8e8b197317228b5089ed9e7802dadf3ccaa027a",
                "filename": "CVE-2024-35807-e8e8b197317228b5089ed9e7802dadf3ccaa027a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35807/CVE-2024-35807-e8e8b197317228b5089ed9e7802dadf3ccaa027a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ee4e9c1976147a850f6085a13fca95bcaa00d84c",
                "patch_url": "https://git.kernel.org/stable/p/ee4e9c1976147a850f6085a13fca95bcaa00d84c",
                "filename": "CVE-2024-35807-ee4e9c1976147a850f6085a13fca95bcaa00d84c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35807/CVE-2024-35807-ee4e9c1976147a850f6085a13fca95bcaa00d84c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fb1088d51bbaa0faec5a55d4f5818a9ab79e24df",
                "patch_url": "https://git.kernel.org/stable/p/fb1088d51bbaa0faec5a55d4f5818a9ab79e24df",
                "filename": "CVE-2024-35807-fb1088d51bbaa0faec5a55d4f5818a9ab79e24df.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35807/CVE-2024-35807-fb1088d51bbaa0faec5a55d4f5818a9ab79e24df.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/239c669edb2bffa1aa2612519b1d438ab35d6be6",
            "https://git.kernel.org/stable/c/37b6a3ba793bbbae057f5b991970ebcc52cb3db5",
            "https://git.kernel.org/stable/c/722d2c01b8b108f8283d1b7222209d5b2a5aa7bd",
            "https://git.kernel.org/stable/c/75cc31c2e7193b69f5d25650bda5bb42ed92f8a1",
            "https://git.kernel.org/stable/c/a6b3bfe176e8a5b05ec4447404e412c2a3fc92cc",
            "https://git.kernel.org/stable/c/b461910af8ba3bed80f48c2bf852686d05c6fc5c",
            "https://git.kernel.org/stable/c/e8e8b197317228b5089ed9e7802dadf3ccaa027a",
            "https://git.kernel.org/stable/c/ee4e9c1976147a850f6085a13fca95bcaa00d84c",
            "https://git.kernel.org/stable/c/fb1088d51bbaa0faec5a55d4f5818a9ab79e24df",
            "https://www.cve.org/CVERecord?id=CVE-2024-35807\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35807\nhttps://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35807-2a9e@gregkh/T"
        ]
    },
    "CVE-2024-35809": {
        "cve": "CVE-2024-35809",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/PM: Drain runtime-idle callbacks before driver removal\n\nA race condition between the .runtime_idle() callback and the .remove()\ncallback in the rtsx_pcr PCI driver leads to a kernel crash due to an\nunhandled page fault [1].\n\nThe problem is that rtsx_pci_runtime_idle() is not expected to be running\nafter pm_runtime_get_sync() has been called, but the latter doesn't really\nguarantee that.  It only guarantees that the suspend and resume callbacks\nwill not be running when it returns.\n\nHowever, if a .runtime_idle() callback is already running when\npm_runtime_get_sync() is called, the latter will notice that the runtime PM\nstatus of the device is RPM_ACTIVE and it will return right away without\nwaiting for the former to complete.  In fact, it cannot wait for\n.runtime_idle() to complete because it may be called from that callback (it\narguably does not make much sense to do that, but it is not strictly\nprohibited).\n\nThus in general, whoever is providing a .runtime_idle() callback needs\nto protect it from running in parallel with whatever code runs after\npm_runtime_get_sync().  [Note that .runtime_idle() will not start after\npm_runtime_get_sync() has returned, but it may continue running then if it\nhas started earlier.]\n\nOne way to address that race condition is to call pm_runtime_barrier()\nafter pm_runtime_get_sync() (not before it, because a nonzero value of the\nruntime PM usage counter is necessary to prevent runtime PM callbacks from\nbeing invoked) to wait for the .runtime_idle() callback to complete should\nit be running at that point.  A suitable place for doing that is in\npci_device_remove() which calls pm_runtime_get_sync() before removing the\ndriver, so it may as well call pm_runtime_barrier() subsequently, which\nwill prevent the race in question from occurring, not just in the rtsx_pcr\ndriver, but in any PCI drivers providing .runtime_idle() callbacks.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35809",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/47d8aafcfe313511a98f165a54d0adceb34e54b1",
            "patch_url": "https://git.kernel.org/stable/p/47d8aafcfe313511a98f165a54d0adceb34e54b1",
            "filename": "CVE-2024-35809-47d8aafcfe313511a98f165a54d0adceb34e54b1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35809/CVE-2024-35809-47d8aafcfe313511a98f165a54d0adceb34e54b1.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/47d8aafcfe313511a98f165a54d0adceb34e54b1",
                "patch_url": "https://git.kernel.org/stable/p/47d8aafcfe313511a98f165a54d0adceb34e54b1",
                "filename": "CVE-2024-35809-47d8aafcfe313511a98f165a54d0adceb34e54b1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35809/CVE-2024-35809-47d8aafcfe313511a98f165a54d0adceb34e54b1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6347348c6aba52dda0b33296684cbb627bdc6970",
                "patch_url": "https://git.kernel.org/stable/p/6347348c6aba52dda0b33296684cbb627bdc6970",
                "filename": "CVE-2024-35809-6347348c6aba52dda0b33296684cbb627bdc6970.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35809/CVE-2024-35809-6347348c6aba52dda0b33296684cbb627bdc6970.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7cc94dd36e48879e76ae7a8daea4ff322b7d9674",
                "patch_url": "https://git.kernel.org/stable/p/7cc94dd36e48879e76ae7a8daea4ff322b7d9674",
                "filename": "CVE-2024-35809-7cc94dd36e48879e76ae7a8daea4ff322b7d9674.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35809/CVE-2024-35809-7cc94dd36e48879e76ae7a8daea4ff322b7d9674.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/900b81caf00c89417172afe0e7e49ac4eb110f4b",
                "patch_url": "https://git.kernel.org/stable/p/900b81caf00c89417172afe0e7e49ac4eb110f4b",
                "filename": "CVE-2024-35809-900b81caf00c89417172afe0e7e49ac4eb110f4b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35809/CVE-2024-35809-900b81caf00c89417172afe0e7e49ac4eb110f4b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9a87375bb586515c0af63d5dcdcd58ec4acf20a6",
                "patch_url": "https://git.kernel.org/stable/p/9a87375bb586515c0af63d5dcdcd58ec4acf20a6",
                "filename": "CVE-2024-35809-9a87375bb586515c0af63d5dcdcd58ec4acf20a6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35809/CVE-2024-35809-9a87375bb586515c0af63d5dcdcd58ec4acf20a6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9d5286d4e7f68beab450deddbb6a32edd5ecf4bf",
                "patch_url": "https://git.kernel.org/stable/p/9d5286d4e7f68beab450deddbb6a32edd5ecf4bf",
                "filename": "CVE-2024-35809-9d5286d4e7f68beab450deddbb6a32edd5ecf4bf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35809/CVE-2024-35809-9d5286d4e7f68beab450deddbb6a32edd5ecf4bf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bbe068b24409ef740657215605284fc7cdddd491",
                "patch_url": "https://git.kernel.org/stable/p/bbe068b24409ef740657215605284fc7cdddd491",
                "filename": "CVE-2024-35809-bbe068b24409ef740657215605284fc7cdddd491.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35809/CVE-2024-35809-bbe068b24409ef740657215605284fc7cdddd491.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d534198311c345e4b062c4b88bb609efb8bd91d5",
                "patch_url": "https://git.kernel.org/stable/p/d534198311c345e4b062c4b88bb609efb8bd91d5",
                "filename": "CVE-2024-35809-d534198311c345e4b062c4b88bb609efb8bd91d5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35809/CVE-2024-35809-d534198311c345e4b062c4b88bb609efb8bd91d5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d86ad8c3e152349454b82f37007ff6ba45f26989",
                "patch_url": "https://git.kernel.org/stable/p/d86ad8c3e152349454b82f37007ff6ba45f26989",
                "filename": "CVE-2024-35809-d86ad8c3e152349454b82f37007ff6ba45f26989.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35809/CVE-2024-35809-d86ad8c3e152349454b82f37007ff6ba45f26989.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/47d8aafcfe313511a98f165a54d0adceb34e54b1",
            "https://git.kernel.org/stable/c/6347348c6aba52dda0b33296684cbb627bdc6970",
            "https://git.kernel.org/stable/c/7cc94dd36e48879e76ae7a8daea4ff322b7d9674",
            "https://git.kernel.org/stable/c/900b81caf00c89417172afe0e7e49ac4eb110f4b",
            "https://git.kernel.org/stable/c/9a87375bb586515c0af63d5dcdcd58ec4acf20a6",
            "https://git.kernel.org/stable/c/9d5286d4e7f68beab450deddbb6a32edd5ecf4bf",
            "https://git.kernel.org/stable/c/bbe068b24409ef740657215605284fc7cdddd491",
            "https://git.kernel.org/stable/c/d534198311c345e4b062c4b88bb609efb8bd91d5",
            "https://git.kernel.org/stable/c/d86ad8c3e152349454b82f37007ff6ba45f26989",
            "https://www.cve.org/CVERecord?id=CVE-2024-35809\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35809\nhttps://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35809-4a4e@gregkh/T"
        ]
    },
    "CVE-2024-35810": {
        "cve": "CVE-2024-35810",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix the lifetime of the bo cursor memory\n\nThe cleanup can be dispatched while the atomic update is still active,\nwhich means that the memory acquired in the atomic update needs to\nnot be invalidated by the cleanup. The buffer objects in vmw_plane_state\ninstead of using the builtin map_and_cache were trying to handle\nthe lifetime of the mapped memory themselves, leading to crashes.\n\nUse the map_and_cache instead of trying to manage the lifetime of the\nbuffer objects held by the vmw_plane_state.\n\nFixes kernel oops'es in IGT's kms_cursor_legacy forked-bo.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35810",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/104a5b2772bc7c0715ae7355ccf9d294a472765c",
            "patch_url": "https://git.kernel.org/stable/p/104a5b2772bc7c0715ae7355ccf9d294a472765c",
            "filename": "CVE-2024-35810-104a5b2772bc7c0715ae7355ccf9d294a472765c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35810/CVE-2024-35810-104a5b2772bc7c0715ae7355ccf9d294a472765c.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/104a5b2772bc7c0715ae7355ccf9d294a472765c",
                "patch_url": "https://git.kernel.org/stable/p/104a5b2772bc7c0715ae7355ccf9d294a472765c",
                "filename": "CVE-2024-35810-104a5b2772bc7c0715ae7355ccf9d294a472765c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35810/CVE-2024-35810-104a5b2772bc7c0715ae7355ccf9d294a472765c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/86cb706a40b7e6b2221ee49a298a65ad9b46c02d",
                "patch_url": "https://git.kernel.org/stable/p/86cb706a40b7e6b2221ee49a298a65ad9b46c02d",
                "filename": "CVE-2024-35810-86cb706a40b7e6b2221ee49a298a65ad9b46c02d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35810/CVE-2024-35810-86cb706a40b7e6b2221ee49a298a65ad9b46c02d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9a9e8a7159ca09af9b1a300a6c8e8b6ff7501c76",
                "patch_url": "https://git.kernel.org/stable/p/9a9e8a7159ca09af9b1a300a6c8e8b6ff7501c76",
                "filename": "CVE-2024-35810-9a9e8a7159ca09af9b1a300a6c8e8b6ff7501c76.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35810/CVE-2024-35810-9a9e8a7159ca09af9b1a300a6c8e8b6ff7501c76.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ed381800ea6d9a4c7f199235a471c0c48100f0ae",
                "patch_url": "https://git.kernel.org/stable/p/ed381800ea6d9a4c7f199235a471c0c48100f0ae",
                "filename": "CVE-2024-35810-ed381800ea6d9a4c7f199235a471c0c48100f0ae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35810/CVE-2024-35810-ed381800ea6d9a4c7f199235a471c0c48100f0ae.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/104a5b2772bc7c0715ae7355ccf9d294a472765c",
            "https://git.kernel.org/stable/c/86cb706a40b7e6b2221ee49a298a65ad9b46c02d",
            "https://git.kernel.org/stable/c/9a9e8a7159ca09af9b1a300a6c8e8b6ff7501c76",
            "https://git.kernel.org/stable/c/ed381800ea6d9a4c7f199235a471c0c48100f0ae",
            "https://www.cve.org/CVERecord?id=CVE-2024-35810\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35810\nhttps://lore.kernel.org/linux-cve-announce/2024051741-CVE-2024-35810-1b33@gregkh/T"
        ]
    },
    "CVE-2024-35814": {
        "cve": "CVE-2024-35814",
        "cvss_v2": null,
        "cvss_v3": 8.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nswiotlb: Fix double-allocation of slots due to broken alignment handling\n\nCommit bbb73a103fbb (\"swiotlb: fix a braino in the alignment check fix\"),\nwhich was a fix for commit 0eee5ae10256 (\"swiotlb: fix slot alignment\nchecks\"), causes a functional regression with vsock in a virtual machine\nusing bouncing via a restricted DMA SWIOTLB pool.\n\nWhen virtio allocates the virtqueues for the vsock device using\ndma_alloc_coherent(), the SWIOTLB search can return page-unaligned\nallocations if 'area->index' was left unaligned by a previous allocation\nfrom the buffer:\n\n # Final address in brackets is the SWIOTLB address returned to the caller\n | virtio-pci 0000:00:07.0: orig_addr 0x0 alloc_size 0x2000, iotlb_align_mask 0x800 stride 0x2: got slot 1645-1649/7168 (0x98326800)\n | virtio-pci 0000:00:07.0: orig_addr 0x0 alloc_size 0x2000, iotlb_align_mask 0x800 stride 0x2: got slot 1649-1653/7168 (0x98328800)\n | virtio-pci 0000:00:07.0: orig_addr 0x0 alloc_size 0x2000, iotlb_align_mask 0x800 stride 0x2: got slot 1653-1657/7168 (0x9832a800)\n\nThis ends badly (typically buffer corruption and/or a hang) because\nswiotlb_alloc() is expecting a page-aligned allocation and so blindly\nreturns a pointer to the 'struct page' corresponding to the allocation,\ntherefore double-allocating the first half (2KiB slot) of the 4KiB page.\n\nFix the problem by treating the allocation alignment separately to any\nadditional alignment requirements from the device, using the maximum\nof the two as the stride to search the buffer slots and taking care\nto ensure a minimum of page-alignment for buffers larger than a page.\n\nThis also resolves swiotlb allocation failures occuring due to the\ninclusion of ~PAGE_MASK in 'iotlb_align_mask' for large allocations and\nresulting in alignment requirements exceeding swiotlb_max_mapping_size().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35814",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/04867a7a33324c9c562ee7949dbcaab7aaad1fb4",
            "patch_url": "https://git.kernel.org/stable/p/04867a7a33324c9c562ee7949dbcaab7aaad1fb4",
            "filename": "CVE-2024-35814-04867a7a33324c9c562ee7949dbcaab7aaad1fb4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35814/CVE-2024-35814-04867a7a33324c9c562ee7949dbcaab7aaad1fb4.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/04867a7a33324c9c562ee7949dbcaab7aaad1fb4",
                "patch_url": "https://git.kernel.org/stable/p/04867a7a33324c9c562ee7949dbcaab7aaad1fb4",
                "filename": "CVE-2024-35814-04867a7a33324c9c562ee7949dbcaab7aaad1fb4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35814/CVE-2024-35814-04867a7a33324c9c562ee7949dbcaab7aaad1fb4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3e7acd6e25ba77dde48c3b721c54c89cd6a10534",
                "patch_url": "https://git.kernel.org/stable/p/3e7acd6e25ba77dde48c3b721c54c89cd6a10534",
                "filename": "CVE-2024-35814-3e7acd6e25ba77dde48c3b721c54c89cd6a10534.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35814/CVE-2024-35814-3e7acd6e25ba77dde48c3b721c54c89cd6a10534.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/777391743771040e12cc40d3d0d178f70c616491",
                "patch_url": "https://git.kernel.org/stable/p/777391743771040e12cc40d3d0d178f70c616491",
                "filename": "CVE-2024-35814-777391743771040e12cc40d3d0d178f70c616491.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35814/CVE-2024-35814-777391743771040e12cc40d3d0d178f70c616491.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c88668aa6c1da240ea3eb4d128b7906e740d3cb8",
                "patch_url": "https://git.kernel.org/stable/p/c88668aa6c1da240ea3eb4d128b7906e740d3cb8",
                "filename": "CVE-2024-35814-c88668aa6c1da240ea3eb4d128b7906e740d3cb8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35814/CVE-2024-35814-c88668aa6c1da240ea3eb4d128b7906e740d3cb8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/04867a7a33324c9c562ee7949dbcaab7aaad1fb4",
            "https://git.kernel.org/stable/c/3e7acd6e25ba77dde48c3b721c54c89cd6a10534",
            "https://git.kernel.org/stable/c/777391743771040e12cc40d3d0d178f70c616491",
            "https://git.kernel.org/stable/c/c88668aa6c1da240ea3eb4d128b7906e740d3cb8",
            "https://www.cve.org/CVERecord?id=CVE-2024-35814\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35814\nhttps://lore.kernel.org/linux-cve-announce/2024051742-CVE-2024-35814-98c7@gregkh/T"
        ]
    },
    "CVE-2024-35823": {
        "cve": "CVE-2024-35823",
        "cvss_v2": null,
        "cvss_v3": 5.3,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: fix unicode buffer corruption when deleting characters\n\nThis is the same issue that was fixed for the VGA text buffer in commit\n39cdb68c64d8 (\"vt: fix memory overlapping when deleting chars in the\nbuffer\"). The cure is also the same i.e. replace memcpy() with memmove()\ndue to the overlaping buffers.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35823",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/fc7dfe3d123f00e720be80b920da287810a1f37d",
            "patch_url": "https://git.kernel.org/stable/p/fc7dfe3d123f00e720be80b920da287810a1f37d",
            "filename": "CVE-2024-35823-fc7dfe3d123f00e720be80b920da287810a1f37d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35823/CVE-2024-35823-fc7dfe3d123f00e720be80b920da287810a1f37d.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0190d19d7651c08abc187dac3819c61b726e7e3f",
                "patch_url": "https://git.kernel.org/stable/p/0190d19d7651c08abc187dac3819c61b726e7e3f",
                "filename": "CVE-2024-35823-0190d19d7651c08abc187dac3819c61b726e7e3f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35823/CVE-2024-35823-0190d19d7651c08abc187dac3819c61b726e7e3f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1581dafaf0d34bc9c428a794a22110d7046d186d",
                "patch_url": "https://git.kernel.org/stable/p/1581dafaf0d34bc9c428a794a22110d7046d186d",
                "filename": "CVE-2024-35823-1581dafaf0d34bc9c428a794a22110d7046d186d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35823/CVE-2024-35823-1581dafaf0d34bc9c428a794a22110d7046d186d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1ce408f75ccf1e25b3fddef75cca878b55f2ac90",
                "patch_url": "https://git.kernel.org/stable/p/1ce408f75ccf1e25b3fddef75cca878b55f2ac90",
                "filename": "CVE-2024-35823-1ce408f75ccf1e25b3fddef75cca878b55f2ac90.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35823/CVE-2024-35823-1ce408f75ccf1e25b3fddef75cca878b55f2ac90.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2933b1e4757a0a5c689cf48d80b1a2a85f237ff1",
                "patch_url": "https://git.kernel.org/stable/p/2933b1e4757a0a5c689cf48d80b1a2a85f237ff1",
                "filename": "CVE-2024-35823-2933b1e4757a0a5c689cf48d80b1a2a85f237ff1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35823/CVE-2024-35823-2933b1e4757a0a5c689cf48d80b1a2a85f237ff1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7529cbd8b5f6697b369803fe1533612c039cabda",
                "patch_url": "https://git.kernel.org/stable/p/7529cbd8b5f6697b369803fe1533612c039cabda",
                "filename": "CVE-2024-35823-7529cbd8b5f6697b369803fe1533612c039cabda.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35823/CVE-2024-35823-7529cbd8b5f6697b369803fe1533612c039cabda.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/994a1e583c0c206c8ca7d03334a65b79f4d8bc51",
                "patch_url": "https://git.kernel.org/stable/p/994a1e583c0c206c8ca7d03334a65b79f4d8bc51",
                "filename": "CVE-2024-35823-994a1e583c0c206c8ca7d03334a65b79f4d8bc51.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35823/CVE-2024-35823-994a1e583c0c206c8ca7d03334a65b79f4d8bc51.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fc7dfe3d123f00e720be80b920da287810a1f37d",
                "patch_url": "https://git.kernel.org/stable/p/fc7dfe3d123f00e720be80b920da287810a1f37d",
                "filename": "CVE-2024-35823-fc7dfe3d123f00e720be80b920da287810a1f37d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35823/CVE-2024-35823-fc7dfe3d123f00e720be80b920da287810a1f37d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ff7342090c1e8c5a37015c89822a68b275b46f8a",
                "patch_url": "https://git.kernel.org/stable/p/ff7342090c1e8c5a37015c89822a68b275b46f8a",
                "filename": "CVE-2024-35823-ff7342090c1e8c5a37015c89822a68b275b46f8a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35823/CVE-2024-35823-ff7342090c1e8c5a37015c89822a68b275b46f8a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0190d19d7651c08abc187dac3819c61b726e7e3f",
            "https://git.kernel.org/stable/c/1581dafaf0d34bc9c428a794a22110d7046d186d",
            "https://git.kernel.org/stable/c/1ce408f75ccf1e25b3fddef75cca878b55f2ac90",
            "https://git.kernel.org/stable/c/2933b1e4757a0a5c689cf48d80b1a2a85f237ff1",
            "https://git.kernel.org/stable/c/7529cbd8b5f6697b369803fe1533612c039cabda",
            "https://git.kernel.org/stable/c/994a1e583c0c206c8ca7d03334a65b79f4d8bc51",
            "https://git.kernel.org/stable/c/fc7dfe3d123f00e720be80b920da287810a1f37d",
            "https://git.kernel.org/stable/c/ff7342090c1e8c5a37015c89822a68b275b46f8a",
            "https://www.cve.org/CVERecord?id=CVE-2024-35823\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35823\nhttps://lore.kernel.org/linux-cve-announce/2024051745-CVE-2024-35823-1e69@gregkh/T"
        ]
    },
    "CVE-2024-35824": {
        "cve": "CVE-2024-35824",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume\n\nWhen not configured for wakeup lis3lv02d_i2c_suspend() will call\nlis3lv02d_poweroff() even if the device has already been turned off\nby the runtime-suspend handler and if configured for wakeup and\nthe device is runtime-suspended at this point then it is not turned\nback on to serve as a wakeup source.\n\nBefore commit b1b9f7a49440 (\"misc: lis3lv02d_i2c: Add missing setting\nof the reg_ctrl callback\"), lis3lv02d_poweroff() failed to disable\nthe regulators which as a side effect made calling poweroff() twice ok.\n\nNow that poweroff() correctly disables the regulators, doing this twice\ntriggers a WARN() in the regulator core:\n\nunbalanced disables for regulator-dummy\nWARNING: CPU: 1 PID: 92 at drivers/regulator/core.c:2999 _regulator_disable\n...\n\nFix lis3lv02d_i2c_suspend() to not call poweroff() a second time if\nalready runtime-suspended and add a poweron() call when necessary to\nmake wakeup work.\n\nlis3lv02d_i2c_resume() has similar issues, with an added weirness that\nit always powers on the device if it is runtime suspended, after which\nthe first runtime-resume will call poweron() again, causing the enabled\ncount for the regulator to increase by 1 every suspend/resume. These\nunbalanced regulator_enable() calls cause the regulator to never\nbe turned off and trigger the following WARN() on driver unbind:\n\nWARNING: CPU: 1 PID: 1724 at drivers/regulator/core.c:2396 _regulator_put\n\nFix this by making lis3lv02d_i2c_resume() mirror the new suspend().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35824",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4154e767354140db7804207117e7238fb337b0e7",
            "patch_url": "https://git.kernel.org/stable/p/4154e767354140db7804207117e7238fb337b0e7",
            "filename": "CVE-2024-35824-4154e767354140db7804207117e7238fb337b0e7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35824/CVE-2024-35824-4154e767354140db7804207117e7238fb337b0e7.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4154e767354140db7804207117e7238fb337b0e7",
                "patch_url": "https://git.kernel.org/stable/p/4154e767354140db7804207117e7238fb337b0e7",
                "filename": "CVE-2024-35824-4154e767354140db7804207117e7238fb337b0e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35824/CVE-2024-35824-4154e767354140db7804207117e7238fb337b0e7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/997ca415384612c8df76d99d9a768e0b3f42b325",
                "patch_url": "https://git.kernel.org/stable/p/997ca415384612c8df76d99d9a768e0b3f42b325",
                "filename": "CVE-2024-35824-997ca415384612c8df76d99d9a768e0b3f42b325.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35824/CVE-2024-35824-997ca415384612c8df76d99d9a768e0b3f42b325.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ac3e0384073b2408d6cb0d972fee9fcc3776053d",
                "patch_url": "https://git.kernel.org/stable/p/ac3e0384073b2408d6cb0d972fee9fcc3776053d",
                "filename": "CVE-2024-35824-ac3e0384073b2408d6cb0d972fee9fcc3776053d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35824/CVE-2024-35824-ac3e0384073b2408d6cb0d972fee9fcc3776053d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f6df761182fc953907b18aba5049fc2a044ecb45",
                "patch_url": "https://git.kernel.org/stable/p/f6df761182fc953907b18aba5049fc2a044ecb45",
                "filename": "CVE-2024-35824-f6df761182fc953907b18aba5049fc2a044ecb45.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35824/CVE-2024-35824-f6df761182fc953907b18aba5049fc2a044ecb45.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4154e767354140db7804207117e7238fb337b0e7",
            "https://git.kernel.org/stable/c/997ca415384612c8df76d99d9a768e0b3f42b325",
            "https://git.kernel.org/stable/c/ac3e0384073b2408d6cb0d972fee9fcc3776053d",
            "https://git.kernel.org/stable/c/f6df761182fc953907b18aba5049fc2a044ecb45",
            "https://www.cve.org/CVERecord?id=CVE-2024-35824\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35824\nhttps://lore.kernel.org/linux-cve-announce/2024051737-CVE-2024-35824-7302@gregkh/T"
        ]
    },
    "CVE-2024-35835": {
        "cve": "CVE-2024-35835",
        "cvss_v2": null,
        "cvss_v3": 5.3,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: fix a double-free in arfs_create_groups\n\nWhen `in` allocated by kvzalloc fails, arfs_create_groups will free\nft->g and return an error. However, arfs_create_table, the only caller of\narfs_create_groups, will hold this error and call to\nmlx5e_destroy_flow_table, in which the ft->g will be freed again.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35835",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/c57ca114eb00e03274dd38108d07a3750fa3c056",
            "patch_url": "https://git.kernel.org/stable/p/c57ca114eb00e03274dd38108d07a3750fa3c056",
            "filename": "CVE-2024-35835-c57ca114eb00e03274dd38108d07a3750fa3c056.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35835/CVE-2024-35835-c57ca114eb00e03274dd38108d07a3750fa3c056.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2501afe6c4c9829d03abe9a368b83d9ea1b611b7",
                "patch_url": "https://git.kernel.org/stable/p/2501afe6c4c9829d03abe9a368b83d9ea1b611b7",
                "filename": "CVE-2024-35835-2501afe6c4c9829d03abe9a368b83d9ea1b611b7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35835/CVE-2024-35835-2501afe6c4c9829d03abe9a368b83d9ea1b611b7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3c6d5189246f590e4e1f167991558bdb72a4738b",
                "patch_url": "https://git.kernel.org/stable/p/3c6d5189246f590e4e1f167991558bdb72a4738b",
                "filename": "CVE-2024-35835-3c6d5189246f590e4e1f167991558bdb72a4738b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35835/CVE-2024-35835-3c6d5189246f590e4e1f167991558bdb72a4738b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/42876db001bbea7558e8676d1019f08f9390addb",
                "patch_url": "https://git.kernel.org/stable/p/42876db001bbea7558e8676d1019f08f9390addb",
                "filename": "CVE-2024-35835-42876db001bbea7558e8676d1019f08f9390addb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35835/CVE-2024-35835-42876db001bbea7558e8676d1019f08f9390addb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/66cc521a739ccd5da057a1cb3d6346c6d0e7619b",
                "patch_url": "https://git.kernel.org/stable/p/66cc521a739ccd5da057a1cb3d6346c6d0e7619b",
                "filename": "CVE-2024-35835-66cc521a739ccd5da057a1cb3d6346c6d0e7619b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35835/CVE-2024-35835-66cc521a739ccd5da057a1cb3d6346c6d0e7619b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b21db3f1ab7967a81d6bbd328d28fe5a4c07a8a7",
                "patch_url": "https://git.kernel.org/stable/p/b21db3f1ab7967a81d6bbd328d28fe5a4c07a8a7",
                "filename": "CVE-2024-35835-b21db3f1ab7967a81d6bbd328d28fe5a4c07a8a7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35835/CVE-2024-35835-b21db3f1ab7967a81d6bbd328d28fe5a4c07a8a7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c57ca114eb00e03274dd38108d07a3750fa3c056",
                "patch_url": "https://git.kernel.org/stable/p/c57ca114eb00e03274dd38108d07a3750fa3c056",
                "filename": "CVE-2024-35835-c57ca114eb00e03274dd38108d07a3750fa3c056.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35835/CVE-2024-35835-c57ca114eb00e03274dd38108d07a3750fa3c056.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf116d9c3c2aebd653c2dfab5b10c278e9ec3ee5",
                "patch_url": "https://git.kernel.org/stable/p/cf116d9c3c2aebd653c2dfab5b10c278e9ec3ee5",
                "filename": "CVE-2024-35835-cf116d9c3c2aebd653c2dfab5b10c278e9ec3ee5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35835/CVE-2024-35835-cf116d9c3c2aebd653c2dfab5b10c278e9ec3ee5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e3d3ed8c152971dbe64c92c9ecb98fdb52abb629",
                "patch_url": "https://git.kernel.org/stable/p/e3d3ed8c152971dbe64c92c9ecb98fdb52abb629",
                "filename": "CVE-2024-35835-e3d3ed8c152971dbe64c92c9ecb98fdb52abb629.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35835/CVE-2024-35835-e3d3ed8c152971dbe64c92c9ecb98fdb52abb629.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2501afe6c4c9829d03abe9a368b83d9ea1b611b7",
            "https://git.kernel.org/stable/c/3c6d5189246f590e4e1f167991558bdb72a4738b",
            "https://git.kernel.org/stable/c/42876db001bbea7558e8676d1019f08f9390addb",
            "https://git.kernel.org/stable/c/66cc521a739ccd5da057a1cb3d6346c6d0e7619b",
            "https://git.kernel.org/stable/c/b21db3f1ab7967a81d6bbd328d28fe5a4c07a8a7",
            "https://git.kernel.org/stable/c/c57ca114eb00e03274dd38108d07a3750fa3c056",
            "https://git.kernel.org/stable/c/cf116d9c3c2aebd653c2dfab5b10c278e9ec3ee5",
            "https://git.kernel.org/stable/c/e3d3ed8c152971dbe64c92c9ecb98fdb52abb629",
            "https://www.cve.org/CVERecord?id=CVE-2024-35835\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35835\nhttps://lore.kernel.org/linux-cve-announce/2024051730-CVE-2024-35835-d75f@gregkh/T"
        ]
    },
    "CVE-2024-35838": {
        "cve": "CVE-2024-35838",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix potential sta-link leak\n\nWhen a station is allocated, links are added but not\nset to valid yet (e.g. during connection to an AP MLD),\nwe might remove the station without ever marking links\nvalid, and leak them. Fix that.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35838",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/49aaeb8c539b1633b3bd7c2df131ec578aa1eae1",
            "patch_url": "https://git.kernel.org/stable/p/49aaeb8c539b1633b3bd7c2df131ec578aa1eae1",
            "filename": "CVE-2024-35838-49aaeb8c539b1633b3bd7c2df131ec578aa1eae1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35838/CVE-2024-35838-49aaeb8c539b1633b3bd7c2df131ec578aa1eae1.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/49aaeb8c539b1633b3bd7c2df131ec578aa1eae1",
                "patch_url": "https://git.kernel.org/stable/p/49aaeb8c539b1633b3bd7c2df131ec578aa1eae1",
                "filename": "CVE-2024-35838-49aaeb8c539b1633b3bd7c2df131ec578aa1eae1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35838/CVE-2024-35838-49aaeb8c539b1633b3bd7c2df131ec578aa1eae1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/587c5892976108674bbe61a8ff659de279318034",
                "patch_url": "https://git.kernel.org/stable/p/587c5892976108674bbe61a8ff659de279318034",
                "filename": "CVE-2024-35838-587c5892976108674bbe61a8ff659de279318034.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35838/CVE-2024-35838-587c5892976108674bbe61a8ff659de279318034.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b01a74b3ca6fd51b62c67733ba7c3280fa6c5d26",
                "patch_url": "https://git.kernel.org/stable/p/b01a74b3ca6fd51b62c67733ba7c3280fa6c5d26",
                "filename": "CVE-2024-35838-b01a74b3ca6fd51b62c67733ba7c3280fa6c5d26.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35838/CVE-2024-35838-b01a74b3ca6fd51b62c67733ba7c3280fa6c5d26.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e04bf59bdba0fa45d52160be676114e16be855a9",
                "patch_url": "https://git.kernel.org/stable/p/e04bf59bdba0fa45d52160be676114e16be855a9",
                "filename": "CVE-2024-35838-e04bf59bdba0fa45d52160be676114e16be855a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35838/CVE-2024-35838-e04bf59bdba0fa45d52160be676114e16be855a9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/49aaeb8c539b1633b3bd7c2df131ec578aa1eae1",
            "https://git.kernel.org/stable/c/587c5892976108674bbe61a8ff659de279318034",
            "https://git.kernel.org/stable/c/b01a74b3ca6fd51b62c67733ba7c3280fa6c5d26",
            "https://git.kernel.org/stable/c/e04bf59bdba0fa45d52160be676114e16be855a9",
            "https://www.cve.org/CVERecord?id=CVE-2024-35838\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35838\nhttps://lore.kernel.org/linux-cve-announce/2024051731-CVE-2024-35838-d072@gregkh/T"
        ]
    },
    "CVE-2024-35839": {
        "cve": "CVE-2024-35839",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: bridge: replace physindev with physinif in nf_bridge_info\n\nAn skb can be added to a neigh->arp_queue while waiting for an arp\nreply. Where original skb's skb->dev can be different to neigh's\nneigh->dev. For instance in case of bridging dnated skb from one veth to\nanother, the skb would be added to a neigh->arp_queue of the bridge.\n\nAs skb->dev can be reset back to nf_bridge->physindev and used, and as\nthere is no explicit mechanism that prevents this physindev from been\nfreed under us (for instance neigh_flush_dev doesn't cleanup skbs from\ndifferent device's neigh queue) we can crash on e.g. this stack:\n\narp_process\n  neigh_update\n    skb = __skb_dequeue(&neigh->arp_queue)\n      neigh_resolve_output(..., skb)\n        ...\n          br_nf_dev_xmit\n            br_nf_pre_routing_finish_bridge_slow\n              skb->dev = nf_bridge->physindev\n              br_handle_frame_finish\n\nLet's use plain ifindex instead of net_device link. To peek into the\noriginal net_device we will use dev_get_by_index_rcu(). Thus either we\nget device and are safe to use it or we don't get it and drop skb.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35839",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/544add1f1cfb78c3dfa3e6edcf4668f6be5e730c",
            "patch_url": "https://git.kernel.org/stable/p/544add1f1cfb78c3dfa3e6edcf4668f6be5e730c",
            "filename": "CVE-2024-35839-544add1f1cfb78c3dfa3e6edcf4668f6be5e730c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35839/CVE-2024-35839-544add1f1cfb78c3dfa3e6edcf4668f6be5e730c.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/544add1f1cfb78c3dfa3e6edcf4668f6be5e730c",
                "patch_url": "https://git.kernel.org/stable/p/544add1f1cfb78c3dfa3e6edcf4668f6be5e730c",
                "filename": "CVE-2024-35839-544add1f1cfb78c3dfa3e6edcf4668f6be5e730c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35839/CVE-2024-35839-544add1f1cfb78c3dfa3e6edcf4668f6be5e730c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7ae19ee81ca56b13c50a78de6c47d5b8fdc9d97b",
                "patch_url": "https://git.kernel.org/stable/p/7ae19ee81ca56b13c50a78de6c47d5b8fdc9d97b",
                "filename": "CVE-2024-35839-7ae19ee81ca56b13c50a78de6c47d5b8fdc9d97b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35839/CVE-2024-35839-7ae19ee81ca56b13c50a78de6c47d5b8fdc9d97b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9325e3188a9cf3f69fc6f32af59844bbc5b90547",
                "patch_url": "https://git.kernel.org/stable/p/9325e3188a9cf3f69fc6f32af59844bbc5b90547",
                "filename": "CVE-2024-35839-9325e3188a9cf3f69fc6f32af59844bbc5b90547.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35839/CVE-2024-35839-9325e3188a9cf3f69fc6f32af59844bbc5b90547.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9874808878d9eed407e3977fd11fee49de1e1d86",
                "patch_url": "https://git.kernel.org/stable/p/9874808878d9eed407e3977fd11fee49de1e1d86",
                "filename": "CVE-2024-35839-9874808878d9eed407e3977fd11fee49de1e1d86.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35839/CVE-2024-35839-9874808878d9eed407e3977fd11fee49de1e1d86.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/544add1f1cfb78c3dfa3e6edcf4668f6be5e730c",
            "https://git.kernel.org/stable/c/7ae19ee81ca56b13c50a78de6c47d5b8fdc9d97b",
            "https://git.kernel.org/stable/c/9325e3188a9cf3f69fc6f32af59844bbc5b90547",
            "https://git.kernel.org/stable/c/9874808878d9eed407e3977fd11fee49de1e1d86",
            "https://www.cve.org/CVERecord?id=CVE-2024-35839\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35839\nhttps://lore.kernel.org/linux-cve-announce/2024051756-CVE-2024-35839-4194@gregkh/T"
        ]
    },
    "CVE-2024-35845": {
        "cve": "CVE-2024-35845",
        "cvss_v2": null,
        "cvss_v3": 9.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: dbg-tlv: ensure NUL termination\n\nThe iwl_fw_ini_debug_info_tlv is used as a string, so we must\nensure the string is terminated correctly before using it.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35845",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/71d4186d470e9cda7cd1a0921b4afda737c6f641",
            "patch_url": "https://git.kernel.org/stable/p/71d4186d470e9cda7cd1a0921b4afda737c6f641",
            "filename": "CVE-2024-35845-71d4186d470e9cda7cd1a0921b4afda737c6f641.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35845/CVE-2024-35845-71d4186d470e9cda7cd1a0921b4afda737c6f641.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/71d4186d470e9cda7cd1a0921b4afda737c6f641",
                "patch_url": "https://git.kernel.org/stable/p/71d4186d470e9cda7cd1a0921b4afda737c6f641",
                "filename": "CVE-2024-35845-71d4186d470e9cda7cd1a0921b4afda737c6f641.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35845/CVE-2024-35845-71d4186d470e9cda7cd1a0921b4afda737c6f641.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/783d413f332a3ebec916664b366c28f58147f82c",
                "patch_url": "https://git.kernel.org/stable/p/783d413f332a3ebec916664b366c28f58147f82c",
                "filename": "CVE-2024-35845-783d413f332a3ebec916664b366c28f58147f82c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35845/CVE-2024-35845-783d413f332a3ebec916664b366c28f58147f82c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/96aa40761673da045a7774f874487cdb50c6a2f7",
                "patch_url": "https://git.kernel.org/stable/p/96aa40761673da045a7774f874487cdb50c6a2f7",
                "filename": "CVE-2024-35845-96aa40761673da045a7774f874487cdb50c6a2f7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35845/CVE-2024-35845-96aa40761673da045a7774f874487cdb50c6a2f7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c855a1a5b7e3de57e6b1b29563113d5e3bfdb89a",
                "patch_url": "https://git.kernel.org/stable/p/c855a1a5b7e3de57e6b1b29563113d5e3bfdb89a",
                "filename": "CVE-2024-35845-c855a1a5b7e3de57e6b1b29563113d5e3bfdb89a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35845/CVE-2024-35845-c855a1a5b7e3de57e6b1b29563113d5e3bfdb89a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ea1d166fae14e05d49ffb0ea9fcd4658f8d3dcea",
                "patch_url": "https://git.kernel.org/stable/p/ea1d166fae14e05d49ffb0ea9fcd4658f8d3dcea",
                "filename": "CVE-2024-35845-ea1d166fae14e05d49ffb0ea9fcd4658f8d3dcea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35845/CVE-2024-35845-ea1d166fae14e05d49ffb0ea9fcd4658f8d3dcea.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fabe2db7de32a881e437ee69db32e0de785a6209",
                "patch_url": "https://git.kernel.org/stable/p/fabe2db7de32a881e437ee69db32e0de785a6209",
                "filename": "CVE-2024-35845-fabe2db7de32a881e437ee69db32e0de785a6209.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35845/CVE-2024-35845-fabe2db7de32a881e437ee69db32e0de785a6209.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fec14d1cdd92f340b9ba2bd220abf96f9609f2a9",
                "patch_url": "https://git.kernel.org/stable/p/fec14d1cdd92f340b9ba2bd220abf96f9609f2a9",
                "filename": "CVE-2024-35845-fec14d1cdd92f340b9ba2bd220abf96f9609f2a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35845/CVE-2024-35845-fec14d1cdd92f340b9ba2bd220abf96f9609f2a9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/71d4186d470e9cda7cd1a0921b4afda737c6f641",
            "https://git.kernel.org/stable/c/783d413f332a3ebec916664b366c28f58147f82c",
            "https://git.kernel.org/stable/c/96aa40761673da045a7774f874487cdb50c6a2f7",
            "https://git.kernel.org/stable/c/c855a1a5b7e3de57e6b1b29563113d5e3bfdb89a",
            "https://git.kernel.org/stable/c/ea1d166fae14e05d49ffb0ea9fcd4658f8d3dcea",
            "https://git.kernel.org/stable/c/fabe2db7de32a881e437ee69db32e0de785a6209",
            "https://git.kernel.org/stable/c/fec14d1cdd92f340b9ba2bd220abf96f9609f2a9",
            "https://www.cve.org/CVERecord?id=CVE-2024-35845\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35845\nhttps://lore.kernel.org/linux-cve-announce/2024051718-CVE-2024-35845-65bd@gregkh/T"
        ]
    },
    "CVE-2024-35847": {
        "cve": "CVE-2024-35847",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v3-its: Prevent double free on error\n\nThe error handling path in its_vpe_irq_domain_alloc() causes a double free\nwhen its_vpe_init() fails after successfully allocating at least one\ninterrupt. This happens because its_vpe_irq_domain_free() frees the\ninterrupts along with the area bitmap and the vprop_page and\nits_vpe_irq_domain_alloc() subsequently frees the area bitmap and the\nvprop_page again.\n\nFix this by unconditionally invoking its_vpe_irq_domain_free() which\nhandles all cases correctly and by removing the bitmap/vprop_page freeing\nfrom its_vpe_irq_domain_alloc().\n\n[ tglx: Massaged change log ]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35847",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/03170e657f62c26834172742492a8cb8077ef792",
            "patch_url": "https://git.kernel.org/stable/p/03170e657f62c26834172742492a8cb8077ef792",
            "filename": "CVE-2024-35847-03170e657f62c26834172742492a8cb8077ef792.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35847/CVE-2024-35847-03170e657f62c26834172742492a8cb8077ef792.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/03170e657f62c26834172742492a8cb8077ef792",
                "patch_url": "https://git.kernel.org/stable/p/03170e657f62c26834172742492a8cb8077ef792",
                "filename": "CVE-2024-35847-03170e657f62c26834172742492a8cb8077ef792.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35847/CVE-2024-35847-03170e657f62c26834172742492a8cb8077ef792.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5b012f77abde89bf0be8a0547636184fea618137",
                "patch_url": "https://git.kernel.org/stable/p/5b012f77abde89bf0be8a0547636184fea618137",
                "filename": "CVE-2024-35847-5b012f77abde89bf0be8a0547636184fea618137.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35847/CVE-2024-35847-5b012f77abde89bf0be8a0547636184fea618137.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5dbdbe1133911ca7d8466bb86885adec32ad9438",
                "patch_url": "https://git.kernel.org/stable/p/5dbdbe1133911ca7d8466bb86885adec32ad9438",
                "filename": "CVE-2024-35847-5dbdbe1133911ca7d8466bb86885adec32ad9438.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35847/CVE-2024-35847-5dbdbe1133911ca7d8466bb86885adec32ad9438.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aa44d21574751a7d6bca892eb8e0e9ac68372e52",
                "patch_url": "https://git.kernel.org/stable/p/aa44d21574751a7d6bca892eb8e0e9ac68372e52",
                "filename": "CVE-2024-35847-aa44d21574751a7d6bca892eb8e0e9ac68372e52.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35847/CVE-2024-35847-aa44d21574751a7d6bca892eb8e0e9ac68372e52.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b72d2b1448b682844f995e660b77f2a1fabc1662",
                "patch_url": "https://git.kernel.org/stable/p/b72d2b1448b682844f995e660b77f2a1fabc1662",
                "filename": "CVE-2024-35847-b72d2b1448b682844f995e660b77f2a1fabc1662.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35847/CVE-2024-35847-b72d2b1448b682844f995e660b77f2a1fabc1662.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c26591afd33adce296c022e3480dea4282b7ef91",
                "patch_url": "https://git.kernel.org/stable/p/c26591afd33adce296c022e3480dea4282b7ef91",
                "filename": "CVE-2024-35847-c26591afd33adce296c022e3480dea4282b7ef91.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35847/CVE-2024-35847-c26591afd33adce296c022e3480dea4282b7ef91.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dd681710ab77c8beafe2e263064cb1bd0e2d6ca9",
                "patch_url": "https://git.kernel.org/stable/p/dd681710ab77c8beafe2e263064cb1bd0e2d6ca9",
                "filename": "CVE-2024-35847-dd681710ab77c8beafe2e263064cb1bd0e2d6ca9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35847/CVE-2024-35847-dd681710ab77c8beafe2e263064cb1bd0e2d6ca9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f5417ff561b8ac9a7e53c747b8627a7ab58378ae",
                "patch_url": "https://git.kernel.org/stable/p/f5417ff561b8ac9a7e53c747b8627a7ab58378ae",
                "filename": "CVE-2024-35847-f5417ff561b8ac9a7e53c747b8627a7ab58378ae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35847/CVE-2024-35847-f5417ff561b8ac9a7e53c747b8627a7ab58378ae.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/03170e657f62c26834172742492a8cb8077ef792",
            "https://git.kernel.org/stable/c/5b012f77abde89bf0be8a0547636184fea618137",
            "https://git.kernel.org/stable/c/5dbdbe1133911ca7d8466bb86885adec32ad9438",
            "https://git.kernel.org/stable/c/aa44d21574751a7d6bca892eb8e0e9ac68372e52",
            "https://git.kernel.org/stable/c/b72d2b1448b682844f995e660b77f2a1fabc1662",
            "https://git.kernel.org/stable/c/c26591afd33adce296c022e3480dea4282b7ef91",
            "https://git.kernel.org/stable/c/dd681710ab77c8beafe2e263064cb1bd0e2d6ca9",
            "https://git.kernel.org/stable/c/f5417ff561b8ac9a7e53c747b8627a7ab58378ae",
            "https://www.cve.org/CVERecord?id=CVE-2024-35847\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35847\nhttps://lore.kernel.org/linux-cve-announce/2024051738-CVE-2024-35847-7e4b@gregkh/T"
        ]
    },
    "CVE-2024-35852": {
        "cve": "CVE-2024-35852",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work\n\nThe rehash delayed work is rescheduled with a delay if the number of\ncredits at end of the work is not negative as supposedly it means that\nthe migration ended. Otherwise, it is rescheduled immediately.\n\nAfter \"mlxsw: spectrum_acl_tcam: Fix possible use-after-free during\nrehash\" the above is no longer accurate as a non-negative number of\ncredits is no longer indicative of the migration being done. It can also\nhappen if the work encountered an error in which case the migration will\nresume the next time the work is scheduled.\n\nThe significance of the above is that it is possible for the work to be\npending and associated with hints that were allocated when the migration\nstarted. This leads to the hints being leaked [1] when the work is\ncanceled while pending as part of ACL region dismantle.\n\nFix by freeing the hints if hints are associated with a work that was\ncanceled while pending.\n\nBlame the original commit since the reliance on not having a pending\nwork associated with hints is fragile.\n\n[1]\nunreferenced object 0xffff88810e7c3000 (size 256):\n  comm \"kworker/0:16\", pid 176, jiffies 4295460353\n  hex dump (first 32 bytes):\n    00 30 95 11 81 88 ff ff 61 00 00 00 00 00 00 80  .0......a.......\n    00 00 61 00 40 00 00 00 00 00 00 00 04 00 00 00  ..a.@...........\n  backtrace (crc 2544ddb9):\n    [<00000000cf8cfab3>] kmalloc_trace+0x23f/0x2a0\n    [<000000004d9a1ad9>] objagg_hints_get+0x42/0x390\n    [<000000000b143cf3>] mlxsw_sp_acl_erp_rehash_hints_get+0xca/0x400\n    [<0000000059bdb60a>] mlxsw_sp_acl_tcam_vregion_rehash_work+0x868/0x1160\n    [<00000000e81fd734>] process_one_work+0x59c/0xf20\n    [<00000000ceee9e81>] worker_thread+0x799/0x12c0\n    [<00000000bda6fe39>] kthread+0x246/0x300\n    [<0000000070056d23>] ret_from_fork+0x34/0x70\n    [<00000000dea2b93e>] ret_from_fork_asm+0x1a/0x30",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35852",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/51cefc9da400b953fee749c9e5d26cd4a2b5d758",
            "patch_url": "https://git.kernel.org/stable/p/51cefc9da400b953fee749c9e5d26cd4a2b5d758",
            "filename": "CVE-2024-35852-51cefc9da400b953fee749c9e5d26cd4a2b5d758.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35852/CVE-2024-35852-51cefc9da400b953fee749c9e5d26cd4a2b5d758.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/51cefc9da400b953fee749c9e5d26cd4a2b5d758",
                "patch_url": "https://git.kernel.org/stable/p/51cefc9da400b953fee749c9e5d26cd4a2b5d758",
                "filename": "CVE-2024-35852-51cefc9da400b953fee749c9e5d26cd4a2b5d758.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35852/CVE-2024-35852-51cefc9da400b953fee749c9e5d26cd4a2b5d758.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5bfe7bf9656ed2633718388f12b7c38b86414a04",
                "patch_url": "https://git.kernel.org/stable/p/5bfe7bf9656ed2633718388f12b7c38b86414a04",
                "filename": "CVE-2024-35852-5bfe7bf9656ed2633718388f12b7c38b86414a04.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35852/CVE-2024-35852-5bfe7bf9656ed2633718388f12b7c38b86414a04.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/63d814d93c5cce4c18284adc810028f28dca493f",
                "patch_url": "https://git.kernel.org/stable/p/63d814d93c5cce4c18284adc810028f28dca493f",
                "filename": "CVE-2024-35852-63d814d93c5cce4c18284adc810028f28dca493f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35852/CVE-2024-35852-63d814d93c5cce4c18284adc810028f28dca493f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/857ed800133ffcfcee28582090b63b0cbb8ba59d",
                "patch_url": "https://git.kernel.org/stable/p/857ed800133ffcfcee28582090b63b0cbb8ba59d",
                "filename": "CVE-2024-35852-857ed800133ffcfcee28582090b63b0cbb8ba59d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35852/CVE-2024-35852-857ed800133ffcfcee28582090b63b0cbb8ba59d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d72dd6fcd7886d0523afbab8b4a4b22d17addd7d",
                "patch_url": "https://git.kernel.org/stable/p/d72dd6fcd7886d0523afbab8b4a4b22d17addd7d",
                "filename": "CVE-2024-35852-d72dd6fcd7886d0523afbab8b4a4b22d17addd7d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35852/CVE-2024-35852-d72dd6fcd7886d0523afbab8b4a4b22d17addd7d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/de1aaefa75be9d0ec19c9a3e0e2f9696de20c6ab",
                "patch_url": "https://git.kernel.org/stable/p/de1aaefa75be9d0ec19c9a3e0e2f9696de20c6ab",
                "filename": "CVE-2024-35852-de1aaefa75be9d0ec19c9a3e0e2f9696de20c6ab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35852/CVE-2024-35852-de1aaefa75be9d0ec19c9a3e0e2f9696de20c6ab.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fb4e2b70a7194b209fc7320bbf33b375f7114bd5",
                "patch_url": "https://git.kernel.org/stable/p/fb4e2b70a7194b209fc7320bbf33b375f7114bd5",
                "filename": "CVE-2024-35852-fb4e2b70a7194b209fc7320bbf33b375f7114bd5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35852/CVE-2024-35852-fb4e2b70a7194b209fc7320bbf33b375f7114bd5.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/51cefc9da400b953fee749c9e5d26cd4a2b5d758",
            "https://git.kernel.org/stable/c/5bfe7bf9656ed2633718388f12b7c38b86414a04",
            "https://git.kernel.org/stable/c/63d814d93c5cce4c18284adc810028f28dca493f",
            "https://git.kernel.org/stable/c/857ed800133ffcfcee28582090b63b0cbb8ba59d",
            "https://git.kernel.org/stable/c/d72dd6fcd7886d0523afbab8b4a4b22d17addd7d",
            "https://git.kernel.org/stable/c/de1aaefa75be9d0ec19c9a3e0e2f9696de20c6ab",
            "https://git.kernel.org/stable/c/fb4e2b70a7194b209fc7320bbf33b375f7114bd5",
            "https://www.cve.org/CVERecord?id=CVE-2024-35852\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35852\nhttps://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35852-9e9a@gregkh/T"
        ]
    },
    "CVE-2024-35853": {
        "cve": "CVE-2024-35853",
        "cvss_v2": null,
        "cvss_v3": 6.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix memory leak during rehash\n\nThe rehash delayed work migrates filters from one region to another.\nThis is done by iterating over all chunks (all the filters with the same\npriority) in the region and in each chunk iterating over all the\nfilters.\n\nIf the migration fails, the code tries to migrate the filters back to\nthe old region. However, the rollback itself can also fail in which case\nanother migration will be erroneously performed. Besides the fact that\nthis ping pong is not a very good idea, it also creates a problem.\n\nEach virtual chunk references two chunks: The currently used one\n('vchunk->chunk') and a backup ('vchunk->chunk2'). During migration the\nfirst holds the chunk we want to migrate filters to and the second holds\nthe chunk we are migrating filters from.\n\nThe code currently assumes - but does not verify - that the backup chunk\ndoes not exist (NULL) if the currently used chunk does not reference the\ntarget region. This assumption breaks when we are trying to rollback a\nrollback, resulting in the backup chunk being overwritten and leaked\n[1].\n\nFix by not rolling back a failed rollback and add a warning to avoid\nfuture cases.\n\n[1]\nWARNING: CPU: 5 PID: 1063 at lib/parman.c:291 parman_destroy+0x17/0x20\nModules linked in:\nCPU: 5 PID: 1063 Comm: kworker/5:11 Tainted: G        W          6.9.0-rc2-custom-00784-gc6a05c468a0b #14\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nRIP: 0010:parman_destroy+0x17/0x20\n[...]\nCall Trace:\n <TASK>\n mlxsw_sp_acl_atcam_region_fini+0x19/0x60\n mlxsw_sp_acl_tcam_region_destroy+0x49/0xf0\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x1f1/0x470\n process_one_work+0x151/0x370\n worker_thread+0x2cb/0x3e0\n kthread+0xd0/0x100\n ret_from_fork+0x34/0x50\n ret_from_fork_asm+0x1a/0x30\n </TASK>",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35853",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/b822644fd90992ee362c5e0c8d2556efc8856c76",
            "patch_url": "https://git.kernel.org/stable/p/b822644fd90992ee362c5e0c8d2556efc8856c76",
            "filename": "CVE-2024-35853-b822644fd90992ee362c5e0c8d2556efc8856c76.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35853/CVE-2024-35853-b822644fd90992ee362c5e0c8d2556efc8856c76.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0ae8ff7b6d42e33943af462910bdcfa2ec0cb8cf",
                "patch_url": "https://git.kernel.org/stable/p/0ae8ff7b6d42e33943af462910bdcfa2ec0cb8cf",
                "filename": "CVE-2024-35853-0ae8ff7b6d42e33943af462910bdcfa2ec0cb8cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35853/CVE-2024-35853-0ae8ff7b6d42e33943af462910bdcfa2ec0cb8cf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/413a01886c3958d4b8aac23a3bff3d430b92093e",
                "patch_url": "https://git.kernel.org/stable/p/413a01886c3958d4b8aac23a3bff3d430b92093e",
                "filename": "CVE-2024-35853-413a01886c3958d4b8aac23a3bff3d430b92093e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35853/CVE-2024-35853-413a01886c3958d4b8aac23a3bff3d430b92093e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/617e98ba4c50f4547c9eb0946b1cfc26937d70d1",
                "patch_url": "https://git.kernel.org/stable/p/617e98ba4c50f4547c9eb0946b1cfc26937d70d1",
                "filename": "CVE-2024-35853-617e98ba4c50f4547c9eb0946b1cfc26937d70d1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35853/CVE-2024-35853-617e98ba4c50f4547c9eb0946b1cfc26937d70d1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8ca3f7a7b61393804c46f170743c3b839df13977",
                "patch_url": "https://git.kernel.org/stable/p/8ca3f7a7b61393804c46f170743c3b839df13977",
                "filename": "CVE-2024-35853-8ca3f7a7b61393804c46f170743c3b839df13977.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35853/CVE-2024-35853-8ca3f7a7b61393804c46f170743c3b839df13977.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b3fd51f684a0711504f82de510da109ae639722d",
                "patch_url": "https://git.kernel.org/stable/p/b3fd51f684a0711504f82de510da109ae639722d",
                "filename": "CVE-2024-35853-b3fd51f684a0711504f82de510da109ae639722d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35853/CVE-2024-35853-b3fd51f684a0711504f82de510da109ae639722d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b822644fd90992ee362c5e0c8d2556efc8856c76",
                "patch_url": "https://git.kernel.org/stable/p/b822644fd90992ee362c5e0c8d2556efc8856c76",
                "filename": "CVE-2024-35853-b822644fd90992ee362c5e0c8d2556efc8856c76.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35853/CVE-2024-35853-b822644fd90992ee362c5e0c8d2556efc8856c76.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c6f3fa7f5a748bf6e5c4eb742686d6952f854e76",
                "patch_url": "https://git.kernel.org/stable/p/c6f3fa7f5a748bf6e5c4eb742686d6952f854e76",
                "filename": "CVE-2024-35853-c6f3fa7f5a748bf6e5c4eb742686d6952f854e76.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35853/CVE-2024-35853-c6f3fa7f5a748bf6e5c4eb742686d6952f854e76.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0ae8ff7b6d42e33943af462910bdcfa2ec0cb8cf",
            "https://git.kernel.org/stable/c/413a01886c3958d4b8aac23a3bff3d430b92093e",
            "https://git.kernel.org/stable/c/617e98ba4c50f4547c9eb0946b1cfc26937d70d1",
            "https://git.kernel.org/stable/c/8ca3f7a7b61393804c46f170743c3b839df13977",
            "https://git.kernel.org/stable/c/b3fd51f684a0711504f82de510da109ae639722d",
            "https://git.kernel.org/stable/c/b822644fd90992ee362c5e0c8d2556efc8856c76",
            "https://git.kernel.org/stable/c/c6f3fa7f5a748bf6e5c4eb742686d6952f854e76",
            "https://www.cve.org/CVERecord?id=CVE-2024-35853\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35853\nhttps://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35853-869a@gregkh/T"
        ]
    },
    "CVE-2024-35854": {
        "cve": "CVE-2024-35854",
        "cvss_v2": null,
        "cvss_v3": 8.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash\n\nThe rehash delayed work migrates filters from one region to another\naccording to the number of available credits.\n\nThe migrated from region is destroyed at the end of the work if the\nnumber of credits is non-negative as the assumption is that this is\nindicative of migration being complete. This assumption is incorrect as\na non-negative number of credits can also be the result of a failed\nmigration.\n\nThe destruction of a region that still has filters referencing it can\nresult in a use-after-free [1].\n\nFix by not destroying the region if migration failed.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230\nRead of size 8 at addr ffff8881735319e8 by task kworker/0:31/3858\n\nCPU: 0 PID: 3858 Comm: kworker/0:31 Tainted: G        W          6.9.0-rc2-custom-00782-gf2275c2157d8 #5\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nCall Trace:\n <TASK>\n dump_stack_lvl+0xc6/0x120\n print_report+0xce/0x670\n kasan_report+0xd7/0x110\n mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230\n mlxsw_sp_acl_ctcam_entry_del+0x2e/0x70\n mlxsw_sp_acl_atcam_entry_del+0x81/0x210\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x3cd/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\nAllocated by task 174:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x8f/0xa0\n __kmalloc+0x19c/0x360\n mlxsw_sp_acl_tcam_region_create+0xdf/0x9c0\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x954/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 7:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x60\n poison_slab_object+0x102/0x170\n __kasan_slab_free+0x14/0x30\n kfree+0xc1/0x290\n mlxsw_sp_acl_tcam_region_destroy+0x272/0x310\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x731/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35854",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/813e2ab753a8f8c243a39ede20c2e0adc15f3887",
            "patch_url": "https://git.kernel.org/stable/p/813e2ab753a8f8c243a39ede20c2e0adc15f3887",
            "filename": "CVE-2024-35854-813e2ab753a8f8c243a39ede20c2e0adc15f3887.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35854/CVE-2024-35854-813e2ab753a8f8c243a39ede20c2e0adc15f3887.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/311eeaa7b9e26aba5b3d57b09859f07d8e9fc049",
                "patch_url": "https://git.kernel.org/stable/p/311eeaa7b9e26aba5b3d57b09859f07d8e9fc049",
                "filename": "CVE-2024-35854-311eeaa7b9e26aba5b3d57b09859f07d8e9fc049.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35854/CVE-2024-35854-311eeaa7b9e26aba5b3d57b09859f07d8e9fc049.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4c89642ca47fb620914780c7c51d8d1248201121",
                "patch_url": "https://git.kernel.org/stable/p/4c89642ca47fb620914780c7c51d8d1248201121",
                "filename": "CVE-2024-35854-4c89642ca47fb620914780c7c51d8d1248201121.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35854/CVE-2024-35854-4c89642ca47fb620914780c7c51d8d1248201121.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/54225988889931467a9b55fdbef534079b665519",
                "patch_url": "https://git.kernel.org/stable/p/54225988889931467a9b55fdbef534079b665519",
                "filename": "CVE-2024-35854-54225988889931467a9b55fdbef534079b665519.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35854/CVE-2024-35854-54225988889931467a9b55fdbef534079b665519.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/813e2ab753a8f8c243a39ede20c2e0adc15f3887",
                "patch_url": "https://git.kernel.org/stable/p/813e2ab753a8f8c243a39ede20c2e0adc15f3887",
                "filename": "CVE-2024-35854-813e2ab753a8f8c243a39ede20c2e0adc15f3887.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35854/CVE-2024-35854-813e2ab753a8f8c243a39ede20c2e0adc15f3887.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a02687044e124f8ccb427cd3632124a4e1a7d7c1",
                "patch_url": "https://git.kernel.org/stable/p/a02687044e124f8ccb427cd3632124a4e1a7d7c1",
                "filename": "CVE-2024-35854-a02687044e124f8ccb427cd3632124a4e1a7d7c1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35854/CVE-2024-35854-a02687044e124f8ccb427cd3632124a4e1a7d7c1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a429a912d6c779807f4d72a6cc0a1efaaa3613e1",
                "patch_url": "https://git.kernel.org/stable/p/a429a912d6c779807f4d72a6cc0a1efaaa3613e1",
                "filename": "CVE-2024-35854-a429a912d6c779807f4d72a6cc0a1efaaa3613e1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35854/CVE-2024-35854-a429a912d6c779807f4d72a6cc0a1efaaa3613e1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e118e7ea24d1392878ef85926627c6bc640c4388",
                "patch_url": "https://git.kernel.org/stable/p/e118e7ea24d1392878ef85926627c6bc640c4388",
                "filename": "CVE-2024-35854-e118e7ea24d1392878ef85926627c6bc640c4388.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35854/CVE-2024-35854-e118e7ea24d1392878ef85926627c6bc640c4388.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/311eeaa7b9e26aba5b3d57b09859f07d8e9fc049",
            "https://git.kernel.org/stable/c/4c89642ca47fb620914780c7c51d8d1248201121",
            "https://git.kernel.org/stable/c/54225988889931467a9b55fdbef534079b665519",
            "https://git.kernel.org/stable/c/813e2ab753a8f8c243a39ede20c2e0adc15f3887",
            "https://git.kernel.org/stable/c/a02687044e124f8ccb427cd3632124a4e1a7d7c1",
            "https://git.kernel.org/stable/c/a429a912d6c779807f4d72a6cc0a1efaaa3613e1",
            "https://git.kernel.org/stable/c/e118e7ea24d1392878ef85926627c6bc640c4388",
            "https://www.cve.org/CVERecord?id=CVE-2024-35854\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35854\nhttps://lore.kernel.org/linux-cve-announce/2024051740-CVE-2024-35854-d17b@gregkh/T"
        ]
    },
    "CVE-2024-35855": {
        "cve": "CVE-2024-35855",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update\n\nThe rule activity update delayed work periodically traverses the list of\nconfigured rules and queries their activity from the device.\n\nAs part of this task it accesses the entry pointed by 'ventry->entry',\nbut this entry can be changed concurrently by the rehash delayed work,\nleading to a use-after-free [1].\n\nFix by closing the race and perform the activity query under the\n'vregion->lock' mutex.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_acl_tcam_flower_rule_activity_get+0x121/0x140\nRead of size 8 at addr ffff8881054ed808 by task kworker/0:18/181\n\nCPU: 0 PID: 181 Comm: kworker/0:18 Not tainted 6.9.0-rc2-custom-00781-gd5ab772d32f7 #2\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_rule_activity_update_work\nCall Trace:\n <TASK>\n dump_stack_lvl+0xc6/0x120\n print_report+0xce/0x670\n kasan_report+0xd7/0x110\n mlxsw_sp_acl_tcam_flower_rule_activity_get+0x121/0x140\n mlxsw_sp_acl_rule_activity_update_work+0x219/0x400\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\nAllocated by task 1039:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x8f/0xa0\n __kmalloc+0x19c/0x360\n mlxsw_sp_acl_tcam_entry_create+0x7b/0x1f0\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x30d/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 1039:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x60\n poison_slab_object+0x102/0x170\n __kasan_slab_free+0x14/0x30\n kfree+0xc1/0x290\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x3d7/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35855",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/b996e8699da810e4c915841d6aaef761007f933a",
            "patch_url": "https://git.kernel.org/stable/p/b996e8699da810e4c915841d6aaef761007f933a",
            "filename": "CVE-2024-35855-b996e8699da810e4c915841d6aaef761007f933a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35855/CVE-2024-35855-b996e8699da810e4c915841d6aaef761007f933a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1b73f6e4ea770410a937a8db98f77e52594d23a0",
                "patch_url": "https://git.kernel.org/stable/p/1b73f6e4ea770410a937a8db98f77e52594d23a0",
                "filename": "CVE-2024-35855-1b73f6e4ea770410a937a8db98f77e52594d23a0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35855/CVE-2024-35855-1b73f6e4ea770410a937a8db98f77e52594d23a0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/79b5b4b18bc85b19d3a518483f9abbbe6d7b3ba4",
                "patch_url": "https://git.kernel.org/stable/p/79b5b4b18bc85b19d3a518483f9abbbe6d7b3ba4",
                "filename": "CVE-2024-35855-79b5b4b18bc85b19d3a518483f9abbbe6d7b3ba4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35855/CVE-2024-35855-79b5b4b18bc85b19d3a518483f9abbbe6d7b3ba4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b183b915beef818a25e3154d719ca015a1ae0770",
                "patch_url": "https://git.kernel.org/stable/p/b183b915beef818a25e3154d719ca015a1ae0770",
                "filename": "CVE-2024-35855-b183b915beef818a25e3154d719ca015a1ae0770.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35855/CVE-2024-35855-b183b915beef818a25e3154d719ca015a1ae0770.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b996e8699da810e4c915841d6aaef761007f933a",
                "patch_url": "https://git.kernel.org/stable/p/b996e8699da810e4c915841d6aaef761007f933a",
                "filename": "CVE-2024-35855-b996e8699da810e4c915841d6aaef761007f933a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35855/CVE-2024-35855-b996e8699da810e4c915841d6aaef761007f933a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c17976b42d546ee118ca300db559630ee96fb758",
                "patch_url": "https://git.kernel.org/stable/p/c17976b42d546ee118ca300db559630ee96fb758",
                "filename": "CVE-2024-35855-c17976b42d546ee118ca300db559630ee96fb758.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35855/CVE-2024-35855-c17976b42d546ee118ca300db559630ee96fb758.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e24d2487424779c02760ff50cd9021b8676e19ef",
                "patch_url": "https://git.kernel.org/stable/p/e24d2487424779c02760ff50cd9021b8676e19ef",
                "filename": "CVE-2024-35855-e24d2487424779c02760ff50cd9021b8676e19ef.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35855/CVE-2024-35855-e24d2487424779c02760ff50cd9021b8676e19ef.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/feabdac2057e863d0e140a2adf3d232eb4882db4",
                "patch_url": "https://git.kernel.org/stable/p/feabdac2057e863d0e140a2adf3d232eb4882db4",
                "filename": "CVE-2024-35855-feabdac2057e863d0e140a2adf3d232eb4882db4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35855/CVE-2024-35855-feabdac2057e863d0e140a2adf3d232eb4882db4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1b73f6e4ea770410a937a8db98f77e52594d23a0",
            "https://git.kernel.org/stable/c/79b5b4b18bc85b19d3a518483f9abbbe6d7b3ba4",
            "https://git.kernel.org/stable/c/b183b915beef818a25e3154d719ca015a1ae0770",
            "https://git.kernel.org/stable/c/b996e8699da810e4c915841d6aaef761007f933a",
            "https://git.kernel.org/stable/c/c17976b42d546ee118ca300db559630ee96fb758",
            "https://git.kernel.org/stable/c/e24d2487424779c02760ff50cd9021b8676e19ef",
            "https://git.kernel.org/stable/c/feabdac2057e863d0e140a2adf3d232eb4882db4",
            "https://www.cve.org/CVERecord?id=CVE-2024-35855\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35855\nhttps://lore.kernel.org/linux-cve-announce/2024051741-CVE-2024-35855-c1fb@gregkh/T"
        ]
    },
    "CVE-2024-35876": {
        "cve": "CVE-2024-35876",
        "cvss_v2": null,
        "cvss_v3": null,
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35876",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/976b1b2680fb4c01aaf05a0623288d87619a6c93",
            "patch_url": "https://git.kernel.org/stable/p/976b1b2680fb4c01aaf05a0623288d87619a6c93",
            "filename": "CVE-2024-35876-976b1b2680fb4c01aaf05a0623288d87619a6c93.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35876/CVE-2024-35876-976b1b2680fb4c01aaf05a0623288d87619a6c93.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/20a915154ccb88da08986ab6c9fc4c1cf6259de2",
                "patch_url": "https://git.kernel.org/stable/p/20a915154ccb88da08986ab6c9fc4c1cf6259de2",
                "filename": "CVE-2024-35876-20a915154ccb88da08986ab6c9fc4c1cf6259de2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35876/CVE-2024-35876-20a915154ccb88da08986ab6c9fc4c1cf6259de2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/32223b0b60d53f49567fc501f91ca076ae96be6b",
                "patch_url": "https://git.kernel.org/stable/p/32223b0b60d53f49567fc501f91ca076ae96be6b",
                "filename": "CVE-2024-35876-32223b0b60d53f49567fc501f91ca076ae96be6b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35876/CVE-2024-35876-32223b0b60d53f49567fc501f91ca076ae96be6b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3ddf944b32f88741c303f0b21459dbb3872b8bc5",
                "patch_url": "https://git.kernel.org/stable/p/3ddf944b32f88741c303f0b21459dbb3872b8bc5",
                "filename": "CVE-2024-35876-3ddf944b32f88741c303f0b21459dbb3872b8bc5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35876/CVE-2024-35876-3ddf944b32f88741c303f0b21459dbb3872b8bc5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5a02df3e92470efd589712925b5c722e730276a0",
                "patch_url": "https://git.kernel.org/stable/p/5a02df3e92470efd589712925b5c722e730276a0",
                "filename": "CVE-2024-35876-5a02df3e92470efd589712925b5c722e730276a0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35876/CVE-2024-35876-5a02df3e92470efd589712925b5c722e730276a0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/976b1b2680fb4c01aaf05a0623288d87619a6c93",
                "patch_url": "https://git.kernel.org/stable/p/976b1b2680fb4c01aaf05a0623288d87619a6c93",
                "filename": "CVE-2024-35876-976b1b2680fb4c01aaf05a0623288d87619a6c93.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35876/CVE-2024-35876-976b1b2680fb4c01aaf05a0623288d87619a6c93.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f5e65b782f3e07324b9a8fa3cdaee422f057c758",
                "patch_url": "https://git.kernel.org/stable/p/f5e65b782f3e07324b9a8fa3cdaee422f057c758",
                "filename": "CVE-2024-35876-f5e65b782f3e07324b9a8fa3cdaee422f057c758.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35876/CVE-2024-35876-f5e65b782f3e07324b9a8fa3cdaee422f057c758.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f860595512ff5c05a29fa4d64169c3fd1186b8cf",
                "patch_url": "https://git.kernel.org/stable/p/f860595512ff5c05a29fa4d64169c3fd1186b8cf",
                "filename": "CVE-2024-35876-f860595512ff5c05a29fa4d64169c3fd1186b8cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35876/CVE-2024-35876-f860595512ff5c05a29fa4d64169c3fd1186b8cf.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/20a915154ccb88da08986ab6c9fc4c1cf6259de2",
            "https://git.kernel.org/stable/c/32223b0b60d53f49567fc501f91ca076ae96be6b",
            "https://git.kernel.org/stable/c/3ddf944b32f88741c303f0b21459dbb3872b8bc5",
            "https://git.kernel.org/stable/c/5a02df3e92470efd589712925b5c722e730276a0",
            "https://git.kernel.org/stable/c/976b1b2680fb4c01aaf05a0623288d87619a6c93",
            "https://git.kernel.org/stable/c/f5e65b782f3e07324b9a8fa3cdaee422f057c758",
            "https://git.kernel.org/stable/c/f860595512ff5c05a29fa4d64169c3fd1186b8cf",
            "https://www.cve.org/CVERecord?id=CVE-2024-35876\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35876\nhttps://lore.kernel.org/linux-cve-announce/2024051943-CVE-2024-35876-d9b5@gregkh/T"
        ]
    },
    "CVE-2024-35877": {
        "cve": "CVE-2024-35877",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm/pat: fix VM_PAT handling in COW mappings\n\nPAT handling won't do the right thing in COW mappings: the first PTE (or,\nin fact, all PTEs) can be replaced during write faults to point at anon\nfolios.  Reliably recovering the correct PFN and cachemode using\nfollow_phys() from PTEs will not work in COW mappings.\n\nUsing follow_phys(), we might just get the address+protection of the anon\nfolio (which is very wrong), or fail on swap/nonswap entries, failing\nfollow_phys() and triggering a WARN_ON_ONCE() in untrack_pfn() and\ntrack_pfn_copy(), not properly calling free_pfn_range().\n\nIn free_pfn_range(), we either wouldn't call memtype_free() or would call\nit with the wrong range, possibly leaking memory.\n\nTo fix that, let's update follow_phys() to refuse returning anon folios,\nand fallback to using the stored PFN inside vma->vm_pgoff for COW mappings\nif we run into that.\n\nWe will now properly handle untrack_pfn() with COW mappings, where we\ndon't need the cachemode.  We'll have to fail fork()->track_pfn_copy() if\nthe first page was replaced by an anon folio, though: we'd have to store\nthe cachemode in the VMA to make this work, likely growing the VMA size.\n\nFor now, lets keep it simple and let track_pfn_copy() just fail in that\ncase: it would have failed in the past with swap/nonswap entries already,\nand it would have done the wrong thing with anon folios.\n\nSimple reproducer to trigger the WARN_ON_ONCE() in untrack_pfn():\n\n<--- C reproducer --->\n #include <stdio.h>\n #include <sys/mman.h>\n #include <unistd.h>\n #include <liburing.h>\n\n int main(void)\n {\n         struct io_uring_params p = {};\n         int ring_fd;\n         size_t size;\n         char *map;\n\n         ring_fd = io_uring_setup(1, &p);\n         if (ring_fd < 0) {\n                 perror(\"io_uring_setup\");\n                 return 1;\n         }\n         size = p.sq_off.array + p.sq_entries * sizeof(unsigned);\n\n         /* Map the submission queue ring MAP_PRIVATE */\n         map = mmap(0, size, PROT_READ | PROT_WRITE, MAP_PRIVATE,\n                    ring_fd, IORING_OFF_SQ_RING);\n         if (map == MAP_FAILED) {\n                 perror(\"mmap\");\n                 return 1;\n         }\n\n         /* We have at least one page. Let's COW it. */\n         *map = 0;\n         pause();\n         return 0;\n }\n<--- C reproducer --->\n\nOn a system with 16 GiB RAM and swap configured:\n # ./iouring &\n # memhog 16G\n # killall iouring\n[  301.552930] ------------[ cut here ]------------\n[  301.553285] WARNING: CPU: 7 PID: 1402 at arch/x86/mm/pat/memtype.c:1060 untrack_pfn+0xf4/0x100\n[  301.553989] Modules linked in: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_g\n[  301.558232] CPU: 7 PID: 1402 Comm: iouring Not tainted 6.7.5-100.fc38.x86_64 #1\n[  301.558772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebu4\n[  301.559569] RIP: 0010:untrack_pfn+0xf4/0x100\n[  301.559893] Code: 75 c4 eb cf 48 8b 43 10 8b a8 e8 00 00 00 3b 6b 28 74 b8 48 8b 7b 30 e8 ea 1a f7 000\n[  301.561189] RSP: 0018:ffffba2c0377fab8 EFLAGS: 00010282\n[  301.561590] RAX: 00000000ffffffea RBX: ffff9208c8ce9cc0 RCX: 000000010455e047\n[  301.562105] RDX: 07fffffff0eb1e0a RSI: 0000000000000000 RDI: ffff9208c391d200\n[  301.562628] RBP: 0000000000000000 R08: ffffba2c0377fab8 R09: 0000000000000000\n[  301.563145] R10: ffff9208d2292d50 R11: 0000000000000002 R12: 00007fea890e0000\n[  301.563669] R13: 0000000000000000 R14: ffffba2c0377fc08 R15: 0000000000000000\n[  301.564186] FS:  0000000000000000(0000) GS:ffff920c2fbc0000(0000) knlGS:0000000000000000\n[  301.564773] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  301.565197] CR2: 00007fea88ee8a20 CR3: 00000001033a8000 CR4: 0000000000750ef0\n[  301.565725] PKRU: 55555554\n[  301.565944] Call Trace:\n[  301.566148]  <TASK>\n[  301.566325]  ? untrack_pfn+0xf4/0x100\n[  301.566618]  ? __warn+0x81/0x130\n[  301.566876]  ? untrack_pfn+0xf4/0x100\n[  3\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35877",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/c2b2430b48f3c9eaccd2c3d2ad75bb540d4952f4",
            "patch_url": "https://git.kernel.org/stable/p/c2b2430b48f3c9eaccd2c3d2ad75bb540d4952f4",
            "filename": "CVE-2024-35877-c2b2430b48f3c9eaccd2c3d2ad75bb540d4952f4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35877/CVE-2024-35877-c2b2430b48f3c9eaccd2c3d2ad75bb540d4952f4.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/04c35ab3bdae7fefbd7c7a7355f29fa03a035221",
                "patch_url": "https://git.kernel.org/stable/p/04c35ab3bdae7fefbd7c7a7355f29fa03a035221",
                "filename": "CVE-2024-35877-04c35ab3bdae7fefbd7c7a7355f29fa03a035221.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35877/CVE-2024-35877-04c35ab3bdae7fefbd7c7a7355f29fa03a035221.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/09e6bb53217bf388a0d2fd7fb21e74ab9dffc173",
                "patch_url": "https://git.kernel.org/stable/p/09e6bb53217bf388a0d2fd7fb21e74ab9dffc173",
                "filename": "CVE-2024-35877-09e6bb53217bf388a0d2fd7fb21e74ab9dffc173.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35877/CVE-2024-35877-09e6bb53217bf388a0d2fd7fb21e74ab9dffc173.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1341e4b32e1fb1b0acd002ccd56f07bd32f2abc6",
                "patch_url": "https://git.kernel.org/stable/p/1341e4b32e1fb1b0acd002ccd56f07bd32f2abc6",
                "filename": "CVE-2024-35877-1341e4b32e1fb1b0acd002ccd56f07bd32f2abc6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35877/CVE-2024-35877-1341e4b32e1fb1b0acd002ccd56f07bd32f2abc6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/51b7841f3fe84606ec0bd8da859d22e05e5419ec",
                "patch_url": "https://git.kernel.org/stable/p/51b7841f3fe84606ec0bd8da859d22e05e5419ec",
                "filename": "CVE-2024-35877-51b7841f3fe84606ec0bd8da859d22e05e5419ec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35877/CVE-2024-35877-51b7841f3fe84606ec0bd8da859d22e05e5419ec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7cfee26d1950250b14c5cb0a37b142f3fcc6396a",
                "patch_url": "https://git.kernel.org/stable/p/7cfee26d1950250b14c5cb0a37b142f3fcc6396a",
                "filename": "CVE-2024-35877-7cfee26d1950250b14c5cb0a37b142f3fcc6396a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35877/CVE-2024-35877-7cfee26d1950250b14c5cb0a37b142f3fcc6396a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/97e93367e82752e475a33839a80b33bdbef1209f",
                "patch_url": "https://git.kernel.org/stable/p/97e93367e82752e475a33839a80b33bdbef1209f",
                "filename": "CVE-2024-35877-97e93367e82752e475a33839a80b33bdbef1209f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35877/CVE-2024-35877-97e93367e82752e475a33839a80b33bdbef1209f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c2b2430b48f3c9eaccd2c3d2ad75bb540d4952f4",
                "patch_url": "https://git.kernel.org/stable/p/c2b2430b48f3c9eaccd2c3d2ad75bb540d4952f4",
                "filename": "CVE-2024-35877-c2b2430b48f3c9eaccd2c3d2ad75bb540d4952f4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35877/CVE-2024-35877-c2b2430b48f3c9eaccd2c3d2ad75bb540d4952f4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f18681daaec9665a15c5e7e0f591aad5d0ac622b",
                "patch_url": "https://git.kernel.org/stable/p/f18681daaec9665a15c5e7e0f591aad5d0ac622b",
                "filename": "CVE-2024-35877-f18681daaec9665a15c5e7e0f591aad5d0ac622b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35877/CVE-2024-35877-f18681daaec9665a15c5e7e0f591aad5d0ac622b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/04c35ab3bdae7fefbd7c7a7355f29fa03a035221",
            "https://git.kernel.org/stable/c/09e6bb53217bf388a0d2fd7fb21e74ab9dffc173",
            "https://git.kernel.org/stable/c/1341e4b32e1fb1b0acd002ccd56f07bd32f2abc6",
            "https://git.kernel.org/stable/c/51b7841f3fe84606ec0bd8da859d22e05e5419ec",
            "https://git.kernel.org/stable/c/7cfee26d1950250b14c5cb0a37b142f3fcc6396a",
            "https://git.kernel.org/stable/c/97e93367e82752e475a33839a80b33bdbef1209f",
            "https://git.kernel.org/stable/c/c2b2430b48f3c9eaccd2c3d2ad75bb540d4952f4",
            "https://git.kernel.org/stable/c/f18681daaec9665a15c5e7e0f591aad5d0ac622b",
            "https://www.cve.org/CVERecord?id=CVE-2024-35877\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35877\nhttps://lore.kernel.org/linux-cve-announce/2024051943-CVE-2024-35877-39e6@gregkh/T"
        ]
    },
    "CVE-2024-35884": {
        "cve": "CVE-2024-35884",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: do not accept non-tunnel GSO skbs landing in a tunnel\n\nWhen rx-udp-gro-forwarding is enabled UDP packets might be GROed when\nbeing forwarded. If such packets might land in a tunnel this can cause\nvarious issues and udp_gro_receive makes sure this isn't the case by\nlooking for a matching socket. This is performed in\nudp4/6_gro_lookup_skb but only in the current netns. This is an issue\nwith tunneled packets when the endpoint is in another netns. In such\ncases the packets will be GROed at the UDP level, which leads to various\nissues later on. The same thing can happen with rx-gro-list.\n\nWe saw this with geneve packets being GROed at the UDP level. In such\ncase gso_size is set; later the packet goes through the geneve rx path,\nthe geneve header is pulled, the offset are adjusted and frag_list skbs\nare not adjusted with regard to geneve. When those skbs hit\nskb_fragment, it will misbehave. Different outcomes are possible\ndepending on what the GROed skbs look like; from corrupted packets to\nkernel crashes.\n\nOne example is a BUG_ON[1] triggered in skb_segment while processing the\nfrag_list. Because gso_size is wrong (geneve header was pulled)\nskb_segment thinks there is \"geneve header size\" of data in frag_list,\nalthough it's in fact the next packet. The BUG_ON itself has nothing to\ndo with the issue. This is only one of the potential issues.\n\nLooking up for a matching socket in udp_gro_receive is fragile: the\nlookup could be extended to all netns (not speaking about performances)\nbut nothing prevents those packets from being modified in between and we\ncould still not find a matching socket. It's OK to keep the current\nlogic there as it should cover most cases but we also need to make sure\nwe handle tunnel packets being GROed too early.\n\nThis is done by extending the checks in udp_unexpected_gso: GSO packets\nlacking the SKB_GSO_UDP_TUNNEL/_CSUM bits and landing in a tunnel must\nbe segmented.\n\n[1] kernel BUG at net/core/skbuff.c:4408!\n    RIP: 0010:skb_segment+0xd2a/0xf70\n    __udp_gso_segment+0xaa/0x560",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35884",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/d49ae15a5767d4e9ef8bbb79e42df1bfebc94670",
            "patch_url": "https://git.kernel.org/stable/p/d49ae15a5767d4e9ef8bbb79e42df1bfebc94670",
            "filename": "CVE-2024-35884-d49ae15a5767d4e9ef8bbb79e42df1bfebc94670.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35884/CVE-2024-35884-d49ae15a5767d4e9ef8bbb79e42df1bfebc94670.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3001e7aa43d6691db2a878b0745b854bf12ddd19",
                "patch_url": "https://git.kernel.org/stable/p/3001e7aa43d6691db2a878b0745b854bf12ddd19",
                "filename": "CVE-2024-35884-3001e7aa43d6691db2a878b0745b854bf12ddd19.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35884/CVE-2024-35884-3001e7aa43d6691db2a878b0745b854bf12ddd19.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3391b157780bbedf8ef9f202cbf10ee90bf6b0f8",
                "patch_url": "https://git.kernel.org/stable/p/3391b157780bbedf8ef9f202cbf10ee90bf6b0f8",
                "filename": "CVE-2024-35884-3391b157780bbedf8ef9f202cbf10ee90bf6b0f8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35884/CVE-2024-35884-3391b157780bbedf8ef9f202cbf10ee90bf6b0f8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/35fe0e0b5c00bef7dde74842a2564c43856fbce4",
                "patch_url": "https://git.kernel.org/stable/p/35fe0e0b5c00bef7dde74842a2564c43856fbce4",
                "filename": "CVE-2024-35884-35fe0e0b5c00bef7dde74842a2564c43856fbce4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35884/CVE-2024-35884-35fe0e0b5c00bef7dde74842a2564c43856fbce4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3d010c8031e39f5fa1e8b13ada77e0321091011f",
                "patch_url": "https://git.kernel.org/stable/p/3d010c8031e39f5fa1e8b13ada77e0321091011f",
                "filename": "CVE-2024-35884-3d010c8031e39f5fa1e8b13ada77e0321091011f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35884/CVE-2024-35884-3d010c8031e39f5fa1e8b13ada77e0321091011f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d12245080cb259d82b34699f6cd4ec11bdb688bd",
                "patch_url": "https://git.kernel.org/stable/p/d12245080cb259d82b34699f6cd4ec11bdb688bd",
                "filename": "CVE-2024-35884-d12245080cb259d82b34699f6cd4ec11bdb688bd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35884/CVE-2024-35884-d12245080cb259d82b34699f6cd4ec11bdb688bd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d49ae15a5767d4e9ef8bbb79e42df1bfebc94670",
                "patch_url": "https://git.kernel.org/stable/p/d49ae15a5767d4e9ef8bbb79e42df1bfebc94670",
                "filename": "CVE-2024-35884-d49ae15a5767d4e9ef8bbb79e42df1bfebc94670.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35884/CVE-2024-35884-d49ae15a5767d4e9ef8bbb79e42df1bfebc94670.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3001e7aa43d6691db2a878b0745b854bf12ddd19",
            "https://git.kernel.org/stable/c/3391b157780bbedf8ef9f202cbf10ee90bf6b0f8",
            "https://git.kernel.org/stable/c/35fe0e0b5c00bef7dde74842a2564c43856fbce4",
            "https://git.kernel.org/stable/c/3d010c8031e39f5fa1e8b13ada77e0321091011f",
            "https://git.kernel.org/stable/c/d12245080cb259d82b34699f6cd4ec11bdb688bd",
            "https://git.kernel.org/stable/c/d49ae15a5767d4e9ef8bbb79e42df1bfebc94670",
            "https://www.cve.org/CVERecord?id=CVE-2024-35884\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35884\nhttps://lore.kernel.org/linux-cve-announce/2024051946-CVE-2024-35884-d4a4@gregkh/T"
        ]
    },
    "CVE-2024-35888": {
        "cve": "CVE-2024-35888",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nerspan: make sure erspan_base_hdr is present in skb->head\n\nsyzbot reported a problem in ip6erspan_rcv() [1]\n\nIssue is that ip6erspan_rcv() (and erspan_rcv()) no longer make\nsure erspan_base_hdr is present in skb linear part (skb->head)\nbefore getting @ver field from it.\n\nAdd the missing pskb_may_pull() calls.\n\nv2: Reload iph pointer in erspan_rcv() after pskb_may_pull()\n    because skb->head might have changed.\n\n[1]\n\n BUG: KMSAN: uninit-value in pskb_may_pull_reason include/linux/skbuff.h:2742 [inline]\n BUG: KMSAN: uninit-value in pskb_may_pull include/linux/skbuff.h:2756 [inline]\n BUG: KMSAN: uninit-value in ip6erspan_rcv net/ipv6/ip6_gre.c:541 [inline]\n BUG: KMSAN: uninit-value in gre_rcv+0x11f8/0x1930 net/ipv6/ip6_gre.c:610\n  pskb_may_pull_reason include/linux/skbuff.h:2742 [inline]\n  pskb_may_pull include/linux/skbuff.h:2756 [inline]\n  ip6erspan_rcv net/ipv6/ip6_gre.c:541 [inline]\n  gre_rcv+0x11f8/0x1930 net/ipv6/ip6_gre.c:610\n  ip6_protocol_deliver_rcu+0x1d4c/0x2ca0 net/ipv6/ip6_input.c:438\n  ip6_input_finish net/ipv6/ip6_input.c:483 [inline]\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492\n  ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586\n  dst_input include/net/dst.h:460 [inline]\n  ip6_rcv_finish+0x955/0x970 net/ipv6/ip6_input.c:79\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ipv6_rcv+0xde/0x390 net/ipv6/ip6_input.c:310\n  __netif_receive_skb_one_core net/core/dev.c:5538 [inline]\n  __netif_receive_skb+0x1da/0xa00 net/core/dev.c:5652\n  netif_receive_skb_internal net/core/dev.c:5738 [inline]\n  netif_receive_skb+0x58/0x660 net/core/dev.c:5798\n  tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1549\n  tun_get_user+0x5566/0x69e0 drivers/net/tun.c:2002\n  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\n  call_write_iter include/linux/fs.h:2108 [inline]\n  new_sync_write fs/read_write.c:497 [inline]\n  vfs_write+0xb63/0x1520 fs/read_write.c:590\n  ksys_write+0x20f/0x4c0 fs/read_write.c:643\n  __do_sys_write fs/read_write.c:655 [inline]\n  __se_sys_write fs/read_write.c:652 [inline]\n  __x64_sys_write+0x93/0xe0 fs/read_write.c:652\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was created at:\n  slab_post_alloc_hook mm/slub.c:3804 [inline]\n  slab_alloc_node mm/slub.c:3845 [inline]\n  kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888\n  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577\n  __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668\n  alloc_skb include/linux/skbuff.h:1318 [inline]\n  alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504\n  sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795\n  tun_alloc_skb drivers/net/tun.c:1525 [inline]\n  tun_get_user+0x209a/0x69e0 drivers/net/tun.c:1846\n  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\n  call_write_iter include/linux/fs.h:2108 [inline]\n  new_sync_write fs/read_write.c:497 [inline]\n  vfs_write+0xb63/0x1520 fs/read_write.c:590\n  ksys_write+0x20f/0x4c0 fs/read_write.c:643\n  __do_sys_write fs/read_write.c:655 [inline]\n  __se_sys_write fs/read_write.c:652 [inline]\n  __x64_sys_write+0x93/0xe0 fs/read_write.c:652\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nCPU: 1 PID: 5045 Comm: syz-executor114 Not tainted 6.9.0-rc1-syzkaller-00021-g962490525cff #0",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35888",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/06a939f72a24a7d8251f84cf4c042df86c6666ac",
            "patch_url": "https://git.kernel.org/stable/p/06a939f72a24a7d8251f84cf4c042df86c6666ac",
            "filename": "CVE-2024-35888-06a939f72a24a7d8251f84cf4c042df86c6666ac.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35888/CVE-2024-35888-06a939f72a24a7d8251f84cf4c042df86c6666ac.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/06a939f72a24a7d8251f84cf4c042df86c6666ac",
                "patch_url": "https://git.kernel.org/stable/p/06a939f72a24a7d8251f84cf4c042df86c6666ac",
                "filename": "CVE-2024-35888-06a939f72a24a7d8251f84cf4c042df86c6666ac.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35888/CVE-2024-35888-06a939f72a24a7d8251f84cf4c042df86c6666ac.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0ac328a5a4138a6c03dfc3f46017bd5c19167446",
                "patch_url": "https://git.kernel.org/stable/p/0ac328a5a4138a6c03dfc3f46017bd5c19167446",
                "filename": "CVE-2024-35888-0ac328a5a4138a6c03dfc3f46017bd5c19167446.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35888/CVE-2024-35888-0ac328a5a4138a6c03dfc3f46017bd5c19167446.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/17af420545a750f763025149fa7b833a4fc8b8f0",
                "patch_url": "https://git.kernel.org/stable/p/17af420545a750f763025149fa7b833a4fc8b8f0",
                "filename": "CVE-2024-35888-17af420545a750f763025149fa7b833a4fc8b8f0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35888/CVE-2024-35888-17af420545a750f763025149fa7b833a4fc8b8f0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1db7fcb2b290c47c202b79528824f119fa28937d",
                "patch_url": "https://git.kernel.org/stable/p/1db7fcb2b290c47c202b79528824f119fa28937d",
                "filename": "CVE-2024-35888-1db7fcb2b290c47c202b79528824f119fa28937d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35888/CVE-2024-35888-1db7fcb2b290c47c202b79528824f119fa28937d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4e3fdeecec5707678b0d1f18c259dadb97262e9d",
                "patch_url": "https://git.kernel.org/stable/p/4e3fdeecec5707678b0d1f18c259dadb97262e9d",
                "filename": "CVE-2024-35888-4e3fdeecec5707678b0d1f18c259dadb97262e9d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35888/CVE-2024-35888-4e3fdeecec5707678b0d1f18c259dadb97262e9d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b14b9f9503ec823ca75be766dcaeff4f0bfeca85",
                "patch_url": "https://git.kernel.org/stable/p/b14b9f9503ec823ca75be766dcaeff4f0bfeca85",
                "filename": "CVE-2024-35888-b14b9f9503ec823ca75be766dcaeff4f0bfeca85.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35888/CVE-2024-35888-b14b9f9503ec823ca75be766dcaeff4f0bfeca85.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e54a0c79cdc2548729dd7e2e468b08c5af4d0df5",
                "patch_url": "https://git.kernel.org/stable/p/e54a0c79cdc2548729dd7e2e468b08c5af4d0df5",
                "filename": "CVE-2024-35888-e54a0c79cdc2548729dd7e2e468b08c5af4d0df5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35888/CVE-2024-35888-e54a0c79cdc2548729dd7e2e468b08c5af4d0df5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ee0088101beee10fa809716d6245d915b09c37c7",
                "patch_url": "https://git.kernel.org/stable/p/ee0088101beee10fa809716d6245d915b09c37c7",
                "filename": "CVE-2024-35888-ee0088101beee10fa809716d6245d915b09c37c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35888/CVE-2024-35888-ee0088101beee10fa809716d6245d915b09c37c7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/06a939f72a24a7d8251f84cf4c042df86c6666ac",
            "https://git.kernel.org/stable/c/0ac328a5a4138a6c03dfc3f46017bd5c19167446",
            "https://git.kernel.org/stable/c/17af420545a750f763025149fa7b833a4fc8b8f0",
            "https://git.kernel.org/stable/c/1db7fcb2b290c47c202b79528824f119fa28937d",
            "https://git.kernel.org/stable/c/4e3fdeecec5707678b0d1f18c259dadb97262e9d",
            "https://git.kernel.org/stable/c/b14b9f9503ec823ca75be766dcaeff4f0bfeca85",
            "https://git.kernel.org/stable/c/e54a0c79cdc2548729dd7e2e468b08c5af4d0df5",
            "https://git.kernel.org/stable/c/ee0088101beee10fa809716d6245d915b09c37c7",
            "https://www.cve.org/CVERecord?id=CVE-2024-35888\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35888\nhttps://lore.kernel.org/linux-cve-announce/2024051947-CVE-2024-35888-1e04@gregkh/T"
        ]
    },
    "CVE-2024-35890": {
        "cve": "CVE-2024-35890",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ngro: fix ownership transfer\n\nIf packets are GROed with fraglist they might be segmented later on and\ncontinue their journey in the stack. In skb_segment_list those skbs can\nbe reused as-is. This is an issue as their destructor was removed in\nskb_gro_receive_list but not the reference to their socket, and then\nthey can't be orphaned. Fix this by also removing the reference to the\nsocket.\n\nFor example this could be observed,\n\n  kernel BUG at include/linux/skbuff.h:3131!  (skb_orphan)\n  RIP: 0010:ip6_rcv_core+0x11bc/0x19a0\n  Call Trace:\n   ipv6_list_rcv+0x250/0x3f0\n   __netif_receive_skb_list_core+0x49d/0x8f0\n   netif_receive_skb_list_internal+0x634/0xd40\n   napi_complete_done+0x1d2/0x7d0\n   gro_cell_poll+0x118/0x1f0\n\nA similar construction is found in skb_gro_receive, apply the same\nchange there.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35890",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/d225b0ac96dc40d7e8ae2bc227eb2c56e130975f",
            "patch_url": "https://git.kernel.org/stable/p/d225b0ac96dc40d7e8ae2bc227eb2c56e130975f",
            "filename": "CVE-2024-35890-d225b0ac96dc40d7e8ae2bc227eb2c56e130975f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35890/CVE-2024-35890-d225b0ac96dc40d7e8ae2bc227eb2c56e130975f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2eeab8c47c3c0276e0746bc382f405c9a236a5ad",
                "patch_url": "https://git.kernel.org/stable/p/2eeab8c47c3c0276e0746bc382f405c9a236a5ad",
                "filename": "CVE-2024-35890-2eeab8c47c3c0276e0746bc382f405c9a236a5ad.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35890/CVE-2024-35890-2eeab8c47c3c0276e0746bc382f405c9a236a5ad.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5b3b67f731296027cceb3efad881ae281213f86f",
                "patch_url": "https://git.kernel.org/stable/p/5b3b67f731296027cceb3efad881ae281213f86f",
                "filename": "CVE-2024-35890-5b3b67f731296027cceb3efad881ae281213f86f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35890/CVE-2024-35890-5b3b67f731296027cceb3efad881ae281213f86f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d225b0ac96dc40d7e8ae2bc227eb2c56e130975f",
                "patch_url": "https://git.kernel.org/stable/p/d225b0ac96dc40d7e8ae2bc227eb2c56e130975f",
                "filename": "CVE-2024-35890-d225b0ac96dc40d7e8ae2bc227eb2c56e130975f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35890/CVE-2024-35890-d225b0ac96dc40d7e8ae2bc227eb2c56e130975f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ed4cccef64c1d0d5b91e69f7a8a6697c3a865486",
                "patch_url": "https://git.kernel.org/stable/p/ed4cccef64c1d0d5b91e69f7a8a6697c3a865486",
                "filename": "CVE-2024-35890-ed4cccef64c1d0d5b91e69f7a8a6697c3a865486.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35890/CVE-2024-35890-ed4cccef64c1d0d5b91e69f7a8a6697c3a865486.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fc126c1d51e9552eacd2d717b9ffe9262a8a4cd6",
                "patch_url": "https://git.kernel.org/stable/p/fc126c1d51e9552eacd2d717b9ffe9262a8a4cd6",
                "filename": "CVE-2024-35890-fc126c1d51e9552eacd2d717b9ffe9262a8a4cd6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35890/CVE-2024-35890-fc126c1d51e9552eacd2d717b9ffe9262a8a4cd6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2eeab8c47c3c0276e0746bc382f405c9a236a5ad",
            "https://git.kernel.org/stable/c/5b3b67f731296027cceb3efad881ae281213f86f",
            "https://git.kernel.org/stable/c/d225b0ac96dc40d7e8ae2bc227eb2c56e130975f",
            "https://git.kernel.org/stable/c/ed4cccef64c1d0d5b91e69f7a8a6697c3a865486",
            "https://git.kernel.org/stable/c/fc126c1d51e9552eacd2d717b9ffe9262a8a4cd6",
            "https://www.cve.org/CVERecord?id=CVE-2024-35890\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35890\nhttps://lore.kernel.org/linux-cve-announce/2024051948-CVE-2024-35890-beaa@gregkh/T"
        ]
    },
    "CVE-2024-35893": {
        "cve": "CVE-2024-35893",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_skbmod: prevent kernel-infoleak\n\nsyzbot found that tcf_skbmod_dump() was copying four bytes\nfrom kernel stack to user space [1].\n\nThe issue here is that 'struct tc_skbmod' has a four bytes hole.\n\nWe need to clear the structure before filling fields.\n\n[1]\nBUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n BUG: KMSAN: kernel-infoleak in copy_to_user_iter lib/iov_iter.c:24 [inline]\n BUG: KMSAN: kernel-infoleak in iterate_ubuf include/linux/iov_iter.h:29 [inline]\n BUG: KMSAN: kernel-infoleak in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\n BUG: KMSAN: kernel-infoleak in iterate_and_advance include/linux/iov_iter.h:271 [inline]\n BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185\n  instrument_copy_to_user include/linux/instrumented.h:114 [inline]\n  copy_to_user_iter lib/iov_iter.c:24 [inline]\n  iterate_ubuf include/linux/iov_iter.h:29 [inline]\n  iterate_and_advance2 include/linux/iov_iter.h:245 [inline]\n  iterate_and_advance include/linux/iov_iter.h:271 [inline]\n  _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185\n  copy_to_iter include/linux/uio.h:196 [inline]\n  simple_copy_to_iter net/core/datagram.c:532 [inline]\n  __skb_datagram_iter+0x185/0x1000 net/core/datagram.c:420\n  skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:546\n  skb_copy_datagram_msg include/linux/skbuff.h:4050 [inline]\n  netlink_recvmsg+0x432/0x1610 net/netlink/af_netlink.c:1962\n  sock_recvmsg_nosec net/socket.c:1046 [inline]\n  sock_recvmsg+0x2c4/0x340 net/socket.c:1068\n  __sys_recvfrom+0x35a/0x5f0 net/socket.c:2242\n  __do_sys_recvfrom net/socket.c:2260 [inline]\n  __se_sys_recvfrom net/socket.c:2256 [inline]\n  __x64_sys_recvfrom+0x126/0x1d0 net/socket.c:2256\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was stored to memory at:\n  pskb_expand_head+0x30f/0x19d0 net/core/skbuff.c:2253\n  netlink_trim+0x2c2/0x330 net/netlink/af_netlink.c:1317\n  netlink_unicast+0x9f/0x1260 net/netlink/af_netlink.c:1351\n  nlmsg_unicast include/net/netlink.h:1144 [inline]\n  nlmsg_notify+0x21d/0x2f0 net/netlink/af_netlink.c:2610\n  rtnetlink_send+0x73/0x90 net/core/rtnetlink.c:741\n  rtnetlink_maybe_send include/linux/rtnetlink.h:17 [inline]\n  tcf_add_notify net/sched/act_api.c:2048 [inline]\n  tcf_action_add net/sched/act_api.c:2071 [inline]\n  tc_ctl_action+0x146e/0x19d0 net/sched/act_api.c:2119\n  rtnetlink_rcv_msg+0x1737/0x1900 net/core/rtnetlink.c:6595\n  netlink_rcv_skb+0x375/0x650 net/netlink/af_netlink.c:2559\n  rtnetlink_rcv+0x34/0x40 net/core/rtnetlink.c:6613\n  netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]\n  netlink_unicast+0xf4c/0x1260 net/netlink/af_netlink.c:1361\n  netlink_sendmsg+0x10df/0x11f0 net/netlink/af_netlink.c:1905\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x30f/0x380 net/socket.c:745\n  ____sys_sendmsg+0x877/0xb60 net/socket.c:2584\n  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n  __sys_sendmsg net/socket.c:2667 [inline]\n  __do_sys_sendmsg net/socket.c:2676 [inline]\n  __se_sys_sendmsg net/socket.c:2674 [inline]\n  __x64_sys_sendmsg+0x307/0x4a0 net/socket.c:2674\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was stored to memory at:\n  __nla_put lib/nlattr.c:1041 [inline]\n  nla_put+0x1c6/0x230 lib/nlattr.c:1099\n  tcf_skbmod_dump+0x23f/0xc20 net/sched/act_skbmod.c:256\n  tcf_action_dump_old net/sched/act_api.c:1191 [inline]\n  tcf_action_dump_1+0x85e/0x970 net/sched/act_api.c:1227\n  tcf_action_dump+0x1fd/0x460 net/sched/act_api.c:1251\n  tca_get_fill+0x519/0x7a0 net/sched/act_api.c:1628\n  tcf_add_notify_msg net/sched/act_api.c:2023 [inline]\n  tcf_add_notify net/sched/act_api.c:2042 [inline]\n  tcf_action_add net/sched/act_api.c:2071 [inline]\n  tc_ctl_action+0x1365/0x19d0 net/sched/act_api.c:2119\n  rtnetlink_rcv_msg+0x1737/0x1900 net/core/rtnetlink.c:6595\n  netlink_rcv_skb+0x375/0x650 net/netlink/af_netli\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35893",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/729ad2ac2a2cdc9f4a4bdfd40bfd276e6bc33924",
            "patch_url": "https://git.kernel.org/stable/p/729ad2ac2a2cdc9f4a4bdfd40bfd276e6bc33924",
            "filename": "CVE-2024-35893-729ad2ac2a2cdc9f4a4bdfd40bfd276e6bc33924.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35893/CVE-2024-35893-729ad2ac2a2cdc9f4a4bdfd40bfd276e6bc33924.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/55d3fe7b2b7bc354e7cbc1f7b8f98a29ccd5a366",
                "patch_url": "https://git.kernel.org/stable/p/55d3fe7b2b7bc354e7cbc1f7b8f98a29ccd5a366",
                "filename": "CVE-2024-35893-55d3fe7b2b7bc354e7cbc1f7b8f98a29ccd5a366.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35893/CVE-2024-35893-55d3fe7b2b7bc354e7cbc1f7b8f98a29ccd5a366.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5e45dc4408857305f4685abfd7a528a1e58b51b5",
                "patch_url": "https://git.kernel.org/stable/p/5e45dc4408857305f4685abfd7a528a1e58b51b5",
                "filename": "CVE-2024-35893-5e45dc4408857305f4685abfd7a528a1e58b51b5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35893/CVE-2024-35893-5e45dc4408857305f4685abfd7a528a1e58b51b5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/729ad2ac2a2cdc9f4a4bdfd40bfd276e6bc33924",
                "patch_url": "https://git.kernel.org/stable/p/729ad2ac2a2cdc9f4a4bdfd40bfd276e6bc33924",
                "filename": "CVE-2024-35893-729ad2ac2a2cdc9f4a4bdfd40bfd276e6bc33924.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35893/CVE-2024-35893-729ad2ac2a2cdc9f4a4bdfd40bfd276e6bc33924.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7bb2c7103d8c13b06a57bf997b8cdbe93cd7283c",
                "patch_url": "https://git.kernel.org/stable/p/7bb2c7103d8c13b06a57bf997b8cdbe93cd7283c",
                "filename": "CVE-2024-35893-7bb2c7103d8c13b06a57bf997b8cdbe93cd7283c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35893/CVE-2024-35893-7bb2c7103d8c13b06a57bf997b8cdbe93cd7283c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a097fc199ab5f4b5392c5144034c0d2148b55a14",
                "patch_url": "https://git.kernel.org/stable/p/a097fc199ab5f4b5392c5144034c0d2148b55a14",
                "filename": "CVE-2024-35893-a097fc199ab5f4b5392c5144034c0d2148b55a14.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35893/CVE-2024-35893-a097fc199ab5f4b5392c5144034c0d2148b55a14.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d313eb8b77557a6d5855f42d2234bd592c7b50dd",
                "patch_url": "https://git.kernel.org/stable/p/d313eb8b77557a6d5855f42d2234bd592c7b50dd",
                "filename": "CVE-2024-35893-d313eb8b77557a6d5855f42d2234bd592c7b50dd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35893/CVE-2024-35893-d313eb8b77557a6d5855f42d2234bd592c7b50dd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f190a4aa03cbd518bd9c62a66e1233984f5fd2ec",
                "patch_url": "https://git.kernel.org/stable/p/f190a4aa03cbd518bd9c62a66e1233984f5fd2ec",
                "filename": "CVE-2024-35893-f190a4aa03cbd518bd9c62a66e1233984f5fd2ec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35893/CVE-2024-35893-f190a4aa03cbd518bd9c62a66e1233984f5fd2ec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f356eb2fb567e0931143ac1769ac802d3b3e2077",
                "patch_url": "https://git.kernel.org/stable/p/f356eb2fb567e0931143ac1769ac802d3b3e2077",
                "filename": "CVE-2024-35893-f356eb2fb567e0931143ac1769ac802d3b3e2077.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35893/CVE-2024-35893-f356eb2fb567e0931143ac1769ac802d3b3e2077.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/55d3fe7b2b7bc354e7cbc1f7b8f98a29ccd5a366",
            "https://git.kernel.org/stable/c/5e45dc4408857305f4685abfd7a528a1e58b51b5",
            "https://git.kernel.org/stable/c/729ad2ac2a2cdc9f4a4bdfd40bfd276e6bc33924",
            "https://git.kernel.org/stable/c/7bb2c7103d8c13b06a57bf997b8cdbe93cd7283c",
            "https://git.kernel.org/stable/c/a097fc199ab5f4b5392c5144034c0d2148b55a14",
            "https://git.kernel.org/stable/c/d313eb8b77557a6d5855f42d2234bd592c7b50dd",
            "https://git.kernel.org/stable/c/f190a4aa03cbd518bd9c62a66e1233984f5fd2ec",
            "https://git.kernel.org/stable/c/f356eb2fb567e0931143ac1769ac802d3b3e2077",
            "https://www.cve.org/CVERecord?id=CVE-2024-35893\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35893\nhttps://lore.kernel.org/linux-cve-announce/2024051949-CVE-2024-35893-5132@gregkh/T"
        ]
    },
    "CVE-2024-35896": {
        "cve": "CVE-2024-35896",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: validate user input for expected length\n\nI got multiple syzbot reports showing old bugs exposed\nby BPF after commit 20f2505fb436 (\"bpf: Try to avoid kzalloc\nin cgroup/{s,g}etsockopt\")\n\nsetsockopt() @optlen argument should be taken into account\nbefore copying data.\n\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]\n BUG: KASAN: slab-out-of-bounds in do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]\n BUG: KASAN: slab-out-of-bounds in do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627\nRead of size 96 at addr ffff88802cd73da0 by task syz-executor.4/7238\n\nCPU: 1 PID: 7238 Comm: syz-executor.4 Not tainted 6.9.0-rc2-next-20240403-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nCall Trace:\n <TASK>\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n  print_address_description mm/kasan/report.c:377 [inline]\n  print_report+0x169/0x550 mm/kasan/report.c:488\n  kasan_report+0x143/0x180 mm/kasan/report.c:601\n  kasan_check_range+0x282/0x290 mm/kasan/generic.c:189\n  __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105\n  copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n  copy_from_sockptr include/linux/sockptr.h:55 [inline]\n  do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]\n  do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627\n  nf_setsockopt+0x295/0x2c0 net/netfilter/nf_sockopt.c:101\n  do_sock_setsockopt+0x3af/0x720 net/socket.c:2311\n  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n  __do_sys_setsockopt net/socket.c:2343 [inline]\n  __se_sys_setsockopt net/socket.c:2340 [inline]\n  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x72/0x7a\nRIP: 0033:0x7fd22067dde9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fd21f9ff0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036\nRAX: ffffffffffffffda RBX: 00007fd2207abf80 RCX: 00007fd22067dde9\nRDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003\nRBP: 00007fd2206ca47a R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000020000880 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007fd2207abf80 R15: 00007ffd2d0170d8\n </TASK>\n\nAllocated by task 7238:\n  kasan_save_stack mm/kasan/common.c:47 [inline]\n  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n  poison_kmalloc_redzone mm/kasan/common.c:370 [inline]\n  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387\n  kasan_kmalloc include/linux/kasan.h:211 [inline]\n  __do_kmalloc_node mm/slub.c:4069 [inline]\n  __kmalloc_noprof+0x200/0x410 mm/slub.c:4082\n  kmalloc_noprof include/linux/slab.h:664 [inline]\n  __cgroup_bpf_run_filter_setsockopt+0xd47/0x1050 kernel/bpf/cgroup.c:1869\n  do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293\n  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n  __do_sys_setsockopt net/socket.c:2343 [inline]\n  __se_sys_setsockopt net/socket.c:2340 [inline]\n  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x72/0x7a\n\nThe buggy address belongs to the object at ffff88802cd73da0\n which belongs to the cache kmalloc-8 of size 8\nThe buggy address is located 0 bytes inside of\n allocated 1-byte region [ffff88802cd73da0, ffff88802cd73da1)\n\nThe buggy address belongs to the physical page:\npage: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88802cd73020 pfn:0x2cd73\nflags: 0xfff80000000000(node=0|zone=1|lastcpupid=0xfff)\npage_type: 0xffffefff(slab)\nraw: 00fff80000000000 ffff888015041280 dead000000000100 dead000000000122\nraw: ffff88802cd73020 000000008080007f 00000001ffffefff 00\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35896",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0c83842df40f86e529db6842231154772c20edcc",
            "patch_url": "https://git.kernel.org/stable/p/0c83842df40f86e529db6842231154772c20edcc",
            "filename": "CVE-2024-35896-0c83842df40f86e529db6842231154772c20edcc.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35896/CVE-2024-35896-0c83842df40f86e529db6842231154772c20edcc.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0c83842df40f86e529db6842231154772c20edcc",
                "patch_url": "https://git.kernel.org/stable/p/0c83842df40f86e529db6842231154772c20edcc",
                "filename": "CVE-2024-35896-0c83842df40f86e529db6842231154772c20edcc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35896/CVE-2024-35896-0c83842df40f86e529db6842231154772c20edcc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0f038242b77ddfc505bf4163d4904c1abd2e74d6",
                "patch_url": "https://git.kernel.org/stable/p/0f038242b77ddfc505bf4163d4904c1abd2e74d6",
                "filename": "CVE-2024-35896-0f038242b77ddfc505bf4163d4904c1abd2e74d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35896/CVE-2024-35896-0f038242b77ddfc505bf4163d4904c1abd2e74d6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/18aae2cb87e5faa9c5bd865260ceadac60d5a6c5",
                "patch_url": "https://git.kernel.org/stable/p/18aae2cb87e5faa9c5bd865260ceadac60d5a6c5",
                "filename": "CVE-2024-35896-18aae2cb87e5faa9c5bd865260ceadac60d5a6c5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35896/CVE-2024-35896-18aae2cb87e5faa9c5bd865260ceadac60d5a6c5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/440e948cf0eff32cfe322dcbca3f2525354b159b",
                "patch_url": "https://git.kernel.org/stable/p/440e948cf0eff32cfe322dcbca3f2525354b159b",
                "filename": "CVE-2024-35896-440e948cf0eff32cfe322dcbca3f2525354b159b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35896/CVE-2024-35896-440e948cf0eff32cfe322dcbca3f2525354b159b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/58f2bfb789e6bd3bc24a2c9c1580f3c67aec3018",
                "patch_url": "https://git.kernel.org/stable/p/58f2bfb789e6bd3bc24a2c9c1580f3c67aec3018",
                "filename": "CVE-2024-35896-58f2bfb789e6bd3bc24a2c9c1580f3c67aec3018.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35896/CVE-2024-35896-58f2bfb789e6bd3bc24a2c9c1580f3c67aec3018.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/81d51b9b7c95e791ba3c1a2dd77920a9d3b3f525",
                "patch_url": "https://git.kernel.org/stable/p/81d51b9b7c95e791ba3c1a2dd77920a9d3b3f525",
                "filename": "CVE-2024-35896-81d51b9b7c95e791ba3c1a2dd77920a9d3b3f525.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35896/CVE-2024-35896-81d51b9b7c95e791ba3c1a2dd77920a9d3b3f525.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0c83842df40f86e529db6842231154772c20edcc",
            "https://git.kernel.org/stable/c/0f038242b77ddfc505bf4163d4904c1abd2e74d6",
            "https://git.kernel.org/stable/c/18aae2cb87e5faa9c5bd865260ceadac60d5a6c5",
            "https://git.kernel.org/stable/c/440e948cf0eff32cfe322dcbca3f2525354b159b",
            "https://git.kernel.org/stable/c/58f2bfb789e6bd3bc24a2c9c1580f3c67aec3018",
            "https://git.kernel.org/stable/c/81d51b9b7c95e791ba3c1a2dd77920a9d3b3f525",
            "https://www.cve.org/CVERecord?id=CVE-2024-35896\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35896\nhttps://lore.kernel.org/linux-cve-announce/2024051950-CVE-2024-35896-e6b5@gregkh/T"
        ]
    },
    "CVE-2024-35897": {
        "cve": "CVE-2024-35897",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: discard table flag update with pending basechain deletion\n\nHook unregistration is deferred to the commit phase, same occurs with\nhook updates triggered by the table dormant flag. When both commands are\ncombined, this results in deleting a basechain while leaving its hook\nstill registered in the core.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35897",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1bc83a019bbe268be3526406245ec28c2458a518",
            "patch_url": "https://git.kernel.org/stable/p/1bc83a019bbe268be3526406245ec28c2458a518",
            "filename": "CVE-2024-35897-1bc83a019bbe268be3526406245ec28c2458a518.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35897/CVE-2024-35897-1bc83a019bbe268be3526406245ec28c2458a518.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1bc83a019bbe268be3526406245ec28c2458a518",
                "patch_url": "https://git.kernel.org/stable/p/1bc83a019bbe268be3526406245ec28c2458a518",
                "filename": "CVE-2024-35897-1bc83a019bbe268be3526406245ec28c2458a518.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35897/CVE-2024-35897-1bc83a019bbe268be3526406245ec28c2458a518.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2aeb805a1bcd5f27c8c0d1a9d4d653f16d1506f4",
                "patch_url": "https://git.kernel.org/stable/p/2aeb805a1bcd5f27c8c0d1a9d4d653f16d1506f4",
                "filename": "CVE-2024-35897-2aeb805a1bcd5f27c8c0d1a9d4d653f16d1506f4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35897/CVE-2024-35897-2aeb805a1bcd5f27c8c0d1a9d4d653f16d1506f4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6cbbe1ba76ee7e674a86abd43009b083a45838cb",
                "patch_url": "https://git.kernel.org/stable/p/6cbbe1ba76ee7e674a86abd43009b083a45838cb",
                "filename": "CVE-2024-35897-6cbbe1ba76ee7e674a86abd43009b083a45838cb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35897/CVE-2024-35897-6cbbe1ba76ee7e674a86abd43009b083a45838cb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7f609f630951b624348373cef99991ce08831927",
                "patch_url": "https://git.kernel.org/stable/p/7f609f630951b624348373cef99991ce08831927",
                "filename": "CVE-2024-35897-7f609f630951b624348373cef99991ce08831927.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35897/CVE-2024-35897-7f609f630951b624348373cef99991ce08831927.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9627fd0c6ea1c446741a33e67bc5709c59923827",
                "patch_url": "https://git.kernel.org/stable/p/9627fd0c6ea1c446741a33e67bc5709c59923827",
                "filename": "CVE-2024-35897-9627fd0c6ea1c446741a33e67bc5709c59923827.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35897/CVE-2024-35897-9627fd0c6ea1c446741a33e67bc5709c59923827.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9a3b90904d8a072287480eed4c3ece4b99d64f78",
                "patch_url": "https://git.kernel.org/stable/p/9a3b90904d8a072287480eed4c3ece4b99d64f78",
                "filename": "CVE-2024-35897-9a3b90904d8a072287480eed4c3ece4b99d64f78.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35897/CVE-2024-35897-9a3b90904d8a072287480eed4c3ece4b99d64f78.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b58d0ac35f6d75ec1db8650a29dfd6f292c11362",
                "patch_url": "https://git.kernel.org/stable/p/b58d0ac35f6d75ec1db8650a29dfd6f292c11362",
                "filename": "CVE-2024-35897-b58d0ac35f6d75ec1db8650a29dfd6f292c11362.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35897/CVE-2024-35897-b58d0ac35f6d75ec1db8650a29dfd6f292c11362.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e75faf01e22ec7dc671640fa0e0968964fafd2fc",
                "patch_url": "https://git.kernel.org/stable/p/e75faf01e22ec7dc671640fa0e0968964fafd2fc",
                "filename": "CVE-2024-35897-e75faf01e22ec7dc671640fa0e0968964fafd2fc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35897/CVE-2024-35897-e75faf01e22ec7dc671640fa0e0968964fafd2fc.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1bc83a019bbe268be3526406245ec28c2458a518",
            "https://git.kernel.org/stable/c/2aeb805a1bcd5f27c8c0d1a9d4d653f16d1506f4",
            "https://git.kernel.org/stable/c/6cbbe1ba76ee7e674a86abd43009b083a45838cb",
            "https://git.kernel.org/stable/c/7f609f630951b624348373cef99991ce08831927",
            "https://git.kernel.org/stable/c/9627fd0c6ea1c446741a33e67bc5709c59923827",
            "https://git.kernel.org/stable/c/9a3b90904d8a072287480eed4c3ece4b99d64f78",
            "https://git.kernel.org/stable/c/b58d0ac35f6d75ec1db8650a29dfd6f292c11362",
            "https://git.kernel.org/stable/c/e75faf01e22ec7dc671640fa0e0968964fafd2fc",
            "https://www.cve.org/CVERecord?id=CVE-2024-35897\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35897\nhttps://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35897-1585@gregkh/T"
        ]
    },
    "CVE-2024-35898": {
        "cve": "CVE-2024-35898",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()\n\nnft_unregister_flowtable_type() within nf_flow_inet_module_exit() can\nconcurrent with __nft_flowtable_type_get() within nf_tables_newflowtable().\nAnd thhere is not any protection when iterate over nf_tables_flowtables\nlist in __nft_flowtable_type_get(). Therefore, there is pertential\ndata-race of nf_tables_flowtables list entry.\n\nUse list_for_each_entry_rcu() to iterate over nf_tables_flowtables list\nin __nft_flowtable_type_get(), and use rcu_read_lock() in the caller\nnft_flowtable_type_get() to protect the entire type query process.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35898",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/940d41caa71f0d3a52df2fde5fada524a993e331",
            "patch_url": "https://git.kernel.org/stable/p/940d41caa71f0d3a52df2fde5fada524a993e331",
            "filename": "CVE-2024-35898-940d41caa71f0d3a52df2fde5fada524a993e331.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35898/CVE-2024-35898-940d41caa71f0d3a52df2fde5fada524a993e331.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/24225011d81b471acc0e1e315b7d9905459a6304",
                "patch_url": "https://git.kernel.org/stable/p/24225011d81b471acc0e1e315b7d9905459a6304",
                "filename": "CVE-2024-35898-24225011d81b471acc0e1e315b7d9905459a6304.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35898/CVE-2024-35898-24225011d81b471acc0e1e315b7d9905459a6304.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2485bcfe05ee3cf9ca8923a94fa2e456924c79c8",
                "patch_url": "https://git.kernel.org/stable/p/2485bcfe05ee3cf9ca8923a94fa2e456924c79c8",
                "filename": "CVE-2024-35898-2485bcfe05ee3cf9ca8923a94fa2e456924c79c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35898/CVE-2024-35898-2485bcfe05ee3cf9ca8923a94fa2e456924c79c8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/69d1fe14a680042ec913f22196b58e2c8ff1b007",
                "patch_url": "https://git.kernel.org/stable/p/69d1fe14a680042ec913f22196b58e2c8ff1b007",
                "filename": "CVE-2024-35898-69d1fe14a680042ec913f22196b58e2c8ff1b007.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35898/CVE-2024-35898-69d1fe14a680042ec913f22196b58e2c8ff1b007.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8b891153b2e4dc0ca9d9dab8f619d49c740813df",
                "patch_url": "https://git.kernel.org/stable/p/8b891153b2e4dc0ca9d9dab8f619d49c740813df",
                "filename": "CVE-2024-35898-8b891153b2e4dc0ca9d9dab8f619d49c740813df.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35898/CVE-2024-35898-8b891153b2e4dc0ca9d9dab8f619d49c740813df.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/940d41caa71f0d3a52df2fde5fada524a993e331",
                "patch_url": "https://git.kernel.org/stable/p/940d41caa71f0d3a52df2fde5fada524a993e331",
                "filename": "CVE-2024-35898-940d41caa71f0d3a52df2fde5fada524a993e331.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35898/CVE-2024-35898-940d41caa71f0d3a52df2fde5fada524a993e331.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9b5b7708ec2be21dd7ef8ca0e3abe4ae9f3b083b",
                "patch_url": "https://git.kernel.org/stable/p/9b5b7708ec2be21dd7ef8ca0e3abe4ae9f3b083b",
                "filename": "CVE-2024-35898-9b5b7708ec2be21dd7ef8ca0e3abe4ae9f3b083b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35898/CVE-2024-35898-9b5b7708ec2be21dd7ef8ca0e3abe4ae9f3b083b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a347bc8e6251eaee4b619da28020641eb5b0dd77",
                "patch_url": "https://git.kernel.org/stable/p/a347bc8e6251eaee4b619da28020641eb5b0dd77",
                "filename": "CVE-2024-35898-a347bc8e6251eaee4b619da28020641eb5b0dd77.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35898/CVE-2024-35898-a347bc8e6251eaee4b619da28020641eb5b0dd77.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e684b1674fd1ca4361812a491242ae871d6b2859",
                "patch_url": "https://git.kernel.org/stable/p/e684b1674fd1ca4361812a491242ae871d6b2859",
                "filename": "CVE-2024-35898-e684b1674fd1ca4361812a491242ae871d6b2859.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35898/CVE-2024-35898-e684b1674fd1ca4361812a491242ae871d6b2859.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/24225011d81b471acc0e1e315b7d9905459a6304",
            "https://git.kernel.org/stable/c/2485bcfe05ee3cf9ca8923a94fa2e456924c79c8",
            "https://git.kernel.org/stable/c/69d1fe14a680042ec913f22196b58e2c8ff1b007",
            "https://git.kernel.org/stable/c/8b891153b2e4dc0ca9d9dab8f619d49c740813df",
            "https://git.kernel.org/stable/c/940d41caa71f0d3a52df2fde5fada524a993e331",
            "https://git.kernel.org/stable/c/9b5b7708ec2be21dd7ef8ca0e3abe4ae9f3b083b",
            "https://git.kernel.org/stable/c/a347bc8e6251eaee4b619da28020641eb5b0dd77",
            "https://git.kernel.org/stable/c/e684b1674fd1ca4361812a491242ae871d6b2859",
            "https://www.cve.org/CVERecord?id=CVE-2024-35898\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35898\nhttps://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35898-a10e@gregkh/T"
        ]
    },
    "CVE-2024-35899": {
        "cve": "CVE-2024-35899",
        "cvss_v2": null,
        "cvss_v3": 6.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: flush pending destroy work before exit_net release\n\nSimilar to 2c9f0293280e (\"netfilter: nf_tables: flush pending destroy\nwork before netlink notifier\") to address a race between exit_net and\nthe destroy workqueue.\n\nThe trace below shows an element to be released via destroy workqueue\nwhile exit_net path (triggered via module removal) has already released\nthe set that is used in such transaction.\n\n[ 1360.547789] BUG: KASAN: slab-use-after-free in nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.547861] Read of size 8 at addr ffff888140500cc0 by task kworker/4:1/152465\n[ 1360.547870] CPU: 4 PID: 152465 Comm: kworker/4:1 Not tainted 6.8.0+ #359\n[ 1360.547882] Workqueue: events nf_tables_trans_destroy_work [nf_tables]\n[ 1360.547984] Call Trace:\n[ 1360.547991]  <TASK>\n[ 1360.547998]  dump_stack_lvl+0x53/0x70\n[ 1360.548014]  print_report+0xc4/0x610\n[ 1360.548026]  ? __virt_addr_valid+0xba/0x160\n[ 1360.548040]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10\n[ 1360.548054]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.548176]  kasan_report+0xae/0xe0\n[ 1360.548189]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.548312]  nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]\n[ 1360.548447]  ? __pfx_nf_tables_trans_destroy_work+0x10/0x10 [nf_tables]\n[ 1360.548577]  ? _raw_spin_unlock_irq+0x18/0x30\n[ 1360.548591]  process_one_work+0x2f1/0x670\n[ 1360.548610]  worker_thread+0x4d3/0x760\n[ 1360.548627]  ? __pfx_worker_thread+0x10/0x10\n[ 1360.548640]  kthread+0x16b/0x1b0\n[ 1360.548653]  ? __pfx_kthread+0x10/0x10\n[ 1360.548665]  ret_from_fork+0x2f/0x50\n[ 1360.548679]  ? __pfx_kthread+0x10/0x10\n[ 1360.548690]  ret_from_fork_asm+0x1a/0x30\n[ 1360.548707]  </TASK>\n\n[ 1360.548719] Allocated by task 192061:\n[ 1360.548726]  kasan_save_stack+0x20/0x40\n[ 1360.548739]  kasan_save_track+0x14/0x30\n[ 1360.548750]  __kasan_kmalloc+0x8f/0xa0\n[ 1360.548760]  __kmalloc_node+0x1f1/0x450\n[ 1360.548771]  nf_tables_newset+0x10c7/0x1b50 [nf_tables]\n[ 1360.548883]  nfnetlink_rcv_batch+0xbc4/0xdc0 [nfnetlink]\n[ 1360.548909]  nfnetlink_rcv+0x1a8/0x1e0 [nfnetlink]\n[ 1360.548927]  netlink_unicast+0x367/0x4f0\n[ 1360.548935]  netlink_sendmsg+0x34b/0x610\n[ 1360.548944]  ____sys_sendmsg+0x4d4/0x510\n[ 1360.548953]  ___sys_sendmsg+0xc9/0x120\n[ 1360.548961]  __sys_sendmsg+0xbe/0x140\n[ 1360.548971]  do_syscall_64+0x55/0x120\n[ 1360.548982]  entry_SYSCALL_64_after_hwframe+0x55/0x5d\n\n[ 1360.548994] Freed by task 192222:\n[ 1360.548999]  kasan_save_stack+0x20/0x40\n[ 1360.549009]  kasan_save_track+0x14/0x30\n[ 1360.549019]  kasan_save_free_info+0x3b/0x60\n[ 1360.549028]  poison_slab_object+0x100/0x180\n[ 1360.549036]  __kasan_slab_free+0x14/0x30\n[ 1360.549042]  kfree+0xb6/0x260\n[ 1360.549049]  __nft_release_table+0x473/0x6a0 [nf_tables]\n[ 1360.549131]  nf_tables_exit_net+0x170/0x240 [nf_tables]\n[ 1360.549221]  ops_exit_list+0x50/0xa0\n[ 1360.549229]  free_exit_list+0x101/0x140\n[ 1360.549236]  unregister_pernet_operations+0x107/0x160\n[ 1360.549245]  unregister_pernet_subsys+0x1c/0x30\n[ 1360.549254]  nf_tables_module_exit+0x43/0x80 [nf_tables]\n[ 1360.549345]  __do_sys_delete_module+0x253/0x370\n[ 1360.549352]  do_syscall_64+0x55/0x120\n[ 1360.549360]  entry_SYSCALL_64_after_hwframe+0x55/0x5d\n\n(gdb) list *__nft_release_table+0x473\n0x1e033 is in __nft_release_table (net/netfilter/nf_tables_api.c:11354).\n11349           list_for_each_entry_safe(flowtable, nf, &table->flowtables, list) {\n11350                   list_del(&flowtable->list);\n11351                   nft_use_dec(&table->use);\n11352                   nf_tables_flowtable_destroy(flowtable);\n11353           }\n11354           list_for_each_entry_safe(set, ns, &table->sets, list) {\n11355                   list_del(&set->list);\n11356                   nft_use_dec(&table->use);\n11357                   if (set->flags & (NFT_SET_MAP | NFT_SET_OBJECT))\n11358                           nft_map_deactivat\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35899",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/f4e14695fe805eb0f0cb36e0ad6a560b9f985e86",
            "patch_url": "https://git.kernel.org/stable/p/f4e14695fe805eb0f0cb36e0ad6a560b9f985e86",
            "filename": "CVE-2024-35899-f4e14695fe805eb0f0cb36e0ad6a560b9f985e86.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35899/CVE-2024-35899-f4e14695fe805eb0f0cb36e0ad6a560b9f985e86.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/24cea9677025e0de419989ecb692acd4bb34cac2",
                "patch_url": "https://git.kernel.org/stable/p/24cea9677025e0de419989ecb692acd4bb34cac2",
                "filename": "CVE-2024-35899-24cea9677025e0de419989ecb692acd4bb34cac2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35899/CVE-2024-35899-24cea9677025e0de419989ecb692acd4bb34cac2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/333b5085522cf1898d5a0d92616046b414f631a7",
                "patch_url": "https://git.kernel.org/stable/p/333b5085522cf1898d5a0d92616046b414f631a7",
                "filename": "CVE-2024-35899-333b5085522cf1898d5a0d92616046b414f631a7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35899/CVE-2024-35899-333b5085522cf1898d5a0d92616046b414f631a7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/46c4481938e2ca62343b16ea83ab28f4c1733d31",
                "patch_url": "https://git.kernel.org/stable/p/46c4481938e2ca62343b16ea83ab28f4c1733d31",
                "filename": "CVE-2024-35899-46c4481938e2ca62343b16ea83ab28f4c1733d31.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35899/CVE-2024-35899-46c4481938e2ca62343b16ea83ab28f4c1733d31.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4e8447a9a3d367b5065a0b7abe101da6e0037b6e",
                "patch_url": "https://git.kernel.org/stable/p/4e8447a9a3d367b5065a0b7abe101da6e0037b6e",
                "filename": "CVE-2024-35899-4e8447a9a3d367b5065a0b7abe101da6e0037b6e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35899/CVE-2024-35899-4e8447a9a3d367b5065a0b7abe101da6e0037b6e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d2c9eb19fc3b11caebafde4c30a76a49203d18a6",
                "patch_url": "https://git.kernel.org/stable/p/d2c9eb19fc3b11caebafde4c30a76a49203d18a6",
                "filename": "CVE-2024-35899-d2c9eb19fc3b11caebafde4c30a76a49203d18a6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35899/CVE-2024-35899-d2c9eb19fc3b11caebafde4c30a76a49203d18a6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f4e14695fe805eb0f0cb36e0ad6a560b9f985e86",
                "patch_url": "https://git.kernel.org/stable/p/f4e14695fe805eb0f0cb36e0ad6a560b9f985e86",
                "filename": "CVE-2024-35899-f4e14695fe805eb0f0cb36e0ad6a560b9f985e86.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35899/CVE-2024-35899-f4e14695fe805eb0f0cb36e0ad6a560b9f985e86.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f7e3c88cc2a977c2b9a8aa52c1ce689e7b394e49",
                "patch_url": "https://git.kernel.org/stable/p/f7e3c88cc2a977c2b9a8aa52c1ce689e7b394e49",
                "filename": "CVE-2024-35899-f7e3c88cc2a977c2b9a8aa52c1ce689e7b394e49.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35899/CVE-2024-35899-f7e3c88cc2a977c2b9a8aa52c1ce689e7b394e49.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/24cea9677025e0de419989ecb692acd4bb34cac2",
            "https://git.kernel.org/stable/c/333b5085522cf1898d5a0d92616046b414f631a7",
            "https://git.kernel.org/stable/c/46c4481938e2ca62343b16ea83ab28f4c1733d31",
            "https://git.kernel.org/stable/c/4e8447a9a3d367b5065a0b7abe101da6e0037b6e",
            "https://git.kernel.org/stable/c/d2c9eb19fc3b11caebafde4c30a76a49203d18a6",
            "https://git.kernel.org/stable/c/f4e14695fe805eb0f0cb36e0ad6a560b9f985e86",
            "https://git.kernel.org/stable/c/f7e3c88cc2a977c2b9a8aa52c1ce689e7b394e49",
            "https://www.cve.org/CVERecord?id=CVE-2024-35899\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35899\nhttps://lore.kernel.org/linux-cve-announce/2024051951-CVE-2024-35899-c56a@gregkh/T"
        ]
    },
    "CVE-2024-35900": {
        "cve": "CVE-2024-35900",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: reject new basechain after table flag update\n\nWhen dormant flag is toggled, hooks are disabled in the commit phase by\niterating over current chains in table (existing and new).\n\nThe following configuration allows for an inconsistent state:\n\n  add table x\n  add chain x y { type filter hook input priority 0; }\n  add table x { flags dormant; }\n  add chain x w { type filter hook input priority 1; }\n\nwhich triggers the following warning when trying to unregister chain w\nwhich is already unregistered.\n\n[  127.322252] WARNING: CPU: 7 PID: 1211 at net/netfilter/core.c:50                                                                     1 __nf_unregister_net_hook+0x21a/0x260\n[...]\n[  127.322519] Call Trace:\n[  127.322521]  <TASK>\n[  127.322524]  ? __warn+0x9f/0x1a0\n[  127.322531]  ? __nf_unregister_net_hook+0x21a/0x260\n[  127.322537]  ? report_bug+0x1b1/0x1e0\n[  127.322545]  ? handle_bug+0x3c/0x70\n[  127.322552]  ? exc_invalid_op+0x17/0x40\n[  127.322556]  ? asm_exc_invalid_op+0x1a/0x20\n[  127.322563]  ? kasan_save_free_info+0x3b/0x60\n[  127.322570]  ? __nf_unregister_net_hook+0x6a/0x260\n[  127.322577]  ? __nf_unregister_net_hook+0x21a/0x260\n[  127.322583]  ? __nf_unregister_net_hook+0x6a/0x260\n[  127.322590]  ? __nf_tables_unregister_hook+0x8a/0xe0 [nf_tables]\n[  127.322655]  nft_table_disable+0x75/0xf0 [nf_tables]\n[  127.322717]  nf_tables_commit+0x2571/0x2620 [nf_tables]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35900",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/41bad13c0e8a5a2b47a7472cced922555372daab",
            "patch_url": "https://git.kernel.org/stable/p/41bad13c0e8a5a2b47a7472cced922555372daab",
            "filename": "CVE-2024-35900-41bad13c0e8a5a2b47a7472cced922555372daab.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35900/CVE-2024-35900-41bad13c0e8a5a2b47a7472cced922555372daab.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/41bad13c0e8a5a2b47a7472cced922555372daab",
                "patch_url": "https://git.kernel.org/stable/p/41bad13c0e8a5a2b47a7472cced922555372daab",
                "filename": "CVE-2024-35900-41bad13c0e8a5a2b47a7472cced922555372daab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35900/CVE-2024-35900-41bad13c0e8a5a2b47a7472cced922555372daab.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/420132bee3d0136b7fba253a597b098fe15493a7",
                "patch_url": "https://git.kernel.org/stable/p/420132bee3d0136b7fba253a597b098fe15493a7",
                "filename": "CVE-2024-35900-420132bee3d0136b7fba253a597b098fe15493a7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35900/CVE-2024-35900-420132bee3d0136b7fba253a597b098fe15493a7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6d12f21f8bbe23fde25b77c2bf5973c136b8bef8",
                "patch_url": "https://git.kernel.org/stable/p/6d12f21f8bbe23fde25b77c2bf5973c136b8bef8",
                "filename": "CVE-2024-35900-6d12f21f8bbe23fde25b77c2bf5973c136b8bef8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35900/CVE-2024-35900-6d12f21f8bbe23fde25b77c2bf5973c136b8bef8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/745cf6a843896cdac8766c74379300ed73c78830",
                "patch_url": "https://git.kernel.org/stable/p/745cf6a843896cdac8766c74379300ed73c78830",
                "filename": "CVE-2024-35900-745cf6a843896cdac8766c74379300ed73c78830.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35900/CVE-2024-35900-745cf6a843896cdac8766c74379300ed73c78830.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7b6fba6918714afee3e17796113ccab636255c7b",
                "patch_url": "https://git.kernel.org/stable/p/7b6fba6918714afee3e17796113ccab636255c7b",
                "filename": "CVE-2024-35900-7b6fba6918714afee3e17796113ccab636255c7b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35900/CVE-2024-35900-7b6fba6918714afee3e17796113ccab636255c7b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8ba81dca416adf82fc5a2a23abc1a8cc02ad32fb",
                "patch_url": "https://git.kernel.org/stable/p/8ba81dca416adf82fc5a2a23abc1a8cc02ad32fb",
                "filename": "CVE-2024-35900-8ba81dca416adf82fc5a2a23abc1a8cc02ad32fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35900/CVE-2024-35900-8ba81dca416adf82fc5a2a23abc1a8cc02ad32fb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/994209ddf4f430946f6247616b2e33d179243769",
                "patch_url": "https://git.kernel.org/stable/p/994209ddf4f430946f6247616b2e33d179243769",
                "filename": "CVE-2024-35900-994209ddf4f430946f6247616b2e33d179243769.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35900/CVE-2024-35900-994209ddf4f430946f6247616b2e33d179243769.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e95bb4cba94c018be24b11f017d1c55dd6cda31a",
                "patch_url": "https://git.kernel.org/stable/p/e95bb4cba94c018be24b11f017d1c55dd6cda31a",
                "filename": "CVE-2024-35900-e95bb4cba94c018be24b11f017d1c55dd6cda31a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35900/CVE-2024-35900-e95bb4cba94c018be24b11f017d1c55dd6cda31a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/41bad13c0e8a5a2b47a7472cced922555372daab",
            "https://git.kernel.org/stable/c/420132bee3d0136b7fba253a597b098fe15493a7",
            "https://git.kernel.org/stable/c/6d12f21f8bbe23fde25b77c2bf5973c136b8bef8",
            "https://git.kernel.org/stable/c/745cf6a843896cdac8766c74379300ed73c78830",
            "https://git.kernel.org/stable/c/7b6fba6918714afee3e17796113ccab636255c7b",
            "https://git.kernel.org/stable/c/8ba81dca416adf82fc5a2a23abc1a8cc02ad32fb",
            "https://git.kernel.org/stable/c/994209ddf4f430946f6247616b2e33d179243769",
            "https://git.kernel.org/stable/c/e95bb4cba94c018be24b11f017d1c55dd6cda31a",
            "https://www.cve.org/CVERecord?id=CVE-2024-35900\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35900\nhttps://lore.kernel.org/linux-cve-announce/2024051952-CVE-2024-35900-c2c9@gregkh/T"
        ]
    },
    "CVE-2024-35910": {
        "cve": "CVE-2024-35910",
        "cvss_v2": null,
        "cvss_v3": 5.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: properly terminate timers for kernel sockets\n\nWe had various syzbot reports about tcp timers firing after\nthe corresponding netns has been dismantled.\n\nFortunately Josef Bacik could trigger the issue more often,\nand could test a patch I wrote two years ago.\n\nWhen TCP sockets are closed, we call inet_csk_clear_xmit_timers()\nto 'stop' the timers.\n\ninet_csk_clear_xmit_timers() can be called from any context,\nincluding when socket lock is held.\nThis is the reason it uses sk_stop_timer(), aka del_timer().\nThis means that ongoing timers might finish much later.\n\nFor user sockets, this is fine because each running timer\nholds a reference on the socket, and the user socket holds\na reference on the netns.\n\nFor kernel sockets, we risk that the netns is freed before\ntimer can complete, because kernel sockets do not hold\nreference on the netns.\n\nThis patch adds inet_csk_clear_xmit_timers_sync() function\nthat using sk_stop_timer_sync() to make sure all timers\nare terminated before the kernel socket is released.\nModules using kernel sockets close them in their netns exit()\nhandler.\n\nAlso add sock_not_owned_by_me() helper to get LOCKDEP\nsupport : inet_csk_clear_xmit_timers_sync() must not be called\nwhile socket lock is held.\n\nIt is very possible we can revert in the future commit\n3a58f13a881e (\"net: rds: acquire refcount on TCP sockets\")\nwhich attempted to solve the issue in rds only.\n(net/smc/af_smc.c and net/mptcp/subflow.c have similar code)\n\nWe probably can remove the check_net() tests from\ntcp_out_of_resources() and __tcp_close() in the future.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35910",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/44e62f5d35678686734afd47c6a421ad30772e7f",
            "patch_url": "https://git.kernel.org/stable/p/44e62f5d35678686734afd47c6a421ad30772e7f",
            "filename": "CVE-2024-35910-44e62f5d35678686734afd47c6a421ad30772e7f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35910/CVE-2024-35910-44e62f5d35678686734afd47c6a421ad30772e7f.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/151c9c724d05d5b0dd8acd3e11cb69ef1f2dbada",
                "patch_url": "https://git.kernel.org/stable/p/151c9c724d05d5b0dd8acd3e11cb69ef1f2dbada",
                "filename": "CVE-2024-35910-151c9c724d05d5b0dd8acd3e11cb69ef1f2dbada.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35910/CVE-2024-35910-151c9c724d05d5b0dd8acd3e11cb69ef1f2dbada.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2e43d8eba6edd1cf05a3a20fdd77688fa7ec16a4",
                "patch_url": "https://git.kernel.org/stable/p/2e43d8eba6edd1cf05a3a20fdd77688fa7ec16a4",
                "filename": "CVE-2024-35910-2e43d8eba6edd1cf05a3a20fdd77688fa7ec16a4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35910/CVE-2024-35910-2e43d8eba6edd1cf05a3a20fdd77688fa7ec16a4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/44e62f5d35678686734afd47c6a421ad30772e7f",
                "patch_url": "https://git.kernel.org/stable/p/44e62f5d35678686734afd47c6a421ad30772e7f",
                "filename": "CVE-2024-35910-44e62f5d35678686734afd47c6a421ad30772e7f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35910/CVE-2024-35910-44e62f5d35678686734afd47c6a421ad30772e7f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/899265c1389fe022802aae73dbf13ee08837a35a",
                "patch_url": "https://git.kernel.org/stable/p/899265c1389fe022802aae73dbf13ee08837a35a",
                "filename": "CVE-2024-35910-899265c1389fe022802aae73dbf13ee08837a35a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35910/CVE-2024-35910-899265c1389fe022802aae73dbf13ee08837a35a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/91b243de910a9ac8476d40238ab3dbfeedd5b7de",
                "patch_url": "https://git.kernel.org/stable/p/91b243de910a9ac8476d40238ab3dbfeedd5b7de",
                "filename": "CVE-2024-35910-91b243de910a9ac8476d40238ab3dbfeedd5b7de.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35910/CVE-2024-35910-91b243de910a9ac8476d40238ab3dbfeedd5b7de.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/93f0133b9d589cc6e865f254ad9be3e9d8133f50",
                "patch_url": "https://git.kernel.org/stable/p/93f0133b9d589cc6e865f254ad9be3e9d8133f50",
                "filename": "CVE-2024-35910-93f0133b9d589cc6e865f254ad9be3e9d8133f50.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35910/CVE-2024-35910-93f0133b9d589cc6e865f254ad9be3e9d8133f50.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c1ae4d1e76eacddaacb958b67cd942082f800c87",
                "patch_url": "https://git.kernel.org/stable/p/c1ae4d1e76eacddaacb958b67cd942082f800c87",
                "filename": "CVE-2024-35910-c1ae4d1e76eacddaacb958b67cd942082f800c87.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35910/CVE-2024-35910-c1ae4d1e76eacddaacb958b67cd942082f800c87.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e3e27d2b446deb1f643758a0c4731f5c22492810",
                "patch_url": "https://git.kernel.org/stable/p/e3e27d2b446deb1f643758a0c4731f5c22492810",
                "filename": "CVE-2024-35910-e3e27d2b446deb1f643758a0c4731f5c22492810.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35910/CVE-2024-35910-e3e27d2b446deb1f643758a0c4731f5c22492810.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/151c9c724d05d5b0dd8acd3e11cb69ef1f2dbada",
            "https://git.kernel.org/stable/c/2e43d8eba6edd1cf05a3a20fdd77688fa7ec16a4",
            "https://git.kernel.org/stable/c/44e62f5d35678686734afd47c6a421ad30772e7f",
            "https://git.kernel.org/stable/c/899265c1389fe022802aae73dbf13ee08837a35a",
            "https://git.kernel.org/stable/c/91b243de910a9ac8476d40238ab3dbfeedd5b7de",
            "https://git.kernel.org/stable/c/93f0133b9d589cc6e865f254ad9be3e9d8133f50",
            "https://git.kernel.org/stable/c/c1ae4d1e76eacddaacb958b67cd942082f800c87",
            "https://git.kernel.org/stable/c/e3e27d2b446deb1f643758a0c4731f5c22492810",
            "https://www.cve.org/CVERecord?id=CVE-2024-35910\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35910\nhttps://lore.kernel.org/linux-cve-announce/2024051955-CVE-2024-35910-5f95@gregkh/T"
        ]
    },
    "CVE-2024-35912": {
        "cve": "CVE-2024-35912",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: rfi: fix potential response leaks\n\nIf the rx payload length check fails, or if kmemdup() fails,\nwe still need to free the command response. Fix that.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35912",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/99a75d75007421d8e08ba139e24f77395cd08f62",
            "patch_url": "https://git.kernel.org/stable/p/99a75d75007421d8e08ba139e24f77395cd08f62",
            "filename": "CVE-2024-35912-99a75d75007421d8e08ba139e24f77395cd08f62.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35912/CVE-2024-35912-99a75d75007421d8e08ba139e24f77395cd08f62.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/06a093807eb7b5c5b29b6cff49f8174a4e702341",
                "patch_url": "https://git.kernel.org/stable/p/06a093807eb7b5c5b29b6cff49f8174a4e702341",
                "filename": "CVE-2024-35912-06a093807eb7b5c5b29b6cff49f8174a4e702341.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35912/CVE-2024-35912-06a093807eb7b5c5b29b6cff49f8174a4e702341.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/28db0ae86cb91a4ab0e855cff779daead936b7d5",
                "patch_url": "https://git.kernel.org/stable/p/28db0ae86cb91a4ab0e855cff779daead936b7d5",
                "filename": "CVE-2024-35912-28db0ae86cb91a4ab0e855cff779daead936b7d5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35912/CVE-2024-35912-28db0ae86cb91a4ab0e855cff779daead936b7d5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/99a75d75007421d8e08ba139e24f77395cd08f62",
                "patch_url": "https://git.kernel.org/stable/p/99a75d75007421d8e08ba139e24f77395cd08f62",
                "filename": "CVE-2024-35912-99a75d75007421d8e08ba139e24f77395cd08f62.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35912/CVE-2024-35912-99a75d75007421d8e08ba139e24f77395cd08f62.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c0a40f2f8eba07416f695ffe2011bf3f8b0b6dc8",
                "patch_url": "https://git.kernel.org/stable/p/c0a40f2f8eba07416f695ffe2011bf3f8b0b6dc8",
                "filename": "CVE-2024-35912-c0a40f2f8eba07416f695ffe2011bf3f8b0b6dc8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35912/CVE-2024-35912-c0a40f2f8eba07416f695ffe2011bf3f8b0b6dc8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f7f0e784894dfcb265f0f9fa499103b0ca7eabde",
                "patch_url": "https://git.kernel.org/stable/p/f7f0e784894dfcb265f0f9fa499103b0ca7eabde",
                "filename": "CVE-2024-35912-f7f0e784894dfcb265f0f9fa499103b0ca7eabde.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35912/CVE-2024-35912-f7f0e784894dfcb265f0f9fa499103b0ca7eabde.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/06a093807eb7b5c5b29b6cff49f8174a4e702341",
            "https://git.kernel.org/stable/c/28db0ae86cb91a4ab0e855cff779daead936b7d5",
            "https://git.kernel.org/stable/c/99a75d75007421d8e08ba139e24f77395cd08f62",
            "https://git.kernel.org/stable/c/c0a40f2f8eba07416f695ffe2011bf3f8b0b6dc8",
            "https://git.kernel.org/stable/c/f7f0e784894dfcb265f0f9fa499103b0ca7eabde",
            "https://www.cve.org/CVERecord?id=CVE-2024-35912\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35912\nhttps://lore.kernel.org/linux-cve-announce/2024051956-CVE-2024-35912-b093@gregkh/T"
        ]
    },
    "CVE-2024-35924": {
        "cve": "CVE-2024-35924",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: typec: ucsi: Limit read size on v1.2\n\nBetween UCSI 1.2 and UCSI 2.0, the size of the MESSAGE_IN region was\nincreased from 16 to 256. In order to avoid overflowing reads for older\nsystems, add a mechanism to use the read UCSI version to truncate read\nsizes on UCSI v1.2.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35924",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0defcaa09d3b21e8387829ee3a652c43fa91e13f",
            "patch_url": "https://git.kernel.org/stable/p/0defcaa09d3b21e8387829ee3a652c43fa91e13f",
            "filename": "CVE-2024-35924-0defcaa09d3b21e8387829ee3a652c43fa91e13f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35924/CVE-2024-35924-0defcaa09d3b21e8387829ee3a652c43fa91e13f.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0defcaa09d3b21e8387829ee3a652c43fa91e13f",
                "patch_url": "https://git.kernel.org/stable/p/0defcaa09d3b21e8387829ee3a652c43fa91e13f",
                "filename": "CVE-2024-35924-0defcaa09d3b21e8387829ee3a652c43fa91e13f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35924/CVE-2024-35924-0defcaa09d3b21e8387829ee3a652c43fa91e13f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/266f403ec47573046dee4bcebda82777ce702c40",
                "patch_url": "https://git.kernel.org/stable/p/266f403ec47573046dee4bcebda82777ce702c40",
                "filename": "CVE-2024-35924-266f403ec47573046dee4bcebda82777ce702c40.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35924/CVE-2024-35924-266f403ec47573046dee4bcebda82777ce702c40.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b3db266fb031fba88c423d4bb8983a73a3db6527",
                "patch_url": "https://git.kernel.org/stable/p/b3db266fb031fba88c423d4bb8983a73a3db6527",
                "filename": "CVE-2024-35924-b3db266fb031fba88c423d4bb8983a73a3db6527.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35924/CVE-2024-35924-b3db266fb031fba88c423d4bb8983a73a3db6527.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0defcaa09d3b21e8387829ee3a652c43fa91e13f",
            "https://git.kernel.org/stable/c/266f403ec47573046dee4bcebda82777ce702c40",
            "https://git.kernel.org/stable/c/b3db266fb031fba88c423d4bb8983a73a3db6527",
            "https://www.cve.org/CVERecord?id=CVE-2024-35924\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35924\nhttps://lore.kernel.org/linux-cve-announce/2024051914-CVE-2024-35924-90f6@gregkh/T"
        ]
    },
    "CVE-2024-35925": {
        "cve": "CVE-2024-35925",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: prevent division by zero in blk_rq_stat_sum()\n\nThe expression dst->nr_samples + src->nr_samples may\nhave zero value on overflow. It is necessary to add\na check to avoid division by zero.\n\nFound by Linux Verification Center (linuxtesting.org) with Svace.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35925",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/5f7fd6aa4c4877d77133ea86c14cf256f390b2fe",
            "patch_url": "https://git.kernel.org/stable/p/5f7fd6aa4c4877d77133ea86c14cf256f390b2fe",
            "filename": "CVE-2024-35925-5f7fd6aa4c4877d77133ea86c14cf256f390b2fe.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35925/CVE-2024-35925-5f7fd6aa4c4877d77133ea86c14cf256f390b2fe.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/21e7d72d0cfcbae6042d498ea2e6f395311767f8",
                "patch_url": "https://git.kernel.org/stable/p/21e7d72d0cfcbae6042d498ea2e6f395311767f8",
                "filename": "CVE-2024-35925-21e7d72d0cfcbae6042d498ea2e6f395311767f8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35925/CVE-2024-35925-21e7d72d0cfcbae6042d498ea2e6f395311767f8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/512a01da7134bac8f8b373506011e8aaa3283854",
                "patch_url": "https://git.kernel.org/stable/p/512a01da7134bac8f8b373506011e8aaa3283854",
                "filename": "CVE-2024-35925-512a01da7134bac8f8b373506011e8aaa3283854.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35925/CVE-2024-35925-512a01da7134bac8f8b373506011e8aaa3283854.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5f7fd6aa4c4877d77133ea86c14cf256f390b2fe",
                "patch_url": "https://git.kernel.org/stable/p/5f7fd6aa4c4877d77133ea86c14cf256f390b2fe",
                "filename": "CVE-2024-35925-5f7fd6aa4c4877d77133ea86c14cf256f390b2fe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35925/CVE-2024-35925-5f7fd6aa4c4877d77133ea86c14cf256f390b2fe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6a55dab4ac956deb23690eedd74e70b892a378e7",
                "patch_url": "https://git.kernel.org/stable/p/6a55dab4ac956deb23690eedd74e70b892a378e7",
                "filename": "CVE-2024-35925-6a55dab4ac956deb23690eedd74e70b892a378e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35925/CVE-2024-35925-6a55dab4ac956deb23690eedd74e70b892a378e7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/93f52fbeaf4b676b21acfe42a5152620e6770d02",
                "patch_url": "https://git.kernel.org/stable/p/93f52fbeaf4b676b21acfe42a5152620e6770d02",
                "filename": "CVE-2024-35925-93f52fbeaf4b676b21acfe42a5152620e6770d02.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35925/CVE-2024-35925-93f52fbeaf4b676b21acfe42a5152620e6770d02.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/98ddf2604ade2d954bf5ec193600d5274a43fd68",
                "patch_url": "https://git.kernel.org/stable/p/98ddf2604ade2d954bf5ec193600d5274a43fd68",
                "filename": "CVE-2024-35925-98ddf2604ade2d954bf5ec193600d5274a43fd68.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35925/CVE-2024-35925-98ddf2604ade2d954bf5ec193600d5274a43fd68.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b0cb5564c3e8e0ee0a2d28c86fa7f02e82d64c3c",
                "patch_url": "https://git.kernel.org/stable/p/b0cb5564c3e8e0ee0a2d28c86fa7f02e82d64c3c",
                "filename": "CVE-2024-35925-b0cb5564c3e8e0ee0a2d28c86fa7f02e82d64c3c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35925/CVE-2024-35925-b0cb5564c3e8e0ee0a2d28c86fa7f02e82d64c3c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/edd073c78d2bf48c5b8bf435bbc3d61d6e7c6c14",
                "patch_url": "https://git.kernel.org/stable/p/edd073c78d2bf48c5b8bf435bbc3d61d6e7c6c14",
                "filename": "CVE-2024-35925-edd073c78d2bf48c5b8bf435bbc3d61d6e7c6c14.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35925/CVE-2024-35925-edd073c78d2bf48c5b8bf435bbc3d61d6e7c6c14.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/21e7d72d0cfcbae6042d498ea2e6f395311767f8",
            "https://git.kernel.org/stable/c/512a01da7134bac8f8b373506011e8aaa3283854",
            "https://git.kernel.org/stable/c/5f7fd6aa4c4877d77133ea86c14cf256f390b2fe",
            "https://git.kernel.org/stable/c/6a55dab4ac956deb23690eedd74e70b892a378e7",
            "https://git.kernel.org/stable/c/93f52fbeaf4b676b21acfe42a5152620e6770d02",
            "https://git.kernel.org/stable/c/98ddf2604ade2d954bf5ec193600d5274a43fd68",
            "https://git.kernel.org/stable/c/b0cb5564c3e8e0ee0a2d28c86fa7f02e82d64c3c",
            "https://git.kernel.org/stable/c/edd073c78d2bf48c5b8bf435bbc3d61d6e7c6c14",
            "https://www.cve.org/CVERecord?id=CVE-2024-35925\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35925\nhttps://lore.kernel.org/linux-cve-announce/2024051914-CVE-2024-35925-fa17@gregkh/T"
        ]
    },
    "CVE-2024-35930": {
        "cve": "CVE-2024-35930",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()\n\nThe call to lpfc_sli4_resume_rpi() in lpfc_rcv_padisc() may return an\nunsuccessful status.  In such cases, the elsiocb is not issued, the\ncompletion is not called, and thus the elsiocb resource is leaked.\n\nCheck return value after calling lpfc_sli4_resume_rpi() and conditionally\nrelease the elsiocb resource.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35930",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/7849e6f8410da96384e3d1f6b6d730f095142dc7",
            "patch_url": "https://git.kernel.org/stable/p/7849e6f8410da96384e3d1f6b6d730f095142dc7",
            "filename": "CVE-2024-35930-7849e6f8410da96384e3d1f6b6d730f095142dc7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35930/CVE-2024-35930-7849e6f8410da96384e3d1f6b6d730f095142dc7.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/07a2aa674fca679316b8ac51440adb895b53a7cf",
                "patch_url": "https://git.kernel.org/stable/p/07a2aa674fca679316b8ac51440adb895b53a7cf",
                "filename": "CVE-2024-35930-07a2aa674fca679316b8ac51440adb895b53a7cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35930/CVE-2024-35930-07a2aa674fca679316b8ac51440adb895b53a7cf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2ae917d4bcab80ab304b774d492e2fcd6c52c06b",
                "patch_url": "https://git.kernel.org/stable/p/2ae917d4bcab80ab304b774d492e2fcd6c52c06b",
                "filename": "CVE-2024-35930-2ae917d4bcab80ab304b774d492e2fcd6c52c06b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35930/CVE-2024-35930-2ae917d4bcab80ab304b774d492e2fcd6c52c06b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3320126ed3afbc11934502319b340f91a4d61c8f",
                "patch_url": "https://git.kernel.org/stable/p/3320126ed3afbc11934502319b340f91a4d61c8f",
                "filename": "CVE-2024-35930-3320126ed3afbc11934502319b340f91a4d61c8f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35930/CVE-2024-35930-3320126ed3afbc11934502319b340f91a4d61c8f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7849e6f8410da96384e3d1f6b6d730f095142dc7",
                "patch_url": "https://git.kernel.org/stable/p/7849e6f8410da96384e3d1f6b6d730f095142dc7",
                "filename": "CVE-2024-35930-7849e6f8410da96384e3d1f6b6d730f095142dc7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35930/CVE-2024-35930-7849e6f8410da96384e3d1f6b6d730f095142dc7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c473288f27d15014447de5a891bdf22a0695847a",
                "patch_url": "https://git.kernel.org/stable/p/c473288f27d15014447de5a891bdf22a0695847a",
                "filename": "CVE-2024-35930-c473288f27d15014447de5a891bdf22a0695847a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35930/CVE-2024-35930-c473288f27d15014447de5a891bdf22a0695847a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e2cd32435b1dff3d63759476a3abc878e02fb6c8",
                "patch_url": "https://git.kernel.org/stable/p/e2cd32435b1dff3d63759476a3abc878e02fb6c8",
                "filename": "CVE-2024-35930-e2cd32435b1dff3d63759476a3abc878e02fb6c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35930/CVE-2024-35930-e2cd32435b1dff3d63759476a3abc878e02fb6c8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/edf82aa7e9eb864a09229392054d131b34a5c9e8",
                "patch_url": "https://git.kernel.org/stable/p/edf82aa7e9eb864a09229392054d131b34a5c9e8",
                "filename": "CVE-2024-35930-edf82aa7e9eb864a09229392054d131b34a5c9e8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35930/CVE-2024-35930-edf82aa7e9eb864a09229392054d131b34a5c9e8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ee0b5f96b6d66a1e6698228dcb41df11ec7f352f",
                "patch_url": "https://git.kernel.org/stable/p/ee0b5f96b6d66a1e6698228dcb41df11ec7f352f",
                "filename": "CVE-2024-35930-ee0b5f96b6d66a1e6698228dcb41df11ec7f352f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35930/CVE-2024-35930-ee0b5f96b6d66a1e6698228dcb41df11ec7f352f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/07a2aa674fca679316b8ac51440adb895b53a7cf",
            "https://git.kernel.org/stable/c/2ae917d4bcab80ab304b774d492e2fcd6c52c06b",
            "https://git.kernel.org/stable/c/3320126ed3afbc11934502319b340f91a4d61c8f",
            "https://git.kernel.org/stable/c/7849e6f8410da96384e3d1f6b6d730f095142dc7",
            "https://git.kernel.org/stable/c/c473288f27d15014447de5a891bdf22a0695847a",
            "https://git.kernel.org/stable/c/e2cd32435b1dff3d63759476a3abc878e02fb6c8",
            "https://git.kernel.org/stable/c/edf82aa7e9eb864a09229392054d131b34a5c9e8",
            "https://git.kernel.org/stable/c/ee0b5f96b6d66a1e6698228dcb41df11ec7f352f",
            "https://www.cve.org/CVERecord?id=CVE-2024-35930\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35930\nhttps://lore.kernel.org/linux-cve-announce/2024051916-CVE-2024-35930-5571@gregkh/T"
        ]
    },
    "CVE-2024-35937": {
        "cve": "CVE-2024-35937",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: check A-MSDU format more carefully\n\nIf it looks like there's another subframe in the A-MSDU\nbut the header isn't fully there, we can end up reading\ndata out of bounds, only to discard later. Make this a\nbit more careful and check if the subframe header can\neven be present.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35937",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/16da1e1dac23be45ef6e23c41b1508c400e6c544",
            "patch_url": "https://git.kernel.org/stable/p/16da1e1dac23be45ef6e23c41b1508c400e6c544",
            "filename": "CVE-2024-35937-16da1e1dac23be45ef6e23c41b1508c400e6c544.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35937/CVE-2024-35937-16da1e1dac23be45ef6e23c41b1508c400e6c544.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/16da1e1dac23be45ef6e23c41b1508c400e6c544",
                "patch_url": "https://git.kernel.org/stable/p/16da1e1dac23be45ef6e23c41b1508c400e6c544",
                "filename": "CVE-2024-35937-16da1e1dac23be45ef6e23c41b1508c400e6c544.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35937/CVE-2024-35937-16da1e1dac23be45ef6e23c41b1508c400e6c544.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5d7a8585fbb31e88fb2a0f581b70667d3300d1e9",
                "patch_url": "https://git.kernel.org/stable/p/5d7a8585fbb31e88fb2a0f581b70667d3300d1e9",
                "filename": "CVE-2024-35937-5d7a8585fbb31e88fb2a0f581b70667d3300d1e9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35937/CVE-2024-35937-5d7a8585fbb31e88fb2a0f581b70667d3300d1e9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ad7974856926129f190ffbe3beea78460b3b7cc",
                "patch_url": "https://git.kernel.org/stable/p/9ad7974856926129f190ffbe3beea78460b3b7cc",
                "filename": "CVE-2024-35937-9ad7974856926129f190ffbe3beea78460b3b7cc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35937/CVE-2024-35937-9ad7974856926129f190ffbe3beea78460b3b7cc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9eb3bc0973d084423a6df21cf2c74692ff05647e",
                "patch_url": "https://git.kernel.org/stable/p/9eb3bc0973d084423a6df21cf2c74692ff05647e",
                "filename": "CVE-2024-35937-9eb3bc0973d084423a6df21cf2c74692ff05647e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35937/CVE-2024-35937-9eb3bc0973d084423a6df21cf2c74692ff05647e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/16da1e1dac23be45ef6e23c41b1508c400e6c544",
            "https://git.kernel.org/stable/c/5d7a8585fbb31e88fb2a0f581b70667d3300d1e9",
            "https://git.kernel.org/stable/c/9ad7974856926129f190ffbe3beea78460b3b7cc",
            "https://git.kernel.org/stable/c/9eb3bc0973d084423a6df21cf2c74692ff05647e",
            "https://www.cve.org/CVERecord?id=CVE-2024-35937\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35937\nhttps://lore.kernel.org/linux-cve-announce/2024051918-CVE-2024-35937-0415@gregkh/T"
        ]
    },
    "CVE-2024-35938": {
        "cve": "CVE-2024-35938",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: decrease MHI channel buffer length to 8KB\n\nCurrently buf_len field of ath11k_mhi_config_qca6390 is assigned\nwith 0, making MHI use a default size, 64KB, to allocate channel\nbuffers. This is likely to fail in some scenarios where system\nmemory is highly fragmented and memory compaction or reclaim is\nnot allowed.\n\nThere is a fail report which is caused by it:\nkworker/u32:45: page allocation failure: order:4, mode:0x40c00(GFP_NOIO|__GFP_COMP), nodemask=(null),cpuset=/,mems_allowed=0\nCPU: 0 PID: 19318 Comm: kworker/u32:45 Not tainted 6.8.0-rc3-1.gae4495f-default #1 openSUSE Tumbleweed (unreleased) 493b6d5b382c603654d7a81fc3c144d59a1dfceb\nWorkqueue: events_unbound async_run_entry_fn\nCall Trace:\n <TASK>\n dump_stack_lvl+0x47/0x60\n warn_alloc+0x13a/0x1b0\n ? srso_alias_return_thunk+0x5/0xfbef5\n ? __alloc_pages_direct_compact+0xab/0x210\n __alloc_pages_slowpath.constprop.0+0xd3e/0xda0\n __alloc_pages+0x32d/0x350\n ? mhi_prepare_channel+0x127/0x2d0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]\n __kmalloc_large_node+0x72/0x110\n __kmalloc+0x37c/0x480\n ? mhi_map_single_no_bb+0x77/0xf0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]\n ? mhi_prepare_channel+0x127/0x2d0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]\n mhi_prepare_channel+0x127/0x2d0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]\n __mhi_prepare_for_transfer+0x44/0x80 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]\n ? __pfx_____mhi_prepare_for_transfer+0x10/0x10 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]\n device_for_each_child+0x5c/0xa0\n ? __pfx_pci_pm_resume+0x10/0x10\n ath11k_core_resume+0x65/0x100 [ath11k a5094e22d7223135c40d93c8f5321cf09fd85e4e]\n ? srso_alias_return_thunk+0x5/0xfbef5\n ath11k_pci_pm_resume+0x32/0x60 [ath11k_pci 830b7bfc3ea80ebef32e563cafe2cb55e9cc73ec]\n ? srso_alias_return_thunk+0x5/0xfbef5\n dpm_run_callback+0x8c/0x1e0\n device_resume+0x104/0x340\n ? __pfx_dpm_watchdog_handler+0x10/0x10\n async_resume+0x1d/0x30\n async_run_entry_fn+0x32/0x120\n process_one_work+0x168/0x330\n worker_thread+0x2f5/0x410\n ? __pfx_worker_thread+0x10/0x10\n kthread+0xe8/0x120\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x34/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1b/0x30\n </TASK>\n\nActually those buffers are used only by QMI target -> host communication.\nAnd for WCN6855 and QCA6390, the largest packet size for that is less\nthan 6KB. So change buf_len field to 8KB, which results in order 1\nallocation if page size is 4KB. In this way, we can at least save some\nmemory, and as well as decrease the possibility of allocation failure\nin those scenarios.\n\nTested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35938",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/138fdeac75fb7512a7f9f1c3b236cd2e754af793",
            "patch_url": "https://git.kernel.org/stable/p/138fdeac75fb7512a7f9f1c3b236cd2e754af793",
            "filename": "CVE-2024-35938-138fdeac75fb7512a7f9f1c3b236cd2e754af793.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35938/CVE-2024-35938-138fdeac75fb7512a7f9f1c3b236cd2e754af793.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/138fdeac75fb7512a7f9f1c3b236cd2e754af793",
                "patch_url": "https://git.kernel.org/stable/p/138fdeac75fb7512a7f9f1c3b236cd2e754af793",
                "filename": "CVE-2024-35938-138fdeac75fb7512a7f9f1c3b236cd2e754af793.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35938/CVE-2024-35938-138fdeac75fb7512a7f9f1c3b236cd2e754af793.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1cca1bddf9ef080503c15378cecf4877f7510015",
                "patch_url": "https://git.kernel.org/stable/p/1cca1bddf9ef080503c15378cecf4877f7510015",
                "filename": "CVE-2024-35938-1cca1bddf9ef080503c15378cecf4877f7510015.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35938/CVE-2024-35938-1cca1bddf9ef080503c15378cecf4877f7510015.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6597a6687af54e2cb58371cf8f6ee4dd85c537de",
                "patch_url": "https://git.kernel.org/stable/p/6597a6687af54e2cb58371cf8f6ee4dd85c537de",
                "filename": "CVE-2024-35938-6597a6687af54e2cb58371cf8f6ee4dd85c537de.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35938/CVE-2024-35938-6597a6687af54e2cb58371cf8f6ee4dd85c537de.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/805a1cdde82fec00c7471a393f4bb437b2741559",
                "patch_url": "https://git.kernel.org/stable/p/805a1cdde82fec00c7471a393f4bb437b2741559",
                "filename": "CVE-2024-35938-805a1cdde82fec00c7471a393f4bb437b2741559.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35938/CVE-2024-35938-805a1cdde82fec00c7471a393f4bb437b2741559.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ae5876b3b7b2243d874e2afa099e7926122087a1",
                "patch_url": "https://git.kernel.org/stable/p/ae5876b3b7b2243d874e2afa099e7926122087a1",
                "filename": "CVE-2024-35938-ae5876b3b7b2243d874e2afa099e7926122087a1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35938/CVE-2024-35938-ae5876b3b7b2243d874e2afa099e7926122087a1.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/138fdeac75fb7512a7f9f1c3b236cd2e754af793",
            "https://git.kernel.org/stable/c/1cca1bddf9ef080503c15378cecf4877f7510015",
            "https://git.kernel.org/stable/c/6597a6687af54e2cb58371cf8f6ee4dd85c537de",
            "https://git.kernel.org/stable/c/805a1cdde82fec00c7471a393f4bb437b2741559",
            "https://git.kernel.org/stable/c/ae5876b3b7b2243d874e2afa099e7926122087a1",
            "https://www.cve.org/CVERecord?id=CVE-2024-35938\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35938\nhttps://lore.kernel.org/linux-cve-announce/2024051918-CVE-2024-35938-0100@gregkh/T"
        ]
    },
    "CVE-2024-35939": {
        "cve": "CVE-2024-35939",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-direct: Leak pages on dma_set_decrypted() failure\n\nOn TDX it is possible for the untrusted host to cause\nset_memory_encrypted() or set_memory_decrypted() to fail such that an\nerror is returned and the resulting memory is shared. Callers need to\ntake care to handle these errors to avoid returning decrypted (shared)\nmemory to the page allocator, which could lead to functional or security\nissues.\n\nDMA could free decrypted/shared pages if dma_set_decrypted() fails. This\nshould be a rare case. Just leak the pages in this case instead of\nfreeing them.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35939",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/b57326c96b7bc7638aa8c44e12afa2defe0c934c",
            "patch_url": "https://git.kernel.org/stable/p/b57326c96b7bc7638aa8c44e12afa2defe0c934c",
            "filename": "CVE-2024-35939-b57326c96b7bc7638aa8c44e12afa2defe0c934c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35939/CVE-2024-35939-b57326c96b7bc7638aa8c44e12afa2defe0c934c.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4031b72ca747a1e6e9ae4fa729e765b43363d66a",
                "patch_url": "https://git.kernel.org/stable/p/4031b72ca747a1e6e9ae4fa729e765b43363d66a",
                "filename": "CVE-2024-35939-4031b72ca747a1e6e9ae4fa729e765b43363d66a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35939/CVE-2024-35939-4031b72ca747a1e6e9ae4fa729e765b43363d66a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4e0cfb25d49da2e6261ad582f58ffa5b5dd8c8e9",
                "patch_url": "https://git.kernel.org/stable/p/4e0cfb25d49da2e6261ad582f58ffa5b5dd8c8e9",
                "filename": "CVE-2024-35939-4e0cfb25d49da2e6261ad582f58ffa5b5dd8c8e9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35939/CVE-2024-35939-4e0cfb25d49da2e6261ad582f58ffa5b5dd8c8e9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b57326c96b7bc7638aa8c44e12afa2defe0c934c",
                "patch_url": "https://git.kernel.org/stable/p/b57326c96b7bc7638aa8c44e12afa2defe0c934c",
                "filename": "CVE-2024-35939-b57326c96b7bc7638aa8c44e12afa2defe0c934c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35939/CVE-2024-35939-b57326c96b7bc7638aa8c44e12afa2defe0c934c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b9fa16949d18e06bdf728a560f5c8af56d2bdcaf",
                "patch_url": "https://git.kernel.org/stable/p/b9fa16949d18e06bdf728a560f5c8af56d2bdcaf",
                "filename": "CVE-2024-35939-b9fa16949d18e06bdf728a560f5c8af56d2bdcaf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35939/CVE-2024-35939-b9fa16949d18e06bdf728a560f5c8af56d2bdcaf.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4031b72ca747a1e6e9ae4fa729e765b43363d66a",
            "https://git.kernel.org/stable/c/4e0cfb25d49da2e6261ad582f58ffa5b5dd8c8e9",
            "https://git.kernel.org/stable/c/b57326c96b7bc7638aa8c44e12afa2defe0c934c",
            "https://git.kernel.org/stable/c/b9fa16949d18e06bdf728a560f5c8af56d2bdcaf",
            "https://www.cve.org/CVERecord?id=CVE-2024-35939\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35939\nhttps://lore.kernel.org/linux-cve-announce/2024051919-CVE-2024-35939-f877@gregkh/T"
        ]
    },
    "CVE-2024-35944": {
        "cve": "CVE-2024-35944",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nVMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()\n\nSyzkaller hit 'WARNING in dg_dispatch_as_host' bug.\n\nmemcpy: detected field-spanning write (size 56) of single field \"&dg_info->msg\"\nat drivers/misc/vmw_vmci/vmci_datagram.c:237 (size 24)\n\nWARNING: CPU: 0 PID: 1555 at drivers/misc/vmw_vmci/vmci_datagram.c:237\ndg_dispatch_as_host+0x88e/0xa60 drivers/misc/vmw_vmci/vmci_datagram.c:237\n\nSome code commentry, based on my understanding:\n\n544 #define VMCI_DG_SIZE(_dg) (VMCI_DG_HEADERSIZE + (size_t)(_dg)->payload_size)\n/// This is 24 + payload_size\n\nmemcpy(&dg_info->msg, dg, dg_size);\n\tDestination = dg_info->msg ---> this is a 24 byte\n\t\t\t\t\tstructure(struct vmci_datagram)\n\tSource = dg --> this is a 24 byte structure (struct vmci_datagram)\n\tSize = dg_size = 24 + payload_size\n\n{payload_size = 56-24 =32} -- Syzkaller managed to set payload_size to 32.\n\n 35 struct delayed_datagram_info {\n 36         struct datagram_entry *entry;\n 37         struct work_struct work;\n 38         bool in_dg_host_queue;\n 39         /* msg and msg_payload must be together. */\n 40         struct vmci_datagram msg;\n 41         u8 msg_payload[];\n 42 };\n\nSo those extra bytes of payload are copied into msg_payload[], a run time\nwarning is seen while fuzzing with Syzkaller.\n\nOne possible way to fix the warning is to split the memcpy() into\ntwo parts -- one -- direct assignment of msg and second taking care of payload.\n\nGustavo quoted:\n\"Under FORTIFY_SOURCE we should not copy data across multiple members\nin a structure.\"",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35944",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/130b0cd064874e0d0f58e18fb00e6f3993e90c74",
            "patch_url": "https://git.kernel.org/stable/p/130b0cd064874e0d0f58e18fb00e6f3993e90c74",
            "filename": "CVE-2024-35944-130b0cd064874e0d0f58e18fb00e6f3993e90c74.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35944/CVE-2024-35944-130b0cd064874e0d0f58e18fb00e6f3993e90c74.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/130b0cd064874e0d0f58e18fb00e6f3993e90c74",
                "patch_url": "https://git.kernel.org/stable/p/130b0cd064874e0d0f58e18fb00e6f3993e90c74",
                "filename": "CVE-2024-35944-130b0cd064874e0d0f58e18fb00e6f3993e90c74.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35944/CVE-2024-35944-130b0cd064874e0d0f58e18fb00e6f3993e90c74.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/19b070fefd0d024af3daa7329cbc0d00de5302ec",
                "patch_url": "https://git.kernel.org/stable/p/19b070fefd0d024af3daa7329cbc0d00de5302ec",
                "filename": "CVE-2024-35944-19b070fefd0d024af3daa7329cbc0d00de5302ec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35944/CVE-2024-35944-19b070fefd0d024af3daa7329cbc0d00de5302ec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/491a1eb07c2bd8841d63cb5263455e185be5866f",
                "patch_url": "https://git.kernel.org/stable/p/491a1eb07c2bd8841d63cb5263455e185be5866f",
                "filename": "CVE-2024-35944-491a1eb07c2bd8841d63cb5263455e185be5866f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35944/CVE-2024-35944-491a1eb07c2bd8841d63cb5263455e185be5866f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ad78c5047dc4076d0b3c4fad4f42ffe9c86e8100",
                "patch_url": "https://git.kernel.org/stable/p/ad78c5047dc4076d0b3c4fad4f42ffe9c86e8100",
                "filename": "CVE-2024-35944-ad78c5047dc4076d0b3c4fad4f42ffe9c86e8100.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35944/CVE-2024-35944-ad78c5047dc4076d0b3c4fad4f42ffe9c86e8100.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dae70a57565686f16089737adb8ac64471570f73",
                "patch_url": "https://git.kernel.org/stable/p/dae70a57565686f16089737adb8ac64471570f73",
                "filename": "CVE-2024-35944-dae70a57565686f16089737adb8ac64471570f73.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35944/CVE-2024-35944-dae70a57565686f16089737adb8ac64471570f73.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e87bb99d2df6512d8ee37a5d63d2ca9a39a8c051",
                "patch_url": "https://git.kernel.org/stable/p/e87bb99d2df6512d8ee37a5d63d2ca9a39a8c051",
                "filename": "CVE-2024-35944-e87bb99d2df6512d8ee37a5d63d2ca9a39a8c051.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35944/CVE-2024-35944-e87bb99d2df6512d8ee37a5d63d2ca9a39a8c051.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f15eca95138b3d4ec17b63c3c1937b0aa0d3624b",
                "patch_url": "https://git.kernel.org/stable/p/f15eca95138b3d4ec17b63c3c1937b0aa0d3624b",
                "filename": "CVE-2024-35944-f15eca95138b3d4ec17b63c3c1937b0aa0d3624b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35944/CVE-2024-35944-f15eca95138b3d4ec17b63c3c1937b0aa0d3624b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/feacd430b42bbfa9ab3ed9e4f38b86c43e348c75",
                "patch_url": "https://git.kernel.org/stable/p/feacd430b42bbfa9ab3ed9e4f38b86c43e348c75",
                "filename": "CVE-2024-35944-feacd430b42bbfa9ab3ed9e4f38b86c43e348c75.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35944/CVE-2024-35944-feacd430b42bbfa9ab3ed9e4f38b86c43e348c75.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/130b0cd064874e0d0f58e18fb00e6f3993e90c74",
            "https://git.kernel.org/stable/c/19b070fefd0d024af3daa7329cbc0d00de5302ec",
            "https://git.kernel.org/stable/c/491a1eb07c2bd8841d63cb5263455e185be5866f",
            "https://git.kernel.org/stable/c/ad78c5047dc4076d0b3c4fad4f42ffe9c86e8100",
            "https://git.kernel.org/stable/c/dae70a57565686f16089737adb8ac64471570f73",
            "https://git.kernel.org/stable/c/e87bb99d2df6512d8ee37a5d63d2ca9a39a8c051",
            "https://git.kernel.org/stable/c/f15eca95138b3d4ec17b63c3c1937b0aa0d3624b",
            "https://git.kernel.org/stable/c/feacd430b42bbfa9ab3ed9e4f38b86c43e348c75",
            "https://www.cve.org/CVERecord?id=CVE-2024-35944\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35944\nhttps://lore.kernel.org/linux-cve-announce/2024051920-CVE-2024-35944-a860@gregkh/T"
        ]
    },
    "CVE-2024-35946": {
        "cve": "CVE-2024-35946",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: fix null pointer access when abort scan\n\nDuring cancel scan we might use vif that weren't scanning.\nFix this by using the actual scanning vif.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35946",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4f11c741908dab7dd48fa5a986b210d4fc74ca8d",
            "patch_url": "https://git.kernel.org/stable/p/4f11c741908dab7dd48fa5a986b210d4fc74ca8d",
            "filename": "CVE-2024-35946-4f11c741908dab7dd48fa5a986b210d4fc74ca8d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35946/CVE-2024-35946-4f11c741908dab7dd48fa5a986b210d4fc74ca8d.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4f11c741908dab7dd48fa5a986b210d4fc74ca8d",
                "patch_url": "https://git.kernel.org/stable/p/4f11c741908dab7dd48fa5a986b210d4fc74ca8d",
                "filename": "CVE-2024-35946-4f11c741908dab7dd48fa5a986b210d4fc74ca8d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35946/CVE-2024-35946-4f11c741908dab7dd48fa5a986b210d4fc74ca8d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7e11a2966f51695c0af0b1f976a32d64dee243b2",
                "patch_url": "https://git.kernel.org/stable/p/7e11a2966f51695c0af0b1f976a32d64dee243b2",
                "filename": "CVE-2024-35946-7e11a2966f51695c0af0b1f976a32d64dee243b2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35946/CVE-2024-35946-7e11a2966f51695c0af0b1f976a32d64dee243b2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b34d64e9aa5505e3c84570aed5c757f1839573e8",
                "patch_url": "https://git.kernel.org/stable/p/b34d64e9aa5505e3c84570aed5c757f1839573e8",
                "filename": "CVE-2024-35946-b34d64e9aa5505e3c84570aed5c757f1839573e8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35946/CVE-2024-35946-b34d64e9aa5505e3c84570aed5c757f1839573e8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4f11c741908dab7dd48fa5a986b210d4fc74ca8d",
            "https://git.kernel.org/stable/c/7e11a2966f51695c0af0b1f976a32d64dee243b2",
            "https://git.kernel.org/stable/c/b34d64e9aa5505e3c84570aed5c757f1839573e8",
            "https://www.cve.org/CVERecord?id=CVE-2024-35946\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35946\nhttps://lore.kernel.org/linux-cve-announce/2024051921-CVE-2024-35946-c2c2@gregkh/T"
        ]
    },
    "CVE-2024-35947": {
        "cve": "CVE-2024-35947",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndyndbg: fix old BUG_ON in >control parser\n\nFix a BUG_ON from 2009.  Even if it looks \"unreachable\" (I didn't\nreally look), lets make sure by removing it, doing pr_err and return\n-EINVAL instead.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35947",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/343081c21e56bd6690d342e2f5ae8c00183bf081",
            "patch_url": "https://git.kernel.org/stable/p/343081c21e56bd6690d342e2f5ae8c00183bf081",
            "filename": "CVE-2024-35947-343081c21e56bd6690d342e2f5ae8c00183bf081.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35947/CVE-2024-35947-343081c21e56bd6690d342e2f5ae8c00183bf081.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c",
                "patch_url": "https://git.kernel.org/stable/p/00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c",
                "filename": "CVE-2024-35947-00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35947/CVE-2024-35947-00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/343081c21e56bd6690d342e2f5ae8c00183bf081",
                "patch_url": "https://git.kernel.org/stable/p/343081c21e56bd6690d342e2f5ae8c00183bf081",
                "filename": "CVE-2024-35947-343081c21e56bd6690d342e2f5ae8c00183bf081.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35947/CVE-2024-35947-343081c21e56bd6690d342e2f5ae8c00183bf081.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3c718bddddca9cbef177ac475b94c5c91147fb38",
                "patch_url": "https://git.kernel.org/stable/p/3c718bddddca9cbef177ac475b94c5c91147fb38",
                "filename": "CVE-2024-35947-3c718bddddca9cbef177ac475b94c5c91147fb38.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35947/CVE-2024-35947-3c718bddddca9cbef177ac475b94c5c91147fb38.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/41d8ac238ab1cab01a8c71798d61903304f4e79b",
                "patch_url": "https://git.kernel.org/stable/p/41d8ac238ab1cab01a8c71798d61903304f4e79b",
                "filename": "CVE-2024-35947-41d8ac238ab1cab01a8c71798d61903304f4e79b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35947/CVE-2024-35947-41d8ac238ab1cab01a8c71798d61903304f4e79b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/529e1852785599160415e964ca322ee7add7aef0",
                "patch_url": "https://git.kernel.org/stable/p/529e1852785599160415e964ca322ee7add7aef0",
                "filename": "CVE-2024-35947-529e1852785599160415e964ca322ee7add7aef0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35947/CVE-2024-35947-529e1852785599160415e964ca322ee7add7aef0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a66c869b17c4c4dcf81d273b02cb0efe88e127ab",
                "patch_url": "https://git.kernel.org/stable/p/a66c869b17c4c4dcf81d273b02cb0efe88e127ab",
                "filename": "CVE-2024-35947-a66c869b17c4c4dcf81d273b02cb0efe88e127ab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35947/CVE-2024-35947-a66c869b17c4c4dcf81d273b02cb0efe88e127ab.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a69e1bdd777ce51061111dc419801e8a2fd241cc",
                "patch_url": "https://git.kernel.org/stable/p/a69e1bdd777ce51061111dc419801e8a2fd241cc",
                "filename": "CVE-2024-35947-a69e1bdd777ce51061111dc419801e8a2fd241cc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35947/CVE-2024-35947-a69e1bdd777ce51061111dc419801e8a2fd241cc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561",
                "patch_url": "https://git.kernel.org/stable/p/ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561",
                "filename": "CVE-2024-35947-ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35947/CVE-2024-35947-ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c",
            "https://git.kernel.org/stable/c/343081c21e56bd6690d342e2f5ae8c00183bf081",
            "https://git.kernel.org/stable/c/3c718bddddca9cbef177ac475b94c5c91147fb38",
            "https://git.kernel.org/stable/c/41d8ac238ab1cab01a8c71798d61903304f4e79b",
            "https://git.kernel.org/stable/c/529e1852785599160415e964ca322ee7add7aef0",
            "https://git.kernel.org/stable/c/a66c869b17c4c4dcf81d273b02cb0efe88e127ab",
            "https://git.kernel.org/stable/c/a69e1bdd777ce51061111dc419801e8a2fd241cc",
            "https://git.kernel.org/stable/c/ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561",
            "https://www.cve.org/CVERecord?id=CVE-2024-35947\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35947\nhttps://lore.kernel.org/linux-cve-announce/2024051952-CVE-2024-35947-09bb@gregkh/T"
        ]
    },
    "CVE-2024-35952": {
        "cve": "CVE-2024-35952",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/ast: Fix soft lockup\n\nThere is a while-loop in ast_dp_set_on_off() that could lead to\ninfinite-loop. This is because the register, VGACRI-Dx, checked in\nthis API is a scratch register actually controlled by a MCU, named\nDPMCU, in BMC.\n\nThese scratch registers are protected by scu-lock. If suc-lock is not\noff, DPMCU can not update these registers and then host will have soft\nlockup due to never updated status.\n\nDPMCU is used to control DP and relative registers to handshake with\nhost's VGA driver. Even the most time-consuming task, DP's link\ntraining, is less than 100ms. 200ms should be enough.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35952",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/8a6fea3fcb577a543ef67683ca7105bde49a38fb",
            "patch_url": "https://git.kernel.org/stable/p/8a6fea3fcb577a543ef67683ca7105bde49a38fb",
            "filename": "CVE-2024-35952-8a6fea3fcb577a543ef67683ca7105bde49a38fb.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35952/CVE-2024-35952-8a6fea3fcb577a543ef67683ca7105bde49a38fb.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/35768baf0fdfc47ede42d899506bad78450e9294",
                "patch_url": "https://git.kernel.org/stable/p/35768baf0fdfc47ede42d899506bad78450e9294",
                "filename": "CVE-2024-35952-35768baf0fdfc47ede42d899506bad78450e9294.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35952/CVE-2024-35952-35768baf0fdfc47ede42d899506bad78450e9294.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8a6fea3fcb577a543ef67683ca7105bde49a38fb",
                "patch_url": "https://git.kernel.org/stable/p/8a6fea3fcb577a543ef67683ca7105bde49a38fb",
                "filename": "CVE-2024-35952-8a6fea3fcb577a543ef67683ca7105bde49a38fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35952/CVE-2024-35952-8a6fea3fcb577a543ef67683ca7105bde49a38fb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a81b2acd43e24e419f65df97348c76a5a1496066",
                "patch_url": "https://git.kernel.org/stable/p/a81b2acd43e24e419f65df97348c76a5a1496066",
                "filename": "CVE-2024-35952-a81b2acd43e24e419f65df97348c76a5a1496066.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35952/CVE-2024-35952-a81b2acd43e24e419f65df97348c76a5a1496066.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bc004f5038220b1891ef4107134ccae44be55109",
                "patch_url": "https://git.kernel.org/stable/p/bc004f5038220b1891ef4107134ccae44be55109",
                "filename": "CVE-2024-35952-bc004f5038220b1891ef4107134ccae44be55109.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35952/CVE-2024-35952-bc004f5038220b1891ef4107134ccae44be55109.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/35768baf0fdfc47ede42d899506bad78450e9294",
            "https://git.kernel.org/stable/c/8a6fea3fcb577a543ef67683ca7105bde49a38fb",
            "https://git.kernel.org/stable/c/a81b2acd43e24e419f65df97348c76a5a1496066",
            "https://git.kernel.org/stable/c/bc004f5038220b1891ef4107134ccae44be55109",
            "https://www.cve.org/CVERecord?id=CVE-2024-35952\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35952\nhttps://lore.kernel.org/linux-cve-announce/2024052017-CVE-2024-35952-645b@gregkh/T"
        ]
    },
    "CVE-2024-35958": {
        "cve": "CVE-2024-35958",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ena: Fix incorrect descriptor free behavior\n\nENA has two types of TX queues:\n- queues which only process TX packets arriving from the network stack\n- queues which only process TX packets forwarded to it by XDP_REDIRECT\n  or XDP_TX instructions\n\nThe ena_free_tx_bufs() cycles through all descriptors in a TX queue\nand unmaps + frees every descriptor that hasn't been acknowledged yet\nby the device (uncompleted TX transactions).\nThe function assumes that the processed TX queue is necessarily from\nthe first category listed above and ends up using napi_consume_skb()\nfor descriptors belonging to an XDP specific queue.\n\nThis patch solves a bug in which, in case of a VF reset, the\ndescriptors aren't freed correctly, leading to crashes.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35958",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/19ff8fed3338898b70b2aad831386c78564912e1",
            "patch_url": "https://git.kernel.org/stable/p/19ff8fed3338898b70b2aad831386c78564912e1",
            "filename": "CVE-2024-35958-19ff8fed3338898b70b2aad831386c78564912e1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35958/CVE-2024-35958-19ff8fed3338898b70b2aad831386c78564912e1.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/19ff8fed3338898b70b2aad831386c78564912e1",
                "patch_url": "https://git.kernel.org/stable/p/19ff8fed3338898b70b2aad831386c78564912e1",
                "filename": "CVE-2024-35958-19ff8fed3338898b70b2aad831386c78564912e1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35958/CVE-2024-35958-19ff8fed3338898b70b2aad831386c78564912e1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5c7f2240d9835a7823d87f7460d8eae9f4e504c7",
                "patch_url": "https://git.kernel.org/stable/p/5c7f2240d9835a7823d87f7460d8eae9f4e504c7",
                "filename": "CVE-2024-35958-5c7f2240d9835a7823d87f7460d8eae9f4e504c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35958/CVE-2024-35958-5c7f2240d9835a7823d87f7460d8eae9f4e504c7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b26aa765f7437e1bbe8db4c1641b12bd5dd378f0",
                "patch_url": "https://git.kernel.org/stable/p/b26aa765f7437e1bbe8db4c1641b12bd5dd378f0",
                "filename": "CVE-2024-35958-b26aa765f7437e1bbe8db4c1641b12bd5dd378f0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35958/CVE-2024-35958-b26aa765f7437e1bbe8db4c1641b12bd5dd378f0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bf02d9fe00632d22fa91d34749c7aacf397b6cde",
                "patch_url": "https://git.kernel.org/stable/p/bf02d9fe00632d22fa91d34749c7aacf397b6cde",
                "filename": "CVE-2024-35958-bf02d9fe00632d22fa91d34749c7aacf397b6cde.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35958/CVE-2024-35958-bf02d9fe00632d22fa91d34749c7aacf397b6cde.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c31baa07f01307b7ae05f3ce32b89d8e2ba0cc1d",
                "patch_url": "https://git.kernel.org/stable/p/c31baa07f01307b7ae05f3ce32b89d8e2ba0cc1d",
                "filename": "CVE-2024-35958-c31baa07f01307b7ae05f3ce32b89d8e2ba0cc1d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35958/CVE-2024-35958-c31baa07f01307b7ae05f3ce32b89d8e2ba0cc1d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fdfbf54d128ab6ab255db138488f9650485795a2",
                "patch_url": "https://git.kernel.org/stable/p/fdfbf54d128ab6ab255db138488f9650485795a2",
                "filename": "CVE-2024-35958-fdfbf54d128ab6ab255db138488f9650485795a2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35958/CVE-2024-35958-fdfbf54d128ab6ab255db138488f9650485795a2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/19ff8fed3338898b70b2aad831386c78564912e1",
            "https://git.kernel.org/stable/c/5c7f2240d9835a7823d87f7460d8eae9f4e504c7",
            "https://git.kernel.org/stable/c/b26aa765f7437e1bbe8db4c1641b12bd5dd378f0",
            "https://git.kernel.org/stable/c/bf02d9fe00632d22fa91d34749c7aacf397b6cde",
            "https://git.kernel.org/stable/c/c31baa07f01307b7ae05f3ce32b89d8e2ba0cc1d",
            "https://git.kernel.org/stable/c/fdfbf54d128ab6ab255db138488f9650485795a2"
        ]
    },
    "CVE-2024-35959": {
        "cve": "CVE-2024-35959",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix mlx5e_priv_init() cleanup flow\n\nWhen mlx5e_priv_init() fails, the cleanup flow calls mlx5e_selq_cleanup which\ncalls mlx5e_selq_apply() that assures that the `priv->state_lock` is held using\nlockdep_is_held().\n\nAcquire the state_lock in mlx5e_selq_cleanup().\n\nKernel log:\n=============================\nWARNING: suspicious RCU usage\n6.8.0-rc3_net_next_841a9b5 #1 Not tainted\n-----------------------------\ndrivers/net/ethernet/mellanox/mlx5/core/en/selq.c:124 suspicious rcu_dereference_protected() usage!\n\nother info that might help us debug this:\n\nrcu_scheduler_active = 2, debug_locks = 1\n2 locks held by systemd-modules/293:\n #0: ffffffffa05067b0 (devices_rwsem){++++}-{3:3}, at: ib_register_client+0x109/0x1b0 [ib_core]\n #1: ffff8881096c65c0 (&device->client_data_rwsem){++++}-{3:3}, at: add_client_context+0x104/0x1c0 [ib_core]\n\nstack backtrace:\nCPU: 4 PID: 293 Comm: systemd-modules Not tainted 6.8.0-rc3_net_next_841a9b5 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl+0x8a/0xa0\n lockdep_rcu_suspicious+0x154/0x1a0\n mlx5e_selq_apply+0x94/0xa0 [mlx5_core]\n mlx5e_selq_cleanup+0x3a/0x60 [mlx5_core]\n mlx5e_priv_init+0x2be/0x2f0 [mlx5_core]\n mlx5_rdma_setup_rn+0x7c/0x1a0 [mlx5_core]\n rdma_init_netdev+0x4e/0x80 [ib_core]\n ? mlx5_rdma_netdev_free+0x70/0x70 [mlx5_core]\n ipoib_intf_init+0x64/0x550 [ib_ipoib]\n ipoib_intf_alloc+0x4e/0xc0 [ib_ipoib]\n ipoib_add_one+0xb0/0x360 [ib_ipoib]\n add_client_context+0x112/0x1c0 [ib_core]\n ib_register_client+0x166/0x1b0 [ib_core]\n ? 0xffffffffa0573000\n ipoib_init_module+0xeb/0x1a0 [ib_ipoib]\n do_one_initcall+0x61/0x250\n do_init_module+0x8a/0x270\n init_module_from_file+0x8b/0xd0\n idempotent_init_module+0x17d/0x230\n __x64_sys_finit_module+0x61/0xb0\n do_syscall_64+0x71/0x140\n entry_SYSCALL_64_after_hwframe+0x46/0x4e\n </TASK>",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35959",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ad26f26abd353113dea4e8d5ebadccdab9b61e76",
            "patch_url": "https://git.kernel.org/stable/p/ad26f26abd353113dea4e8d5ebadccdab9b61e76",
            "filename": "CVE-2024-35959-ad26f26abd353113dea4e8d5ebadccdab9b61e76.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35959/CVE-2024-35959-ad26f26abd353113dea4e8d5ebadccdab9b61e76.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/6bd77865fda662913dcb5722a66a773840370aa7",
                "patch_url": "https://git.kernel.org/stable/p/6bd77865fda662913dcb5722a66a773840370aa7",
                "filename": "CVE-2024-35959-6bd77865fda662913dcb5722a66a773840370aa7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35959/CVE-2024-35959-6bd77865fda662913dcb5722a66a773840370aa7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ad26f26abd353113dea4e8d5ebadccdab9b61e76",
                "patch_url": "https://git.kernel.org/stable/p/ad26f26abd353113dea4e8d5ebadccdab9b61e76",
                "filename": "CVE-2024-35959-ad26f26abd353113dea4e8d5ebadccdab9b61e76.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35959/CVE-2024-35959-ad26f26abd353113dea4e8d5ebadccdab9b61e76.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ecb829459a841198e142f72fadab56424ae96519",
                "patch_url": "https://git.kernel.org/stable/p/ecb829459a841198e142f72fadab56424ae96519",
                "filename": "CVE-2024-35959-ecb829459a841198e142f72fadab56424ae96519.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35959/CVE-2024-35959-ecb829459a841198e142f72fadab56424ae96519.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f9ac93b6f3de34aa0bb983b9be4f69ca50fc70f3",
                "patch_url": "https://git.kernel.org/stable/p/f9ac93b6f3de34aa0bb983b9be4f69ca50fc70f3",
                "filename": "CVE-2024-35959-f9ac93b6f3de34aa0bb983b9be4f69ca50fc70f3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35959/CVE-2024-35959-f9ac93b6f3de34aa0bb983b9be4f69ca50fc70f3.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/6bd77865fda662913dcb5722a66a773840370aa7",
            "https://git.kernel.org/stable/c/ad26f26abd353113dea4e8d5ebadccdab9b61e76",
            "https://git.kernel.org/stable/c/ecb829459a841198e142f72fadab56424ae96519",
            "https://git.kernel.org/stable/c/f9ac93b6f3de34aa0bb983b9be4f69ca50fc70f3",
            "https://www.cve.org/CVERecord?id=CVE-2024-35959\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35959\nhttps://lore.kernel.org/linux-cve-announce/2024052019-CVE-2024-35959-6e06@gregkh/T"
        ]
    },
    "CVE-2024-35960": {
        "cve": "CVE-2024-35960",
        "cvss_v2": null,
        "cvss_v3": 9.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Properly link new fs rules into the tree\n\nPreviously, add_rule_fg would only add newly created rules from the\nhandle into the tree when they had a refcount of 1. On the other hand,\ncreate_flow_handle tries hard to find and reference already existing\nidentical rules instead of creating new ones.\n\nThese two behaviors can result in a situation where create_flow_handle\n1) creates a new rule and references it, then\n2) in a subsequent step during the same handle creation references it\n   again,\nresulting in a rule with a refcount of 2 that is not linked into the\ntree, will have a NULL parent and root and will result in a crash when\nthe flow group is deleted because del_sw_hw_rule, invoked on rule\ndeletion, assumes node->parent is != NULL.\n\nThis happened in the wild, due to another bug related to incorrect\nhandling of duplicate pkt_reformat ids, which lead to the code in\ncreate_flow_handle incorrectly referencing a just-added rule in the same\nflow handle, resulting in the problem described above. Full details are\nat [1].\n\nThis patch changes add_rule_fg to add new rules without parents into\nthe tree, properly initializing them and avoiding the crash. This makes\nit more consistent with how rules are added to an FTE in\ncreate_flow_handle.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35960",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/7aaee12b804c5e0374e7b132b6ec2158ff33dd64",
            "patch_url": "https://git.kernel.org/stable/p/7aaee12b804c5e0374e7b132b6ec2158ff33dd64",
            "filename": "CVE-2024-35960-7aaee12b804c5e0374e7b132b6ec2158ff33dd64.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35960/CVE-2024-35960-7aaee12b804c5e0374e7b132b6ec2158ff33dd64.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1263b0b26077b1183c3c45a0a2479573a351d423",
                "patch_url": "https://git.kernel.org/stable/p/1263b0b26077b1183c3c45a0a2479573a351d423",
                "filename": "CVE-2024-35960-1263b0b26077b1183c3c45a0a2479573a351d423.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35960/CVE-2024-35960-1263b0b26077b1183c3c45a0a2479573a351d423.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2e8dc5cffc844dacfa79f056dea88002312f253f",
                "patch_url": "https://git.kernel.org/stable/p/2e8dc5cffc844dacfa79f056dea88002312f253f",
                "filename": "CVE-2024-35960-2e8dc5cffc844dacfa79f056dea88002312f253f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35960/CVE-2024-35960-2e8dc5cffc844dacfa79f056dea88002312f253f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3d90ca9145f6b97b38d0c2b6b30f6ca6af9c1801",
                "patch_url": "https://git.kernel.org/stable/p/3d90ca9145f6b97b38d0c2b6b30f6ca6af9c1801",
                "filename": "CVE-2024-35960-3d90ca9145f6b97b38d0c2b6b30f6ca6af9c1801.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35960/CVE-2024-35960-3d90ca9145f6b97b38d0c2b6b30f6ca6af9c1801.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5cf5337ef701830f173b4eec00a4f984adeb57a0",
                "patch_url": "https://git.kernel.org/stable/p/5cf5337ef701830f173b4eec00a4f984adeb57a0",
                "filename": "CVE-2024-35960-5cf5337ef701830f173b4eec00a4f984adeb57a0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35960/CVE-2024-35960-5cf5337ef701830f173b4eec00a4f984adeb57a0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7aaee12b804c5e0374e7b132b6ec2158ff33dd64",
                "patch_url": "https://git.kernel.org/stable/p/7aaee12b804c5e0374e7b132b6ec2158ff33dd64",
                "filename": "CVE-2024-35960-7aaee12b804c5e0374e7b132b6ec2158ff33dd64.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35960/CVE-2024-35960-7aaee12b804c5e0374e7b132b6ec2158ff33dd64.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7c6782ad4911cbee874e85630226ed389ff2e453",
                "patch_url": "https://git.kernel.org/stable/p/7c6782ad4911cbee874e85630226ed389ff2e453",
                "filename": "CVE-2024-35960-7c6782ad4911cbee874e85630226ed389ff2e453.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35960/CVE-2024-35960-7c6782ad4911cbee874e85630226ed389ff2e453.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/adf67a03af39095f05d82050f15813d6f700159d",
                "patch_url": "https://git.kernel.org/stable/p/adf67a03af39095f05d82050f15813d6f700159d",
                "filename": "CVE-2024-35960-adf67a03af39095f05d82050f15813d6f700159d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35960/CVE-2024-35960-adf67a03af39095f05d82050f15813d6f700159d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/de0139719cdda82806a47580ca0df06fc85e0bd2",
                "patch_url": "https://git.kernel.org/stable/p/de0139719cdda82806a47580ca0df06fc85e0bd2",
                "filename": "CVE-2024-35960-de0139719cdda82806a47580ca0df06fc85e0bd2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35960/CVE-2024-35960-de0139719cdda82806a47580ca0df06fc85e0bd2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1263b0b26077b1183c3c45a0a2479573a351d423",
            "https://git.kernel.org/stable/c/2e8dc5cffc844dacfa79f056dea88002312f253f",
            "https://git.kernel.org/stable/c/3d90ca9145f6b97b38d0c2b6b30f6ca6af9c1801",
            "https://git.kernel.org/stable/c/5cf5337ef701830f173b4eec00a4f984adeb57a0",
            "https://git.kernel.org/stable/c/7aaee12b804c5e0374e7b132b6ec2158ff33dd64",
            "https://git.kernel.org/stable/c/7c6782ad4911cbee874e85630226ed389ff2e453",
            "https://git.kernel.org/stable/c/adf67a03af39095f05d82050f15813d6f700159d",
            "https://git.kernel.org/stable/c/de0139719cdda82806a47580ca0df06fc85e0bd2",
            "https://www.cve.org/CVERecord?id=CVE-2024-35960\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35960\nhttps://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35960-2eaa@gregkh/T"
        ]
    },
    "CVE-2024-35989": {
        "cve": "CVE-2024-35989",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Fix oops during rmmod on single-CPU platforms\n\nDuring the removal of the idxd driver, registered offline callback is\ninvoked as part of the clean up process. However, on systems with only\none CPU online, no valid target is available to migrate the\nperf context, resulting in a kernel oops:\n\n    BUG: unable to handle page fault for address: 000000000002a2b8\n    #PF: supervisor write access in kernel mode\n    #PF: error_code(0x0002) - not-present page\n    PGD 1470e1067 P4D 0\n    Oops: 0002 [#1] PREEMPT SMP NOPTI\n    CPU: 0 PID: 20 Comm: cpuhp/0 Not tainted 6.8.0-rc6-dsa+ #57\n    Hardware name: Intel Corporation AvenueCity/AvenueCity, BIOS BHSDCRB1.86B.2492.D03.2307181620 07/18/2023\n    RIP: 0010:mutex_lock+0x2e/0x50\n    ...\n    Call Trace:\n    <TASK>\n    __die+0x24/0x70\n    page_fault_oops+0x82/0x160\n    do_user_addr_fault+0x65/0x6b0\n    __pfx___rdmsr_safe_on_cpu+0x10/0x10\n    exc_page_fault+0x7d/0x170\n    asm_exc_page_fault+0x26/0x30\n    mutex_lock+0x2e/0x50\n    mutex_lock+0x1e/0x50\n    perf_pmu_migrate_context+0x87/0x1f0\n    perf_event_cpu_offline+0x76/0x90 [idxd]\n    cpuhp_invoke_callback+0xa2/0x4f0\n    __pfx_perf_event_cpu_offline+0x10/0x10 [idxd]\n    cpuhp_thread_fun+0x98/0x150\n    smpboot_thread_fn+0x27/0x260\n    smpboot_thread_fn+0x1af/0x260\n    __pfx_smpboot_thread_fn+0x10/0x10\n    kthread+0x103/0x140\n    __pfx_kthread+0x10/0x10\n    ret_from_fork+0x31/0x50\n    __pfx_kthread+0x10/0x10\n    ret_from_fork_asm+0x1b/0x30\n    <TASK>\n\nFix the issue by preventing the migration of the perf context to an\ninvalid target.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-35989",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/023b6390a15a98f9c3aa5e7da78d485d5384a08e",
            "patch_url": "https://git.kernel.org/stable/p/023b6390a15a98f9c3aa5e7da78d485d5384a08e",
            "filename": "CVE-2024-35989-023b6390a15a98f9c3aa5e7da78d485d5384a08e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35989/CVE-2024-35989-023b6390a15a98f9c3aa5e7da78d485d5384a08e.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/023b6390a15a98f9c3aa5e7da78d485d5384a08e",
                "patch_url": "https://git.kernel.org/stable/p/023b6390a15a98f9c3aa5e7da78d485d5384a08e",
                "filename": "CVE-2024-35989-023b6390a15a98f9c3aa5e7da78d485d5384a08e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35989/CVE-2024-35989-023b6390a15a98f9c3aa5e7da78d485d5384a08e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/47533176fdcef17b114a6f688bc872901c1ec6bb",
                "patch_url": "https://git.kernel.org/stable/p/47533176fdcef17b114a6f688bc872901c1ec6bb",
                "filename": "CVE-2024-35989-47533176fdcef17b114a6f688bc872901c1ec6bb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35989/CVE-2024-35989-47533176fdcef17b114a6f688bc872901c1ec6bb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9edd3aa34d50f27b97be30b2ba4a6af0945ff56b",
                "patch_url": "https://git.kernel.org/stable/p/9edd3aa34d50f27b97be30b2ba4a6af0945ff56b",
                "filename": "CVE-2024-35989-9edd3aa34d50f27b97be30b2ba4a6af0945ff56b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35989/CVE-2024-35989-9edd3aa34d50f27b97be30b2ba4a6af0945ff56b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f221033f5c24659dc6ad7e5cf18fb1b075f4a8be",
                "patch_url": "https://git.kernel.org/stable/p/f221033f5c24659dc6ad7e5cf18fb1b075f4a8be",
                "filename": "CVE-2024-35989-f221033f5c24659dc6ad7e5cf18fb1b075f4a8be.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35989/CVE-2024-35989-f221033f5c24659dc6ad7e5cf18fb1b075f4a8be.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f976eca36cdf94e32fa4f865db0e7c427c9aa33c",
                "patch_url": "https://git.kernel.org/stable/p/f976eca36cdf94e32fa4f865db0e7c427c9aa33c",
                "filename": "CVE-2024-35989-f976eca36cdf94e32fa4f865db0e7c427c9aa33c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-35989/CVE-2024-35989-f976eca36cdf94e32fa4f865db0e7c427c9aa33c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/023b6390a15a98f9c3aa5e7da78d485d5384a08e",
            "https://git.kernel.org/stable/c/47533176fdcef17b114a6f688bc872901c1ec6bb",
            "https://git.kernel.org/stable/c/9edd3aa34d50f27b97be30b2ba4a6af0945ff56b",
            "https://git.kernel.org/stable/c/f221033f5c24659dc6ad7e5cf18fb1b075f4a8be",
            "https://git.kernel.org/stable/c/f976eca36cdf94e32fa4f865db0e7c427c9aa33c",
            "https://www.cve.org/CVERecord?id=CVE-2024-35989\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-35989\nhttps://lore.kernel.org/linux-cve-announce/2024052020-CVE-2024-35989-c5da@gregkh/T"
        ]
    },
    "CVE-2024-36000": {
        "cve": "CVE-2024-36000",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix missing hugetlb_lock for resv uncharge\n\nThere is a recent report on UFFDIO_COPY over hugetlb:\n\nhttps://lore.kernel.org/all/000000000000ee06de0616177560@google.com/\n\n350:\tlockdep_assert_held(&hugetlb_lock);\n\nShould be an issue in hugetlb but triggered in an userfault context, where\nit goes into the unlikely path where two threads modifying the resv map\ntogether.  Mike has a fix in that path for resv uncharge but it looks like\nthe locking criteria was overlooked: hugetlb_cgroup_uncharge_folio_rsvd()\nwill update the cgroup pointer, so it requires to be called with the lock\nheld.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36000",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4c806333efea1000a2a9620926f560ad2e1ca7cc",
            "patch_url": "https://git.kernel.org/stable/p/4c806333efea1000a2a9620926f560ad2e1ca7cc",
            "filename": "CVE-2024-36000-4c806333efea1000a2a9620926f560ad2e1ca7cc.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36000/CVE-2024-36000-4c806333efea1000a2a9620926f560ad2e1ca7cc.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4c806333efea1000a2a9620926f560ad2e1ca7cc",
                "patch_url": "https://git.kernel.org/stable/p/4c806333efea1000a2a9620926f560ad2e1ca7cc",
                "filename": "CVE-2024-36000-4c806333efea1000a2a9620926f560ad2e1ca7cc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36000/CVE-2024-36000-4c806333efea1000a2a9620926f560ad2e1ca7cc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/538faabf31e9c53d8c870d114846fda958a0de10",
                "patch_url": "https://git.kernel.org/stable/p/538faabf31e9c53d8c870d114846fda958a0de10",
                "filename": "CVE-2024-36000-538faabf31e9c53d8c870d114846fda958a0de10.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36000/CVE-2024-36000-538faabf31e9c53d8c870d114846fda958a0de10.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b76b46902c2d0395488c8412e1116c2486cdfcb2",
                "patch_url": "https://git.kernel.org/stable/p/b76b46902c2d0395488c8412e1116c2486cdfcb2",
                "filename": "CVE-2024-36000-b76b46902c2d0395488c8412e1116c2486cdfcb2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36000/CVE-2024-36000-b76b46902c2d0395488c8412e1116c2486cdfcb2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f6c5d21db16a0910152ec8aa9d5a7aed72694505",
                "patch_url": "https://git.kernel.org/stable/p/f6c5d21db16a0910152ec8aa9d5a7aed72694505",
                "filename": "CVE-2024-36000-f6c5d21db16a0910152ec8aa9d5a7aed72694505.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36000/CVE-2024-36000-f6c5d21db16a0910152ec8aa9d5a7aed72694505.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4c806333efea1000a2a9620926f560ad2e1ca7cc",
            "https://git.kernel.org/stable/c/538faabf31e9c53d8c870d114846fda958a0de10",
            "https://git.kernel.org/stable/c/b76b46902c2d0395488c8412e1116c2486cdfcb2",
            "https://git.kernel.org/stable/c/f6c5d21db16a0910152ec8aa9d5a7aed72694505",
            "https://lore.kernel.org/all/",
            "https://www.cve.org/CVERecord?id=CVE-2024-36000\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36000\nhttps://lore.kernel.org/linux-cve-announce/2024052023-CVE-2024-36000-cfc4@gregkh/T"
        ]
    },
    "CVE-2024-36004": {
        "cve": "CVE-2024-36004",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Do not use WQ_MEM_RECLAIM flag for workqueue\n\nIssue reported by customer during SRIOV testing, call trace:\nWhen both i40e and the i40iw driver are loaded, a warning\nin check_flush_dependency is being triggered. This seems\nto be because of the i40e driver workqueue is allocated with\nthe WQ_MEM_RECLAIM flag, and the i40iw one is not.\n\nSimilar error was encountered on ice too and it was fixed by\nremoving the flag. Do the same for i40e too.\n\n[Feb 9 09:08] ------------[ cut here ]------------\n[  +0.000004] workqueue: WQ_MEM_RECLAIM i40e:i40e_service_task [i40e] is\nflushing !WQ_MEM_RECLAIM infiniband:0x0\n[  +0.000060] WARNING: CPU: 0 PID: 937 at kernel/workqueue.c:2966\ncheck_flush_dependency+0x10b/0x120\n[  +0.000007] Modules linked in: snd_seq_dummy snd_hrtimer snd_seq\nsnd_timer snd_seq_device snd soundcore nls_utf8 cifs cifs_arc4\nnls_ucs2_utils rdma_cm iw_cm ib_cm cifs_md4 dns_resolver netfs qrtr\nrfkill sunrpc vfat fat intel_rapl_msr intel_rapl_common irdma\nintel_uncore_frequency intel_uncore_frequency_common ice ipmi_ssif\nisst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal\nintel_powerclamp gnss coretemp ib_uverbs rapl intel_cstate ib_core\niTCO_wdt iTCO_vendor_support acpi_ipmi mei_me ipmi_si intel_uncore\nioatdma i2c_i801 joydev pcspkr mei ipmi_devintf lpc_ich\nintel_pch_thermal i2c_smbus ipmi_msghandler acpi_power_meter acpi_pad\nxfs libcrc32c ast sd_mod drm_shmem_helper t10_pi drm_kms_helper sg ixgbe\ndrm i40e ahci crct10dif_pclmul libahci crc32_pclmul igb crc32c_intel\nlibata ghash_clmulni_intel i2c_algo_bit mdio dca wmi dm_mirror\ndm_region_hash dm_log dm_mod fuse\n[  +0.000050] CPU: 0 PID: 937 Comm: kworker/0:3 Kdump: loaded Not\ntainted 6.8.0-rc2-Feb-net_dev-Qiueue-00279-gbd43c5687e05 #1\n[  +0.000003] Hardware name: Intel Corporation S2600BPB/S2600BPB, BIOS\nSE5C620.86B.02.01.0013.121520200651 12/15/2020\n[  +0.000001] Workqueue: i40e i40e_service_task [i40e]\n[  +0.000024] RIP: 0010:check_flush_dependency+0x10b/0x120\n[  +0.000003] Code: ff 49 8b 54 24 18 48 8d 8b b0 00 00 00 49 89 e8 48\n81 c6 b0 00 00 00 48 c7 c7 b0 97 fa 9f c6 05 8a cc 1f 02 01 e8 35 b3 fd\nff <0f> 0b e9 10 ff ff ff 80 3d 78 cc 1f 02 00 75 94 e9 46 ff ff ff 90\n[  +0.000002] RSP: 0018:ffffbd294976bcf8 EFLAGS: 00010282\n[  +0.000002] RAX: 0000000000000000 RBX: ffff94d4c483c000 RCX:\n0000000000000027\n[  +0.000001] RDX: ffff94d47f620bc8 RSI: 0000000000000001 RDI:\nffff94d47f620bc0\n[  +0.000001] RBP: 0000000000000000 R08: 0000000000000000 R09:\n00000000ffff7fff\n[  +0.000001] R10: ffffbd294976bb98 R11: ffffffffa0be65e8 R12:\nffff94c5451ea180\n[  +0.000001] R13: ffff94c5ab5e8000 R14: ffff94c5c20b6e05 R15:\nffff94c5f1330ab0\n[  +0.000001] FS:  0000000000000000(0000) GS:ffff94d47f600000(0000)\nknlGS:0000000000000000\n[  +0.000002] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  +0.000001] CR2: 00007f9e6f1fca70 CR3: 0000000038e20004 CR4:\n00000000007706f0\n[  +0.000000] DR0: 0000000000000000 DR1: 0000000000000000 DR2:\n0000000000000000\n[  +0.000001] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:\n0000000000000400\n[  +0.000001] PKRU: 55555554\n[  +0.000001] Call Trace:\n[  +0.000001]  <TASK>\n[  +0.000002]  ? __warn+0x80/0x130\n[  +0.000003]  ? check_flush_dependency+0x10b/0x120\n[  +0.000002]  ? report_bug+0x195/0x1a0\n[  +0.000005]  ? handle_bug+0x3c/0x70\n[  +0.000003]  ? exc_invalid_op+0x14/0x70\n[  +0.000002]  ? asm_exc_invalid_op+0x16/0x20\n[  +0.000006]  ? check_flush_dependency+0x10b/0x120\n[  +0.000002]  ? check_flush_dependency+0x10b/0x120\n[  +0.000002]  __flush_workqueue+0x126/0x3f0\n[  +0.000015]  ib_cache_cleanup_one+0x1c/0xe0 [ib_core]\n[  +0.000056]  __ib_unregister_device+0x6a/0xb0 [ib_core]\n[  +0.000023]  ib_unregister_device_and_put+0x34/0x50 [ib_core]\n[  +0.000020]  i40iw_close+0x4b/0x90 [irdma]\n[  +0.000022]  i40e_notify_client_of_netdev_close+0x54/0xc0 [i40e]\n[  +0.000035]  i40e_service_task+0x126/0x190 [i40e]\n[  +0.000024]  process_one_work+0x174/0x340\n[  +0.000003]  worker_th\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36004",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ff7431f898dd00892a545b7d0ce7adf5b926944f",
            "patch_url": "https://git.kernel.org/stable/p/ff7431f898dd00892a545b7d0ce7adf5b926944f",
            "filename": "CVE-2024-36004-ff7431f898dd00892a545b7d0ce7adf5b926944f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36004/CVE-2024-36004-ff7431f898dd00892a545b7d0ce7adf5b926944f.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/09b54d29f05129b092f7c793a70b689ffb3c7b2c",
                "patch_url": "https://git.kernel.org/stable/p/09b54d29f05129b092f7c793a70b689ffb3c7b2c",
                "filename": "CVE-2024-36004-09b54d29f05129b092f7c793a70b689ffb3c7b2c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36004/CVE-2024-36004-09b54d29f05129b092f7c793a70b689ffb3c7b2c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/152ed360cf2d273f88fc99a518b7eb868aae2939",
                "patch_url": "https://git.kernel.org/stable/p/152ed360cf2d273f88fc99a518b7eb868aae2939",
                "filename": "CVE-2024-36004-152ed360cf2d273f88fc99a518b7eb868aae2939.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36004/CVE-2024-36004-152ed360cf2d273f88fc99a518b7eb868aae2939.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1594dac8b1ed78f9e75c263327e198a2e5e25b0e",
                "patch_url": "https://git.kernel.org/stable/p/1594dac8b1ed78f9e75c263327e198a2e5e25b0e",
                "filename": "CVE-2024-36004-1594dac8b1ed78f9e75c263327e198a2e5e25b0e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36004/CVE-2024-36004-1594dac8b1ed78f9e75c263327e198a2e5e25b0e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2cc7d150550cc981aceedf008f5459193282425c",
                "patch_url": "https://git.kernel.org/stable/p/2cc7d150550cc981aceedf008f5459193282425c",
                "filename": "CVE-2024-36004-2cc7d150550cc981aceedf008f5459193282425c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36004/CVE-2024-36004-2cc7d150550cc981aceedf008f5459193282425c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/546d0fe9d76e8229a67369f9cb61e961d99038bd",
                "patch_url": "https://git.kernel.org/stable/p/546d0fe9d76e8229a67369f9cb61e961d99038bd",
                "filename": "CVE-2024-36004-546d0fe9d76e8229a67369f9cb61e961d99038bd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36004/CVE-2024-36004-546d0fe9d76e8229a67369f9cb61e961d99038bd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8d6105f637883c8c09825e962308c06e977de4f0",
                "patch_url": "https://git.kernel.org/stable/p/8d6105f637883c8c09825e962308c06e977de4f0",
                "filename": "CVE-2024-36004-8d6105f637883c8c09825e962308c06e977de4f0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36004/CVE-2024-36004-8d6105f637883c8c09825e962308c06e977de4f0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fbbb2404340dd6178e281bd427c271f7d5ec1d22",
                "patch_url": "https://git.kernel.org/stable/p/fbbb2404340dd6178e281bd427c271f7d5ec1d22",
                "filename": "CVE-2024-36004-fbbb2404340dd6178e281bd427c271f7d5ec1d22.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36004/CVE-2024-36004-fbbb2404340dd6178e281bd427c271f7d5ec1d22.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ff7431f898dd00892a545b7d0ce7adf5b926944f",
                "patch_url": "https://git.kernel.org/stable/p/ff7431f898dd00892a545b7d0ce7adf5b926944f",
                "filename": "CVE-2024-36004-ff7431f898dd00892a545b7d0ce7adf5b926944f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36004/CVE-2024-36004-ff7431f898dd00892a545b7d0ce7adf5b926944f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/09b54d29f05129b092f7c793a70b689ffb3c7b2c",
            "https://git.kernel.org/stable/c/152ed360cf2d273f88fc99a518b7eb868aae2939",
            "https://git.kernel.org/stable/c/1594dac8b1ed78f9e75c263327e198a2e5e25b0e",
            "https://git.kernel.org/stable/c/2cc7d150550cc981aceedf008f5459193282425c",
            "https://git.kernel.org/stable/c/546d0fe9d76e8229a67369f9cb61e961d99038bd",
            "https://git.kernel.org/stable/c/8d6105f637883c8c09825e962308c06e977de4f0",
            "https://git.kernel.org/stable/c/fbbb2404340dd6178e281bd427c271f7d5ec1d22",
            "https://git.kernel.org/stable/c/ff7431f898dd00892a545b7d0ce7adf5b926944f",
            "https://www.cve.org/CVERecord?id=CVE-2024-36004\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36004\nhttps://lore.kernel.org/linux-cve-announce/2024052024-CVE-2024-36004-fb45@gregkh/T"
        ]
    },
    "CVE-2024-36005": {
        "cve": "CVE-2024-36005",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: honor table dormant flag from netdev release event path\n\nCheck for table dormant flag otherwise netdev release event path tries\nto unregister an already unregistered hook.\n\n[524854.857999] ------------[ cut here ]------------\n[524854.858010] WARNING: CPU: 0 PID: 3386599 at net/netfilter/core.c:501 __nf_unregister_net_hook+0x21a/0x260\n[...]\n[524854.858848] CPU: 0 PID: 3386599 Comm: kworker/u32:2 Not tainted 6.9.0-rc3+ #365\n[524854.858869] Workqueue: netns cleanup_net\n[524854.858886] RIP: 0010:__nf_unregister_net_hook+0x21a/0x260\n[524854.858903] Code: 24 e8 aa 73 83 ff 48 63 43 1c 83 f8 01 0f 85 3d ff ff ff e8 98 d1 f0 ff 48 8b 3c 24 e8 8f 73 83 ff 48 63 43 1c e9 26 ff ff ff <0f> 0b 48 83 c4 18 48 c7 c7 00 68 e9 82 5b 5d 41 5c 41 5d 41 5e 41\n[524854.858914] RSP: 0018:ffff8881e36d79e0 EFLAGS: 00010246\n[524854.858926] RAX: 0000000000000000 RBX: ffff8881339ae790 RCX: ffffffff81ba524a\n[524854.858936] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff8881c8a16438\n[524854.858945] RBP: ffff8881c8a16438 R08: 0000000000000001 R09: ffffed103c6daf34\n[524854.858954] R10: ffff8881e36d79a7 R11: 0000000000000000 R12: 0000000000000005\n[524854.858962] R13: ffff8881c8a16000 R14: 0000000000000000 R15: ffff8881351b5a00\n[524854.858971] FS:  0000000000000000(0000) GS:ffff888390800000(0000) knlGS:0000000000000000\n[524854.858982] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[524854.858991] CR2: 00007fc9be0f16f4 CR3: 00000001437cc004 CR4: 00000000001706f0\n[524854.859000] Call Trace:\n[524854.859006]  <TASK>\n[524854.859013]  ? __warn+0x9f/0x1a0\n[524854.859027]  ? __nf_unregister_net_hook+0x21a/0x260\n[524854.859044]  ? report_bug+0x1b1/0x1e0\n[524854.859060]  ? handle_bug+0x3c/0x70\n[524854.859071]  ? exc_invalid_op+0x17/0x40\n[524854.859083]  ? asm_exc_invalid_op+0x1a/0x20\n[524854.859100]  ? __nf_unregister_net_hook+0x6a/0x260\n[524854.859116]  ? __nf_unregister_net_hook+0x21a/0x260\n[524854.859135]  nf_tables_netdev_event+0x337/0x390 [nf_tables]\n[524854.859304]  ? __pfx_nf_tables_netdev_event+0x10/0x10 [nf_tables]\n[524854.859461]  ? packet_notifier+0xb3/0x360\n[524854.859476]  ? _raw_spin_unlock_irqrestore+0x11/0x40\n[524854.859489]  ? dcbnl_netdevice_event+0x35/0x140\n[524854.859507]  ? __pfx_nf_tables_netdev_event+0x10/0x10 [nf_tables]\n[524854.859661]  notifier_call_chain+0x7d/0x140\n[524854.859677]  unregister_netdevice_many_notify+0x5e1/0xae0",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36005",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/5c45feb3c288cf44a529e2657b36c259d86497d2",
            "patch_url": "https://git.kernel.org/stable/p/5c45feb3c288cf44a529e2657b36c259d86497d2",
            "filename": "CVE-2024-36005-5c45feb3c288cf44a529e2657b36c259d86497d2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36005/CVE-2024-36005-5c45feb3c288cf44a529e2657b36c259d86497d2.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/13ba94f6cc820fdea15efeaa17d4c722874eebf9",
                "patch_url": "https://git.kernel.org/stable/p/13ba94f6cc820fdea15efeaa17d4c722874eebf9",
                "filename": "CVE-2024-36005-13ba94f6cc820fdea15efeaa17d4c722874eebf9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36005/CVE-2024-36005-13ba94f6cc820fdea15efeaa17d4c722874eebf9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5c45feb3c288cf44a529e2657b36c259d86497d2",
                "patch_url": "https://git.kernel.org/stable/p/5c45feb3c288cf44a529e2657b36c259d86497d2",
                "filename": "CVE-2024-36005-5c45feb3c288cf44a529e2657b36c259d86497d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36005/CVE-2024-36005-5c45feb3c288cf44a529e2657b36c259d86497d2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8260c980aee7d8d8a3db39faf19c391d2f898816",
                "patch_url": "https://git.kernel.org/stable/p/8260c980aee7d8d8a3db39faf19c391d2f898816",
                "filename": "CVE-2024-36005-8260c980aee7d8d8a3db39faf19c391d2f898816.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36005/CVE-2024-36005-8260c980aee7d8d8a3db39faf19c391d2f898816.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8e30abc9ace4f0add4cd761dfdbfaebae5632dd2",
                "patch_url": "https://git.kernel.org/stable/p/8e30abc9ace4f0add4cd761dfdbfaebae5632dd2",
                "filename": "CVE-2024-36005-8e30abc9ace4f0add4cd761dfdbfaebae5632dd2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36005/CVE-2024-36005-8e30abc9ace4f0add4cd761dfdbfaebae5632dd2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ca34c40d1c22c555fa7f4a21a1c807fea7290a0a",
                "patch_url": "https://git.kernel.org/stable/p/ca34c40d1c22c555fa7f4a21a1c807fea7290a0a",
                "filename": "CVE-2024-36005-ca34c40d1c22c555fa7f4a21a1c807fea7290a0a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36005/CVE-2024-36005-ca34c40d1c22c555fa7f4a21a1c807fea7290a0a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e4bb6da24de336a7899033a65490ed2d892efa5b",
                "patch_url": "https://git.kernel.org/stable/p/e4bb6da24de336a7899033a65490ed2d892efa5b",
                "filename": "CVE-2024-36005-e4bb6da24de336a7899033a65490ed2d892efa5b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36005/CVE-2024-36005-e4bb6da24de336a7899033a65490ed2d892efa5b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/13ba94f6cc820fdea15efeaa17d4c722874eebf9",
            "https://git.kernel.org/stable/c/5c45feb3c288cf44a529e2657b36c259d86497d2",
            "https://git.kernel.org/stable/c/8260c980aee7d8d8a3db39faf19c391d2f898816",
            "https://git.kernel.org/stable/c/8e30abc9ace4f0add4cd761dfdbfaebae5632dd2",
            "https://git.kernel.org/stable/c/ca34c40d1c22c555fa7f4a21a1c807fea7290a0a",
            "https://git.kernel.org/stable/c/e4bb6da24de336a7899033a65490ed2d892efa5b",
            "https://www.cve.org/CVERecord?id=CVE-2024-36005\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36005\nhttps://lore.kernel.org/linux-cve-announce/2024052024-CVE-2024-36005-2336@gregkh/T"
        ]
    },
    "CVE-2024-36006": {
        "cve": "CVE-2024-36006",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix incorrect list API usage\n\nBoth the function that migrates all the chunks within a region and the\nfunction that migrates all the entries within a chunk call\nlist_first_entry() on the respective lists without checking that the\nlists are not empty. This is incorrect usage of the API, which leads to\nthe following warning [1].\n\nFix by returning if the lists are empty as there is nothing to migrate\nin this case.\n\n[1]\nWARNING: CPU: 0 PID: 6437 at drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c:1266 mlxsw_sp_acl_tcam_vchunk_migrate_all+0x1f1/0>\nModules linked in:\nCPU: 0 PID: 6437 Comm: kworker/0:37 Not tainted 6.9.0-rc3-custom-00883-g94a65f079ef6 #39\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nRIP: 0010:mlxsw_sp_acl_tcam_vchunk_migrate_all+0x1f1/0x2c0\n[...]\nCall Trace:\n <TASK>\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x6c/0x4a0\n process_one_work+0x151/0x370\n worker_thread+0x2cb/0x3e0\n kthread+0xd0/0x100\n ret_from_fork+0x34/0x50\n ret_from_fork_asm+0x1a/0x30\n </TASK>",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36006",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0b2c13b670b168e324e1cf109e67056a20fd610a",
            "patch_url": "https://git.kernel.org/stable/p/0b2c13b670b168e324e1cf109e67056a20fd610a",
            "filename": "CVE-2024-36006-0b2c13b670b168e324e1cf109e67056a20fd610a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36006/CVE-2024-36006-0b2c13b670b168e324e1cf109e67056a20fd610a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/09846c2309b150b8ce4e0ce96f058197598fc530",
                "patch_url": "https://git.kernel.org/stable/p/09846c2309b150b8ce4e0ce96f058197598fc530",
                "filename": "CVE-2024-36006-09846c2309b150b8ce4e0ce96f058197598fc530.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36006/CVE-2024-36006-09846c2309b150b8ce4e0ce96f058197598fc530.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0b2c13b670b168e324e1cf109e67056a20fd610a",
                "patch_url": "https://git.kernel.org/stable/p/0b2c13b670b168e324e1cf109e67056a20fd610a",
                "filename": "CVE-2024-36006-0b2c13b670b168e324e1cf109e67056a20fd610a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36006/CVE-2024-36006-0b2c13b670b168e324e1cf109e67056a20fd610a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4526a56e02da3725db979358964df9cd9c567154",
                "patch_url": "https://git.kernel.org/stable/p/4526a56e02da3725db979358964df9cd9c567154",
                "filename": "CVE-2024-36006-4526a56e02da3725db979358964df9cd9c567154.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36006/CVE-2024-36006-4526a56e02da3725db979358964df9cd9c567154.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/64435b64e43d8ee60faa46c0cd04e323e8b2a7b0",
                "patch_url": "https://git.kernel.org/stable/p/64435b64e43d8ee60faa46c0cd04e323e8b2a7b0",
                "filename": "CVE-2024-36006-64435b64e43d8ee60faa46c0cd04e323e8b2a7b0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36006/CVE-2024-36006-64435b64e43d8ee60faa46c0cd04e323e8b2a7b0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ab4ecfb627338e440ae11def004c524a00d93e40",
                "patch_url": "https://git.kernel.org/stable/p/ab4ecfb627338e440ae11def004c524a00d93e40",
                "filename": "CVE-2024-36006-ab4ecfb627338e440ae11def004c524a00d93e40.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36006/CVE-2024-36006-ab4ecfb627338e440ae11def004c524a00d93e40.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/af8b593c3dd9df82cb199be65863af004b09fd97",
                "patch_url": "https://git.kernel.org/stable/p/af8b593c3dd9df82cb199be65863af004b09fd97",
                "filename": "CVE-2024-36006-af8b593c3dd9df82cb199be65863af004b09fd97.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36006/CVE-2024-36006-af8b593c3dd9df82cb199be65863af004b09fd97.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b377add0f0117409c418ddd6504bd682ebe0bf79",
                "patch_url": "https://git.kernel.org/stable/p/b377add0f0117409c418ddd6504bd682ebe0bf79",
                "filename": "CVE-2024-36006-b377add0f0117409c418ddd6504bd682ebe0bf79.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36006/CVE-2024-36006-b377add0f0117409c418ddd6504bd682ebe0bf79.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/09846c2309b150b8ce4e0ce96f058197598fc530",
            "https://git.kernel.org/stable/c/0b2c13b670b168e324e1cf109e67056a20fd610a",
            "https://git.kernel.org/stable/c/4526a56e02da3725db979358964df9cd9c567154",
            "https://git.kernel.org/stable/c/64435b64e43d8ee60faa46c0cd04e323e8b2a7b0",
            "https://git.kernel.org/stable/c/ab4ecfb627338e440ae11def004c524a00d93e40",
            "https://git.kernel.org/stable/c/af8b593c3dd9df82cb199be65863af004b09fd97",
            "https://git.kernel.org/stable/c/b377add0f0117409c418ddd6504bd682ebe0bf79",
            "https://www.cve.org/CVERecord?id=CVE-2024-36006\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36006\nhttps://lore.kernel.org/linux-cve-announce/2024052025-CVE-2024-36006-c032@gregkh/T"
        ]
    },
    "CVE-2024-36007": {
        "cve": "CVE-2024-36007",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix warning during rehash\n\nAs previously explained, the rehash delayed work migrates filters from\none region to another. This is done by iterating over all chunks (all\nthe filters with the same priority) in the region and in each chunk\niterating over all the filters.\n\nWhen the work runs out of credits it stores the current chunk and entry\nas markers in the per-work context so that it would know where to resume\nthe migration from the next time the work is scheduled.\n\nUpon error, the chunk marker is reset to NULL, but without resetting the\nentry markers despite being relative to it. This can result in migration\nbeing resumed from an entry that does not belong to the chunk being\nmigrated. In turn, this will eventually lead to a chunk being iterated\nover as if it is an entry. Because of how the two structures happen to\nbe defined, this does not lead to KASAN splats, but to warnings such as\n[1].\n\nFix by creating a helper that resets all the markers and call it from\nall the places the currently only reset the chunk marker. For good\nmeasures also call it when starting a completely new rehash. Add a\nwarning to avoid future cases.\n\n[1]\nWARNING: CPU: 7 PID: 1076 at drivers/net/ethernet/mellanox/mlxsw/core_acl_flex_keys.c:407 mlxsw_afk_encode+0x242/0x2f0\nModules linked in:\nCPU: 7 PID: 1076 Comm: kworker/7:24 Tainted: G        W          6.9.0-rc3-custom-00880-g29e61d91b77b #29\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nRIP: 0010:mlxsw_afk_encode+0x242/0x2f0\n[...]\nCall Trace:\n <TASK>\n mlxsw_sp_acl_atcam_entry_add+0xd9/0x3c0\n mlxsw_sp_acl_tcam_entry_create+0x5e/0xa0\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x109/0x290\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x6c/0x470\n process_one_work+0x151/0x370\n worker_thread+0x2cb/0x3e0\n kthread+0xd0/0x100\n ret_from_fork+0x34/0x50\n </TASK>",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36007",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/751d352858108314efd33dddd5a9a2b6bf7d6916",
            "patch_url": "https://git.kernel.org/stable/p/751d352858108314efd33dddd5a9a2b6bf7d6916",
            "filename": "CVE-2024-36007-751d352858108314efd33dddd5a9a2b6bf7d6916.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36007/CVE-2024-36007-751d352858108314efd33dddd5a9a2b6bf7d6916.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/039992b6d2df097c65f480dcf269de3d2656f573",
                "patch_url": "https://git.kernel.org/stable/p/039992b6d2df097c65f480dcf269de3d2656f573",
                "filename": "CVE-2024-36007-039992b6d2df097c65f480dcf269de3d2656f573.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36007/CVE-2024-36007-039992b6d2df097c65f480dcf269de3d2656f573.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0b88631855026b55cad901ac28d081e0f358e596",
                "patch_url": "https://git.kernel.org/stable/p/0b88631855026b55cad901ac28d081e0f358e596",
                "filename": "CVE-2024-36007-0b88631855026b55cad901ac28d081e0f358e596.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36007/CVE-2024-36007-0b88631855026b55cad901ac28d081e0f358e596.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/17e9e0bbae652b9b2049e51699e93dfa60b2988d",
                "patch_url": "https://git.kernel.org/stable/p/17e9e0bbae652b9b2049e51699e93dfa60b2988d",
                "filename": "CVE-2024-36007-17e9e0bbae652b9b2049e51699e93dfa60b2988d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36007/CVE-2024-36007-17e9e0bbae652b9b2049e51699e93dfa60b2988d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1d76bd2a0034d0d08045c1c6adf2235d88982952",
                "patch_url": "https://git.kernel.org/stable/p/1d76bd2a0034d0d08045c1c6adf2235d88982952",
                "filename": "CVE-2024-36007-1d76bd2a0034d0d08045c1c6adf2235d88982952.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36007/CVE-2024-36007-1d76bd2a0034d0d08045c1c6adf2235d88982952.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/743edc8547a92b6192aa1f1b6bb78233fa21dc9b",
                "patch_url": "https://git.kernel.org/stable/p/743edc8547a92b6192aa1f1b6bb78233fa21dc9b",
                "filename": "CVE-2024-36007-743edc8547a92b6192aa1f1b6bb78233fa21dc9b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36007/CVE-2024-36007-743edc8547a92b6192aa1f1b6bb78233fa21dc9b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/751d352858108314efd33dddd5a9a2b6bf7d6916",
                "patch_url": "https://git.kernel.org/stable/p/751d352858108314efd33dddd5a9a2b6bf7d6916",
                "filename": "CVE-2024-36007-751d352858108314efd33dddd5a9a2b6bf7d6916.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36007/CVE-2024-36007-751d352858108314efd33dddd5a9a2b6bf7d6916.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e890456051fe8c57944b911defb3e6de91315861",
                "patch_url": "https://git.kernel.org/stable/p/e890456051fe8c57944b911defb3e6de91315861",
                "filename": "CVE-2024-36007-e890456051fe8c57944b911defb3e6de91315861.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36007/CVE-2024-36007-e890456051fe8c57944b911defb3e6de91315861.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/039992b6d2df097c65f480dcf269de3d2656f573",
            "https://git.kernel.org/stable/c/0b88631855026b55cad901ac28d081e0f358e596",
            "https://git.kernel.org/stable/c/17e9e0bbae652b9b2049e51699e93dfa60b2988d",
            "https://git.kernel.org/stable/c/1d76bd2a0034d0d08045c1c6adf2235d88982952",
            "https://git.kernel.org/stable/c/743edc8547a92b6192aa1f1b6bb78233fa21dc9b",
            "https://git.kernel.org/stable/c/751d352858108314efd33dddd5a9a2b6bf7d6916",
            "https://git.kernel.org/stable/c/e890456051fe8c57944b911defb3e6de91315861",
            "https://www.cve.org/CVERecord?id=CVE-2024-36007\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36007\nhttps://lore.kernel.org/linux-cve-announce/2024052025-CVE-2024-36007-052e@gregkh/T"
        ]
    },
    "CVE-2024-36010": {
        "cve": "CVE-2024-36010",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Fix string truncation warnings in igb_set_fw_version\n\nCommit 1978d3ead82c (\"intel: fix string truncation warnings\")\nfixes '-Wformat-truncation=' warnings in igb_main.c by using kasprintf.\n\ndrivers/net/ethernet/intel/igb/igb_main.c:3092:53: warning\uff1a\u2018%d\u2019 directive output may be truncated writing between 1 and 5 bytes into a region of size between 1 and 13 [-Wformat-truncation=]\n 3092 |                                  \"%d.%d, 0x%08x, %d.%d.%d\",\n      |                                                     ^~\ndrivers/net/ethernet/intel/igb/igb_main.c:3092:34: note\uff1adirective argument in the range [0, 65535]\n 3092 |                                  \"%d.%d, 0x%08x, %d.%d.%d\",\n      |                                  ^~~~~~~~~~~~~~~~~~~~~~~~~\ndrivers/net/ethernet/intel/igb/igb_main.c:3092:34: note\uff1adirective argument in the range [0, 65535]\ndrivers/net/ethernet/intel/igb/igb_main.c:3090:25: note\uff1a\u2018snprintf\u2019 output between 23 and 43 bytes into a destination of size 32\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.\n\nFix this warning by using a larger space for adapter->fw_version,\nand then fall back and continue to use snprintf.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36010",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/c56d055893cbe97848611855d1c97d0ab171eccc",
            "patch_url": "https://git.kernel.org/stable/p/c56d055893cbe97848611855d1c97d0ab171eccc",
            "filename": "CVE-2024-36010-c56d055893cbe97848611855d1c97d0ab171eccc.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36010/CVE-2024-36010-c56d055893cbe97848611855d1c97d0ab171eccc.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/c56d055893cbe97848611855d1c97d0ab171eccc",
                "patch_url": "https://git.kernel.org/stable/p/c56d055893cbe97848611855d1c97d0ab171eccc",
                "filename": "CVE-2024-36010-c56d055893cbe97848611855d1c97d0ab171eccc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36010/CVE-2024-36010-c56d055893cbe97848611855d1c97d0ab171eccc.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/c56d055893cbe97848611855d1c97d0ab171eccc",
            "https://www.cve.org/CVERecord?id=CVE-2024-36010\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36010\nhttps://lore.kernel.org/linux-cve-announce/2024052237-CVE-2024-36010-c98b@gregkh/T"
        ]
    },
    "CVE-2024-36016": {
        "cve": "CVE-2024-36016",
        "cvss_v2": null,
        "cvss_v3": 7.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: fix possible out-of-bounds in gsm0_receive()\n\nAssuming the following:\n- side A configures the n_gsm in basic option mode\n- side B sends the header of a basic option mode frame with data length 1\n- side A switches to advanced option mode\n- side B sends 2 data bytes which exceeds gsm->len\n  Reason: gsm->len is not used in advanced option mode.\n- side A switches to basic option mode\n- side B keeps sending until gsm0_receive() writes past gsm->buf\n  Reason: Neither gsm->state nor gsm->len have been reset after\n  reconfiguration.\n\nFix this by changing gsm->count to gsm->len comparison from equal to less\nthan. Also add upper limit checks against the constant MAX_MRU in\ngsm0_receive() and gsm1_receive() to harden against memory corruption of\ngsm->len and gsm->mru.\n\nAll other checks remain as we still need to limit the data according to the\nuser configuration and actual payload size.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36016",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9513d4148950b05bc99fa7314dc883cc0e1605e5",
            "patch_url": "https://git.kernel.org/stable/p/9513d4148950b05bc99fa7314dc883cc0e1605e5",
            "filename": "CVE-2024-36016-9513d4148950b05bc99fa7314dc883cc0e1605e5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36016/CVE-2024-36016-9513d4148950b05bc99fa7314dc883cc0e1605e5.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0fb736c9931e02dbc7d9a75044c8e1c039e50f04",
                "patch_url": "https://git.kernel.org/stable/p/0fb736c9931e02dbc7d9a75044c8e1c039e50f04",
                "filename": "CVE-2024-36016-0fb736c9931e02dbc7d9a75044c8e1c039e50f04.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36016/CVE-2024-36016-0fb736c9931e02dbc7d9a75044c8e1c039e50f04.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/46f52c89a7e7d2691b97a9728e4591d071ca8abc",
                "patch_url": "https://git.kernel.org/stable/p/46f52c89a7e7d2691b97a9728e4591d071ca8abc",
                "filename": "CVE-2024-36016-46f52c89a7e7d2691b97a9728e4591d071ca8abc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36016/CVE-2024-36016-46f52c89a7e7d2691b97a9728e4591d071ca8abc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/47388e807f85948eefc403a8a5fdc5b406a65d5a",
                "patch_url": "https://git.kernel.org/stable/p/47388e807f85948eefc403a8a5fdc5b406a65d5a",
                "filename": "CVE-2024-36016-47388e807f85948eefc403a8a5fdc5b406a65d5a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36016/CVE-2024-36016-47388e807f85948eefc403a8a5fdc5b406a65d5a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4c267110fc110390704cc065edb9817fdd10ff54",
                "patch_url": "https://git.kernel.org/stable/p/4c267110fc110390704cc065edb9817fdd10ff54",
                "filename": "CVE-2024-36016-4c267110fc110390704cc065edb9817fdd10ff54.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36016/CVE-2024-36016-4c267110fc110390704cc065edb9817fdd10ff54.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/774d83b008eccb1c48c14dc5486e7aa255731350",
                "patch_url": "https://git.kernel.org/stable/p/774d83b008eccb1c48c14dc5486e7aa255731350",
                "filename": "CVE-2024-36016-774d83b008eccb1c48c14dc5486e7aa255731350.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36016/CVE-2024-36016-774d83b008eccb1c48c14dc5486e7aa255731350.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9513d4148950b05bc99fa7314dc883cc0e1605e5",
                "patch_url": "https://git.kernel.org/stable/p/9513d4148950b05bc99fa7314dc883cc0e1605e5",
                "filename": "CVE-2024-36016-9513d4148950b05bc99fa7314dc883cc0e1605e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36016/CVE-2024-36016-9513d4148950b05bc99fa7314dc883cc0e1605e5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b229bc6c6ea9fe459fc3fa94fd0a27a2f32aca56",
                "patch_url": "https://git.kernel.org/stable/p/b229bc6c6ea9fe459fc3fa94fd0a27a2f32aca56",
                "filename": "CVE-2024-36016-b229bc6c6ea9fe459fc3fa94fd0a27a2f32aca56.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36016/CVE-2024-36016-b229bc6c6ea9fe459fc3fa94fd0a27a2f32aca56.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b890d45aaf02b564e6cae2d2a590f9649330857d",
                "patch_url": "https://git.kernel.org/stable/p/b890d45aaf02b564e6cae2d2a590f9649330857d",
                "filename": "CVE-2024-36016-b890d45aaf02b564e6cae2d2a590f9649330857d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36016/CVE-2024-36016-b890d45aaf02b564e6cae2d2a590f9649330857d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f126ce7305fe88f49cdabc6db4168b9318898ea3",
                "patch_url": "https://git.kernel.org/stable/p/f126ce7305fe88f49cdabc6db4168b9318898ea3",
                "filename": "CVE-2024-36016-f126ce7305fe88f49cdabc6db4168b9318898ea3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36016/CVE-2024-36016-f126ce7305fe88f49cdabc6db4168b9318898ea3.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0fb736c9931e02dbc7d9a75044c8e1c039e50f04",
            "https://git.kernel.org/stable/c/46f52c89a7e7d2691b97a9728e4591d071ca8abc",
            "https://git.kernel.org/stable/c/47388e807f85948eefc403a8a5fdc5b406a65d5a",
            "https://git.kernel.org/stable/c/4c267110fc110390704cc065edb9817fdd10ff54",
            "https://git.kernel.org/stable/c/774d83b008eccb1c48c14dc5486e7aa255731350",
            "https://git.kernel.org/stable/c/9513d4148950b05bc99fa7314dc883cc0e1605e5",
            "https://git.kernel.org/stable/c/b229bc6c6ea9fe459fc3fa94fd0a27a2f32aca56",
            "https://git.kernel.org/stable/c/b890d45aaf02b564e6cae2d2a590f9649330857d",
            "https://git.kernel.org/stable/c/f126ce7305fe88f49cdabc6db4168b9318898ea3",
            "https://www.cve.org/CVERecord?id=CVE-2024-36016\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36016\nhttps://lore.kernel.org/linux-cve-announce/2024052947-CVE-2024-36016-d30a@gregkh/T"
        ]
    },
    "CVE-2024-36017": {
        "cve": "CVE-2024-36017",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nrtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation\n\nEach attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a\nstruct ifla_vf_vlan_info so the size of such attribute needs to be at least\nof sizeof(struct ifla_vf_vlan_info) which is 14 bytes.\nThe current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes)\nwhich is less than sizeof(struct ifla_vf_vlan_info) so this validation\nis not enough and a too small attribute might be cast to a\nstruct ifla_vf_vlan_info, this might result in an out of bands\nread access when accessing the saved (casted) entry in ivvl.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36017",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6c8f44b02500c7d14b5e6618fe4ef9a0da47b3de",
            "patch_url": "https://git.kernel.org/stable/p/6c8f44b02500c7d14b5e6618fe4ef9a0da47b3de",
            "filename": "CVE-2024-36017-6c8f44b02500c7d14b5e6618fe4ef9a0da47b3de.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36017/CVE-2024-36017-6c8f44b02500c7d14b5e6618fe4ef9a0da47b3de.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1aec77b2bb2ed1db0f5efc61c4c1ca3813307489",
                "patch_url": "https://git.kernel.org/stable/p/1aec77b2bb2ed1db0f5efc61c4c1ca3813307489",
                "filename": "CVE-2024-36017-1aec77b2bb2ed1db0f5efc61c4c1ca3813307489.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36017/CVE-2024-36017-1aec77b2bb2ed1db0f5efc61c4c1ca3813307489.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/206003c748b88890a910ef7142d18f77be57550b",
                "patch_url": "https://git.kernel.org/stable/p/206003c748b88890a910ef7142d18f77be57550b",
                "filename": "CVE-2024-36017-206003c748b88890a910ef7142d18f77be57550b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36017/CVE-2024-36017-206003c748b88890a910ef7142d18f77be57550b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4a4b9757789a1551d2df130df23bfb3545bfa7e8",
                "patch_url": "https://git.kernel.org/stable/p/4a4b9757789a1551d2df130df23bfb3545bfa7e8",
                "filename": "CVE-2024-36017-4a4b9757789a1551d2df130df23bfb3545bfa7e8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36017/CVE-2024-36017-4a4b9757789a1551d2df130df23bfb3545bfa7e8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5e7ef2d88666a0212db8c38e6703864b9ce70169",
                "patch_url": "https://git.kernel.org/stable/p/5e7ef2d88666a0212db8c38e6703864b9ce70169",
                "filename": "CVE-2024-36017-5e7ef2d88666a0212db8c38e6703864b9ce70169.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36017/CVE-2024-36017-5e7ef2d88666a0212db8c38e6703864b9ce70169.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6c8f44b02500c7d14b5e6618fe4ef9a0da47b3de",
                "patch_url": "https://git.kernel.org/stable/p/6c8f44b02500c7d14b5e6618fe4ef9a0da47b3de",
                "filename": "CVE-2024-36017-6c8f44b02500c7d14b5e6618fe4ef9a0da47b3de.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36017/CVE-2024-36017-6c8f44b02500c7d14b5e6618fe4ef9a0da47b3de.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6e4c7193954f4faab92f6e8d88bc5565317b44e7",
                "patch_url": "https://git.kernel.org/stable/p/6e4c7193954f4faab92f6e8d88bc5565317b44e7",
                "filename": "CVE-2024-36017-6e4c7193954f4faab92f6e8d88bc5565317b44e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36017/CVE-2024-36017-6e4c7193954f4faab92f6e8d88bc5565317b44e7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8ac69ff2d0d5be9734c4402de932aa3dc8549c1a",
                "patch_url": "https://git.kernel.org/stable/p/8ac69ff2d0d5be9734c4402de932aa3dc8549c1a",
                "filename": "CVE-2024-36017-8ac69ff2d0d5be9734c4402de932aa3dc8549c1a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36017/CVE-2024-36017-8ac69ff2d0d5be9734c4402de932aa3dc8549c1a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f3c1bf3054f96ddeab0621d920445bada769b40e",
                "patch_url": "https://git.kernel.org/stable/p/f3c1bf3054f96ddeab0621d920445bada769b40e",
                "filename": "CVE-2024-36017-f3c1bf3054f96ddeab0621d920445bada769b40e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36017/CVE-2024-36017-f3c1bf3054f96ddeab0621d920445bada769b40e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1aec77b2bb2ed1db0f5efc61c4c1ca3813307489",
            "https://git.kernel.org/stable/c/206003c748b88890a910ef7142d18f77be57550b",
            "https://git.kernel.org/stable/c/4a4b9757789a1551d2df130df23bfb3545bfa7e8",
            "https://git.kernel.org/stable/c/5e7ef2d88666a0212db8c38e6703864b9ce70169",
            "https://git.kernel.org/stable/c/6c8f44b02500c7d14b5e6618fe4ef9a0da47b3de",
            "https://git.kernel.org/stable/c/6e4c7193954f4faab92f6e8d88bc5565317b44e7",
            "https://git.kernel.org/stable/c/8ac69ff2d0d5be9734c4402de932aa3dc8549c1a",
            "https://git.kernel.org/stable/c/f3c1bf3054f96ddeab0621d920445bada769b40e",
            "https://www.cve.org/CVERecord?id=CVE-2024-36017\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36017\nhttps://lore.kernel.org/linux-cve-announce/2024053015-CVE-2024-36017-bf96@gregkh/T"
        ]
    },
    "CVE-2024-36020": {
        "cve": "CVE-2024-36020",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: fix vf may be used uninitialized in this function warning\n\nTo fix the regression introduced by commit 52424f974bc5, which causes\nservers hang in very hard to reproduce conditions with resets races.\nUsing two sources for the information is the root cause.\nIn this function before the fix bumping v didn't mean bumping vf\npointer. But the code used this variables interchangeably, so stale vf\ncould point to different/not intended vf.\n\nRemove redundant \"v\" variable and iterate via single VF pointer across\nwhole function instead to guarantee VF pointer validity.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36020",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/f37c4eac99c258111d414d31b740437e1925b8e8",
            "patch_url": "https://git.kernel.org/stable/p/f37c4eac99c258111d414d31b740437e1925b8e8",
            "filename": "CVE-2024-36020-f37c4eac99c258111d414d31b740437e1925b8e8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36020/CVE-2024-36020-f37c4eac99c258111d414d31b740437e1925b8e8.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/06df7618f591b2dc43c59967e294d7b9fc8675b6",
                "patch_url": "https://git.kernel.org/stable/p/06df7618f591b2dc43c59967e294d7b9fc8675b6",
                "filename": "CVE-2024-36020-06df7618f591b2dc43c59967e294d7b9fc8675b6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36020/CVE-2024-36020-06df7618f591b2dc43c59967e294d7b9fc8675b6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0dcf573f997732702917af1563aa2493dc772fc0",
                "patch_url": "https://git.kernel.org/stable/p/0dcf573f997732702917af1563aa2493dc772fc0",
                "filename": "CVE-2024-36020-0dcf573f997732702917af1563aa2493dc772fc0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36020/CVE-2024-36020-0dcf573f997732702917af1563aa2493dc772fc0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3e89846283f3cf7c7a8e28b342576fd7c561d2ba",
                "patch_url": "https://git.kernel.org/stable/p/3e89846283f3cf7c7a8e28b342576fd7c561d2ba",
                "filename": "CVE-2024-36020-3e89846283f3cf7c7a8e28b342576fd7c561d2ba.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36020/CVE-2024-36020-3e89846283f3cf7c7a8e28b342576fd7c561d2ba.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/951d2748a2a8242853abc3d0c153ce4bf8faad31",
                "patch_url": "https://git.kernel.org/stable/p/951d2748a2a8242853abc3d0c153ce4bf8faad31",
                "filename": "CVE-2024-36020-951d2748a2a8242853abc3d0c153ce4bf8faad31.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36020/CVE-2024-36020-951d2748a2a8242853abc3d0c153ce4bf8faad31.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9dcf0fcb80f6aeb01469e3c957f8d4c97365450a",
                "patch_url": "https://git.kernel.org/stable/p/9dcf0fcb80f6aeb01469e3c957f8d4c97365450a",
                "filename": "CVE-2024-36020-9dcf0fcb80f6aeb01469e3c957f8d4c97365450a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36020/CVE-2024-36020-9dcf0fcb80f6aeb01469e3c957f8d4c97365450a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b8e82128b44fa40bf99a50b919488ef361e1683c",
                "patch_url": "https://git.kernel.org/stable/p/b8e82128b44fa40bf99a50b919488ef361e1683c",
                "filename": "CVE-2024-36020-b8e82128b44fa40bf99a50b919488ef361e1683c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36020/CVE-2024-36020-b8e82128b44fa40bf99a50b919488ef361e1683c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cc9cd02dd9e8b7764ea9effb24f4f1dd73d1b23d",
                "patch_url": "https://git.kernel.org/stable/p/cc9cd02dd9e8b7764ea9effb24f4f1dd73d1b23d",
                "filename": "CVE-2024-36020-cc9cd02dd9e8b7764ea9effb24f4f1dd73d1b23d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36020/CVE-2024-36020-cc9cd02dd9e8b7764ea9effb24f4f1dd73d1b23d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f37c4eac99c258111d414d31b740437e1925b8e8",
                "patch_url": "https://git.kernel.org/stable/p/f37c4eac99c258111d414d31b740437e1925b8e8",
                "filename": "CVE-2024-36020-f37c4eac99c258111d414d31b740437e1925b8e8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36020/CVE-2024-36020-f37c4eac99c258111d414d31b740437e1925b8e8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/06df7618f591b2dc43c59967e294d7b9fc8675b6",
            "https://git.kernel.org/stable/c/0dcf573f997732702917af1563aa2493dc772fc0",
            "https://git.kernel.org/stable/c/3e89846283f3cf7c7a8e28b342576fd7c561d2ba",
            "https://git.kernel.org/stable/c/951d2748a2a8242853abc3d0c153ce4bf8faad31",
            "https://git.kernel.org/stable/c/9dcf0fcb80f6aeb01469e3c957f8d4c97365450a",
            "https://git.kernel.org/stable/c/b8e82128b44fa40bf99a50b919488ef361e1683c",
            "https://git.kernel.org/stable/c/cc9cd02dd9e8b7764ea9effb24f4f1dd73d1b23d",
            "https://git.kernel.org/stable/c/f37c4eac99c258111d414d31b740437e1925b8e8"
        ]
    },
    "CVE-2024-36025": {
        "cve": "CVE-2024-36025",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix off by one in qla_edif_app_getstats()\n\nThe app_reply->elem[] array is allocated earlier in this function and it\nhas app_req.num_ports elements.  Thus this > comparison needs to be >= to\nprevent memory corruption.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36025",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9fc74e367be4247a5ac39bb8ec41eaa73fade510",
            "patch_url": "https://git.kernel.org/stable/p/9fc74e367be4247a5ac39bb8ec41eaa73fade510",
            "filename": "CVE-2024-36025-9fc74e367be4247a5ac39bb8ec41eaa73fade510.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36025/CVE-2024-36025-9fc74e367be4247a5ac39bb8ec41eaa73fade510.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4406e4176f47177f5e51b4cc7e6a7a2ff3dbfbbd",
                "patch_url": "https://git.kernel.org/stable/p/4406e4176f47177f5e51b4cc7e6a7a2ff3dbfbbd",
                "filename": "CVE-2024-36025-4406e4176f47177f5e51b4cc7e6a7a2ff3dbfbbd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36025/CVE-2024-36025-4406e4176f47177f5e51b4cc7e6a7a2ff3dbfbbd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/60b87b5ecbe07d70897d35947b0bb3e76ccd1b3a",
                "patch_url": "https://git.kernel.org/stable/p/60b87b5ecbe07d70897d35947b0bb3e76ccd1b3a",
                "filename": "CVE-2024-36025-60b87b5ecbe07d70897d35947b0bb3e76ccd1b3a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36025/CVE-2024-36025-60b87b5ecbe07d70897d35947b0bb3e76ccd1b3a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8c820f7c8e9b46238d277c575392fe9930207aab",
                "patch_url": "https://git.kernel.org/stable/p/8c820f7c8e9b46238d277c575392fe9930207aab",
                "filename": "CVE-2024-36025-8c820f7c8e9b46238d277c575392fe9930207aab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36025/CVE-2024-36025-8c820f7c8e9b46238d277c575392fe9930207aab.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9fc74e367be4247a5ac39bb8ec41eaa73fade510",
                "patch_url": "https://git.kernel.org/stable/p/9fc74e367be4247a5ac39bb8ec41eaa73fade510",
                "filename": "CVE-2024-36025-9fc74e367be4247a5ac39bb8ec41eaa73fade510.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36025/CVE-2024-36025-9fc74e367be4247a5ac39bb8ec41eaa73fade510.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ea8ac95c22c93acecb710209a7fd10b851afe817",
                "patch_url": "https://git.kernel.org/stable/p/ea8ac95c22c93acecb710209a7fd10b851afe817",
                "filename": "CVE-2024-36025-ea8ac95c22c93acecb710209a7fd10b851afe817.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36025/CVE-2024-36025-ea8ac95c22c93acecb710209a7fd10b851afe817.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4406e4176f47177f5e51b4cc7e6a7a2ff3dbfbbd",
            "https://git.kernel.org/stable/c/60b87b5ecbe07d70897d35947b0bb3e76ccd1b3a",
            "https://git.kernel.org/stable/c/8c820f7c8e9b46238d277c575392fe9930207aab",
            "https://git.kernel.org/stable/c/9fc74e367be4247a5ac39bb8ec41eaa73fade510",
            "https://git.kernel.org/stable/c/ea8ac95c22c93acecb710209a7fd10b851afe817",
            "https://www.cve.org/CVERecord?id=CVE-2024-36025\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36025\nhttps://lore.kernel.org/linux-cve-announce/2024053034-CVE-2024-36025-95e0@gregkh/T"
        ]
    },
    "CVE-2024-36270": {
        "cve": "CVE-2024-36270",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: tproxy: bail out if IP has been disabled on the device\n\nsyzbot reports:\ngeneral protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]\n[..]\nRIP: 0010:nf_tproxy_laddr4+0xb7/0x340 net/ipv4/netfilter/nf_tproxy_ipv4.c:62\nCall Trace:\n nft_tproxy_eval_v4 net/netfilter/nft_tproxy.c:56 [inline]\n nft_tproxy_eval+0xa9a/0x1a00 net/netfilter/nft_tproxy.c:168\n\n__in_dev_get_rcu() can return NULL, so check for this.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36270",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/07eeedafc59c45fe5de43958128542be3784764c",
            "patch_url": "https://git.kernel.org/stable/p/07eeedafc59c45fe5de43958128542be3784764c",
            "filename": "CVE-2024-36270-07eeedafc59c45fe5de43958128542be3784764c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36270/CVE-2024-36270-07eeedafc59c45fe5de43958128542be3784764c.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/07eeedafc59c45fe5de43958128542be3784764c",
                "patch_url": "https://git.kernel.org/stable/p/07eeedafc59c45fe5de43958128542be3784764c",
                "filename": "CVE-2024-36270-07eeedafc59c45fe5de43958128542be3784764c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36270/CVE-2024-36270-07eeedafc59c45fe5de43958128542be3784764c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/10f0af5234dafd03d2b75233428ec3f11cf7e43d",
                "patch_url": "https://git.kernel.org/stable/p/10f0af5234dafd03d2b75233428ec3f11cf7e43d",
                "filename": "CVE-2024-36270-10f0af5234dafd03d2b75233428ec3f11cf7e43d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36270/CVE-2024-36270-10f0af5234dafd03d2b75233428ec3f11cf7e43d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/21a673bddc8fd4873c370caf9ae70ffc6d47e8d3",
                "patch_url": "https://git.kernel.org/stable/p/21a673bddc8fd4873c370caf9ae70ffc6d47e8d3",
                "filename": "CVE-2024-36270-21a673bddc8fd4873c370caf9ae70ffc6d47e8d3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36270/CVE-2024-36270-21a673bddc8fd4873c370caf9ae70ffc6d47e8d3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/570b4c52096e62fda562448f5760fd0ff06110f0",
                "patch_url": "https://git.kernel.org/stable/p/570b4c52096e62fda562448f5760fd0ff06110f0",
                "filename": "CVE-2024-36270-570b4c52096e62fda562448f5760fd0ff06110f0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36270/CVE-2024-36270-570b4c52096e62fda562448f5760fd0ff06110f0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6fe5af4ff06db3d4d80e07a19356640428159f03",
                "patch_url": "https://git.kernel.org/stable/p/6fe5af4ff06db3d4d80e07a19356640428159f03",
                "filename": "CVE-2024-36270-6fe5af4ff06db3d4d80e07a19356640428159f03.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36270/CVE-2024-36270-6fe5af4ff06db3d4d80e07a19356640428159f03.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/819bfeca16eb9ad647ddcae25e7e12c30612147c",
                "patch_url": "https://git.kernel.org/stable/p/819bfeca16eb9ad647ddcae25e7e12c30612147c",
                "filename": "CVE-2024-36270-819bfeca16eb9ad647ddcae25e7e12c30612147c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36270/CVE-2024-36270-819bfeca16eb9ad647ddcae25e7e12c30612147c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/caf3a8afb5ea00db6d5398adf148d5534615fd80",
                "patch_url": "https://git.kernel.org/stable/p/caf3a8afb5ea00db6d5398adf148d5534615fd80",
                "filename": "CVE-2024-36270-caf3a8afb5ea00db6d5398adf148d5534615fd80.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36270/CVE-2024-36270-caf3a8afb5ea00db6d5398adf148d5534615fd80.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/07eeedafc59c45fe5de43958128542be3784764c",
            "https://git.kernel.org/stable/c/10f0af5234dafd03d2b75233428ec3f11cf7e43d",
            "https://git.kernel.org/stable/c/21a673bddc8fd4873c370caf9ae70ffc6d47e8d3",
            "https://git.kernel.org/stable/c/570b4c52096e62fda562448f5760fd0ff06110f0",
            "https://git.kernel.org/stable/c/6fe5af4ff06db3d4d80e07a19356640428159f03",
            "https://git.kernel.org/stable/c/819bfeca16eb9ad647ddcae25e7e12c30612147c",
            "https://git.kernel.org/stable/c/caf3a8afb5ea00db6d5398adf148d5534615fd80",
            "https://www.cve.org/CVERecord?id=CVE-2024-36270\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36270\nhttps://lore.kernel.org/linux-cve-announce/2024062135-CVE-2024-36270-f7f7@gregkh/T"
        ]
    },
    "CVE-2024-36286": {
        "cve": "CVE-2024-36286",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()\n\nsyzbot reported that nf_reinject() could be called without rcu_read_lock() :\n\nWARNING: suspicious RCU usage\n6.9.0-rc7-syzkaller-02060-g5c1672705a1a #0 Not tainted\n\nnet/netfilter/nfnetlink_queue.c:263 suspicious rcu_dereference_check() usage!\n\nother info that might help us debug this:\n\nrcu_scheduler_active = 2, debug_locks = 1\n2 locks held by syz-executor.4/13427:\n  #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]\n  #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, at: rcu_do_batch kernel/rcu/tree.c:2190 [inline]\n  #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, at: rcu_core+0xa86/0x1830 kernel/rcu/tree.c:2471\n  #1: ffff88801ca92958 (&inst->lock){+.-.}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]\n  #1: ffff88801ca92958 (&inst->lock){+.-.}-{2:2}, at: nfqnl_flush net/netfilter/nfnetlink_queue.c:405 [inline]\n  #1: ffff88801ca92958 (&inst->lock){+.-.}-{2:2}, at: instance_destroy_rcu+0x30/0x220 net/netfilter/nfnetlink_queue.c:172\n\nstack backtrace:\nCPU: 0 PID: 13427 Comm: syz-executor.4 Not tainted 6.9.0-rc7-syzkaller-02060-g5c1672705a1a #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\nCall Trace:\n <IRQ>\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n  lockdep_rcu_suspicious+0x221/0x340 kernel/locking/lockdep.c:6712\n  nf_reinject net/netfilter/nfnetlink_queue.c:323 [inline]\n  nfqnl_reinject+0x6ec/0x1120 net/netfilter/nfnetlink_queue.c:397\n  nfqnl_flush net/netfilter/nfnetlink_queue.c:410 [inline]\n  instance_destroy_rcu+0x1ae/0x220 net/netfilter/nfnetlink_queue.c:172\n  rcu_do_batch kernel/rcu/tree.c:2196 [inline]\n  rcu_core+0xafd/0x1830 kernel/rcu/tree.c:2471\n  handle_softirqs+0x2d6/0x990 kernel/softirq.c:554\n  __do_softirq kernel/softirq.c:588 [inline]\n  invoke_softirq kernel/softirq.c:428 [inline]\n  __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637\n  irq_exit_rcu+0x9/0x30 kernel/softirq.c:649\n  instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline]\n  sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043\n </IRQ>\n <TASK>",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36286",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/8658bd777cbfcb0c13df23d0ea120e70517761b9",
            "patch_url": "https://git.kernel.org/stable/p/8658bd777cbfcb0c13df23d0ea120e70517761b9",
            "filename": "CVE-2024-36286-8658bd777cbfcb0c13df23d0ea120e70517761b9.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36286/CVE-2024-36286-8658bd777cbfcb0c13df23d0ea120e70517761b9.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/215df6490e208bfdd5b3012f5075e7f8736f3e7a",
                "patch_url": "https://git.kernel.org/stable/p/215df6490e208bfdd5b3012f5075e7f8736f3e7a",
                "filename": "CVE-2024-36286-215df6490e208bfdd5b3012f5075e7f8736f3e7a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36286/CVE-2024-36286-215df6490e208bfdd5b3012f5075e7f8736f3e7a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/25ea5377e3d2921a0f96ae2551f5ab1b36825dd4",
                "patch_url": "https://git.kernel.org/stable/p/25ea5377e3d2921a0f96ae2551f5ab1b36825dd4",
                "filename": "CVE-2024-36286-25ea5377e3d2921a0f96ae2551f5ab1b36825dd4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36286/CVE-2024-36286-25ea5377e3d2921a0f96ae2551f5ab1b36825dd4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3989b817857f4890fab9379221a9d3f52bf5c256",
                "patch_url": "https://git.kernel.org/stable/p/3989b817857f4890fab9379221a9d3f52bf5c256",
                "filename": "CVE-2024-36286-3989b817857f4890fab9379221a9d3f52bf5c256.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36286/CVE-2024-36286-3989b817857f4890fab9379221a9d3f52bf5c256.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/68f40354a3851df46c27be96b84f11ae193e36c5",
                "patch_url": "https://git.kernel.org/stable/p/68f40354a3851df46c27be96b84f11ae193e36c5",
                "filename": "CVE-2024-36286-68f40354a3851df46c27be96b84f11ae193e36c5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36286/CVE-2024-36286-68f40354a3851df46c27be96b84f11ae193e36c5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8658bd777cbfcb0c13df23d0ea120e70517761b9",
                "patch_url": "https://git.kernel.org/stable/p/8658bd777cbfcb0c13df23d0ea120e70517761b9",
                "filename": "CVE-2024-36286-8658bd777cbfcb0c13df23d0ea120e70517761b9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36286/CVE-2024-36286-8658bd777cbfcb0c13df23d0ea120e70517761b9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8f365564af898819a523f1a8cf5c6ce053e9f718",
                "patch_url": "https://git.kernel.org/stable/p/8f365564af898819a523f1a8cf5c6ce053e9f718",
                "filename": "CVE-2024-36286-8f365564af898819a523f1a8cf5c6ce053e9f718.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36286/CVE-2024-36286-8f365564af898819a523f1a8cf5c6ce053e9f718.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dc21c6cc3d6986d938efbf95de62473982c98dec",
                "patch_url": "https://git.kernel.org/stable/p/dc21c6cc3d6986d938efbf95de62473982c98dec",
                "filename": "CVE-2024-36286-dc21c6cc3d6986d938efbf95de62473982c98dec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36286/CVE-2024-36286-dc21c6cc3d6986d938efbf95de62473982c98dec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e01065b339e323b3dfa1be217fd89e9b3208b0ab",
                "patch_url": "https://git.kernel.org/stable/p/e01065b339e323b3dfa1be217fd89e9b3208b0ab",
                "filename": "CVE-2024-36286-e01065b339e323b3dfa1be217fd89e9b3208b0ab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36286/CVE-2024-36286-e01065b339e323b3dfa1be217fd89e9b3208b0ab.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/215df6490e208bfdd5b3012f5075e7f8736f3e7a",
            "https://git.kernel.org/stable/c/25ea5377e3d2921a0f96ae2551f5ab1b36825dd4",
            "https://git.kernel.org/stable/c/3989b817857f4890fab9379221a9d3f52bf5c256",
            "https://git.kernel.org/stable/c/68f40354a3851df46c27be96b84f11ae193e36c5",
            "https://git.kernel.org/stable/c/8658bd777cbfcb0c13df23d0ea120e70517761b9",
            "https://git.kernel.org/stable/c/8f365564af898819a523f1a8cf5c6ce053e9f718",
            "https://git.kernel.org/stable/c/dc21c6cc3d6986d938efbf95de62473982c98dec",
            "https://git.kernel.org/stable/c/e01065b339e323b3dfa1be217fd89e9b3208b0ab",
            "https://www.cve.org/CVERecord?id=CVE-2024-36286\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36286\nhttps://lore.kernel.org/linux-cve-announce/2024062135-CVE-2024-36286-ebd5@gregkh/T"
        ]
    },
    "CVE-2024-36489": {
        "cve": "CVE-2024-36489",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: fix missing memory barrier in tls_init\n\nIn tls_init(), a write memory barrier is missing, and store-store\nreordering may cause NULL dereference in tls_{setsockopt,getsockopt}.\n\nCPU0                               CPU1\n-----                              -----\n// In tls_init()\n// In tls_ctx_create()\nctx = kzalloc()\nctx->sk_proto = READ_ONCE(sk->sk_prot) -(1)\n\n// In update_sk_prot()\nWRITE_ONCE(sk->sk_prot, tls_prots)     -(2)\n\n                                   // In sock_common_setsockopt()\n                                   READ_ONCE(sk->sk_prot)->setsockopt()\n\n                                   // In tls_{setsockopt,getsockopt}()\n                                   ctx->sk_proto->setsockopt()    -(3)\n\nIn the above scenario, when (1) and (2) are reordered, (3) can observe\nthe NULL value of ctx->sk_proto, causing NULL dereference.\n\nTo fix it, we rely on rcu_assign_pointer() which implies the release\nbarrier semantic. By moving rcu_assign_pointer() after ctx->sk_proto is\ninitialized, we can ensure that ctx->sk_proto are visible when\nchanging sk->sk_prot.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36489",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/d72e126e9a36d3d33889829df8fc90100bb0e071",
            "patch_url": "https://git.kernel.org/stable/p/d72e126e9a36d3d33889829df8fc90100bb0e071",
            "filename": "CVE-2024-36489-d72e126e9a36d3d33889829df8fc90100bb0e071.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36489/CVE-2024-36489-d72e126e9a36d3d33889829df8fc90100bb0e071.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2c260a24cf1c4d30ea3646124f766ee46169280b",
                "patch_url": "https://git.kernel.org/stable/p/2c260a24cf1c4d30ea3646124f766ee46169280b",
                "filename": "CVE-2024-36489-2c260a24cf1c4d30ea3646124f766ee46169280b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36489/CVE-2024-36489-2c260a24cf1c4d30ea3646124f766ee46169280b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/335c8f1566d8e44c384d16b450a18554896d4e8b",
                "patch_url": "https://git.kernel.org/stable/p/335c8f1566d8e44c384d16b450a18554896d4e8b",
                "filename": "CVE-2024-36489-335c8f1566d8e44c384d16b450a18554896d4e8b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36489/CVE-2024-36489-335c8f1566d8e44c384d16b450a18554896d4e8b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/91e61dd7a0af660408e87372d8330ceb218be302",
                "patch_url": "https://git.kernel.org/stable/p/91e61dd7a0af660408e87372d8330ceb218be302",
                "filename": "CVE-2024-36489-91e61dd7a0af660408e87372d8330ceb218be302.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36489/CVE-2024-36489-91e61dd7a0af660408e87372d8330ceb218be302.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ab67c2fd3d070a21914d0c31319d3858ab4e199c",
                "patch_url": "https://git.kernel.org/stable/p/ab67c2fd3d070a21914d0c31319d3858ab4e199c",
                "filename": "CVE-2024-36489-ab67c2fd3d070a21914d0c31319d3858ab4e199c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36489/CVE-2024-36489-ab67c2fd3d070a21914d0c31319d3858ab4e199c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d72e126e9a36d3d33889829df8fc90100bb0e071",
                "patch_url": "https://git.kernel.org/stable/p/d72e126e9a36d3d33889829df8fc90100bb0e071",
                "filename": "CVE-2024-36489-d72e126e9a36d3d33889829df8fc90100bb0e071.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36489/CVE-2024-36489-d72e126e9a36d3d33889829df8fc90100bb0e071.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ef21007a7b581c7fe64d5a10c320880a033c837b",
                "patch_url": "https://git.kernel.org/stable/p/ef21007a7b581c7fe64d5a10c320880a033c837b",
                "filename": "CVE-2024-36489-ef21007a7b581c7fe64d5a10c320880a033c837b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36489/CVE-2024-36489-ef21007a7b581c7fe64d5a10c320880a033c837b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2c260a24cf1c4d30ea3646124f766ee46169280b",
            "https://git.kernel.org/stable/c/335c8f1566d8e44c384d16b450a18554896d4e8b",
            "https://git.kernel.org/stable/c/91e61dd7a0af660408e87372d8330ceb218be302",
            "https://git.kernel.org/stable/c/ab67c2fd3d070a21914d0c31319d3858ab4e199c",
            "https://git.kernel.org/stable/c/d72e126e9a36d3d33889829df8fc90100bb0e071",
            "https://git.kernel.org/stable/c/ef21007a7b581c7fe64d5a10c320880a033c837b",
            "https://www.cve.org/CVERecord?id=CVE-2024-36489\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36489\nhttps://lore.kernel.org/linux-cve-announce/2024062136-CVE-2024-36489-7213@gregkh/T"
        ]
    },
    "CVE-2024-3661": {
        "cve": "CVE-2024-3661",
        "cvss_v2": null,
        "cvss_v3": 7.6,
        "description": "DHCP can add routes to a client\u2019s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-3661",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-36883": {
        "cve": "CVE-2024-36883",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix out-of-bounds access in ops_init\n\nnet_alloc_generic is called by net_alloc, which is called without any\nlocking. It reads max_gen_ptrs, which is changed under pernet_ops_rwsem. It\nis read twice, first to allocate an array, then to set s.len, which is\nlater used to limit the bounds of the array access.\n\nIt is possible that the array is allocated and another thread is\nregistering a new pernet ops, increments max_gen_ptrs, which is then used\nto set s.len with a larger than allocated length for the variable array.\n\nFix it by reading max_gen_ptrs only once in net_alloc_generic. If\nmax_gen_ptrs is later incremented, it will be caught in net_assign_generic.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36883",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9518b79bfd2fbf99fa9b7e8e36bcb1825e7ba030",
            "patch_url": "https://git.kernel.org/stable/p/9518b79bfd2fbf99fa9b7e8e36bcb1825e7ba030",
            "filename": "CVE-2024-36883-9518b79bfd2fbf99fa9b7e8e36bcb1825e7ba030.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36883/CVE-2024-36883-9518b79bfd2fbf99fa9b7e8e36bcb1825e7ba030.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0c3248bc708a7797be573214065cf908ff1f54c7",
                "patch_url": "https://git.kernel.org/stable/p/0c3248bc708a7797be573214065cf908ff1f54c7",
                "filename": "CVE-2024-36883-0c3248bc708a7797be573214065cf908ff1f54c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36883/CVE-2024-36883-0c3248bc708a7797be573214065cf908ff1f54c7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2d60ff5874aefd006717ca5e22ac1e25eac29c42",
                "patch_url": "https://git.kernel.org/stable/p/2d60ff5874aefd006717ca5e22ac1e25eac29c42",
                "filename": "CVE-2024-36883-2d60ff5874aefd006717ca5e22ac1e25eac29c42.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36883/CVE-2024-36883-2d60ff5874aefd006717ca5e22ac1e25eac29c42.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3cdc34d76c4f777579e28ad373979d36c030cfd3",
                "patch_url": "https://git.kernel.org/stable/p/3cdc34d76c4f777579e28ad373979d36c030cfd3",
                "filename": "CVE-2024-36883-3cdc34d76c4f777579e28ad373979d36c030cfd3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36883/CVE-2024-36883-3cdc34d76c4f777579e28ad373979d36c030cfd3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7b0e64583eab8c1d896b47e5dd0bf2e7d86ec41f",
                "patch_url": "https://git.kernel.org/stable/p/7b0e64583eab8c1d896b47e5dd0bf2e7d86ec41f",
                "filename": "CVE-2024-36883-7b0e64583eab8c1d896b47e5dd0bf2e7d86ec41f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36883/CVE-2024-36883-7b0e64583eab8c1d896b47e5dd0bf2e7d86ec41f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9518b79bfd2fbf99fa9b7e8e36bcb1825e7ba030",
                "patch_url": "https://git.kernel.org/stable/p/9518b79bfd2fbf99fa9b7e8e36bcb1825e7ba030",
                "filename": "CVE-2024-36883-9518b79bfd2fbf99fa9b7e8e36bcb1825e7ba030.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36883/CVE-2024-36883-9518b79bfd2fbf99fa9b7e8e36bcb1825e7ba030.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a26ff37e624d12e28077e5b24d2b264f62764ad6",
                "patch_url": "https://git.kernel.org/stable/p/a26ff37e624d12e28077e5b24d2b264f62764ad6",
                "filename": "CVE-2024-36883-a26ff37e624d12e28077e5b24d2b264f62764ad6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36883/CVE-2024-36883-a26ff37e624d12e28077e5b24d2b264f62764ad6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b6dbfd5bcc267a95a0bf1bf96af46243f96ec6cd",
                "patch_url": "https://git.kernel.org/stable/p/b6dbfd5bcc267a95a0bf1bf96af46243f96ec6cd",
                "filename": "CVE-2024-36883-b6dbfd5bcc267a95a0bf1bf96af46243f96ec6cd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36883/CVE-2024-36883-b6dbfd5bcc267a95a0bf1bf96af46243f96ec6cd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f4f94587e1bf87cb40ec33955a9d90148dd026ab",
                "patch_url": "https://git.kernel.org/stable/p/f4f94587e1bf87cb40ec33955a9d90148dd026ab",
                "filename": "CVE-2024-36883-f4f94587e1bf87cb40ec33955a9d90148dd026ab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36883/CVE-2024-36883-f4f94587e1bf87cb40ec33955a9d90148dd026ab.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0c3248bc708a7797be573214065cf908ff1f54c7",
            "https://git.kernel.org/stable/c/2d60ff5874aefd006717ca5e22ac1e25eac29c42",
            "https://git.kernel.org/stable/c/3cdc34d76c4f777579e28ad373979d36c030cfd3",
            "https://git.kernel.org/stable/c/7b0e64583eab8c1d896b47e5dd0bf2e7d86ec41f",
            "https://git.kernel.org/stable/c/9518b79bfd2fbf99fa9b7e8e36bcb1825e7ba030",
            "https://git.kernel.org/stable/c/a26ff37e624d12e28077e5b24d2b264f62764ad6",
            "https://git.kernel.org/stable/c/b6dbfd5bcc267a95a0bf1bf96af46243f96ec6cd",
            "https://git.kernel.org/stable/c/f4f94587e1bf87cb40ec33955a9d90148dd026ab",
            "https://www.cve.org/CVERecord?id=CVE-2024-36883\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36883\nhttps://lore.kernel.org/linux-cve-announce/2024053032-CVE-2024-36883-b892@gregkh/T"
        ]
    },
    "CVE-2024-36886": {
        "cve": "CVE-2024-36886",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix UAF in error path\n\nSam Page (sam4k) working with Trend Micro Zero Day Initiative reported\na UAF in the tipc_buf_append() error path:\n\nBUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c0\nlinux/net/core/skbuff.c:1183\nRead of size 8 at addr ffff88804d2a7c80 by task poc/8034\n\nCPU: 1 PID: 8034 Comm: poc Not tainted 6.8.2 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.0-debian-1.16.0-5 04/01/2014\nCall Trace:\n <IRQ>\n __dump_stack linux/lib/dump_stack.c:88\n dump_stack_lvl+0xd9/0x1b0 linux/lib/dump_stack.c:106\n print_address_description linux/mm/kasan/report.c:377\n print_report+0xc4/0x620 linux/mm/kasan/report.c:488\n kasan_report+0xda/0x110 linux/mm/kasan/report.c:601\n kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183\n skb_release_data+0x5af/0x880 linux/net/core/skbuff.c:1026\n skb_release_all linux/net/core/skbuff.c:1094\n __kfree_skb linux/net/core/skbuff.c:1108\n kfree_skb_reason+0x12d/0x210 linux/net/core/skbuff.c:1144\n kfree_skb linux/./include/linux/skbuff.h:1244\n tipc_buf_append+0x425/0xb50 linux/net/tipc/msg.c:186\n tipc_link_input+0x224/0x7c0 linux/net/tipc/link.c:1324\n tipc_link_rcv+0x76e/0x2d70 linux/net/tipc/link.c:1824\n tipc_rcv+0x45f/0x10f0 linux/net/tipc/node.c:2159\n tipc_udp_recv+0x73b/0x8f0 linux/net/tipc/udp_media.c:390\n udp_queue_rcv_one_skb+0xad2/0x1850 linux/net/ipv4/udp.c:2108\n udp_queue_rcv_skb+0x131/0xb00 linux/net/ipv4/udp.c:2186\n udp_unicast_rcv_skb+0x165/0x3b0 linux/net/ipv4/udp.c:2346\n __udp4_lib_rcv+0x2594/0x3400 linux/net/ipv4/udp.c:2422\n ip_protocol_deliver_rcu+0x30c/0x4e0 linux/net/ipv4/ip_input.c:205\n ip_local_deliver_finish+0x2e4/0x520 linux/net/ipv4/ip_input.c:233\n NF_HOOK linux/./include/linux/netfilter.h:314\n NF_HOOK linux/./include/linux/netfilter.h:308\n ip_local_deliver+0x18e/0x1f0 linux/net/ipv4/ip_input.c:254\n dst_input linux/./include/net/dst.h:461\n ip_rcv_finish linux/net/ipv4/ip_input.c:449\n NF_HOOK linux/./include/linux/netfilter.h:314\n NF_HOOK linux/./include/linux/netfilter.h:308\n ip_rcv+0x2c5/0x5d0 linux/net/ipv4/ip_input.c:569\n __netif_receive_skb_one_core+0x199/0x1e0 linux/net/core/dev.c:5534\n __netif_receive_skb+0x1f/0x1c0 linux/net/core/dev.c:5648\n process_backlog+0x101/0x6b0 linux/net/core/dev.c:5976\n __napi_poll.constprop.0+0xba/0x550 linux/net/core/dev.c:6576\n napi_poll linux/net/core/dev.c:6645\n net_rx_action+0x95a/0xe90 linux/net/core/dev.c:6781\n __do_softirq+0x21f/0x8e7 linux/kernel/softirq.c:553\n do_softirq linux/kernel/softirq.c:454\n do_softirq+0xb2/0xf0 linux/kernel/softirq.c:441\n </IRQ>\n <TASK>\n __local_bh_enable_ip+0x100/0x120 linux/kernel/softirq.c:381\n local_bh_enable linux/./include/linux/bottom_half.h:33\n rcu_read_unlock_bh linux/./include/linux/rcupdate.h:851\n __dev_queue_xmit+0x871/0x3ee0 linux/net/core/dev.c:4378\n dev_queue_xmit linux/./include/linux/netdevice.h:3169\n neigh_hh_output linux/./include/net/neighbour.h:526\n neigh_output linux/./include/net/neighbour.h:540\n ip_finish_output2+0x169f/0x2550 linux/net/ipv4/ip_output.c:235\n __ip_finish_output linux/net/ipv4/ip_output.c:313\n __ip_finish_output+0x49e/0x950 linux/net/ipv4/ip_output.c:295\n ip_finish_output+0x31/0x310 linux/net/ipv4/ip_output.c:323\n NF_HOOK_COND linux/./include/linux/netfilter.h:303\n ip_output+0x13b/0x2a0 linux/net/ipv4/ip_output.c:433\n dst_output linux/./include/net/dst.h:451\n ip_local_out linux/net/ipv4/ip_output.c:129\n ip_send_skb+0x3e5/0x560 linux/net/ipv4/ip_output.c:1492\n udp_send_skb+0x73f/0x1530 linux/net/ipv4/udp.c:963\n udp_sendmsg+0x1a36/0x2b40 linux/net/ipv4/udp.c:1250\n inet_sendmsg+0x105/0x140 linux/net/ipv4/af_inet.c:850\n sock_sendmsg_nosec linux/net/socket.c:730\n __sock_sendmsg linux/net/socket.c:745\n __sys_sendto+0x42c/0x4e0 linux/net/socket.c:2191\n __do_sys_sendto linux/net/socket.c:2203\n __se_sys_sendto linux/net/socket.c:2199\n __x64_sys_sendto+0xe0/0x1c0 linux/net/socket.c:2199\n do_syscall_x64 linux/arch/x86/entry/common.c:52\n do_syscall_\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36886",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/367766ff9e407f8a68409b7ce4dc4d5a72afeab1",
            "patch_url": "https://git.kernel.org/stable/p/367766ff9e407f8a68409b7ce4dc4d5a72afeab1",
            "filename": "CVE-2024-36886-367766ff9e407f8a68409b7ce4dc4d5a72afeab1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36886/CVE-2024-36886-367766ff9e407f8a68409b7ce4dc4d5a72afeab1.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/080cbb890286cd794f1ee788bbc5463e2deb7c2b",
                "patch_url": "https://git.kernel.org/stable/p/080cbb890286cd794f1ee788bbc5463e2deb7c2b",
                "filename": "CVE-2024-36886-080cbb890286cd794f1ee788bbc5463e2deb7c2b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36886/CVE-2024-36886-080cbb890286cd794f1ee788bbc5463e2deb7c2b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/21ea04aad8a0839b4ec27ef1691ca480620e8e14",
                "patch_url": "https://git.kernel.org/stable/p/21ea04aad8a0839b4ec27ef1691ca480620e8e14",
                "filename": "CVE-2024-36886-21ea04aad8a0839b4ec27ef1691ca480620e8e14.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36886/CVE-2024-36886-21ea04aad8a0839b4ec27ef1691ca480620e8e14.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/367766ff9e407f8a68409b7ce4dc4d5a72afeab1",
                "patch_url": "https://git.kernel.org/stable/p/367766ff9e407f8a68409b7ce4dc4d5a72afeab1",
                "filename": "CVE-2024-36886-367766ff9e407f8a68409b7ce4dc4d5a72afeab1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36886/CVE-2024-36886-367766ff9e407f8a68409b7ce4dc4d5a72afeab1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/66116556076f0b96bc1aa9844008c743c8c67684",
                "patch_url": "https://git.kernel.org/stable/p/66116556076f0b96bc1aa9844008c743c8c67684",
                "filename": "CVE-2024-36886-66116556076f0b96bc1aa9844008c743c8c67684.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36886/CVE-2024-36886-66116556076f0b96bc1aa9844008c743c8c67684.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/93bc2d6d16f2c3178736ba6b845b30475856dc40",
                "patch_url": "https://git.kernel.org/stable/p/93bc2d6d16f2c3178736ba6b845b30475856dc40",
                "filename": "CVE-2024-36886-93bc2d6d16f2c3178736ba6b845b30475856dc40.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36886/CVE-2024-36886-93bc2d6d16f2c3178736ba6b845b30475856dc40.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a0fbb26f8247e326a320e2cb4395bfb234332c90",
                "patch_url": "https://git.kernel.org/stable/p/a0fbb26f8247e326a320e2cb4395bfb234332c90",
                "filename": "CVE-2024-36886-a0fbb26f8247e326a320e2cb4395bfb234332c90.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36886/CVE-2024-36886-a0fbb26f8247e326a320e2cb4395bfb234332c90.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e19ec8ab0e25bc4803d7cc91c84e84532e2781bd",
                "patch_url": "https://git.kernel.org/stable/p/e19ec8ab0e25bc4803d7cc91c84e84532e2781bd",
                "filename": "CVE-2024-36886-e19ec8ab0e25bc4803d7cc91c84e84532e2781bd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36886/CVE-2024-36886-e19ec8ab0e25bc4803d7cc91c84e84532e2781bd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ffd4917c1edb3c3ff334fce3704fbe9c39f35682",
                "patch_url": "https://git.kernel.org/stable/p/ffd4917c1edb3c3ff334fce3704fbe9c39f35682",
                "filename": "CVE-2024-36886-ffd4917c1edb3c3ff334fce3704fbe9c39f35682.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36886/CVE-2024-36886-ffd4917c1edb3c3ff334fce3704fbe9c39f35682.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/080cbb890286cd794f1ee788bbc5463e2deb7c2b",
            "https://git.kernel.org/stable/c/21ea04aad8a0839b4ec27ef1691ca480620e8e14",
            "https://git.kernel.org/stable/c/367766ff9e407f8a68409b7ce4dc4d5a72afeab1",
            "https://git.kernel.org/stable/c/66116556076f0b96bc1aa9844008c743c8c67684",
            "https://git.kernel.org/stable/c/93bc2d6d16f2c3178736ba6b845b30475856dc40",
            "https://git.kernel.org/stable/c/a0fbb26f8247e326a320e2cb4395bfb234332c90",
            "https://git.kernel.org/stable/c/e19ec8ab0e25bc4803d7cc91c84e84532e2781bd",
            "https://git.kernel.org/stable/c/ffd4917c1edb3c3ff334fce3704fbe9c39f35682",
            "https://www.cve.org/CVERecord?id=CVE-2024-36886\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36886\nhttps://lore.kernel.org/all/752f1ccf762223d109845365d07f55414058e5a3.1714484273.git.pabeni@redhat.com/\nhttps://lore.kernel.org/linux-cve-announce/2024053033-CVE-2024-36886-dd83@gregkh/T/#u"
        ]
    },
    "CVE-2024-36889": {
        "cve": "CVE-2024-36889",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: ensure snd_nxt is properly initialized on connect\n\nChristoph reported a splat hinting at a corrupted snd_una:\n\n  WARNING: CPU: 1 PID: 38 at net/mptcp/protocol.c:1005 __mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005\n  Modules linked in:\n  CPU: 1 PID: 38 Comm: kworker/1:1 Not tainted 6.9.0-rc1-gbbeac67456c9 #59\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014\n  Workqueue: events mptcp_worker\n  RIP: 0010:__mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005\n  Code: be 06 01 00 00 bf 06 01 00 00 e8 a8 12 e7 fe e9 00 fe ff ff e8\n  \t8e 1a e7 fe 0f b7 ab 3e 02 00 00 e9 d3 fd ff ff e8 7d 1a e7 fe\n  \t<0f> 0b 4c 8b bb e0 05 00 00 e9 74 fc ff ff e8 6a 1a e7 fe 0f 0b e9\n  RSP: 0018:ffffc9000013fd48 EFLAGS: 00010293\n  RAX: 0000000000000000 RBX: ffff8881029bd280 RCX: ffffffff82382fe4\n  RDX: ffff8881003cbd00 RSI: ffffffff823833c3 RDI: 0000000000000001\n  RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000\n  R10: 0000000000000000 R11: fefefefefefefeff R12: ffff888138ba8000\n  R13: 0000000000000106 R14: ffff8881029bd908 R15: ffff888126560000\n  FS:  0000000000000000(0000) GS:ffff88813bd00000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f604a5dae38 CR3: 0000000101dac002 CR4: 0000000000170ef0\n  Call Trace:\n   <TASK>\n   __mptcp_clean_una_wakeup net/mptcp/protocol.c:1055 [inline]\n   mptcp_clean_una_wakeup net/mptcp/protocol.c:1062 [inline]\n   __mptcp_retrans+0x7f/0x7e0 net/mptcp/protocol.c:2615\n   mptcp_worker+0x434/0x740 net/mptcp/protocol.c:2767\n   process_one_work+0x1e0/0x560 kernel/workqueue.c:3254\n   process_scheduled_works kernel/workqueue.c:3335 [inline]\n   worker_thread+0x3c7/0x640 kernel/workqueue.c:3416\n   kthread+0x121/0x170 kernel/kthread.c:388\n   ret_from_fork+0x44/0x50 arch/x86/kernel/process.c:147\n   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243\n   </TASK>\n\nWhen fallback to TCP happens early on a client socket, snd_nxt\nis not yet initialized and any incoming ack will copy such value\ninto snd_una. If the mptcp worker (dumbly) tries mptcp-level\nre-injection after such ack, that would unconditionally trigger a send\nbuffer cleanup using 'bad' snd_una values.\n\nWe could easily disable re-injection for fallback sockets, but such\ndumb behavior already helped catching a few subtle issues and a very\nlow to zero impact in practice.\n\nInstead address the issue always initializing snd_nxt (and write_seq,\nfor consistency) at connect time.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36889",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/dc941fec0719d0471a5902424d6b2a17df233193",
            "patch_url": "https://git.kernel.org/stable/p/dc941fec0719d0471a5902424d6b2a17df233193",
            "filename": "CVE-2024-36889-dc941fec0719d0471a5902424d6b2a17df233193.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36889/CVE-2024-36889-dc941fec0719d0471a5902424d6b2a17df233193.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/39ca83ed73db9edcc6d70c0dc7a73085a4725012",
                "patch_url": "https://git.kernel.org/stable/p/39ca83ed73db9edcc6d70c0dc7a73085a4725012",
                "filename": "CVE-2024-36889-39ca83ed73db9edcc6d70c0dc7a73085a4725012.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36889/CVE-2024-36889-39ca83ed73db9edcc6d70c0dc7a73085a4725012.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/592f69b41766d366dbb8ff4ef5a67c4396527bbe",
                "patch_url": "https://git.kernel.org/stable/p/592f69b41766d366dbb8ff4ef5a67c4396527bbe",
                "filename": "CVE-2024-36889-592f69b41766d366dbb8ff4ef5a67c4396527bbe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36889/CVE-2024-36889-592f69b41766d366dbb8ff4ef5a67c4396527bbe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/99951b62bf20cec9247f633a3bea898338b9e5b4",
                "patch_url": "https://git.kernel.org/stable/p/99951b62bf20cec9247f633a3bea898338b9e5b4",
                "filename": "CVE-2024-36889-99951b62bf20cec9247f633a3bea898338b9e5b4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36889/CVE-2024-36889-99951b62bf20cec9247f633a3bea898338b9e5b4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aa0c07c1f20e05b30019bff083ec43665536f06f",
                "patch_url": "https://git.kernel.org/stable/p/aa0c07c1f20e05b30019bff083ec43665536f06f",
                "filename": "CVE-2024-36889-aa0c07c1f20e05b30019bff083ec43665536f06f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36889/CVE-2024-36889-aa0c07c1f20e05b30019bff083ec43665536f06f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dc941fec0719d0471a5902424d6b2a17df233193",
                "patch_url": "https://git.kernel.org/stable/p/dc941fec0719d0471a5902424d6b2a17df233193",
                "filename": "CVE-2024-36889-dc941fec0719d0471a5902424d6b2a17df233193.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36889/CVE-2024-36889-dc941fec0719d0471a5902424d6b2a17df233193.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fb7a0d334894206ae35f023a82cad5a290fd7386",
                "patch_url": "https://git.kernel.org/stable/p/fb7a0d334894206ae35f023a82cad5a290fd7386",
                "filename": "CVE-2024-36889-fb7a0d334894206ae35f023a82cad5a290fd7386.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36889/CVE-2024-36889-fb7a0d334894206ae35f023a82cad5a290fd7386.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/39ca83ed73db9edcc6d70c0dc7a73085a4725012",
            "https://git.kernel.org/stable/c/592f69b41766d366dbb8ff4ef5a67c4396527bbe",
            "https://git.kernel.org/stable/c/99951b62bf20cec9247f633a3bea898338b9e5b4",
            "https://git.kernel.org/stable/c/aa0c07c1f20e05b30019bff083ec43665536f06f",
            "https://git.kernel.org/stable/c/dc941fec0719d0471a5902424d6b2a17df233193",
            "https://git.kernel.org/stable/c/fb7a0d334894206ae35f023a82cad5a290fd7386",
            "https://www.cve.org/CVERecord?id=CVE-2024-36889\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36889\nhttps://lore.kernel.org/linux-cve-announce/2024053033-CVE-2024-36889-222d@gregkh/T"
        ]
    },
    "CVE-2024-36896": {
        "cve": "CVE-2024-36896",
        "cvss_v2": null,
        "cvss_v3": 9.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix access violation during port device removal\n\nTesting with KASAN and syzkaller revealed a bug in port.c:disable_store():\nusb_hub_to_struct_hub() can return NULL if the hub that the port belongs to\nis concurrently removed, but the function does not check for this\npossibility before dereferencing the returned value.\n\nIt turns out that the first dereference is unnecessary, since hub->intfdev\nis the parent of the port device, so it can be changed easily.  Adding a\ncheck for hub == NULL prevents further problems.\n\nThe same bug exists in the disable_show() routine, and it can be fixed the\nsame way.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36896",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/5f1d68ef5ddac27c6b997adccd1c339cef1e6848",
            "patch_url": "https://git.kernel.org/stable/p/5f1d68ef5ddac27c6b997adccd1c339cef1e6848",
            "filename": "CVE-2024-36896-5f1d68ef5ddac27c6b997adccd1c339cef1e6848.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36896/CVE-2024-36896-5f1d68ef5ddac27c6b997adccd1c339cef1e6848.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/5f1d68ef5ddac27c6b997adccd1c339cef1e6848",
                "patch_url": "https://git.kernel.org/stable/p/5f1d68ef5ddac27c6b997adccd1c339cef1e6848",
                "filename": "CVE-2024-36896-5f1d68ef5ddac27c6b997adccd1c339cef1e6848.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36896/CVE-2024-36896-5f1d68ef5ddac27c6b997adccd1c339cef1e6848.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6119ef6517ce501fc548154691abdaf1f954a277",
                "patch_url": "https://git.kernel.org/stable/p/6119ef6517ce501fc548154691abdaf1f954a277",
                "filename": "CVE-2024-36896-6119ef6517ce501fc548154691abdaf1f954a277.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36896/CVE-2024-36896-6119ef6517ce501fc548154691abdaf1f954a277.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/63533549ff53d24daf47c443dbd43c308afc3434",
                "patch_url": "https://git.kernel.org/stable/p/63533549ff53d24daf47c443dbd43c308afc3434",
                "filename": "CVE-2024-36896-63533549ff53d24daf47c443dbd43c308afc3434.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36896/CVE-2024-36896-63533549ff53d24daf47c443dbd43c308afc3434.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a4b46d450c49f32e9d4247b421e58083fde304ce",
                "patch_url": "https://git.kernel.org/stable/p/a4b46d450c49f32e9d4247b421e58083fde304ce",
                "filename": "CVE-2024-36896-a4b46d450c49f32e9d4247b421e58083fde304ce.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36896/CVE-2024-36896-a4b46d450c49f32e9d4247b421e58083fde304ce.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/5f1d68ef5ddac27c6b997adccd1c339cef1e6848",
            "https://git.kernel.org/stable/c/6119ef6517ce501fc548154691abdaf1f954a277",
            "https://git.kernel.org/stable/c/63533549ff53d24daf47c443dbd43c308afc3434",
            "https://git.kernel.org/stable/c/a4b46d450c49f32e9d4247b421e58083fde304ce",
            "https://www.cve.org/CVERecord?id=CVE-2024-36896\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36896\nhttps://lore.kernel.org/linux-cve-announce/2024053034-CVE-2024-36896-783f@gregkh/T"
        ]
    },
    "CVE-2024-36901": {
        "cve": "CVE-2024-36901",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent NULL dereference in ip6_output()\n\nAccording to syzbot, there is a chance that ip6_dst_idev()\nreturns NULL in ip6_output(). Most places in IPv6 stack\ndeal with a NULL idev just fine, but not here.\n\nsyzbot reported:\n\ngeneral protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]\nCPU: 0 PID: 9775 Comm: syz-executor.4 Not tainted 6.9.0-rc5-syzkaller-00157-g6a30653b604a #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:ip6_output+0x231/0x3f0 net/ipv6/ip6_output.c:237\nCode: 3c 1e 00 49 89 df 74 08 4c 89 ef e8 19 58 db f7 48 8b 44 24 20 49 89 45 00 49 89 c5 48 8d 9d e0 05 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 4c 8b 74 24 28 0f 85 61 01 00 00 8b 1b 31 ff\nRSP: 0018:ffffc9000927f0d8 EFLAGS: 00010202\nRAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000040000\nRDX: ffffc900131f9000 RSI: 0000000000004f47 RDI: 0000000000004f48\nRBP: 0000000000000000 R08: ffffffff8a1f0b9a R09: 1ffffffff1f51fad\nR10: dffffc0000000000 R11: fffffbfff1f51fae R12: ffff8880293ec8c0\nR13: ffff88805d7fc000 R14: 1ffff1100527d91a R15: dffffc0000000000\nFS:  00007f135c6856c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000080 CR3: 0000000064096000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n  NF_HOOK include/linux/netfilter.h:314 [inline]\n  ip6_xmit+0xefe/0x17f0 net/ipv6/ip6_output.c:358\n  sctp_v6_xmit+0x9f2/0x13f0 net/sctp/ipv6.c:248\n  sctp_packet_transmit+0x26ad/0x2ca0 net/sctp/output.c:653\n  sctp_packet_singleton+0x22c/0x320 net/sctp/outqueue.c:783\n  sctp_outq_flush_ctrl net/sctp/outqueue.c:914 [inline]\n  sctp_outq_flush+0x6d5/0x3e20 net/sctp/outqueue.c:1212\n  sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]\n  sctp_do_sm+0x59cc/0x60c0 net/sctp/sm_sideeffect.c:1169\n  sctp_primitive_ASSOCIATE+0x95/0xc0 net/sctp/primitive.c:73\n  __sctp_connect+0x9cd/0xe30 net/sctp/socket.c:1234\n  sctp_connect net/sctp/socket.c:4819 [inline]\n  sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n  __sys_connect_file net/socket.c:2048 [inline]\n  __sys_connect+0x2df/0x310 net/socket.c:2065\n  __do_sys_connect net/socket.c:2075 [inline]\n  __se_sys_connect net/socket.c:2072 [inline]\n  __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36901",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2272e2db38f2e85929278146d7c770f22f528579",
            "patch_url": "https://git.kernel.org/stable/p/2272e2db38f2e85929278146d7c770f22f528579",
            "filename": "CVE-2024-36901-2272e2db38f2e85929278146d7c770f22f528579.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36901/CVE-2024-36901-2272e2db38f2e85929278146d7c770f22f528579.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2272e2db38f2e85929278146d7c770f22f528579",
                "patch_url": "https://git.kernel.org/stable/p/2272e2db38f2e85929278146d7c770f22f528579",
                "filename": "CVE-2024-36901-2272e2db38f2e85929278146d7c770f22f528579.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36901/CVE-2024-36901-2272e2db38f2e85929278146d7c770f22f528579.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4db783d68b9b39a411a96096c10828ff5dfada7a",
                "patch_url": "https://git.kernel.org/stable/p/4db783d68b9b39a411a96096c10828ff5dfada7a",
                "filename": "CVE-2024-36901-4db783d68b9b39a411a96096c10828ff5dfada7a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36901/CVE-2024-36901-4db783d68b9b39a411a96096c10828ff5dfada7a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/55f7eb4001ef2a3b48cf039cf263f9ed0ec5a488",
                "patch_url": "https://git.kernel.org/stable/p/55f7eb4001ef2a3b48cf039cf263f9ed0ec5a488",
                "filename": "CVE-2024-36901-55f7eb4001ef2a3b48cf039cf263f9ed0ec5a488.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36901/CVE-2024-36901-55f7eb4001ef2a3b48cf039cf263f9ed0ec5a488.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9df3b2474a627994433a87cbf325a562555b17de",
                "patch_url": "https://git.kernel.org/stable/p/9df3b2474a627994433a87cbf325a562555b17de",
                "filename": "CVE-2024-36901-9df3b2474a627994433a87cbf325a562555b17de.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36901/CVE-2024-36901-9df3b2474a627994433a87cbf325a562555b17de.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e31b25cc2066d3f2b6c38579253882008d4469b0",
                "patch_url": "https://git.kernel.org/stable/p/e31b25cc2066d3f2b6c38579253882008d4469b0",
                "filename": "CVE-2024-36901-e31b25cc2066d3f2b6c38579253882008d4469b0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36901/CVE-2024-36901-e31b25cc2066d3f2b6c38579253882008d4469b0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ea0cb87402f774b0e1214ffba0f57028b27cf155",
                "patch_url": "https://git.kernel.org/stable/p/ea0cb87402f774b0e1214ffba0f57028b27cf155",
                "filename": "CVE-2024-36901-ea0cb87402f774b0e1214ffba0f57028b27cf155.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36901/CVE-2024-36901-ea0cb87402f774b0e1214ffba0f57028b27cf155.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2272e2db38f2e85929278146d7c770f22f528579",
            "https://git.kernel.org/stable/c/4db783d68b9b39a411a96096c10828ff5dfada7a",
            "https://git.kernel.org/stable/c/55f7eb4001ef2a3b48cf039cf263f9ed0ec5a488",
            "https://git.kernel.org/stable/c/9df3b2474a627994433a87cbf325a562555b17de",
            "https://git.kernel.org/stable/c/e31b25cc2066d3f2b6c38579253882008d4469b0",
            "https://git.kernel.org/stable/c/ea0cb87402f774b0e1214ffba0f57028b27cf155",
            "https://www.cve.org/CVERecord?id=CVE-2024-36901\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36901\nhttps://lore.kernel.org/linux-cve-announce/2024053035-CVE-2024-36901-fb16@gregkh/T"
        ]
    },
    "CVE-2024-36902": {
        "cve": "CVE-2024-36902",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()\n\nsyzbot is able to trigger the following crash [1],\ncaused by unsafe ip6_dst_idev() use.\n\nIndeed ip6_dst_idev() can return NULL, and must always be checked.\n\n[1]\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 0 PID: 31648 Comm: syz-executor.0 Not tainted 6.9.0-rc4-next-20240417-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:__fib6_rule_action net/ipv6/fib6_rules.c:237 [inline]\n RIP: 0010:fib6_rule_action+0x241/0x7b0 net/ipv6/fib6_rules.c:267\nCode: 02 00 00 49 8d 9f d8 00 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 f9 32 bf f7 48 8b 1b 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 e0 32 bf f7 4c 8b 03 48 89 ef 4c\nRSP: 0018:ffffc9000fc1f2f0 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: 1a772f98c8186700\nRDX: 0000000000000003 RSI: ffffffff8bcac4e0 RDI: ffffffff8c1f9760\nRBP: ffff8880673fb980 R08: ffffffff8fac15ef R09: 1ffffffff1f582bd\nR10: dffffc0000000000 R11: fffffbfff1f582be R12: dffffc0000000000\nR13: 0000000000000080 R14: ffff888076509000 R15: ffff88807a029a00\nFS:  00007f55e82ca6c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b31d23000 CR3: 0000000022b66000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n  fib_rules_lookup+0x62c/0xdb0 net/core/fib_rules.c:317\n  fib6_rule_lookup+0x1fd/0x790 net/ipv6/fib6_rules.c:108\n  ip6_route_output_flags_noref net/ipv6/route.c:2637 [inline]\n  ip6_route_output_flags+0x38e/0x610 net/ipv6/route.c:2649\n  ip6_route_output include/net/ip6_route.h:93 [inline]\n  ip6_dst_lookup_tail+0x189/0x11a0 net/ipv6/ip6_output.c:1120\n  ip6_dst_lookup_flow+0xb9/0x180 net/ipv6/ip6_output.c:1250\n  sctp_v6_get_dst+0x792/0x1e20 net/sctp/ipv6.c:326\n  sctp_transport_route+0x12c/0x2e0 net/sctp/transport.c:455\n  sctp_assoc_add_peer+0x614/0x15c0 net/sctp/associola.c:662\n  sctp_connect_new_asoc+0x31d/0x6c0 net/sctp/socket.c:1099\n  __sctp_connect+0x66d/0xe30 net/sctp/socket.c:1197\n  sctp_connect net/sctp/socket.c:4819 [inline]\n  sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834\n  __sys_connect_file net/socket.c:2048 [inline]\n  __sys_connect+0x2df/0x310 net/socket.c:2065\n  __do_sys_connect net/socket.c:2075 [inline]\n  __se_sys_connect net/socket.c:2072 [inline]\n  __x64_sys_connect+0x7a/0x90 net/socket.c:2072\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36902",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4a5a573387da6a6b23a4cc62147453ff1bc32afa",
            "patch_url": "https://git.kernel.org/stable/p/4a5a573387da6a6b23a4cc62147453ff1bc32afa",
            "filename": "CVE-2024-36902-4a5a573387da6a6b23a4cc62147453ff1bc32afa.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36902/CVE-2024-36902-4a5a573387da6a6b23a4cc62147453ff1bc32afa.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1876881c9a49613b5249fb400cbf53412d90cb09",
                "patch_url": "https://git.kernel.org/stable/p/1876881c9a49613b5249fb400cbf53412d90cb09",
                "filename": "CVE-2024-36902-1876881c9a49613b5249fb400cbf53412d90cb09.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36902/CVE-2024-36902-1876881c9a49613b5249fb400cbf53412d90cb09.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/35297fc68de36826087e976f86a5b1f94fd0bf95",
                "patch_url": "https://git.kernel.org/stable/p/35297fc68de36826087e976f86a5b1f94fd0bf95",
                "filename": "CVE-2024-36902-35297fc68de36826087e976f86a5b1f94fd0bf95.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36902/CVE-2024-36902-35297fc68de36826087e976f86a5b1f94fd0bf95.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4a5a573387da6a6b23a4cc62147453ff1bc32afa",
                "patch_url": "https://git.kernel.org/stable/p/4a5a573387da6a6b23a4cc62147453ff1bc32afa",
                "filename": "CVE-2024-36902-4a5a573387da6a6b23a4cc62147453ff1bc32afa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36902/CVE-2024-36902-4a5a573387da6a6b23a4cc62147453ff1bc32afa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/674c951ab8a23f7aff9b4c3f2f865901bc76a290",
                "patch_url": "https://git.kernel.org/stable/p/674c951ab8a23f7aff9b4c3f2f865901bc76a290",
                "filename": "CVE-2024-36902-674c951ab8a23f7aff9b4c3f2f865901bc76a290.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36902/CVE-2024-36902-674c951ab8a23f7aff9b4c3f2f865901bc76a290.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7e3242c139c38e60844638e394c2877b16b396b0",
                "patch_url": "https://git.kernel.org/stable/p/7e3242c139c38e60844638e394c2877b16b396b0",
                "filename": "CVE-2024-36902-7e3242c139c38e60844638e394c2877b16b396b0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36902/CVE-2024-36902-7e3242c139c38e60844638e394c2877b16b396b0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8745a8d74ba17dafe72b6ab461fa6c007d879747",
                "patch_url": "https://git.kernel.org/stable/p/8745a8d74ba17dafe72b6ab461fa6c007d879747",
                "filename": "CVE-2024-36902-8745a8d74ba17dafe72b6ab461fa6c007d879747.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36902/CVE-2024-36902-8745a8d74ba17dafe72b6ab461fa6c007d879747.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d101291b2681e5ab938554e3e323f7a7ee33e3aa",
                "patch_url": "https://git.kernel.org/stable/p/d101291b2681e5ab938554e3e323f7a7ee33e3aa",
                "filename": "CVE-2024-36902-d101291b2681e5ab938554e3e323f7a7ee33e3aa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36902/CVE-2024-36902-d101291b2681e5ab938554e3e323f7a7ee33e3aa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ddec23f206a944c73bcc2724358b85388837daff",
                "patch_url": "https://git.kernel.org/stable/p/ddec23f206a944c73bcc2724358b85388837daff",
                "filename": "CVE-2024-36902-ddec23f206a944c73bcc2724358b85388837daff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36902/CVE-2024-36902-ddec23f206a944c73bcc2724358b85388837daff.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1876881c9a49613b5249fb400cbf53412d90cb09",
            "https://git.kernel.org/stable/c/35297fc68de36826087e976f86a5b1f94fd0bf95",
            "https://git.kernel.org/stable/c/4a5a573387da6a6b23a4cc62147453ff1bc32afa",
            "https://git.kernel.org/stable/c/674c951ab8a23f7aff9b4c3f2f865901bc76a290",
            "https://git.kernel.org/stable/c/7e3242c139c38e60844638e394c2877b16b396b0",
            "https://git.kernel.org/stable/c/8745a8d74ba17dafe72b6ab461fa6c007d879747",
            "https://git.kernel.org/stable/c/d101291b2681e5ab938554e3e323f7a7ee33e3aa",
            "https://git.kernel.org/stable/c/ddec23f206a944c73bcc2724358b85388837daff"
        ]
    },
    "CVE-2024-36904": {
        "cve": "CVE-2024-36904",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Use refcount_inc_not_zero() in tcp_twsk_unique().\n\nAnderson Nascimento reported a use-after-free splat in tcp_twsk_unique()\nwith nice analysis.\n\nSince commit ec94c2696f0b (\"tcp/dccp: avoid one atomic operation for\ntimewait hashdance\"), inet_twsk_hashdance() sets TIME-WAIT socket's\nsk_refcnt after putting it into ehash and releasing the bucket lock.\n\nThus, there is a small race window where other threads could try to\nreuse the port during connect() and call sock_hold() in tcp_twsk_unique()\nfor the TIME-WAIT socket with zero refcnt.\n\nIf that happens, the refcnt taken by tcp_twsk_unique() is overwritten\nand sock_put() will cause underflow, triggering a real use-after-free\nsomewhere else.\n\nTo avoid the use-after-free, we need to use refcount_inc_not_zero() in\ntcp_twsk_unique() and give up on reusing the port if it returns false.\n\n[0]:\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 0 PID: 1039313 at lib/refcount.c:25 refcount_warn_saturate+0xe5/0x110\nCPU: 0 PID: 1039313 Comm: trigger Not tainted 6.8.6-200.fc39.x86_64 #1\nHardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.21805430.B64.2305221830 05/22/2023\nRIP: 0010:refcount_warn_saturate+0xe5/0x110\nCode: 42 8e ff 0f 0b c3 cc cc cc cc 80 3d aa 13 ea 01 00 0f 85 5e ff ff ff 48 c7 c7 f8 8e b7 82 c6 05 96 13 ea 01 01 e8 7b 42 8e ff <0f> 0b c3 cc cc cc cc 48 c7 c7 50 8f b7 82 c6 05 7a 13 ea 01 01 e8\nRSP: 0018:ffffc90006b43b60 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff888009bb3ef0 RCX: 0000000000000027\nRDX: ffff88807be218c8 RSI: 0000000000000001 RDI: ffff88807be218c0\nRBP: 0000000000069d70 R08: 0000000000000000 R09: ffffc90006b439f0\nR10: ffffc90006b439e8 R11: 0000000000000003 R12: ffff8880029ede84\nR13: 0000000000004e20 R14: ffffffff84356dc0 R15: ffff888009bb3ef0\nFS:  00007f62c10926c0(0000) GS:ffff88807be00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020ccb000 CR3: 000000004628c005 CR4: 0000000000f70ef0\nPKRU: 55555554\nCall Trace:\n <TASK>\n ? refcount_warn_saturate+0xe5/0x110\n ? __warn+0x81/0x130\n ? refcount_warn_saturate+0xe5/0x110\n ? report_bug+0x171/0x1a0\n ? refcount_warn_saturate+0xe5/0x110\n ? handle_bug+0x3c/0x80\n ? exc_invalid_op+0x17/0x70\n ? asm_exc_invalid_op+0x1a/0x20\n ? refcount_warn_saturate+0xe5/0x110\n tcp_twsk_unique+0x186/0x190\n __inet_check_established+0x176/0x2d0\n __inet_hash_connect+0x74/0x7d0\n ? __pfx___inet_check_established+0x10/0x10\n tcp_v4_connect+0x278/0x530\n __inet_stream_connect+0x10f/0x3d0\n inet_stream_connect+0x3a/0x60\n __sys_connect+0xa8/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0x83/0x170\n entry_SYSCALL_64_after_hwframe+0x78/0x80\nRIP: 0033:0x7f62c11a885d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a3 45 0c 00 f7 d8 64 89 01 48\nRSP: 002b:00007f62c1091e58 EFLAGS: 00000296 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 0000000020ccb004 RCX: 00007f62c11a885d\nRDX: 0000000000000010 RSI: 0000000020ccb000 RDI: 0000000000000003\nRBP: 00007f62c1091e90 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000296 R12: 00007f62c10926c0\nR13: ffffffffffffff88 R14: 0000000000000000 R15: 00007ffe237885b0\n </TASK>",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36904",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/84546cc1aeeb4df3e444b18a4293c9823f974be9",
            "patch_url": "https://git.kernel.org/stable/p/84546cc1aeeb4df3e444b18a4293c9823f974be9",
            "filename": "CVE-2024-36904-84546cc1aeeb4df3e444b18a4293c9823f974be9.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36904/CVE-2024-36904-84546cc1aeeb4df3e444b18a4293c9823f974be9.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/13ed7cdf079686ccd3618335205700c03f6fb446",
                "patch_url": "https://git.kernel.org/stable/p/13ed7cdf079686ccd3618335205700c03f6fb446",
                "filename": "CVE-2024-36904-13ed7cdf079686ccd3618335205700c03f6fb446.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36904/CVE-2024-36904-13ed7cdf079686ccd3618335205700c03f6fb446.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1796ca9c6f5bd50554214053af5f47d112818ee3",
                "patch_url": "https://git.kernel.org/stable/p/1796ca9c6f5bd50554214053af5f47d112818ee3",
                "filename": "CVE-2024-36904-1796ca9c6f5bd50554214053af5f47d112818ee3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36904/CVE-2024-36904-1796ca9c6f5bd50554214053af5f47d112818ee3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1d9cf07810c30ef7948879567d10fd1f01121d34",
                "patch_url": "https://git.kernel.org/stable/p/1d9cf07810c30ef7948879567d10fd1f01121d34",
                "filename": "CVE-2024-36904-1d9cf07810c30ef7948879567d10fd1f01121d34.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36904/CVE-2024-36904-1d9cf07810c30ef7948879567d10fd1f01121d34.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/27b0284d8be182a81feb65581ab6a724dfd596e8",
                "patch_url": "https://git.kernel.org/stable/p/27b0284d8be182a81feb65581ab6a724dfd596e8",
                "filename": "CVE-2024-36904-27b0284d8be182a81feb65581ab6a724dfd596e8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36904/CVE-2024-36904-27b0284d8be182a81feb65581ab6a724dfd596e8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/517e32ea0a8c72202d0d8aa8df50a7cd3d6fdefc",
                "patch_url": "https://git.kernel.org/stable/p/517e32ea0a8c72202d0d8aa8df50a7cd3d6fdefc",
                "filename": "CVE-2024-36904-517e32ea0a8c72202d0d8aa8df50a7cd3d6fdefc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36904/CVE-2024-36904-517e32ea0a8c72202d0d8aa8df50a7cd3d6fdefc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6e48faad92be13166184d21506e4e54c79c13adc",
                "patch_url": "https://git.kernel.org/stable/p/6e48faad92be13166184d21506e4e54c79c13adc",
                "filename": "CVE-2024-36904-6e48faad92be13166184d21506e4e54c79c13adc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36904/CVE-2024-36904-6e48faad92be13166184d21506e4e54c79c13adc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/84546cc1aeeb4df3e444b18a4293c9823f974be9",
                "patch_url": "https://git.kernel.org/stable/p/84546cc1aeeb4df3e444b18a4293c9823f974be9",
                "filename": "CVE-2024-36904-84546cc1aeeb4df3e444b18a4293c9823f974be9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36904/CVE-2024-36904-84546cc1aeeb4df3e444b18a4293c9823f974be9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f2db7230f73a80dbb179deab78f88a7947f0ab7e",
                "patch_url": "https://git.kernel.org/stable/p/f2db7230f73a80dbb179deab78f88a7947f0ab7e",
                "filename": "CVE-2024-36904-f2db7230f73a80dbb179deab78f88a7947f0ab7e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36904/CVE-2024-36904-f2db7230f73a80dbb179deab78f88a7947f0ab7e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/13ed7cdf079686ccd3618335205700c03f6fb446",
            "https://git.kernel.org/stable/c/1796ca9c6f5bd50554214053af5f47d112818ee3",
            "https://git.kernel.org/stable/c/1d9cf07810c30ef7948879567d10fd1f01121d34",
            "https://git.kernel.org/stable/c/27b0284d8be182a81feb65581ab6a724dfd596e8",
            "https://git.kernel.org/stable/c/517e32ea0a8c72202d0d8aa8df50a7cd3d6fdefc",
            "https://git.kernel.org/stable/c/6e48faad92be13166184d21506e4e54c79c13adc",
            "https://git.kernel.org/stable/c/84546cc1aeeb4df3e444b18a4293c9823f974be9",
            "https://git.kernel.org/stable/c/f2db7230f73a80dbb179deab78f88a7947f0ab7e",
            "https://www.cve.org/CVERecord?id=CVE-2024-36904\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36904\nhttps://lore.kernel.org/linux-cve-announce/2024053036-CVE-2024-36904-2273@gregkh/T"
        ]
    },
    "CVE-2024-36905": {
        "cve": "CVE-2024-36905",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets\n\nTCP_SYN_RECV state is really special, it is only used by\ncross-syn connections, mostly used by fuzzers.\n\nIn the following crash [1], syzbot managed to trigger a divide\nby zero in tcp_rcv_space_adjust()\n\nA socket makes the following state transitions,\nwithout ever calling tcp_init_transfer(),\nmeaning tcp_init_buffer_space() is also not called.\n\n         TCP_CLOSE\nconnect()\n         TCP_SYN_SENT\n         TCP_SYN_RECV\nshutdown() -> tcp_shutdown(sk, SEND_SHUTDOWN)\n         TCP_FIN_WAIT1\n\nTo fix this issue, change tcp_shutdown() to not\nperform a TCP_SYN_RECV -> TCP_FIN_WAIT1 transition,\nwhich makes no sense anyway.\n\nWhen tcp_rcv_state_process() later changes socket state\nfrom TCP_SYN_RECV to TCP_ESTABLISH, then look at\nsk->sk_shutdown to finally enter TCP_FIN_WAIT1 state,\nand send a FIN packet from a sane socket state.\n\nThis means tcp_send_fin() can now be called from BH\ncontext, and must use GFP_ATOMIC allocations.\n\n[1]\ndivide error: 0000 [#1] PREEMPT SMP KASAN NOPTI\nCPU: 1 PID: 5084 Comm: syz-executor358 Not tainted 6.9.0-rc6-syzkaller-00022-g98369dccd2f8 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n RIP: 0010:tcp_rcv_space_adjust+0x2df/0x890 net/ipv4/tcp_input.c:767\nCode: e3 04 4c 01 eb 48 8b 44 24 38 0f b6 04 10 84 c0 49 89 d5 0f 85 a5 03 00 00 41 8b 8e c8 09 00 00 89 e8 29 c8 48 0f af c3 31 d2 <48> f7 f1 48 8d 1c 43 49 8d 96 76 08 00 00 48 89 d0 48 c1 e8 03 48\nRSP: 0018:ffffc900031ef3f0 EFLAGS: 00010246\nRAX: 0c677a10441f8f42 RBX: 000000004fb95e7e RCX: 0000000000000000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000\nRBP: 0000000027d4b11f R08: ffffffff89e535a4 R09: 1ffffffff25e6ab7\nR10: dffffc0000000000 R11: ffffffff8135e920 R12: ffff88802a9f8d30\nR13: dffffc0000000000 R14: ffff88802a9f8d00 R15: 1ffff1100553f2da\nFS:  00005555775c0380(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f1155bf2304 CR3: 000000002b9f2000 CR4: 0000000000350ef0\nCall Trace:\n <TASK>\n  tcp_recvmsg_locked+0x106d/0x25a0 net/ipv4/tcp.c:2513\n  tcp_recvmsg+0x25d/0x920 net/ipv4/tcp.c:2578\n  inet6_recvmsg+0x16a/0x730 net/ipv6/af_inet6.c:680\n  sock_recvmsg_nosec net/socket.c:1046 [inline]\n  sock_recvmsg+0x109/0x280 net/socket.c:1068\n  ____sys_recvmsg+0x1db/0x470 net/socket.c:2803\n  ___sys_recvmsg net/socket.c:2845 [inline]\n  do_recvmmsg+0x474/0xae0 net/socket.c:2939\n  __sys_recvmmsg net/socket.c:3018 [inline]\n  __do_sys_recvmmsg net/socket.c:3041 [inline]\n  __se_sys_recvmmsg net/socket.c:3034 [inline]\n  __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3034\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7faeb6363db9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007ffcc1997168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007faeb6363db9\nRDX: 0000000000000001 RSI: 0000000020000bc0 RDI: 0000000000000005\nRBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000001c\nR10: 0000000000000122 R11: 0000000000000246 R12: 0000000000000000\nR13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36905",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2552c9d9440f8e7a2ed0660911ff00f25b90a0a4",
            "patch_url": "https://git.kernel.org/stable/p/2552c9d9440f8e7a2ed0660911ff00f25b90a0a4",
            "filename": "CVE-2024-36905-2552c9d9440f8e7a2ed0660911ff00f25b90a0a4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36905/CVE-2024-36905-2552c9d9440f8e7a2ed0660911ff00f25b90a0a4.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2552c9d9440f8e7a2ed0660911ff00f25b90a0a4",
                "patch_url": "https://git.kernel.org/stable/p/2552c9d9440f8e7a2ed0660911ff00f25b90a0a4",
                "filename": "CVE-2024-36905-2552c9d9440f8e7a2ed0660911ff00f25b90a0a4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36905/CVE-2024-36905-2552c9d9440f8e7a2ed0660911ff00f25b90a0a4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/34e41a031fd7523bf1cd00a2adca2370aebea270",
                "patch_url": "https://git.kernel.org/stable/p/34e41a031fd7523bf1cd00a2adca2370aebea270",
                "filename": "CVE-2024-36905-34e41a031fd7523bf1cd00a2adca2370aebea270.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36905/CVE-2024-36905-34e41a031fd7523bf1cd00a2adca2370aebea270.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3fe4ef0568a48369b1891395d13ac593b1ba41b1",
                "patch_url": "https://git.kernel.org/stable/p/3fe4ef0568a48369b1891395d13ac593b1ba41b1",
                "filename": "CVE-2024-36905-3fe4ef0568a48369b1891395d13ac593b1ba41b1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36905/CVE-2024-36905-3fe4ef0568a48369b1891395d13ac593b1ba41b1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/413c33b9f3bc36fdf719690a78824db9f88a9485",
                "patch_url": "https://git.kernel.org/stable/p/413c33b9f3bc36fdf719690a78824db9f88a9485",
                "filename": "CVE-2024-36905-413c33b9f3bc36fdf719690a78824db9f88a9485.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36905/CVE-2024-36905-413c33b9f3bc36fdf719690a78824db9f88a9485.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/94062790aedb505bdda209b10bea47b294d6394f",
                "patch_url": "https://git.kernel.org/stable/p/94062790aedb505bdda209b10bea47b294d6394f",
                "filename": "CVE-2024-36905-94062790aedb505bdda209b10bea47b294d6394f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36905/CVE-2024-36905-94062790aedb505bdda209b10bea47b294d6394f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cbf232ba11bc86a5281b4f00e1151349ef4d45cf",
                "patch_url": "https://git.kernel.org/stable/p/cbf232ba11bc86a5281b4f00e1151349ef4d45cf",
                "filename": "CVE-2024-36905-cbf232ba11bc86a5281b4f00e1151349ef4d45cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36905/CVE-2024-36905-cbf232ba11bc86a5281b4f00e1151349ef4d45cf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ed5e279b69e007ce6c0fe82a5a534c1b19783214",
                "patch_url": "https://git.kernel.org/stable/p/ed5e279b69e007ce6c0fe82a5a534c1b19783214",
                "filename": "CVE-2024-36905-ed5e279b69e007ce6c0fe82a5a534c1b19783214.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36905/CVE-2024-36905-ed5e279b69e007ce6c0fe82a5a534c1b19783214.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f47d0d32fa94e815fdd78b8b88684873e67939f4",
                "patch_url": "https://git.kernel.org/stable/p/f47d0d32fa94e815fdd78b8b88684873e67939f4",
                "filename": "CVE-2024-36905-f47d0d32fa94e815fdd78b8b88684873e67939f4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36905/CVE-2024-36905-f47d0d32fa94e815fdd78b8b88684873e67939f4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2552c9d9440f8e7a2ed0660911ff00f25b90a0a4",
            "https://git.kernel.org/stable/c/34e41a031fd7523bf1cd00a2adca2370aebea270",
            "https://git.kernel.org/stable/c/3fe4ef0568a48369b1891395d13ac593b1ba41b1",
            "https://git.kernel.org/stable/c/413c33b9f3bc36fdf719690a78824db9f88a9485",
            "https://git.kernel.org/stable/c/94062790aedb505bdda209b10bea47b294d6394f",
            "https://git.kernel.org/stable/c/cbf232ba11bc86a5281b4f00e1151349ef4d45cf",
            "https://git.kernel.org/stable/c/ed5e279b69e007ce6c0fe82a5a534c1b19783214",
            "https://git.kernel.org/stable/c/f47d0d32fa94e815fdd78b8b88684873e67939f4",
            "https://www.cve.org/CVERecord?id=CVE-2024-36905\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36905\nhttps://lore.kernel.org/linux-cve-announce/2024053036-CVE-2024-36905-5884@gregkh/T"
        ]
    },
    "CVE-2024-36917": {
        "cve": "CVE-2024-36917",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix overflow in blk_ioctl_discard()\n\nThere is no check for overflow of 'start + len' in blk_ioctl_discard().\nHung task occurs if submit an discard ioctl with the following param:\n  start = 0x80000000000ff000, len = 0x8000000000fff000;\nAdd the overflow validation now.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36917",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0842ddd83939eb4db940b9af7d39e79722bc41aa",
            "patch_url": "https://git.kernel.org/stable/p/0842ddd83939eb4db940b9af7d39e79722bc41aa",
            "filename": "CVE-2024-36917-0842ddd83939eb4db940b9af7d39e79722bc41aa.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36917/CVE-2024-36917-0842ddd83939eb4db940b9af7d39e79722bc41aa.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0842ddd83939eb4db940b9af7d39e79722bc41aa",
                "patch_url": "https://git.kernel.org/stable/p/0842ddd83939eb4db940b9af7d39e79722bc41aa",
                "filename": "CVE-2024-36917-0842ddd83939eb4db940b9af7d39e79722bc41aa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36917/CVE-2024-36917-0842ddd83939eb4db940b9af7d39e79722bc41aa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/22d24a544b0d49bbcbd61c8c0eaf77d3c9297155",
                "patch_url": "https://git.kernel.org/stable/p/22d24a544b0d49bbcbd61c8c0eaf77d3c9297155",
                "filename": "CVE-2024-36917-22d24a544b0d49bbcbd61c8c0eaf77d3c9297155.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36917/CVE-2024-36917-22d24a544b0d49bbcbd61c8c0eaf77d3c9297155.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/507d526a98c355e6f3fb2c47aacad44a69784bee",
                "patch_url": "https://git.kernel.org/stable/p/507d526a98c355e6f3fb2c47aacad44a69784bee",
                "filename": "CVE-2024-36917-507d526a98c355e6f3fb2c47aacad44a69784bee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36917/CVE-2024-36917-507d526a98c355e6f3fb2c47aacad44a69784bee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6c9915fa9410cbb9bd75ee283c03120046c56d3d",
                "patch_url": "https://git.kernel.org/stable/p/6c9915fa9410cbb9bd75ee283c03120046c56d3d",
                "filename": "CVE-2024-36917-6c9915fa9410cbb9bd75ee283c03120046c56d3d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36917/CVE-2024-36917-6c9915fa9410cbb9bd75ee283c03120046c56d3d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8a26198186e97ee5fc4b42fde82629cff8c75cd6",
                "patch_url": "https://git.kernel.org/stable/p/8a26198186e97ee5fc4b42fde82629cff8c75cd6",
                "filename": "CVE-2024-36917-8a26198186e97ee5fc4b42fde82629cff8c75cd6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36917/CVE-2024-36917-8a26198186e97ee5fc4b42fde82629cff8c75cd6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e1d38cde2b7b0fbd1c48082e7a98c37d750af59b",
                "patch_url": "https://git.kernel.org/stable/p/e1d38cde2b7b0fbd1c48082e7a98c37d750af59b",
                "filename": "CVE-2024-36917-e1d38cde2b7b0fbd1c48082e7a98c37d750af59b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36917/CVE-2024-36917-e1d38cde2b7b0fbd1c48082e7a98c37d750af59b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0842ddd83939eb4db940b9af7d39e79722bc41aa",
            "https://git.kernel.org/stable/c/22d24a544b0d49bbcbd61c8c0eaf77d3c9297155",
            "https://git.kernel.org/stable/c/507d526a98c355e6f3fb2c47aacad44a69784bee",
            "https://git.kernel.org/stable/c/6c9915fa9410cbb9bd75ee283c03120046c56d3d",
            "https://git.kernel.org/stable/c/8a26198186e97ee5fc4b42fde82629cff8c75cd6",
            "https://git.kernel.org/stable/c/e1d38cde2b7b0fbd1c48082e7a98c37d750af59b",
            "https://www.cve.org/CVERecord?id=CVE-2024-36917\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36917\nhttps://lore.kernel.org/linux-cve-announce/2024053039-CVE-2024-36917-f9e3@gregkh/T"
        ]
    },
    "CVE-2024-36919": {
        "cve": "CVE-2024-36919",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload\n\nThe session resources are used by FW and driver when session is offloaded,\nonce session is uploaded these resources are not used. The lock is not\nrequired as these fields won't be used any longer. The offload and upload\ncalls are sequential, hence lock is not required.\n\nThis will suppress following BUG_ON():\n\n[  449.843143] ------------[ cut here ]------------\n[  449.848302] kernel BUG at mm/vmalloc.c:2727!\n[  449.853072] invalid opcode: 0000 [#1] PREEMPT SMP PTI\n[  449.858712] CPU: 5 PID: 1996 Comm: kworker/u24:2 Not tainted 5.14.0-118.el9.x86_64 #1\nRebooting.\n[  449.867454] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.3.4 11/08/2016\n[  449.876966] Workqueue: fc_rport_eq fc_rport_work [libfc]\n[  449.882910] RIP: 0010:vunmap+0x2e/0x30\n[  449.887098] Code: 00 65 8b 05 14 a2 f0 4a a9 00 ff ff 00 75 1b 55 48 89 fd e8 34 36 79 00 48 85 ed 74 0b 48 89 ef 31 f6 5d e9 14 fc ff ff 5d c3 <0f> 0b 0f 1f 44 00 00 41 57 41 56 49 89 ce 41 55 49 89 fd 41 54 41\n[  449.908054] RSP: 0018:ffffb83d878b3d68 EFLAGS: 00010206\n[  449.913887] RAX: 0000000080000201 RBX: ffff8f4355133550 RCX: 000000000d400005\n[  449.921843] RDX: 0000000000000001 RSI: 0000000000001000 RDI: ffffb83da53f5000\n[  449.929808] RBP: ffff8f4ac6675800 R08: ffffb83d878b3d30 R09: 00000000000efbdf\n[  449.937774] R10: 0000000000000003 R11: ffff8f434573e000 R12: 0000000000001000\n[  449.945736] R13: 0000000000001000 R14: ffffb83da53f5000 R15: ffff8f43d4ea3ae0\n[  449.953701] FS:  0000000000000000(0000) GS:ffff8f529fc80000(0000) knlGS:0000000000000000\n[  449.962732] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  449.969138] CR2: 00007f8cf993e150 CR3: 0000000efbe10003 CR4: 00000000003706e0\n[  449.977102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[  449.985065] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[  449.993028] Call Trace:\n[  449.995756]  __iommu_dma_free+0x96/0x100\n[  450.000139]  bnx2fc_free_session_resc+0x67/0x240 [bnx2fc]\n[  450.006171]  bnx2fc_upload_session+0xce/0x100 [bnx2fc]\n[  450.011910]  bnx2fc_rport_event_handler+0x9f/0x240 [bnx2fc]\n[  450.018136]  fc_rport_work+0x103/0x5b0 [libfc]\n[  450.023103]  process_one_work+0x1e8/0x3c0\n[  450.027581]  worker_thread+0x50/0x3b0\n[  450.031669]  ? rescuer_thread+0x370/0x370\n[  450.036143]  kthread+0x149/0x170\n[  450.039744]  ? set_kthread_struct+0x40/0x40\n[  450.044411]  ret_from_fork+0x22/0x30\n[  450.048404] Modules linked in: vfat msdos fat xfs nfs_layout_nfsv41_files rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver dm_service_time qedf qed crc8 bnx2fc libfcoe libfc scsi_transport_fc intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp dcdbas rapl intel_cstate intel_uncore mei_me pcspkr mei ipmi_ssif lpc_ich ipmi_si fuse zram ext4 mbcache jbd2 loop nfsv3 nfs_acl nfs lockd grace fscache netfs irdma ice sd_mod t10_pi sg ib_uverbs ib_core 8021q garp mrp stp llc mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt mxm_wmi fb_sys_fops cec crct10dif_pclmul ahci crc32_pclmul bnx2x drm ghash_clmulni_intel libahci rfkill i40e libata megaraid_sas mdio wmi sunrpc lrw dm_crypt dm_round_robin dm_multipath dm_snapshot dm_bufio dm_mirror dm_region_hash dm_log dm_zero dm_mod linear raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx raid6_pq libcrc32c crc32c_intel raid1 raid0 iscsi_ibft squashfs be2iscsi bnx2i cnic uio cxgb4i cxgb4 tls\n[  450.048497]  libcxgbi libcxgb qla4xxx iscsi_boot_sysfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi edd ipmi_devintf ipmi_msghandler\n[  450.159753] ---[ end trace 712de2c57c64abc8 ]---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36919",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1150606d47d711d5bfdf329a1a96ed7027085936",
            "patch_url": "https://git.kernel.org/stable/p/1150606d47d711d5bfdf329a1a96ed7027085936",
            "filename": "CVE-2024-36919-1150606d47d711d5bfdf329a1a96ed7027085936.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36919/CVE-2024-36919-1150606d47d711d5bfdf329a1a96ed7027085936.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1150606d47d711d5bfdf329a1a96ed7027085936",
                "patch_url": "https://git.kernel.org/stable/p/1150606d47d711d5bfdf329a1a96ed7027085936",
                "filename": "CVE-2024-36919-1150606d47d711d5bfdf329a1a96ed7027085936.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36919/CVE-2024-36919-1150606d47d711d5bfdf329a1a96ed7027085936.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/468f3e3c15076338367b0945b041105b67cf31e3",
                "patch_url": "https://git.kernel.org/stable/p/468f3e3c15076338367b0945b041105b67cf31e3",
                "filename": "CVE-2024-36919-468f3e3c15076338367b0945b041105b67cf31e3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36919/CVE-2024-36919-468f3e3c15076338367b0945b041105b67cf31e3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/93aa5ccc44781bdfef1bf0bc4c2c292d45251312",
                "patch_url": "https://git.kernel.org/stable/p/93aa5ccc44781bdfef1bf0bc4c2c292d45251312",
                "filename": "CVE-2024-36919-93aa5ccc44781bdfef1bf0bc4c2c292d45251312.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36919/CVE-2024-36919-93aa5ccc44781bdfef1bf0bc4c2c292d45251312.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/acd370c1fb86b7302c1cbb354a7c1cd9953768eb",
                "patch_url": "https://git.kernel.org/stable/p/acd370c1fb86b7302c1cbb354a7c1cd9953768eb",
                "filename": "CVE-2024-36919-acd370c1fb86b7302c1cbb354a7c1cd9953768eb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36919/CVE-2024-36919-acd370c1fb86b7302c1cbb354a7c1cd9953768eb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ad498539dda0816aadef384ec117bfea304c75c3",
                "patch_url": "https://git.kernel.org/stable/p/ad498539dda0816aadef384ec117bfea304c75c3",
                "filename": "CVE-2024-36919-ad498539dda0816aadef384ec117bfea304c75c3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36919/CVE-2024-36919-ad498539dda0816aadef384ec117bfea304c75c3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c214ed2a4dda35b308b0b28eed804d7ae66401f9",
                "patch_url": "https://git.kernel.org/stable/p/c214ed2a4dda35b308b0b28eed804d7ae66401f9",
                "filename": "CVE-2024-36919-c214ed2a4dda35b308b0b28eed804d7ae66401f9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36919/CVE-2024-36919-c214ed2a4dda35b308b0b28eed804d7ae66401f9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c885ab23206b1f1ba0731ffe7c9455c6a91db256",
                "patch_url": "https://git.kernel.org/stable/p/c885ab23206b1f1ba0731ffe7c9455c6a91db256",
                "filename": "CVE-2024-36919-c885ab23206b1f1ba0731ffe7c9455c6a91db256.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36919/CVE-2024-36919-c885ab23206b1f1ba0731ffe7c9455c6a91db256.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ea50941cd8c9f0b12f38b73d3b1bfeca660dd342",
                "patch_url": "https://git.kernel.org/stable/p/ea50941cd8c9f0b12f38b73d3b1bfeca660dd342",
                "filename": "CVE-2024-36919-ea50941cd8c9f0b12f38b73d3b1bfeca660dd342.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36919/CVE-2024-36919-ea50941cd8c9f0b12f38b73d3b1bfeca660dd342.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1150606d47d711d5bfdf329a1a96ed7027085936",
            "https://git.kernel.org/stable/c/468f3e3c15076338367b0945b041105b67cf31e3",
            "https://git.kernel.org/stable/c/93aa5ccc44781bdfef1bf0bc4c2c292d45251312",
            "https://git.kernel.org/stable/c/acd370c1fb86b7302c1cbb354a7c1cd9953768eb",
            "https://git.kernel.org/stable/c/ad498539dda0816aadef384ec117bfea304c75c3",
            "https://git.kernel.org/stable/c/c214ed2a4dda35b308b0b28eed804d7ae66401f9",
            "https://git.kernel.org/stable/c/c885ab23206b1f1ba0731ffe7c9455c6a91db256",
            "https://git.kernel.org/stable/c/ea50941cd8c9f0b12f38b73d3b1bfeca660dd342"
        ]
    },
    "CVE-2024-36920": {
        "cve": "CVE-2024-36920",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Avoid memcpy field-spanning write WARNING\n\nWhen the \"storcli2 show\" command is executed for eHBA-9600, mpi3mr driver\nprints this WARNING message:\n\n  memcpy: detected field-spanning write (size 128) of single field \"bsg_reply_buf->reply_buf\" at drivers/scsi/mpi3mr/mpi3mr_app.c:1658 (size 1)\n  WARNING: CPU: 0 PID: 12760 at drivers/scsi/mpi3mr/mpi3mr_app.c:1658 mpi3mr_bsg_request+0x6b12/0x7f10 [mpi3mr]\n\nThe cause of the WARN is 128 bytes memcpy to the 1 byte size array \"__u8\nreplay_buf[1]\" in the struct mpi3mr_bsg_in_reply_buf. The array is intended\nto be a flexible length array, so the WARN is a false positive.\n\nTo suppress the WARN, remove the constant number '1' from the array\ndeclaration and clarify that it has flexible length. Also, adjust the\nmemory allocation size to match the change.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36920",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/5f0266044dc611563539705bff0b3e1545fbb6aa",
            "patch_url": "https://git.kernel.org/stable/p/5f0266044dc611563539705bff0b3e1545fbb6aa",
            "filename": "CVE-2024-36920-5f0266044dc611563539705bff0b3e1545fbb6aa.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36920/CVE-2024-36920-5f0266044dc611563539705bff0b3e1545fbb6aa.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/429846b4b6ce9853e0d803a2357bb2e55083adf0",
                "patch_url": "https://git.kernel.org/stable/p/429846b4b6ce9853e0d803a2357bb2e55083adf0",
                "filename": "CVE-2024-36920-429846b4b6ce9853e0d803a2357bb2e55083adf0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36920/CVE-2024-36920-429846b4b6ce9853e0d803a2357bb2e55083adf0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4d2772324f43cf5674ac3dbe3f74a7e656396716",
                "patch_url": "https://git.kernel.org/stable/p/4d2772324f43cf5674ac3dbe3f74a7e656396716",
                "filename": "CVE-2024-36920-4d2772324f43cf5674ac3dbe3f74a7e656396716.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36920/CVE-2024-36920-4d2772324f43cf5674ac3dbe3f74a7e656396716.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5f0266044dc611563539705bff0b3e1545fbb6aa",
                "patch_url": "https://git.kernel.org/stable/p/5f0266044dc611563539705bff0b3e1545fbb6aa",
                "filename": "CVE-2024-36920-5f0266044dc611563539705bff0b3e1545fbb6aa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36920/CVE-2024-36920-5f0266044dc611563539705bff0b3e1545fbb6aa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f09318244c6cafd10aca741b9c01e0a2c362d43a",
                "patch_url": "https://git.kernel.org/stable/p/f09318244c6cafd10aca741b9c01e0a2c362d43a",
                "filename": "CVE-2024-36920-f09318244c6cafd10aca741b9c01e0a2c362d43a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36920/CVE-2024-36920-f09318244c6cafd10aca741b9c01e0a2c362d43a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/429846b4b6ce9853e0d803a2357bb2e55083adf0",
            "https://git.kernel.org/stable/c/4d2772324f43cf5674ac3dbe3f74a7e656396716",
            "https://git.kernel.org/stable/c/5f0266044dc611563539705bff0b3e1545fbb6aa",
            "https://git.kernel.org/stable/c/f09318244c6cafd10aca741b9c01e0a2c362d43a",
            "https://www.cve.org/CVERecord?id=CVE-2024-36920\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36920\nhttps://lore.kernel.org/linux-cve-announce/2024053039-CVE-2024-36920-b4a7@gregkh/T"
        ]
    },
    "CVE-2024-36921": {
        "cve": "CVE-2024-36921",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: guard against invalid STA ID on removal\n\nGuard against invalid station IDs in iwl_mvm_mld_rm_sta_id as that would\nresult in out-of-bounds array accesses. This prevents issues should the\ndriver get into a bad state during error handling.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36921",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/17f64517bf5c26af56b6c3566273aad6646c3c4f",
            "patch_url": "https://git.kernel.org/stable/p/17f64517bf5c26af56b6c3566273aad6646c3c4f",
            "filename": "CVE-2024-36921-17f64517bf5c26af56b6c3566273aad6646c3c4f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36921/CVE-2024-36921-17f64517bf5c26af56b6c3566273aad6646c3c4f.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/17f64517bf5c26af56b6c3566273aad6646c3c4f",
                "patch_url": "https://git.kernel.org/stable/p/17f64517bf5c26af56b6c3566273aad6646c3c4f",
                "filename": "CVE-2024-36921-17f64517bf5c26af56b6c3566273aad6646c3c4f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36921/CVE-2024-36921-17f64517bf5c26af56b6c3566273aad6646c3c4f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/94f80a8ec15e238b78521f20f8afaed60521a294",
                "patch_url": "https://git.kernel.org/stable/p/94f80a8ec15e238b78521f20f8afaed60521a294",
                "filename": "CVE-2024-36921-94f80a8ec15e238b78521f20f8afaed60521a294.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36921/CVE-2024-36921-94f80a8ec15e238b78521f20f8afaed60521a294.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fab21d220017daa5fd8a3d788ff25ccfecfaae2f",
                "patch_url": "https://git.kernel.org/stable/p/fab21d220017daa5fd8a3d788ff25ccfecfaae2f",
                "filename": "CVE-2024-36921-fab21d220017daa5fd8a3d788ff25ccfecfaae2f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36921/CVE-2024-36921-fab21d220017daa5fd8a3d788ff25ccfecfaae2f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/17f64517bf5c26af56b6c3566273aad6646c3c4f",
            "https://git.kernel.org/stable/c/94f80a8ec15e238b78521f20f8afaed60521a294",
            "https://git.kernel.org/stable/c/fab21d220017daa5fd8a3d788ff25ccfecfaae2f",
            "https://www.cve.org/CVERecord?id=CVE-2024-36921\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36921\nhttps://lore.kernel.org/linux-cve-announce/2024053039-CVE-2024-36921-9f90@gregkh/T"
        ]
    },
    "CVE-2024-36922": {
        "cve": "CVE-2024-36922",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: read txq->read_ptr under lock\n\nIf we read txq->read_ptr without lock, we can read the same\nvalue twice, then obtain the lock, and reclaim from there\nto two different places, but crucially reclaim the same\nentry twice, resulting in the WARN_ONCE() a little later.\nFix that by reading txq->read_ptr under lock.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36922",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/43d07103df670484cdd26f9588eabef80f69db89",
            "patch_url": "https://git.kernel.org/stable/p/43d07103df670484cdd26f9588eabef80f69db89",
            "filename": "CVE-2024-36922-43d07103df670484cdd26f9588eabef80f69db89.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36922/CVE-2024-36922-43d07103df670484cdd26f9588eabef80f69db89.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/43d07103df670484cdd26f9588eabef80f69db89",
                "patch_url": "https://git.kernel.org/stable/p/43d07103df670484cdd26f9588eabef80f69db89",
                "filename": "CVE-2024-36922-43d07103df670484cdd26f9588eabef80f69db89.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36922/CVE-2024-36922-43d07103df670484cdd26f9588eabef80f69db89.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b83db8e756dec68a950ed2f056248b1704b3deaa",
                "patch_url": "https://git.kernel.org/stable/p/b83db8e756dec68a950ed2f056248b1704b3deaa",
                "filename": "CVE-2024-36922-b83db8e756dec68a950ed2f056248b1704b3deaa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36922/CVE-2024-36922-b83db8e756dec68a950ed2f056248b1704b3deaa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c2ace6300600c634553657785dfe5ea0ed688ac2",
                "patch_url": "https://git.kernel.org/stable/p/c2ace6300600c634553657785dfe5ea0ed688ac2",
                "filename": "CVE-2024-36922-c2ace6300600c634553657785dfe5ea0ed688ac2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36922/CVE-2024-36922-c2ace6300600c634553657785dfe5ea0ed688ac2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/43d07103df670484cdd26f9588eabef80f69db89",
            "https://git.kernel.org/stable/c/b83db8e756dec68a950ed2f056248b1704b3deaa",
            "https://git.kernel.org/stable/c/c2ace6300600c634553657785dfe5ea0ed688ac2",
            "https://www.cve.org/CVERecord?id=CVE-2024-36922\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36922\nhttps://lore.kernel.org/linux-cve-announce/2024053039-CVE-2024-36922-f0df@gregkh/T"
        ]
    },
    "CVE-2024-36927": {
        "cve": "CVE-2024-36927",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: Fix uninit-value access in __ip_make_skb()\n\nKMSAN reported uninit-value access in __ip_make_skb() [1].  __ip_make_skb()\ntests HDRINCL to know if the skb has icmphdr. However, HDRINCL can cause a\nrace condition. If calling setsockopt(2) with IP_HDRINCL changes HDRINCL\nwhile __ip_make_skb() is running, the function will access icmphdr in the\nskb even if it is not included. This causes the issue reported by KMSAN.\n\nCheck FLOWI_FLAG_KNOWN_NH on fl4->flowi4_flags instead of testing HDRINCL\non the socket.\n\nAlso, fl4->fl4_icmp_type and fl4->fl4_icmp_code are not initialized. These\nare union in struct flowi4 and are implicitly initialized by\nflowi4_init_output(), but we should not rely on specific union layout.\n\nInitialize these explicitly in raw_sendmsg().\n\n[1]\nBUG: KMSAN: uninit-value in __ip_make_skb+0x2b74/0x2d20 net/ipv4/ip_output.c:1481\n __ip_make_skb+0x2b74/0x2d20 net/ipv4/ip_output.c:1481\n ip_finish_skb include/net/ip.h:243 [inline]\n ip_push_pending_frames+0x4c/0x5c0 net/ipv4/ip_output.c:1508\n raw_sendmsg+0x2381/0x2690 net/ipv4/raw.c:654\n inet_sendmsg+0x27b/0x2a0 net/ipv4/af_inet.c:851\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x274/0x3c0 net/socket.c:745\n __sys_sendto+0x62c/0x7b0 net/socket.c:2191\n __do_sys_sendto net/socket.c:2203 [inline]\n __se_sys_sendto net/socket.c:2199 [inline]\n __x64_sys_sendto+0x130/0x200 net/socket.c:2199\n do_syscall_64+0xd8/0x1f0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:3804 [inline]\n slab_alloc_node mm/slub.c:3845 [inline]\n kmem_cache_alloc_node+0x5f6/0xc50 mm/slub.c:3888\n kmalloc_reserve+0x13c/0x4a0 net/core/skbuff.c:577\n __alloc_skb+0x35a/0x7c0 net/core/skbuff.c:668\n alloc_skb include/linux/skbuff.h:1318 [inline]\n __ip_append_data+0x49ab/0x68c0 net/ipv4/ip_output.c:1128\n ip_append_data+0x1e7/0x260 net/ipv4/ip_output.c:1365\n raw_sendmsg+0x22b1/0x2690 net/ipv4/raw.c:648\n inet_sendmsg+0x27b/0x2a0 net/ipv4/af_inet.c:851\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x274/0x3c0 net/socket.c:745\n __sys_sendto+0x62c/0x7b0 net/socket.c:2191\n __do_sys_sendto net/socket.c:2203 [inline]\n __se_sys_sendto net/socket.c:2199 [inline]\n __x64_sys_sendto+0x130/0x200 net/socket.c:2199\n do_syscall_64+0xd8/0x1f0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nCPU: 1 PID: 15709 Comm: syz-executor.7 Not tainted 6.8.0-11567-gb3603fcb79b1 #25\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-1.fc39 04/01/2014",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36927",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/20d3eb00ab81462d554ac6d09691b8d9aa5a5741",
            "patch_url": "https://git.kernel.org/stable/p/20d3eb00ab81462d554ac6d09691b8d9aa5a5741",
            "filename": "CVE-2024-36927-20d3eb00ab81462d554ac6d09691b8d9aa5a5741.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36927/CVE-2024-36927-20d3eb00ab81462d554ac6d09691b8d9aa5a5741.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/20d3eb00ab81462d554ac6d09691b8d9aa5a5741",
                "patch_url": "https://git.kernel.org/stable/p/20d3eb00ab81462d554ac6d09691b8d9aa5a5741",
                "filename": "CVE-2024-36927-20d3eb00ab81462d554ac6d09691b8d9aa5a5741.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36927/CVE-2024-36927-20d3eb00ab81462d554ac6d09691b8d9aa5a5741.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/55bf541e018b76b3750cb6c6ea18c46e1ac5562e",
                "patch_url": "https://git.kernel.org/stable/p/55bf541e018b76b3750cb6c6ea18c46e1ac5562e",
                "filename": "CVE-2024-36927-55bf541e018b76b3750cb6c6ea18c46e1ac5562e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36927/CVE-2024-36927-55bf541e018b76b3750cb6c6ea18c46e1ac5562e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5db08343ddb1b239320612036c398e4e1bb52818",
                "patch_url": "https://git.kernel.org/stable/p/5db08343ddb1b239320612036c398e4e1bb52818",
                "filename": "CVE-2024-36927-5db08343ddb1b239320612036c398e4e1bb52818.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36927/CVE-2024-36927-5db08343ddb1b239320612036c398e4e1bb52818.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/88c66f1879f322f11de34d37b2d3d87497afdcb6",
                "patch_url": "https://git.kernel.org/stable/p/88c66f1879f322f11de34d37b2d3d87497afdcb6",
                "filename": "CVE-2024-36927-88c66f1879f322f11de34d37b2d3d87497afdcb6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36927/CVE-2024-36927-88c66f1879f322f11de34d37b2d3d87497afdcb6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f5c603ad4e6fcf42f84053e882ebe20184bb309e",
                "patch_url": "https://git.kernel.org/stable/p/f5c603ad4e6fcf42f84053e882ebe20184bb309e",
                "filename": "CVE-2024-36927-f5c603ad4e6fcf42f84053e882ebe20184bb309e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36927/CVE-2024-36927-f5c603ad4e6fcf42f84053e882ebe20184bb309e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fc1092f51567277509563800a3c56732070b6aa4",
                "patch_url": "https://git.kernel.org/stable/p/fc1092f51567277509563800a3c56732070b6aa4",
                "filename": "CVE-2024-36927-fc1092f51567277509563800a3c56732070b6aa4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36927/CVE-2024-36927-fc1092f51567277509563800a3c56732070b6aa4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/20d3eb00ab81462d554ac6d09691b8d9aa5a5741",
            "https://git.kernel.org/stable/c/55bf541e018b76b3750cb6c6ea18c46e1ac5562e",
            "https://git.kernel.org/stable/c/5db08343ddb1b239320612036c398e4e1bb52818",
            "https://git.kernel.org/stable/c/88c66f1879f322f11de34d37b2d3d87497afdcb6",
            "https://git.kernel.org/stable/c/f5c603ad4e6fcf42f84053e882ebe20184bb309e",
            "https://git.kernel.org/stable/c/fc1092f51567277509563800a3c56732070b6aa4",
            "https://www.cve.org/CVERecord?id=CVE-2024-36927\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36927\nhttps://lore.kernel.org/linux-cve-announce/2024053040-CVE-2024-36927-976e@gregkh/T"
        ]
    },
    "CVE-2024-36929": {
        "cve": "CVE-2024-36929",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: core: reject skb_copy(_expand) for fraglist GSO skbs\n\nSKB_GSO_FRAGLIST skbs must not be linearized, otherwise they become\ninvalid. Return NULL if such an skb is passed to skb_copy or\nskb_copy_expand, in order to prevent a crash on a potential later\ncall to skb_gso_segment.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36929",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/c7af99cc21923a9650533c9d77265c8dd683a533",
            "patch_url": "https://git.kernel.org/stable/p/c7af99cc21923a9650533c9d77265c8dd683a533",
            "filename": "CVE-2024-36929-c7af99cc21923a9650533c9d77265c8dd683a533.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36929/CVE-2024-36929-c7af99cc21923a9650533c9d77265c8dd683a533.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/989bf6fd1e1d058e73a364dce1a0c53d33373f62",
                "patch_url": "https://git.kernel.org/stable/p/989bf6fd1e1d058e73a364dce1a0c53d33373f62",
                "filename": "CVE-2024-36929-989bf6fd1e1d058e73a364dce1a0c53d33373f62.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36929/CVE-2024-36929-989bf6fd1e1d058e73a364dce1a0c53d33373f62.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aea5e2669c2863fdd8679c40ee310b3bcaa85aec",
                "patch_url": "https://git.kernel.org/stable/p/aea5e2669c2863fdd8679c40ee310b3bcaa85aec",
                "filename": "CVE-2024-36929-aea5e2669c2863fdd8679c40ee310b3bcaa85aec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36929/CVE-2024-36929-aea5e2669c2863fdd8679c40ee310b3bcaa85aec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c7af99cc21923a9650533c9d77265c8dd683a533",
                "patch_url": "https://git.kernel.org/stable/p/c7af99cc21923a9650533c9d77265c8dd683a533",
                "filename": "CVE-2024-36929-c7af99cc21923a9650533c9d77265c8dd683a533.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36929/CVE-2024-36929-c7af99cc21923a9650533c9d77265c8dd683a533.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cfe34d86ef9765c388f145039006bb79b6c81ac6",
                "patch_url": "https://git.kernel.org/stable/p/cfe34d86ef9765c388f145039006bb79b6c81ac6",
                "filename": "CVE-2024-36929-cfe34d86ef9765c388f145039006bb79b6c81ac6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36929/CVE-2024-36929-cfe34d86ef9765c388f145039006bb79b6c81ac6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d091e579b864fa790dd6a0cd537a22c383126681",
                "patch_url": "https://git.kernel.org/stable/p/d091e579b864fa790dd6a0cd537a22c383126681",
                "filename": "CVE-2024-36929-d091e579b864fa790dd6a0cd537a22c383126681.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36929/CVE-2024-36929-d091e579b864fa790dd6a0cd537a22c383126681.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/faa83a7797f06cefed86731ba4baa3b4dfdc06c1",
                "patch_url": "https://git.kernel.org/stable/p/faa83a7797f06cefed86731ba4baa3b4dfdc06c1",
                "filename": "CVE-2024-36929-faa83a7797f06cefed86731ba4baa3b4dfdc06c1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36929/CVE-2024-36929-faa83a7797f06cefed86731ba4baa3b4dfdc06c1.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/989bf6fd1e1d058e73a364dce1a0c53d33373f62",
            "https://git.kernel.org/stable/c/aea5e2669c2863fdd8679c40ee310b3bcaa85aec",
            "https://git.kernel.org/stable/c/c7af99cc21923a9650533c9d77265c8dd683a533",
            "https://git.kernel.org/stable/c/cfe34d86ef9765c388f145039006bb79b6c81ac6",
            "https://git.kernel.org/stable/c/d091e579b864fa790dd6a0cd537a22c383126681",
            "https://git.kernel.org/stable/c/faa83a7797f06cefed86731ba4baa3b4dfdc06c1",
            "https://www.cve.org/CVERecord?id=CVE-2024-36929\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36929\nhttps://lore.kernel.org/linux-cve-announce/2024053041-CVE-2024-36929-0329@gregkh/T"
        ]
    },
    "CVE-2024-36933": {
        "cve": "CVE-2024-36933",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().\n\nsyzbot triggered various splats (see [0] and links) by a crafted GSO\npacket of VIRTIO_NET_HDR_GSO_UDP layering the following protocols:\n\n  ETH_P_8021AD + ETH_P_NSH + ETH_P_IPV6 + IPPROTO_UDP\n\nNSH can encapsulate IPv4, IPv6, Ethernet, NSH, and MPLS.  As the inner\nprotocol can be Ethernet, NSH GSO handler, nsh_gso_segment(), calls\nskb_mac_gso_segment() to invoke inner protocol GSO handlers.\n\nnsh_gso_segment() does the following for the original skb before\ncalling skb_mac_gso_segment()\n\n  1. reset skb->network_header\n  2. save the original skb->{mac_heaeder,mac_len} in a local variable\n  3. pull the NSH header\n  4. resets skb->mac_header\n  5. set up skb->mac_len and skb->protocol for the inner protocol.\n\nand does the following for the segmented skb\n\n  6. set ntohs(ETH_P_NSH) to skb->protocol\n  7. push the NSH header\n  8. restore skb->mac_header\n  9. set skb->mac_header + mac_len to skb->network_header\n 10. restore skb->mac_len\n\nThere are two problems in 6-7 and 8-9.\n\n  (a)\n  After 6 & 7, skb->data points to the NSH header, so the outer header\n  (ETH_P_8021AD in this case) is stripped when skb is sent out of netdev.\n\n  Also, if NSH is encapsulated by NSH + Ethernet (so NSH-Ethernet-NSH),\n  skb_pull() in the first nsh_gso_segment() will make skb->data point\n  to the middle of the outer NSH or Ethernet header because the Ethernet\n  header is not pulled by the second nsh_gso_segment().\n\n  (b)\n  While restoring skb->{mac_header,network_header} in 8 & 9,\n  nsh_gso_segment() does not assume that the data in the linear\n  buffer is shifted.\n\n  However, udp6_ufo_fragment() could shift the data and change\n  skb->mac_header accordingly as demonstrated by syzbot.\n\n  If this happens, even the restored skb->mac_header points to\n  the middle of the outer header.\n\nIt seems nsh_gso_segment() has never worked with outer headers so far.\n\nAt the end of nsh_gso_segment(), the outer header must be restored for\nthe segmented skb, instead of the NSH header.\n\nTo do that, let's calculate the outer header position relatively from\nthe inner header and set skb->{data,mac_header,protocol} properly.\n\n[0]:\nBUG: KMSAN: uninit-value in ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:524 [inline]\nBUG: KMSAN: uninit-value in ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\nBUG: KMSAN: uninit-value in ipvlan_queue_xmit+0xf44/0x16b0 drivers/net/ipvlan/ipvlan_core.c:668\n ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:524 [inline]\n ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\n ipvlan_queue_xmit+0xf44/0x16b0 drivers/net/ipvlan/ipvlan_core.c:668\n ipvlan_start_xmit+0x5c/0x1a0 drivers/net/ipvlan/ipvlan_main.c:222\n __netdev_start_xmit include/linux/netdevice.h:4989 [inline]\n netdev_start_xmit include/linux/netdevice.h:5003 [inline]\n xmit_one net/core/dev.c:3547 [inline]\n dev_hard_start_xmit+0x244/0xa10 net/core/dev.c:3563\n __dev_queue_xmit+0x33ed/0x51c0 net/core/dev.c:4351\n dev_queue_xmit include/linux/netdevice.h:3171 [inline]\n packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276\n packet_snd net/packet/af_packet.c:3081 [inline]\n packet_sendmsg+0x8aef/0x9f10 net/packet/af_packet.c:3113\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n __sys_sendto+0x735/0xa10 net/socket.c:2191\n __do_sys_sendto net/socket.c:2203 [inline]\n __se_sys_sendto net/socket.c:2199 [inline]\n __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:3819 [inline]\n slab_alloc_node mm/slub.c:3860 [inline]\n __do_kmalloc_node mm/slub.c:3980 [inline]\n __kmalloc_node_track_caller+0x705/0x1000 mm/slub.c:4001\n kmalloc_reserve+0x249/0x4a0 net/core/skbuff.c:582\n __\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36933",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/29a07f2ee4d273760c2acbfc756e29eccd82470a",
            "patch_url": "https://git.kernel.org/stable/p/29a07f2ee4d273760c2acbfc756e29eccd82470a",
            "filename": "CVE-2024-36933-29a07f2ee4d273760c2acbfc756e29eccd82470a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36933/CVE-2024-36933-29a07f2ee4d273760c2acbfc756e29eccd82470a.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/29a07f2ee4d273760c2acbfc756e29eccd82470a",
                "patch_url": "https://git.kernel.org/stable/p/29a07f2ee4d273760c2acbfc756e29eccd82470a",
                "filename": "CVE-2024-36933-29a07f2ee4d273760c2acbfc756e29eccd82470a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36933/CVE-2024-36933-29a07f2ee4d273760c2acbfc756e29eccd82470a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/37ed6f244ec5bda2e90b085084e322ea55d0aaa2",
                "patch_url": "https://git.kernel.org/stable/p/37ed6f244ec5bda2e90b085084e322ea55d0aaa2",
                "filename": "CVE-2024-36933-37ed6f244ec5bda2e90b085084e322ea55d0aaa2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36933/CVE-2024-36933-37ed6f244ec5bda2e90b085084e322ea55d0aaa2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/46134031c20fd313d03b90169d64b2e05ca6b65c",
                "patch_url": "https://git.kernel.org/stable/p/46134031c20fd313d03b90169d64b2e05ca6b65c",
                "filename": "CVE-2024-36933-46134031c20fd313d03b90169d64b2e05ca6b65c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36933/CVE-2024-36933-46134031c20fd313d03b90169d64b2e05ca6b65c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4b911a9690d72641879ea6d13cce1de31d346d79",
                "patch_url": "https://git.kernel.org/stable/p/4b911a9690d72641879ea6d13cce1de31d346d79",
                "filename": "CVE-2024-36933-4b911a9690d72641879ea6d13cce1de31d346d79.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36933/CVE-2024-36933-4b911a9690d72641879ea6d13cce1de31d346d79.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5a4603fbc285752d19e4b415466db18ef3617e4a",
                "patch_url": "https://git.kernel.org/stable/p/5a4603fbc285752d19e4b415466db18ef3617e4a",
                "filename": "CVE-2024-36933-5a4603fbc285752d19e4b415466db18ef3617e4a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36933/CVE-2024-36933-5a4603fbc285752d19e4b415466db18ef3617e4a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/696d18bb59727a2e0526c0802a812620be1c9340",
                "patch_url": "https://git.kernel.org/stable/p/696d18bb59727a2e0526c0802a812620be1c9340",
                "filename": "CVE-2024-36933-696d18bb59727a2e0526c0802a812620be1c9340.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36933/CVE-2024-36933-696d18bb59727a2e0526c0802a812620be1c9340.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a7c2c3c1caabcb4a3d6c47284c397507aaf54fe9",
                "patch_url": "https://git.kernel.org/stable/p/a7c2c3c1caabcb4a3d6c47284c397507aaf54fe9",
                "filename": "CVE-2024-36933-a7c2c3c1caabcb4a3d6c47284c397507aaf54fe9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36933/CVE-2024-36933-a7c2c3c1caabcb4a3d6c47284c397507aaf54fe9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bbccf0caef2fa917d6d0692385a06ce3c262a216",
                "patch_url": "https://git.kernel.org/stable/p/bbccf0caef2fa917d6d0692385a06ce3c262a216",
                "filename": "CVE-2024-36933-bbccf0caef2fa917d6d0692385a06ce3c262a216.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36933/CVE-2024-36933-bbccf0caef2fa917d6d0692385a06ce3c262a216.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/29a07f2ee4d273760c2acbfc756e29eccd82470a",
            "https://git.kernel.org/stable/c/37ed6f244ec5bda2e90b085084e322ea55d0aaa2",
            "https://git.kernel.org/stable/c/46134031c20fd313d03b90169d64b2e05ca6b65c",
            "https://git.kernel.org/stable/c/4b911a9690d72641879ea6d13cce1de31d346d79",
            "https://git.kernel.org/stable/c/5a4603fbc285752d19e4b415466db18ef3617e4a",
            "https://git.kernel.org/stable/c/696d18bb59727a2e0526c0802a812620be1c9340",
            "https://git.kernel.org/stable/c/a7c2c3c1caabcb4a3d6c47284c397507aaf54fe9",
            "https://git.kernel.org/stable/c/bbccf0caef2fa917d6d0692385a06ce3c262a216",
            "https://www.cve.org/CVERecord?id=CVE-2024-36933\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36933\nhttps://lore.kernel.org/linux-cve-announce/2024053042-CVE-2024-36933-444e@gregkh/T"
        ]
    },
    "CVE-2024-36939": {
        "cve": "CVE-2024-36939",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: Handle error of rpc_proc_register() in nfs_net_init().\n\nsyzkaller reported a warning [0] triggered while destroying immature\nnetns.\n\nrpc_proc_register() was called in init_nfs_fs(), but its error\nhas been ignored since at least the initial commit 1da177e4c3f4\n(\"Linux-2.6.12-rc2\").\n\nRecently, commit d47151b79e32 (\"nfs: expose /proc/net/sunrpc/nfs\nin net namespaces\") converted the procfs to per-netns and made\nthe problem more visible.\n\nEven when rpc_proc_register() fails, nfs_net_init() could succeed,\nand thus nfs_net_exit() will be called while destroying the netns.\n\nThen, remove_proc_entry() will be called for non-existing proc\ndirectory and trigger the warning below.\n\nLet's handle the error of rpc_proc_register() properly in nfs_net_init().\n\n[0]:\nname 'nfs'\nWARNING: CPU: 1 PID: 1710 at fs/proc/generic.c:711 remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711\nModules linked in:\nCPU: 1 PID: 1710 Comm: syz-executor.2 Not tainted 6.8.0-12822-gcd51db110a7e #12\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711\nCode: 41 5d 41 5e c3 e8 85 09 b5 ff 48 c7 c7 88 58 64 86 e8 09 0e 71 02 e8 74 09 b5 ff 4c 89 e6 48 c7 c7 de 1b 80 84 e8 c5 ad 97 ff <0f> 0b eb b1 e8 5c 09 b5 ff 48 c7 c7 88 58 64 86 e8 e0 0d 71 02 eb\nRSP: 0018:ffffc9000c6d7ce0 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: ffff8880422b8b00 RCX: ffffffff8110503c\nRDX: ffff888030652f00 RSI: ffffffff81105045 RDI: 0000000000000001\nRBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000001 R11: ffffffff81bb62cb R12: ffffffff84807ffc\nR13: ffff88804ad6fcc0 R14: ffffffff84807ffc R15: ffffffff85741ff8\nFS:  00007f30cfba8640(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ff51afe8000 CR3: 000000005a60a005 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n <TASK>\n rpc_proc_unregister+0x64/0x70 net/sunrpc/stats.c:310\n nfs_net_exit+0x1c/0x30 fs/nfs/inode.c:2438\n ops_exit_list+0x62/0xb0 net/core/net_namespace.c:170\n setup_net+0x46c/0x660 net/core/net_namespace.c:372\n copy_net_ns+0x244/0x590 net/core/net_namespace.c:505\n create_new_namespaces+0x2ed/0x770 kernel/nsproxy.c:110\n unshare_nsproxy_namespaces+0xae/0x160 kernel/nsproxy.c:228\n ksys_unshare+0x342/0x760 kernel/fork.c:3322\n __do_sys_unshare kernel/fork.c:3393 [inline]\n __se_sys_unshare kernel/fork.c:3391 [inline]\n __x64_sys_unshare+0x1f/0x30 kernel/fork.c:3391\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x4f/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x46/0x4e\nRIP: 0033:0x7f30d0febe5d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48\nRSP: 002b:00007f30cfba7cc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000110\nRAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f30d0febe5d\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c020600\nRBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002\nR13: 000000000000000b R14: 00007f30d104c530 R15: 0000000000000000\n </TASK>",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36939",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/24457f1be29f1e7042e50a7749f5c2dde8c433c8",
            "patch_url": "https://git.kernel.org/stable/p/24457f1be29f1e7042e50a7749f5c2dde8c433c8",
            "filename": "CVE-2024-36939-24457f1be29f1e7042e50a7749f5c2dde8c433c8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36939/CVE-2024-36939-24457f1be29f1e7042e50a7749f5c2dde8c433c8.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/24457f1be29f1e7042e50a7749f5c2dde8c433c8",
                "patch_url": "https://git.kernel.org/stable/p/24457f1be29f1e7042e50a7749f5c2dde8c433c8",
                "filename": "CVE-2024-36939-24457f1be29f1e7042e50a7749f5c2dde8c433c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36939/CVE-2024-36939-24457f1be29f1e7042e50a7749f5c2dde8c433c8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8a1f89c98dcc542dd6d287e573523714702e0f9c",
                "patch_url": "https://git.kernel.org/stable/p/8a1f89c98dcc542dd6d287e573523714702e0f9c",
                "filename": "CVE-2024-36939-8a1f89c98dcc542dd6d287e573523714702e0f9c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36939/CVE-2024-36939-8a1f89c98dcc542dd6d287e573523714702e0f9c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8ae63bd858691bee0e2a92571f2fbb36a4d86d65",
                "patch_url": "https://git.kernel.org/stable/p/8ae63bd858691bee0e2a92571f2fbb36a4d86d65",
                "filename": "CVE-2024-36939-8ae63bd858691bee0e2a92571f2fbb36a4d86d65.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36939/CVE-2024-36939-8ae63bd858691bee0e2a92571f2fbb36a4d86d65.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9909dde2e53a19585212c32fe3eda482b5faaaa3",
                "patch_url": "https://git.kernel.org/stable/p/9909dde2e53a19585212c32fe3eda482b5faaaa3",
                "filename": "CVE-2024-36939-9909dde2e53a19585212c32fe3eda482b5faaaa3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36939/CVE-2024-36939-9909dde2e53a19585212c32fe3eda482b5faaaa3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b33ca18c3a1190208dfd569c4fa8a2f93084709f",
                "patch_url": "https://git.kernel.org/stable/p/b33ca18c3a1190208dfd569c4fa8a2f93084709f",
                "filename": "CVE-2024-36939-b33ca18c3a1190208dfd569c4fa8a2f93084709f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36939/CVE-2024-36939-b33ca18c3a1190208dfd569c4fa8a2f93084709f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d4891d817350c67392d4731536945f3809a2a0ba",
                "patch_url": "https://git.kernel.org/stable/p/d4891d817350c67392d4731536945f3809a2a0ba",
                "filename": "CVE-2024-36939-d4891d817350c67392d4731536945f3809a2a0ba.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36939/CVE-2024-36939-d4891d817350c67392d4731536945f3809a2a0ba.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ea6ce93327bd2c8a0c6cf6f2f0e800f3b778f021",
                "patch_url": "https://git.kernel.org/stable/p/ea6ce93327bd2c8a0c6cf6f2f0e800f3b778f021",
                "filename": "CVE-2024-36939-ea6ce93327bd2c8a0c6cf6f2f0e800f3b778f021.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36939/CVE-2024-36939-ea6ce93327bd2c8a0c6cf6f2f0e800f3b778f021.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/24457f1be29f1e7042e50a7749f5c2dde8c433c8",
            "https://git.kernel.org/stable/c/8a1f89c98dcc542dd6d287e573523714702e0f9c",
            "https://git.kernel.org/stable/c/8ae63bd858691bee0e2a92571f2fbb36a4d86d65",
            "https://git.kernel.org/stable/c/9909dde2e53a19585212c32fe3eda482b5faaaa3",
            "https://git.kernel.org/stable/c/b33ca18c3a1190208dfd569c4fa8a2f93084709f",
            "https://git.kernel.org/stable/c/d4891d817350c67392d4731536945f3809a2a0ba",
            "https://git.kernel.org/stable/c/ea6ce93327bd2c8a0c6cf6f2f0e800f3b778f021",
            "https://www.cve.org/CVERecord?id=CVE-2024-36939\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36939\nhttps://lore.kernel.org/linux-cve-announce/2024053043-CVE-2024-36939-8453@gregkh/T"
        ]
    },
    "CVE-2024-36940": {
        "cve": "CVE-2024-36940",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: core: delete incorrect free in pinctrl_enable()\n\nThe \"pctldev\" struct is allocated in devm_pinctrl_register_and_init().\nIt's a devm_ managed pointer that is freed by devm_pinctrl_dev_release(),\nso freeing it in pinctrl_enable() will lead to a double free.\n\nThe devm_pinctrl_dev_release() function frees the pindescs and destroys\nthe mutex as well.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36940",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/288bc4aa75f150d6f1ee82dd43c6da1b438b6068",
            "patch_url": "https://git.kernel.org/stable/p/288bc4aa75f150d6f1ee82dd43c6da1b438b6068",
            "filename": "CVE-2024-36940-288bc4aa75f150d6f1ee82dd43c6da1b438b6068.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36940/CVE-2024-36940-288bc4aa75f150d6f1ee82dd43c6da1b438b6068.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/288bc4aa75f150d6f1ee82dd43c6da1b438b6068",
                "patch_url": "https://git.kernel.org/stable/p/288bc4aa75f150d6f1ee82dd43c6da1b438b6068",
                "filename": "CVE-2024-36940-288bc4aa75f150d6f1ee82dd43c6da1b438b6068.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36940/CVE-2024-36940-288bc4aa75f150d6f1ee82dd43c6da1b438b6068.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/41f88ef8ba387a12f4a2b8c400b6c9e8e54b2cca",
                "patch_url": "https://git.kernel.org/stable/p/41f88ef8ba387a12f4a2b8c400b6c9e8e54b2cca",
                "filename": "CVE-2024-36940-41f88ef8ba387a12f4a2b8c400b6c9e8e54b2cca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36940/CVE-2024-36940-41f88ef8ba387a12f4a2b8c400b6c9e8e54b2cca.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5038a66dad0199de60e5671603ea6623eb9e5c79",
                "patch_url": "https://git.kernel.org/stable/p/5038a66dad0199de60e5671603ea6623eb9e5c79",
                "filename": "CVE-2024-36940-5038a66dad0199de60e5671603ea6623eb9e5c79.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36940/CVE-2024-36940-5038a66dad0199de60e5671603ea6623eb9e5c79.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/558c8039fdf596a584a92c171cbf3298919c448c",
                "patch_url": "https://git.kernel.org/stable/p/558c8039fdf596a584a92c171cbf3298919c448c",
                "filename": "CVE-2024-36940-558c8039fdf596a584a92c171cbf3298919c448c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36940/CVE-2024-36940-558c8039fdf596a584a92c171cbf3298919c448c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/735f4c6b6771eafe336404c157ca683ad72a040d",
                "patch_url": "https://git.kernel.org/stable/p/735f4c6b6771eafe336404c157ca683ad72a040d",
                "filename": "CVE-2024-36940-735f4c6b6771eafe336404c157ca683ad72a040d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36940/CVE-2024-36940-735f4c6b6771eafe336404c157ca683ad72a040d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ac7d65795827dc0cf7662384ed27caf4066bd72e",
                "patch_url": "https://git.kernel.org/stable/p/ac7d65795827dc0cf7662384ed27caf4066bd72e",
                "filename": "CVE-2024-36940-ac7d65795827dc0cf7662384ed27caf4066bd72e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36940/CVE-2024-36940-ac7d65795827dc0cf7662384ed27caf4066bd72e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cdaa171473d98962ae86f2a663d398fda2fbeefd",
                "patch_url": "https://git.kernel.org/stable/p/cdaa171473d98962ae86f2a663d398fda2fbeefd",
                "filename": "CVE-2024-36940-cdaa171473d98962ae86f2a663d398fda2fbeefd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36940/CVE-2024-36940-cdaa171473d98962ae86f2a663d398fda2fbeefd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f9f1e321d53e4c5b666b66e5b43da29841fb55ba",
                "patch_url": "https://git.kernel.org/stable/p/f9f1e321d53e4c5b666b66e5b43da29841fb55ba",
                "filename": "CVE-2024-36940-f9f1e321d53e4c5b666b66e5b43da29841fb55ba.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36940/CVE-2024-36940-f9f1e321d53e4c5b666b66e5b43da29841fb55ba.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/288bc4aa75f150d6f1ee82dd43c6da1b438b6068",
            "https://git.kernel.org/stable/c/41f88ef8ba387a12f4a2b8c400b6c9e8e54b2cca",
            "https://git.kernel.org/stable/c/5038a66dad0199de60e5671603ea6623eb9e5c79",
            "https://git.kernel.org/stable/c/558c8039fdf596a584a92c171cbf3298919c448c",
            "https://git.kernel.org/stable/c/735f4c6b6771eafe336404c157ca683ad72a040d",
            "https://git.kernel.org/stable/c/ac7d65795827dc0cf7662384ed27caf4066bd72e",
            "https://git.kernel.org/stable/c/cdaa171473d98962ae86f2a663d398fda2fbeefd",
            "https://git.kernel.org/stable/c/f9f1e321d53e4c5b666b66e5b43da29841fb55ba",
            "https://www.cve.org/CVERecord?id=CVE-2024-36940\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36940\nhttps://lore.kernel.org/linux-cve-announce/2024053043-CVE-2024-36940-0c83@gregkh/T"
        ]
    },
    "CVE-2024-36941": {
        "cve": "CVE-2024-36941",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: nl80211: don't free NULL coalescing rule\n\nIf the parsing fails, we can dereference a NULL pointer here.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36941",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/b0db4caa10f2e4e811cf88744fbf0d074b67ec1f",
            "patch_url": "https://git.kernel.org/stable/p/b0db4caa10f2e4e811cf88744fbf0d074b67ec1f",
            "filename": "CVE-2024-36941-b0db4caa10f2e4e811cf88744fbf0d074b67ec1f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36941/CVE-2024-36941-b0db4caa10f2e4e811cf88744fbf0d074b67ec1f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/244822c09b4f9aedfb5977f03c0deeb39da8ec7d",
                "patch_url": "https://git.kernel.org/stable/p/244822c09b4f9aedfb5977f03c0deeb39da8ec7d",
                "filename": "CVE-2024-36941-244822c09b4f9aedfb5977f03c0deeb39da8ec7d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36941/CVE-2024-36941-244822c09b4f9aedfb5977f03c0deeb39da8ec7d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/327382dc0f16b268950b96e0052595efd80f7b0a",
                "patch_url": "https://git.kernel.org/stable/p/327382dc0f16b268950b96e0052595efd80f7b0a",
                "filename": "CVE-2024-36941-327382dc0f16b268950b96e0052595efd80f7b0a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36941/CVE-2024-36941-327382dc0f16b268950b96e0052595efd80f7b0a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5a730a161ac2290d46d49be76b2b1aee8d2eb307",
                "patch_url": "https://git.kernel.org/stable/p/5a730a161ac2290d46d49be76b2b1aee8d2eb307",
                "filename": "CVE-2024-36941-5a730a161ac2290d46d49be76b2b1aee8d2eb307.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36941/CVE-2024-36941-5a730a161ac2290d46d49be76b2b1aee8d2eb307.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/801ea33ae82d6a9d954074fbcf8ea9d18f1543a7",
                "patch_url": "https://git.kernel.org/stable/p/801ea33ae82d6a9d954074fbcf8ea9d18f1543a7",
                "filename": "CVE-2024-36941-801ea33ae82d6a9d954074fbcf8ea9d18f1543a7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36941/CVE-2024-36941-801ea33ae82d6a9d954074fbcf8ea9d18f1543a7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/97792d0611ae2e6fe3ccefb0a94a1d802317c457",
                "patch_url": "https://git.kernel.org/stable/p/97792d0611ae2e6fe3ccefb0a94a1d802317c457",
                "filename": "CVE-2024-36941-97792d0611ae2e6fe3ccefb0a94a1d802317c457.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36941/CVE-2024-36941-97792d0611ae2e6fe3ccefb0a94a1d802317c457.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ad12c74e953b68ad85c78adc6408ed8435c64af4",
                "patch_url": "https://git.kernel.org/stable/p/ad12c74e953b68ad85c78adc6408ed8435c64af4",
                "filename": "CVE-2024-36941-ad12c74e953b68ad85c78adc6408ed8435c64af4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36941/CVE-2024-36941-ad12c74e953b68ad85c78adc6408ed8435c64af4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b0db4caa10f2e4e811cf88744fbf0d074b67ec1f",
                "patch_url": "https://git.kernel.org/stable/p/b0db4caa10f2e4e811cf88744fbf0d074b67ec1f",
                "filename": "CVE-2024-36941-b0db4caa10f2e4e811cf88744fbf0d074b67ec1f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36941/CVE-2024-36941-b0db4caa10f2e4e811cf88744fbf0d074b67ec1f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f92772a642485394db5c9a17bd0ee73fc6902383",
                "patch_url": "https://git.kernel.org/stable/p/f92772a642485394db5c9a17bd0ee73fc6902383",
                "filename": "CVE-2024-36941-f92772a642485394db5c9a17bd0ee73fc6902383.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36941/CVE-2024-36941-f92772a642485394db5c9a17bd0ee73fc6902383.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/244822c09b4f9aedfb5977f03c0deeb39da8ec7d",
            "https://git.kernel.org/stable/c/327382dc0f16b268950b96e0052595efd80f7b0a",
            "https://git.kernel.org/stable/c/5a730a161ac2290d46d49be76b2b1aee8d2eb307",
            "https://git.kernel.org/stable/c/801ea33ae82d6a9d954074fbcf8ea9d18f1543a7",
            "https://git.kernel.org/stable/c/97792d0611ae2e6fe3ccefb0a94a1d802317c457",
            "https://git.kernel.org/stable/c/ad12c74e953b68ad85c78adc6408ed8435c64af4",
            "https://git.kernel.org/stable/c/b0db4caa10f2e4e811cf88744fbf0d074b67ec1f",
            "https://git.kernel.org/stable/c/f92772a642485394db5c9a17bd0ee73fc6902383",
            "https://www.cve.org/CVERecord?id=CVE-2024-36941\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36941\nhttps://lore.kernel.org/linux-cve-announce/2024053043-CVE-2024-36941-b3a3@gregkh/T"
        ]
    },
    "CVE-2024-36945": {
        "cve": "CVE-2024-36945",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: fix neighbour and rtable leak in smc_ib_find_route()\n\nIn smc_ib_find_route(), the neighbour found by neigh_lookup() and rtable\nresolved by ip_route_output_flow() are not released or put before return.\nIt may cause the refcount leak, so fix it.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36945",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2ddc0dd7fec86ee53b8928a5cca5fbddd4fc7c06",
            "patch_url": "https://git.kernel.org/stable/p/2ddc0dd7fec86ee53b8928a5cca5fbddd4fc7c06",
            "filename": "CVE-2024-36945-2ddc0dd7fec86ee53b8928a5cca5fbddd4fc7c06.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36945/CVE-2024-36945-2ddc0dd7fec86ee53b8928a5cca5fbddd4fc7c06.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2ddc0dd7fec86ee53b8928a5cca5fbddd4fc7c06",
                "patch_url": "https://git.kernel.org/stable/p/2ddc0dd7fec86ee53b8928a5cca5fbddd4fc7c06",
                "filename": "CVE-2024-36945-2ddc0dd7fec86ee53b8928a5cca5fbddd4fc7c06.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36945/CVE-2024-36945-2ddc0dd7fec86ee53b8928a5cca5fbddd4fc7c06.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5df93c029a907b0ff5a4eeadd77ba06ff0a277d2",
                "patch_url": "https://git.kernel.org/stable/p/5df93c029a907b0ff5a4eeadd77ba06ff0a277d2",
                "filename": "CVE-2024-36945-5df93c029a907b0ff5a4eeadd77ba06ff0a277d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36945/CVE-2024-36945-5df93c029a907b0ff5a4eeadd77ba06ff0a277d2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d5a466ab6e78d6f2e0f64435f1e17246c8e941ff",
                "patch_url": "https://git.kernel.org/stable/p/d5a466ab6e78d6f2e0f64435f1e17246c8e941ff",
                "filename": "CVE-2024-36945-d5a466ab6e78d6f2e0f64435f1e17246c8e941ff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36945/CVE-2024-36945-d5a466ab6e78d6f2e0f64435f1e17246c8e941ff.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/da91e447d06dc649fcf46e59122e7bf8f0b2e0db",
                "patch_url": "https://git.kernel.org/stable/p/da91e447d06dc649fcf46e59122e7bf8f0b2e0db",
                "filename": "CVE-2024-36945-da91e447d06dc649fcf46e59122e7bf8f0b2e0db.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36945/CVE-2024-36945-da91e447d06dc649fcf46e59122e7bf8f0b2e0db.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2ddc0dd7fec86ee53b8928a5cca5fbddd4fc7c06",
            "https://git.kernel.org/stable/c/5df93c029a907b0ff5a4eeadd77ba06ff0a277d2",
            "https://git.kernel.org/stable/c/d5a466ab6e78d6f2e0f64435f1e17246c8e941ff",
            "https://git.kernel.org/stable/c/da91e447d06dc649fcf46e59122e7bf8f0b2e0db",
            "https://www.cve.org/CVERecord?id=CVE-2024-36945\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36945\nhttps://lore.kernel.org/linux-cve-announce/2024053039-CVE-2024-36945-18ae@gregkh/T"
        ]
    },
    "CVE-2024-36950": {
        "cve": "CVE-2024-36950",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: ohci: mask bus reset interrupts between ISR and bottom half\n\nIn the FireWire OHCI interrupt handler, if a bus reset interrupt has\noccurred, mask bus reset interrupts until bus_reset_work has serviced and\ncleared the interrupt.\n\nNormally, we always leave bus reset interrupts masked. We infer the bus\nreset from the self-ID interrupt that happens shortly thereafter. A\nscenario where we unmask bus reset interrupts was introduced in 2008 in\na007bb857e0b26f5d8b73c2ff90782d9c0972620: If\nOHCI_PARAM_DEBUG_BUSRESETS (8) is set in the debug parameter bitmask, we\nwill unmask bus reset interrupts so we can log them.\n\nirq_handler logs the bus reset interrupt. However, we can't clear the bus\nreset event flag in irq_handler, because we won't service the event until\nlater. irq_handler exits with the event flag still set. If the\ncorresponding interrupt is still unmasked, the first bus reset will\nusually freeze the system due to irq_handler being called again each\ntime it exits. This freeze can be reproduced by loading firewire_ohci\nwith \"modprobe firewire_ohci debug=-1\" (to enable all debugging output).\nApparently there are also some cases where bus_reset_work will get called\nsoon enough to clear the event, and operation will continue normally.\n\nThis freeze was first reported a few months after a007bb85 was committed,\nbut until now it was never fixed. The debug level could safely be set\nto -1 through sysfs after the module was loaded, but this would be\nineffectual in logging bus reset interrupts since they were only\nunmasked during initialization.\n\nirq_handler will now leave the event flag set but mask bus reset\ninterrupts, so irq_handler won't be called again and there will be no\nfreeze. If OHCI_PARAM_DEBUG_BUSRESETS is enabled, bus_reset_work will\nunmask the interrupt after servicing the event, so future interrupts\nwill be caught as desired.\n\nAs a side effect to this change, OHCI_PARAM_DEBUG_BUSRESETS can now be\nenabled through sysfs in addition to during initial module loading.\nHowever, when enabled through sysfs, logging of bus reset interrupts will\nbe effective only starting with the second bus reset, after\nbus_reset_work has executed.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36950",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4f9cc355c328fc4f41cbd9c4cd58b235184fa420",
            "patch_url": "https://git.kernel.org/stable/p/4f9cc355c328fc4f41cbd9c4cd58b235184fa420",
            "filename": "CVE-2024-36950-4f9cc355c328fc4f41cbd9c4cd58b235184fa420.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36950/CVE-2024-36950-4f9cc355c328fc4f41cbd9c4cd58b235184fa420.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/31279bbca40d2f40cb3bbb6d538ec9620a645dec",
                "patch_url": "https://git.kernel.org/stable/p/31279bbca40d2f40cb3bbb6d538ec9620a645dec",
                "filename": "CVE-2024-36950-31279bbca40d2f40cb3bbb6d538ec9620a645dec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36950/CVE-2024-36950-31279bbca40d2f40cb3bbb6d538ec9620a645dec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f9cc355c328fc4f41cbd9c4cd58b235184fa420",
                "patch_url": "https://git.kernel.org/stable/p/4f9cc355c328fc4f41cbd9c4cd58b235184fa420",
                "filename": "CVE-2024-36950-4f9cc355c328fc4f41cbd9c4cd58b235184fa420.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36950/CVE-2024-36950-4f9cc355c328fc4f41cbd9c4cd58b235184fa420.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5982887de60c1b84f9c0ca07c835814d07fd1da0",
                "patch_url": "https://git.kernel.org/stable/p/5982887de60c1b84f9c0ca07c835814d07fd1da0",
                "filename": "CVE-2024-36950-5982887de60c1b84f9c0ca07c835814d07fd1da0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36950/CVE-2024-36950-5982887de60c1b84f9c0ca07c835814d07fd1da0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6fafe3661712b143d9c69a7322294bd53f559d5d",
                "patch_url": "https://git.kernel.org/stable/p/6fafe3661712b143d9c69a7322294bd53f559d5d",
                "filename": "CVE-2024-36950-6fafe3661712b143d9c69a7322294bd53f559d5d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36950/CVE-2024-36950-6fafe3661712b143d9c69a7322294bd53f559d5d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/752e3c53de0fa3b7d817a83050b6699b8e9c6ec9",
                "patch_url": "https://git.kernel.org/stable/p/752e3c53de0fa3b7d817a83050b6699b8e9c6ec9",
                "filename": "CVE-2024-36950-752e3c53de0fa3b7d817a83050b6699b8e9c6ec9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36950/CVE-2024-36950-752e3c53de0fa3b7d817a83050b6699b8e9c6ec9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8643332aac0576581cfdf01798ea3e4e0d624b61",
                "patch_url": "https://git.kernel.org/stable/p/8643332aac0576581cfdf01798ea3e4e0d624b61",
                "filename": "CVE-2024-36950-8643332aac0576581cfdf01798ea3e4e0d624b61.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36950/CVE-2024-36950-8643332aac0576581cfdf01798ea3e4e0d624b61.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b3948c69d60279fce5b2eeda92a07d66296c8130",
                "patch_url": "https://git.kernel.org/stable/p/b3948c69d60279fce5b2eeda92a07d66296c8130",
                "filename": "CVE-2024-36950-b3948c69d60279fce5b2eeda92a07d66296c8130.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36950/CVE-2024-36950-b3948c69d60279fce5b2eeda92a07d66296c8130.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fa273f312334246c909475c5868e6daab889cc8c",
                "patch_url": "https://git.kernel.org/stable/p/fa273f312334246c909475c5868e6daab889cc8c",
                "filename": "CVE-2024-36950-fa273f312334246c909475c5868e6daab889cc8c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36950/CVE-2024-36950-fa273f312334246c909475c5868e6daab889cc8c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/31279bbca40d2f40cb3bbb6d538ec9620a645dec",
            "https://git.kernel.org/stable/c/4f9cc355c328fc4f41cbd9c4cd58b235184fa420",
            "https://git.kernel.org/stable/c/5982887de60c1b84f9c0ca07c835814d07fd1da0",
            "https://git.kernel.org/stable/c/6fafe3661712b143d9c69a7322294bd53f559d5d",
            "https://git.kernel.org/stable/c/752e3c53de0fa3b7d817a83050b6699b8e9c6ec9",
            "https://git.kernel.org/stable/c/8643332aac0576581cfdf01798ea3e4e0d624b61",
            "https://git.kernel.org/stable/c/b3948c69d60279fce5b2eeda92a07d66296c8130",
            "https://git.kernel.org/stable/c/fa273f312334246c909475c5868e6daab889cc8c",
            "https://www.cve.org/CVERecord?id=CVE-2024-36950\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36950\nhttps://lore.kernel.org/linux-cve-announce/2024053040-CVE-2024-36950-9f0e@gregkh/T"
        ]
    },
    "CVE-2024-36953": {
        "cve": "CVE-2024-36953",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()\n\nvgic_v2_parse_attr() is responsible for finding the vCPU that matches\nthe user-provided CPUID, which (of course) may not be valid. If the ID\nis invalid, kvm_get_vcpu_by_id() returns NULL, which isn't handled\ngracefully.\n\nSimilar to the GICv3 uaccess flow, check that kvm_get_vcpu_by_id()\nactually returns something and fail the ioctl if not.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36953",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/01981276d64e542c177b243f7c979fee855d5487",
            "patch_url": "https://git.kernel.org/stable/p/01981276d64e542c177b243f7c979fee855d5487",
            "filename": "CVE-2024-36953-01981276d64e542c177b243f7c979fee855d5487.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36953/CVE-2024-36953-01981276d64e542c177b243f7c979fee855d5487.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/01981276d64e542c177b243f7c979fee855d5487",
                "patch_url": "https://git.kernel.org/stable/p/01981276d64e542c177b243f7c979fee855d5487",
                "filename": "CVE-2024-36953-01981276d64e542c177b243f7c979fee855d5487.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36953/CVE-2024-36953-01981276d64e542c177b243f7c979fee855d5487.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/17db92da8be5dd3bf63c01f4109fe47db64fc66f",
                "patch_url": "https://git.kernel.org/stable/p/17db92da8be5dd3bf63c01f4109fe47db64fc66f",
                "filename": "CVE-2024-36953-17db92da8be5dd3bf63c01f4109fe47db64fc66f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36953/CVE-2024-36953-17db92da8be5dd3bf63c01f4109fe47db64fc66f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3a5b0378ac6776c7c31b18e0f3c1389bd6005e80",
                "patch_url": "https://git.kernel.org/stable/p/3a5b0378ac6776c7c31b18e0f3c1389bd6005e80",
                "filename": "CVE-2024-36953-3a5b0378ac6776c7c31b18e0f3c1389bd6005e80.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36953/CVE-2024-36953-3a5b0378ac6776c7c31b18e0f3c1389bd6005e80.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4404465a1bee3607ad90a4c5f9e16dfd75b85728",
                "patch_url": "https://git.kernel.org/stable/p/4404465a1bee3607ad90a4c5f9e16dfd75b85728",
                "filename": "CVE-2024-36953-4404465a1bee3607ad90a4c5f9e16dfd75b85728.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36953/CVE-2024-36953-4404465a1bee3607ad90a4c5f9e16dfd75b85728.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6ddb4f372fc63210034b903d96ebbeb3c7195adb",
                "patch_url": "https://git.kernel.org/stable/p/6ddb4f372fc63210034b903d96ebbeb3c7195adb",
                "filename": "CVE-2024-36953-6ddb4f372fc63210034b903d96ebbeb3c7195adb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36953/CVE-2024-36953-6ddb4f372fc63210034b903d96ebbeb3c7195adb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8d6a1c8e3de36cb0f5e866f1a582b00939e23104",
                "patch_url": "https://git.kernel.org/stable/p/8d6a1c8e3de36cb0f5e866f1a582b00939e23104",
                "filename": "CVE-2024-36953-8d6a1c8e3de36cb0f5e866f1a582b00939e23104.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36953/CVE-2024-36953-8d6a1c8e3de36cb0f5e866f1a582b00939e23104.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/01981276d64e542c177b243f7c979fee855d5487",
            "https://git.kernel.org/stable/c/17db92da8be5dd3bf63c01f4109fe47db64fc66f",
            "https://git.kernel.org/stable/c/3a5b0378ac6776c7c31b18e0f3c1389bd6005e80",
            "https://git.kernel.org/stable/c/4404465a1bee3607ad90a4c5f9e16dfd75b85728",
            "https://git.kernel.org/stable/c/6ddb4f372fc63210034b903d96ebbeb3c7195adb",
            "https://git.kernel.org/stable/c/8d6a1c8e3de36cb0f5e866f1a582b00939e23104",
            "https://www.cve.org/CVERecord?id=CVE-2024-36953\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36953\nhttps://lore.kernel.org/linux-cve-announce/2024053040-CVE-2024-36953-fc12@gregkh/T"
        ]
    },
    "CVE-2024-36954": {
        "cve": "CVE-2024-36954",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix a possible memleak in tipc_buf_append\n\n__skb_linearize() doesn't free the skb when it fails, so move\n'*buf = NULL' after __skb_linearize(), so that the skb can be\nfreed on the err path.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36954",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/adbce6d20da6254c86425a8d4359b221b5ccbccd",
            "patch_url": "https://git.kernel.org/stable/p/adbce6d20da6254c86425a8d4359b221b5ccbccd",
            "filename": "CVE-2024-36954-adbce6d20da6254c86425a8d4359b221b5ccbccd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36954/CVE-2024-36954-adbce6d20da6254c86425a8d4359b221b5ccbccd.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/01cd1b7b685751ee422d00d050292a3d277652d6",
                "patch_url": "https://git.kernel.org/stable/p/01cd1b7b685751ee422d00d050292a3d277652d6",
                "filename": "CVE-2024-36954-01cd1b7b685751ee422d00d050292a3d277652d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36954/CVE-2024-36954-01cd1b7b685751ee422d00d050292a3d277652d6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f87fd9476cf9725d774e6dcb7d17859c6a6d1ae",
                "patch_url": "https://git.kernel.org/stable/p/2f87fd9476cf9725d774e6dcb7d17859c6a6d1ae",
                "filename": "CVE-2024-36954-2f87fd9476cf9725d774e6dcb7d17859c6a6d1ae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36954/CVE-2024-36954-2f87fd9476cf9725d774e6dcb7d17859c6a6d1ae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3210d34fda4caff212cb53729e6bd46de604d565",
                "patch_url": "https://git.kernel.org/stable/p/3210d34fda4caff212cb53729e6bd46de604d565",
                "filename": "CVE-2024-36954-3210d34fda4caff212cb53729e6bd46de604d565.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36954/CVE-2024-36954-3210d34fda4caff212cb53729e6bd46de604d565.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/42c8471b0566c7539e7dd584b4d0ebd3cec8cb2c",
                "patch_url": "https://git.kernel.org/stable/p/42c8471b0566c7539e7dd584b4d0ebd3cec8cb2c",
                "filename": "CVE-2024-36954-42c8471b0566c7539e7dd584b4d0ebd3cec8cb2c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36954/CVE-2024-36954-42c8471b0566c7539e7dd584b4d0ebd3cec8cb2c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/614c5a5ae45a921595952117b2e2bd4d4bf9b574",
                "patch_url": "https://git.kernel.org/stable/p/614c5a5ae45a921595952117b2e2bd4d4bf9b574",
                "filename": "CVE-2024-36954-614c5a5ae45a921595952117b2e2bd4d4bf9b574.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36954/CVE-2024-36954-614c5a5ae45a921595952117b2e2bd4d4bf9b574.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/97bf6f81b29a8efaf5d0983251a7450e5794370d",
                "patch_url": "https://git.kernel.org/stable/p/97bf6f81b29a8efaf5d0983251a7450e5794370d",
                "filename": "CVE-2024-36954-97bf6f81b29a8efaf5d0983251a7450e5794370d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36954/CVE-2024-36954-97bf6f81b29a8efaf5d0983251a7450e5794370d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/adbce6d20da6254c86425a8d4359b221b5ccbccd",
                "patch_url": "https://git.kernel.org/stable/p/adbce6d20da6254c86425a8d4359b221b5ccbccd",
                "filename": "CVE-2024-36954-adbce6d20da6254c86425a8d4359b221b5ccbccd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36954/CVE-2024-36954-adbce6d20da6254c86425a8d4359b221b5ccbccd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d03a82f4f8144befdc10518e732e2a60b34c870e",
                "patch_url": "https://git.kernel.org/stable/p/d03a82f4f8144befdc10518e732e2a60b34c870e",
                "filename": "CVE-2024-36954-d03a82f4f8144befdc10518e732e2a60b34c870e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36954/CVE-2024-36954-d03a82f4f8144befdc10518e732e2a60b34c870e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/01cd1b7b685751ee422d00d050292a3d277652d6",
            "https://git.kernel.org/stable/c/2f87fd9476cf9725d774e6dcb7d17859c6a6d1ae",
            "https://git.kernel.org/stable/c/3210d34fda4caff212cb53729e6bd46de604d565",
            "https://git.kernel.org/stable/c/42c8471b0566c7539e7dd584b4d0ebd3cec8cb2c",
            "https://git.kernel.org/stable/c/614c5a5ae45a921595952117b2e2bd4d4bf9b574",
            "https://git.kernel.org/stable/c/97bf6f81b29a8efaf5d0983251a7450e5794370d",
            "https://git.kernel.org/stable/c/adbce6d20da6254c86425a8d4359b221b5ccbccd",
            "https://git.kernel.org/stable/c/d03a82f4f8144befdc10518e732e2a60b34c870e",
            "https://www.cve.org/CVERecord?id=CVE-2024-36954\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36954\nhttps://lore.kernel.org/linux-cve-announce/2024053040-CVE-2024-36954-b1b8@gregkh/T"
        ]
    },
    "CVE-2024-36960": {
        "cve": "CVE-2024-36960",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix invalid reads in fence signaled events\n\nCorrectly set the length of the drm_event to the size of the structure\nthat's actually used.\n\nThe length of the drm_event was set to the parent structure instead of\nto the drm_vmw_event_fence which is supposed to be read. drm_read\nuses the length parameter to copy the event to the user space thus\nresuling in oob reads.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36960",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0dbfc73670b357456196130551e586345ca48e1b",
            "patch_url": "https://git.kernel.org/stable/p/0dbfc73670b357456196130551e586345ca48e1b",
            "filename": "CVE-2024-36960-0dbfc73670b357456196130551e586345ca48e1b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36960/CVE-2024-36960-0dbfc73670b357456196130551e586345ca48e1b.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0dbfc73670b357456196130551e586345ca48e1b",
                "patch_url": "https://git.kernel.org/stable/p/0dbfc73670b357456196130551e586345ca48e1b",
                "filename": "CVE-2024-36960-0dbfc73670b357456196130551e586345ca48e1b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36960/CVE-2024-36960-0dbfc73670b357456196130551e586345ca48e1b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f527e3efd37c7c5e85e8aa86308856b619fa59f",
                "patch_url": "https://git.kernel.org/stable/p/2f527e3efd37c7c5e85e8aa86308856b619fa59f",
                "filename": "CVE-2024-36960-2f527e3efd37c7c5e85e8aa86308856b619fa59f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36960/CVE-2024-36960-2f527e3efd37c7c5e85e8aa86308856b619fa59f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3cd682357c6167f636aec8ac0efaa8ba61144d36",
                "patch_url": "https://git.kernel.org/stable/p/3cd682357c6167f636aec8ac0efaa8ba61144d36",
                "filename": "CVE-2024-36960-3cd682357c6167f636aec8ac0efaa8ba61144d36.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36960/CVE-2024-36960-3cd682357c6167f636aec8ac0efaa8ba61144d36.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7b5fd3af4a250dd0a2a558e07b43478748eb5d22",
                "patch_url": "https://git.kernel.org/stable/p/7b5fd3af4a250dd0a2a558e07b43478748eb5d22",
                "filename": "CVE-2024-36960-7b5fd3af4a250dd0a2a558e07b43478748eb5d22.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36960/CVE-2024-36960-7b5fd3af4a250dd0a2a558e07b43478748eb5d22.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a37ef7613c00f2d72c8fc08bd83fb6cc76926c8c",
                "patch_url": "https://git.kernel.org/stable/p/a37ef7613c00f2d72c8fc08bd83fb6cc76926c8c",
                "filename": "CVE-2024-36960-a37ef7613c00f2d72c8fc08bd83fb6cc76926c8c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36960/CVE-2024-36960-a37ef7613c00f2d72c8fc08bd83fb6cc76926c8c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7bab33c4623c66e3398d5253870d4e88c52dfc0",
                "patch_url": "https://git.kernel.org/stable/p/b7bab33c4623c66e3398d5253870d4e88c52dfc0",
                "filename": "CVE-2024-36960-b7bab33c4623c66e3398d5253870d4e88c52dfc0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36960/CVE-2024-36960-b7bab33c4623c66e3398d5253870d4e88c52dfc0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cef0962f2d3e5fd0660c8efb72321083a1b531a9",
                "patch_url": "https://git.kernel.org/stable/p/cef0962f2d3e5fd0660c8efb72321083a1b531a9",
                "filename": "CVE-2024-36960-cef0962f2d3e5fd0660c8efb72321083a1b531a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36960/CVE-2024-36960-cef0962f2d3e5fd0660c8efb72321083a1b531a9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/deab66596dfad14f1c54eeefdb72428340d72a77",
                "patch_url": "https://git.kernel.org/stable/p/deab66596dfad14f1c54eeefdb72428340d72a77",
                "filename": "CVE-2024-36960-deab66596dfad14f1c54eeefdb72428340d72a77.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36960/CVE-2024-36960-deab66596dfad14f1c54eeefdb72428340d72a77.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0dbfc73670b357456196130551e586345ca48e1b",
            "https://git.kernel.org/stable/c/2f527e3efd37c7c5e85e8aa86308856b619fa59f",
            "https://git.kernel.org/stable/c/3cd682357c6167f636aec8ac0efaa8ba61144d36",
            "https://git.kernel.org/stable/c/7b5fd3af4a250dd0a2a558e07b43478748eb5d22",
            "https://git.kernel.org/stable/c/a37ef7613c00f2d72c8fc08bd83fb6cc76926c8c",
            "https://git.kernel.org/stable/c/b7bab33c4623c66e3398d5253870d4e88c52dfc0",
            "https://git.kernel.org/stable/c/cef0962f2d3e5fd0660c8efb72321083a1b531a9",
            "https://git.kernel.org/stable/c/deab66596dfad14f1c54eeefdb72428340d72a77",
            "https://www.cve.org/CVERecord?id=CVE-2024-36960\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36960\nhttps://lore.kernel.org/linux-cve-announce/2024060341-CVE-2024-36960-d1bf@gregkh/T"
        ]
    },
    "CVE-2024-36971": {
        "cve": "CVE-2024-36971",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix __dst_negative_advice() race\n\n__dst_negative_advice() does not enforce proper RCU rules when\nsk->dst_cache must be cleared, leading to possible UAF.\n\nRCU rules are that we must first clear sk->sk_dst_cache,\nthen call dst_release(old_dst).\n\nNote that sk_dst_reset(sk) is implementing this protocol correctly,\nwhile __dst_negative_advice() uses the wrong order.\n\nGiven that ip6_negative_advice() has special logic\nagainst RTF_CACHE, this means each of the three ->negative_advice()\nexisting methods must perform the sk_dst_reset() themselves.\n\nNote the check against NULL dst is centralized in\n__dst_negative_advice(), there is no need to duplicate\nit in various callbacks.\n\nMany thanks to Clement Lecigne for tracking this issue.\n\nThis old bug became visible after the blamed commit, using UDP sockets.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36971",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/051c0bde9f0450a2ec3d62a86d2a0d2fad117f13",
            "patch_url": "https://git.kernel.org/stable/p/051c0bde9f0450a2ec3d62a86d2a0d2fad117f13",
            "filename": "CVE-2024-36971-051c0bde9f0450a2ec3d62a86d2a0d2fad117f13.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36971/CVE-2024-36971-051c0bde9f0450a2ec3d62a86d2a0d2fad117f13.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/051c0bde9f0450a2ec3d62a86d2a0d2fad117f13",
                "patch_url": "https://git.kernel.org/stable/p/051c0bde9f0450a2ec3d62a86d2a0d2fad117f13",
                "filename": "CVE-2024-36971-051c0bde9f0450a2ec3d62a86d2a0d2fad117f13.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36971/CVE-2024-36971-051c0bde9f0450a2ec3d62a86d2a0d2fad117f13.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2295a7ef5c8c49241bff769e7826ef2582e532a6",
                "patch_url": "https://git.kernel.org/stable/p/2295a7ef5c8c49241bff769e7826ef2582e532a6",
                "filename": "CVE-2024-36971-2295a7ef5c8c49241bff769e7826ef2582e532a6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36971/CVE-2024-36971-2295a7ef5c8c49241bff769e7826ef2582e532a6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5af198c387128a9d2ddd620b0f0803564a4d4508",
                "patch_url": "https://git.kernel.org/stable/p/5af198c387128a9d2ddd620b0f0803564a4d4508",
                "filename": "CVE-2024-36971-5af198c387128a9d2ddd620b0f0803564a4d4508.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36971/CVE-2024-36971-5af198c387128a9d2ddd620b0f0803564a4d4508.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/81dd3c82a456b0015461754be7cb2693991421b4",
                "patch_url": "https://git.kernel.org/stable/p/81dd3c82a456b0015461754be7cb2693991421b4",
                "filename": "CVE-2024-36971-81dd3c82a456b0015461754be7cb2693991421b4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36971/CVE-2024-36971-81dd3c82a456b0015461754be7cb2693991421b4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/92f1655aa2b2294d0b49925f3b875a634bd3b59e",
                "patch_url": "https://git.kernel.org/stable/p/92f1655aa2b2294d0b49925f3b875a634bd3b59e",
                "filename": "CVE-2024-36971-92f1655aa2b2294d0b49925f3b875a634bd3b59e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36971/CVE-2024-36971-92f1655aa2b2294d0b49925f3b875a634bd3b59e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b8af8e6118a6605f0e495a58d591ca94a85a50fc",
                "patch_url": "https://git.kernel.org/stable/p/b8af8e6118a6605f0e495a58d591ca94a85a50fc",
                "filename": "CVE-2024-36971-b8af8e6118a6605f0e495a58d591ca94a85a50fc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36971/CVE-2024-36971-b8af8e6118a6605f0e495a58d591ca94a85a50fc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/db0082825037794c5dba9959c9de13ca34cc5e72",
                "patch_url": "https://git.kernel.org/stable/p/db0082825037794c5dba9959c9de13ca34cc5e72",
                "filename": "CVE-2024-36971-db0082825037794c5dba9959c9de13ca34cc5e72.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36971/CVE-2024-36971-db0082825037794c5dba9959c9de13ca34cc5e72.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eacb8b195579c174a6d3e12a9690b206eb7f28cf",
                "patch_url": "https://git.kernel.org/stable/p/eacb8b195579c174a6d3e12a9690b206eb7f28cf",
                "filename": "CVE-2024-36971-eacb8b195579c174a6d3e12a9690b206eb7f28cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36971/CVE-2024-36971-eacb8b195579c174a6d3e12a9690b206eb7f28cf.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/051c0bde9f0450a2ec3d62a86d2a0d2fad117f13",
            "https://git.kernel.org/stable/c/2295a7ef5c8c49241bff769e7826ef2582e532a6",
            "https://git.kernel.org/stable/c/5af198c387128a9d2ddd620b0f0803564a4d4508",
            "https://git.kernel.org/stable/c/81dd3c82a456b0015461754be7cb2693991421b4",
            "https://git.kernel.org/stable/c/92f1655aa2b2294d0b49925f3b875a634bd3b59e",
            "https://git.kernel.org/stable/c/b8af8e6118a6605f0e495a58d591ca94a85a50fc",
            "https://git.kernel.org/stable/c/db0082825037794c5dba9959c9de13ca34cc5e72",
            "https://git.kernel.org/stable/c/eacb8b195579c174a6d3e12a9690b206eb7f28cf",
            "https://www.cve.org/CVERecord?id=CVE-2024-36971\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36971\nhttps://lore.kernel.org/linux-cve-announce/20240610090330.1347021-2-lee@kernel.org/T\nhttps://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        ]
    },
    "CVE-2024-36978": {
        "cve": "CVE-2024-36978",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: sch_multiq: fix possible OOB write in multiq_tune()\n\nq->bands will be assigned to qopt->bands to execute subsequent code logic\nafter kmalloc. So the old q->bands should not be used in kmalloc.\nOtherwise, an out-of-bounds write will occur.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36978",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/d5d9d241786f49ae7cbc08e7fc95a115e9d80f3d",
            "patch_url": "https://git.kernel.org/stable/p/d5d9d241786f49ae7cbc08e7fc95a115e9d80f3d",
            "filename": "CVE-2024-36978-d5d9d241786f49ae7cbc08e7fc95a115e9d80f3d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36978/CVE-2024-36978-d5d9d241786f49ae7cbc08e7fc95a115e9d80f3d.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0f208fad86631e005754606c3ec80c0d44a11882",
                "patch_url": "https://git.kernel.org/stable/p/0f208fad86631e005754606c3ec80c0d44a11882",
                "filename": "CVE-2024-36978-0f208fad86631e005754606c3ec80c0d44a11882.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36978/CVE-2024-36978-0f208fad86631e005754606c3ec80c0d44a11882.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/52b1aa07cda6a199cd6754d3798c7759023bc70f",
                "patch_url": "https://git.kernel.org/stable/p/52b1aa07cda6a199cd6754d3798c7759023bc70f",
                "filename": "CVE-2024-36978-52b1aa07cda6a199cd6754d3798c7759023bc70f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36978/CVE-2024-36978-52b1aa07cda6a199cd6754d3798c7759023bc70f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/54c2c171c11a798fe887b3ff72922aa9d1411c1e",
                "patch_url": "https://git.kernel.org/stable/p/54c2c171c11a798fe887b3ff72922aa9d1411c1e",
                "filename": "CVE-2024-36978-54c2c171c11a798fe887b3ff72922aa9d1411c1e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36978/CVE-2024-36978-54c2c171c11a798fe887b3ff72922aa9d1411c1e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/598572c64287aee0b75bbba4e2881496878860f3",
                "patch_url": "https://git.kernel.org/stable/p/598572c64287aee0b75bbba4e2881496878860f3",
                "filename": "CVE-2024-36978-598572c64287aee0b75bbba4e2881496878860f3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36978/CVE-2024-36978-598572c64287aee0b75bbba4e2881496878860f3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/affc18fdc694190ca7575b9a86632a73b9fe043d",
                "patch_url": "https://git.kernel.org/stable/p/affc18fdc694190ca7575b9a86632a73b9fe043d",
                "filename": "CVE-2024-36978-affc18fdc694190ca7575b9a86632a73b9fe043d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36978/CVE-2024-36978-affc18fdc694190ca7575b9a86632a73b9fe043d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d5d9d241786f49ae7cbc08e7fc95a115e9d80f3d",
                "patch_url": "https://git.kernel.org/stable/p/d5d9d241786f49ae7cbc08e7fc95a115e9d80f3d",
                "filename": "CVE-2024-36978-d5d9d241786f49ae7cbc08e7fc95a115e9d80f3d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36978/CVE-2024-36978-d5d9d241786f49ae7cbc08e7fc95a115e9d80f3d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d6fb5110e8722bc00748f22caeb650fe4672f129",
                "patch_url": "https://git.kernel.org/stable/p/d6fb5110e8722bc00748f22caeb650fe4672f129",
                "filename": "CVE-2024-36978-d6fb5110e8722bc00748f22caeb650fe4672f129.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36978/CVE-2024-36978-d6fb5110e8722bc00748f22caeb650fe4672f129.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0f208fad86631e005754606c3ec80c0d44a11882",
            "https://git.kernel.org/stable/c/52b1aa07cda6a199cd6754d3798c7759023bc70f",
            "https://git.kernel.org/stable/c/54c2c171c11a798fe887b3ff72922aa9d1411c1e",
            "https://git.kernel.org/stable/c/598572c64287aee0b75bbba4e2881496878860f3",
            "https://git.kernel.org/stable/c/affc18fdc694190ca7575b9a86632a73b9fe043d",
            "https://git.kernel.org/stable/c/d5d9d241786f49ae7cbc08e7fc95a115e9d80f3d",
            "https://git.kernel.org/stable/c/d6fb5110e8722bc00748f22caeb650fe4672f129",
            "https://www.cve.org/CVERecord?id=CVE-2024-36978\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36978\nhttps://lore.kernel.org/linux-cve-announce/2024061926-CVE-2024-36978-b4b8@gregkh/T"
        ]
    },
    "CVE-2024-36979": {
        "cve": "CVE-2024-36979",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: mst: fix vlan use-after-free\n\nsyzbot reported a suspicious rcu usage[1] in bridge's mst code. While\nfixing it I noticed that nothing prevents a vlan to be freed while\nwalking the list from the same path (br forward delay timer). Fix the rcu\nusage and also make sure we are not accessing freed memory by making\nbr_mst_vlan_set_state use rcu read lock.\n\n[1]\n WARNING: suspicious RCU usage\n 6.9.0-rc6-syzkaller #0 Not tainted\n -----------------------------\n net/bridge/br_private.h:1599 suspicious rcu_dereference_protected() usage!\n ...\n stack backtrace:\n CPU: 1 PID: 8017 Comm: syz-executor.1 Not tainted 6.9.0-rc6-syzkaller #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\n Call Trace:\n  <IRQ>\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n  lockdep_rcu_suspicious+0x221/0x340 kernel/locking/lockdep.c:6712\n  nbp_vlan_group net/bridge/br_private.h:1599 [inline]\n  br_mst_set_state+0x1ea/0x650 net/bridge/br_mst.c:105\n  br_set_state+0x28a/0x7b0 net/bridge/br_stp.c:47\n  br_forward_delay_timer_expired+0x176/0x440 net/bridge/br_stp_timer.c:88\n  call_timer_fn+0x18e/0x650 kernel/time/timer.c:1793\n  expire_timers kernel/time/timer.c:1844 [inline]\n  __run_timers kernel/time/timer.c:2418 [inline]\n  __run_timer_base+0x66a/0x8e0 kernel/time/timer.c:2429\n  run_timer_base kernel/time/timer.c:2438 [inline]\n  run_timer_softirq+0xb7/0x170 kernel/time/timer.c:2448\n  __do_softirq+0x2c6/0x980 kernel/softirq.c:554\n  invoke_softirq kernel/softirq.c:428 [inline]\n  __irq_exit_rcu+0xf2/0x1c0 kernel/softirq.c:633\n  irq_exit_rcu+0x9/0x30 kernel/softirq.c:645\n  instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline]\n  sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043\n  </IRQ>\n  <TASK>\n asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702\n RIP: 0010:lock_acquire+0x264/0x550 kernel/locking/lockdep.c:5758\n Code: 2b 00 74 08 4c 89 f7 e8 ba d1 84 00 f6 44 24 61 02 0f 85 85 01 00 00 41 f7 c7 00 02 00 00 74 01 fb 48 c7 44 24 40 0e 36 e0 45 <4b> c7 44 25 00 00 00 00 00 43 c7 44 25 09 00 00 00 00 43 c7 44 25\n RSP: 0018:ffffc90013657100 EFLAGS: 00000206\n RAX: 0000000000000001 RBX: 1ffff920026cae2c RCX: 0000000000000001\n RDX: dffffc0000000000 RSI: ffffffff8bcaca00 RDI: ffffffff8c1eaa60\n RBP: ffffc90013657260 R08: ffffffff92efe507 R09: 1ffffffff25dfca0\n R10: dffffc0000000000 R11: fffffbfff25dfca1 R12: 1ffff920026cae28\n R13: dffffc0000000000 R14: ffffc90013657160 R15: 0000000000000246",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-36979",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3a7c1661ae1383364cd6092d851f5e5da64d476b",
            "patch_url": "https://git.kernel.org/stable/p/3a7c1661ae1383364cd6092d851f5e5da64d476b",
            "filename": "CVE-2024-36979-3a7c1661ae1383364cd6092d851f5e5da64d476b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36979/CVE-2024-36979-3a7c1661ae1383364cd6092d851f5e5da64d476b.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3a7c1661ae1383364cd6092d851f5e5da64d476b",
                "patch_url": "https://git.kernel.org/stable/p/3a7c1661ae1383364cd6092d851f5e5da64d476b",
                "filename": "CVE-2024-36979-3a7c1661ae1383364cd6092d851f5e5da64d476b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36979/CVE-2024-36979-3a7c1661ae1383364cd6092d851f5e5da64d476b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4488617e5e995a09abe4d81add5fb165674edb59",
                "patch_url": "https://git.kernel.org/stable/p/4488617e5e995a09abe4d81add5fb165674edb59",
                "filename": "CVE-2024-36979-4488617e5e995a09abe4d81add5fb165674edb59.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36979/CVE-2024-36979-4488617e5e995a09abe4d81add5fb165674edb59.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8ca9a750fc711911ef616ceb627d07357b04545e",
                "patch_url": "https://git.kernel.org/stable/p/8ca9a750fc711911ef616ceb627d07357b04545e",
                "filename": "CVE-2024-36979-8ca9a750fc711911ef616ceb627d07357b04545e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36979/CVE-2024-36979-8ca9a750fc711911ef616ceb627d07357b04545e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a2b01e65d9ba8af2bb086d3b7288ca53a07249ac",
                "patch_url": "https://git.kernel.org/stable/p/a2b01e65d9ba8af2bb086d3b7288ca53a07249ac",
                "filename": "CVE-2024-36979-a2b01e65d9ba8af2bb086d3b7288ca53a07249ac.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36979/CVE-2024-36979-a2b01e65d9ba8af2bb086d3b7288ca53a07249ac.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e43dd2b1ec746e105b7db5f9ad6ef14685a615a4",
                "patch_url": "https://git.kernel.org/stable/p/e43dd2b1ec746e105b7db5f9ad6ef14685a615a4",
                "filename": "CVE-2024-36979-e43dd2b1ec746e105b7db5f9ad6ef14685a615a4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-36979/CVE-2024-36979-e43dd2b1ec746e105b7db5f9ad6ef14685a615a4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3a7c1661ae1383364cd6092d851f5e5da64d476b",
            "https://git.kernel.org/stable/c/4488617e5e995a09abe4d81add5fb165674edb59",
            "https://git.kernel.org/stable/c/8ca9a750fc711911ef616ceb627d07357b04545e",
            "https://git.kernel.org/stable/c/a2b01e65d9ba8af2bb086d3b7288ca53a07249ac",
            "https://git.kernel.org/stable/c/e43dd2b1ec746e105b7db5f9ad6ef14685a615a4",
            "https://www.cve.org/CVERecord?id=CVE-2024-36979\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36979\nhttps://lore.kernel.org/linux-cve-announce/2024061945-CVE-2024-36979-b4a6@gregkh/T"
        ]
    },
    "CVE-2024-37356": {
        "cve": "CVE-2024-37356",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Fix shift-out-of-bounds in dctcp_update_alpha().\n\nIn dctcp_update_alpha(), we use a module parameter dctcp_shift_g\nas follows:\n\n  alpha -= min_not_zero(alpha, alpha >> dctcp_shift_g);\n  ...\n  delivered_ce <<= (10 - dctcp_shift_g);\n\nIt seems syzkaller started fuzzing module parameters and triggered\nshift-out-of-bounds [0] by setting 100 to dctcp_shift_g:\n\n  memcpy((void*)0x20000080,\n         \"/sys/module/tcp_dctcp/parameters/dctcp_shift_g\\000\", 47);\n  res = syscall(__NR_openat, /*fd=*/0xffffffffffffff9cul, /*file=*/0x20000080ul,\n                /*flags=*/2ul, /*mode=*/0ul);\n  memcpy((void*)0x20000000, \"100\\000\", 4);\n  syscall(__NR_write, /*fd=*/r[0], /*val=*/0x20000000ul, /*len=*/4ul);\n\nLet's limit the max value of dctcp_shift_g by param_set_uint_minmax().\n\nWith this patch:\n\n  # echo 10 > /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n  # cat /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n  10\n  # echo 11 > /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n  -bash: echo: write error: Invalid argument\n\n[0]:\nUBSAN: shift-out-of-bounds in net/ipv4/tcp_dctcp.c:143:12\nshift exponent 100 is too large for 32-bit type 'u32' (aka 'unsigned int')\nCPU: 0 PID: 8083 Comm: syz-executor345 Not tainted 6.9.0-05151-g1b294a1f3561 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x201/0x300 lib/dump_stack.c:114\n ubsan_epilogue lib/ubsan.c:231 [inline]\n __ubsan_handle_shift_out_of_bounds+0x346/0x3a0 lib/ubsan.c:468\n dctcp_update_alpha+0x540/0x570 net/ipv4/tcp_dctcp.c:143\n tcp_in_ack_event net/ipv4/tcp_input.c:3802 [inline]\n tcp_ack+0x17b1/0x3bc0 net/ipv4/tcp_input.c:3948\n tcp_rcv_state_process+0x57a/0x2290 net/ipv4/tcp_input.c:6711\n tcp_v4_do_rcv+0x764/0xc40 net/ipv4/tcp_ipv4.c:1937\n sk_backlog_rcv include/net/sock.h:1106 [inline]\n __release_sock+0x20f/0x350 net/core/sock.c:2983\n release_sock+0x61/0x1f0 net/core/sock.c:3549\n mptcp_subflow_shutdown+0x3d0/0x620 net/mptcp/protocol.c:2907\n mptcp_check_send_data_fin+0x225/0x410 net/mptcp/protocol.c:2976\n __mptcp_close+0x238/0xad0 net/mptcp/protocol.c:3072\n mptcp_close+0x2a/0x1a0 net/mptcp/protocol.c:3127\n inet_release+0x190/0x1f0 net/ipv4/af_inet.c:437\n __sock_release net/socket.c:659 [inline]\n sock_close+0xc0/0x240 net/socket.c:1421\n __fput+0x41b/0x890 fs/file_table.c:422\n task_work_run+0x23b/0x300 kernel/task_work.c:180\n exit_task_work include/linux/task_work.h:38 [inline]\n do_exit+0x9c8/0x2540 kernel/exit.c:878\n do_group_exit+0x201/0x2b0 kernel/exit.c:1027\n __do_sys_exit_group kernel/exit.c:1038 [inline]\n __se_sys_exit_group kernel/exit.c:1036 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1036\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xe4/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x67/0x6f\nRIP: 0033:0x7f6c2b5005b6\nCode: Unable to access opcode bytes at 0x7f6c2b50058c.\nRSP: 002b:00007ffe883eb948 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 00007f6c2b5862f0 RCX: 00007f6c2b5005b6\nRDX: 0000000000000001 RSI: 000000000000003c RDI: 0000000000000001\nRBP: 0000000000000001 R08: 00000000000000e7 R09: ffffffffffffffc0\nR10: 0000000000000006 R11: 0000000000000246 R12: 00007f6c2b5862f0\nR13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001\n </TASK>",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-37356",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/06d0fe049b51b0a92a70df8333fd85c4ba3eb2c6",
            "patch_url": "https://git.kernel.org/stable/p/06d0fe049b51b0a92a70df8333fd85c4ba3eb2c6",
            "filename": "CVE-2024-37356-06d0fe049b51b0a92a70df8333fd85c4ba3eb2c6.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-37356/CVE-2024-37356-06d0fe049b51b0a92a70df8333fd85c4ba3eb2c6.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/02261d3f9dc7d1d7be7d778f839e3404ab99034c",
                "patch_url": "https://git.kernel.org/stable/p/02261d3f9dc7d1d7be7d778f839e3404ab99034c",
                "filename": "CVE-2024-37356-02261d3f9dc7d1d7be7d778f839e3404ab99034c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-37356/CVE-2024-37356-02261d3f9dc7d1d7be7d778f839e3404ab99034c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/06d0fe049b51b0a92a70df8333fd85c4ba3eb2c6",
                "patch_url": "https://git.kernel.org/stable/p/06d0fe049b51b0a92a70df8333fd85c4ba3eb2c6",
                "filename": "CVE-2024-37356-06d0fe049b51b0a92a70df8333fd85c4ba3eb2c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-37356/CVE-2024-37356-06d0fe049b51b0a92a70df8333fd85c4ba3eb2c6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/237340dee373b97833a491d2e99fcf1d4a9adafd",
                "patch_url": "https://git.kernel.org/stable/p/237340dee373b97833a491d2e99fcf1d4a9adafd",
                "filename": "CVE-2024-37356-237340dee373b97833a491d2e99fcf1d4a9adafd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-37356/CVE-2024-37356-237340dee373b97833a491d2e99fcf1d4a9adafd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3ebc46ca8675de6378e3f8f40768e180bb8afa66",
                "patch_url": "https://git.kernel.org/stable/p/3ebc46ca8675de6378e3f8f40768e180bb8afa66",
                "filename": "CVE-2024-37356-3ebc46ca8675de6378e3f8f40768e180bb8afa66.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-37356/CVE-2024-37356-3ebc46ca8675de6378e3f8f40768e180bb8afa66.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6aacaa80d962f4916ccf90e2080306cec6c90fcf",
                "patch_url": "https://git.kernel.org/stable/p/6aacaa80d962f4916ccf90e2080306cec6c90fcf",
                "filename": "CVE-2024-37356-6aacaa80d962f4916ccf90e2080306cec6c90fcf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-37356/CVE-2024-37356-6aacaa80d962f4916ccf90e2080306cec6c90fcf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8602150286a2a860a1dc55cbd04f99316f19b40a",
                "patch_url": "https://git.kernel.org/stable/p/8602150286a2a860a1dc55cbd04f99316f19b40a",
                "filename": "CVE-2024-37356-8602150286a2a860a1dc55cbd04f99316f19b40a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-37356/CVE-2024-37356-8602150286a2a860a1dc55cbd04f99316f19b40a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e65d13ec00a738fa7661925fd5929ab3c765d4be",
                "patch_url": "https://git.kernel.org/stable/p/e65d13ec00a738fa7661925fd5929ab3c765d4be",
                "filename": "CVE-2024-37356-e65d13ec00a738fa7661925fd5929ab3c765d4be.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-37356/CVE-2024-37356-e65d13ec00a738fa7661925fd5929ab3c765d4be.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e9b2f60636d18dfd0dd4965b3316f88dfd6a2b31",
                "patch_url": "https://git.kernel.org/stable/p/e9b2f60636d18dfd0dd4965b3316f88dfd6a2b31",
                "filename": "CVE-2024-37356-e9b2f60636d18dfd0dd4965b3316f88dfd6a2b31.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-37356/CVE-2024-37356-e9b2f60636d18dfd0dd4965b3316f88dfd6a2b31.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/02261d3f9dc7d1d7be7d778f839e3404ab99034c",
            "https://git.kernel.org/stable/c/06d0fe049b51b0a92a70df8333fd85c4ba3eb2c6",
            "https://git.kernel.org/stable/c/237340dee373b97833a491d2e99fcf1d4a9adafd",
            "https://git.kernel.org/stable/c/3ebc46ca8675de6378e3f8f40768e180bb8afa66",
            "https://git.kernel.org/stable/c/6aacaa80d962f4916ccf90e2080306cec6c90fcf",
            "https://git.kernel.org/stable/c/8602150286a2a860a1dc55cbd04f99316f19b40a",
            "https://git.kernel.org/stable/c/e65d13ec00a738fa7661925fd5929ab3c765d4be",
            "https://git.kernel.org/stable/c/e9b2f60636d18dfd0dd4965b3316f88dfd6a2b31",
            "https://www.cve.org/CVERecord?id=CVE-2024-37356\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-37356\nhttps://lore.kernel.org/linux-cve-announce/2024062137-CVE-2024-37356-cc7b@gregkh/T"
        ]
    },
    "CVE-2024-38428": {
        "cve": "CVE-2024-38428",
        "cvss_v2": null,
        "cvss_v3": 9.1,
        "description": "url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38428",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-38538": {
        "cve": "CVE-2024-38538",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: xmit: make sure we have at least eth header len bytes\n\nsyzbot triggered an uninit value[1] error in bridge device's xmit path\nby sending a short (less than ETH_HLEN bytes) skb. To fix it check if\nwe can actually pull that amount instead of assuming.\n\nTested with dropwatch:\n drop at: br_dev_xmit+0xb93/0x12d0 [bridge] (0xffffffffc06739b3)\n origin: software\n timestamp: Mon May 13 11:31:53 2024 778214037 nsec\n protocol: 0x88a8\n length: 2\n original length: 2\n drop reason: PKT_TOO_SMALL\n\n[1]\nBUG: KMSAN: uninit-value in br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65\n br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65\n __netdev_start_xmit include/linux/netdevice.h:4903 [inline]\n netdev_start_xmit include/linux/netdevice.h:4917 [inline]\n xmit_one net/core/dev.c:3531 [inline]\n dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3547\n __dev_queue_xmit+0x34db/0x5350 net/core/dev.c:4341\n dev_queue_xmit include/linux/netdevice.h:3091 [inline]\n __bpf_tx_skb net/core/filter.c:2136 [inline]\n __bpf_redirect_common net/core/filter.c:2180 [inline]\n __bpf_redirect+0x14a6/0x1620 net/core/filter.c:2187\n ____bpf_clone_redirect net/core/filter.c:2460 [inline]\n bpf_clone_redirect+0x328/0x470 net/core/filter.c:2432\n ___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997\n __bpf_prog_run512+0xb5/0xe0 kernel/bpf/core.c:2238\n bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]\n __bpf_prog_run include/linux/filter.h:657 [inline]\n bpf_prog_run include/linux/filter.h:664 [inline]\n bpf_test_run+0x499/0xc30 net/bpf/test_run.c:425\n bpf_prog_test_run_skb+0x14ea/0x1f20 net/bpf/test_run.c:1058\n bpf_prog_test_run+0x6b7/0xad0 kernel/bpf/syscall.c:4269\n __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5678\n __do_sys_bpf kernel/bpf/syscall.c:5767 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5765 [inline]\n __x64_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5765\n x64_sys_call+0x96b/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:322\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38538",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/28126b83f86ab9cc7936029c2dff845d3dcedba2",
            "patch_url": "https://git.kernel.org/stable/p/28126b83f86ab9cc7936029c2dff845d3dcedba2",
            "filename": "CVE-2024-38538-28126b83f86ab9cc7936029c2dff845d3dcedba2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38538/CVE-2024-38538-28126b83f86ab9cc7936029c2dff845d3dcedba2.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1abb371147905ba250b4cc0230c4be7e90bea4d5",
                "patch_url": "https://git.kernel.org/stable/p/1abb371147905ba250b4cc0230c4be7e90bea4d5",
                "filename": "CVE-2024-38538-1abb371147905ba250b4cc0230c4be7e90bea4d5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38538/CVE-2024-38538-1abb371147905ba250b4cc0230c4be7e90bea4d5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/28126b83f86ab9cc7936029c2dff845d3dcedba2",
                "patch_url": "https://git.kernel.org/stable/p/28126b83f86ab9cc7936029c2dff845d3dcedba2",
                "filename": "CVE-2024-38538-28126b83f86ab9cc7936029c2dff845d3dcedba2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38538/CVE-2024-38538-28126b83f86ab9cc7936029c2dff845d3dcedba2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3e01fc3c66e65d9afe98f1489047a1b2dd8741ca",
                "patch_url": "https://git.kernel.org/stable/p/3e01fc3c66e65d9afe98f1489047a1b2dd8741ca",
                "filename": "CVE-2024-38538-3e01fc3c66e65d9afe98f1489047a1b2dd8741ca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38538/CVE-2024-38538-3e01fc3c66e65d9afe98f1489047a1b2dd8741ca.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5b5d669f569807c7ab07546e73c0741845a2547a",
                "patch_url": "https://git.kernel.org/stable/p/5b5d669f569807c7ab07546e73c0741845a2547a",
                "filename": "CVE-2024-38538-5b5d669f569807c7ab07546e73c0741845a2547a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38538/CVE-2024-38538-5b5d669f569807c7ab07546e73c0741845a2547a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/82090f94c723dab724b1c32db406091d40448a17",
                "patch_url": "https://git.kernel.org/stable/p/82090f94c723dab724b1c32db406091d40448a17",
                "filename": "CVE-2024-38538-82090f94c723dab724b1c32db406091d40448a17.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38538/CVE-2024-38538-82090f94c723dab724b1c32db406091d40448a17.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8bd67ebb50c0145fd2ca8681ab65eb7e8cde1afc",
                "patch_url": "https://git.kernel.org/stable/p/8bd67ebb50c0145fd2ca8681ab65eb7e8cde1afc",
                "filename": "CVE-2024-38538-8bd67ebb50c0145fd2ca8681ab65eb7e8cde1afc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38538/CVE-2024-38538-8bd67ebb50c0145fd2ca8681ab65eb7e8cde1afc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b2b7c43cd32080221bb233741bd6011983fe7c11",
                "patch_url": "https://git.kernel.org/stable/p/b2b7c43cd32080221bb233741bd6011983fe7c11",
                "filename": "CVE-2024-38538-b2b7c43cd32080221bb233741bd6011983fe7c11.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38538/CVE-2024-38538-b2b7c43cd32080221bb233741bd6011983fe7c11.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c964429ef53f42098a6545a5dabeb1441c1e821d",
                "patch_url": "https://git.kernel.org/stable/p/c964429ef53f42098a6545a5dabeb1441c1e821d",
                "filename": "CVE-2024-38538-c964429ef53f42098a6545a5dabeb1441c1e821d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38538/CVE-2024-38538-c964429ef53f42098a6545a5dabeb1441c1e821d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f482fd4ce919836a49012b2d31b00fc36e2488f2",
                "patch_url": "https://git.kernel.org/stable/p/f482fd4ce919836a49012b2d31b00fc36e2488f2",
                "filename": "CVE-2024-38538-f482fd4ce919836a49012b2d31b00fc36e2488f2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38538/CVE-2024-38538-f482fd4ce919836a49012b2d31b00fc36e2488f2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1abb371147905ba250b4cc0230c4be7e90bea4d5",
            "https://git.kernel.org/stable/c/28126b83f86ab9cc7936029c2dff845d3dcedba2",
            "https://git.kernel.org/stable/c/3e01fc3c66e65d9afe98f1489047a1b2dd8741ca",
            "https://git.kernel.org/stable/c/5b5d669f569807c7ab07546e73c0741845a2547a",
            "https://git.kernel.org/stable/c/82090f94c723dab724b1c32db406091d40448a17",
            "https://git.kernel.org/stable/c/8bd67ebb50c0145fd2ca8681ab65eb7e8cde1afc",
            "https://git.kernel.org/stable/c/b2b7c43cd32080221bb233741bd6011983fe7c11",
            "https://git.kernel.org/stable/c/c964429ef53f42098a6545a5dabeb1441c1e821d",
            "https://git.kernel.org/stable/c/f482fd4ce919836a49012b2d31b00fc36e2488f2",
            "https://www.cve.org/CVERecord?id=CVE-2024-38538\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38538\nhttps://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38538-e28a@gregkh/T"
        ]
    },
    "CVE-2024-38540": {
        "cve": "CVE-2024-38540",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq\n\nUndefined behavior is triggered when bnxt_qplib_alloc_init_hwq is called\nwith hwq_attr->aux_depth != 0 and hwq_attr->aux_stride == 0.\nIn that case, \"roundup_pow_of_two(hwq_attr->aux_stride)\" gets called.\nroundup_pow_of_two is documented as undefined for 0.\n\nFix it in the one caller that had this combination.\n\nThe undefined behavior was detected by UBSAN:\n  UBSAN: shift-out-of-bounds in ./include/linux/log2.h:57:13\n  shift exponent 64 is too large for 64-bit type 'long unsigned int'\n  CPU: 24 PID: 1075 Comm: (udev-worker) Not tainted 6.9.0-rc6+ #4\n  Hardware name: Abacus electric, s.r.o. - servis@abacus.cz Super Server/H12SSW-iN, BIOS 2.7 10/25/2023\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x5d/0x80\n   ubsan_epilogue+0x5/0x30\n   __ubsan_handle_shift_out_of_bounds.cold+0x61/0xec\n   __roundup_pow_of_two+0x25/0x35 [bnxt_re]\n   bnxt_qplib_alloc_init_hwq+0xa1/0x470 [bnxt_re]\n   bnxt_qplib_create_qp+0x19e/0x840 [bnxt_re]\n   bnxt_re_create_qp+0x9b1/0xcd0 [bnxt_re]\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? __kmalloc+0x1b6/0x4f0\n   ? create_qp.part.0+0x128/0x1c0 [ib_core]\n   ? __pfx_bnxt_re_create_qp+0x10/0x10 [bnxt_re]\n   create_qp.part.0+0x128/0x1c0 [ib_core]\n   ib_create_qp_kernel+0x50/0xd0 [ib_core]\n   create_mad_qp+0x8e/0xe0 [ib_core]\n   ? __pfx_qp_event_handler+0x10/0x10 [ib_core]\n   ib_mad_init_device+0x2be/0x680 [ib_core]\n   add_client_context+0x10d/0x1a0 [ib_core]\n   enable_device_and_get+0xe0/0x1d0 [ib_core]\n   ib_register_device+0x53c/0x630 [ib_core]\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   bnxt_re_probe+0xbd8/0xe50 [bnxt_re]\n   ? __pfx_bnxt_re_probe+0x10/0x10 [bnxt_re]\n   auxiliary_bus_probe+0x49/0x80\n   ? driver_sysfs_add+0x57/0xc0\n   really_probe+0xde/0x340\n   ? pm_runtime_barrier+0x54/0x90\n   ? __pfx___driver_attach+0x10/0x10\n   __driver_probe_device+0x78/0x110\n   driver_probe_device+0x1f/0xa0\n   __driver_attach+0xba/0x1c0\n   bus_for_each_dev+0x8f/0xe0\n   bus_add_driver+0x146/0x220\n   driver_register+0x72/0xd0\n   __auxiliary_driver_register+0x6e/0xd0\n   ? __pfx_bnxt_re_mod_init+0x10/0x10 [bnxt_re]\n   bnxt_re_mod_init+0x3e/0xff0 [bnxt_re]\n   ? __pfx_bnxt_re_mod_init+0x10/0x10 [bnxt_re]\n   do_one_initcall+0x5b/0x310\n   do_init_module+0x90/0x250\n   init_module_from_file+0x86/0xc0\n   idempotent_init_module+0x121/0x2b0\n   __x64_sys_finit_module+0x5e/0xb0\n   do_syscall_64+0x82/0x160\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? syscall_exit_to_user_mode_prepare+0x149/0x170\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? syscall_exit_to_user_mode+0x75/0x230\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? do_syscall_64+0x8e/0x160\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? __count_memcg_events+0x69/0x100\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? count_memcg_events.constprop.0+0x1a/0x30\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? handle_mm_fault+0x1f0/0x300\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? do_user_addr_fault+0x34e/0x640\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   ? srso_alias_return_thunk+0x5/0xfbef5\n   entry_SYSCALL_64_after_hwframe+0x76/0x7e\n  RIP: 0033:0x7f4e5132821d\n  Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e3 db 0c 00 f7 d8 64 89 01 48\n  RSP: 002b:00007ffca9c906a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139\n  RAX: ffffffffffffffda RBX: 0000563ec8a8f130 RCX: 00007f4e5132821d\n  RDX: 0000000000000000 RSI: 00007f4e518fa07d RDI: 000000000000003b\n  RBP: 00007ffca9c90760 R08: 00007f4e513f6b20 R09: 00007ffca9c906f0\n  R10: 0000563ec8a8faa0 R11: 0000000000000246 R12: 00007f4e518fa07d\n  R13: 0000000000020000 R14: 0000563ec8409e90 R15: 0000563ec8a8fa60\n   </TASK>\n  ---[ end trace ]---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38540",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/66a9937187ac9b5c5ffff07b8b284483e56804d1",
            "patch_url": "https://git.kernel.org/stable/p/66a9937187ac9b5c5ffff07b8b284483e56804d1",
            "filename": "CVE-2024-38540-66a9937187ac9b5c5ffff07b8b284483e56804d1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38540/CVE-2024-38540-66a9937187ac9b5c5ffff07b8b284483e56804d1.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/627493443f3a8458cb55cdae1da254a7001123bc",
                "patch_url": "https://git.kernel.org/stable/p/627493443f3a8458cb55cdae1da254a7001123bc",
                "filename": "CVE-2024-38540-627493443f3a8458cb55cdae1da254a7001123bc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38540/CVE-2024-38540-627493443f3a8458cb55cdae1da254a7001123bc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/66a9937187ac9b5c5ffff07b8b284483e56804d1",
                "patch_url": "https://git.kernel.org/stable/p/66a9937187ac9b5c5ffff07b8b284483e56804d1",
                "filename": "CVE-2024-38540-66a9937187ac9b5c5ffff07b8b284483e56804d1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38540/CVE-2024-38540-66a9937187ac9b5c5ffff07b8b284483e56804d1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/78cfd17142ef70599d6409cbd709d94b3da58659",
                "patch_url": "https://git.kernel.org/stable/p/78cfd17142ef70599d6409cbd709d94b3da58659",
                "filename": "CVE-2024-38540-78cfd17142ef70599d6409cbd709d94b3da58659.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38540/CVE-2024-38540-78cfd17142ef70599d6409cbd709d94b3da58659.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/84d2f29152184f0d72ed7c9648c4ee6927df4e59",
                "patch_url": "https://git.kernel.org/stable/p/84d2f29152184f0d72ed7c9648c4ee6927df4e59",
                "filename": "CVE-2024-38540-84d2f29152184f0d72ed7c9648c4ee6927df4e59.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38540/CVE-2024-38540-84d2f29152184f0d72ed7c9648c4ee6927df4e59.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8b799c00cea6fcfe5b501bbaeb228c8821acb753",
                "patch_url": "https://git.kernel.org/stable/p/8b799c00cea6fcfe5b501bbaeb228c8821acb753",
                "filename": "CVE-2024-38540-8b799c00cea6fcfe5b501bbaeb228c8821acb753.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38540/CVE-2024-38540-8b799c00cea6fcfe5b501bbaeb228c8821acb753.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a658f011d89dd20cf2c7cb4760ffd79201700b98",
                "patch_url": "https://git.kernel.org/stable/p/a658f011d89dd20cf2c7cb4760ffd79201700b98",
                "filename": "CVE-2024-38540-a658f011d89dd20cf2c7cb4760ffd79201700b98.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38540/CVE-2024-38540-a658f011d89dd20cf2c7cb4760ffd79201700b98.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/627493443f3a8458cb55cdae1da254a7001123bc",
            "https://git.kernel.org/stable/c/66a9937187ac9b5c5ffff07b8b284483e56804d1",
            "https://git.kernel.org/stable/c/78cfd17142ef70599d6409cbd709d94b3da58659",
            "https://git.kernel.org/stable/c/84d2f29152184f0d72ed7c9648c4ee6927df4e59",
            "https://git.kernel.org/stable/c/8b799c00cea6fcfe5b501bbaeb228c8821acb753",
            "https://git.kernel.org/stable/c/a658f011d89dd20cf2c7cb4760ffd79201700b98",
            "https://www.cve.org/CVERecord?id=CVE-2024-38540\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38540\nhttps://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38540-1d0a@gregkh/T"
        ]
    },
    "CVE-2024-38541": {
        "cve": "CVE-2024-38541",
        "cvss_v2": null,
        "cvss_v3": 9.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: module: add buffer overflow check in of_modalias()\n\nIn of_modalias(), if the buffer happens to be too small even for the 1st\nsnprintf() call, the len parameter will become negative and str parameter\n(if not NULL initially) will point beyond the buffer's end. Add the buffer\noverflow check after the 1st snprintf() call and fix such check after the\nstrlen() call (accounting for the terminating NUL char).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38541",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/733e62786bdf1b2b9dbb09ba2246313306503414",
            "patch_url": "https://git.kernel.org/stable/p/733e62786bdf1b2b9dbb09ba2246313306503414",
            "filename": "CVE-2024-38541-733e62786bdf1b2b9dbb09ba2246313306503414.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38541/CVE-2024-38541-733e62786bdf1b2b9dbb09ba2246313306503414.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0b0d5701a8bf02f8fee037e81aacf6746558bfd6",
                "patch_url": "https://git.kernel.org/stable/p/0b0d5701a8bf02f8fee037e81aacf6746558bfd6",
                "filename": "CVE-2024-38541-0b0d5701a8bf02f8fee037e81aacf6746558bfd6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38541/CVE-2024-38541-0b0d5701a8bf02f8fee037e81aacf6746558bfd6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/46795440ef2b4ac919d09310a69a404c5bc90a88",
                "patch_url": "https://git.kernel.org/stable/p/46795440ef2b4ac919d09310a69a404c5bc90a88",
                "filename": "CVE-2024-38541-46795440ef2b4ac919d09310a69a404c5bc90a88.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38541/CVE-2024-38541-46795440ef2b4ac919d09310a69a404c5bc90a88.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5d59fd637a8af42b211a92b2edb2474325b4d488",
                "patch_url": "https://git.kernel.org/stable/p/5d59fd637a8af42b211a92b2edb2474325b4d488",
                "filename": "CVE-2024-38541-5d59fd637a8af42b211a92b2edb2474325b4d488.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38541/CVE-2024-38541-5d59fd637a8af42b211a92b2edb2474325b4d488.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/733e62786bdf1b2b9dbb09ba2246313306503414",
                "patch_url": "https://git.kernel.org/stable/p/733e62786bdf1b2b9dbb09ba2246313306503414",
                "filename": "CVE-2024-38541-733e62786bdf1b2b9dbb09ba2246313306503414.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38541/CVE-2024-38541-733e62786bdf1b2b9dbb09ba2246313306503414.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c7f24b7d94549ff4623e8f41ea4d9f5319bd8ac8",
                "patch_url": "https://git.kernel.org/stable/p/c7f24b7d94549ff4623e8f41ea4d9f5319bd8ac8",
                "filename": "CVE-2024-38541-c7f24b7d94549ff4623e8f41ea4d9f5319bd8ac8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38541/CVE-2024-38541-c7f24b7d94549ff4623e8f41ea4d9f5319bd8ac8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf7385cb26ac4f0ee6c7385960525ad534323252",
                "patch_url": "https://git.kernel.org/stable/p/cf7385cb26ac4f0ee6c7385960525ad534323252",
                "filename": "CVE-2024-38541-cf7385cb26ac4f0ee6c7385960525ad534323252.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38541/CVE-2024-38541-cf7385cb26ac4f0ee6c7385960525ad534323252.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e45b69360a63165377b30db4a1dfddd89ca18e9a",
                "patch_url": "https://git.kernel.org/stable/p/e45b69360a63165377b30db4a1dfddd89ca18e9a",
                "filename": "CVE-2024-38541-e45b69360a63165377b30db4a1dfddd89ca18e9a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38541/CVE-2024-38541-e45b69360a63165377b30db4a1dfddd89ca18e9a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ee332023adfd5882808f2dabf037b32d6ce36f9e",
                "patch_url": "https://git.kernel.org/stable/p/ee332023adfd5882808f2dabf037b32d6ce36f9e",
                "filename": "CVE-2024-38541-ee332023adfd5882808f2dabf037b32d6ce36f9e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38541/CVE-2024-38541-ee332023adfd5882808f2dabf037b32d6ce36f9e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0b0d5701a8bf02f8fee037e81aacf6746558bfd6",
            "https://git.kernel.org/stable/c/46795440ef2b4ac919d09310a69a404c5bc90a88",
            "https://git.kernel.org/stable/c/5d59fd637a8af42b211a92b2edb2474325b4d488",
            "https://git.kernel.org/stable/c/733e62786bdf1b2b9dbb09ba2246313306503414",
            "https://git.kernel.org/stable/c/c7f24b7d94549ff4623e8f41ea4d9f5319bd8ac8",
            "https://git.kernel.org/stable/c/cf7385cb26ac4f0ee6c7385960525ad534323252",
            "https://git.kernel.org/stable/c/e45b69360a63165377b30db4a1dfddd89ca18e9a",
            "https://git.kernel.org/stable/c/ee332023adfd5882808f2dabf037b32d6ce36f9e",
            "https://www.cve.org/CVERecord?id=CVE-2024-38541\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38541\nhttps://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38541-53d0@gregkh/T"
        ]
    },
    "CVE-2024-38555": {
        "cve": "CVE-2024-38555",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Discard command completions in internal error\n\nFix use after free when FW completion arrives while device is in\ninternal error state. Avoid calling completion handler in this case,\nsince the device will flush the command interface and trigger all\ncompletions manually.\n\nKernel log:\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\n...\nRIP: 0010:refcount_warn_saturate+0xd8/0xe0\n...\nCall Trace:\n<IRQ>\n? __warn+0x79/0x120\n? refcount_warn_saturate+0xd8/0xe0\n? report_bug+0x17c/0x190\n? handle_bug+0x3c/0x60\n? exc_invalid_op+0x14/0x70\n? asm_exc_invalid_op+0x16/0x20\n? refcount_warn_saturate+0xd8/0xe0\ncmd_ent_put+0x13b/0x160 [mlx5_core]\nmlx5_cmd_comp_handler+0x5f9/0x670 [mlx5_core]\ncmd_comp_notifier+0x1f/0x30 [mlx5_core]\nnotifier_call_chain+0x35/0xb0\natomic_notifier_call_chain+0x16/0x20\nmlx5_eq_async_int+0xf6/0x290 [mlx5_core]\nnotifier_call_chain+0x35/0xb0\natomic_notifier_call_chain+0x16/0x20\nirq_int_handler+0x19/0x30 [mlx5_core]\n__handle_irq_event_percpu+0x4b/0x160\nhandle_irq_event+0x2e/0x80\nhandle_edge_irq+0x98/0x230\n__common_interrupt+0x3b/0xa0\ncommon_interrupt+0x7b/0xa0\n</IRQ>\n<TASK>\nasm_common_interrupt+0x22/0x40",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38555",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb",
            "patch_url": "https://git.kernel.org/stable/p/1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb",
            "filename": "CVE-2024-38555-1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38555/CVE-2024-38555-1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb",
                "patch_url": "https://git.kernel.org/stable/p/1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb",
                "filename": "CVE-2024-38555-1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38555/CVE-2024-38555-1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1d5dce5e92a70274de67a59e1e674c3267f94cd7",
                "patch_url": "https://git.kernel.org/stable/p/1d5dce5e92a70274de67a59e1e674c3267f94cd7",
                "filename": "CVE-2024-38555-1d5dce5e92a70274de67a59e1e674c3267f94cd7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38555/CVE-2024-38555-1d5dce5e92a70274de67a59e1e674c3267f94cd7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3cb92b0ad73d3f1734e812054e698d655e9581b0",
                "patch_url": "https://git.kernel.org/stable/p/3cb92b0ad73d3f1734e812054e698d655e9581b0",
                "filename": "CVE-2024-38555-3cb92b0ad73d3f1734e812054e698d655e9581b0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38555/CVE-2024-38555-3cb92b0ad73d3f1734e812054e698d655e9581b0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7ac4c69c34240c6de820492c0a28a0bd1494265a",
                "patch_url": "https://git.kernel.org/stable/p/7ac4c69c34240c6de820492c0a28a0bd1494265a",
                "filename": "CVE-2024-38555-7ac4c69c34240c6de820492c0a28a0bd1494265a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38555/CVE-2024-38555-7ac4c69c34240c6de820492c0a28a0bd1494265a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bf8aaf0ae01c27ae3c06aa8610caf91e50393396",
                "patch_url": "https://git.kernel.org/stable/p/bf8aaf0ae01c27ae3c06aa8610caf91e50393396",
                "filename": "CVE-2024-38555-bf8aaf0ae01c27ae3c06aa8610caf91e50393396.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38555/CVE-2024-38555-bf8aaf0ae01c27ae3c06aa8610caf91e50393396.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/db9b31aa9bc56ff0d15b78f7e827d61c4a096e40",
                "patch_url": "https://git.kernel.org/stable/p/db9b31aa9bc56ff0d15b78f7e827d61c4a096e40",
                "filename": "CVE-2024-38555-db9b31aa9bc56ff0d15b78f7e827d61c4a096e40.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38555/CVE-2024-38555-db9b31aa9bc56ff0d15b78f7e827d61c4a096e40.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f6fbb8535e990f844371086ab2c1221f71f993d3",
                "patch_url": "https://git.kernel.org/stable/p/f6fbb8535e990f844371086ab2c1221f71f993d3",
                "filename": "CVE-2024-38555-f6fbb8535e990f844371086ab2c1221f71f993d3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38555/CVE-2024-38555-f6fbb8535e990f844371086ab2c1221f71f993d3.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb",
            "https://git.kernel.org/stable/c/1d5dce5e92a70274de67a59e1e674c3267f94cd7",
            "https://git.kernel.org/stable/c/3cb92b0ad73d3f1734e812054e698d655e9581b0",
            "https://git.kernel.org/stable/c/7ac4c69c34240c6de820492c0a28a0bd1494265a",
            "https://git.kernel.org/stable/c/bf8aaf0ae01c27ae3c06aa8610caf91e50393396",
            "https://git.kernel.org/stable/c/db9b31aa9bc56ff0d15b78f7e827d61c4a096e40",
            "https://git.kernel.org/stable/c/f6fbb8535e990f844371086ab2c1221f71f993d3",
            "https://www.cve.org/CVERecord?id=CVE-2024-38555\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38555\nhttps://lore.kernel.org/linux-cve-announce/2024061952-CVE-2024-38555-aefb@gregkh/T"
        ]
    },
    "CVE-2024-38558": {
        "cve": "CVE-2024-38558",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix overwriting ct original tuple for ICMPv6\n\nOVS_PACKET_CMD_EXECUTE has 3 main attributes:\n - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format.\n - OVS_PACKET_ATTR_PACKET - Binary packet content.\n - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet.\n\nOVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure\nwith the metadata like conntrack state, input port, recirculation id,\netc.  Then the packet itself gets parsed to populate the rest of the\nkeys from the packet headers.\n\nWhenever the packet parsing code starts parsing the ICMPv6 header, it\nfirst zeroes out fields in the key corresponding to Neighbor Discovery\ninformation even if it is not an ND packet.\n\nIt is an 'ipv6.nd' field.  However, the 'ipv6' is a union that shares\nthe space between 'nd' and 'ct_orig' that holds the original tuple\nconntrack metadata parsed from the OVS_PACKET_ATTR_KEY.\n\nND packets should not normally have conntrack state, so it's fine to\nshare the space, but normal ICMPv6 Echo packets or maybe other types of\nICMPv6 can have the state attached and it should not be overwritten.\n\nThe issue results in all but the last 4 bytes of the destination\naddress being wiped from the original conntrack tuple leading to\nincorrect packet matching and potentially executing wrong actions\nin case this packet recirculates within the datapath or goes back\nto userspace.\n\nND fields should not be accessed in non-ND packets, so not clearing\nthem should be fine.  Executing memset() only for actual ND packets to\navoid the issue.\n\nInitializing the whole thing before parsing is needed because ND packet\nmay not contain all the options.\n\nThe issue only affects the OVS_PACKET_CMD_EXECUTE path and doesn't\naffect packets entering OVS datapath from network interfaces, because\nin this case CT metadata is populated from skb after the packet is\nalready parsed.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38558",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6a51ac92bf35d34b4996d6eb67e2fe469f573b11",
            "patch_url": "https://git.kernel.org/stable/p/6a51ac92bf35d34b4996d6eb67e2fe469f573b11",
            "filename": "CVE-2024-38558-6a51ac92bf35d34b4996d6eb67e2fe469f573b11.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38558/CVE-2024-38558-6a51ac92bf35d34b4996d6eb67e2fe469f573b11.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0b532f59437f688563e9c58bdc1436fefa46e3b5",
                "patch_url": "https://git.kernel.org/stable/p/0b532f59437f688563e9c58bdc1436fefa46e3b5",
                "filename": "CVE-2024-38558-0b532f59437f688563e9c58bdc1436fefa46e3b5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38558/CVE-2024-38558-0b532f59437f688563e9c58bdc1436fefa46e3b5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/431e9215576d7b728f3f53a704d237a520092120",
                "patch_url": "https://git.kernel.org/stable/p/431e9215576d7b728f3f53a704d237a520092120",
                "filename": "CVE-2024-38558-431e9215576d7b728f3f53a704d237a520092120.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38558/CVE-2024-38558-431e9215576d7b728f3f53a704d237a520092120.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/483eb70f441e2df66ade78aa7217e6e4caadfef3",
                "patch_url": "https://git.kernel.org/stable/p/483eb70f441e2df66ade78aa7217e6e4caadfef3",
                "filename": "CVE-2024-38558-483eb70f441e2df66ade78aa7217e6e4caadfef3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38558/CVE-2024-38558-483eb70f441e2df66ade78aa7217e6e4caadfef3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5ab6aecbede080b44b8e34720ab72050bf1e6982",
                "patch_url": "https://git.kernel.org/stable/p/5ab6aecbede080b44b8e34720ab72050bf1e6982",
                "filename": "CVE-2024-38558-5ab6aecbede080b44b8e34720ab72050bf1e6982.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38558/CVE-2024-38558-5ab6aecbede080b44b8e34720ab72050bf1e6982.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6a51ac92bf35d34b4996d6eb67e2fe469f573b11",
                "patch_url": "https://git.kernel.org/stable/p/6a51ac92bf35d34b4996d6eb67e2fe469f573b11",
                "filename": "CVE-2024-38558-6a51ac92bf35d34b4996d6eb67e2fe469f573b11.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38558/CVE-2024-38558-6a51ac92bf35d34b4996d6eb67e2fe469f573b11.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/78741b4caae1e880368cb2f5110635f3ce45ecfd",
                "patch_url": "https://git.kernel.org/stable/p/78741b4caae1e880368cb2f5110635f3ce45ecfd",
                "filename": "CVE-2024-38558-78741b4caae1e880368cb2f5110635f3ce45ecfd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38558/CVE-2024-38558-78741b4caae1e880368cb2f5110635f3ce45ecfd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7c988176b6c16c516474f6fceebe0f055af5eb56",
                "patch_url": "https://git.kernel.org/stable/p/7c988176b6c16c516474f6fceebe0f055af5eb56",
                "filename": "CVE-2024-38558-7c988176b6c16c516474f6fceebe0f055af5eb56.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38558/CVE-2024-38558-7c988176b6c16c516474f6fceebe0f055af5eb56.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ec8b0ccadb908d92f7ee211a4eff05fd932f3f6",
                "patch_url": "https://git.kernel.org/stable/p/9ec8b0ccadb908d92f7ee211a4eff05fd932f3f6",
                "filename": "CVE-2024-38558-9ec8b0ccadb908d92f7ee211a4eff05fd932f3f6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38558/CVE-2024-38558-9ec8b0ccadb908d92f7ee211a4eff05fd932f3f6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d73fb8bddf89503c9fae7c42e50d44c89909aad6",
                "patch_url": "https://git.kernel.org/stable/p/d73fb8bddf89503c9fae7c42e50d44c89909aad6",
                "filename": "CVE-2024-38558-d73fb8bddf89503c9fae7c42e50d44c89909aad6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38558/CVE-2024-38558-d73fb8bddf89503c9fae7c42e50d44c89909aad6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0b532f59437f688563e9c58bdc1436fefa46e3b5",
            "https://git.kernel.org/stable/c/431e9215576d7b728f3f53a704d237a520092120",
            "https://git.kernel.org/stable/c/483eb70f441e2df66ade78aa7217e6e4caadfef3",
            "https://git.kernel.org/stable/c/5ab6aecbede080b44b8e34720ab72050bf1e6982",
            "https://git.kernel.org/stable/c/6a51ac92bf35d34b4996d6eb67e2fe469f573b11",
            "https://git.kernel.org/stable/c/78741b4caae1e880368cb2f5110635f3ce45ecfd",
            "https://git.kernel.org/stable/c/7c988176b6c16c516474f6fceebe0f055af5eb56",
            "https://git.kernel.org/stable/c/9ec8b0ccadb908d92f7ee211a4eff05fd932f3f6",
            "https://git.kernel.org/stable/c/d73fb8bddf89503c9fae7c42e50d44c89909aad6",
            "https://www.cve.org/CVERecord?id=CVE-2024-38558\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38558\nhttps://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38558-ddfd@gregkh/T"
        ]
    },
    "CVE-2024-38559": {
        "cve": "CVE-2024-38559",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a count-sized kernel buffer and copy count from\nuserspace to that buffer. Later, we use kstrtouint on this buffer but we\ndon't ensure that the string is terminated inside the buffer, this can\nlead to OOB read when using kstrtouint. Fix this issue by using\nmemdup_user_nul instead of memdup_user.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38559",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/177f43c6892e6055de6541fe9391a8a3d1f95fc9",
            "patch_url": "https://git.kernel.org/stable/p/177f43c6892e6055de6541fe9391a8a3d1f95fc9",
            "filename": "CVE-2024-38559-177f43c6892e6055de6541fe9391a8a3d1f95fc9.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38559/CVE-2024-38559-177f43c6892e6055de6541fe9391a8a3d1f95fc9.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/177f43c6892e6055de6541fe9391a8a3d1f95fc9",
                "patch_url": "https://git.kernel.org/stable/p/177f43c6892e6055de6541fe9391a8a3d1f95fc9",
                "filename": "CVE-2024-38559-177f43c6892e6055de6541fe9391a8a3d1f95fc9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38559/CVE-2024-38559-177f43c6892e6055de6541fe9391a8a3d1f95fc9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1f84a2744ad813be23fc4be99fb74bfb24aadb95",
                "patch_url": "https://git.kernel.org/stable/p/1f84a2744ad813be23fc4be99fb74bfb24aadb95",
                "filename": "CVE-2024-38559-1f84a2744ad813be23fc4be99fb74bfb24aadb95.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38559/CVE-2024-38559-1f84a2744ad813be23fc4be99fb74bfb24aadb95.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8",
                "patch_url": "https://git.kernel.org/stable/p/4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8",
                "filename": "CVE-2024-38559-4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38559/CVE-2024-38559-4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/563e609275927c0b75fbfd0d90441543aa7b5e0d",
                "patch_url": "https://git.kernel.org/stable/p/563e609275927c0b75fbfd0d90441543aa7b5e0d",
                "filename": "CVE-2024-38559-563e609275927c0b75fbfd0d90441543aa7b5e0d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38559/CVE-2024-38559-563e609275927c0b75fbfd0d90441543aa7b5e0d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/769b9fd2af02c069451fe9108dba73355d9a021c",
                "patch_url": "https://git.kernel.org/stable/p/769b9fd2af02c069451fe9108dba73355d9a021c",
                "filename": "CVE-2024-38559-769b9fd2af02c069451fe9108dba73355d9a021c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38559/CVE-2024-38559-769b9fd2af02c069451fe9108dba73355d9a021c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a75001678e1d38aa607d5b898ec7ff8ed0700d59",
                "patch_url": "https://git.kernel.org/stable/p/a75001678e1d38aa607d5b898ec7ff8ed0700d59",
                "filename": "CVE-2024-38559-a75001678e1d38aa607d5b898ec7ff8ed0700d59.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38559/CVE-2024-38559-a75001678e1d38aa607d5b898ec7ff8ed0700d59.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d0184a375ee797eb657d74861ba0935b6e405c62",
                "patch_url": "https://git.kernel.org/stable/p/d0184a375ee797eb657d74861ba0935b6e405c62",
                "filename": "CVE-2024-38559-d0184a375ee797eb657d74861ba0935b6e405c62.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38559/CVE-2024-38559-d0184a375ee797eb657d74861ba0935b6e405c62.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d93318f19d1e1a6d5f04f5d965eaa9055bb7c613",
                "patch_url": "https://git.kernel.org/stable/p/d93318f19d1e1a6d5f04f5d965eaa9055bb7c613",
                "filename": "CVE-2024-38559-d93318f19d1e1a6d5f04f5d965eaa9055bb7c613.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38559/CVE-2024-38559-d93318f19d1e1a6d5f04f5d965eaa9055bb7c613.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dccd97b39ab2f2b1b9a47a1394647a4d65815255",
                "patch_url": "https://git.kernel.org/stable/p/dccd97b39ab2f2b1b9a47a1394647a4d65815255",
                "filename": "CVE-2024-38559-dccd97b39ab2f2b1b9a47a1394647a4d65815255.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38559/CVE-2024-38559-dccd97b39ab2f2b1b9a47a1394647a4d65815255.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/177f43c6892e6055de6541fe9391a8a3d1f95fc9",
            "https://git.kernel.org/stable/c/1f84a2744ad813be23fc4be99fb74bfb24aadb95",
            "https://git.kernel.org/stable/c/4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8",
            "https://git.kernel.org/stable/c/563e609275927c0b75fbfd0d90441543aa7b5e0d",
            "https://git.kernel.org/stable/c/769b9fd2af02c069451fe9108dba73355d9a021c",
            "https://git.kernel.org/stable/c/a75001678e1d38aa607d5b898ec7ff8ed0700d59",
            "https://git.kernel.org/stable/c/d0184a375ee797eb657d74861ba0935b6e405c62",
            "https://git.kernel.org/stable/c/d93318f19d1e1a6d5f04f5d965eaa9055bb7c613",
            "https://git.kernel.org/stable/c/dccd97b39ab2f2b1b9a47a1394647a4d65815255",
            "https://www.cve.org/CVERecord?id=CVE-2024-38559\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38559\nhttps://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38559-3e03@gregkh/T"
        ]
    },
    "CVE-2024-38564": {
        "cve": "CVE-2024-38564",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE\n\nbpf_prog_attach uses attach_type_to_prog_type to enforce proper\nattach type for BPF_PROG_TYPE_CGROUP_SKB. link_create uses\nbpf_prog_get and relies on bpf_prog_attach_check_attach_type\nto properly verify prog_type <> attach_type association.\n\nAdd missing attach_type enforcement for the link_create case.\nOtherwise, it's currently possible to attach cgroup_skb prog\ntypes to other cgroup hooks.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38564",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6675c541f540a29487a802d3135280b69b9f568d",
            "patch_url": "https://git.kernel.org/stable/p/6675c541f540a29487a802d3135280b69b9f568d",
            "filename": "CVE-2024-38564-6675c541f540a29487a802d3135280b69b9f568d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38564/CVE-2024-38564-6675c541f540a29487a802d3135280b69b9f568d.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/543576ec15b17c0c93301ac8297333c7b6e84ac7",
                "patch_url": "https://git.kernel.org/stable/p/543576ec15b17c0c93301ac8297333c7b6e84ac7",
                "filename": "CVE-2024-38564-543576ec15b17c0c93301ac8297333c7b6e84ac7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38564/CVE-2024-38564-543576ec15b17c0c93301ac8297333c7b6e84ac7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6675c541f540a29487a802d3135280b69b9f568d",
                "patch_url": "https://git.kernel.org/stable/p/6675c541f540a29487a802d3135280b69b9f568d",
                "filename": "CVE-2024-38564-6675c541f540a29487a802d3135280b69b9f568d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38564/CVE-2024-38564-6675c541f540a29487a802d3135280b69b9f568d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/67929e973f5a347f05fef064fea4ae79e7cdb5fd",
                "patch_url": "https://git.kernel.org/stable/p/67929e973f5a347f05fef064fea4ae79e7cdb5fd",
                "filename": "CVE-2024-38564-67929e973f5a347f05fef064fea4ae79e7cdb5fd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38564/CVE-2024-38564-67929e973f5a347f05fef064fea4ae79e7cdb5fd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b34bbc76651065a5eafad8ddff1eb8d1f8473172",
                "patch_url": "https://git.kernel.org/stable/p/b34bbc76651065a5eafad8ddff1eb8d1f8473172",
                "filename": "CVE-2024-38564-b34bbc76651065a5eafad8ddff1eb8d1f8473172.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38564/CVE-2024-38564-b34bbc76651065a5eafad8ddff1eb8d1f8473172.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/543576ec15b17c0c93301ac8297333c7b6e84ac7",
            "https://git.kernel.org/stable/c/6675c541f540a29487a802d3135280b69b9f568d",
            "https://git.kernel.org/stable/c/67929e973f5a347f05fef064fea4ae79e7cdb5fd",
            "https://git.kernel.org/stable/c/b34bbc76651065a5eafad8ddff1eb8d1f8473172",
            "https://www.cve.org/CVERecord?id=CVE-2024-38564\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38564\nhttps://lore.kernel.org/linux-cve-announce/2024061955-CVE-2024-38564-b069@gregkh/T"
        ]
    },
    "CVE-2024-38570": {
        "cve": "CVE-2024-38570",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix potential glock use-after-free on unmount\n\nWhen a DLM lockspace is released and there ares still locks in that\nlockspace, DLM will unlock those locks automatically.  Commit\nfb6791d100d1b started exploiting this behavior to speed up filesystem\nunmount: gfs2 would simply free glocks it didn't want to unlock and then\nrelease the lockspace.  This didn't take the bast callbacks for\nasynchronous lock contention notifications into account, which remain\nactive until until a lock is unlocked or its lockspace is released.\n\nTo prevent those callbacks from accessing deallocated objects, put the\nglocks that should not be unlocked on the sd_dead_glocks list, release\nthe lockspace, and only then free those glocks.\n\nAs an additional measure, ignore unexpected ast and bast callbacks if\nthe receiving glock is dead.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38570",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0636b34b44589b142700ac137b5f69802cfe2e37",
            "patch_url": "https://git.kernel.org/stable/p/0636b34b44589b142700ac137b5f69802cfe2e37",
            "filename": "CVE-2024-38570-0636b34b44589b142700ac137b5f69802cfe2e37.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38570/CVE-2024-38570-0636b34b44589b142700ac137b5f69802cfe2e37.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0636b34b44589b142700ac137b5f69802cfe2e37",
                "patch_url": "https://git.kernel.org/stable/p/0636b34b44589b142700ac137b5f69802cfe2e37",
                "filename": "CVE-2024-38570-0636b34b44589b142700ac137b5f69802cfe2e37.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38570/CVE-2024-38570-0636b34b44589b142700ac137b5f69802cfe2e37.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/501cd8fabf621d10bd4893e37f6ce6c20523c8ca",
                "patch_url": "https://git.kernel.org/stable/p/501cd8fabf621d10bd4893e37f6ce6c20523c8ca",
                "filename": "CVE-2024-38570-501cd8fabf621d10bd4893e37f6ce6c20523c8ca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38570/CVE-2024-38570-501cd8fabf621d10bd4893e37f6ce6c20523c8ca.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d98779e687726d8f8860f1c54b5687eec5f63a73",
                "patch_url": "https://git.kernel.org/stable/p/d98779e687726d8f8860f1c54b5687eec5f63a73",
                "filename": "CVE-2024-38570-d98779e687726d8f8860f1c54b5687eec5f63a73.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38570/CVE-2024-38570-d98779e687726d8f8860f1c54b5687eec5f63a73.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e42e8a24d7f02d28763d16ca7ec5fc6d1f142af0",
                "patch_url": "https://git.kernel.org/stable/p/e42e8a24d7f02d28763d16ca7ec5fc6d1f142af0",
                "filename": "CVE-2024-38570-e42e8a24d7f02d28763d16ca7ec5fc6d1f142af0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38570/CVE-2024-38570-e42e8a24d7f02d28763d16ca7ec5fc6d1f142af0.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0636b34b44589b142700ac137b5f69802cfe2e37",
            "https://git.kernel.org/stable/c/501cd8fabf621d10bd4893e37f6ce6c20523c8ca",
            "https://git.kernel.org/stable/c/d98779e687726d8f8860f1c54b5687eec5f63a73",
            "https://git.kernel.org/stable/c/e42e8a24d7f02d28763d16ca7ec5fc6d1f142af0",
            "https://www.cve.org/CVERecord?id=CVE-2024-38570\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38570\nhttps://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38570-a8ef@gregkh/T"
        ]
    },
    "CVE-2024-38573": {
        "cve": "CVE-2024-38573",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncppc_cpufreq: Fix possible null pointer dereference\n\ncppc_cpufreq_get_rate() and hisi_cppc_cpufreq_get_rate() can be called from\ndifferent places with various parameters. So cpufreq_cpu_get() can return\nnull as 'policy' in some circumstances.\nFix this bug by adding null return check.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38573",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/769c4f355b7962895205b86ad35617873feef9a5",
            "patch_url": "https://git.kernel.org/stable/p/769c4f355b7962895205b86ad35617873feef9a5",
            "filename": "CVE-2024-38573-769c4f355b7962895205b86ad35617873feef9a5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38573/CVE-2024-38573-769c4f355b7962895205b86ad35617873feef9a5.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/769c4f355b7962895205b86ad35617873feef9a5",
                "patch_url": "https://git.kernel.org/stable/p/769c4f355b7962895205b86ad35617873feef9a5",
                "filename": "CVE-2024-38573-769c4f355b7962895205b86ad35617873feef9a5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38573/CVE-2024-38573-769c4f355b7962895205b86ad35617873feef9a5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9a185cc5a79ba408e1c73375706630662304f618",
                "patch_url": "https://git.kernel.org/stable/p/9a185cc5a79ba408e1c73375706630662304f618",
                "filename": "CVE-2024-38573-9a185cc5a79ba408e1c73375706630662304f618.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38573/CVE-2024-38573-9a185cc5a79ba408e1c73375706630662304f618.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b18daa4ec727c0266de5bfc78e818d168cc4aedf",
                "patch_url": "https://git.kernel.org/stable/p/b18daa4ec727c0266de5bfc78e818d168cc4aedf",
                "filename": "CVE-2024-38573-b18daa4ec727c0266de5bfc78e818d168cc4aedf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38573/CVE-2024-38573-b18daa4ec727c0266de5bfc78e818d168cc4aedf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf7de25878a1f4508c69dc9f6819c21ba177dbfe",
                "patch_url": "https://git.kernel.org/stable/p/cf7de25878a1f4508c69dc9f6819c21ba177dbfe",
                "filename": "CVE-2024-38573-cf7de25878a1f4508c69dc9f6819c21ba177dbfe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38573/CVE-2024-38573-cf7de25878a1f4508c69dc9f6819c21ba177dbfe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dfec15222529d22b15e5b0d63572a9e39570cab4",
                "patch_url": "https://git.kernel.org/stable/p/dfec15222529d22b15e5b0d63572a9e39570cab4",
                "filename": "CVE-2024-38573-dfec15222529d22b15e5b0d63572a9e39570cab4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38573/CVE-2024-38573-dfec15222529d22b15e5b0d63572a9e39570cab4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f84b9b25d045e67a7eee5e73f21278c8ab06713c",
                "patch_url": "https://git.kernel.org/stable/p/f84b9b25d045e67a7eee5e73f21278c8ab06713c",
                "filename": "CVE-2024-38573-f84b9b25d045e67a7eee5e73f21278c8ab06713c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38573/CVE-2024-38573-f84b9b25d045e67a7eee5e73f21278c8ab06713c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/769c4f355b7962895205b86ad35617873feef9a5",
            "https://git.kernel.org/stable/c/9a185cc5a79ba408e1c73375706630662304f618",
            "https://git.kernel.org/stable/c/b18daa4ec727c0266de5bfc78e818d168cc4aedf",
            "https://git.kernel.org/stable/c/cf7de25878a1f4508c69dc9f6819c21ba177dbfe",
            "https://git.kernel.org/stable/c/dfec15222529d22b15e5b0d63572a9e39570cab4",
            "https://git.kernel.org/stable/c/f84b9b25d045e67a7eee5e73f21278c8ab06713c",
            "https://www.cve.org/CVERecord?id=CVE-2024-38573\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38573\nhttps://lore.kernel.org/linux-cve-announce/2024061957-CVE-2024-38573-d4b6@gregkh/T"
        ]
    },
    "CVE-2024-38575": {
        "cve": "CVE-2024-38575",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: pcie: handle randbuf allocation failure\n\nThe kzalloc() in brcmf_pcie_download_fw_nvram() will return null\nif the physical memory has run out. As a result, if we use\nget_random_bytes() to generate random bytes in the randbuf, the\nnull pointer dereference bug will happen.\n\nIn order to prevent allocation failure, this patch adds a separate\nfunction using buffer on kernel stack to generate random bytes in\nthe randbuf, which could prevent the kernel stack from overflow.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38575",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49",
            "patch_url": "https://git.kernel.org/stable/p/0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49",
            "filename": "CVE-2024-38575-0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38575/CVE-2024-38575-0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49",
                "patch_url": "https://git.kernel.org/stable/p/0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49",
                "filename": "CVE-2024-38575-0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38575/CVE-2024-38575-0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/316f790ebcf94bdf59f794b7cdea4068dc676d4c",
                "patch_url": "https://git.kernel.org/stable/p/316f790ebcf94bdf59f794b7cdea4068dc676d4c",
                "filename": "CVE-2024-38575-316f790ebcf94bdf59f794b7cdea4068dc676d4c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38575/CVE-2024-38575-316f790ebcf94bdf59f794b7cdea4068dc676d4c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3729ca9e48d19a03ae049e2bde510e161c2f3720",
                "patch_url": "https://git.kernel.org/stable/p/3729ca9e48d19a03ae049e2bde510e161c2f3720",
                "filename": "CVE-2024-38575-3729ca9e48d19a03ae049e2bde510e161c2f3720.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38575/CVE-2024-38575-3729ca9e48d19a03ae049e2bde510e161c2f3720.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7c15eb344b0d4d3468c9b2a7591ad2b859b29b88",
                "patch_url": "https://git.kernel.org/stable/p/7c15eb344b0d4d3468c9b2a7591ad2b859b29b88",
                "filename": "CVE-2024-38575-7c15eb344b0d4d3468c9b2a7591ad2b859b29b88.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38575/CVE-2024-38575-7c15eb344b0d4d3468c9b2a7591ad2b859b29b88.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c37466406f075476c2702ecc01917928af871f3b",
                "patch_url": "https://git.kernel.org/stable/p/c37466406f075476c2702ecc01917928af871f3b",
                "filename": "CVE-2024-38575-c37466406f075476c2702ecc01917928af871f3b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38575/CVE-2024-38575-c37466406f075476c2702ecc01917928af871f3b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49",
            "https://git.kernel.org/stable/c/316f790ebcf94bdf59f794b7cdea4068dc676d4c",
            "https://git.kernel.org/stable/c/3729ca9e48d19a03ae049e2bde510e161c2f3720",
            "https://git.kernel.org/stable/c/7c15eb344b0d4d3468c9b2a7591ad2b859b29b88",
            "https://git.kernel.org/stable/c/c37466406f075476c2702ecc01917928af871f3b",
            "https://www.cve.org/CVERecord?id=CVE-2024-38575\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38575\nhttps://lore.kernel.org/linux-cve-announce/2024061946-CVE-2024-38575-8b6b@gregkh/T"
        ]
    },
    "CVE-2024-38579": {
        "cve": "CVE-2024-38579",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: bcm - Fix pointer arithmetic\n\nIn spu2_dump_omd() value of ptr is increased by ciph_key_len\ninstead of hash_iv_len which could lead to going beyond the\nbuffer boundaries.\nFix this bug by changing ciph_key_len to hash_iv_len.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38579",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/c256b616067bfd6d274c679c06986b78d2402434",
            "patch_url": "https://git.kernel.org/stable/p/c256b616067bfd6d274c679c06986b78d2402434",
            "filename": "CVE-2024-38579-c256b616067bfd6d274c679c06986b78d2402434.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38579/CVE-2024-38579-c256b616067bfd6d274c679c06986b78d2402434.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9",
                "patch_url": "https://git.kernel.org/stable/p/2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9",
                "filename": "CVE-2024-38579-2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38579/CVE-2024-38579-2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3b7a40740f04e2f27114dfd6225c5e721dda9d57",
                "patch_url": "https://git.kernel.org/stable/p/3b7a40740f04e2f27114dfd6225c5e721dda9d57",
                "filename": "CVE-2024-38579-3b7a40740f04e2f27114dfd6225c5e721dda9d57.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38579/CVE-2024-38579-3b7a40740f04e2f27114dfd6225c5e721dda9d57.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/49833a8da6407e7e9b532cc4054fdbcaf78f5fdd",
                "patch_url": "https://git.kernel.org/stable/p/49833a8da6407e7e9b532cc4054fdbcaf78f5fdd",
                "filename": "CVE-2024-38579-49833a8da6407e7e9b532cc4054fdbcaf78f5fdd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38579/CVE-2024-38579-49833a8da6407e7e9b532cc4054fdbcaf78f5fdd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c0082ee420639a97e40cae66778b02b341b005e5",
                "patch_url": "https://git.kernel.org/stable/p/c0082ee420639a97e40cae66778b02b341b005e5",
                "filename": "CVE-2024-38579-c0082ee420639a97e40cae66778b02b341b005e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38579/CVE-2024-38579-c0082ee420639a97e40cae66778b02b341b005e5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c256b616067bfd6d274c679c06986b78d2402434",
                "patch_url": "https://git.kernel.org/stable/p/c256b616067bfd6d274c679c06986b78d2402434",
                "filename": "CVE-2024-38579-c256b616067bfd6d274c679c06986b78d2402434.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38579/CVE-2024-38579-c256b616067bfd6d274c679c06986b78d2402434.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c69a1e4b419c2c466dd8c5602bdebadc353973dd",
                "patch_url": "https://git.kernel.org/stable/p/c69a1e4b419c2c466dd8c5602bdebadc353973dd",
                "filename": "CVE-2024-38579-c69a1e4b419c2c466dd8c5602bdebadc353973dd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38579/CVE-2024-38579-c69a1e4b419c2c466dd8c5602bdebadc353973dd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d0f14ae223c2421b334c1f1a9e48f1e809aee3a0",
                "patch_url": "https://git.kernel.org/stable/p/d0f14ae223c2421b334c1f1a9e48f1e809aee3a0",
                "filename": "CVE-2024-38579-d0f14ae223c2421b334c1f1a9e48f1e809aee3a0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38579/CVE-2024-38579-d0f14ae223c2421b334c1f1a9e48f1e809aee3a0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e719c8991c161977a67197775067ab456b518c7b",
                "patch_url": "https://git.kernel.org/stable/p/e719c8991c161977a67197775067ab456b518c7b",
                "filename": "CVE-2024-38579-e719c8991c161977a67197775067ab456b518c7b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38579/CVE-2024-38579-e719c8991c161977a67197775067ab456b518c7b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6",
                "patch_url": "https://git.kernel.org/stable/p/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6",
                "filename": "CVE-2024-38579-ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38579/CVE-2024-38579-ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9",
            "https://git.kernel.org/stable/c/3b7a40740f04e2f27114dfd6225c5e721dda9d57",
            "https://git.kernel.org/stable/c/49833a8da6407e7e9b532cc4054fdbcaf78f5fdd",
            "https://git.kernel.org/stable/c/c0082ee420639a97e40cae66778b02b341b005e5",
            "https://git.kernel.org/stable/c/c256b616067bfd6d274c679c06986b78d2402434",
            "https://git.kernel.org/stable/c/c69a1e4b419c2c466dd8c5602bdebadc353973dd",
            "https://git.kernel.org/stable/c/d0f14ae223c2421b334c1f1a9e48f1e809aee3a0",
            "https://git.kernel.org/stable/c/e719c8991c161977a67197775067ab456b518c7b",
            "https://git.kernel.org/stable/c/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6",
            "https://www.cve.org/CVERecord?id=CVE-2024-38579\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38579\nhttps://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38579-e96a@gregkh/T"
        ]
    },
    "CVE-2024-38581": {
        "cve": "CVE-2024-38581",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu/mes: fix use-after-free issue\n\nDelete fence fallback timer to fix the ramdom\nuse-after-free issue.\n\nv2: move to amdgpu_mes.c",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38581",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/70b1bf6d9edc8692d241f59a65f073aec6d501de",
            "patch_url": "https://git.kernel.org/stable/p/70b1bf6d9edc8692d241f59a65f073aec6d501de",
            "filename": "CVE-2024-38581-70b1bf6d9edc8692d241f59a65f073aec6d501de.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38581/CVE-2024-38581-70b1bf6d9edc8692d241f59a65f073aec6d501de.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0f98c144c15c8fc0f3176c994bd4e727ef718a5c",
                "patch_url": "https://git.kernel.org/stable/p/0f98c144c15c8fc0f3176c994bd4e727ef718a5c",
                "filename": "CVE-2024-38581-0f98c144c15c8fc0f3176c994bd4e727ef718a5c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38581/CVE-2024-38581-0f98c144c15c8fc0f3176c994bd4e727ef718a5c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/39cfce75168c11421d70b8c0c65f6133edccb82a",
                "patch_url": "https://git.kernel.org/stable/p/39cfce75168c11421d70b8c0c65f6133edccb82a",
                "filename": "CVE-2024-38581-39cfce75168c11421d70b8c0c65f6133edccb82a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38581/CVE-2024-38581-39cfce75168c11421d70b8c0c65f6133edccb82a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/70b1bf6d9edc8692d241f59a65f073aec6d501de",
                "patch_url": "https://git.kernel.org/stable/p/70b1bf6d9edc8692d241f59a65f073aec6d501de",
                "filename": "CVE-2024-38581-70b1bf6d9edc8692d241f59a65f073aec6d501de.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38581/CVE-2024-38581-70b1bf6d9edc8692d241f59a65f073aec6d501de.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/948255282074d9367e01908b3f5dcf8c10fc9c3d",
                "patch_url": "https://git.kernel.org/stable/p/948255282074d9367e01908b3f5dcf8c10fc9c3d",
                "filename": "CVE-2024-38581-948255282074d9367e01908b3f5dcf8c10fc9c3d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38581/CVE-2024-38581-948255282074d9367e01908b3f5dcf8c10fc9c3d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0f98c144c15c8fc0f3176c994bd4e727ef718a5c",
            "https://git.kernel.org/stable/c/39cfce75168c11421d70b8c0c65f6133edccb82a",
            "https://git.kernel.org/stable/c/70b1bf6d9edc8692d241f59a65f073aec6d501de",
            "https://git.kernel.org/stable/c/948255282074d9367e01908b3f5dcf8c10fc9c3d",
            "https://www.cve.org/CVERecord?id=CVE-2024-38581\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38581\nhttps://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38581-592d@gregkh/T"
        ]
    },
    "CVE-2024-38586": {
        "cve": "CVE-2024-38586",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nr8169: Fix possible ring buffer corruption on fragmented Tx packets.\n\nAn issue was found on the RTL8125b when transmitting small fragmented\npackets, whereby invalid entries were inserted into the transmit ring\nbuffer, subsequently leading to calls to dma_unmap_single() with a null\naddress.\n\nThis was caused by rtl8169_start_xmit() not noticing changes to nr_frags\nwhich may occur when small packets are padded (to work around hardware\nquirks) in rtl8169_tso_csum_v2().\n\nTo fix this, postpone inspecting nr_frags until after any padding has been\napplied.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38586",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0c48185a95309556725f818b82120bb74e9c627d",
            "patch_url": "https://git.kernel.org/stable/p/0c48185a95309556725f818b82120bb74e9c627d",
            "filename": "CVE-2024-38586-0c48185a95309556725f818b82120bb74e9c627d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38586/CVE-2024-38586-0c48185a95309556725f818b82120bb74e9c627d.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/078d5b7500d70af2de6b38e226b03f0b932026a6",
                "patch_url": "https://git.kernel.org/stable/p/078d5b7500d70af2de6b38e226b03f0b932026a6",
                "filename": "CVE-2024-38586-078d5b7500d70af2de6b38e226b03f0b932026a6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38586/CVE-2024-38586-078d5b7500d70af2de6b38e226b03f0b932026a6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0c48185a95309556725f818b82120bb74e9c627d",
                "patch_url": "https://git.kernel.org/stable/p/0c48185a95309556725f818b82120bb74e9c627d",
                "filename": "CVE-2024-38586-0c48185a95309556725f818b82120bb74e9c627d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38586/CVE-2024-38586-0c48185a95309556725f818b82120bb74e9c627d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/54e7a0d111240c92c0f02ceba6eb8f26bf6d6479",
                "patch_url": "https://git.kernel.org/stable/p/54e7a0d111240c92c0f02ceba6eb8f26bf6d6479",
                "filename": "CVE-2024-38586-54e7a0d111240c92c0f02ceba6eb8f26bf6d6479.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38586/CVE-2024-38586-54e7a0d111240c92c0f02ceba6eb8f26bf6d6479.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/61c1c98e2607120ce9c3fa1bf75e6da909712b27",
                "patch_url": "https://git.kernel.org/stable/p/61c1c98e2607120ce9c3fa1bf75e6da909712b27",
                "filename": "CVE-2024-38586-61c1c98e2607120ce9c3fa1bf75e6da909712b27.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38586/CVE-2024-38586-61c1c98e2607120ce9c3fa1bf75e6da909712b27.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/68222d7b4b72aa321135cd453dac37f00ec41fd1",
                "patch_url": "https://git.kernel.org/stable/p/68222d7b4b72aa321135cd453dac37f00ec41fd1",
                "filename": "CVE-2024-38586-68222d7b4b72aa321135cd453dac37f00ec41fd1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38586/CVE-2024-38586-68222d7b4b72aa321135cd453dac37f00ec41fd1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b6d21cf40de103d63ae78551098a7c06af8c98dd",
                "patch_url": "https://git.kernel.org/stable/p/b6d21cf40de103d63ae78551098a7c06af8c98dd",
                "filename": "CVE-2024-38586-b6d21cf40de103d63ae78551098a7c06af8c98dd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38586/CVE-2024-38586-b6d21cf40de103d63ae78551098a7c06af8c98dd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c71e3a5cffd5309d7f84444df03d5b72600cc417",
                "patch_url": "https://git.kernel.org/stable/p/c71e3a5cffd5309d7f84444df03d5b72600cc417",
                "filename": "CVE-2024-38586-c71e3a5cffd5309d7f84444df03d5b72600cc417.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38586/CVE-2024-38586-c71e3a5cffd5309d7f84444df03d5b72600cc417.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/078d5b7500d70af2de6b38e226b03f0b932026a6",
            "https://git.kernel.org/stable/c/0c48185a95309556725f818b82120bb74e9c627d",
            "https://git.kernel.org/stable/c/54e7a0d111240c92c0f02ceba6eb8f26bf6d6479",
            "https://git.kernel.org/stable/c/61c1c98e2607120ce9c3fa1bf75e6da909712b27",
            "https://git.kernel.org/stable/c/68222d7b4b72aa321135cd453dac37f00ec41fd1",
            "https://git.kernel.org/stable/c/b6d21cf40de103d63ae78551098a7c06af8c98dd",
            "https://git.kernel.org/stable/c/c71e3a5cffd5309d7f84444df03d5b72600cc417",
            "https://www.cve.org/CVERecord?id=CVE-2024-38586\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38586\nhttps://lore.kernel.org/linux-cve-announce/2024061949-CVE-2024-38586-70d6@gregkh/T"
        ]
    },
    "CVE-2024-38596": {
        "cve": "CVE-2024-38596",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Fix data races in unix_release_sock/unix_stream_sendmsg\n\nA data-race condition has been identified in af_unix. In one data path,\nthe write function unix_release_sock() atomically writes to\nsk->sk_shutdown using WRITE_ONCE. However, on the reader side,\nunix_stream_sendmsg() does not read it atomically. Consequently, this\nissue is causing the following KCSAN splat to occur:\n\n\tBUG: KCSAN: data-race in unix_release_sock / unix_stream_sendmsg\n\n\twrite (marked) to 0xffff88867256ddbb of 1 bytes by task 7270 on cpu 28:\n\tunix_release_sock (net/unix/af_unix.c:640)\n\tunix_release (net/unix/af_unix.c:1050)\n\tsock_close (net/socket.c:659 net/socket.c:1421)\n\t__fput (fs/file_table.c:422)\n\t__fput_sync (fs/file_table.c:508)\n\t__se_sys_close (fs/open.c:1559 fs/open.c:1541)\n\t__x64_sys_close (fs/open.c:1541)\n\tx64_sys_call (arch/x86/entry/syscall_64.c:33)\n\tdo_syscall_64 (arch/x86/entry/common.c:?)\n\tentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\n\tread to 0xffff88867256ddbb of 1 bytes by task 989 on cpu 14:\n\tunix_stream_sendmsg (net/unix/af_unix.c:2273)\n\t__sock_sendmsg (net/socket.c:730 net/socket.c:745)\n\t____sys_sendmsg (net/socket.c:2584)\n\t__sys_sendmmsg (net/socket.c:2638 net/socket.c:2724)\n\t__x64_sys_sendmmsg (net/socket.c:2753 net/socket.c:2750 net/socket.c:2750)\n\tx64_sys_call (arch/x86/entry/syscall_64.c:33)\n\tdo_syscall_64 (arch/x86/entry/common.c:?)\n\tentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\n\tvalue changed: 0x01 -> 0x03\n\nThe line numbers are related to commit dd5a440a31fa (\"Linux 6.9-rc7\").\n\nCommit e1d09c2c2f57 (\"af_unix: Fix data races around sk->sk_shutdown.\")\naddressed a comparable issue in the past regarding sk->sk_shutdown.\nHowever, it overlooked resolving this particular data path.\nThis patch only offending unix_stream_sendmsg() function, since the\nother reads seem to be protected by unix_state_lock() as discussed in",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38596",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/fca6072e1a7b1e709ada5604b951513b89b4bd0a",
            "patch_url": "https://git.kernel.org/stable/p/fca6072e1a7b1e709ada5604b951513b89b4bd0a",
            "filename": "CVE-2024-38596-fca6072e1a7b1e709ada5604b951513b89b4bd0a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38596/CVE-2024-38596-fca6072e1a7b1e709ada5604b951513b89b4bd0a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0688d4e499bee3f2749bca27329bd128686230cb",
                "patch_url": "https://git.kernel.org/stable/p/0688d4e499bee3f2749bca27329bd128686230cb",
                "filename": "CVE-2024-38596-0688d4e499bee3f2749bca27329bd128686230cb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38596/CVE-2024-38596-0688d4e499bee3f2749bca27329bd128686230cb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4d51845d734a4c5d079e56e0916f936a55e15055",
                "patch_url": "https://git.kernel.org/stable/p/4d51845d734a4c5d079e56e0916f936a55e15055",
                "filename": "CVE-2024-38596-4d51845d734a4c5d079e56e0916f936a55e15055.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38596/CVE-2024-38596-4d51845d734a4c5d079e56e0916f936a55e15055.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/540bf24fba16b88c1b3b9353927204b4f1074e25",
                "patch_url": "https://git.kernel.org/stable/p/540bf24fba16b88c1b3b9353927204b4f1074e25",
                "filename": "CVE-2024-38596-540bf24fba16b88c1b3b9353927204b4f1074e25.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38596/CVE-2024-38596-540bf24fba16b88c1b3b9353927204b4f1074e25.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8299e4d778f664b31b67cf4cf3d5409de2ecb92c",
                "patch_url": "https://git.kernel.org/stable/p/8299e4d778f664b31b67cf4cf3d5409de2ecb92c",
                "filename": "CVE-2024-38596-8299e4d778f664b31b67cf4cf3d5409de2ecb92c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38596/CVE-2024-38596-8299e4d778f664b31b67cf4cf3d5409de2ecb92c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9aa8773abfa0e954136875b4cbf2df4cf638e8a5",
                "patch_url": "https://git.kernel.org/stable/p/9aa8773abfa0e954136875b4cbf2df4cf638e8a5",
                "filename": "CVE-2024-38596-9aa8773abfa0e954136875b4cbf2df4cf638e8a5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38596/CVE-2024-38596-9aa8773abfa0e954136875b4cbf2df4cf638e8a5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a4c88072abcaca593cefe70f90e9d3707526e8f9",
                "patch_url": "https://git.kernel.org/stable/p/a4c88072abcaca593cefe70f90e9d3707526e8f9",
                "filename": "CVE-2024-38596-a4c88072abcaca593cefe70f90e9d3707526e8f9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38596/CVE-2024-38596-a4c88072abcaca593cefe70f90e9d3707526e8f9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a52fa2addfcccc2c5a0217fd45562605088c018b",
                "patch_url": "https://git.kernel.org/stable/p/a52fa2addfcccc2c5a0217fd45562605088c018b",
                "filename": "CVE-2024-38596-a52fa2addfcccc2c5a0217fd45562605088c018b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38596/CVE-2024-38596-a52fa2addfcccc2c5a0217fd45562605088c018b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/de6641d213373fbde9bbdd7c4b552254bc9f82fe",
                "patch_url": "https://git.kernel.org/stable/p/de6641d213373fbde9bbdd7c4b552254bc9f82fe",
                "filename": "CVE-2024-38596-de6641d213373fbde9bbdd7c4b552254bc9f82fe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38596/CVE-2024-38596-de6641d213373fbde9bbdd7c4b552254bc9f82fe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fca6072e1a7b1e709ada5604b951513b89b4bd0a",
                "patch_url": "https://git.kernel.org/stable/p/fca6072e1a7b1e709ada5604b951513b89b4bd0a",
                "filename": "CVE-2024-38596-fca6072e1a7b1e709ada5604b951513b89b4bd0a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38596/CVE-2024-38596-fca6072e1a7b1e709ada5604b951513b89b4bd0a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0688d4e499bee3f2749bca27329bd128686230cb",
            "https://git.kernel.org/stable/c/4d51845d734a4c5d079e56e0916f936a55e15055",
            "https://git.kernel.org/stable/c/540bf24fba16b88c1b3b9353927204b4f1074e25",
            "https://git.kernel.org/stable/c/8299e4d778f664b31b67cf4cf3d5409de2ecb92c",
            "https://git.kernel.org/stable/c/9aa8773abfa0e954136875b4cbf2df4cf638e8a5",
            "https://git.kernel.org/stable/c/a4c88072abcaca593cefe70f90e9d3707526e8f9",
            "https://git.kernel.org/stable/c/a52fa2addfcccc2c5a0217fd45562605088c018b",
            "https://git.kernel.org/stable/c/de6641d213373fbde9bbdd7c4b552254bc9f82fe",
            "https://git.kernel.org/stable/c/fca6072e1a7b1e709ada5604b951513b89b4bd0a",
            "https://www.cve.org/CVERecord?id=CVE-2024-38596\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38596\nhttps://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38596-f660@gregkh/T"
        ]
    },
    "CVE-2024-38598": {
        "cve": "CVE-2024-38598",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix resync softlockup when bitmap size is less than array size\n\nIs is reported that for dm-raid10, lvextend + lvchange --syncaction will\ntrigger following softlockup:\n\nkernel:watchdog: BUG: soft lockup - CPU#3 stuck for 26s! [mdX_resync:6976]\nCPU: 7 PID: 3588 Comm: mdX_resync Kdump: loaded Not tainted 6.9.0-rc4-next-20240419 #1\nRIP: 0010:_raw_spin_unlock_irq+0x13/0x30\nCall Trace:\n <TASK>\n md_bitmap_start_sync+0x6b/0xf0\n raid10_sync_request+0x25c/0x1b40 [raid10]\n md_do_sync+0x64b/0x1020\n md_thread+0xa7/0x170\n kthread+0xcf/0x100\n ret_from_fork+0x30/0x50\n ret_from_fork_asm+0x1a/0x30\n\nAnd the detailed process is as follows:\n\nmd_do_sync\n j = mddev->resync_min\n while (j < max_sectors)\n  sectors = raid10_sync_request(mddev, j, &skipped)\n   if (!md_bitmap_start_sync(..., &sync_blocks))\n    // md_bitmap_start_sync set sync_blocks to 0\n    return sync_blocks + sectors_skippe;\n  // sectors = 0;\n  j += sectors;\n  // j never change\n\nRoot cause is that commit 301867b1c168 (\"md/raid10: check\nslab-out-of-bounds in md_bitmap_get_counter\") return early from\nmd_bitmap_get_counter(), without setting returned blocks.\n\nFix this problem by always set returned blocks from\nmd_bitmap_get_counter\"(), as it used to be.\n\nNoted that this patch just fix the softlockup problem in kernel, the\ncase that bitmap size doesn't match array size still need to be fixed.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38598",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3f5b73ef8fd6268cbc968b308d8eafe56fda97f3",
            "patch_url": "https://git.kernel.org/stable/p/3f5b73ef8fd6268cbc968b308d8eafe56fda97f3",
            "filename": "CVE-2024-38598-3f5b73ef8fd6268cbc968b308d8eafe56fda97f3.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38598/CVE-2024-38598-3f5b73ef8fd6268cbc968b308d8eafe56fda97f3.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3f5b73ef8fd6268cbc968b308d8eafe56fda97f3",
                "patch_url": "https://git.kernel.org/stable/p/3f5b73ef8fd6268cbc968b308d8eafe56fda97f3",
                "filename": "CVE-2024-38598-3f5b73ef8fd6268cbc968b308d8eafe56fda97f3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38598/CVE-2024-38598-3f5b73ef8fd6268cbc968b308d8eafe56fda97f3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/43771597feba89a839c5f893716df88ae5c237ce",
                "patch_url": "https://git.kernel.org/stable/p/43771597feba89a839c5f893716df88ae5c237ce",
                "filename": "CVE-2024-38598-43771597feba89a839c5f893716df88ae5c237ce.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38598/CVE-2024-38598-43771597feba89a839c5f893716df88ae5c237ce.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5817f43ae1a118855676f57ef7ab50e37eac7482",
                "patch_url": "https://git.kernel.org/stable/p/5817f43ae1a118855676f57ef7ab50e37eac7482",
                "filename": "CVE-2024-38598-5817f43ae1a118855676f57ef7ab50e37eac7482.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38598/CVE-2024-38598-5817f43ae1a118855676f57ef7ab50e37eac7482.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/69296914bfd508c85935bf5f711cad9b0fe78492",
                "patch_url": "https://git.kernel.org/stable/p/69296914bfd508c85935bf5f711cad9b0fe78492",
                "filename": "CVE-2024-38598-69296914bfd508c85935bf5f711cad9b0fe78492.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38598/CVE-2024-38598-69296914bfd508c85935bf5f711cad9b0fe78492.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/71e8e4f288e74a896b6d9cd194f3bab12bd7a10f",
                "patch_url": "https://git.kernel.org/stable/p/71e8e4f288e74a896b6d9cd194f3bab12bd7a10f",
                "filename": "CVE-2024-38598-71e8e4f288e74a896b6d9cd194f3bab12bd7a10f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38598/CVE-2024-38598-71e8e4f288e74a896b6d9cd194f3bab12bd7a10f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8bbc71315e0ae4bb7e37f8d43b915e1cb01a481b",
                "patch_url": "https://git.kernel.org/stable/p/8bbc71315e0ae4bb7e37f8d43b915e1cb01a481b",
                "filename": "CVE-2024-38598-8bbc71315e0ae4bb7e37f8d43b915e1cb01a481b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38598/CVE-2024-38598-8bbc71315e0ae4bb7e37f8d43b915e1cb01a481b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c9566b812c8f66160466cc1e29df6d3646add0b1",
                "patch_url": "https://git.kernel.org/stable/p/c9566b812c8f66160466cc1e29df6d3646add0b1",
                "filename": "CVE-2024-38598-c9566b812c8f66160466cc1e29df6d3646add0b1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38598/CVE-2024-38598-c9566b812c8f66160466cc1e29df6d3646add0b1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d4b9c764d48fa41caa24cfb4275f3aa9fb4bd798",
                "patch_url": "https://git.kernel.org/stable/p/d4b9c764d48fa41caa24cfb4275f3aa9fb4bd798",
                "filename": "CVE-2024-38598-d4b9c764d48fa41caa24cfb4275f3aa9fb4bd798.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38598/CVE-2024-38598-d4b9c764d48fa41caa24cfb4275f3aa9fb4bd798.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f0e729af2eb6bee9eb58c4df1087f14ebaefe26b",
                "patch_url": "https://git.kernel.org/stable/p/f0e729af2eb6bee9eb58c4df1087f14ebaefe26b",
                "filename": "CVE-2024-38598-f0e729af2eb6bee9eb58c4df1087f14ebaefe26b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38598/CVE-2024-38598-f0e729af2eb6bee9eb58c4df1087f14ebaefe26b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3f5b73ef8fd6268cbc968b308d8eafe56fda97f3",
            "https://git.kernel.org/stable/c/43771597feba89a839c5f893716df88ae5c237ce",
            "https://git.kernel.org/stable/c/5817f43ae1a118855676f57ef7ab50e37eac7482",
            "https://git.kernel.org/stable/c/69296914bfd508c85935bf5f711cad9b0fe78492",
            "https://git.kernel.org/stable/c/71e8e4f288e74a896b6d9cd194f3bab12bd7a10f",
            "https://git.kernel.org/stable/c/8bbc71315e0ae4bb7e37f8d43b915e1cb01a481b",
            "https://git.kernel.org/stable/c/c9566b812c8f66160466cc1e29df6d3646add0b1",
            "https://git.kernel.org/stable/c/d4b9c764d48fa41caa24cfb4275f3aa9fb4bd798",
            "https://git.kernel.org/stable/c/f0e729af2eb6bee9eb58c4df1087f14ebaefe26b",
            "https://www.cve.org/CVERecord?id=CVE-2024-38598\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38598\nhttps://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38598-8629@gregkh/T"
        ]
    },
    "CVE-2024-38608": {
        "cve": "CVE-2024-38608",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix netif state handling\n\nmlx5e_suspend cleans resources only if netif_device_present() returns\ntrue. However, mlx5e_resume changes the state of netif, via\nmlx5e_nic_enable, only if reg_state == NETREG_REGISTERED.\nIn the below case, the above leads to NULL-ptr Oops[1] and memory\nleaks:\n\nmlx5e_probe\n _mlx5e_resume\n  mlx5e_attach_netdev\n   mlx5e_nic_enable  <-- netdev not reg, not calling netif_device_attach()\n  register_netdev <-- failed for some reason.\nERROR_FLOW:\n _mlx5e_suspend <-- netif_device_present return false, resources aren't freed :(\n\nHence, clean resources in this case as well.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nPGD 0 P4D 0\nOops: 0010 [#1] SMP\nCPU: 2 PID: 9345 Comm: test-ovs-ct-gen Not tainted 6.5.0_for_upstream_min_debug_2023_09_05_16_01 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:0x0\nCode: Unable to access opcode bytes at0xffffffffffffffd6.\nRSP: 0018:ffff888178aaf758 EFLAGS: 00010246\nCall Trace:\n <TASK>\n ? __die+0x20/0x60\n ? page_fault_oops+0x14c/0x3c0\n ? exc_page_fault+0x75/0x140\n ? asm_exc_page_fault+0x22/0x30\n notifier_call_chain+0x35/0xb0\n blocking_notifier_call_chain+0x3d/0x60\n mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]\n mlx5_core_uplink_netdev_event_replay+0x3e/0x60 [mlx5_core]\n mlx5_mdev_netdev_track+0x53/0x60 [mlx5_ib]\n mlx5_ib_roce_init+0xc3/0x340 [mlx5_ib]\n __mlx5_ib_add+0x34/0xd0 [mlx5_ib]\n mlx5r_probe+0xe1/0x210 [mlx5_ib]\n ? auxiliary_match_id+0x6a/0x90\n auxiliary_bus_probe+0x38/0x80\n ? driver_sysfs_add+0x51/0x80\n really_probe+0xc9/0x3e0\n ? driver_probe_device+0x90/0x90\n __driver_probe_device+0x80/0x160\n driver_probe_device+0x1e/0x90\n __device_attach_driver+0x7d/0x100\n bus_for_each_drv+0x80/0xd0\n __device_attach+0xbc/0x1f0\n bus_probe_device+0x86/0xa0\n device_add+0x637/0x840\n __auxiliary_device_add+0x3b/0xa0\n add_adev+0xc9/0x140 [mlx5_core]\n mlx5_rescan_drivers_locked+0x22a/0x310 [mlx5_core]\n mlx5_register_device+0x53/0xa0 [mlx5_core]\n mlx5_init_one_devl_locked+0x5c4/0x9c0 [mlx5_core]\n mlx5_init_one+0x3b/0x60 [mlx5_core]\n probe_one+0x44c/0x730 [mlx5_core]\n local_pci_probe+0x3e/0x90\n pci_device_probe+0xbf/0x210\n ? kernfs_create_link+0x5d/0xa0\n ? sysfs_do_create_link_sd+0x60/0xc0\n really_probe+0xc9/0x3e0\n ? driver_probe_device+0x90/0x90\n __driver_probe_device+0x80/0x160\n driver_probe_device+0x1e/0x90\n __device_attach_driver+0x7d/0x100\n bus_for_each_drv+0x80/0xd0\n __device_attach+0xbc/0x1f0\n pci_bus_add_device+0x54/0x80\n pci_iov_add_virtfn+0x2e6/0x320\n sriov_enable+0x208/0x420\n mlx5_core_sriov_configure+0x9e/0x200 [mlx5_core]\n sriov_numvfs_store+0xae/0x1a0\n kernfs_fop_write_iter+0x10c/0x1a0\n vfs_write+0x291/0x3c0\n ksys_write+0x5f/0xe0\n do_syscall_64+0x3d/0x90\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n CR2: 0000000000000000\n ---[ end trace 0000000000000000  ]---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38608",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3d5918477f94e4c2f064567875c475468e264644",
            "patch_url": "https://git.kernel.org/stable/p/3d5918477f94e4c2f064567875c475468e264644",
            "filename": "CVE-2024-38608-3d5918477f94e4c2f064567875c475468e264644.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38608/CVE-2024-38608-3d5918477f94e4c2f064567875c475468e264644.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3d5918477f94e4c2f064567875c475468e264644",
                "patch_url": "https://git.kernel.org/stable/p/3d5918477f94e4c2f064567875c475468e264644",
                "filename": "CVE-2024-38608-3d5918477f94e4c2f064567875c475468e264644.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38608/CVE-2024-38608-3d5918477f94e4c2f064567875c475468e264644.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f7e6cfb864a53af71c5cc904f1cc22215d68f5c6",
                "patch_url": "https://git.kernel.org/stable/p/f7e6cfb864a53af71c5cc904f1cc22215d68f5c6",
                "filename": "CVE-2024-38608-f7e6cfb864a53af71c5cc904f1cc22215d68f5c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38608/CVE-2024-38608-f7e6cfb864a53af71c5cc904f1cc22215d68f5c6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3d5918477f94e4c2f064567875c475468e264644",
            "https://git.kernel.org/stable/c/f7e6cfb864a53af71c5cc904f1cc22215d68f5c6",
            "https://www.cve.org/CVERecord?id=CVE-2024-38608\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38608\nhttps://lore.kernel.org/linux-cve-announce/2024061920-CVE-2024-38608-4068@gregkh/T"
        ]
    },
    "CVE-2024-38615": {
        "cve": "CVE-2024-38615",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: exit() callback is optional\n\nThe exit() callback is optional and shouldn't be called without checking\na valid pointer first.\n\nAlso, we must clear freq_table pointer even if the exit() callback isn't\npresent.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38615",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/dfc56ff5ec9904c008e9376d90a6d7e2d2bec4d3",
            "patch_url": "https://git.kernel.org/stable/p/dfc56ff5ec9904c008e9376d90a6d7e2d2bec4d3",
            "filename": "CVE-2024-38615-dfc56ff5ec9904c008e9376d90a6d7e2d2bec4d3.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38615/CVE-2024-38615-dfc56ff5ec9904c008e9376d90a6d7e2d2bec4d3.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2d730b465e377396d2a09a53524b96b111f7ccb6",
                "patch_url": "https://git.kernel.org/stable/p/2d730b465e377396d2a09a53524b96b111f7ccb6",
                "filename": "CVE-2024-38615-2d730b465e377396d2a09a53524b96b111f7ccb6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38615/CVE-2024-38615-2d730b465e377396d2a09a53524b96b111f7ccb6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/35db5e76d5e9f752476df5fa0b9018a2398b0378",
                "patch_url": "https://git.kernel.org/stable/p/35db5e76d5e9f752476df5fa0b9018a2398b0378",
                "filename": "CVE-2024-38615-35db5e76d5e9f752476df5fa0b9018a2398b0378.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38615/CVE-2024-38615-35db5e76d5e9f752476df5fa0b9018a2398b0378.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3e99f060cfd2e36504d62c9132b453ade5027e1c",
                "patch_url": "https://git.kernel.org/stable/p/3e99f060cfd2e36504d62c9132b453ade5027e1c",
                "filename": "CVE-2024-38615-3e99f060cfd2e36504d62c9132b453ade5027e1c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38615/CVE-2024-38615-3e99f060cfd2e36504d62c9132b453ade5027e1c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8bc9546805e572ad101681437a49939f28777273",
                "patch_url": "https://git.kernel.org/stable/p/8bc9546805e572ad101681437a49939f28777273",
                "filename": "CVE-2024-38615-8bc9546805e572ad101681437a49939f28777273.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38615/CVE-2024-38615-8bc9546805e572ad101681437a49939f28777273.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a8204d1b6ff762d2171d365c2c8560285d0a233d",
                "patch_url": "https://git.kernel.org/stable/p/a8204d1b6ff762d2171d365c2c8560285d0a233d",
                "filename": "CVE-2024-38615-a8204d1b6ff762d2171d365c2c8560285d0a233d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38615/CVE-2024-38615-a8204d1b6ff762d2171d365c2c8560285d0a233d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ae37ebca325097d773d7bb6ec069123b30772872",
                "patch_url": "https://git.kernel.org/stable/p/ae37ebca325097d773d7bb6ec069123b30772872",
                "filename": "CVE-2024-38615-ae37ebca325097d773d7bb6ec069123b30772872.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38615/CVE-2024-38615-ae37ebca325097d773d7bb6ec069123b30772872.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b8f85833c05730d631576008daaa34096bc7f3ce",
                "patch_url": "https://git.kernel.org/stable/p/b8f85833c05730d631576008daaa34096bc7f3ce",
                "filename": "CVE-2024-38615-b8f85833c05730d631576008daaa34096bc7f3ce.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38615/CVE-2024-38615-b8f85833c05730d631576008daaa34096bc7f3ce.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dfc56ff5ec9904c008e9376d90a6d7e2d2bec4d3",
                "patch_url": "https://git.kernel.org/stable/p/dfc56ff5ec9904c008e9376d90a6d7e2d2bec4d3",
                "filename": "CVE-2024-38615-dfc56ff5ec9904c008e9376d90a6d7e2d2bec4d3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38615/CVE-2024-38615-dfc56ff5ec9904c008e9376d90a6d7e2d2bec4d3.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2d730b465e377396d2a09a53524b96b111f7ccb6",
            "https://git.kernel.org/stable/c/35db5e76d5e9f752476df5fa0b9018a2398b0378",
            "https://git.kernel.org/stable/c/3e99f060cfd2e36504d62c9132b453ade5027e1c",
            "https://git.kernel.org/stable/c/8bc9546805e572ad101681437a49939f28777273",
            "https://git.kernel.org/stable/c/a8204d1b6ff762d2171d365c2c8560285d0a233d",
            "https://git.kernel.org/stable/c/ae37ebca325097d773d7bb6ec069123b30772872",
            "https://git.kernel.org/stable/c/b8f85833c05730d631576008daaa34096bc7f3ce",
            "https://git.kernel.org/stable/c/dfc56ff5ec9904c008e9376d90a6d7e2d2bec4d3",
            "https://www.cve.org/CVERecord?id=CVE-2024-38615\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38615\nhttps://lore.kernel.org/linux-cve-announce/2024061922-CVE-2024-38615-0d4c@gregkh/T"
        ]
    },
    "CVE-2024-38619": {
        "cve": "CVE-2024-38619",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb-storage: alauda: Check whether the media is initialized\n\nThe member \"uzonesize\" of struct alauda_info will remain 0\nif alauda_init_media() fails, potentially causing divide errors\nin alauda_read_data() and alauda_write_lba().\n- Add a member \"media_initialized\" to struct alauda_info.\n- Change a condition in alauda_check_media() to ensure the\n  first initialization.\n- Add an error check for the return value of alauda_init_media().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38619",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/e0aab7b07a9375337847c9d74a5ec044071e01c8",
            "patch_url": "https://git.kernel.org/stable/p/e0aab7b07a9375337847c9d74a5ec044071e01c8",
            "filename": "CVE-2024-38619-e0aab7b07a9375337847c9d74a5ec044071e01c8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38619/CVE-2024-38619-e0aab7b07a9375337847c9d74a5ec044071e01c8.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/16637fea001ab3c8df528a8995b3211906165a30",
                "patch_url": "https://git.kernel.org/stable/p/16637fea001ab3c8df528a8995b3211906165a30",
                "filename": "CVE-2024-38619-16637fea001ab3c8df528a8995b3211906165a30.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38619/CVE-2024-38619-16637fea001ab3c8df528a8995b3211906165a30.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/24bff7f714bdff97c2a75a0ff6a368cdf8ad5af4",
                "patch_url": "https://git.kernel.org/stable/p/24bff7f714bdff97c2a75a0ff6a368cdf8ad5af4",
                "filename": "CVE-2024-38619-24bff7f714bdff97c2a75a0ff6a368cdf8ad5af4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38619/CVE-2024-38619-24bff7f714bdff97c2a75a0ff6a368cdf8ad5af4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2cc32639ec347e3365075b130f9953ef16cb13f1",
                "patch_url": "https://git.kernel.org/stable/p/2cc32639ec347e3365075b130f9953ef16cb13f1",
                "filename": "CVE-2024-38619-2cc32639ec347e3365075b130f9953ef16cb13f1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38619/CVE-2024-38619-2cc32639ec347e3365075b130f9953ef16cb13f1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3eee13ab67f65606faa66e0c3c729e4f514838fd",
                "patch_url": "https://git.kernel.org/stable/p/3eee13ab67f65606faa66e0c3c729e4f514838fd",
                "filename": "CVE-2024-38619-3eee13ab67f65606faa66e0c3c729e4f514838fd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38619/CVE-2024-38619-3eee13ab67f65606faa66e0c3c729e4f514838fd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/51fe16c058acb22f847e69bc598066ed0bcd5c15",
                "patch_url": "https://git.kernel.org/stable/p/51fe16c058acb22f847e69bc598066ed0bcd5c15",
                "filename": "CVE-2024-38619-51fe16c058acb22f847e69bc598066ed0bcd5c15.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38619/CVE-2024-38619-51fe16c058acb22f847e69bc598066ed0bcd5c15.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e0aab7b07a9375337847c9d74a5ec044071e01c8",
                "patch_url": "https://git.kernel.org/stable/p/e0aab7b07a9375337847c9d74a5ec044071e01c8",
                "filename": "CVE-2024-38619-e0aab7b07a9375337847c9d74a5ec044071e01c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38619/CVE-2024-38619-e0aab7b07a9375337847c9d74a5ec044071e01c8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e0e2eec76920a133dd49a4fbe4656d83596a1361",
                "patch_url": "https://git.kernel.org/stable/p/e0e2eec76920a133dd49a4fbe4656d83596a1361",
                "filename": "CVE-2024-38619-e0e2eec76920a133dd49a4fbe4656d83596a1361.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38619/CVE-2024-38619-e0e2eec76920a133dd49a4fbe4656d83596a1361.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f68820f1256b21466ff094dd97f243b7e708f9c1",
                "patch_url": "https://git.kernel.org/stable/p/f68820f1256b21466ff094dd97f243b7e708f9c1",
                "filename": "CVE-2024-38619-f68820f1256b21466ff094dd97f243b7e708f9c1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38619/CVE-2024-38619-f68820f1256b21466ff094dd97f243b7e708f9c1.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/16637fea001ab3c8df528a8995b3211906165a30",
            "https://git.kernel.org/stable/c/24bff7f714bdff97c2a75a0ff6a368cdf8ad5af4",
            "https://git.kernel.org/stable/c/2cc32639ec347e3365075b130f9953ef16cb13f1",
            "https://git.kernel.org/stable/c/3eee13ab67f65606faa66e0c3c729e4f514838fd",
            "https://git.kernel.org/stable/c/51fe16c058acb22f847e69bc598066ed0bcd5c15",
            "https://git.kernel.org/stable/c/e0aab7b07a9375337847c9d74a5ec044071e01c8",
            "https://git.kernel.org/stable/c/e0e2eec76920a133dd49a4fbe4656d83596a1361",
            "https://git.kernel.org/stable/c/f68820f1256b21466ff094dd97f243b7e708f9c1",
            "https://www.cve.org/CVERecord?id=CVE-2024-38619\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38619\nhttps://lore.kernel.org/linux-cve-announce/2024062035-CVE-2024-38619-97c7@gregkh/T"
        ]
    },
    "CVE-2024-38627": {
        "cve": "CVE-2024-38627",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nstm class: Fix a double free in stm_register_device()\n\nThe put_device(&stm->dev) call will trigger stm_device_release() which\nfrees \"stm\" so the vfree(stm) on the next line is a double free.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-38627",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/370c480410f60b90ba3e96abe73ead21ec827b20",
            "patch_url": "https://git.kernel.org/stable/p/370c480410f60b90ba3e96abe73ead21ec827b20",
            "filename": "CVE-2024-38627-370c480410f60b90ba3e96abe73ead21ec827b20.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38627/CVE-2024-38627-370c480410f60b90ba3e96abe73ead21ec827b20.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/370c480410f60b90ba3e96abe73ead21ec827b20",
                "patch_url": "https://git.kernel.org/stable/p/370c480410f60b90ba3e96abe73ead21ec827b20",
                "filename": "CVE-2024-38627-370c480410f60b90ba3e96abe73ead21ec827b20.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38627/CVE-2024-38627-370c480410f60b90ba3e96abe73ead21ec827b20.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3df463865ba42b8f88a590326f4c9ea17a1ce459",
                "patch_url": "https://git.kernel.org/stable/p/3df463865ba42b8f88a590326f4c9ea17a1ce459",
                "filename": "CVE-2024-38627-3df463865ba42b8f88a590326f4c9ea17a1ce459.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38627/CVE-2024-38627-3df463865ba42b8f88a590326f4c9ea17a1ce459.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4bfd48bb6e62512b9c392c5002c11e1e3b18d247",
                "patch_url": "https://git.kernel.org/stable/p/4bfd48bb6e62512b9c392c5002c11e1e3b18d247",
                "filename": "CVE-2024-38627-4bfd48bb6e62512b9c392c5002c11e1e3b18d247.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38627/CVE-2024-38627-4bfd48bb6e62512b9c392c5002c11e1e3b18d247.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6cc30ef8eb6d8f8d6df43152264bbf8835d99931",
                "patch_url": "https://git.kernel.org/stable/p/6cc30ef8eb6d8f8d6df43152264bbf8835d99931",
                "filename": "CVE-2024-38627-6cc30ef8eb6d8f8d6df43152264bbf8835d99931.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38627/CVE-2024-38627-6cc30ef8eb6d8f8d6df43152264bbf8835d99931.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/713fc00c571dde4af3db2dbd5d1b0eadc327817b",
                "patch_url": "https://git.kernel.org/stable/p/713fc00c571dde4af3db2dbd5d1b0eadc327817b",
                "filename": "CVE-2024-38627-713fc00c571dde4af3db2dbd5d1b0eadc327817b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38627/CVE-2024-38627-713fc00c571dde4af3db2dbd5d1b0eadc327817b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7419df1acffbcc90037f6b5a2823e81389659b36",
                "patch_url": "https://git.kernel.org/stable/p/7419df1acffbcc90037f6b5a2823e81389659b36",
                "filename": "CVE-2024-38627-7419df1acffbcc90037f6b5a2823e81389659b36.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38627/CVE-2024-38627-7419df1acffbcc90037f6b5a2823e81389659b36.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a0450d3f38e7c6c0a7c0afd4182976ee15573695",
                "patch_url": "https://git.kernel.org/stable/p/a0450d3f38e7c6c0a7c0afd4182976ee15573695",
                "filename": "CVE-2024-38627-a0450d3f38e7c6c0a7c0afd4182976ee15573695.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38627/CVE-2024-38627-a0450d3f38e7c6c0a7c0afd4182976ee15573695.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d782a2db8f7ac49c33b9ca3e835500a28667d1be",
                "patch_url": "https://git.kernel.org/stable/p/d782a2db8f7ac49c33b9ca3e835500a28667d1be",
                "filename": "CVE-2024-38627-d782a2db8f7ac49c33b9ca3e835500a28667d1be.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-38627/CVE-2024-38627-d782a2db8f7ac49c33b9ca3e835500a28667d1be.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/370c480410f60b90ba3e96abe73ead21ec827b20",
            "https://git.kernel.org/stable/c/3df463865ba42b8f88a590326f4c9ea17a1ce459",
            "https://git.kernel.org/stable/c/4bfd48bb6e62512b9c392c5002c11e1e3b18d247",
            "https://git.kernel.org/stable/c/6cc30ef8eb6d8f8d6df43152264bbf8835d99931",
            "https://git.kernel.org/stable/c/713fc00c571dde4af3db2dbd5d1b0eadc327817b",
            "https://git.kernel.org/stable/c/7419df1acffbcc90037f6b5a2823e81389659b36",
            "https://git.kernel.org/stable/c/a0450d3f38e7c6c0a7c0afd4182976ee15573695",
            "https://git.kernel.org/stable/c/d782a2db8f7ac49c33b9ca3e835500a28667d1be",
            "https://www.cve.org/CVERecord?id=CVE-2024-38627\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-38627\nhttps://lore.kernel.org/linux-cve-announce/2024062140-CVE-2024-38627-9b57@gregkh/T"
        ]
    },
    "CVE-2024-39276": {
        "cve": "CVE-2024-39276",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()\n\nSyzbot reports a warning as follows:\n\n============================================\nWARNING: CPU: 0 PID: 5075 at fs/mbcache.c:419 mb_cache_destroy+0x224/0x290\nModules linked in:\nCPU: 0 PID: 5075 Comm: syz-executor199 Not tainted 6.9.0-rc6-gb947cc5bf6d7\nRIP: 0010:mb_cache_destroy+0x224/0x290 fs/mbcache.c:419\nCall Trace:\n <TASK>\n ext4_put_super+0x6d4/0xcd0 fs/ext4/super.c:1375\n generic_shutdown_super+0x136/0x2d0 fs/super.c:641\n kill_block_super+0x44/0x90 fs/super.c:1675\n ext4_kill_sb+0x68/0xa0 fs/ext4/super.c:7327\n[...]\n============================================\n\nThis is because when finding an entry in ext4_xattr_block_cache_find(), if\next4_sb_bread() returns -ENOMEM, the ce's e_refcnt, which has already grown\nin the __entry_find(), won't be put away, and eventually trigger the above\nissue in mb_cache_destroy() due to reference count leakage.\n\nSo call mb_cache_entry_put() on the -ENOMEM error branch as a quick fix.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-39276",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/76dc776153a47372719d664e0fc50d6355791abb",
            "patch_url": "https://git.kernel.org/stable/p/76dc776153a47372719d664e0fc50d6355791abb",
            "filename": "CVE-2024-39276-76dc776153a47372719d664e0fc50d6355791abb.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39276/CVE-2024-39276-76dc776153a47372719d664e0fc50d6355791abb.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0c0b4a49d3e7f49690a6827a41faeffad5df7e21",
                "patch_url": "https://git.kernel.org/stable/p/0c0b4a49d3e7f49690a6827a41faeffad5df7e21",
                "filename": "CVE-2024-39276-0c0b4a49d3e7f49690a6827a41faeffad5df7e21.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39276/CVE-2024-39276-0c0b4a49d3e7f49690a6827a41faeffad5df7e21.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/681ff9a09accd8a4379f8bd30b7a1641ee19bb3e",
                "patch_url": "https://git.kernel.org/stable/p/681ff9a09accd8a4379f8bd30b7a1641ee19bb3e",
                "filename": "CVE-2024-39276-681ff9a09accd8a4379f8bd30b7a1641ee19bb3e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39276/CVE-2024-39276-681ff9a09accd8a4379f8bd30b7a1641ee19bb3e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/76dc776153a47372719d664e0fc50d6355791abb",
                "patch_url": "https://git.kernel.org/stable/p/76dc776153a47372719d664e0fc50d6355791abb",
                "filename": "CVE-2024-39276-76dc776153a47372719d664e0fc50d6355791abb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39276/CVE-2024-39276-76dc776153a47372719d664e0fc50d6355791abb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/896a7e7d0d555ad8b2b46af0c2fa7de7467f9483",
                "patch_url": "https://git.kernel.org/stable/p/896a7e7d0d555ad8b2b46af0c2fa7de7467f9483",
                "filename": "CVE-2024-39276-896a7e7d0d555ad8b2b46af0c2fa7de7467f9483.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39276/CVE-2024-39276-896a7e7d0d555ad8b2b46af0c2fa7de7467f9483.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ad75e78747b5a50dc5a52f0f8e92e920a653f16",
                "patch_url": "https://git.kernel.org/stable/p/9ad75e78747b5a50dc5a52f0f8e92e920a653f16",
                "filename": "CVE-2024-39276-9ad75e78747b5a50dc5a52f0f8e92e920a653f16.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39276/CVE-2024-39276-9ad75e78747b5a50dc5a52f0f8e92e920a653f16.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a95df6f04f2c37291adf26a74205cde0314d4577",
                "patch_url": "https://git.kernel.org/stable/p/a95df6f04f2c37291adf26a74205cde0314d4577",
                "filename": "CVE-2024-39276-a95df6f04f2c37291adf26a74205cde0314d4577.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39276/CVE-2024-39276-a95df6f04f2c37291adf26a74205cde0314d4577.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b37c0edef4e66fb21a2fbc211471195a383e5ab8",
                "patch_url": "https://git.kernel.org/stable/p/b37c0edef4e66fb21a2fbc211471195a383e5ab8",
                "filename": "CVE-2024-39276-b37c0edef4e66fb21a2fbc211471195a383e5ab8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39276/CVE-2024-39276-b37c0edef4e66fb21a2fbc211471195a383e5ab8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e941b712e758f615d311946bf98216e79145ccd9",
                "patch_url": "https://git.kernel.org/stable/p/e941b712e758f615d311946bf98216e79145ccd9",
                "filename": "CVE-2024-39276-e941b712e758f615d311946bf98216e79145ccd9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39276/CVE-2024-39276-e941b712e758f615d311946bf98216e79145ccd9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0c0b4a49d3e7f49690a6827a41faeffad5df7e21",
            "https://git.kernel.org/stable/c/681ff9a09accd8a4379f8bd30b7a1641ee19bb3e",
            "https://git.kernel.org/stable/c/76dc776153a47372719d664e0fc50d6355791abb",
            "https://git.kernel.org/stable/c/896a7e7d0d555ad8b2b46af0c2fa7de7467f9483",
            "https://git.kernel.org/stable/c/9ad75e78747b5a50dc5a52f0f8e92e920a653f16",
            "https://git.kernel.org/stable/c/a95df6f04f2c37291adf26a74205cde0314d4577",
            "https://git.kernel.org/stable/c/b37c0edef4e66fb21a2fbc211471195a383e5ab8",
            "https://git.kernel.org/stable/c/e941b712e758f615d311946bf98216e79145ccd9"
        ]
    },
    "CVE-2024-39471": {
        "cve": "CVE-2024-39471",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: add error handle to avoid out-of-bounds\n\nif the sdma_v4_0_irq_id_to_seq return -EINVAL, the process should\nbe stop to avoid out-of-bounds read, so directly return -EINVAL.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-39471",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ea906e9ac61e3152bef63597f2d9f4a812fc346a",
            "patch_url": "https://git.kernel.org/stable/p/ea906e9ac61e3152bef63597f2d9f4a812fc346a",
            "filename": "CVE-2024-39471-ea906e9ac61e3152bef63597f2d9f4a812fc346a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39471/CVE-2024-39471-ea906e9ac61e3152bef63597f2d9f4a812fc346a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/011552f29f20842c9a7a21bffe1f6a2d6457ba46",
                "patch_url": "https://git.kernel.org/stable/p/011552f29f20842c9a7a21bffe1f6a2d6457ba46",
                "filename": "CVE-2024-39471-011552f29f20842c9a7a21bffe1f6a2d6457ba46.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39471/CVE-2024-39471-011552f29f20842c9a7a21bffe1f6a2d6457ba46.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0964c84b93db7fbf74f357c1e20957850e092db3",
                "patch_url": "https://git.kernel.org/stable/p/0964c84b93db7fbf74f357c1e20957850e092db3",
                "filename": "CVE-2024-39471-0964c84b93db7fbf74f357c1e20957850e092db3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39471/CVE-2024-39471-0964c84b93db7fbf74f357c1e20957850e092db3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5594971e02764aa1c8210ffb838cb4e7897716e8",
                "patch_url": "https://git.kernel.org/stable/p/5594971e02764aa1c8210ffb838cb4e7897716e8",
                "filename": "CVE-2024-39471-5594971e02764aa1c8210ffb838cb4e7897716e8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39471/CVE-2024-39471-5594971e02764aa1c8210ffb838cb4e7897716e8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5b0a3dc3e87821acb80e841b464d335aff242691",
                "patch_url": "https://git.kernel.org/stable/p/5b0a3dc3e87821acb80e841b464d335aff242691",
                "filename": "CVE-2024-39471-5b0a3dc3e87821acb80e841b464d335aff242691.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39471/CVE-2024-39471-5b0a3dc3e87821acb80e841b464d335aff242691.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8112fa72b7f139052843ff484130d6f97e9f052f",
                "patch_url": "https://git.kernel.org/stable/p/8112fa72b7f139052843ff484130d6f97e9f052f",
                "filename": "CVE-2024-39471-8112fa72b7f139052843ff484130d6f97e9f052f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39471/CVE-2024-39471-8112fa72b7f139052843ff484130d6f97e9f052f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8b2faf1a4f3b6c748c0da36cda865a226534d520",
                "patch_url": "https://git.kernel.org/stable/p/8b2faf1a4f3b6c748c0da36cda865a226534d520",
                "filename": "CVE-2024-39471-8b2faf1a4f3b6c748c0da36cda865a226534d520.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39471/CVE-2024-39471-8b2faf1a4f3b6c748c0da36cda865a226534d520.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ea906e9ac61e3152bef63597f2d9f4a812fc346a",
                "patch_url": "https://git.kernel.org/stable/p/ea906e9ac61e3152bef63597f2d9f4a812fc346a",
                "filename": "CVE-2024-39471-ea906e9ac61e3152bef63597f2d9f4a812fc346a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39471/CVE-2024-39471-ea906e9ac61e3152bef63597f2d9f4a812fc346a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/011552f29f20842c9a7a21bffe1f6a2d6457ba46",
            "https://git.kernel.org/stable/c/0964c84b93db7fbf74f357c1e20957850e092db3",
            "https://git.kernel.org/stable/c/5594971e02764aa1c8210ffb838cb4e7897716e8",
            "https://git.kernel.org/stable/c/5b0a3dc3e87821acb80e841b464d335aff242691",
            "https://git.kernel.org/stable/c/8112fa72b7f139052843ff484130d6f97e9f052f",
            "https://git.kernel.org/stable/c/8b2faf1a4f3b6c748c0da36cda865a226534d520",
            "https://git.kernel.org/stable/c/ea906e9ac61e3152bef63597f2d9f4a812fc346a",
            "https://www.cve.org/CVERecord?id=CVE-2024-39471\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-39471\nhttps://lore.kernel.org/linux-cve-announce/2024062501-CVE-2024-39471-3dee@gregkh/T"
        ]
    },
    "CVE-2024-39472": {
        "cve": "CVE-2024-39472",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: fix log recovery buffer allocation for the legacy h_size fixup\n\nCommit a70f9fe52daa (\"xfs: detect and handle invalid iclog size set by\nmkfs\") added a fixup for incorrect h_size values used for the initial\numount record in old xfsprogs versions.  Later commit 0c771b99d6c9\n(\"xfs: clean up calculation of LR header blocks\") cleaned up the log\nreover buffer calculation, but stoped using the fixed up h_size value\nto size the log recovery buffer, which can lead to an out of bounds\naccess when the incorrect h_size does not come from the old mkfs\ntool, but a fuzzer.\n\nFix this by open coding xlog_logrec_hblks and taking the fixed h_size\ninto account for this calculation.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-39472",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/57835c0e7152e36b03875dd6c56dfeed685c1b1f",
            "patch_url": "https://git.kernel.org/stable/p/57835c0e7152e36b03875dd6c56dfeed685c1b1f",
            "filename": "CVE-2024-39472-57835c0e7152e36b03875dd6c56dfeed685c1b1f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39472/CVE-2024-39472-57835c0e7152e36b03875dd6c56dfeed685c1b1f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/45cf976008ddef4a9c9a30310c9b4fb2a9a6602a",
                "patch_url": "https://git.kernel.org/stable/p/45cf976008ddef4a9c9a30310c9b4fb2a9a6602a",
                "filename": "CVE-2024-39472-45cf976008ddef4a9c9a30310c9b4fb2a9a6602a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39472/CVE-2024-39472-45cf976008ddef4a9c9a30310c9b4fb2a9a6602a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/57835c0e7152e36b03875dd6c56dfeed685c1b1f",
                "patch_url": "https://git.kernel.org/stable/p/57835c0e7152e36b03875dd6c56dfeed685c1b1f",
                "filename": "CVE-2024-39472-57835c0e7152e36b03875dd6c56dfeed685c1b1f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39472/CVE-2024-39472-57835c0e7152e36b03875dd6c56dfeed685c1b1f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c2389c074973aa94e34992e7f66dac0de37595b5",
                "patch_url": "https://git.kernel.org/stable/p/c2389c074973aa94e34992e7f66dac0de37595b5",
                "filename": "CVE-2024-39472-c2389c074973aa94e34992e7f66dac0de37595b5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39472/CVE-2024-39472-c2389c074973aa94e34992e7f66dac0de37595b5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f754591b17d0ee91c2b45fe9509d0cdc420527cb",
                "patch_url": "https://git.kernel.org/stable/p/f754591b17d0ee91c2b45fe9509d0cdc420527cb",
                "filename": "CVE-2024-39472-f754591b17d0ee91c2b45fe9509d0cdc420527cb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39472/CVE-2024-39472-f754591b17d0ee91c2b45fe9509d0cdc420527cb.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/45cf976008ddef4a9c9a30310c9b4fb2a9a6602a",
            "https://git.kernel.org/stable/c/57835c0e7152e36b03875dd6c56dfeed685c1b1f",
            "https://git.kernel.org/stable/c/c2389c074973aa94e34992e7f66dac0de37595b5",
            "https://git.kernel.org/stable/c/f754591b17d0ee91c2b45fe9509d0cdc420527cb",
            "https://www.cve.org/CVERecord?id=CVE-2024-39472\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-39472\nhttps://lore.kernel.org/linux-cve-announce/2024070512-CVE-2024-39472-f977@gregkh/T"
        ]
    },
    "CVE-2024-39476": {
        "cve": "CVE-2024-39476",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING\n\nXiao reported that lvm2 test lvconvert-raid-takeover.sh can hang with\nsmall possibility, the root cause is exactly the same as commit\nbed9e27baf52 (\"Revert \"md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d\"\")\n\nHowever, Dan reported another hang after that, and junxiao investigated\nthe problem and found out that this is caused by plugged bio can't issue\nfrom raid5d().\n\nCurrent implementation in raid5d() has a weird dependence:\n\n1) md_check_recovery() from raid5d() must hold 'reconfig_mutex' to clear\n   MD_SB_CHANGE_PENDING;\n2) raid5d() handles IO in a deadloop, until all IO are issued;\n3) IO from raid5d() must wait for MD_SB_CHANGE_PENDING to be cleared;\n\nThis behaviour is introduce before v2.6, and for consequence, if other\ncontext hold 'reconfig_mutex', and md_check_recovery() can't update\nsuper_block, then raid5d() will waste one cpu 100% by the deadloop, until\n'reconfig_mutex' is released.\n\nRefer to the implementation from raid1 and raid10, fix this problem by\nskipping issue IO if MD_SB_CHANGE_PENDING is still set after\nmd_check_recovery(), daemon thread will be woken up when 'reconfig_mutex'\nis released. Meanwhile, the hang problem will be fixed as well.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-39476",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3f8d5e802d4cedd445f9a89be8c3fd2d0e99024b",
            "patch_url": "https://git.kernel.org/stable/p/3f8d5e802d4cedd445f9a89be8c3fd2d0e99024b",
            "filename": "CVE-2024-39476-3f8d5e802d4cedd445f9a89be8c3fd2d0e99024b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39476/CVE-2024-39476-3f8d5e802d4cedd445f9a89be8c3fd2d0e99024b.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/098d54934814dd876963abfe751c3b1cf7fbe56a",
                "patch_url": "https://git.kernel.org/stable/p/098d54934814dd876963abfe751c3b1cf7fbe56a",
                "filename": "CVE-2024-39476-098d54934814dd876963abfe751c3b1cf7fbe56a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39476/CVE-2024-39476-098d54934814dd876963abfe751c3b1cf7fbe56a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/151f66bb618d1fd0eeb84acb61b4a9fa5d8bb0fa",
                "patch_url": "https://git.kernel.org/stable/p/151f66bb618d1fd0eeb84acb61b4a9fa5d8bb0fa",
                "filename": "CVE-2024-39476-151f66bb618d1fd0eeb84acb61b4a9fa5d8bb0fa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39476/CVE-2024-39476-151f66bb618d1fd0eeb84acb61b4a9fa5d8bb0fa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3f8d5e802d4cedd445f9a89be8c3fd2d0e99024b",
                "patch_url": "https://git.kernel.org/stable/p/3f8d5e802d4cedd445f9a89be8c3fd2d0e99024b",
                "filename": "CVE-2024-39476-3f8d5e802d4cedd445f9a89be8c3fd2d0e99024b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39476/CVE-2024-39476-3f8d5e802d4cedd445f9a89be8c3fd2d0e99024b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/634ba3c97ec413cb10681c7b196db43ee461ecf4",
                "patch_url": "https://git.kernel.org/stable/p/634ba3c97ec413cb10681c7b196db43ee461ecf4",
                "filename": "CVE-2024-39476-634ba3c97ec413cb10681c7b196db43ee461ecf4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39476/CVE-2024-39476-634ba3c97ec413cb10681c7b196db43ee461ecf4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aa64464c8f4d2ab92f6d0b959a1e0767b829d787",
                "patch_url": "https://git.kernel.org/stable/p/aa64464c8f4d2ab92f6d0b959a1e0767b829d787",
                "filename": "CVE-2024-39476-aa64464c8f4d2ab92f6d0b959a1e0767b829d787.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39476/CVE-2024-39476-aa64464c8f4d2ab92f6d0b959a1e0767b829d787.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b32aa95843cac6b12c2c014d40fca18aef24a347",
                "patch_url": "https://git.kernel.org/stable/p/b32aa95843cac6b12c2c014d40fca18aef24a347",
                "filename": "CVE-2024-39476-b32aa95843cac6b12c2c014d40fca18aef24a347.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39476/CVE-2024-39476-b32aa95843cac6b12c2c014d40fca18aef24a347.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cd2538e5af495b3c747e503db346470fc1ffc447",
                "patch_url": "https://git.kernel.org/stable/p/cd2538e5af495b3c747e503db346470fc1ffc447",
                "filename": "CVE-2024-39476-cd2538e5af495b3c747e503db346470fc1ffc447.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39476/CVE-2024-39476-cd2538e5af495b3c747e503db346470fc1ffc447.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e332a12f65d8fed8cf63bedb4e9317bb872b9ac7",
                "patch_url": "https://git.kernel.org/stable/p/e332a12f65d8fed8cf63bedb4e9317bb872b9ac7",
                "filename": "CVE-2024-39476-e332a12f65d8fed8cf63bedb4e9317bb872b9ac7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39476/CVE-2024-39476-e332a12f65d8fed8cf63bedb4e9317bb872b9ac7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/098d54934814dd876963abfe751c3b1cf7fbe56a",
            "https://git.kernel.org/stable/c/151f66bb618d1fd0eeb84acb61b4a9fa5d8bb0fa",
            "https://git.kernel.org/stable/c/3f8d5e802d4cedd445f9a89be8c3fd2d0e99024b",
            "https://git.kernel.org/stable/c/634ba3c97ec413cb10681c7b196db43ee461ecf4",
            "https://git.kernel.org/stable/c/aa64464c8f4d2ab92f6d0b959a1e0767b829d787",
            "https://git.kernel.org/stable/c/b32aa95843cac6b12c2c014d40fca18aef24a347",
            "https://git.kernel.org/stable/c/cd2538e5af495b3c747e503db346470fc1ffc447",
            "https://git.kernel.org/stable/c/e332a12f65d8fed8cf63bedb4e9317bb872b9ac7",
            "https://www.cve.org/CVERecord?id=CVE-2024-39476\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-39476\nhttps://lore.kernel.org/linux-cve-announce/2024070518-CVE-2024-39476-aa2d@gregkh/T"
        ]
    },
    "CVE-2024-39487": {
        "cve": "CVE-2024-39487",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()\n\nIn function bond_option_arp_ip_targets_set(), if newval->string is an\nempty string, newval->string+1 will point to the byte after the\nstring, causing an out-of-bound read.\n\nBUG: KASAN: slab-out-of-bounds in strlen+0x7d/0xa0 lib/string.c:418\nRead of size 1 at addr ffff8881119c4781 by task syz-executor665/8107\nCPU: 1 PID: 8107 Comm: syz-executor665 Not tainted 6.7.0-rc7 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:364 [inline]\n print_report+0xc1/0x5e0 mm/kasan/report.c:475\n kasan_report+0xbe/0xf0 mm/kasan/report.c:588\n strlen+0x7d/0xa0 lib/string.c:418\n __fortify_strlen include/linux/fortify-string.h:210 [inline]\n in4_pton+0xa3/0x3f0 net/core/utils.c:130\n bond_option_arp_ip_targets_set+0xc2/0x910\ndrivers/net/bonding/bond_options.c:1201\n __bond_opt_set+0x2a4/0x1030 drivers/net/bonding/bond_options.c:767\n __bond_opt_set_notify+0x48/0x150 drivers/net/bonding/bond_options.c:792\n bond_opt_tryset_rtnl+0xda/0x160 drivers/net/bonding/bond_options.c:817\n bonding_sysfs_store_option+0xa1/0x120 drivers/net/bonding/bond_sysfs.c:156\n dev_attr_store+0x54/0x80 drivers/base/core.c:2366\n sysfs_kf_write+0x114/0x170 fs/sysfs/file.c:136\n kernfs_fop_write_iter+0x337/0x500 fs/kernfs/file.c:334\n call_write_iter include/linux/fs.h:2020 [inline]\n new_sync_write fs/read_write.c:491 [inline]\n vfs_write+0x96a/0xd80 fs/read_write.c:584\n ksys_write+0x122/0x250 fs/read_write.c:637\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n---[ end trace ]---\n\nFix it by adding a check of string length before using it.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-39487",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/bfd14e5915c2669f292a31d028e75dcd82f1e7e9",
            "patch_url": "https://git.kernel.org/stable/p/bfd14e5915c2669f292a31d028e75dcd82f1e7e9",
            "filename": "CVE-2024-39487-bfd14e5915c2669f292a31d028e75dcd82f1e7e9.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39487/CVE-2024-39487-bfd14e5915c2669f292a31d028e75dcd82f1e7e9.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/6a8a4fd082c439e19fede027e80c79bc4c84bb8e",
                "patch_url": "https://git.kernel.org/stable/p/6a8a4fd082c439e19fede027e80c79bc4c84bb8e",
                "filename": "CVE-2024-39487-6a8a4fd082c439e19fede027e80c79bc4c84bb8e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39487/CVE-2024-39487-6a8a4fd082c439e19fede027e80c79bc4c84bb8e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6b21346b399fd1336fe59233a17eb5ce73041ee1",
                "patch_url": "https://git.kernel.org/stable/p/6b21346b399fd1336fe59233a17eb5ce73041ee1",
                "filename": "CVE-2024-39487-6b21346b399fd1336fe59233a17eb5ce73041ee1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39487/CVE-2024-39487-6b21346b399fd1336fe59233a17eb5ce73041ee1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/707c85ba3527ad6aa25552033576b0f1ff835d7b",
                "patch_url": "https://git.kernel.org/stable/p/707c85ba3527ad6aa25552033576b0f1ff835d7b",
                "filename": "CVE-2024-39487-707c85ba3527ad6aa25552033576b0f1ff835d7b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39487/CVE-2024-39487-707c85ba3527ad6aa25552033576b0f1ff835d7b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9f835e48bd4c75fdf6a9cff3f0b806a7abde78da",
                "patch_url": "https://git.kernel.org/stable/p/9f835e48bd4c75fdf6a9cff3f0b806a7abde78da",
                "filename": "CVE-2024-39487-9f835e48bd4c75fdf6a9cff3f0b806a7abde78da.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39487/CVE-2024-39487-9f835e48bd4c75fdf6a9cff3f0b806a7abde78da.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b75e33eae8667084bd4a63e67657c6a5a0f8d1e8",
                "patch_url": "https://git.kernel.org/stable/p/b75e33eae8667084bd4a63e67657c6a5a0f8d1e8",
                "filename": "CVE-2024-39487-b75e33eae8667084bd4a63e67657c6a5a0f8d1e8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39487/CVE-2024-39487-b75e33eae8667084bd4a63e67657c6a5a0f8d1e8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bfd14e5915c2669f292a31d028e75dcd82f1e7e9",
                "patch_url": "https://git.kernel.org/stable/p/bfd14e5915c2669f292a31d028e75dcd82f1e7e9",
                "filename": "CVE-2024-39487-bfd14e5915c2669f292a31d028e75dcd82f1e7e9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39487/CVE-2024-39487-bfd14e5915c2669f292a31d028e75dcd82f1e7e9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c8eb8ab9a44ff0e73492d0a12a643c449f641a9f",
                "patch_url": "https://git.kernel.org/stable/p/c8eb8ab9a44ff0e73492d0a12a643c449f641a9f",
                "filename": "CVE-2024-39487-c8eb8ab9a44ff0e73492d0a12a643c449f641a9f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39487/CVE-2024-39487-c8eb8ab9a44ff0e73492d0a12a643c449f641a9f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e271ff53807e8f2c628758290f0e499dbe51cb3d",
                "patch_url": "https://git.kernel.org/stable/p/e271ff53807e8f2c628758290f0e499dbe51cb3d",
                "filename": "CVE-2024-39487-e271ff53807e8f2c628758290f0e499dbe51cb3d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39487/CVE-2024-39487-e271ff53807e8f2c628758290f0e499dbe51cb3d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/6a8a4fd082c439e19fede027e80c79bc4c84bb8e",
            "https://git.kernel.org/stable/c/6b21346b399fd1336fe59233a17eb5ce73041ee1",
            "https://git.kernel.org/stable/c/707c85ba3527ad6aa25552033576b0f1ff835d7b",
            "https://git.kernel.org/stable/c/9f835e48bd4c75fdf6a9cff3f0b806a7abde78da",
            "https://git.kernel.org/stable/c/b75e33eae8667084bd4a63e67657c6a5a0f8d1e8",
            "https://git.kernel.org/stable/c/bfd14e5915c2669f292a31d028e75dcd82f1e7e9",
            "https://git.kernel.org/stable/c/c8eb8ab9a44ff0e73492d0a12a643c449f641a9f",
            "https://git.kernel.org/stable/c/e271ff53807e8f2c628758290f0e499dbe51cb3d",
            "https://www.cve.org/CVERecord?id=CVE-2024-39487\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-39487\nhttps://lore.kernel.org/linux-cve-announce/2024070912-CVE-2024-39487-f52c@gregkh/T"
        ]
    },
    "CVE-2024-39499": {
        "cve": "CVE-2024-39499",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nvmci: prevent speculation leaks by sanitizing event in event_deliver()\n\nCoverity spotted that event_msg is controlled by user-space,\nevent_msg->event_data.event is passed to event_deliver() and used\nas an index without sanitization.\n\nThis change ensures that the event index is sanitized to mitigate any\npossibility of speculative information leaks.\n\nThis bug was discovered and resolved using Coverity Static Analysis\nSecurity Testing (SAST) by Synopsys, Inc.\n\nOnly compile tested, no access to HW.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-39499",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/681967c4ff210e06380acf9b9a1b33ae06e77cbd",
            "patch_url": "https://git.kernel.org/stable/p/681967c4ff210e06380acf9b9a1b33ae06e77cbd",
            "filename": "CVE-2024-39499-681967c4ff210e06380acf9b9a1b33ae06e77cbd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39499/CVE-2024-39499-681967c4ff210e06380acf9b9a1b33ae06e77cbd.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/58730dfbd4ae01c1b022b0d234a8bf8c02cdfb81",
                "patch_url": "https://git.kernel.org/stable/p/58730dfbd4ae01c1b022b0d234a8bf8c02cdfb81",
                "filename": "CVE-2024-39499-58730dfbd4ae01c1b022b0d234a8bf8c02cdfb81.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39499/CVE-2024-39499-58730dfbd4ae01c1b022b0d234a8bf8c02cdfb81.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/681967c4ff210e06380acf9b9a1b33ae06e77cbd",
                "patch_url": "https://git.kernel.org/stable/p/681967c4ff210e06380acf9b9a1b33ae06e77cbd",
                "filename": "CVE-2024-39499-681967c4ff210e06380acf9b9a1b33ae06e77cbd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39499/CVE-2024-39499-681967c4ff210e06380acf9b9a1b33ae06e77cbd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/757804e1c599af5d2a7f864c8e8b2842406ff4bb",
                "patch_url": "https://git.kernel.org/stable/p/757804e1c599af5d2a7f864c8e8b2842406ff4bb",
                "filename": "CVE-2024-39499-757804e1c599af5d2a7f864c8e8b2842406ff4bb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39499/CVE-2024-39499-757804e1c599af5d2a7f864c8e8b2842406ff4bb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8003f00d895310d409b2bf9ef907c56b42a4e0f4",
                "patch_url": "https://git.kernel.org/stable/p/8003f00d895310d409b2bf9ef907c56b42a4e0f4",
                "filename": "CVE-2024-39499-8003f00d895310d409b2bf9ef907c56b42a4e0f4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39499/CVE-2024-39499-8003f00d895310d409b2bf9ef907c56b42a4e0f4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/95ac3e773a1f8da83c4710a720fbfe80055aafae",
                "patch_url": "https://git.kernel.org/stable/p/95ac3e773a1f8da83c4710a720fbfe80055aafae",
                "filename": "CVE-2024-39499-95ac3e773a1f8da83c4710a720fbfe80055aafae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39499/CVE-2024-39499-95ac3e773a1f8da83c4710a720fbfe80055aafae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/95bac1c8bedb362374ea1937b1d3e833e01174ee",
                "patch_url": "https://git.kernel.org/stable/p/95bac1c8bedb362374ea1937b1d3e833e01174ee",
                "filename": "CVE-2024-39499-95bac1c8bedb362374ea1937b1d3e833e01174ee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39499/CVE-2024-39499-95bac1c8bedb362374ea1937b1d3e833e01174ee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e293c6b38ac9029d76ff0d2a6b2d74131709a9a8",
                "patch_url": "https://git.kernel.org/stable/p/e293c6b38ac9029d76ff0d2a6b2d74131709a9a8",
                "filename": "CVE-2024-39499-e293c6b38ac9029d76ff0d2a6b2d74131709a9a8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39499/CVE-2024-39499-e293c6b38ac9029d76ff0d2a6b2d74131709a9a8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f70ff737346744633e7b655c1fb23e1578491ff3",
                "patch_url": "https://git.kernel.org/stable/p/f70ff737346744633e7b655c1fb23e1578491ff3",
                "filename": "CVE-2024-39499-f70ff737346744633e7b655c1fb23e1578491ff3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39499/CVE-2024-39499-f70ff737346744633e7b655c1fb23e1578491ff3.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/58730dfbd4ae01c1b022b0d234a8bf8c02cdfb81",
            "https://git.kernel.org/stable/c/681967c4ff210e06380acf9b9a1b33ae06e77cbd",
            "https://git.kernel.org/stable/c/757804e1c599af5d2a7f864c8e8b2842406ff4bb",
            "https://git.kernel.org/stable/c/8003f00d895310d409b2bf9ef907c56b42a4e0f4",
            "https://git.kernel.org/stable/c/95ac3e773a1f8da83c4710a720fbfe80055aafae",
            "https://git.kernel.org/stable/c/95bac1c8bedb362374ea1937b1d3e833e01174ee",
            "https://git.kernel.org/stable/c/e293c6b38ac9029d76ff0d2a6b2d74131709a9a8",
            "https://git.kernel.org/stable/c/f70ff737346744633e7b655c1fb23e1578491ff3",
            "https://www.cve.org/CVERecord?id=CVE-2024-39499\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-39499\nhttps://lore.kernel.org/linux-cve-announce/2024071203-CVE-2024-39499-ed0a@gregkh/T"
        ]
    },
    "CVE-2024-39501": {
        "cve": "CVE-2024-39501",
        "cvss_v2": null,
        "cvss_v3": "0.0",
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-39501",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ec772ed7cb21b46fb132f89241682553efd0b721",
            "patch_url": "https://git.kernel.org/stable/p/ec772ed7cb21b46fb132f89241682553efd0b721",
            "filename": "CVE-2024-39501-ec772ed7cb21b46fb132f89241682553efd0b721.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39501/CVE-2024-39501-ec772ed7cb21b46fb132f89241682553efd0b721.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/08891eeaa97c079b7f95d60b62dcf0e3ce034b69",
                "patch_url": "https://git.kernel.org/stable/p/08891eeaa97c079b7f95d60b62dcf0e3ce034b69",
                "filename": "CVE-2024-39501-08891eeaa97c079b7f95d60b62dcf0e3ce034b69.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39501/CVE-2024-39501-08891eeaa97c079b7f95d60b62dcf0e3ce034b69.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/13d25e82b6d00d743c7961dcb260329f86bedf7c",
                "patch_url": "https://git.kernel.org/stable/p/13d25e82b6d00d743c7961dcb260329f86bedf7c",
                "filename": "CVE-2024-39501-13d25e82b6d00d743c7961dcb260329f86bedf7c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39501/CVE-2024-39501-13d25e82b6d00d743c7961dcb260329f86bedf7c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/760603e30bf19d7b4c28e9d81f18b54fa3b745ad",
                "patch_url": "https://git.kernel.org/stable/p/760603e30bf19d7b4c28e9d81f18b54fa3b745ad",
                "filename": "CVE-2024-39501-760603e30bf19d7b4c28e9d81f18b54fa3b745ad.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39501/CVE-2024-39501-760603e30bf19d7b4c28e9d81f18b54fa3b745ad.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/95d03d369ea647b89e950667f1c3363ea6f564e6",
                "patch_url": "https://git.kernel.org/stable/p/95d03d369ea647b89e950667f1c3363ea6f564e6",
                "filename": "CVE-2024-39501-95d03d369ea647b89e950667f1c3363ea6f564e6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39501/CVE-2024-39501-95d03d369ea647b89e950667f1c3363ea6f564e6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a42b0060d6ff2f7e59290a26d5f162a3c6329b90",
                "patch_url": "https://git.kernel.org/stable/p/a42b0060d6ff2f7e59290a26d5f162a3c6329b90",
                "filename": "CVE-2024-39501-a42b0060d6ff2f7e59290a26d5f162a3c6329b90.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39501/CVE-2024-39501-a42b0060d6ff2f7e59290a26d5f162a3c6329b90.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bb3641a5831789d83a58a39ed4a928bcbece7080",
                "patch_url": "https://git.kernel.org/stable/p/bb3641a5831789d83a58a39ed4a928bcbece7080",
                "filename": "CVE-2024-39501-bb3641a5831789d83a58a39ed4a928bcbece7080.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39501/CVE-2024-39501-bb3641a5831789d83a58a39ed4a928bcbece7080.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c0a40097f0bc81deafc15f9195d1fb54595cd6d0",
                "patch_url": "https://git.kernel.org/stable/p/c0a40097f0bc81deafc15f9195d1fb54595cd6d0",
                "filename": "CVE-2024-39501-c0a40097f0bc81deafc15f9195d1fb54595cd6d0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39501/CVE-2024-39501-c0a40097f0bc81deafc15f9195d1fb54595cd6d0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ec772ed7cb21b46fb132f89241682553efd0b721",
                "patch_url": "https://git.kernel.org/stable/p/ec772ed7cb21b46fb132f89241682553efd0b721",
                "filename": "CVE-2024-39501-ec772ed7cb21b46fb132f89241682553efd0b721.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39501/CVE-2024-39501-ec772ed7cb21b46fb132f89241682553efd0b721.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/08891eeaa97c079b7f95d60b62dcf0e3ce034b69",
            "https://git.kernel.org/stable/c/13d25e82b6d00d743c7961dcb260329f86bedf7c",
            "https://git.kernel.org/stable/c/760603e30bf19d7b4c28e9d81f18b54fa3b745ad",
            "https://git.kernel.org/stable/c/95d03d369ea647b89e950667f1c3363ea6f564e6",
            "https://git.kernel.org/stable/c/a42b0060d6ff2f7e59290a26d5f162a3c6329b90",
            "https://git.kernel.org/stable/c/bb3641a5831789d83a58a39ed4a928bcbece7080",
            "https://git.kernel.org/stable/c/c0a40097f0bc81deafc15f9195d1fb54595cd6d0",
            "https://git.kernel.org/stable/c/ec772ed7cb21b46fb132f89241682553efd0b721",
            "https://lore.kernel.org/lkml/",
            "https://www.cve.org/CVERecord?id=CVE-2024-39501\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-39501\nhttps://lore.kernel.org/linux-cve-announce/2024071204-CVE-2024-39501-058b@gregkh/T"
        ]
    },
    "CVE-2024-39502": {
        "cve": "CVE-2024-39502",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nionic: fix use after netif_napi_del()\n\nWhen queues are started, netif_napi_add() and napi_enable() are called.\nIf there are 4 queues and only 3 queues are used for the current\nconfiguration, only 3 queues' napi should be registered and enabled.\nThe ionic_qcq_enable() checks whether the .poll pointer is not NULL for\nenabling only the using queue' napi. Unused queues' napi will not be\nregistered by netif_napi_add(), so the .poll pointer indicates NULL.\nBut it couldn't distinguish whether the napi was unregistered or not\nbecause netif_napi_del() doesn't reset the .poll pointer to NULL.\nSo, ionic_qcq_enable() calls napi_enable() for the queue, which was\nunregistered by netif_napi_del().\n\nReproducer:\n   ethtool -L <interface name> rx 1 tx 1 combined 0\n   ethtool -L <interface name> rx 0 tx 0 combined 1\n   ethtool -L <interface name> rx 0 tx 0 combined 4\n\nSplat looks like:\nkernel BUG at net/core/dev.c:6666!\nOops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 3 PID: 1057 Comm: kworker/3:3 Not tainted 6.10.0-rc2+ #16\nWorkqueue: events ionic_lif_deferred_work [ionic]\nRIP: 0010:napi_enable+0x3b/0x40\nCode: 48 89 c2 48 83 e2 f6 80 b9 61 09 00 00 00 74 0d 48 83 bf 60 01 00 00 00 74 03 80 ce 01 f0 4f\nRSP: 0018:ffffb6ed83227d48 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff97560cda0828 RCX: 0000000000000029\nRDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff97560cda0a28\nRBP: ffffb6ed83227d50 R08: 0000000000000400 R09: 0000000000000001\nR10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000\nR13: ffff97560ce3c1a0 R14: 0000000000000000 R15: ffff975613ba0a20\nFS:  0000000000000000(0000) GS:ffff975d5f780000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f8f734ee200 CR3: 0000000103e50000 CR4: 00000000007506f0\nPKRU: 55555554\nCall Trace:\n <TASK>\n ? die+0x33/0x90\n ? do_trap+0xd9/0x100\n ? napi_enable+0x3b/0x40\n ? do_error_trap+0x83/0xb0\n ? napi_enable+0x3b/0x40\n ? napi_enable+0x3b/0x40\n ? exc_invalid_op+0x4e/0x70\n ? napi_enable+0x3b/0x40\n ? asm_exc_invalid_op+0x16/0x20\n ? napi_enable+0x3b/0x40\n ionic_qcq_enable+0xb7/0x180 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]\n ionic_start_queues+0xc4/0x290 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]\n ionic_link_status_check+0x11c/0x170 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]\n ionic_lif_deferred_work+0x129/0x280 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]\n process_one_work+0x145/0x360\n worker_thread+0x2bb/0x3d0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0xcc/0x100\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x2d/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-39502",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0d19267cb150e8f76ade210e16ee820a77f684e7",
            "patch_url": "https://git.kernel.org/stable/p/0d19267cb150e8f76ade210e16ee820a77f684e7",
            "filename": "CVE-2024-39502-0d19267cb150e8f76ade210e16ee820a77f684e7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39502/CVE-2024-39502-0d19267cb150e8f76ade210e16ee820a77f684e7.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0d19267cb150e8f76ade210e16ee820a77f684e7",
                "patch_url": "https://git.kernel.org/stable/p/0d19267cb150e8f76ade210e16ee820a77f684e7",
                "filename": "CVE-2024-39502-0d19267cb150e8f76ade210e16ee820a77f684e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39502/CVE-2024-39502-0d19267cb150e8f76ade210e16ee820a77f684e7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/183ebc167a8a19e916b885d4bb61a3491991bfa5",
                "patch_url": "https://git.kernel.org/stable/p/183ebc167a8a19e916b885d4bb61a3491991bfa5",
                "filename": "CVE-2024-39502-183ebc167a8a19e916b885d4bb61a3491991bfa5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39502/CVE-2024-39502-183ebc167a8a19e916b885d4bb61a3491991bfa5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/60cd714871cd5a683353a355cbb17a685245cf84",
                "patch_url": "https://git.kernel.org/stable/p/60cd714871cd5a683353a355cbb17a685245cf84",
                "filename": "CVE-2024-39502-60cd714871cd5a683353a355cbb17a685245cf84.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39502/CVE-2024-39502-60cd714871cd5a683353a355cbb17a685245cf84.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/79f18a41dd056115d685f3b0a419c7cd40055e13",
                "patch_url": "https://git.kernel.org/stable/p/79f18a41dd056115d685f3b0a419c7cd40055e13",
                "filename": "CVE-2024-39502-79f18a41dd056115d685f3b0a419c7cd40055e13.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39502/CVE-2024-39502-79f18a41dd056115d685f3b0a419c7cd40055e13.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8edd18dab443863e9e48f084e7f123fca3065e4e",
                "patch_url": "https://git.kernel.org/stable/p/8edd18dab443863e9e48f084e7f123fca3065e4e",
                "filename": "CVE-2024-39502-8edd18dab443863e9e48f084e7f123fca3065e4e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39502/CVE-2024-39502-8edd18dab443863e9e48f084e7f123fca3065e4e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a87d72b37b9ec2c1e18fe36b09241d8b30334a2e",
                "patch_url": "https://git.kernel.org/stable/p/a87d72b37b9ec2c1e18fe36b09241d8b30334a2e",
                "filename": "CVE-2024-39502-a87d72b37b9ec2c1e18fe36b09241d8b30334a2e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39502/CVE-2024-39502-a87d72b37b9ec2c1e18fe36b09241d8b30334a2e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ff9c2a9426ecf5b9631e9fd74993b357262387d6",
                "patch_url": "https://git.kernel.org/stable/p/ff9c2a9426ecf5b9631e9fd74993b357262387d6",
                "filename": "CVE-2024-39502-ff9c2a9426ecf5b9631e9fd74993b357262387d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39502/CVE-2024-39502-ff9c2a9426ecf5b9631e9fd74993b357262387d6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0d19267cb150e8f76ade210e16ee820a77f684e7",
            "https://git.kernel.org/stable/c/183ebc167a8a19e916b885d4bb61a3491991bfa5",
            "https://git.kernel.org/stable/c/60cd714871cd5a683353a355cbb17a685245cf84",
            "https://git.kernel.org/stable/c/79f18a41dd056115d685f3b0a419c7cd40055e13",
            "https://git.kernel.org/stable/c/8edd18dab443863e9e48f084e7f123fca3065e4e",
            "https://git.kernel.org/stable/c/a87d72b37b9ec2c1e18fe36b09241d8b30334a2e",
            "https://git.kernel.org/stable/c/ff9c2a9426ecf5b9631e9fd74993b357262387d6",
            "https://www.cve.org/CVERecord?id=CVE-2024-39502\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-39502\nhttps://lore.kernel.org/linux-cve-announce/2024071204-CVE-2024-39502-afe9@gregkh/T"
        ]
    },
    "CVE-2024-39503": {
        "cve": "CVE-2024-39503",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: Fix race between namespace cleanup and gc in the list:set type\n\nLion Ackermann reported that there is a race condition between namespace cleanup\nin ipset and the garbage collection of the list:set type. The namespace\ncleanup can destroy the list:set type of sets while the gc of the set type is\nwaiting to run in rcu cleanup. The latter uses data from the destroyed set which\nthus leads use after free. The patch contains the following parts:\n\n- When destroying all sets, first remove the garbage collectors, then wait\n  if needed and then destroy the sets.\n- Fix the badly ordered \"wait then remove gc\" for the destroy a single set\n  case.\n- Fix the missing rcu locking in the list:set type in the userspace test\n  case.\n- Use proper RCU list handlings in the list:set type.\n\nThe patch depends on c1193d9bbbd3 (netfilter: ipset: Add list flush to cancel_gc).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-39503",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0f1bb77c6d837c9513943bc7c08f04c5cc5c6568",
            "patch_url": "https://git.kernel.org/stable/p/0f1bb77c6d837c9513943bc7c08f04c5cc5c6568",
            "filename": "CVE-2024-39503-0f1bb77c6d837c9513943bc7c08f04c5cc5c6568.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39503/CVE-2024-39503-0f1bb77c6d837c9513943bc7c08f04c5cc5c6568.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0f1bb77c6d837c9513943bc7c08f04c5cc5c6568",
                "patch_url": "https://git.kernel.org/stable/p/0f1bb77c6d837c9513943bc7c08f04c5cc5c6568",
                "filename": "CVE-2024-39503-0f1bb77c6d837c9513943bc7c08f04c5cc5c6568.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39503/CVE-2024-39503-0f1bb77c6d837c9513943bc7c08f04c5cc5c6568.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2ba35b37f780c6410bb4bba9c3072596d8576702",
                "patch_url": "https://git.kernel.org/stable/p/2ba35b37f780c6410bb4bba9c3072596d8576702",
                "filename": "CVE-2024-39503-2ba35b37f780c6410bb4bba9c3072596d8576702.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39503/CVE-2024-39503-2ba35b37f780c6410bb4bba9c3072596d8576702.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/390b353d1a1da3e9c6c0fd14fe650d69063c95d6",
                "patch_url": "https://git.kernel.org/stable/p/390b353d1a1da3e9c6c0fd14fe650d69063c95d6",
                "filename": "CVE-2024-39503-390b353d1a1da3e9c6c0fd14fe650d69063c95d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39503/CVE-2024-39503-390b353d1a1da3e9c6c0fd14fe650d69063c95d6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4e7aaa6b82d63e8ddcbfb56b4fd3d014ca586f10",
                "patch_url": "https://git.kernel.org/stable/p/4e7aaa6b82d63e8ddcbfb56b4fd3d014ca586f10",
                "filename": "CVE-2024-39503-4e7aaa6b82d63e8ddcbfb56b4fd3d014ca586f10.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39503/CVE-2024-39503-4e7aaa6b82d63e8ddcbfb56b4fd3d014ca586f10.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/90ae20d47de602198eb69e6cd7a3db3420abfc08",
                "patch_url": "https://git.kernel.org/stable/p/90ae20d47de602198eb69e6cd7a3db3420abfc08",
                "filename": "CVE-2024-39503-90ae20d47de602198eb69e6cd7a3db3420abfc08.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39503/CVE-2024-39503-90ae20d47de602198eb69e6cd7a3db3420abfc08.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/93b53c202b51a69e42ca57f5a183f7e008e19f83",
                "patch_url": "https://git.kernel.org/stable/p/93b53c202b51a69e42ca57f5a183f7e008e19f83",
                "filename": "CVE-2024-39503-93b53c202b51a69e42ca57f5a183f7e008e19f83.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39503/CVE-2024-39503-93b53c202b51a69e42ca57f5a183f7e008e19f83.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c0761d1f1ce1d5b85b5e82bbb714df12de1aa8c3",
                "patch_url": "https://git.kernel.org/stable/p/c0761d1f1ce1d5b85b5e82bbb714df12de1aa8c3",
                "filename": "CVE-2024-39503-c0761d1f1ce1d5b85b5e82bbb714df12de1aa8c3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39503/CVE-2024-39503-c0761d1f1ce1d5b85b5e82bbb714df12de1aa8c3.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0f1bb77c6d837c9513943bc7c08f04c5cc5c6568",
            "https://git.kernel.org/stable/c/2ba35b37f780c6410bb4bba9c3072596d8576702",
            "https://git.kernel.org/stable/c/390b353d1a1da3e9c6c0fd14fe650d69063c95d6",
            "https://git.kernel.org/stable/c/4e7aaa6b82d63e8ddcbfb56b4fd3d014ca586f10",
            "https://git.kernel.org/stable/c/90ae20d47de602198eb69e6cd7a3db3420abfc08",
            "https://git.kernel.org/stable/c/93b53c202b51a69e42ca57f5a183f7e008e19f83",
            "https://git.kernel.org/stable/c/c0761d1f1ce1d5b85b5e82bbb714df12de1aa8c3",
            "https://www.cve.org/CVERecord?id=CVE-2024-39503\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-39503\nhttps://lore.kernel.org/linux-cve-announce/2024071204-CVE-2024-39503-e604@gregkh/T"
        ]
    },
    "CVE-2024-39506": {
        "cve": "CVE-2024-39506",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nliquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet\n\nIn lio_vf_rep_copy_packet() pg_info->page is compared to a NULL value,\nbut then it is unconditionally passed to skb_add_rx_frag() which looks\nstrange and could lead to null pointer dereference.\n\nlio_vf_rep_copy_packet() call trace looks like:\n\tocteon_droq_process_packets\n\t octeon_droq_fast_process_packets\n\t  octeon_droq_dispatch_pkt\n\t   octeon_create_recv_info\n\t    ...search in the dispatch_list...\n\t     ->disp_fn(rdisp->rinfo, ...)\n\t      lio_vf_rep_pkt_recv(struct octeon_recv_info *recv_info, ...)\nIn this path there is no code which sets pg_info->page to NULL.\nSo this check looks unneeded and doesn't solve potential problem.\nBut I guess the author had reason to add a check and I have no such card\nand can't do real test.\nIn addition, the code in the function liquidio_push_packet() in\nliquidio/lio_core.c does exactly the same.\n\nBased on this, I consider the most acceptable compromise solution to\nadjust this issue by moving skb_add_rx_frag() into conditional scope.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-39506",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/87d6bdc006f0cbf297a3b2ad6e40ede4c3ee5dc2",
            "patch_url": "https://git.kernel.org/stable/p/87d6bdc006f0cbf297a3b2ad6e40ede4c3ee5dc2",
            "filename": "CVE-2024-39506-87d6bdc006f0cbf297a3b2ad6e40ede4c3ee5dc2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39506/CVE-2024-39506-87d6bdc006f0cbf297a3b2ad6e40ede4c3ee5dc2.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/87d6bdc006f0cbf297a3b2ad6e40ede4c3ee5dc2",
                "patch_url": "https://git.kernel.org/stable/p/87d6bdc006f0cbf297a3b2ad6e40ede4c3ee5dc2",
                "filename": "CVE-2024-39506-87d6bdc006f0cbf297a3b2ad6e40ede4c3ee5dc2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39506/CVE-2024-39506-87d6bdc006f0cbf297a3b2ad6e40ede4c3ee5dc2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a6f4d0ec170a46b5f453cacf55dff5989b42bbfa",
                "patch_url": "https://git.kernel.org/stable/p/a6f4d0ec170a46b5f453cacf55dff5989b42bbfa",
                "filename": "CVE-2024-39506-a6f4d0ec170a46b5f453cacf55dff5989b42bbfa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39506/CVE-2024-39506-a6f4d0ec170a46b5f453cacf55dff5989b42bbfa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a86490a3712cc513113440a606a0e77130abd47c",
                "patch_url": "https://git.kernel.org/stable/p/a86490a3712cc513113440a606a0e77130abd47c",
                "filename": "CVE-2024-39506-a86490a3712cc513113440a606a0e77130abd47c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39506/CVE-2024-39506-a86490a3712cc513113440a606a0e77130abd47c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c44711b78608c98a3e6b49ce91678cd0917d5349",
                "patch_url": "https://git.kernel.org/stable/p/c44711b78608c98a3e6b49ce91678cd0917d5349",
                "filename": "CVE-2024-39506-c44711b78608c98a3e6b49ce91678cd0917d5349.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39506/CVE-2024-39506-c44711b78608c98a3e6b49ce91678cd0917d5349.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cbf18d8128a753cb632bef39470d19befd9c7347",
                "patch_url": "https://git.kernel.org/stable/p/cbf18d8128a753cb632bef39470d19befd9c7347",
                "filename": "CVE-2024-39506-cbf18d8128a753cb632bef39470d19befd9c7347.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39506/CVE-2024-39506-cbf18d8128a753cb632bef39470d19befd9c7347.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dcc7440f32c7a26b067aff6e7d931ec593024a79",
                "patch_url": "https://git.kernel.org/stable/p/dcc7440f32c7a26b067aff6e7d931ec593024a79",
                "filename": "CVE-2024-39506-dcc7440f32c7a26b067aff6e7d931ec593024a79.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39506/CVE-2024-39506-dcc7440f32c7a26b067aff6e7d931ec593024a79.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f1ab15a09492a5ae8ab1e2c35ba2cf9e150d25ee",
                "patch_url": "https://git.kernel.org/stable/p/f1ab15a09492a5ae8ab1e2c35ba2cf9e150d25ee",
                "filename": "CVE-2024-39506-f1ab15a09492a5ae8ab1e2c35ba2cf9e150d25ee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39506/CVE-2024-39506-f1ab15a09492a5ae8ab1e2c35ba2cf9e150d25ee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fd2b613bc4c508e55c1221c6595bb889812a4fea",
                "patch_url": "https://git.kernel.org/stable/p/fd2b613bc4c508e55c1221c6595bb889812a4fea",
                "filename": "CVE-2024-39506-fd2b613bc4c508e55c1221c6595bb889812a4fea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-39506/CVE-2024-39506-fd2b613bc4c508e55c1221c6595bb889812a4fea.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/87d6bdc006f0cbf297a3b2ad6e40ede4c3ee5dc2",
            "https://git.kernel.org/stable/c/a6f4d0ec170a46b5f453cacf55dff5989b42bbfa",
            "https://git.kernel.org/stable/c/a86490a3712cc513113440a606a0e77130abd47c",
            "https://git.kernel.org/stable/c/c44711b78608c98a3e6b49ce91678cd0917d5349",
            "https://git.kernel.org/stable/c/cbf18d8128a753cb632bef39470d19befd9c7347",
            "https://git.kernel.org/stable/c/dcc7440f32c7a26b067aff6e7d931ec593024a79",
            "https://git.kernel.org/stable/c/f1ab15a09492a5ae8ab1e2c35ba2cf9e150d25ee",
            "https://git.kernel.org/stable/c/fd2b613bc4c508e55c1221c6595bb889812a4fea",
            "https://www.cve.org/CVERecord?id=CVE-2024-39506\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-39506\nhttps://lore.kernel.org/linux-cve-announce/2024071205-CVE-2024-39506-b0cc@gregkh/T"
        ]
    },
    "CVE-2024-40901": {
        "cve": "CVE-2024-40901",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory\n\nThere is a potential out-of-bounds access when using test_bit() on a single\nword. The test_bit() and set_bit() functions operate on long values, and\nwhen testing or setting a single word, they can exceed the word\nboundary. KASAN detects this issue and produces a dump:\n\n\t BUG: KASAN: slab-out-of-bounds in _scsih_add_device.constprop.0 (./arch/x86/include/asm/bitops.h:60 ./include/asm-generic/bitops/instrumented-atomic.h:29 drivers/scsi/mpt3sas/mpt3sas_scsih.c:7331) mpt3sas\n\n\t Write of size 8 at addr ffff8881d26e3c60 by task kworker/u1536:2/2965\n\nFor full log, please look at [1].\n\nMake the allocation at least the size of sizeof(unsigned long) so that\nset_bit() and test_bit() have sufficient room for read/write operations\nwithout overwriting unallocated memory.\n\n[1] Link: https://lore.kernel.org/all/ZkNcALr3W3KGYYJG@gmail.com/",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40901",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/521f333e644c4246ca04a4fc4772edc53dd2a801",
            "patch_url": "https://git.kernel.org/stable/p/521f333e644c4246ca04a4fc4772edc53dd2a801",
            "filename": "CVE-2024-40901-521f333e644c4246ca04a4fc4772edc53dd2a801.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40901/CVE-2024-40901-521f333e644c4246ca04a4fc4772edc53dd2a801.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0081d2b3ae0a17a86b8cc0fa3c8bdc54e233ba16",
                "patch_url": "https://git.kernel.org/stable/p/0081d2b3ae0a17a86b8cc0fa3c8bdc54e233ba16",
                "filename": "CVE-2024-40901-0081d2b3ae0a17a86b8cc0fa3c8bdc54e233ba16.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40901/CVE-2024-40901-0081d2b3ae0a17a86b8cc0fa3c8bdc54e233ba16.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/18abb5db0aa9b2d48f7037a88b41af2eef821674",
                "patch_url": "https://git.kernel.org/stable/p/18abb5db0aa9b2d48f7037a88b41af2eef821674",
                "filename": "CVE-2024-40901-18abb5db0aa9b2d48f7037a88b41af2eef821674.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40901/CVE-2024-40901-18abb5db0aa9b2d48f7037a88b41af2eef821674.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/19649e49a6df07cd2e03e0a11396fd3a99485ec2",
                "patch_url": "https://git.kernel.org/stable/p/19649e49a6df07cd2e03e0a11396fd3a99485ec2",
                "filename": "CVE-2024-40901-19649e49a6df07cd2e03e0a11396fd3a99485ec2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40901/CVE-2024-40901-19649e49a6df07cd2e03e0a11396fd3a99485ec2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4254dfeda82f20844299dca6c38cbffcfd499f41",
                "patch_url": "https://git.kernel.org/stable/p/4254dfeda82f20844299dca6c38cbffcfd499f41",
                "filename": "CVE-2024-40901-4254dfeda82f20844299dca6c38cbffcfd499f41.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40901/CVE-2024-40901-4254dfeda82f20844299dca6c38cbffcfd499f41.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/46bab2bcd771e725ff5ca3a68ba68cfeac45676c",
                "patch_url": "https://git.kernel.org/stable/p/46bab2bcd771e725ff5ca3a68ba68cfeac45676c",
                "filename": "CVE-2024-40901-46bab2bcd771e725ff5ca3a68ba68cfeac45676c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40901/CVE-2024-40901-46bab2bcd771e725ff5ca3a68ba68cfeac45676c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/521f333e644c4246ca04a4fc4772edc53dd2a801",
                "patch_url": "https://git.kernel.org/stable/p/521f333e644c4246ca04a4fc4772edc53dd2a801",
                "filename": "CVE-2024-40901-521f333e644c4246ca04a4fc4772edc53dd2a801.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40901/CVE-2024-40901-521f333e644c4246ca04a4fc4772edc53dd2a801.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9079338c5a0d1f1fee34fb1c9e99b754efe414c5",
                "patch_url": "https://git.kernel.org/stable/p/9079338c5a0d1f1fee34fb1c9e99b754efe414c5",
                "filename": "CVE-2024-40901-9079338c5a0d1f1fee34fb1c9e99b754efe414c5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40901/CVE-2024-40901-9079338c5a0d1f1fee34fb1c9e99b754efe414c5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e9bce7c751f6d6c7be88c0bc081a66aaf61a23ee",
                "patch_url": "https://git.kernel.org/stable/p/e9bce7c751f6d6c7be88c0bc081a66aaf61a23ee",
                "filename": "CVE-2024-40901-e9bce7c751f6d6c7be88c0bc081a66aaf61a23ee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40901/CVE-2024-40901-e9bce7c751f6d6c7be88c0bc081a66aaf61a23ee.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0081d2b3ae0a17a86b8cc0fa3c8bdc54e233ba16",
            "https://git.kernel.org/stable/c/18abb5db0aa9b2d48f7037a88b41af2eef821674",
            "https://git.kernel.org/stable/c/19649e49a6df07cd2e03e0a11396fd3a99485ec2",
            "https://git.kernel.org/stable/c/4254dfeda82f20844299dca6c38cbffcfd499f41",
            "https://git.kernel.org/stable/c/46bab2bcd771e725ff5ca3a68ba68cfeac45676c",
            "https://git.kernel.org/stable/c/521f333e644c4246ca04a4fc4772edc53dd2a801",
            "https://git.kernel.org/stable/c/9079338c5a0d1f1fee34fb1c9e99b754efe414c5",
            "https://git.kernel.org/stable/c/e9bce7c751f6d6c7be88c0bc081a66aaf61a23ee",
            "https://lore.kernel.org/all/",
            "https://www.cve.org/CVERecord?id=CVE-2024-40901\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40901\nhttps://lore.kernel.org/linux-cve-announce/2024071207-CVE-2024-40901-05c4@gregkh/T"
        ]
    },
    "CVE-2024-40904": {
        "cve": "CVE-2024-40904",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages\n\nThe syzbot fuzzer found that the interrupt-URB completion callback in\nthe cdc-wdm driver was taking too long, and the driver's immediate\nresubmission of interrupt URBs with -EPROTO status combined with the\ndummy-hcd emulation to cause a CPU lockup:\n\ncdc_wdm 1-1:1.0: nonzero urb status received: -71\ncdc_wdm 1-1:1.0: wdm_int_callback - 0 bytes\nwatchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz-executor782:6625]\nCPU#0 Utilization every 4s during lockup:\n\t#1:  98% system,\t  0% softirq,\t  3% hardirq,\t  0% idle\n\t#2:  98% system,\t  0% softirq,\t  3% hardirq,\t  0% idle\n\t#3:  98% system,\t  0% softirq,\t  3% hardirq,\t  0% idle\n\t#4:  98% system,\t  0% softirq,\t  3% hardirq,\t  0% idle\n\t#5:  98% system,\t  1% softirq,\t  3% hardirq,\t  0% idle\nModules linked in:\nirq event stamp: 73096\nhardirqs last  enabled at (73095): [<ffff80008037bc00>] console_emit_next_record kernel/printk/printk.c:2935 [inline]\nhardirqs last  enabled at (73095): [<ffff80008037bc00>] console_flush_all+0x650/0xb74 kernel/printk/printk.c:2994\nhardirqs last disabled at (73096): [<ffff80008af10b00>] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]\nhardirqs last disabled at (73096): [<ffff80008af10b00>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551\nsoftirqs last  enabled at (73048): [<ffff8000801ea530>] softirq_handle_end kernel/softirq.c:400 [inline]\nsoftirqs last  enabled at (73048): [<ffff8000801ea530>] handle_softirqs+0xa60/0xc34 kernel/softirq.c:582\nsoftirqs last disabled at (73043): [<ffff800080020de8>] __do_softirq+0x14/0x20 kernel/softirq.c:588\nCPU: 0 PID: 6625 Comm: syz-executor782 Tainted: G        W          6.10.0-rc2-syzkaller-g8867bbd4a056 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\n\nTesting showed that the problem did not occur if the two error\nmessages -- the first two lines above -- were removed; apparently adding\nmaterial to the kernel log takes a surprisingly large amount of time.\n\nIn any case, the best approach for preventing these lockups and to\navoid spamming the log with thousands of error messages per second is\nto ratelimit the two dev_err() calls.  Therefore we replace them with\ndev_err_ratelimited().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40904",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/05b2cd6d33f700597e6f081b53c668a226a96d28",
            "patch_url": "https://git.kernel.org/stable/p/05b2cd6d33f700597e6f081b53c668a226a96d28",
            "filename": "CVE-2024-40904-05b2cd6d33f700597e6f081b53c668a226a96d28.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40904/CVE-2024-40904-05b2cd6d33f700597e6f081b53c668a226a96d28.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/02a4c0499fc3a02e992b4c69a9809912af372d94",
                "patch_url": "https://git.kernel.org/stable/p/02a4c0499fc3a02e992b4c69a9809912af372d94",
                "filename": "CVE-2024-40904-02a4c0499fc3a02e992b4c69a9809912af372d94.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40904/CVE-2024-40904-02a4c0499fc3a02e992b4c69a9809912af372d94.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/05b2cd6d33f700597e6f081b53c668a226a96d28",
                "patch_url": "https://git.kernel.org/stable/p/05b2cd6d33f700597e6f081b53c668a226a96d28",
                "filename": "CVE-2024-40904-05b2cd6d33f700597e6f081b53c668a226a96d28.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40904/CVE-2024-40904-05b2cd6d33f700597e6f081b53c668a226a96d28.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/217d1f44fff560b3995a685a60aa66e55a7f0f56",
                "patch_url": "https://git.kernel.org/stable/p/217d1f44fff560b3995a685a60aa66e55a7f0f56",
                "filename": "CVE-2024-40904-217d1f44fff560b3995a685a60aa66e55a7f0f56.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40904/CVE-2024-40904-217d1f44fff560b3995a685a60aa66e55a7f0f56.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/22f00812862564b314784167a89f27b444f82a46",
                "patch_url": "https://git.kernel.org/stable/p/22f00812862564b314784167a89f27b444f82a46",
                "filename": "CVE-2024-40904-22f00812862564b314784167a89f27b444f82a46.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40904/CVE-2024-40904-22f00812862564b314784167a89f27b444f82a46.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/53250b54c92fe087fd4b0c48f85529efe1ebd879",
                "patch_url": "https://git.kernel.org/stable/p/53250b54c92fe087fd4b0c48f85529efe1ebd879",
                "filename": "CVE-2024-40904-53250b54c92fe087fd4b0c48f85529efe1ebd879.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40904/CVE-2024-40904-53250b54c92fe087fd4b0c48f85529efe1ebd879.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/72a3fe36cf9f0d030865e571f45a40f9c1e07e8a",
                "patch_url": "https://git.kernel.org/stable/p/72a3fe36cf9f0d030865e571f45a40f9c1e07e8a",
                "filename": "CVE-2024-40904-72a3fe36cf9f0d030865e571f45a40f9c1e07e8a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40904/CVE-2024-40904-72a3fe36cf9f0d030865e571f45a40f9c1e07e8a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/82075aff7ffccb1e72b0ac8aa349e473624d857c",
                "patch_url": "https://git.kernel.org/stable/p/82075aff7ffccb1e72b0ac8aa349e473624d857c",
                "filename": "CVE-2024-40904-82075aff7ffccb1e72b0ac8aa349e473624d857c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40904/CVE-2024-40904-82075aff7ffccb1e72b0ac8aa349e473624d857c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c0747d76eb05542b5d49f67069b64ef5ff732c6c",
                "patch_url": "https://git.kernel.org/stable/p/c0747d76eb05542b5d49f67069b64ef5ff732c6c",
                "filename": "CVE-2024-40904-c0747d76eb05542b5d49f67069b64ef5ff732c6c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40904/CVE-2024-40904-c0747d76eb05542b5d49f67069b64ef5ff732c6c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/02a4c0499fc3a02e992b4c69a9809912af372d94",
            "https://git.kernel.org/stable/c/05b2cd6d33f700597e6f081b53c668a226a96d28",
            "https://git.kernel.org/stable/c/217d1f44fff560b3995a685a60aa66e55a7f0f56",
            "https://git.kernel.org/stable/c/22f00812862564b314784167a89f27b444f82a46",
            "https://git.kernel.org/stable/c/53250b54c92fe087fd4b0c48f85529efe1ebd879",
            "https://git.kernel.org/stable/c/72a3fe36cf9f0d030865e571f45a40f9c1e07e8a",
            "https://git.kernel.org/stable/c/82075aff7ffccb1e72b0ac8aa349e473624d857c",
            "https://git.kernel.org/stable/c/c0747d76eb05542b5d49f67069b64ef5ff732c6c",
            "https://www.cve.org/CVERecord?id=CVE-2024-40904\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40904\nhttps://lore.kernel.org/linux-cve-announce/2024071208-CVE-2024-40904-48b1@gregkh/T"
        ]
    },
    "CVE-2024-40906": {
        "cve": "CVE-2024-40906",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Always stop health timer during driver removal\n\nCurrently, if teardown_hca fails to execute during driver removal, mlx5\ndoes not stop the health timer. Afterwards, mlx5 continue with driver\nteardown. This may lead to a UAF bug, which results in page fault\nOops[1], since the health timer invokes after resources were freed.\n\nHence, stop the health monitor even if teardown_hca fails.\n\n[1]\nmlx5_core 0000:18:00.0: E-Switch: Unload vfs: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)\nmlx5_core 0000:18:00.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)\nmlx5_core 0000:18:00.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)\nmlx5_core 0000:18:00.0: E-Switch: cleanup\nmlx5_core 0000:18:00.0: wait_func:1155:(pid 1967079): TEARDOWN_HCA(0x103) timeout. Will cause a leak of a command resource\nmlx5_core 0000:18:00.0: mlx5_function_close:1288:(pid 1967079): tear_down_hca failed, skip cleanup\nBUG: unable to handle page fault for address: ffffa26487064230\nPGD 100c00067 P4D 100c00067 PUD 100e5a067 PMD 105ed7067 PTE 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 0 PID: 0 Comm: swapper/0 Tainted: G           OE     -------  ---  6.7.0-68.fc38.x86_64 #1\nHardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0013.121520200651 12/15/2020\nRIP: 0010:ioread32be+0x34/0x60\nRSP: 0018:ffffa26480003e58 EFLAGS: 00010292\nRAX: ffffa26487064200 RBX: ffff9042d08161a0 RCX: ffff904c108222c0\nRDX: 000000010bbf1b80 RSI: ffffffffc055ddb0 RDI: ffffa26487064230\nRBP: ffff9042d08161a0 R08: 0000000000000022 R09: ffff904c108222e8\nR10: 0000000000000004 R11: 0000000000000441 R12: ffffffffc055ddb0\nR13: ffffa26487064200 R14: ffffa26480003f00 R15: ffff904c108222c0\nFS:  0000000000000000(0000) GS:ffff904c10800000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffa26487064230 CR3: 00000002c4420006 CR4: 00000000007706f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n <IRQ>\n ? __die+0x23/0x70\n ? page_fault_oops+0x171/0x4e0\n ? exc_page_fault+0x175/0x180\n ? asm_exc_page_fault+0x26/0x30\n ? __pfx_poll_health+0x10/0x10 [mlx5_core]\n ? __pfx_poll_health+0x10/0x10 [mlx5_core]\n ? ioread32be+0x34/0x60\n mlx5_health_check_fatal_sensors+0x20/0x100 [mlx5_core]\n ? __pfx_poll_health+0x10/0x10 [mlx5_core]\n poll_health+0x42/0x230 [mlx5_core]\n ? __next_timer_interrupt+0xbc/0x110\n ? __pfx_poll_health+0x10/0x10 [mlx5_core]\n call_timer_fn+0x21/0x130\n ? __pfx_poll_health+0x10/0x10 [mlx5_core]\n __run_timers+0x222/0x2c0\n run_timer_softirq+0x1d/0x40\n __do_softirq+0xc9/0x2c8\n __irq_exit_rcu+0xa6/0xc0\n sysvec_apic_timer_interrupt+0x72/0x90\n </IRQ>\n <TASK>\n asm_sysvec_apic_timer_interrupt+0x1a/0x20\nRIP: 0010:cpuidle_enter_state+0xcc/0x440\n ? cpuidle_enter_state+0xbd/0x440\n cpuidle_enter+0x2d/0x40\n do_idle+0x20d/0x270\n cpu_startup_entry+0x2a/0x30\n rest_init+0xd0/0xd0\n arch_call_rest_init+0xe/0x30\n start_kernel+0x709/0xa90\n x86_64_start_reservations+0x18/0x30\n x86_64_start_kernel+0x96/0xa0\n secondary_startup_64_no_verify+0x18f/0x19b\n---[ end trace 0000000000000000 ]---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40906",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6ccada6ffb42e0ac75e3db06d41baf5a7f483f8a",
            "patch_url": "https://git.kernel.org/stable/p/6ccada6ffb42e0ac75e3db06d41baf5a7f483f8a",
            "filename": "CVE-2024-40906-6ccada6ffb42e0ac75e3db06d41baf5a7f483f8a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40906/CVE-2024-40906-6ccada6ffb42e0ac75e3db06d41baf5a7f483f8a.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/6ccada6ffb42e0ac75e3db06d41baf5a7f483f8a",
                "patch_url": "https://git.kernel.org/stable/p/6ccada6ffb42e0ac75e3db06d41baf5a7f483f8a",
                "filename": "CVE-2024-40906-6ccada6ffb42e0ac75e3db06d41baf5a7f483f8a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40906/CVE-2024-40906-6ccada6ffb42e0ac75e3db06d41baf5a7f483f8a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c8b3f38d2dae0397944814d691a419c451f9906f",
                "patch_url": "https://git.kernel.org/stable/p/c8b3f38d2dae0397944814d691a419c451f9906f",
                "filename": "CVE-2024-40906-c8b3f38d2dae0397944814d691a419c451f9906f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40906/CVE-2024-40906-c8b3f38d2dae0397944814d691a419c451f9906f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e6777ae0bf6fd5bc626bb051c8c93e3c8198a3f8",
                "patch_url": "https://git.kernel.org/stable/p/e6777ae0bf6fd5bc626bb051c8c93e3c8198a3f8",
                "filename": "CVE-2024-40906-e6777ae0bf6fd5bc626bb051c8c93e3c8198a3f8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40906/CVE-2024-40906-e6777ae0bf6fd5bc626bb051c8c93e3c8198a3f8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e7d4485d47839f4d1284592ae242c4e65b2810a9",
                "patch_url": "https://git.kernel.org/stable/p/e7d4485d47839f4d1284592ae242c4e65b2810a9",
                "filename": "CVE-2024-40906-e7d4485d47839f4d1284592ae242c4e65b2810a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40906/CVE-2024-40906-e7d4485d47839f4d1284592ae242c4e65b2810a9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/6ccada6ffb42e0ac75e3db06d41baf5a7f483f8a",
            "https://git.kernel.org/stable/c/c8b3f38d2dae0397944814d691a419c451f9906f",
            "https://git.kernel.org/stable/c/e6777ae0bf6fd5bc626bb051c8c93e3c8198a3f8",
            "https://git.kernel.org/stable/c/e7d4485d47839f4d1284592ae242c4e65b2810a9",
            "https://www.cve.org/CVERecord?id=CVE-2024-40906\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40906\nhttps://lore.kernel.org/linux-cve-announce/2024071209-CVE-2024-40906-b9e3@gregkh/T"
        ]
    },
    "CVE-2024-40911": {
        "cve": "CVE-2024-40911",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: Lock wiphy in cfg80211_get_station\n\nWiphy should be locked before calling rdev_get_station() (see lockdep\nassert in ieee80211_get_station()).\n\nThis fixes the following kernel NULL dereference:\n\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050\n Mem abort info:\n   ESR = 0x0000000096000006\n   EC = 0x25: DABT (current EL), IL = 32 bits\n   SET = 0, FnV = 0\n   EA = 0, S1PTW = 0\n   FSC = 0x06: level 2 translation fault\n Data abort info:\n   ISV = 0, ISS = 0x00000006\n   CM = 0, WnR = 0\n user pgtable: 4k pages, 48-bit VAs, pgdp=0000000003001000\n [0000000000000050] pgd=0800000002dca003, p4d=0800000002dca003, pud=08000000028e9003, pmd=0000000000000000\n Internal error: Oops: 0000000096000006 [#1] SMP\n Modules linked in: netconsole dwc3_meson_g12a dwc3_of_simple dwc3 ip_gre gre ath10k_pci ath10k_core ath9k ath9k_common ath9k_hw ath\n CPU: 0 PID: 1091 Comm: kworker/u8:0 Not tainted 6.4.0-02144-g565f9a3a7911-dirty #705\n Hardware name: RPT (r1) (DT)\n Workqueue: bat_events batadv_v_elp_throughput_metric_update\n pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : ath10k_sta_statistics+0x10/0x2dc [ath10k_core]\n lr : sta_set_sinfo+0xcc/0xbd4\n sp : ffff000007b43ad0\n x29: ffff000007b43ad0 x28: ffff0000071fa900 x27: ffff00000294ca98\n x26: ffff000006830880 x25: ffff000006830880 x24: ffff00000294c000\n x23: 0000000000000001 x22: ffff000007b43c90 x21: ffff800008898acc\n x20: ffff00000294c6e8 x19: ffff000007b43c90 x18: 0000000000000000\n x17: 445946354d552d78 x16: 62661f7200000000 x15: 57464f445946354d\n x14: 0000000000000000 x13: 00000000000000e3 x12: d5f0acbcebea978e\n x11: 00000000000000e3 x10: 000000010048fe41 x9 : 0000000000000000\n x8 : ffff000007b43d90 x7 : 000000007a1e2125 x6 : 0000000000000000\n x5 : ffff0000024e0900 x4 : ffff800000a0250c x3 : ffff000007b43c90\n x2 : ffff00000294ca98 x1 : ffff000006831920 x0 : 0000000000000000\n Call trace:\n  ath10k_sta_statistics+0x10/0x2dc [ath10k_core]\n  sta_set_sinfo+0xcc/0xbd4\n  ieee80211_get_station+0x2c/0x44\n  cfg80211_get_station+0x80/0x154\n  batadv_v_elp_get_throughput+0x138/0x1fc\n  batadv_v_elp_throughput_metric_update+0x1c/0xa4\n  process_one_work+0x1ec/0x414\n  worker_thread+0x70/0x46c\n  kthread+0xdc/0xe0\n  ret_from_fork+0x10/0x20\n Code: a9bb7bfd 910003fd a90153f3 f9411c40 (f9402814)\n\nThis happens because STA has time to disconnect and reconnect before\nbatadv_v_elp_throughput_metric_update() delayed work gets scheduled. In\nthis situation, ath10k_sta_state() can be in the middle of resetting\narsta data when the work queue get chance to be scheduled and ends up\naccessing it. Locking wiphy prevents that.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40911",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6d540b0317901535275020bd4ac44fac6439ca76",
            "patch_url": "https://git.kernel.org/stable/p/6d540b0317901535275020bd4ac44fac6439ca76",
            "filename": "CVE-2024-40911-6d540b0317901535275020bd4ac44fac6439ca76.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40911/CVE-2024-40911-6d540b0317901535275020bd4ac44fac6439ca76.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0ccc63958d8373e15a69f4f8069f3e78f7f3898a",
                "patch_url": "https://git.kernel.org/stable/p/0ccc63958d8373e15a69f4f8069f3e78f7f3898a",
                "filename": "CVE-2024-40911-0ccc63958d8373e15a69f4f8069f3e78f7f3898a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40911/CVE-2024-40911-0ccc63958d8373e15a69f4f8069f3e78f7f3898a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/43e1eefb0b2094e2281150d87d09e8bc872b9fba",
                "patch_url": "https://git.kernel.org/stable/p/43e1eefb0b2094e2281150d87d09e8bc872b9fba",
                "filename": "CVE-2024-40911-43e1eefb0b2094e2281150d87d09e8bc872b9fba.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40911/CVE-2024-40911-43e1eefb0b2094e2281150d87d09e8bc872b9fba.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/642f89daa34567d02f312d03e41523a894906dae",
                "patch_url": "https://git.kernel.org/stable/p/642f89daa34567d02f312d03e41523a894906dae",
                "filename": "CVE-2024-40911-642f89daa34567d02f312d03e41523a894906dae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40911/CVE-2024-40911-642f89daa34567d02f312d03e41523a894906dae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6d540b0317901535275020bd4ac44fac6439ca76",
                "patch_url": "https://git.kernel.org/stable/p/6d540b0317901535275020bd4ac44fac6439ca76",
                "filename": "CVE-2024-40911-6d540b0317901535275020bd4ac44fac6439ca76.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40911/CVE-2024-40911-6d540b0317901535275020bd4ac44fac6439ca76.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dfd84ce41663be9ca3f69bd657c45f49b69344d9",
                "patch_url": "https://git.kernel.org/stable/p/dfd84ce41663be9ca3f69bd657c45f49b69344d9",
                "filename": "CVE-2024-40911-dfd84ce41663be9ca3f69bd657c45f49b69344d9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40911/CVE-2024-40911-dfd84ce41663be9ca3f69bd657c45f49b69344d9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0ccc63958d8373e15a69f4f8069f3e78f7f3898a",
            "https://git.kernel.org/stable/c/43e1eefb0b2094e2281150d87d09e8bc872b9fba",
            "https://git.kernel.org/stable/c/642f89daa34567d02f312d03e41523a894906dae",
            "https://git.kernel.org/stable/c/6d540b0317901535275020bd4ac44fac6439ca76",
            "https://git.kernel.org/stable/c/dfd84ce41663be9ca3f69bd657c45f49b69344d9",
            "https://www.cve.org/CVERecord?id=CVE-2024-40911\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40911\nhttps://lore.kernel.org/linux-cve-announce/2024071210-CVE-2024-40911-2382@gregkh/T"
        ]
    },
    "CVE-2024-40912": {
        "cve": "CVE-2024-40912",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()\n\nThe ieee80211_sta_ps_deliver_wakeup() function takes sta->ps_lock to\nsynchronizes with ieee80211_tx_h_unicast_ps_buf() which is called from\nsoftirq context. However using only spin_lock() to get sta->ps_lock in\nieee80211_sta_ps_deliver_wakeup() does not prevent softirq to execute\non this same CPU, to run ieee80211_tx_h_unicast_ps_buf() and try to\ntake this same lock ending in deadlock. Below is an example of rcu stall\nthat arises in such situation.\n\n rcu: INFO: rcu_sched self-detected stall on CPU\n rcu:    2-....: (42413413 ticks this GP) idle=b154/1/0x4000000000000000 softirq=1763/1765 fqs=21206996\n rcu:    (t=42586894 jiffies g=2057 q=362405 ncpus=4)\n CPU: 2 PID: 719 Comm: wpa_supplicant Tainted: G        W          6.4.0-02158-g1b062f552873 #742\n Hardware name: RPT (r1) (DT)\n pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : queued_spin_lock_slowpath+0x58/0x2d0\n lr : invoke_tx_handlers_early+0x5b4/0x5c0\n sp : ffff00001ef64660\n x29: ffff00001ef64660 x28: ffff000009bc1070 x27: ffff000009bc0ad8\n x26: ffff000009bc0900 x25: ffff00001ef647a8 x24: 0000000000000000\n x23: ffff000009bc0900 x22: ffff000009bc0900 x21: ffff00000ac0e000\n x20: ffff00000a279e00 x19: ffff00001ef646e8 x18: 0000000000000000\n x17: ffff800016468000 x16: ffff00001ef608c0 x15: 0010533c93f64f80\n x14: 0010395c9faa3946 x13: 0000000000000000 x12: 00000000fa83b2da\n x11: 000000012edeceea x10: ffff0000010fbe00 x9 : 0000000000895440\n x8 : 000000000010533c x7 : ffff00000ad8b740 x6 : ffff00000c350880\n x5 : 0000000000000007 x4 : 0000000000000001 x3 : 0000000000000000\n x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff00000ac0e0e8\n Call trace:\n  queued_spin_lock_slowpath+0x58/0x2d0\n  ieee80211_tx+0x80/0x12c\n  ieee80211_tx_pending+0x110/0x278\n  tasklet_action_common.constprop.0+0x10c/0x144\n  tasklet_action+0x20/0x28\n  _stext+0x11c/0x284\n  ____do_softirq+0xc/0x14\n  call_on_irq_stack+0x24/0x34\n  do_softirq_own_stack+0x18/0x20\n  do_softirq+0x74/0x7c\n  __local_bh_enable_ip+0xa0/0xa4\n  _ieee80211_wake_txqs+0x3b0/0x4b8\n  __ieee80211_wake_queue+0x12c/0x168\n  ieee80211_add_pending_skbs+0xec/0x138\n  ieee80211_sta_ps_deliver_wakeup+0x2a4/0x480\n  ieee80211_mps_sta_status_update.part.0+0xd8/0x11c\n  ieee80211_mps_sta_status_update+0x18/0x24\n  sta_apply_parameters+0x3bc/0x4c0\n  ieee80211_change_station+0x1b8/0x2dc\n  nl80211_set_station+0x444/0x49c\n  genl_family_rcv_msg_doit.isra.0+0xa4/0xfc\n  genl_rcv_msg+0x1b0/0x244\n  netlink_rcv_skb+0x38/0x10c\n  genl_rcv+0x34/0x48\n  netlink_unicast+0x254/0x2bc\n  netlink_sendmsg+0x190/0x3b4\n  ____sys_sendmsg+0x1e8/0x218\n  ___sys_sendmsg+0x68/0x8c\n  __sys_sendmsg+0x44/0x84\n  __arm64_sys_sendmsg+0x20/0x28\n  do_el0_svc+0x6c/0xe8\n  el0_svc+0x14/0x48\n  el0t_64_sync_handler+0xb0/0xb4\n  el0t_64_sync+0x14c/0x150\n\nUsing spin_lock_bh()/spin_unlock_bh() instead prevents softirq to raise\non the same CPU that is holding the lock.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40912",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9c49b58b9a2bed707e7638576e54c4bccd97b9eb",
            "patch_url": "https://git.kernel.org/stable/p/9c49b58b9a2bed707e7638576e54c4bccd97b9eb",
            "filename": "CVE-2024-40912-9c49b58b9a2bed707e7638576e54c4bccd97b9eb.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40912/CVE-2024-40912-9c49b58b9a2bed707e7638576e54c4bccd97b9eb.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/28ba44d680a30c51cf485a2f5a3b680e66ed3932",
                "patch_url": "https://git.kernel.org/stable/p/28ba44d680a30c51cf485a2f5a3b680e66ed3932",
                "filename": "CVE-2024-40912-28ba44d680a30c51cf485a2f5a3b680e66ed3932.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40912/CVE-2024-40912-28ba44d680a30c51cf485a2f5a3b680e66ed3932.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/44c06bbde6443de206b30f513100b5670b23fc5e",
                "patch_url": "https://git.kernel.org/stable/p/44c06bbde6443de206b30f513100b5670b23fc5e",
                "filename": "CVE-2024-40912-44c06bbde6443de206b30f513100b5670b23fc5e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40912/CVE-2024-40912-44c06bbde6443de206b30f513100b5670b23fc5e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/456bbb8a31e425177dc0e8d4f98728a560c20e81",
                "patch_url": "https://git.kernel.org/stable/p/456bbb8a31e425177dc0e8d4f98728a560c20e81",
                "filename": "CVE-2024-40912-456bbb8a31e425177dc0e8d4f98728a560c20e81.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40912/CVE-2024-40912-456bbb8a31e425177dc0e8d4f98728a560c20e81.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/47d176755d5c0baf284eff039560f8c1ba0ea485",
                "patch_url": "https://git.kernel.org/stable/p/47d176755d5c0baf284eff039560f8c1ba0ea485",
                "filename": "CVE-2024-40912-47d176755d5c0baf284eff039560f8c1ba0ea485.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40912/CVE-2024-40912-47d176755d5c0baf284eff039560f8c1ba0ea485.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9c49b58b9a2bed707e7638576e54c4bccd97b9eb",
                "patch_url": "https://git.kernel.org/stable/p/9c49b58b9a2bed707e7638576e54c4bccd97b9eb",
                "filename": "CVE-2024-40912-9c49b58b9a2bed707e7638576e54c4bccd97b9eb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40912/CVE-2024-40912-9c49b58b9a2bed707e7638576e54c4bccd97b9eb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d90bdff79f8e40adf889b5408bfcf521528b169f",
                "patch_url": "https://git.kernel.org/stable/p/d90bdff79f8e40adf889b5408bfcf521528b169f",
                "filename": "CVE-2024-40912-d90bdff79f8e40adf889b5408bfcf521528b169f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40912/CVE-2024-40912-d90bdff79f8e40adf889b5408bfcf521528b169f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e51637e0c66a6f72d134d9f95daa47ea62b43c7e",
                "patch_url": "https://git.kernel.org/stable/p/e51637e0c66a6f72d134d9f95daa47ea62b43c7e",
                "filename": "CVE-2024-40912-e51637e0c66a6f72d134d9f95daa47ea62b43c7e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40912/CVE-2024-40912-e51637e0c66a6f72d134d9f95daa47ea62b43c7e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e7e916d693dcb5a297f40312600a82475f2e63bc",
                "patch_url": "https://git.kernel.org/stable/p/e7e916d693dcb5a297f40312600a82475f2e63bc",
                "filename": "CVE-2024-40912-e7e916d693dcb5a297f40312600a82475f2e63bc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40912/CVE-2024-40912-e7e916d693dcb5a297f40312600a82475f2e63bc.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/28ba44d680a30c51cf485a2f5a3b680e66ed3932",
            "https://git.kernel.org/stable/c/44c06bbde6443de206b30f513100b5670b23fc5e",
            "https://git.kernel.org/stable/c/456bbb8a31e425177dc0e8d4f98728a560c20e81",
            "https://git.kernel.org/stable/c/47d176755d5c0baf284eff039560f8c1ba0ea485",
            "https://git.kernel.org/stable/c/9c49b58b9a2bed707e7638576e54c4bccd97b9eb",
            "https://git.kernel.org/stable/c/d90bdff79f8e40adf889b5408bfcf521528b169f",
            "https://git.kernel.org/stable/c/e51637e0c66a6f72d134d9f95daa47ea62b43c7e",
            "https://git.kernel.org/stable/c/e7e916d693dcb5a297f40312600a82475f2e63bc",
            "https://www.cve.org/CVERecord?id=CVE-2024-40912\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40912\nhttps://lore.kernel.org/linux-cve-announce/2024071210-CVE-2024-40912-7286@gregkh/T"
        ]
    },
    "CVE-2024-40920": {
        "cve": "CVE-2024-40920",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: mst: fix suspicious rcu usage in br_mst_set_state\n\nI converted br_mst_set_state to RCU to avoid a vlan use-after-free\nbut forgot to change the vlan group dereference helper. Switch to vlan\ngroup RCU deref helper to fix the suspicious rcu usage warning.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40920",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/406bfc04b01ee47e4c626f77ecc7d9f85135b166",
            "patch_url": "https://git.kernel.org/stable/p/406bfc04b01ee47e4c626f77ecc7d9f85135b166",
            "filename": "CVE-2024-40920-406bfc04b01ee47e4c626f77ecc7d9f85135b166.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40920/CVE-2024-40920-406bfc04b01ee47e4c626f77ecc7d9f85135b166.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/406bfc04b01ee47e4c626f77ecc7d9f85135b166",
                "patch_url": "https://git.kernel.org/stable/p/406bfc04b01ee47e4c626f77ecc7d9f85135b166",
                "filename": "CVE-2024-40920-406bfc04b01ee47e4c626f77ecc7d9f85135b166.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40920/CVE-2024-40920-406bfc04b01ee47e4c626f77ecc7d9f85135b166.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/546ceb1dfdac866648ec959cbc71d9525bd73462",
                "patch_url": "https://git.kernel.org/stable/p/546ceb1dfdac866648ec959cbc71d9525bd73462",
                "filename": "CVE-2024-40920-546ceb1dfdac866648ec959cbc71d9525bd73462.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40920/CVE-2024-40920-546ceb1dfdac866648ec959cbc71d9525bd73462.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7caefa2771722e65496d85b62e1dc4442b7d1345",
                "patch_url": "https://git.kernel.org/stable/p/7caefa2771722e65496d85b62e1dc4442b7d1345",
                "filename": "CVE-2024-40920-7caefa2771722e65496d85b62e1dc4442b7d1345.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40920/CVE-2024-40920-7caefa2771722e65496d85b62e1dc4442b7d1345.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/caaa2129784a04dcade0ea92c12e6ff90bbd23d8",
                "patch_url": "https://git.kernel.org/stable/p/caaa2129784a04dcade0ea92c12e6ff90bbd23d8",
                "filename": "CVE-2024-40920-caaa2129784a04dcade0ea92c12e6ff90bbd23d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40920/CVE-2024-40920-caaa2129784a04dcade0ea92c12e6ff90bbd23d8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/406bfc04b01ee47e4c626f77ecc7d9f85135b166",
            "https://git.kernel.org/stable/c/546ceb1dfdac866648ec959cbc71d9525bd73462",
            "https://git.kernel.org/stable/c/7caefa2771722e65496d85b62e1dc4442b7d1345",
            "https://git.kernel.org/stable/c/caaa2129784a04dcade0ea92c12e6ff90bbd23d8",
            "https://www.cve.org/CVERecord?id=CVE-2024-40920\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40920\nhttps://lore.kernel.org/linux-cve-announce/2024071212-CVE-2024-40920-c766@gregkh/T"
        ]
    },
    "CVE-2024-40921": {
        "cve": "CVE-2024-40921",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: mst: pass vlan group directly to br_mst_vlan_set_state\n\nPass the already obtained vlan group pointer to br_mst_vlan_set_state()\ninstead of dereferencing it again. Each caller has already correctly\ndereferenced it for their context. This change is required for the\nfollowing suspicious RCU dereference fix. No functional changes\nintended.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40921",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/09f4337c27f5bdeb8646a6db91488cc2f7d537ff",
            "patch_url": "https://git.kernel.org/stable/p/09f4337c27f5bdeb8646a6db91488cc2f7d537ff",
            "filename": "CVE-2024-40921-09f4337c27f5bdeb8646a6db91488cc2f7d537ff.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40921/CVE-2024-40921-09f4337c27f5bdeb8646a6db91488cc2f7d537ff.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/09f4337c27f5bdeb8646a6db91488cc2f7d537ff",
                "patch_url": "https://git.kernel.org/stable/p/09f4337c27f5bdeb8646a6db91488cc2f7d537ff",
                "filename": "CVE-2024-40921-09f4337c27f5bdeb8646a6db91488cc2f7d537ff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40921/CVE-2024-40921-09f4337c27f5bdeb8646a6db91488cc2f7d537ff.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/36c92936e868601fa1f43da6758cf55805043509",
                "patch_url": "https://git.kernel.org/stable/p/36c92936e868601fa1f43da6758cf55805043509",
                "filename": "CVE-2024-40921-36c92936e868601fa1f43da6758cf55805043509.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40921/CVE-2024-40921-36c92936e868601fa1f43da6758cf55805043509.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a6cc9e9a651b9861efa068c164ee62dfba68c6ca",
                "patch_url": "https://git.kernel.org/stable/p/a6cc9e9a651b9861efa068c164ee62dfba68c6ca",
                "filename": "CVE-2024-40921-a6cc9e9a651b9861efa068c164ee62dfba68c6ca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40921/CVE-2024-40921-a6cc9e9a651b9861efa068c164ee62dfba68c6ca.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d2dc02775fc0c4eacaee833a0637e5958884a8e5",
                "patch_url": "https://git.kernel.org/stable/p/d2dc02775fc0c4eacaee833a0637e5958884a8e5",
                "filename": "CVE-2024-40921-d2dc02775fc0c4eacaee833a0637e5958884a8e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40921/CVE-2024-40921-d2dc02775fc0c4eacaee833a0637e5958884a8e5.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/09f4337c27f5bdeb8646a6db91488cc2f7d537ff",
            "https://git.kernel.org/stable/c/36c92936e868601fa1f43da6758cf55805043509",
            "https://git.kernel.org/stable/c/a6cc9e9a651b9861efa068c164ee62dfba68c6ca",
            "https://git.kernel.org/stable/c/d2dc02775fc0c4eacaee833a0637e5958884a8e5",
            "https://www.cve.org/CVERecord?id=CVE-2024-40921\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40921\nhttps://lore.kernel.org/linux-cve-announce/2024071213-CVE-2024-40921-b535@gregkh/T"
        ]
    },
    "CVE-2024-40924": {
        "cve": "CVE-2024-40924",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/dpt: Make DPT object unshrinkable\n\nIn some scenarios, the DPT object gets shrunk but\nthe actual framebuffer did not and thus its still\nthere on the DPT's vm->bound_list. Then it tries to\nrewrite the PTEs via a stale CPU mapping. This causes panic.\n\n[vsyrjala: Add TODO comment]\n(cherry picked from commit 51064d471c53dcc8eddd2333c3f1c1d9131ba36c)",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40924",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/327280149066f0e5f2e50356b5823f76dabfe86e",
            "patch_url": "https://git.kernel.org/stable/p/327280149066f0e5f2e50356b5823f76dabfe86e",
            "filename": "CVE-2024-40924-327280149066f0e5f2e50356b5823f76dabfe86e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40924/CVE-2024-40924-327280149066f0e5f2e50356b5823f76dabfe86e.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/327280149066f0e5f2e50356b5823f76dabfe86e",
                "patch_url": "https://git.kernel.org/stable/p/327280149066f0e5f2e50356b5823f76dabfe86e",
                "filename": "CVE-2024-40924-327280149066f0e5f2e50356b5823f76dabfe86e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40924/CVE-2024-40924-327280149066f0e5f2e50356b5823f76dabfe86e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/43e2b37e2ab660c3565d4cff27922bc70e79c3f1",
                "patch_url": "https://git.kernel.org/stable/p/43e2b37e2ab660c3565d4cff27922bc70e79c3f1",
                "filename": "CVE-2024-40924-43e2b37e2ab660c3565d4cff27922bc70e79c3f1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40924/CVE-2024-40924-43e2b37e2ab660c3565d4cff27922bc70e79c3f1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7a9883be3b98673333eec65c4a21cc18e60292eb",
                "patch_url": "https://git.kernel.org/stable/p/7a9883be3b98673333eec65c4a21cc18e60292eb",
                "filename": "CVE-2024-40924-7a9883be3b98673333eec65c4a21cc18e60292eb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40924/CVE-2024-40924-7a9883be3b98673333eec65c4a21cc18e60292eb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a2552020fb714ff357182c3c179abfac2289f84d",
                "patch_url": "https://git.kernel.org/stable/p/a2552020fb714ff357182c3c179abfac2289f84d",
                "filename": "CVE-2024-40924-a2552020fb714ff357182c3c179abfac2289f84d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40924/CVE-2024-40924-a2552020fb714ff357182c3c179abfac2289f84d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/327280149066f0e5f2e50356b5823f76dabfe86e",
            "https://git.kernel.org/stable/c/43e2b37e2ab660c3565d4cff27922bc70e79c3f1",
            "https://git.kernel.org/stable/c/7a9883be3b98673333eec65c4a21cc18e60292eb",
            "https://git.kernel.org/stable/c/a2552020fb714ff357182c3c179abfac2289f84d",
            "https://www.cve.org/CVERecord?id=CVE-2024-40924\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40924\nhttps://lore.kernel.org/linux-cve-announce/2024071213-CVE-2024-40924-9b9b@gregkh/T"
        ]
    },
    "CVE-2024-40927": {
        "cve": "CVE-2024-40927",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nxhci: Handle TD clearing for multiple streams case\n\nWhen multiple streams are in use, multiple TDs might be in flight when\nan endpoint is stopped. We need to issue a Set TR Dequeue Pointer for\neach, to ensure everything is reset properly and the caches cleared.\nChange the logic so that any N>1 TDs found active for different streams\nare deferred until after the first one is processed, calling\nxhci_invalidate_cancelled_tds() again from xhci_handle_cmd_set_deq() to\nqueue another command until we are done with all of them. Also change\nthe error/\"should never happen\" paths to ensure we at least clear any\naffected TDs, even if we can't issue a command to clear the hardware\ncache, and complain loudly with an xhci_warn() if this ever happens.\n\nThis problem case dates back to commit e9df17eb1408 (\"USB: xhci: Correct\nassumptions about number of rings per endpoint.\") early on in the XHCI\ndriver's life, when stream support was first added.\nIt was then identified but not fixed nor made into a warning in commit\n674f8438c121 (\"xhci: split handling halted endpoints into two steps\"),\nwhich added a FIXME comment for the problem case (without materially\nchanging the behavior as far as I can tell, though the new logic made\nthe problem more obvious).\n\nThen later, in commit 94f339147fc3 (\"xhci: Fix failure to give back some\ncached cancelled URBs.\"), it was acknowledged again.\n\n[Mathias: commit 94f339147fc3 (\"xhci: Fix failure to give back some cached\ncancelled URBs.\") was a targeted regression fix to the previously mentioned\npatch. Users reported issues with usb stuck after unmounting/disconnecting\nUAS devices. This rolled back the TD clearing of multiple streams to its\noriginal state.]\n\nApparently the commit author was aware of the problem (yet still chose\nto submit it): It was still mentioned as a FIXME, an xhci_dbg() was\nadded to log the problem condition, and the remaining issue was mentioned\nin the commit description. The choice of making the log type xhci_dbg()\nfor what is, at this point, a completely unhandled and known broken\ncondition is puzzling and unfortunate, as it guarantees that no actual\nusers would see the log in production, thereby making it nigh\nundebuggable (indeed, even if you turn on DEBUG, the message doesn't\nreally hint at there being a problem at all).\n\nIt took me *months* of random xHC crashes to finally find a reliable\nrepro and be able to do a deep dive debug session, which could all have\nbeen avoided had this unhandled, broken condition been actually reported\nwith a warning, as it should have been as a bug intentionally left in\nunfixed (never mind that it shouldn't have been left in at all).\n\n> Another fix to solve clearing the caches of all stream rings with\n> cancelled TDs is needed, but not as urgent.\n\n3 years after that statement and 14 years after the original bug was\nintroduced, I think it's finally time to fix it. And maybe next time\nlet's not leave bugs unfixed (that are actually worse than the original\nbug), and let's actually get people to review kernel commits please.\n\nFixes xHC crashes and IOMMU faults with UAS devices when handling\nerrors/faults. Easiest repro is to use `hdparm` to mark an early sector\n(e.g. 1024) on a disk as bad, then `cat /dev/sdX > /dev/null` in a loop.\nAt least in the case of JMicron controllers, the read errors end up\nhaving to cancel two TDs (for two queued requests to different streams)\nand the one that didn't get cleared properly ends up faulting the xHC\nentirely when it tries to access DMA pages that have since been unmapped,\nreferred to by the stale TDs. This normally happens quickly (after two\nor three loops). After this fix, I left the `cat` in a loop running\novernight and experienced no xHC failures, with all read errors\nrecovered properly. Repro'd and tested on an Apple M1 Mac Mini\n(dwc3 host).\n\nOn systems without an IOMMU, this bug would instead silently corrupt\nfreed memory, making this a\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40927",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/633f72cb6124ecda97b641fbc119340bd88d51a9",
            "patch_url": "https://git.kernel.org/stable/p/633f72cb6124ecda97b641fbc119340bd88d51a9",
            "filename": "CVE-2024-40927-633f72cb6124ecda97b641fbc119340bd88d51a9.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40927/CVE-2024-40927-633f72cb6124ecda97b641fbc119340bd88d51a9.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/26460c1afa311524f588e288a4941432f0de6228",
                "patch_url": "https://git.kernel.org/stable/p/26460c1afa311524f588e288a4941432f0de6228",
                "filename": "CVE-2024-40927-26460c1afa311524f588e288a4941432f0de6228.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40927/CVE-2024-40927-26460c1afa311524f588e288a4941432f0de6228.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5ceac4402f5d975e5a01c806438eb4e554771577",
                "patch_url": "https://git.kernel.org/stable/p/5ceac4402f5d975e5a01c806438eb4e554771577",
                "filename": "CVE-2024-40927-5ceac4402f5d975e5a01c806438eb4e554771577.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40927/CVE-2024-40927-5ceac4402f5d975e5a01c806438eb4e554771577.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/61593dc413c3655e4328a351555235bc3089486a",
                "patch_url": "https://git.kernel.org/stable/p/61593dc413c3655e4328a351555235bc3089486a",
                "filename": "CVE-2024-40927-61593dc413c3655e4328a351555235bc3089486a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40927/CVE-2024-40927-61593dc413c3655e4328a351555235bc3089486a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/633f72cb6124ecda97b641fbc119340bd88d51a9",
                "patch_url": "https://git.kernel.org/stable/p/633f72cb6124ecda97b641fbc119340bd88d51a9",
                "filename": "CVE-2024-40927-633f72cb6124ecda97b641fbc119340bd88d51a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40927/CVE-2024-40927-633f72cb6124ecda97b641fbc119340bd88d51a9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/949be4ec5835e0ccb3e2a8ab0e46179cb5512518",
                "patch_url": "https://git.kernel.org/stable/p/949be4ec5835e0ccb3e2a8ab0e46179cb5512518",
                "filename": "CVE-2024-40927-949be4ec5835e0ccb3e2a8ab0e46179cb5512518.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40927/CVE-2024-40927-949be4ec5835e0ccb3e2a8ab0e46179cb5512518.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/26460c1afa311524f588e288a4941432f0de6228",
            "https://git.kernel.org/stable/c/5ceac4402f5d975e5a01c806438eb4e554771577",
            "https://git.kernel.org/stable/c/61593dc413c3655e4328a351555235bc3089486a",
            "https://git.kernel.org/stable/c/633f72cb6124ecda97b641fbc119340bd88d51a9",
            "https://git.kernel.org/stable/c/949be4ec5835e0ccb3e2a8ab0e46179cb5512518",
            "https://www.cve.org/CVERecord?id=CVE-2024-40927\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40927\nhttps://lore.kernel.org/linux-cve-announce/2024071214-CVE-2024-40927-3dcb@gregkh/T"
        ]
    },
    "CVE-2024-40929": {
        "cve": "CVE-2024-40929",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: check n_ssids before accessing the ssids\n\nIn some versions of cfg80211, the ssids poinet might be a valid one even\nthough n_ssids is 0. Accessing the pointer in this case will cuase an\nout-of-bound access. Fix this by checking n_ssids first.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40929",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9e719ae3abad60e245ce248ba3f08148f375a614",
            "patch_url": "https://git.kernel.org/stable/p/9e719ae3abad60e245ce248ba3f08148f375a614",
            "filename": "CVE-2024-40929-9e719ae3abad60e245ce248ba3f08148f375a614.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40929/CVE-2024-40929-9e719ae3abad60e245ce248ba3f08148f375a614.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/29a18d56bd64b95bd10bda4afda512558471382a",
                "patch_url": "https://git.kernel.org/stable/p/29a18d56bd64b95bd10bda4afda512558471382a",
                "filename": "CVE-2024-40929-29a18d56bd64b95bd10bda4afda512558471382a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40929/CVE-2024-40929-29a18d56bd64b95bd10bda4afda512558471382a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3c4771091ea8016c8601399078916f722dd8833b",
                "patch_url": "https://git.kernel.org/stable/p/3c4771091ea8016c8601399078916f722dd8833b",
                "filename": "CVE-2024-40929-3c4771091ea8016c8601399078916f722dd8833b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40929/CVE-2024-40929-3c4771091ea8016c8601399078916f722dd8833b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/60d62757df30b74bf397a2847a6db7385c6ee281",
                "patch_url": "https://git.kernel.org/stable/p/60d62757df30b74bf397a2847a6db7385c6ee281",
                "filename": "CVE-2024-40929-60d62757df30b74bf397a2847a6db7385c6ee281.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40929/CVE-2024-40929-60d62757df30b74bf397a2847a6db7385c6ee281.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/62e007bdeb91c6879a4652c3426aef1cd9d2937b",
                "patch_url": "https://git.kernel.org/stable/p/62e007bdeb91c6879a4652c3426aef1cd9d2937b",
                "filename": "CVE-2024-40929-62e007bdeb91c6879a4652c3426aef1cd9d2937b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40929/CVE-2024-40929-62e007bdeb91c6879a4652c3426aef1cd9d2937b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9e719ae3abad60e245ce248ba3f08148f375a614",
                "patch_url": "https://git.kernel.org/stable/p/9e719ae3abad60e245ce248ba3f08148f375a614",
                "filename": "CVE-2024-40929-9e719ae3abad60e245ce248ba3f08148f375a614.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40929/CVE-2024-40929-9e719ae3abad60e245ce248ba3f08148f375a614.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f777792952d03bbaf8329fdfa99393a5a33e2640",
                "patch_url": "https://git.kernel.org/stable/p/f777792952d03bbaf8329fdfa99393a5a33e2640",
                "filename": "CVE-2024-40929-f777792952d03bbaf8329fdfa99393a5a33e2640.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40929/CVE-2024-40929-f777792952d03bbaf8329fdfa99393a5a33e2640.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/29a18d56bd64b95bd10bda4afda512558471382a",
            "https://git.kernel.org/stable/c/3c4771091ea8016c8601399078916f722dd8833b",
            "https://git.kernel.org/stable/c/60d62757df30b74bf397a2847a6db7385c6ee281",
            "https://git.kernel.org/stable/c/62e007bdeb91c6879a4652c3426aef1cd9d2937b",
            "https://git.kernel.org/stable/c/9e719ae3abad60e245ce248ba3f08148f375a614",
            "https://git.kernel.org/stable/c/f777792952d03bbaf8329fdfa99393a5a33e2640",
            "https://www.cve.org/CVERecord?id=CVE-2024-40929\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40929\nhttps://lore.kernel.org/linux-cve-announce/2024071215-CVE-2024-40929-e1cb@gregkh/T"
        ]
    },
    "CVE-2024-40931": {
        "cve": "CVE-2024-40931",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: ensure snd_una is properly initialized on connect\n\nThis is strictly related to commit fb7a0d334894 (\"mptcp: ensure snd_nxt\nis properly initialized on connect\"). It turns out that syzkaller can\ntrigger the retransmit after fallback and before processing any other\nincoming packet - so that snd_una is still left uninitialized.\n\nAddress the issue explicitly initializing snd_una together with snd_nxt\nand write_seq.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40931",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/208cd22ef5e57f82d38ec11c1a1703f9401d6dde",
            "patch_url": "https://git.kernel.org/stable/p/208cd22ef5e57f82d38ec11c1a1703f9401d6dde",
            "filename": "CVE-2024-40931-208cd22ef5e57f82d38ec11c1a1703f9401d6dde.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40931/CVE-2024-40931-208cd22ef5e57f82d38ec11c1a1703f9401d6dde.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/208cd22ef5e57f82d38ec11c1a1703f9401d6dde",
                "patch_url": "https://git.kernel.org/stable/p/208cd22ef5e57f82d38ec11c1a1703f9401d6dde",
                "filename": "CVE-2024-40931-208cd22ef5e57f82d38ec11c1a1703f9401d6dde.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40931/CVE-2024-40931-208cd22ef5e57f82d38ec11c1a1703f9401d6dde.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7b9c7fc8600b64a86e4b47b2d190bba380267726",
                "patch_url": "https://git.kernel.org/stable/p/7b9c7fc8600b64a86e4b47b2d190bba380267726",
                "filename": "CVE-2024-40931-7b9c7fc8600b64a86e4b47b2d190bba380267726.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40931/CVE-2024-40931-7b9c7fc8600b64a86e4b47b2d190bba380267726.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8031b58c3a9b1db3ef68b3bd749fbee2e1e1aaa3",
                "patch_url": "https://git.kernel.org/stable/p/8031b58c3a9b1db3ef68b3bd749fbee2e1e1aaa3",
                "filename": "CVE-2024-40931-8031b58c3a9b1db3ef68b3bd749fbee2e1e1aaa3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40931/CVE-2024-40931-8031b58c3a9b1db3ef68b3bd749fbee2e1e1aaa3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ef473bf1dd7e8dd08bcc04b9e2d1bfed69a0a7ce",
                "patch_url": "https://git.kernel.org/stable/p/ef473bf1dd7e8dd08bcc04b9e2d1bfed69a0a7ce",
                "filename": "CVE-2024-40931-ef473bf1dd7e8dd08bcc04b9e2d1bfed69a0a7ce.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40931/CVE-2024-40931-ef473bf1dd7e8dd08bcc04b9e2d1bfed69a0a7ce.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f03c46eabb3a67bd2993e237ab5517f00a5f1813",
                "patch_url": "https://git.kernel.org/stable/p/f03c46eabb3a67bd2993e237ab5517f00a5f1813",
                "filename": "CVE-2024-40931-f03c46eabb3a67bd2993e237ab5517f00a5f1813.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40931/CVE-2024-40931-f03c46eabb3a67bd2993e237ab5517f00a5f1813.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f1f0a46f8bb8890b90ab7194f0a0c8fe2a3fb57f",
                "patch_url": "https://git.kernel.org/stable/p/f1f0a46f8bb8890b90ab7194f0a0c8fe2a3fb57f",
                "filename": "CVE-2024-40931-f1f0a46f8bb8890b90ab7194f0a0c8fe2a3fb57f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40931/CVE-2024-40931-f1f0a46f8bb8890b90ab7194f0a0c8fe2a3fb57f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/208cd22ef5e57f82d38ec11c1a1703f9401d6dde",
            "https://git.kernel.org/stable/c/7b9c7fc8600b64a86e4b47b2d190bba380267726",
            "https://git.kernel.org/stable/c/8031b58c3a9b1db3ef68b3bd749fbee2e1e1aaa3",
            "https://git.kernel.org/stable/c/ef473bf1dd7e8dd08bcc04b9e2d1bfed69a0a7ce",
            "https://git.kernel.org/stable/c/f03c46eabb3a67bd2993e237ab5517f00a5f1813",
            "https://git.kernel.org/stable/c/f1f0a46f8bb8890b90ab7194f0a0c8fe2a3fb57f",
            "https://www.cve.org/CVERecord?id=CVE-2024-40931\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40931\nhttps://lore.kernel.org/linux-cve-announce/2024071216-CVE-2024-40931-77b2@gregkh/T"
        ]
    },
    "CVE-2024-40941": {
        "cve": "CVE-2024-40941",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: don't read past the mfuart notifcation\n\nIn case the firmware sends a notification that claims it has more data\nthan it has, we will read past that was allocated for the notification.\nRemove the print of the buffer, we won't see it by default. If needed,\nwe can see the content with tracing.\n\nThis was reported by KFENCE.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40941",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d",
            "patch_url": "https://git.kernel.org/stable/p/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d",
            "filename": "CVE-2024-40941-a8bc8276af9aeacabb773f0c267cfcdb847c6f2d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40941/CVE-2024-40941-a8bc8276af9aeacabb773f0c267cfcdb847c6f2d.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c",
                "patch_url": "https://git.kernel.org/stable/p/15b37c6fab9d5e40ac399fa1c725118588ed649c",
                "filename": "CVE-2024-40941-15b37c6fab9d5e40ac399fa1c725118588ed649c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40941/CVE-2024-40941-15b37c6fab9d5e40ac399fa1c725118588ed649c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7",
                "patch_url": "https://git.kernel.org/stable/p/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7",
                "filename": "CVE-2024-40941-46c59a25337049a2a230ce7f7c3b9f21d0aaaad7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40941/CVE-2024-40941-46c59a25337049a2a230ce7f7c3b9f21d0aaaad7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4",
                "patch_url": "https://git.kernel.org/stable/p/4bb95f4535489ed830cf9b34b0a891e384d1aee4",
                "filename": "CVE-2024-40941-4bb95f4535489ed830cf9b34b0a891e384d1aee4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40941/CVE-2024-40941-4bb95f4535489ed830cf9b34b0a891e384d1aee4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de",
                "patch_url": "https://git.kernel.org/stable/p/6532f18e66b384b8d4b7e5c9caca042faaa9e8de",
                "filename": "CVE-2024-40941-6532f18e66b384b8d4b7e5c9caca042faaa9e8de.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40941/CVE-2024-40941-6532f18e66b384b8d4b7e5c9caca042faaa9e8de.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805",
                "patch_url": "https://git.kernel.org/stable/p/65686118845d427df27ee83a6ddd4885596b0805",
                "filename": "CVE-2024-40941-65686118845d427df27ee83a6ddd4885596b0805.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40941/CVE-2024-40941-65686118845d427df27ee83a6ddd4885596b0805.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940",
                "patch_url": "https://git.kernel.org/stable/p/a05018739a5e6b9dc112c95bd4c59904062c8940",
                "filename": "CVE-2024-40941-a05018739a5e6b9dc112c95bd4c59904062c8940.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40941/CVE-2024-40941-a05018739a5e6b9dc112c95bd4c59904062c8940.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d",
                "patch_url": "https://git.kernel.org/stable/p/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d",
                "filename": "CVE-2024-40941-a8bc8276af9aeacabb773f0c267cfcdb847c6f2d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40941/CVE-2024-40941-a8bc8276af9aeacabb773f0c267cfcdb847c6f2d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154",
                "patch_url": "https://git.kernel.org/stable/p/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154",
                "filename": "CVE-2024-40941-acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40941/CVE-2024-40941-acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/15b37c6fab9d5e40ac399fa1c725118588ed649c",
            "https://git.kernel.org/stable/c/46c59a25337049a2a230ce7f7c3b9f21d0aaaad7",
            "https://git.kernel.org/stable/c/4bb95f4535489ed830cf9b34b0a891e384d1aee4",
            "https://git.kernel.org/stable/c/6532f18e66b384b8d4b7e5c9caca042faaa9e8de",
            "https://git.kernel.org/stable/c/65686118845d427df27ee83a6ddd4885596b0805",
            "https://git.kernel.org/stable/c/a05018739a5e6b9dc112c95bd4c59904062c8940",
            "https://git.kernel.org/stable/c/a8bc8276af9aeacabb773f0c267cfcdb847c6f2d",
            "https://git.kernel.org/stable/c/acdfa33c3cf5e1cd185cc1e0486bd0ea9f09c154",
            "https://www.cve.org/CVERecord?id=CVE-2024-40941\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40941\nhttps://lore.kernel.org/linux-cve-announce/2024071219-CVE-2024-40941-9e5c@gregkh/T"
        ]
    },
    "CVE-2024-40954": {
        "cve": "CVE-2024-40954",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: do not leave a dangling sk pointer, when socket creation fails\n\nIt is possible to trigger a use-after-free by:\n  * attaching an fentry probe to __sock_release() and the probe calling the\n    bpf_get_socket_cookie() helper\n  * running traceroute -I 1.1.1.1 on a freshly booted VM\n\nA KASAN enabled kernel will log something like below (decoded and stripped):\n==================================================================\nBUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nRead of size 8 at addr ffff888007110dd8 by task traceroute/299\n\nCPU: 2 PID: 299 Comm: traceroute Tainted: G            E      6.10.0-rc2+ #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nCall Trace:\n <TASK>\ndump_stack_lvl (lib/dump_stack.c:117 (discriminator 1))\nprint_report (mm/kasan/report.c:378 mm/kasan/report.c:488)\n? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nkasan_report (mm/kasan/report.c:603)\n? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nkasan_check_range (mm/kasan/generic.c:183 mm/kasan/generic.c:189)\n__sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)\nbpf_get_socket_ptr_cookie (./arch/x86/include/asm/preempt.h:94 ./include/linux/sock_diag.h:42 net/core/filter.c:5094 net/core/filter.c:5092)\nbpf_prog_875642cf11f1d139___sock_release+0x6e/0x8e\nbpf_trampoline_6442506592+0x47/0xaf\n__sock_release (net/socket.c:652)\n__sock_create (net/socket.c:1601)\n...\nAllocated by task 299 on cpu 2 at 78.328492s:\nkasan_save_stack (mm/kasan/common.c:48)\nkasan_save_track (mm/kasan/common.c:68)\n__kasan_slab_alloc (mm/kasan/common.c:312 mm/kasan/common.c:338)\nkmem_cache_alloc_noprof (mm/slub.c:3941 mm/slub.c:4000 mm/slub.c:4007)\nsk_prot_alloc (net/core/sock.c:2075)\nsk_alloc (net/core/sock.c:2134)\ninet_create (net/ipv4/af_inet.c:327 net/ipv4/af_inet.c:252)\n__sock_create (net/socket.c:1572)\n__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)\n__x64_sys_socket (net/socket.c:1718)\ndo_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nFreed by task 299 on cpu 2 at 78.328502s:\nkasan_save_stack (mm/kasan/common.c:48)\nkasan_save_track (mm/kasan/common.c:68)\nkasan_save_free_info (mm/kasan/generic.c:582)\npoison_slab_object (mm/kasan/common.c:242)\n__kasan_slab_free (mm/kasan/common.c:256)\nkmem_cache_free (mm/slub.c:4437 mm/slub.c:4511)\n__sk_destruct (net/core/sock.c:2117 net/core/sock.c:2208)\ninet_create (net/ipv4/af_inet.c:397 net/ipv4/af_inet.c:252)\n__sock_create (net/socket.c:1572)\n__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)\n__x64_sys_socket (net/socket.c:1718)\ndo_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)\nentry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)\n\nFix this by clearing the struct socket reference in sk_common_release() to cover\nall protocol families create functions, which may already attached the\nreference to the sk object with sock_init_data().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40954",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/78e4aa528a7b1204219d808310524344f627d069",
            "patch_url": "https://git.kernel.org/stable/p/78e4aa528a7b1204219d808310524344f627d069",
            "filename": "CVE-2024-40954-78e4aa528a7b1204219d808310524344f627d069.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40954/CVE-2024-40954-78e4aa528a7b1204219d808310524344f627d069.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/454c454ed645fed051216b79622f7cb69c1638f5",
                "patch_url": "https://git.kernel.org/stable/p/454c454ed645fed051216b79622f7cb69c1638f5",
                "filename": "CVE-2024-40954-454c454ed645fed051216b79622f7cb69c1638f5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40954/CVE-2024-40954-454c454ed645fed051216b79622f7cb69c1638f5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5dfe2408fd7dc4d2e7ac38a116ff0a37b1cfd3b9",
                "patch_url": "https://git.kernel.org/stable/p/5dfe2408fd7dc4d2e7ac38a116ff0a37b1cfd3b9",
                "filename": "CVE-2024-40954-5dfe2408fd7dc4d2e7ac38a116ff0a37b1cfd3b9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40954/CVE-2024-40954-5dfe2408fd7dc4d2e7ac38a116ff0a37b1cfd3b9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6cd4a78d962bebbaf8beb7d2ead3f34120e3f7b2",
                "patch_url": "https://git.kernel.org/stable/p/6cd4a78d962bebbaf8beb7d2ead3f34120e3f7b2",
                "filename": "CVE-2024-40954-6cd4a78d962bebbaf8beb7d2ead3f34120e3f7b2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40954/CVE-2024-40954-6cd4a78d962bebbaf8beb7d2ead3f34120e3f7b2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/78e4aa528a7b1204219d808310524344f627d069",
                "patch_url": "https://git.kernel.org/stable/p/78e4aa528a7b1204219d808310524344f627d069",
                "filename": "CVE-2024-40954-78e4aa528a7b1204219d808310524344f627d069.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40954/CVE-2024-40954-78e4aa528a7b1204219d808310524344f627d069.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/893eeba94c40d513cd0fe6539330ebdaea208c0e",
                "patch_url": "https://git.kernel.org/stable/p/893eeba94c40d513cd0fe6539330ebdaea208c0e",
                "filename": "CVE-2024-40954-893eeba94c40d513cd0fe6539330ebdaea208c0e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40954/CVE-2024-40954-893eeba94c40d513cd0fe6539330ebdaea208c0e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/454c454ed645fed051216b79622f7cb69c1638f5",
            "https://git.kernel.org/stable/c/5dfe2408fd7dc4d2e7ac38a116ff0a37b1cfd3b9",
            "https://git.kernel.org/stable/c/6cd4a78d962bebbaf8beb7d2ead3f34120e3f7b2",
            "https://git.kernel.org/stable/c/78e4aa528a7b1204219d808310524344f627d069",
            "https://git.kernel.org/stable/c/893eeba94c40d513cd0fe6539330ebdaea208c0e",
            "https://www.cve.org/CVERecord?id=CVE-2024-40954\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40954\nhttps://lore.kernel.org/linux-cve-announce/2024071223-CVE-2024-40954-093b@gregkh/T"
        ]
    },
    "CVE-2024-40958": {
        "cve": "CVE-2024-40958",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetns: Make get_net_ns() handle zero refcount net\n\nSyzkaller hit a warning:\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 3 PID: 7890 at lib/refcount.c:25 refcount_warn_saturate+0xdf/0x1d0\nModules linked in:\nCPU: 3 PID: 7890 Comm: tun Not tainted 6.10.0-rc3-00100-gcaa4f9578aba-dirty #310\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xdf/0x1d0\nCode: 41 49 04 31 ff 89 de e8 9f 1e cd fe 84 db 75 9c e8 76 26 cd fe c6 05 b6 41 49 04 01 90 48 c7 c7 b8 8e 25 86 e8 d2 05 b5 fe 90 <0f> 0b 90 90 e9 79 ff ff ff e8 53 26 cd fe 0f b6 1\nRSP: 0018:ffff8881067b7da0 EFLAGS: 00010286\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c72ac\nRDX: ffff8881026a2140 RSI: ffffffff811c72b5 RDI: 0000000000000001\nRBP: ffff8881067b7db0 R08: 0000000000000000 R09: 205b5d3730353139\nR10: 0000000000000000 R11: 205d303938375420 R12: ffff8881086500c4\nR13: ffff8881086500c4 R14: ffff8881086500b0 R15: ffff888108650040\nFS:  00007f5b2961a4c0(0000) GS:ffff88823bd00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000055d7ed36fd18 CR3: 00000001482f6000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n ? show_regs+0xa3/0xc0\n ? __warn+0xa5/0x1c0\n ? refcount_warn_saturate+0xdf/0x1d0\n ? report_bug+0x1fc/0x2d0\n ? refcount_warn_saturate+0xdf/0x1d0\n ? handle_bug+0xa1/0x110\n ? exc_invalid_op+0x3c/0xb0\n ? asm_exc_invalid_op+0x1f/0x30\n ? __warn_printk+0xcc/0x140\n ? __warn_printk+0xd5/0x140\n ? refcount_warn_saturate+0xdf/0x1d0\n get_net_ns+0xa4/0xc0\n ? __pfx_get_net_ns+0x10/0x10\n open_related_ns+0x5a/0x130\n __tun_chr_ioctl+0x1616/0x2370\n ? __sanitizer_cov_trace_switch+0x58/0xa0\n ? __sanitizer_cov_trace_const_cmp2+0x1c/0x30\n ? __pfx_tun_chr_ioctl+0x10/0x10\n tun_chr_ioctl+0x2f/0x40\n __x64_sys_ioctl+0x11b/0x160\n x64_sys_call+0x1211/0x20d0\n do_syscall_64+0x9e/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f5b28f165d7\nCode: b3 66 90 48 8b 05 b1 48 2d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 81 48 2d 00 8\nRSP: 002b:00007ffc2b59c5e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b28f165d7\nRDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003\nRBP: 00007ffc2b59c650 R08: 00007f5b291ed8c0 R09: 00007f5b2961a4c0\nR10: 0000000029690010 R11: 0000000000000246 R12: 0000000000400730\nR13: 00007ffc2b59cf40 R14: 0000000000000000 R15: 0000000000000000\n </TASK>\nKernel panic - not syncing: kernel: panic_on_warn set ...\n\nThis is trigger as below:\n          ns0                                    ns1\ntun_set_iff() //dev is tun0\n   tun->dev = dev\n//ip link set tun0 netns ns1\n                                       put_net() //ref is 0\n__tun_chr_ioctl() //TUNGETDEVNETNS\n   net = dev_net(tun->dev);\n   open_related_ns(&net->ns, get_net_ns); //ns1\n     get_net_ns()\n        get_net() //addition on 0\n\nUse maybe_get_net() in get_net_ns in case net's ref is zero to fix this",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40958",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1b631bffcb2c09551888f3c723f4365c91fe05ef",
            "patch_url": "https://git.kernel.org/stable/p/1b631bffcb2c09551888f3c723f4365c91fe05ef",
            "filename": "CVE-2024-40958-1b631bffcb2c09551888f3c723f4365c91fe05ef.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40958/CVE-2024-40958-1b631bffcb2c09551888f3c723f4365c91fe05ef.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1b631bffcb2c09551888f3c723f4365c91fe05ef",
                "patch_url": "https://git.kernel.org/stable/p/1b631bffcb2c09551888f3c723f4365c91fe05ef",
                "filename": "CVE-2024-40958-1b631bffcb2c09551888f3c723f4365c91fe05ef.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40958/CVE-2024-40958-1b631bffcb2c09551888f3c723f4365c91fe05ef.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2b82028a1f5ee3a8e04090776b10c534144ae77b",
                "patch_url": "https://git.kernel.org/stable/p/2b82028a1f5ee3a8e04090776b10c534144ae77b",
                "filename": "CVE-2024-40958-2b82028a1f5ee3a8e04090776b10c534144ae77b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40958/CVE-2024-40958-2b82028a1f5ee3a8e04090776b10c534144ae77b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3a6cd326ead7c8bb1f64486789a01974a9f1ad55",
                "patch_url": "https://git.kernel.org/stable/p/3a6cd326ead7c8bb1f64486789a01974a9f1ad55",
                "filename": "CVE-2024-40958-3a6cd326ead7c8bb1f64486789a01974a9f1ad55.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40958/CVE-2024-40958-3a6cd326ead7c8bb1f64486789a01974a9f1ad55.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3af28df0d883e8c89a29ac31bc65f9023485743b",
                "patch_url": "https://git.kernel.org/stable/p/3af28df0d883e8c89a29ac31bc65f9023485743b",
                "filename": "CVE-2024-40958-3af28df0d883e8c89a29ac31bc65f9023485743b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40958/CVE-2024-40958-3af28df0d883e8c89a29ac31bc65f9023485743b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cb7f811f638a14590ff98f53c6dd1fb54627d940",
                "patch_url": "https://git.kernel.org/stable/p/cb7f811f638a14590ff98f53c6dd1fb54627d940",
                "filename": "CVE-2024-40958-cb7f811f638a14590ff98f53c6dd1fb54627d940.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40958/CVE-2024-40958-cb7f811f638a14590ff98f53c6dd1fb54627d940.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ef0394ca25953ea0eddcc82feae1f750451f1876",
                "patch_url": "https://git.kernel.org/stable/p/ef0394ca25953ea0eddcc82feae1f750451f1876",
                "filename": "CVE-2024-40958-ef0394ca25953ea0eddcc82feae1f750451f1876.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40958/CVE-2024-40958-ef0394ca25953ea0eddcc82feae1f750451f1876.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ff960f9d3edbe08a736b5a224d91a305ccc946b0",
                "patch_url": "https://git.kernel.org/stable/p/ff960f9d3edbe08a736b5a224d91a305ccc946b0",
                "filename": "CVE-2024-40958-ff960f9d3edbe08a736b5a224d91a305ccc946b0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40958/CVE-2024-40958-ff960f9d3edbe08a736b5a224d91a305ccc946b0.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1b631bffcb2c09551888f3c723f4365c91fe05ef",
            "https://git.kernel.org/stable/c/2b82028a1f5ee3a8e04090776b10c534144ae77b",
            "https://git.kernel.org/stable/c/3a6cd326ead7c8bb1f64486789a01974a9f1ad55",
            "https://git.kernel.org/stable/c/3af28df0d883e8c89a29ac31bc65f9023485743b",
            "https://git.kernel.org/stable/c/cb7f811f638a14590ff98f53c6dd1fb54627d940",
            "https://git.kernel.org/stable/c/ef0394ca25953ea0eddcc82feae1f750451f1876",
            "https://git.kernel.org/stable/c/ff960f9d3edbe08a736b5a224d91a305ccc946b0",
            "https://www.cve.org/CVERecord?id=CVE-2024-40958\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40958\nhttps://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40958-8ed5@gregkh/T"
        ]
    },
    "CVE-2024-40959": {
        "cve": "CVE-2024-40959",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()\n\nip6_dst_idev() can return NULL, xfrm6_get_saddr() must act accordingly.\n\nsyzbot reported:\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\nCPU: 1 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\nWorkqueue: wg-kex-wg1 wg_packet_handshake_send_worker\n RIP: 0010:xfrm6_get_saddr+0x93/0x130 net/ipv6/xfrm6_policy.c:64\nCode: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 97 00 00 00 4c 8b ab d8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <80> 3c 02 00 0f 85 86 00 00 00 4d 8b 6d 00 e8 ca 13 47 01 48 b8 00\nRSP: 0018:ffffc90000117378 EFLAGS: 00010246\nRAX: dffffc0000000000 RBX: ffff88807b079dc0 RCX: ffffffff89a0d6d7\nRDX: 0000000000000000 RSI: ffffffff89a0d6e9 RDI: ffff88807b079e98\nRBP: ffff88807ad73248 R08: 0000000000000007 R09: fffffffffffff000\nR10: ffff88807b079dc0 R11: 0000000000000007 R12: ffffc90000117480\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\nFS:  0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f4586d00440 CR3: 0000000079042000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n  xfrm_get_saddr net/xfrm/xfrm_policy.c:2452 [inline]\n  xfrm_tmpl_resolve_one net/xfrm/xfrm_policy.c:2481 [inline]\n  xfrm_tmpl_resolve+0xa26/0xf10 net/xfrm/xfrm_policy.c:2541\n  xfrm_resolve_and_create_bundle+0x140/0x2570 net/xfrm/xfrm_policy.c:2835\n  xfrm_bundle_lookup net/xfrm/xfrm_policy.c:3070 [inline]\n  xfrm_lookup_with_ifid+0x4d1/0x1e60 net/xfrm/xfrm_policy.c:3201\n  xfrm_lookup net/xfrm/xfrm_policy.c:3298 [inline]\n  xfrm_lookup_route+0x3b/0x200 net/xfrm/xfrm_policy.c:3309\n  ip6_dst_lookup_flow+0x15c/0x1d0 net/ipv6/ip6_output.c:1256\n  send6+0x611/0xd20 drivers/net/wireguard/socket.c:139\n  wg_socket_send_skb_to_peer+0xf9/0x220 drivers/net/wireguard/socket.c:178\n  wg_socket_send_buffer_to_peer+0x12b/0x190 drivers/net/wireguard/socket.c:200\n  wg_packet_send_handshake_initiation+0x227/0x360 drivers/net/wireguard/send.c:40\n  wg_packet_handshake_send_worker+0x1c/0x30 drivers/net/wireguard/send.c:51\n  process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231\n  process_scheduled_works kernel/workqueue.c:3312 [inline]\n  worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393\n  kthread+0x2c1/0x3a0 kernel/kthread.c:389\n  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40959",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/c71761292d4d002a8eccb57b86792c4e3b3eb3c7",
            "patch_url": "https://git.kernel.org/stable/p/c71761292d4d002a8eccb57b86792c4e3b3eb3c7",
            "filename": "CVE-2024-40959-c71761292d4d002a8eccb57b86792c4e3b3eb3c7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40959/CVE-2024-40959-c71761292d4d002a8eccb57b86792c4e3b3eb3c7.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/20427b85781aca0ad072851f6907a3d4b2fed8d1",
                "patch_url": "https://git.kernel.org/stable/p/20427b85781aca0ad072851f6907a3d4b2fed8d1",
                "filename": "CVE-2024-40959-20427b85781aca0ad072851f6907a3d4b2fed8d1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40959/CVE-2024-40959-20427b85781aca0ad072851f6907a3d4b2fed8d1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/600a62b4232ac027f788c3ca395bc2333adeaacf",
                "patch_url": "https://git.kernel.org/stable/p/600a62b4232ac027f788c3ca395bc2333adeaacf",
                "filename": "CVE-2024-40959-600a62b4232ac027f788c3ca395bc2333adeaacf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40959/CVE-2024-40959-600a62b4232ac027f788c3ca395bc2333adeaacf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/83c02fb2cc0afee5bb53cddf3f34f045f654ad6a",
                "patch_url": "https://git.kernel.org/stable/p/83c02fb2cc0afee5bb53cddf3f34f045f654ad6a",
                "filename": "CVE-2024-40959-83c02fb2cc0afee5bb53cddf3f34f045f654ad6a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40959/CVE-2024-40959-83c02fb2cc0afee5bb53cddf3f34f045f654ad6a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9f30f1f1a51d91e19f5a09236bb0b59e6a07ad08",
                "patch_url": "https://git.kernel.org/stable/p/9f30f1f1a51d91e19f5a09236bb0b59e6a07ad08",
                "filename": "CVE-2024-40959-9f30f1f1a51d91e19f5a09236bb0b59e6a07ad08.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40959/CVE-2024-40959-9f30f1f1a51d91e19f5a09236bb0b59e6a07ad08.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c71761292d4d002a8eccb57b86792c4e3b3eb3c7",
                "patch_url": "https://git.kernel.org/stable/p/c71761292d4d002a8eccb57b86792c4e3b3eb3c7",
                "filename": "CVE-2024-40959-c71761292d4d002a8eccb57b86792c4e3b3eb3c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40959/CVE-2024-40959-c71761292d4d002a8eccb57b86792c4e3b3eb3c7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/caf0bec84c62fb1cf6f7c9f0e8c857c87f8adbc3",
                "patch_url": "https://git.kernel.org/stable/p/caf0bec84c62fb1cf6f7c9f0e8c857c87f8adbc3",
                "filename": "CVE-2024-40959-caf0bec84c62fb1cf6f7c9f0e8c857c87f8adbc3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40959/CVE-2024-40959-caf0bec84c62fb1cf6f7c9f0e8c857c87f8adbc3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d46401052c2d5614da8efea5788532f0401cb164",
                "patch_url": "https://git.kernel.org/stable/p/d46401052c2d5614da8efea5788532f0401cb164",
                "filename": "CVE-2024-40959-d46401052c2d5614da8efea5788532f0401cb164.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40959/CVE-2024-40959-d46401052c2d5614da8efea5788532f0401cb164.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f897d7171652fcfc76d042bfec798b010ee89e41",
                "patch_url": "https://git.kernel.org/stable/p/f897d7171652fcfc76d042bfec798b010ee89e41",
                "filename": "CVE-2024-40959-f897d7171652fcfc76d042bfec798b010ee89e41.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40959/CVE-2024-40959-f897d7171652fcfc76d042bfec798b010ee89e41.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/20427b85781aca0ad072851f6907a3d4b2fed8d1",
            "https://git.kernel.org/stable/c/600a62b4232ac027f788c3ca395bc2333adeaacf",
            "https://git.kernel.org/stable/c/83c02fb2cc0afee5bb53cddf3f34f045f654ad6a",
            "https://git.kernel.org/stable/c/9f30f1f1a51d91e19f5a09236bb0b59e6a07ad08",
            "https://git.kernel.org/stable/c/c71761292d4d002a8eccb57b86792c4e3b3eb3c7",
            "https://git.kernel.org/stable/c/caf0bec84c62fb1cf6f7c9f0e8c857c87f8adbc3",
            "https://git.kernel.org/stable/c/d46401052c2d5614da8efea5788532f0401cb164",
            "https://git.kernel.org/stable/c/f897d7171652fcfc76d042bfec798b010ee89e41",
            "https://www.cve.org/CVERecord?id=CVE-2024-40959\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40959\nhttps://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40959-228e@gregkh/T"
        ]
    },
    "CVE-2024-40960": {
        "cve": "CVE-2024-40960",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent possible NULL dereference in rt6_probe()\n\nsyzbot caught a NULL dereference in rt6_probe() [1]\n\nBail out if  __in6_dev_get() returns NULL.\n\n[1]\nOops: general protection fault, probably for non-canonical address 0xdffffc00000000cb: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000658-0x000000000000065f]\nCPU: 1 PID: 22444 Comm: syz-executor.0 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\n RIP: 0010:rt6_probe net/ipv6/route.c:656 [inline]\n RIP: 0010:find_match+0x8c4/0xf50 net/ipv6/route.c:758\nCode: 14 fd f7 48 8b 85 38 ff ff ff 48 c7 45 b0 00 00 00 00 48 8d b8 5c 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 19\nRSP: 0018:ffffc900034af070 EFLAGS: 00010203\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90004521000\nRDX: 00000000000000cb RSI: ffffffff8990d0cd RDI: 000000000000065c\nRBP: ffffc900034af150 R08: 0000000000000005 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000002 R12: 000000000000000a\nR13: 1ffff92000695e18 R14: ffff8880244a1d20 R15: 0000000000000000\nFS:  00007f4844a5a6c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000001b31b27000 CR3: 000000002d42c000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n  rt6_nh_find_match+0xfa/0x1a0 net/ipv6/route.c:784\n  nexthop_for_each_fib6_nh+0x26d/0x4a0 net/ipv4/nexthop.c:1496\n  __find_rr_leaf+0x6e7/0xe00 net/ipv6/route.c:825\n  find_rr_leaf net/ipv6/route.c:853 [inline]\n  rt6_select net/ipv6/route.c:897 [inline]\n  fib6_table_lookup+0x57e/0xa30 net/ipv6/route.c:2195\n  ip6_pol_route+0x1cd/0x1150 net/ipv6/route.c:2231\n  pol_lookup_func include/net/ip6_fib.h:616 [inline]\n  fib6_rule_lookup+0x386/0x720 net/ipv6/fib6_rules.c:121\n  ip6_route_output_flags_noref net/ipv6/route.c:2639 [inline]\n  ip6_route_output_flags+0x1d0/0x640 net/ipv6/route.c:2651\n  ip6_dst_lookup_tail.constprop.0+0x961/0x1760 net/ipv6/ip6_output.c:1147\n  ip6_dst_lookup_flow+0x99/0x1d0 net/ipv6/ip6_output.c:1250\n  rawv6_sendmsg+0xdab/0x4340 net/ipv6/raw.c:898\n  inet_sendmsg+0x119/0x140 net/ipv4/af_inet.c:853\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg net/socket.c:745 [inline]\n  sock_write_iter+0x4b8/0x5c0 net/socket.c:1160\n  new_sync_write fs/read_write.c:497 [inline]\n  vfs_write+0x6b6/0x1140 fs/read_write.c:590\n  ksys_write+0x1f8/0x260 fs/read_write.c:643\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40960",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/f0cda984e4e634b221dbf9642b8ecc5b4806b41e",
            "patch_url": "https://git.kernel.org/stable/p/f0cda984e4e634b221dbf9642b8ecc5b4806b41e",
            "filename": "CVE-2024-40960-f0cda984e4e634b221dbf9642b8ecc5b4806b41e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40960/CVE-2024-40960-f0cda984e4e634b221dbf9642b8ecc5b4806b41e.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1ed9849fdf9a1a617129346b11d2094ca26828dc",
                "patch_url": "https://git.kernel.org/stable/p/1ed9849fdf9a1a617129346b11d2094ca26828dc",
                "filename": "CVE-2024-40960-1ed9849fdf9a1a617129346b11d2094ca26828dc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40960/CVE-2024-40960-1ed9849fdf9a1a617129346b11d2094ca26828dc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/51ee2f7c30790799d0ec30c0ce0c743e58f046f2",
                "patch_url": "https://git.kernel.org/stable/p/51ee2f7c30790799d0ec30c0ce0c743e58f046f2",
                "filename": "CVE-2024-40960-51ee2f7c30790799d0ec30c0ce0c743e58f046f2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40960/CVE-2024-40960-51ee2f7c30790799d0ec30c0ce0c743e58f046f2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/569c9d9ea6648d099187527b93982f406ddcebc0",
                "patch_url": "https://git.kernel.org/stable/p/569c9d9ea6648d099187527b93982f406ddcebc0",
                "filename": "CVE-2024-40960-569c9d9ea6648d099187527b93982f406ddcebc0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40960/CVE-2024-40960-569c9d9ea6648d099187527b93982f406ddcebc0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6eed6d3cd19ff3cfa83aeceed86da14abaf7417b",
                "patch_url": "https://git.kernel.org/stable/p/6eed6d3cd19ff3cfa83aeceed86da14abaf7417b",
                "filename": "CVE-2024-40960-6eed6d3cd19ff3cfa83aeceed86da14abaf7417b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40960/CVE-2024-40960-6eed6d3cd19ff3cfa83aeceed86da14abaf7417b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/73e7c8ca6ad76f29b2c99c20845a6f3b203ff0c6",
                "patch_url": "https://git.kernel.org/stable/p/73e7c8ca6ad76f29b2c99c20845a6f3b203ff0c6",
                "filename": "CVE-2024-40960-73e7c8ca6ad76f29b2c99c20845a6f3b203ff0c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40960/CVE-2024-40960-73e7c8ca6ad76f29b2c99c20845a6f3b203ff0c6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b86762dbe19a62e785c189f313cda5b989931f37",
                "patch_url": "https://git.kernel.org/stable/p/b86762dbe19a62e785c189f313cda5b989931f37",
                "filename": "CVE-2024-40960-b86762dbe19a62e785c189f313cda5b989931f37.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40960/CVE-2024-40960-b86762dbe19a62e785c189f313cda5b989931f37.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d66fc4826127c82f99c4033380f8e93833d331c7",
                "patch_url": "https://git.kernel.org/stable/p/d66fc4826127c82f99c4033380f8e93833d331c7",
                "filename": "CVE-2024-40960-d66fc4826127c82f99c4033380f8e93833d331c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40960/CVE-2024-40960-d66fc4826127c82f99c4033380f8e93833d331c7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f0cda984e4e634b221dbf9642b8ecc5b4806b41e",
                "patch_url": "https://git.kernel.org/stable/p/f0cda984e4e634b221dbf9642b8ecc5b4806b41e",
                "filename": "CVE-2024-40960-f0cda984e4e634b221dbf9642b8ecc5b4806b41e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40960/CVE-2024-40960-f0cda984e4e634b221dbf9642b8ecc5b4806b41e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1ed9849fdf9a1a617129346b11d2094ca26828dc",
            "https://git.kernel.org/stable/c/51ee2f7c30790799d0ec30c0ce0c743e58f046f2",
            "https://git.kernel.org/stable/c/569c9d9ea6648d099187527b93982f406ddcebc0",
            "https://git.kernel.org/stable/c/6eed6d3cd19ff3cfa83aeceed86da14abaf7417b",
            "https://git.kernel.org/stable/c/73e7c8ca6ad76f29b2c99c20845a6f3b203ff0c6",
            "https://git.kernel.org/stable/c/b86762dbe19a62e785c189f313cda5b989931f37",
            "https://git.kernel.org/stable/c/d66fc4826127c82f99c4033380f8e93833d331c7",
            "https://git.kernel.org/stable/c/f0cda984e4e634b221dbf9642b8ecc5b4806b41e",
            "https://www.cve.org/CVERecord?id=CVE-2024-40960\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40960\nhttps://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40960-d46f@gregkh/T"
        ]
    },
    "CVE-2024-40961": {
        "cve": "CVE-2024-40961",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent possible NULL deref in fib6_nh_init()\n\nsyzbot reminds us that in6_dev_get() can return NULL.\n\nfib6_nh_init()\n    ip6_validate_gw(  &idev  )\n        ip6_route_check_nh(  idev  )\n            *idev = in6_dev_get(dev); // can be NULL\n\nOops: general protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]\nCPU: 0 PID: 11237 Comm: syz-executor.3 Not tainted 6.10.0-rc2-syzkaller-00249-gbe27b8965297 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024\n RIP: 0010:fib6_nh_init+0x640/0x2160 net/ipv6/route.c:3606\nCode: 00 00 fc ff df 4c 8b 64 24 58 48 8b 44 24 28 4c 8b 74 24 30 48 89 c1 48 89 44 24 28 48 8d 98 e0 05 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 b3 17 00 00 8b 1b 31 ff 89 de e8 b8 8b\nRSP: 0018:ffffc900032775a0 EFLAGS: 00010202\nRAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000000000\nRDX: 0000000000000010 RSI: ffffc90003277a54 RDI: ffff88802b3a08d8\nRBP: ffffc900032778b0 R08: 00000000000002fc R09: 0000000000000000\nR10: 00000000000002fc R11: 0000000000000000 R12: ffff88802b3a08b8\nR13: 1ffff9200064eec8 R14: ffffc90003277a00 R15: dffffc0000000000\nFS:  00007f940feb06c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000000 CR3: 00000000245e8000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n  ip6_route_info_create+0x99e/0x12b0 net/ipv6/route.c:3809\n  ip6_route_add+0x28/0x160 net/ipv6/route.c:3853\n  ipv6_route_ioctl+0x588/0x870 net/ipv6/route.c:4483\n  inet6_ioctl+0x21a/0x280 net/ipv6/af_inet6.c:579\n  sock_do_ioctl+0x158/0x460 net/socket.c:1222\n  sock_ioctl+0x629/0x8e0 net/socket.c:1341\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:907 [inline]\n  __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f940f07cea9",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40961",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/de5ad4d45cd0128a2a37555f48ab69aa19d78adc",
            "patch_url": "https://git.kernel.org/stable/p/de5ad4d45cd0128a2a37555f48ab69aa19d78adc",
            "filename": "CVE-2024-40961-de5ad4d45cd0128a2a37555f48ab69aa19d78adc.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40961/CVE-2024-40961-de5ad4d45cd0128a2a37555f48ab69aa19d78adc.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2eab4543a2204092c3a7af81d7d6c506e59a03a6",
                "patch_url": "https://git.kernel.org/stable/p/2eab4543a2204092c3a7af81d7d6c506e59a03a6",
                "filename": "CVE-2024-40961-2eab4543a2204092c3a7af81d7d6c506e59a03a6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40961/CVE-2024-40961-2eab4543a2204092c3a7af81d7d6c506e59a03a6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3200ffeec4d59aad5bc9ca75d2c1fae47c0aeade",
                "patch_url": "https://git.kernel.org/stable/p/3200ffeec4d59aad5bc9ca75d2c1fae47c0aeade",
                "filename": "CVE-2024-40961-3200ffeec4d59aad5bc9ca75d2c1fae47c0aeade.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40961/CVE-2024-40961-3200ffeec4d59aad5bc9ca75d2c1fae47c0aeade.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4cdfe813015d5a24586bd0a84fa0fa6eb0a1f668",
                "patch_url": "https://git.kernel.org/stable/p/4cdfe813015d5a24586bd0a84fa0fa6eb0a1f668",
                "filename": "CVE-2024-40961-4cdfe813015d5a24586bd0a84fa0fa6eb0a1f668.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40961/CVE-2024-40961-4cdfe813015d5a24586bd0a84fa0fa6eb0a1f668.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/88b9a55e2e35ea846d41f4efdc29d23345bd1aa4",
                "patch_url": "https://git.kernel.org/stable/p/88b9a55e2e35ea846d41f4efdc29d23345bd1aa4",
                "filename": "CVE-2024-40961-88b9a55e2e35ea846d41f4efdc29d23345bd1aa4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40961/CVE-2024-40961-88b9a55e2e35ea846d41f4efdc29d23345bd1aa4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ae8d3d39efe366c2198f530e01e4bf07830bf403",
                "patch_url": "https://git.kernel.org/stable/p/ae8d3d39efe366c2198f530e01e4bf07830bf403",
                "filename": "CVE-2024-40961-ae8d3d39efe366c2198f530e01e4bf07830bf403.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40961/CVE-2024-40961-ae8d3d39efe366c2198f530e01e4bf07830bf403.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b6947723c9eabcab58cfb33cdb0a565a6aee6727",
                "patch_url": "https://git.kernel.org/stable/p/b6947723c9eabcab58cfb33cdb0a565a6aee6727",
                "filename": "CVE-2024-40961-b6947723c9eabcab58cfb33cdb0a565a6aee6727.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40961/CVE-2024-40961-b6947723c9eabcab58cfb33cdb0a565a6aee6727.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/de5ad4d45cd0128a2a37555f48ab69aa19d78adc",
                "patch_url": "https://git.kernel.org/stable/p/de5ad4d45cd0128a2a37555f48ab69aa19d78adc",
                "filename": "CVE-2024-40961-de5ad4d45cd0128a2a37555f48ab69aa19d78adc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40961/CVE-2024-40961-de5ad4d45cd0128a2a37555f48ab69aa19d78adc.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2eab4543a2204092c3a7af81d7d6c506e59a03a6",
            "https://git.kernel.org/stable/c/3200ffeec4d59aad5bc9ca75d2c1fae47c0aeade",
            "https://git.kernel.org/stable/c/4cdfe813015d5a24586bd0a84fa0fa6eb0a1f668",
            "https://git.kernel.org/stable/c/88b9a55e2e35ea846d41f4efdc29d23345bd1aa4",
            "https://git.kernel.org/stable/c/ae8d3d39efe366c2198f530e01e4bf07830bf403",
            "https://git.kernel.org/stable/c/b6947723c9eabcab58cfb33cdb0a565a6aee6727",
            "https://git.kernel.org/stable/c/de5ad4d45cd0128a2a37555f48ab69aa19d78adc",
            "https://www.cve.org/CVERecord?id=CVE-2024-40961\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40961\nhttps://lore.kernel.org/linux-cve-announce/2024071225-CVE-2024-40961-19bd@gregkh/T"
        ]
    },
    "CVE-2024-40972": {
        "cve": "CVE-2024-40972",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: do not create EA inode under buffer lock\n\next4_xattr_set_entry() creates new EA inodes while holding buffer lock\non the external xattr block. This is problematic as it nests all the\nallocation locking (which acquires locks on other buffers) under the\nbuffer lock. This can even deadlock when the filesystem is corrupted and\ne.g. quota file is setup to contain xattr block as data block. Move the\nallocation of EA inode out of ext4_xattr_set_entry() into the callers.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40972",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0752e7fb549d90c33b4d4186f11cfd25a556d1dd",
            "patch_url": "https://git.kernel.org/stable/p/0752e7fb549d90c33b4d4186f11cfd25a556d1dd",
            "filename": "CVE-2024-40972-0752e7fb549d90c33b4d4186f11cfd25a556d1dd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40972/CVE-2024-40972-0752e7fb549d90c33b4d4186f11cfd25a556d1dd.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0752e7fb549d90c33b4d4186f11cfd25a556d1dd",
                "patch_url": "https://git.kernel.org/stable/p/0752e7fb549d90c33b4d4186f11cfd25a556d1dd",
                "filename": "CVE-2024-40972-0752e7fb549d90c33b4d4186f11cfd25a556d1dd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40972/CVE-2024-40972-0752e7fb549d90c33b4d4186f11cfd25a556d1dd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0a46ef234756dca04623b7591e8ebb3440622f0b",
                "patch_url": "https://git.kernel.org/stable/p/0a46ef234756dca04623b7591e8ebb3440622f0b",
                "filename": "CVE-2024-40972-0a46ef234756dca04623b7591e8ebb3440622f0b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40972/CVE-2024-40972-0a46ef234756dca04623b7591e8ebb3440622f0b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/111103907234bffd0a34fba070ad9367de058752",
                "patch_url": "https://git.kernel.org/stable/p/111103907234bffd0a34fba070ad9367de058752",
                "filename": "CVE-2024-40972-111103907234bffd0a34fba070ad9367de058752.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40972/CVE-2024-40972-111103907234bffd0a34fba070ad9367de058752.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/737fb7853acd5bc8984f6f42e4bfba3334be8ae1",
                "patch_url": "https://git.kernel.org/stable/p/737fb7853acd5bc8984f6f42e4bfba3334be8ae1",
                "filename": "CVE-2024-40972-737fb7853acd5bc8984f6f42e4bfba3334be8ae1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40972/CVE-2024-40972-737fb7853acd5bc8984f6f42e4bfba3334be8ae1.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0752e7fb549d90c33b4d4186f11cfd25a556d1dd",
            "https://git.kernel.org/stable/c/0a46ef234756dca04623b7591e8ebb3440622f0b",
            "https://git.kernel.org/stable/c/111103907234bffd0a34fba070ad9367de058752",
            "https://git.kernel.org/stable/c/737fb7853acd5bc8984f6f42e4bfba3334be8ae1",
            "https://www.cve.org/CVERecord?id=CVE-2024-40972\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40972\nhttps://lore.kernel.org/linux-cve-announce/2024071229-CVE-2024-40972-1569@gregkh/T"
        ]
    },
    "CVE-2024-40974": {
        "cve": "CVE-2024-40974",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries: Enforce hcall result buffer validity and size\n\nplpar_hcall(), plpar_hcall9(), and related functions expect callers to\nprovide valid result buffers of certain minimum size. Currently this\nis communicated only through comments in the code and the compiler has\nno idea.\n\nFor example, if I write a bug like this:\n\n  long retbuf[PLPAR_HCALL_BUFSIZE]; // should be PLPAR_HCALL9_BUFSIZE\n  plpar_hcall9(H_ALLOCATE_VAS_WINDOW, retbuf, ...);\n\nThis compiles with no diagnostics emitted, but likely results in stack\ncorruption at runtime when plpar_hcall9() stores results past the end\nof the array. (To be clear this is a contrived example and I have not\nfound a real instance yet.)\n\nTo make this class of error less likely, we can use explicitly-sized\narray parameters instead of pointers in the declarations for the hcall\nAPIs. When compiled with -Warray-bounds[1], the code above now\nprovokes a diagnostic like this:\n\nerror: array argument is too small;\nis of size 32, callee requires at least 72 [-Werror,-Warray-bounds]\n   60 |                 plpar_hcall9(H_ALLOCATE_VAS_WINDOW, retbuf,\n      |                 ^                                   ~~~~~~\n\n[1] Enabled for LLVM builds but not GCC for now. See commit\n    0da6e5fd6c37 (\"gcc: disable '-Warray-bounds' for gcc-13 too\") and\n    related changes.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40974",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/262e942ff5a839b9e4f3302a8987928b0c8b8a2d",
            "patch_url": "https://git.kernel.org/stable/p/262e942ff5a839b9e4f3302a8987928b0c8b8a2d",
            "filename": "CVE-2024-40974-262e942ff5a839b9e4f3302a8987928b0c8b8a2d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40974/CVE-2024-40974-262e942ff5a839b9e4f3302a8987928b0c8b8a2d.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/19c166ee42cf16d8b156a6cb4544122d9a65d3ca",
                "patch_url": "https://git.kernel.org/stable/p/19c166ee42cf16d8b156a6cb4544122d9a65d3ca",
                "filename": "CVE-2024-40974-19c166ee42cf16d8b156a6cb4544122d9a65d3ca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40974/CVE-2024-40974-19c166ee42cf16d8b156a6cb4544122d9a65d3ca.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/262e942ff5a839b9e4f3302a8987928b0c8b8a2d",
                "patch_url": "https://git.kernel.org/stable/p/262e942ff5a839b9e4f3302a8987928b0c8b8a2d",
                "filename": "CVE-2024-40974-262e942ff5a839b9e4f3302a8987928b0c8b8a2d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40974/CVE-2024-40974-262e942ff5a839b9e4f3302a8987928b0c8b8a2d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3ad0034910a57aa88ed9976b1431b7b8c84e0048",
                "patch_url": "https://git.kernel.org/stable/p/3ad0034910a57aa88ed9976b1431b7b8c84e0048",
                "filename": "CVE-2024-40974-3ad0034910a57aa88ed9976b1431b7b8c84e0048.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40974/CVE-2024-40974-3ad0034910a57aa88ed9976b1431b7b8c84e0048.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8aa11aa001576bf3b00dcb8559564ad7a3113588",
                "patch_url": "https://git.kernel.org/stable/p/8aa11aa001576bf3b00dcb8559564ad7a3113588",
                "filename": "CVE-2024-40974-8aa11aa001576bf3b00dcb8559564ad7a3113588.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40974/CVE-2024-40974-8aa11aa001576bf3b00dcb8559564ad7a3113588.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a8c988d752b3d98d5cc1e3929c519a55ef55426c",
                "patch_url": "https://git.kernel.org/stable/p/a8c988d752b3d98d5cc1e3929c519a55ef55426c",
                "filename": "CVE-2024-40974-a8c988d752b3d98d5cc1e3929c519a55ef55426c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40974/CVE-2024-40974-a8c988d752b3d98d5cc1e3929c519a55ef55426c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aa6107dcc4ce9a3451f2d729204713783b657257",
                "patch_url": "https://git.kernel.org/stable/p/aa6107dcc4ce9a3451f2d729204713783b657257",
                "filename": "CVE-2024-40974-aa6107dcc4ce9a3451f2d729204713783b657257.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40974/CVE-2024-40974-aa6107dcc4ce9a3451f2d729204713783b657257.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/acf2b80c31c37acab040baa3cf5f19fbd5140b18",
                "patch_url": "https://git.kernel.org/stable/p/acf2b80c31c37acab040baa3cf5f19fbd5140b18",
                "filename": "CVE-2024-40974-acf2b80c31c37acab040baa3cf5f19fbd5140b18.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40974/CVE-2024-40974-acf2b80c31c37acab040baa3cf5f19fbd5140b18.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ff2e185cf73df480ec69675936c4ee75a445c3e4",
                "patch_url": "https://git.kernel.org/stable/p/ff2e185cf73df480ec69675936c4ee75a445c3e4",
                "filename": "CVE-2024-40974-ff2e185cf73df480ec69675936c4ee75a445c3e4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40974/CVE-2024-40974-ff2e185cf73df480ec69675936c4ee75a445c3e4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/19c166ee42cf16d8b156a6cb4544122d9a65d3ca",
            "https://git.kernel.org/stable/c/262e942ff5a839b9e4f3302a8987928b0c8b8a2d",
            "https://git.kernel.org/stable/c/3ad0034910a57aa88ed9976b1431b7b8c84e0048",
            "https://git.kernel.org/stable/c/8aa11aa001576bf3b00dcb8559564ad7a3113588",
            "https://git.kernel.org/stable/c/a8c988d752b3d98d5cc1e3929c519a55ef55426c",
            "https://git.kernel.org/stable/c/aa6107dcc4ce9a3451f2d729204713783b657257",
            "https://git.kernel.org/stable/c/acf2b80c31c37acab040baa3cf5f19fbd5140b18",
            "https://git.kernel.org/stable/c/ff2e185cf73df480ec69675936c4ee75a445c3e4",
            "https://www.cve.org/CVERecord?id=CVE-2024-40974\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40974\nhttps://lore.kernel.org/linux-cve-announce/2024071229-CVE-2024-40974-afb3@gregkh/T"
        ]
    },
    "CVE-2024-40977": {
        "cve": "CVE-2024-40977",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7921s: fix potential hung tasks during chip recovery\n\nDuring chip recovery (e.g. chip reset), there is a possible situation that\nkernel worker reset_work is holding the lock and waiting for kernel thread\nstat_worker to be parked, while stat_worker is waiting for the release of\nthe same lock.\nIt causes a deadlock resulting in the dumping of hung tasks messages and\npossible rebooting of the device.\n\nThis patch prevents the execution of stat_worker during the chip recovery.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40977",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0b81faa05b0b9feb3ae2d69be1d21f0d126ecb08",
            "patch_url": "https://git.kernel.org/stable/p/0b81faa05b0b9feb3ae2d69be1d21f0d126ecb08",
            "filename": "CVE-2024-40977-0b81faa05b0b9feb3ae2d69be1d21f0d126ecb08.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40977/CVE-2024-40977-0b81faa05b0b9feb3ae2d69be1d21f0d126ecb08.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0b81faa05b0b9feb3ae2d69be1d21f0d126ecb08",
                "patch_url": "https://git.kernel.org/stable/p/0b81faa05b0b9feb3ae2d69be1d21f0d126ecb08",
                "filename": "CVE-2024-40977-0b81faa05b0b9feb3ae2d69be1d21f0d126ecb08.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40977/CVE-2024-40977-0b81faa05b0b9feb3ae2d69be1d21f0d126ecb08.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/85edd783f4539a994d66c4c014d5858f490b7a02",
                "patch_url": "https://git.kernel.org/stable/p/85edd783f4539a994d66c4c014d5858f490b7a02",
                "filename": "CVE-2024-40977-85edd783f4539a994d66c4c014d5858f490b7a02.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40977/CVE-2024-40977-85edd783f4539a994d66c4c014d5858f490b7a02.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e974dd4c22a23ec3ce579fb6d31a674ac0435da9",
                "patch_url": "https://git.kernel.org/stable/p/e974dd4c22a23ec3ce579fb6d31a674ac0435da9",
                "filename": "CVE-2024-40977-e974dd4c22a23ec3ce579fb6d31a674ac0435da9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40977/CVE-2024-40977-e974dd4c22a23ec3ce579fb6d31a674ac0435da9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ecf0b2b8a37c8464186620bef37812a117ff6366",
                "patch_url": "https://git.kernel.org/stable/p/ecf0b2b8a37c8464186620bef37812a117ff6366",
                "filename": "CVE-2024-40977-ecf0b2b8a37c8464186620bef37812a117ff6366.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40977/CVE-2024-40977-ecf0b2b8a37c8464186620bef37812a117ff6366.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0b81faa05b0b9feb3ae2d69be1d21f0d126ecb08",
            "https://git.kernel.org/stable/c/85edd783f4539a994d66c4c014d5858f490b7a02",
            "https://git.kernel.org/stable/c/e974dd4c22a23ec3ce579fb6d31a674ac0435da9",
            "https://git.kernel.org/stable/c/ecf0b2b8a37c8464186620bef37812a117ff6366",
            "https://www.cve.org/CVERecord?id=CVE-2024-40977\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40977\nhttps://lore.kernel.org/linux-cve-announce/2024071230-CVE-2024-40977-07c8@gregkh/T"
        ]
    },
    "CVE-2024-40978": {
        "cve": "CVE-2024-40978",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedi: Fix crash while reading debugfs attribute\n\nThe qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly\non a __user pointer, which results into the crash.\n\nTo fix this issue, use a small local stack buffer for sprintf() and then\ncall simple_read_from_buffer(), which in turns make the copy_to_user()\ncall.\n\nBUG: unable to handle page fault for address: 00007f4801111000\nPGD 8000000864df6067 P4D 8000000864df6067 PUD 864df7067 PMD 846028067 PTE 0\nOops: 0002 [#1] PREEMPT SMP PTI\nHardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 06/15/2023\nRIP: 0010:memcpy_orig+0xcd/0x130\nRSP: 0018:ffffb7a18c3ffc40 EFLAGS: 00010202\nRAX: 00007f4801111000 RBX: 00007f4801111000 RCX: 000000000000000f\nRDX: 000000000000000f RSI: ffffffffc0bfd7a0 RDI: 00007f4801111000\nRBP: ffffffffc0bfd7a0 R08: 725f746f6e5f6f64 R09: 3d7265766f636572\nR10: ffffb7a18c3ffd08 R11: 0000000000000000 R12: 00007f4881110fff\nR13: 000000007fffffff R14: ffffb7a18c3ffca0 R15: ffffffffc0bfd7af\nFS:  00007f480118a740(0000) GS:ffff98e38af00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f4801111000 CR3: 0000000864b8e001 CR4: 00000000007706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n <TASK>\n ? __die_body+0x1a/0x60\n ? page_fault_oops+0x183/0x510\n ? exc_page_fault+0x69/0x150\n ? asm_exc_page_fault+0x22/0x30\n ? memcpy_orig+0xcd/0x130\n vsnprintf+0x102/0x4c0\n sprintf+0x51/0x80\n qedi_dbg_do_not_recover_cmd_read+0x2f/0x50 [qedi 6bcfdeeecdea037da47069eca2ba717c84a77324]\n full_proxy_read+0x50/0x80\n vfs_read+0xa5/0x2e0\n ? folio_add_new_anon_rmap+0x44/0xa0\n ? set_pte_at+0x15/0x30\n ? do_pte_missing+0x426/0x7f0\n ksys_read+0xa5/0xe0\n do_syscall_64+0x58/0x80\n ? __count_memcg_events+0x46/0x90\n ? count_memcg_event_mm+0x3d/0x60\n ? handle_mm_fault+0x196/0x2f0\n ? do_user_addr_fault+0x267/0x890\n ? exc_page_fault+0x69/0x150\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7f4800f20b4d",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40978",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/144d76a676b630e321556965011b00e2de0b40a7",
            "patch_url": "https://git.kernel.org/stable/p/144d76a676b630e321556965011b00e2de0b40a7",
            "filename": "CVE-2024-40978-144d76a676b630e321556965011b00e2de0b40a7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40978/CVE-2024-40978-144d76a676b630e321556965011b00e2de0b40a7.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/144d76a676b630e321556965011b00e2de0b40a7",
                "patch_url": "https://git.kernel.org/stable/p/144d76a676b630e321556965011b00e2de0b40a7",
                "filename": "CVE-2024-40978-144d76a676b630e321556965011b00e2de0b40a7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40978/CVE-2024-40978-144d76a676b630e321556965011b00e2de0b40a7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/21c963de2e86e88f6a8ca556bcebb8e62ab8e901",
                "patch_url": "https://git.kernel.org/stable/p/21c963de2e86e88f6a8ca556bcebb8e62ab8e901",
                "filename": "CVE-2024-40978-21c963de2e86e88f6a8ca556bcebb8e62ab8e901.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40978/CVE-2024-40978-21c963de2e86e88f6a8ca556bcebb8e62ab8e901.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/28027ec8e32ecbadcd67623edb290dad61e735b5",
                "patch_url": "https://git.kernel.org/stable/p/28027ec8e32ecbadcd67623edb290dad61e735b5",
                "filename": "CVE-2024-40978-28027ec8e32ecbadcd67623edb290dad61e735b5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40978/CVE-2024-40978-28027ec8e32ecbadcd67623edb290dad61e735b5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/397a8990c377ee4b61d6df768e61dff9e316d46b",
                "patch_url": "https://git.kernel.org/stable/p/397a8990c377ee4b61d6df768e61dff9e316d46b",
                "filename": "CVE-2024-40978-397a8990c377ee4b61d6df768e61dff9e316d46b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40978/CVE-2024-40978-397a8990c377ee4b61d6df768e61dff9e316d46b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/56bec63a7fc87ad50b3373a87517dc9770eef9e0",
                "patch_url": "https://git.kernel.org/stable/p/56bec63a7fc87ad50b3373a87517dc9770eef9e0",
                "filename": "CVE-2024-40978-56bec63a7fc87ad50b3373a87517dc9770eef9e0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40978/CVE-2024-40978-56bec63a7fc87ad50b3373a87517dc9770eef9e0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e2f433ea7d0ff77998766a088a287337fb43ad75",
                "patch_url": "https://git.kernel.org/stable/p/e2f433ea7d0ff77998766a088a287337fb43ad75",
                "filename": "CVE-2024-40978-e2f433ea7d0ff77998766a088a287337fb43ad75.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40978/CVE-2024-40978-e2f433ea7d0ff77998766a088a287337fb43ad75.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eaddb86637669f6bad89245ee63f8fb2bfb50241",
                "patch_url": "https://git.kernel.org/stable/p/eaddb86637669f6bad89245ee63f8fb2bfb50241",
                "filename": "CVE-2024-40978-eaddb86637669f6bad89245ee63f8fb2bfb50241.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40978/CVE-2024-40978-eaddb86637669f6bad89245ee63f8fb2bfb50241.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fa85b016a56b9775a3fe41e5d26e666945963b46",
                "patch_url": "https://git.kernel.org/stable/p/fa85b016a56b9775a3fe41e5d26e666945963b46",
                "filename": "CVE-2024-40978-fa85b016a56b9775a3fe41e5d26e666945963b46.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40978/CVE-2024-40978-fa85b016a56b9775a3fe41e5d26e666945963b46.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/144d76a676b630e321556965011b00e2de0b40a7",
            "https://git.kernel.org/stable/c/21c963de2e86e88f6a8ca556bcebb8e62ab8e901",
            "https://git.kernel.org/stable/c/28027ec8e32ecbadcd67623edb290dad61e735b5",
            "https://git.kernel.org/stable/c/397a8990c377ee4b61d6df768e61dff9e316d46b",
            "https://git.kernel.org/stable/c/56bec63a7fc87ad50b3373a87517dc9770eef9e0",
            "https://git.kernel.org/stable/c/e2f433ea7d0ff77998766a088a287337fb43ad75",
            "https://git.kernel.org/stable/c/eaddb86637669f6bad89245ee63f8fb2bfb50241",
            "https://git.kernel.org/stable/c/fa85b016a56b9775a3fe41e5d26e666945963b46",
            "https://www.cve.org/CVERecord?id=CVE-2024-40978\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40978\nhttps://lore.kernel.org/linux-cve-announce/2024071231-CVE-2024-40978-d135@gregkh/T"
        ]
    },
    "CVE-2024-40983": {
        "cve": "CVE-2024-40983",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: force a dst refcount before doing decryption\n\nAs it says in commit 3bc07321ccc2 (\"xfrm: Force a dst refcount before\nentering the xfrm type handlers\"):\n\n\"Crypto requests might return asynchronous. In this case we leave the\n rcu protected region, so force a refcount on the skb's destination\n entry before we enter the xfrm type input/output handlers.\"\n\nOn TIPC decryption path it has the same problem, and skb_dst_force()\nshould be called before doing decryption to avoid a possible crash.\n\nShuang reported this issue when this warning is triggered:\n\n  [] WARNING: include/net/dst.h:337 tipc_sk_rcv+0x1055/0x1ea0 [tipc]\n  [] Kdump: loaded Tainted: G W --------- - - 4.18.0-496.el8.x86_64+debug\n  [] Workqueue: crypto cryptd_queue_worker\n  [] RIP: 0010:tipc_sk_rcv+0x1055/0x1ea0 [tipc]\n  [] Call Trace:\n  [] tipc_sk_mcast_rcv+0x548/0xea0 [tipc]\n  [] tipc_rcv+0xcf5/0x1060 [tipc]\n  [] tipc_aead_decrypt_done+0x215/0x2e0 [tipc]\n  [] cryptd_aead_crypt+0xdb/0x190\n  [] cryptd_queue_worker+0xed/0x190\n  [] process_one_work+0x93d/0x17e0",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40983",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3eb1b39627892c4e26cb0162b75725aa5fcc60c8",
            "patch_url": "https://git.kernel.org/stable/p/3eb1b39627892c4e26cb0162b75725aa5fcc60c8",
            "filename": "CVE-2024-40983-3eb1b39627892c4e26cb0162b75725aa5fcc60c8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40983/CVE-2024-40983-3eb1b39627892c4e26cb0162b75725aa5fcc60c8.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2ebe8f840c7450ecbfca9d18ac92e9ce9155e269",
                "patch_url": "https://git.kernel.org/stable/p/2ebe8f840c7450ecbfca9d18ac92e9ce9155e269",
                "filename": "CVE-2024-40983-2ebe8f840c7450ecbfca9d18ac92e9ce9155e269.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40983/CVE-2024-40983-2ebe8f840c7450ecbfca9d18ac92e9ce9155e269.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3eb1b39627892c4e26cb0162b75725aa5fcc60c8",
                "patch_url": "https://git.kernel.org/stable/p/3eb1b39627892c4e26cb0162b75725aa5fcc60c8",
                "filename": "CVE-2024-40983-3eb1b39627892c4e26cb0162b75725aa5fcc60c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40983/CVE-2024-40983-3eb1b39627892c4e26cb0162b75725aa5fcc60c8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/623c90d86a61e3780f682b32928af469c66ec4c2",
                "patch_url": "https://git.kernel.org/stable/p/623c90d86a61e3780f682b32928af469c66ec4c2",
                "filename": "CVE-2024-40983-623c90d86a61e3780f682b32928af469c66ec4c2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40983/CVE-2024-40983-623c90d86a61e3780f682b32928af469c66ec4c2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6808b41371670c51feea14f63ade211e78100930",
                "patch_url": "https://git.kernel.org/stable/p/6808b41371670c51feea14f63ade211e78100930",
                "filename": "CVE-2024-40983-6808b41371670c51feea14f63ade211e78100930.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40983/CVE-2024-40983-6808b41371670c51feea14f63ade211e78100930.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/692803b39a36e63ac73208e0a3769ae6a2f9bc76",
                "patch_url": "https://git.kernel.org/stable/p/692803b39a36e63ac73208e0a3769ae6a2f9bc76",
                "filename": "CVE-2024-40983-692803b39a36e63ac73208e0a3769ae6a2f9bc76.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40983/CVE-2024-40983-692803b39a36e63ac73208e0a3769ae6a2f9bc76.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b57a4a2dc8746cea58a922ebe31b6aa629d69d93",
                "patch_url": "https://git.kernel.org/stable/p/b57a4a2dc8746cea58a922ebe31b6aa629d69d93",
                "filename": "CVE-2024-40983-b57a4a2dc8746cea58a922ebe31b6aa629d69d93.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40983/CVE-2024-40983-b57a4a2dc8746cea58a922ebe31b6aa629d69d93.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2ebe8f840c7450ecbfca9d18ac92e9ce9155e269",
            "https://git.kernel.org/stable/c/3eb1b39627892c4e26cb0162b75725aa5fcc60c8",
            "https://git.kernel.org/stable/c/623c90d86a61e3780f682b32928af469c66ec4c2",
            "https://git.kernel.org/stable/c/6808b41371670c51feea14f63ade211e78100930",
            "https://git.kernel.org/stable/c/692803b39a36e63ac73208e0a3769ae6a2f9bc76",
            "https://git.kernel.org/stable/c/b57a4a2dc8746cea58a922ebe31b6aa629d69d93",
            "https://www.cve.org/CVERecord?id=CVE-2024-40983\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40983\nhttps://lore.kernel.org/linux-cve-announce/2024071201-CVE-2024-40983-e1b1@gregkh/T"
        ]
    },
    "CVE-2024-40984": {
        "cve": "CVE-2024-40984",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPICA: Revert \"ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.\"\n\nUndo the modifications made in commit d410ee5109a1 (\"ACPICA: avoid\n\"Info: mapping multiple BARs. Your kernel is fine.\"\"). The initial\npurpose of this commit was to stop memory mappings for operation\nregions from overlapping page boundaries, as it can trigger warnings\nif different page attributes are present.\n\nHowever, it was found that when this situation arises, mapping\ncontinues until the boundary's end, but there is still an attempt to\nread/write the entire length of the map, leading to a NULL pointer\ndeference. For example, if a four-byte mapping request is made but\nonly one byte is mapped because it hits the current page boundary's\nend, a four-byte read/write attempt is still made, resulting in a NULL\npointer deference.\n\nInstead, map the entire length, as the ACPI specification does not\nmandate that it must be within the same page boundary. It is\npermissible for it to be mapped across different regions.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40984",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/434c6b924e1f4c219aab2d9e05fe79c5364e37d3",
            "patch_url": "https://git.kernel.org/stable/p/434c6b924e1f4c219aab2d9e05fe79c5364e37d3",
            "filename": "CVE-2024-40984-434c6b924e1f4c219aab2d9e05fe79c5364e37d3.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40984/CVE-2024-40984-434c6b924e1f4c219aab2d9e05fe79c5364e37d3.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/434c6b924e1f4c219aab2d9e05fe79c5364e37d3",
                "patch_url": "https://git.kernel.org/stable/p/434c6b924e1f4c219aab2d9e05fe79c5364e37d3",
                "filename": "CVE-2024-40984-434c6b924e1f4c219aab2d9e05fe79c5364e37d3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40984/CVE-2024-40984-434c6b924e1f4c219aab2d9e05fe79c5364e37d3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/435ecc978c3d5d0c4e172ec5b956dc1904061d98",
                "patch_url": "https://git.kernel.org/stable/p/435ecc978c3d5d0c4e172ec5b956dc1904061d98",
                "filename": "CVE-2024-40984-435ecc978c3d5d0c4e172ec5b956dc1904061d98.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40984/CVE-2024-40984-435ecc978c3d5d0c4e172ec5b956dc1904061d98.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6eca23100e9030725f69c1babacd58803f29ec8d",
                "patch_url": "https://git.kernel.org/stable/p/6eca23100e9030725f69c1babacd58803f29ec8d",
                "filename": "CVE-2024-40984-6eca23100e9030725f69c1babacd58803f29ec8d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40984/CVE-2024-40984-6eca23100e9030725f69c1babacd58803f29ec8d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a83e1385b780d41307433ddbc86e3c528db031f0",
                "patch_url": "https://git.kernel.org/stable/p/a83e1385b780d41307433ddbc86e3c528db031f0",
                "filename": "CVE-2024-40984-a83e1385b780d41307433ddbc86e3c528db031f0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40984/CVE-2024-40984-a83e1385b780d41307433ddbc86e3c528db031f0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ae465109d82f4fb03c5adbe85f2d6a6a3d59124c",
                "patch_url": "https://git.kernel.org/stable/p/ae465109d82f4fb03c5adbe85f2d6a6a3d59124c",
                "filename": "CVE-2024-40984-ae465109d82f4fb03c5adbe85f2d6a6a3d59124c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40984/CVE-2024-40984-ae465109d82f4fb03c5adbe85f2d6a6a3d59124c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dc5017c57f5eee80020c73ff8b67ba7f9fd08b1f",
                "patch_url": "https://git.kernel.org/stable/p/dc5017c57f5eee80020c73ff8b67ba7f9fd08b1f",
                "filename": "CVE-2024-40984-dc5017c57f5eee80020c73ff8b67ba7f9fd08b1f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40984/CVE-2024-40984-dc5017c57f5eee80020c73ff8b67ba7f9fd08b1f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ddc1f5f124479360a1fd43f73be950781d172239",
                "patch_url": "https://git.kernel.org/stable/p/ddc1f5f124479360a1fd43f73be950781d172239",
                "filename": "CVE-2024-40984-ddc1f5f124479360a1fd43f73be950781d172239.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40984/CVE-2024-40984-ddc1f5f124479360a1fd43f73be950781d172239.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e21a4c9129c72fa54dd00f5ebf71219b41d43c04",
                "patch_url": "https://git.kernel.org/stable/p/e21a4c9129c72fa54dd00f5ebf71219b41d43c04",
                "filename": "CVE-2024-40984-e21a4c9129c72fa54dd00f5ebf71219b41d43c04.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40984/CVE-2024-40984-e21a4c9129c72fa54dd00f5ebf71219b41d43c04.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/434c6b924e1f4c219aab2d9e05fe79c5364e37d3",
            "https://git.kernel.org/stable/c/435ecc978c3d5d0c4e172ec5b956dc1904061d98",
            "https://git.kernel.org/stable/c/6eca23100e9030725f69c1babacd58803f29ec8d",
            "https://git.kernel.org/stable/c/a83e1385b780d41307433ddbc86e3c528db031f0",
            "https://git.kernel.org/stable/c/ae465109d82f4fb03c5adbe85f2d6a6a3d59124c",
            "https://git.kernel.org/stable/c/dc5017c57f5eee80020c73ff8b67ba7f9fd08b1f",
            "https://git.kernel.org/stable/c/ddc1f5f124479360a1fd43f73be950781d172239",
            "https://git.kernel.org/stable/c/e21a4c9129c72fa54dd00f5ebf71219b41d43c04",
            "https://www.cve.org/CVERecord?id=CVE-2024-40984\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40984\nhttps://lore.kernel.org/linux-cve-announce/2024071201-CVE-2024-40984-66b2@gregkh/T"
        ]
    },
    "CVE-2024-40988": {
        "cve": "CVE-2024-40988",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix UBSAN warning in kv_dpm.c\n\nAdds bounds check for sumo_vid_mapping_entry.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40988",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/468a50fd46a09bba7ba18a11054ae64b6479ecdc",
            "patch_url": "https://git.kernel.org/stable/p/468a50fd46a09bba7ba18a11054ae64b6479ecdc",
            "filename": "CVE-2024-40988-468a50fd46a09bba7ba18a11054ae64b6479ecdc.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40988/CVE-2024-40988-468a50fd46a09bba7ba18a11054ae64b6479ecdc.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/07e8f15fa16695cf4c90e89854e59af4a760055b",
                "patch_url": "https://git.kernel.org/stable/p/07e8f15fa16695cf4c90e89854e59af4a760055b",
                "filename": "CVE-2024-40988-07e8f15fa16695cf4c90e89854e59af4a760055b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40988/CVE-2024-40988-07e8f15fa16695cf4c90e89854e59af4a760055b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/468a50fd46a09bba7ba18a11054ae64b6479ecdc",
                "patch_url": "https://git.kernel.org/stable/p/468a50fd46a09bba7ba18a11054ae64b6479ecdc",
                "filename": "CVE-2024-40988-468a50fd46a09bba7ba18a11054ae64b6479ecdc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40988/CVE-2024-40988-468a50fd46a09bba7ba18a11054ae64b6479ecdc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9e57611182a817824a17b1c3dd300ee74a174b42",
                "patch_url": "https://git.kernel.org/stable/p/9e57611182a817824a17b1c3dd300ee74a174b42",
                "filename": "CVE-2024-40988-9e57611182a817824a17b1c3dd300ee74a174b42.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40988/CVE-2024-40988-9e57611182a817824a17b1c3dd300ee74a174b42.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a498df5421fd737d11bfd152428ba6b1c8538321",
                "patch_url": "https://git.kernel.org/stable/p/a498df5421fd737d11bfd152428ba6b1c8538321",
                "filename": "CVE-2024-40988-a498df5421fd737d11bfd152428ba6b1c8538321.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40988/CVE-2024-40988-a498df5421fd737d11bfd152428ba6b1c8538321.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a8c6df9fe5bc390645d1e96eff14ffe414951aad",
                "patch_url": "https://git.kernel.org/stable/p/a8c6df9fe5bc390645d1e96eff14ffe414951aad",
                "filename": "CVE-2024-40988-a8c6df9fe5bc390645d1e96eff14ffe414951aad.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40988/CVE-2024-40988-a8c6df9fe5bc390645d1e96eff14ffe414951aad.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf1cc8fcfe517e108794fb711f7faabfca0dc855",
                "patch_url": "https://git.kernel.org/stable/p/cf1cc8fcfe517e108794fb711f7faabfca0dc855",
                "filename": "CVE-2024-40988-cf1cc8fcfe517e108794fb711f7faabfca0dc855.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40988/CVE-2024-40988-cf1cc8fcfe517e108794fb711f7faabfca0dc855.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f803532bc3825384100dfc58873e035d77248447",
                "patch_url": "https://git.kernel.org/stable/p/f803532bc3825384100dfc58873e035d77248447",
                "filename": "CVE-2024-40988-f803532bc3825384100dfc58873e035d77248447.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40988/CVE-2024-40988-f803532bc3825384100dfc58873e035d77248447.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/febe794b83693257f21a23d2e03ea695a62449c8",
                "patch_url": "https://git.kernel.org/stable/p/febe794b83693257f21a23d2e03ea695a62449c8",
                "filename": "CVE-2024-40988-febe794b83693257f21a23d2e03ea695a62449c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40988/CVE-2024-40988-febe794b83693257f21a23d2e03ea695a62449c8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/07e8f15fa16695cf4c90e89854e59af4a760055b",
            "https://git.kernel.org/stable/c/468a50fd46a09bba7ba18a11054ae64b6479ecdc",
            "https://git.kernel.org/stable/c/9e57611182a817824a17b1c3dd300ee74a174b42",
            "https://git.kernel.org/stable/c/a498df5421fd737d11bfd152428ba6b1c8538321",
            "https://git.kernel.org/stable/c/a8c6df9fe5bc390645d1e96eff14ffe414951aad",
            "https://git.kernel.org/stable/c/cf1cc8fcfe517e108794fb711f7faabfca0dc855",
            "https://git.kernel.org/stable/c/f803532bc3825384100dfc58873e035d77248447",
            "https://git.kernel.org/stable/c/febe794b83693257f21a23d2e03ea695a62449c8",
            "https://www.cve.org/CVERecord?id=CVE-2024-40988\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40988\nhttps://lore.kernel.org/linux-cve-announce/2024071249-CVE-2024-40988-490e@gregkh/T"
        ]
    },
    "CVE-2024-40989": {
        "cve": "CVE-2024-40989",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Disassociate vcpus from redistributor region on teardown\n\nWhen tearing down a redistributor region, make sure we don't have\nany dangling pointer to that region stored in a vcpu.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40989",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0d92e4a7ffd5c42b9fa864692f82476c0bf8bcc8",
            "patch_url": "https://git.kernel.org/stable/p/0d92e4a7ffd5c42b9fa864692f82476c0bf8bcc8",
            "filename": "CVE-2024-40989-0d92e4a7ffd5c42b9fa864692f82476c0bf8bcc8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40989/CVE-2024-40989-0d92e4a7ffd5c42b9fa864692f82476c0bf8bcc8.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0d92e4a7ffd5c42b9fa864692f82476c0bf8bcc8",
                "patch_url": "https://git.kernel.org/stable/p/0d92e4a7ffd5c42b9fa864692f82476c0bf8bcc8",
                "filename": "CVE-2024-40989-0d92e4a7ffd5c42b9fa864692f82476c0bf8bcc8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40989/CVE-2024-40989-0d92e4a7ffd5c42b9fa864692f82476c0bf8bcc8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/152b4123f21e6aff31cea01158176ad96a999c76",
                "patch_url": "https://git.kernel.org/stable/p/152b4123f21e6aff31cea01158176ad96a999c76",
                "filename": "CVE-2024-40989-152b4123f21e6aff31cea01158176ad96a999c76.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40989/CVE-2024-40989-152b4123f21e6aff31cea01158176ad96a999c76.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/48bb62859d47c5c4197a8c01128d0fa4f46ee58c",
                "patch_url": "https://git.kernel.org/stable/p/48bb62859d47c5c4197a8c01128d0fa4f46ee58c",
                "filename": "CVE-2024-40989-48bb62859d47c5c4197a8c01128d0fa4f46ee58c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40989/CVE-2024-40989-48bb62859d47c5c4197a8c01128d0fa4f46ee58c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/68df4fc449fcc24347209e500ce26d5816705a77",
                "patch_url": "https://git.kernel.org/stable/p/68df4fc449fcc24347209e500ce26d5816705a77",
                "filename": "CVE-2024-40989-68df4fc449fcc24347209e500ce26d5816705a77.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40989/CVE-2024-40989-68df4fc449fcc24347209e500ce26d5816705a77.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0d92e4a7ffd5c42b9fa864692f82476c0bf8bcc8",
            "https://git.kernel.org/stable/c/152b4123f21e6aff31cea01158176ad96a999c76",
            "https://git.kernel.org/stable/c/48bb62859d47c5c4197a8c01128d0fa4f46ee58c",
            "https://git.kernel.org/stable/c/68df4fc449fcc24347209e500ce26d5816705a77",
            "https://www.cve.org/CVERecord?id=CVE-2024-40989\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40989\nhttps://lore.kernel.org/linux-cve-announce/2024071249-CVE-2024-40989-c8da@gregkh/T"
        ]
    },
    "CVE-2024-40995": {
        "cve": "CVE-2024-40995",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()\n\nsyzbot found hanging tasks waiting on rtnl_lock [1]\n\nA reproducer is available in the syzbot bug.\n\nWhen a request to add multiple actions with the same index is sent, the\nsecond request will block forever on the first request. This holds\nrtnl_lock, and causes tasks to hang.\n\nReturn -EAGAIN to prevent infinite looping, while keeping documented\nbehavior.\n\n[1]\n\nINFO: task kworker/1:0:5088 blocked for more than 143 seconds.\nNot tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0\n\"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000\nWorkqueue: events_power_efficient reg_check_chans_work\nCall Trace:\n<TASK>\ncontext_switch kernel/sched/core.c:5409 [inline]\n__schedule+0xf15/0x5d00 kernel/sched/core.c:6746\n__schedule_loop kernel/sched/core.c:6823 [inline]\nschedule+0xe7/0x350 kernel/sched/core.c:6838\nschedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895\n__mutex_lock_common kernel/locking/mutex.c:684 [inline]\n__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752\nwiphy_lock include/net/cfg80211.h:5953 [inline]\nreg_leave_invalid_chans net/wireless/reg.c:2466 [inline]\nreg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40995",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0d8a2d287c8a394c0d4653f0c6c7be4c688e5a74",
            "patch_url": "https://git.kernel.org/stable/p/0d8a2d287c8a394c0d4653f0c6c7be4c688e5a74",
            "filename": "CVE-2024-40995-0d8a2d287c8a394c0d4653f0c6c7be4c688e5a74.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40995/CVE-2024-40995-0d8a2d287c8a394c0d4653f0c6c7be4c688e5a74.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0d8a2d287c8a394c0d4653f0c6c7be4c688e5a74",
                "patch_url": "https://git.kernel.org/stable/p/0d8a2d287c8a394c0d4653f0c6c7be4c688e5a74",
                "filename": "CVE-2024-40995-0d8a2d287c8a394c0d4653f0c6c7be4c688e5a74.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40995/CVE-2024-40995-0d8a2d287c8a394c0d4653f0c6c7be4c688e5a74.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/25987a97eec4d5f897cd04ee1b45170829c610da",
                "patch_url": "https://git.kernel.org/stable/p/25987a97eec4d5f897cd04ee1b45170829c610da",
                "filename": "CVE-2024-40995-25987a97eec4d5f897cd04ee1b45170829c610da.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40995/CVE-2024-40995-25987a97eec4d5f897cd04ee1b45170829c610da.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5f926aa96b08b6c47178fe1171e7ae331c695fc2",
                "patch_url": "https://git.kernel.org/stable/p/5f926aa96b08b6c47178fe1171e7ae331c695fc2",
                "filename": "CVE-2024-40995-5f926aa96b08b6c47178fe1171e7ae331c695fc2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40995/CVE-2024-40995-5f926aa96b08b6c47178fe1171e7ae331c695fc2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6fc78d67f51aeb9a542d39a8714e16bc411582d4",
                "patch_url": "https://git.kernel.org/stable/p/6fc78d67f51aeb9a542d39a8714e16bc411582d4",
                "filename": "CVE-2024-40995-6fc78d67f51aeb9a542d39a8714e16bc411582d4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40995/CVE-2024-40995-6fc78d67f51aeb9a542d39a8714e16bc411582d4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7a0e497b597df7c4cf2b63fc6e9188b6cabe5335",
                "patch_url": "https://git.kernel.org/stable/p/7a0e497b597df7c4cf2b63fc6e9188b6cabe5335",
                "filename": "CVE-2024-40995-7a0e497b597df7c4cf2b63fc6e9188b6cabe5335.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40995/CVE-2024-40995-7a0e497b597df7c4cf2b63fc6e9188b6cabe5335.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c6a7da65a296745535a964be1019ec7691b0cb90",
                "patch_url": "https://git.kernel.org/stable/p/c6a7da65a296745535a964be1019ec7691b0cb90",
                "filename": "CVE-2024-40995-c6a7da65a296745535a964be1019ec7691b0cb90.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40995/CVE-2024-40995-c6a7da65a296745535a964be1019ec7691b0cb90.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d864319871b05fadd153e0aede4811ca7008f5d6",
                "patch_url": "https://git.kernel.org/stable/p/d864319871b05fadd153e0aede4811ca7008f5d6",
                "filename": "CVE-2024-40995-d864319871b05fadd153e0aede4811ca7008f5d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40995/CVE-2024-40995-d864319871b05fadd153e0aede4811ca7008f5d6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0d8a2d287c8a394c0d4653f0c6c7be4c688e5a74",
            "https://git.kernel.org/stable/c/25987a97eec4d5f897cd04ee1b45170829c610da",
            "https://git.kernel.org/stable/c/5f926aa96b08b6c47178fe1171e7ae331c695fc2",
            "https://git.kernel.org/stable/c/6fc78d67f51aeb9a542d39a8714e16bc411582d4",
            "https://git.kernel.org/stable/c/7a0e497b597df7c4cf2b63fc6e9188b6cabe5335",
            "https://git.kernel.org/stable/c/c6a7da65a296745535a964be1019ec7691b0cb90",
            "https://git.kernel.org/stable/c/d864319871b05fadd153e0aede4811ca7008f5d6",
            "https://www.cve.org/CVERecord?id=CVE-2024-40995\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40995\nhttps://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40995-2a5c@gregkh/T"
        ]
    },
    "CVE-2024-40997": {
        "cve": "CVE-2024-40997",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: amd-pstate: fix memory leak on CPU EPP exit\n\nThe cpudata memory from kzalloc() in amd_pstate_epp_cpu_init() is\nnot freed in the analogous exit function, so fix that.\n\n[ rjw: Subject and changelog edits ]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40997",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/448efb7ea0bfa2c4e27c5a2eb5684fd225cd12cd",
            "patch_url": "https://git.kernel.org/stable/p/448efb7ea0bfa2c4e27c5a2eb5684fd225cd12cd",
            "filename": "CVE-2024-40997-448efb7ea0bfa2c4e27c5a2eb5684fd225cd12cd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40997/CVE-2024-40997-448efb7ea0bfa2c4e27c5a2eb5684fd225cd12cd.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/448efb7ea0bfa2c4e27c5a2eb5684fd225cd12cd",
                "patch_url": "https://git.kernel.org/stable/p/448efb7ea0bfa2c4e27c5a2eb5684fd225cd12cd",
                "filename": "CVE-2024-40997-448efb7ea0bfa2c4e27c5a2eb5684fd225cd12cd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40997/CVE-2024-40997-448efb7ea0bfa2c4e27c5a2eb5684fd225cd12cd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8015c17fe11a8608cc3eb83d0ab831e1845a9582",
                "patch_url": "https://git.kernel.org/stable/p/8015c17fe11a8608cc3eb83d0ab831e1845a9582",
                "filename": "CVE-2024-40997-8015c17fe11a8608cc3eb83d0ab831e1845a9582.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40997/CVE-2024-40997-8015c17fe11a8608cc3eb83d0ab831e1845a9582.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cea04f3d9aeebda9d9c063c0dfa71e739c322c81",
                "patch_url": "https://git.kernel.org/stable/p/cea04f3d9aeebda9d9c063c0dfa71e739c322c81",
                "filename": "CVE-2024-40997-cea04f3d9aeebda9d9c063c0dfa71e739c322c81.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40997/CVE-2024-40997-cea04f3d9aeebda9d9c063c0dfa71e739c322c81.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/448efb7ea0bfa2c4e27c5a2eb5684fd225cd12cd",
            "https://git.kernel.org/stable/c/8015c17fe11a8608cc3eb83d0ab831e1845a9582",
            "https://git.kernel.org/stable/c/cea04f3d9aeebda9d9c063c0dfa71e739c322c81",
            "https://www.cve.org/CVERecord?id=CVE-2024-40997\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40997\nhttps://lore.kernel.org/linux-cve-announce/2024071251-CVE-2024-40997-df97@gregkh/T"
        ]
    },
    "CVE-2024-40998": {
        "cve": "CVE-2024-40998",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super()\n\nIn the following concurrency we will access the uninitialized rs->lock:\n\next4_fill_super\n  ext4_register_sysfs\n   // sysfs registered msg_ratelimit_interval_ms\n                             // Other processes modify rs->interval to\n                             // non-zero via msg_ratelimit_interval_ms\n  ext4_orphan_cleanup\n    ext4_msg(sb, KERN_INFO, \"Errors on filesystem, \"\n      __ext4_msg\n        ___ratelimit(&(EXT4_SB(sb)->s_msg_ratelimit_state)\n          if (!rs->interval)  // do nothing if interval is 0\n            return 1;\n          raw_spin_trylock_irqsave(&rs->lock, flags)\n            raw_spin_trylock(lock)\n              _raw_spin_trylock\n                __raw_spin_trylock\n                  spin_acquire(&lock->dep_map, 0, 1, _RET_IP_)\n                    lock_acquire\n                      __lock_acquire\n                        register_lock_class\n                          assign_lock_key\n                            dump_stack();\n  ratelimit_state_init(&sbi->s_msg_ratelimit_state, 5 * HZ, 10);\n    raw_spin_lock_init(&rs->lock);\n    // init rs->lock here\n\nand get the following dump_stack:\n\n=========================================================\nINFO: trying to register non-static key.\nThe code is fine but needs lockdep annotation, or maybe\nyou didn't initialize this object before use?\nturning off the locking correctness validator.\nCPU: 12 PID: 753 Comm: mount Tainted: G E 6.7.0-rc6-next-20231222 #504\n[...]\nCall Trace:\n dump_stack_lvl+0xc5/0x170\n dump_stack+0x18/0x30\n register_lock_class+0x740/0x7c0\n __lock_acquire+0x69/0x13a0\n lock_acquire+0x120/0x450\n _raw_spin_trylock+0x98/0xd0\n ___ratelimit+0xf6/0x220\n __ext4_msg+0x7f/0x160 [ext4]\n ext4_orphan_cleanup+0x665/0x740 [ext4]\n __ext4_fill_super+0x21ea/0x2b10 [ext4]\n ext4_fill_super+0x14d/0x360 [ext4]\n[...]\n=========================================================\n\nNormally interval is 0 until s_msg_ratelimit_state is initialized, so\n___ratelimit() does nothing. But registering sysfs precedes initializing\nrs->lock, so it is possible to change rs->interval to a non-zero value\nvia the msg_ratelimit_interval_ms interface of sysfs while rs->lock is\nuninitialized, and then a call to ext4_msg triggers the problem by\naccessing an uninitialized rs->lock. Therefore register sysfs after all\ninitializations are complete to avoid such problems.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-40998",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/23afcd52af06880c6c913a0ad99022b8937b575c",
            "patch_url": "https://git.kernel.org/stable/p/23afcd52af06880c6c913a0ad99022b8937b575c",
            "filename": "CVE-2024-40998-23afcd52af06880c6c913a0ad99022b8937b575c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40998/CVE-2024-40998-23afcd52af06880c6c913a0ad99022b8937b575c.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/23afcd52af06880c6c913a0ad99022b8937b575c",
                "patch_url": "https://git.kernel.org/stable/p/23afcd52af06880c6c913a0ad99022b8937b575c",
                "filename": "CVE-2024-40998-23afcd52af06880c6c913a0ad99022b8937b575c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40998/CVE-2024-40998-23afcd52af06880c6c913a0ad99022b8937b575c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/645267906944a9aeec9d5c56ee24a9096a288798",
                "patch_url": "https://git.kernel.org/stable/p/645267906944a9aeec9d5c56ee24a9096a288798",
                "filename": "CVE-2024-40998-645267906944a9aeec9d5c56ee24a9096a288798.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40998/CVE-2024-40998-645267906944a9aeec9d5c56ee24a9096a288798.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b4b4fda34e535756f9e774fb2d09c4537b7dfd1c",
                "patch_url": "https://git.kernel.org/stable/p/b4b4fda34e535756f9e774fb2d09c4537b7dfd1c",
                "filename": "CVE-2024-40998-b4b4fda34e535756f9e774fb2d09c4537b7dfd1c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-40998/CVE-2024-40998-b4b4fda34e535756f9e774fb2d09c4537b7dfd1c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/23afcd52af06880c6c913a0ad99022b8937b575c",
            "https://git.kernel.org/stable/c/645267906944a9aeec9d5c56ee24a9096a288798",
            "https://git.kernel.org/stable/c/b4b4fda34e535756f9e774fb2d09c4537b7dfd1c",
            "https://www.cve.org/CVERecord?id=CVE-2024-40998\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-40998\nhttps://lore.kernel.org/linux-cve-announce/2024071252-CVE-2024-40998-90d6@gregkh/T"
        ]
    },
    "CVE-2024-41005": {
        "cve": "CVE-2024-41005",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetpoll: Fix race condition in netpoll_owner_active\n\nKCSAN detected a race condition in netpoll:\n\n\tBUG: KCSAN: data-race in net_rx_action / netpoll_send_skb\n\twrite (marked) to 0xffff8881164168b0 of 4 bytes by interrupt on cpu 10:\n\tnet_rx_action (./include/linux/netpoll.h:90 net/core/dev.c:6712 net/core/dev.c:6822)\n<snip>\n\tread to 0xffff8881164168b0 of 4 bytes by task 1 on cpu 2:\n\tnetpoll_send_skb (net/core/netpoll.c:319 net/core/netpoll.c:345 net/core/netpoll.c:393)\n\tnetpoll_send_udp (net/core/netpoll.c:?)\n<snip>\n\tvalue changed: 0x0000000a -> 0xffffffff\n\nThis happens because netpoll_owner_active() needs to check if the\ncurrent CPU is the owner of the lock, touching napi->poll_owner\nnon atomically. The ->poll_owner field contains the current CPU holding\nthe lock.\n\nUse an atomic read to check if the poll owner is the current CPU.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41005",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3f1a155950a1685ffd0fd7175b3f671da8771f3d",
            "patch_url": "https://git.kernel.org/stable/p/3f1a155950a1685ffd0fd7175b3f671da8771f3d",
            "filename": "CVE-2024-41005-3f1a155950a1685ffd0fd7175b3f671da8771f3d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41005/CVE-2024-41005-3f1a155950a1685ffd0fd7175b3f671da8771f3d.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3f1a155950a1685ffd0fd7175b3f671da8771f3d",
                "patch_url": "https://git.kernel.org/stable/p/3f1a155950a1685ffd0fd7175b3f671da8771f3d",
                "filename": "CVE-2024-41005-3f1a155950a1685ffd0fd7175b3f671da8771f3d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41005/CVE-2024-41005-3f1a155950a1685ffd0fd7175b3f671da8771f3d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/43c0ca793a18578a0f5b305dd77fcf7ed99f1265",
                "patch_url": "https://git.kernel.org/stable/p/43c0ca793a18578a0f5b305dd77fcf7ed99f1265",
                "filename": "CVE-2024-41005-43c0ca793a18578a0f5b305dd77fcf7ed99f1265.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41005/CVE-2024-41005-43c0ca793a18578a0f5b305dd77fcf7ed99f1265.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/96826b16ef9c6568d31a1f6ceaa266411a46e46c",
                "patch_url": "https://git.kernel.org/stable/p/96826b16ef9c6568d31a1f6ceaa266411a46e46c",
                "filename": "CVE-2024-41005-96826b16ef9c6568d31a1f6ceaa266411a46e46c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41005/CVE-2024-41005-96826b16ef9c6568d31a1f6ceaa266411a46e46c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a130e7da73ae93afdb4659842267eec734ffbd57",
                "patch_url": "https://git.kernel.org/stable/p/a130e7da73ae93afdb4659842267eec734ffbd57",
                "filename": "CVE-2024-41005-a130e7da73ae93afdb4659842267eec734ffbd57.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41005/CVE-2024-41005-a130e7da73ae93afdb4659842267eec734ffbd57.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c2e6a872bde9912f1a7579639c5ca3adf1003916",
                "patch_url": "https://git.kernel.org/stable/p/c2e6a872bde9912f1a7579639c5ca3adf1003916",
                "filename": "CVE-2024-41005-c2e6a872bde9912f1a7579639c5ca3adf1003916.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41005/CVE-2024-41005-c2e6a872bde9912f1a7579639c5ca3adf1003916.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/efd29cd9c7b8369dfc7bcb34637e6bf1a188aa8e",
                "patch_url": "https://git.kernel.org/stable/p/efd29cd9c7b8369dfc7bcb34637e6bf1a188aa8e",
                "filename": "CVE-2024-41005-efd29cd9c7b8369dfc7bcb34637e6bf1a188aa8e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41005/CVE-2024-41005-efd29cd9c7b8369dfc7bcb34637e6bf1a188aa8e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3f1a155950a1685ffd0fd7175b3f671da8771f3d",
            "https://git.kernel.org/stable/c/43c0ca793a18578a0f5b305dd77fcf7ed99f1265",
            "https://git.kernel.org/stable/c/96826b16ef9c6568d31a1f6ceaa266411a46e46c",
            "https://git.kernel.org/stable/c/a130e7da73ae93afdb4659842267eec734ffbd57",
            "https://git.kernel.org/stable/c/c2e6a872bde9912f1a7579639c5ca3adf1003916",
            "https://git.kernel.org/stable/c/efd29cd9c7b8369dfc7bcb34637e6bf1a188aa8e",
            "https://www.cve.org/CVERecord?id=CVE-2024-41005\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41005\nhttps://lore.kernel.org/linux-cve-announce/2024071244-CVE-2024-41005-b2a5@gregkh/T"
        ]
    },
    "CVE-2024-41007": {
        "cve": "CVE-2024-41007",
        "cvss_v2": null,
        "cvss_v3": 3.3,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: avoid too many retransmit packets\n\nIf a TCP socket is using TCP_USER_TIMEOUT, and the other peer\nretracted its window to zero, tcp_retransmit_timer() can\nretransmit a packet every two jiffies (2 ms for HZ=1000),\nfor about 4 minutes after TCP_USER_TIMEOUT has 'expired'.\n\nThe fix is to make sure tcp_rtx_probe0_timed_out() takes\nicsk->icsk_user_timeout into account.\n\nBefore blamed commit, the socket would not timeout after\nicsk->icsk_user_timeout, but would use standard exponential\nbackoff for the retransmits.\n\nAlso worth noting that before commit e89688e3e978 (\"net: tcp:\nfix unexcepted socket die when snd_wnd is 0\"), the issue\nwould last 2 minutes instead of 4.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41007",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/04317a2471c2f637b4c49cbd0e9c0d04a519f570",
            "patch_url": "https://git.kernel.org/stable/p/04317a2471c2f637b4c49cbd0e9c0d04a519f570",
            "filename": "CVE-2024-41007-04317a2471c2f637b4c49cbd0e9c0d04a519f570.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41007/CVE-2024-41007-04317a2471c2f637b4c49cbd0e9c0d04a519f570.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/04317a2471c2f637b4c49cbd0e9c0d04a519f570",
                "patch_url": "https://git.kernel.org/stable/p/04317a2471c2f637b4c49cbd0e9c0d04a519f570",
                "filename": "CVE-2024-41007-04317a2471c2f637b4c49cbd0e9c0d04a519f570.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41007/CVE-2024-41007-04317a2471c2f637b4c49cbd0e9c0d04a519f570.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5d7e64d70a11d988553a08239c810a658e841982",
                "patch_url": "https://git.kernel.org/stable/p/5d7e64d70a11d988553a08239c810a658e841982",
                "filename": "CVE-2024-41007-5d7e64d70a11d988553a08239c810a658e841982.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41007/CVE-2024-41007-5d7e64d70a11d988553a08239c810a658e841982.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/66cb64a1d2239cd0309f9b5038b05462570a5be1",
                "patch_url": "https://git.kernel.org/stable/p/66cb64a1d2239cd0309f9b5038b05462570a5be1",
                "filename": "CVE-2024-41007-66cb64a1d2239cd0309f9b5038b05462570a5be1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41007/CVE-2024-41007-66cb64a1d2239cd0309f9b5038b05462570a5be1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7bb7670f92bfbd05fc41a8f9a8f358b7ffed65f4",
                "patch_url": "https://git.kernel.org/stable/p/7bb7670f92bfbd05fc41a8f9a8f358b7ffed65f4",
                "filename": "CVE-2024-41007-7bb7670f92bfbd05fc41a8f9a8f358b7ffed65f4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41007/CVE-2024-41007-7bb7670f92bfbd05fc41a8f9a8f358b7ffed65f4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/97a9063518f198ec0adb2ecb89789de342bb8283",
                "patch_url": "https://git.kernel.org/stable/p/97a9063518f198ec0adb2ecb89789de342bb8283",
                "filename": "CVE-2024-41007-97a9063518f198ec0adb2ecb89789de342bb8283.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41007/CVE-2024-41007-97a9063518f198ec0adb2ecb89789de342bb8283.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d2346fca5bed130dc712f276ac63450201d52969",
                "patch_url": "https://git.kernel.org/stable/p/d2346fca5bed130dc712f276ac63450201d52969",
                "filename": "CVE-2024-41007-d2346fca5bed130dc712f276ac63450201d52969.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41007/CVE-2024-41007-d2346fca5bed130dc712f276ac63450201d52969.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dfcdd7f89e401d2c6616be90c76c2fac3fa98fde",
                "patch_url": "https://git.kernel.org/stable/p/dfcdd7f89e401d2c6616be90c76c2fac3fa98fde",
                "filename": "CVE-2024-41007-dfcdd7f89e401d2c6616be90c76c2fac3fa98fde.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41007/CVE-2024-41007-dfcdd7f89e401d2c6616be90c76c2fac3fa98fde.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e113cddefa27bbf5a79f72387b8fbd432a61a466",
                "patch_url": "https://git.kernel.org/stable/p/e113cddefa27bbf5a79f72387b8fbd432a61a466",
                "filename": "CVE-2024-41007-e113cddefa27bbf5a79f72387b8fbd432a61a466.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41007/CVE-2024-41007-e113cddefa27bbf5a79f72387b8fbd432a61a466.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/04317a2471c2f637b4c49cbd0e9c0d04a519f570",
            "https://git.kernel.org/stable/c/5d7e64d70a11d988553a08239c810a658e841982",
            "https://git.kernel.org/stable/c/66cb64a1d2239cd0309f9b5038b05462570a5be1",
            "https://git.kernel.org/stable/c/7bb7670f92bfbd05fc41a8f9a8f358b7ffed65f4",
            "https://git.kernel.org/stable/c/97a9063518f198ec0adb2ecb89789de342bb8283",
            "https://git.kernel.org/stable/c/d2346fca5bed130dc712f276ac63450201d52969",
            "https://git.kernel.org/stable/c/dfcdd7f89e401d2c6616be90c76c2fac3fa98fde",
            "https://git.kernel.org/stable/c/e113cddefa27bbf5a79f72387b8fbd432a61a466",
            "https://www.cve.org/CVERecord?id=CVE-2024-41007\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41007\nhttps://lore.kernel.org/linux-cve-announce/2024071513-CVE-2024-41007-777c@gregkh/T"
        ]
    },
    "CVE-2024-41008": {
        "cve": "CVE-2024-41008",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: change vm->task_info handling\n\nThis patch changes the handling and lifecycle of vm->task_info object.\nThe major changes are:\n- vm->task_info is a dynamically allocated ptr now, and its uasge is\n  reference counted.\n- introducing two new helper funcs for task_info lifecycle management\n    - amdgpu_vm_get_task_info: reference counts up task_info before\n      returning this info\n    - amdgpu_vm_put_task_info: reference counts down task_info\n- last put to task_info() frees task_info from the vm.\n\nThis patch also does logistical changes required for existing usage\nof vm->task_info.\n\nV2: Do not block all the prints when task_info not found (Felix)\n\nV3: Fixed review comments from Felix\n   - Fix wrong indentation\n   - No debug message for -ENOMEM\n   - Add NULL check for task_info\n   - Do not duplicate the debug messages (ti vs no ti)\n   - Get first reference of task_info in vm_init(), put last\n     in vm_fini()\n\nV4: Fixed review comments from Felix\n   - fix double reference increment in create_task_info\n   - change amdgpu_vm_get_task_info_pasid\n   - additional changes in amdgpu_gem.c while porting",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41008",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/b8f67b9ddf4f8fe6dd536590712b5912ad78f99c",
            "patch_url": "https://git.kernel.org/stable/p/b8f67b9ddf4f8fe6dd536590712b5912ad78f99c",
            "filename": "CVE-2024-41008-b8f67b9ddf4f8fe6dd536590712b5912ad78f99c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41008/CVE-2024-41008-b8f67b9ddf4f8fe6dd536590712b5912ad78f99c.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/b8f67b9ddf4f8fe6dd536590712b5912ad78f99c",
                "patch_url": "https://git.kernel.org/stable/p/b8f67b9ddf4f8fe6dd536590712b5912ad78f99c",
                "filename": "CVE-2024-41008-b8f67b9ddf4f8fe6dd536590712b5912ad78f99c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41008/CVE-2024-41008-b8f67b9ddf4f8fe6dd536590712b5912ad78f99c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/b8f67b9ddf4f8fe6dd536590712b5912ad78f99c",
            "https://www.cve.org/CVERecord?id=CVE-2024-41008\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41008\nhttps://lore.kernel.org/linux-cve-announce/20240716080357.2696435-2-lee@kernel.org/T"
        ]
    },
    "CVE-2024-41009": {
        "cve": "CVE-2024-41009",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix overrunning reservations in ringbuf\n\nThe BPF ring buffer internally is implemented as a power-of-2 sized circular\nbuffer, with two logical and ever-increasing counters: consumer_pos is the\nconsumer counter to show which logical position the consumer consumed the\ndata, and producer_pos which is the producer counter denoting the amount of\ndata reserved by all producers.\n\nEach time a record is reserved, the producer that \"owns\" the record will\nsuccessfully advance producer counter. In user space each time a record is\nread, the consumer of the data advanced the consumer counter once it finished\nprocessing. Both counters are stored in separate pages so that from user\nspace, the producer counter is read-only and the consumer counter is read-write.\n\nOne aspect that simplifies and thus speeds up the implementation of both\nproducers and consumers is how the data area is mapped twice contiguously\nback-to-back in the virtual memory, allowing to not take any special measures\nfor samples that have to wrap around at the end of the circular buffer data\narea, because the next page after the last data page would be first data page\nagain, and thus the sample will still appear completely contiguous in virtual\nmemory.\n\nEach record has a struct bpf_ringbuf_hdr { u32 len; u32 pg_off; } header for\nbook-keeping the length and offset, and is inaccessible to the BPF program.\nHelpers like bpf_ringbuf_reserve() return `(void *)hdr + BPF_RINGBUF_HDR_SZ`\nfor the BPF program to use. Bing-Jhong and Muhammad reported that it is however\npossible to make a second allocated memory chunk overlapping with the first\nchunk and as a result, the BPF program is now able to edit first chunk's\nheader.\n\nFor example, consider the creation of a BPF_MAP_TYPE_RINGBUF map with size\nof 0x4000. Next, the consumer_pos is modified to 0x3000 /before/ a call to\nbpf_ringbuf_reserve() is made. This will allocate a chunk A, which is in\n[0x0,0x3008], and the BPF program is able to edit [0x8,0x3008]. Now, lets\nallocate a chunk B with size 0x3000. This will succeed because consumer_pos\nwas edited ahead of time to pass the `new_prod_pos - cons_pos > rb->mask`\ncheck. Chunk B will be in range [0x3008,0x6010], and the BPF program is able\nto edit [0x3010,0x6010]. Due to the ring buffer memory layout mentioned\nearlier, the ranges [0x0,0x4000] and [0x4000,0x8000] point to the same data\npages. This means that chunk B at [0x4000,0x4008] is chunk A's header.\nbpf_ringbuf_submit() / bpf_ringbuf_discard() use the header's pg_off to then\nlocate the bpf_ringbuf itself via bpf_ringbuf_restore_from_rec(). Once chunk\nB modified chunk A's header, then bpf_ringbuf_commit() refers to the wrong\npage and could cause a crash.\n\nFix it by calculating the oldest pending_pos and check whether the range\nfrom the oldest outstanding record to the newest would span beyond the ring\nbuffer size. If that is the case, then reject the request. We've tested with\nthe ring buffer benchmark in BPF selftests (./benchs/run_bench_ringbufs.sh)\nbefore/after the fix and while it seems a bit slower on some benchmarks, it\nis still not significantly enough to matter.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41009",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0f98f40eb1ed52af8b81f61901b6c0289ff59de4",
            "patch_url": "https://git.kernel.org/stable/p/0f98f40eb1ed52af8b81f61901b6c0289ff59de4",
            "filename": "CVE-2024-41009-0f98f40eb1ed52af8b81f61901b6c0289ff59de4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41009/CVE-2024-41009-0f98f40eb1ed52af8b81f61901b6c0289ff59de4.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0f98f40eb1ed52af8b81f61901b6c0289ff59de4",
                "patch_url": "https://git.kernel.org/stable/p/0f98f40eb1ed52af8b81f61901b6c0289ff59de4",
                "filename": "CVE-2024-41009-0f98f40eb1ed52af8b81f61901b6c0289ff59de4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41009/CVE-2024-41009-0f98f40eb1ed52af8b81f61901b6c0289ff59de4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/47416c852f2a04d348ea66ee451cbdcf8119f225",
                "patch_url": "https://git.kernel.org/stable/p/47416c852f2a04d348ea66ee451cbdcf8119f225",
                "filename": "CVE-2024-41009-47416c852f2a04d348ea66ee451cbdcf8119f225.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41009/CVE-2024-41009-47416c852f2a04d348ea66ee451cbdcf8119f225.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/511804ab701c0503b72eac08217eabfd366ba069",
                "patch_url": "https://git.kernel.org/stable/p/511804ab701c0503b72eac08217eabfd366ba069",
                "filename": "CVE-2024-41009-511804ab701c0503b72eac08217eabfd366ba069.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41009/CVE-2024-41009-511804ab701c0503b72eac08217eabfd366ba069.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/be35504b959f2749bab280f4671e8df96dcf836f",
                "patch_url": "https://git.kernel.org/stable/p/be35504b959f2749bab280f4671e8df96dcf836f",
                "filename": "CVE-2024-41009-be35504b959f2749bab280f4671e8df96dcf836f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41009/CVE-2024-41009-be35504b959f2749bab280f4671e8df96dcf836f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cfa1a2329a691ffd991fcf7248a57d752e712881",
                "patch_url": "https://git.kernel.org/stable/p/cfa1a2329a691ffd991fcf7248a57d752e712881",
                "filename": "CVE-2024-41009-cfa1a2329a691ffd991fcf7248a57d752e712881.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41009/CVE-2024-41009-cfa1a2329a691ffd991fcf7248a57d752e712881.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d1b9df0435bc61e0b44f578846516df8ef476686",
                "patch_url": "https://git.kernel.org/stable/p/d1b9df0435bc61e0b44f578846516df8ef476686",
                "filename": "CVE-2024-41009-d1b9df0435bc61e0b44f578846516df8ef476686.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41009/CVE-2024-41009-d1b9df0435bc61e0b44f578846516df8ef476686.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0f98f40eb1ed52af8b81f61901b6c0289ff59de4",
            "https://git.kernel.org/stable/c/47416c852f2a04d348ea66ee451cbdcf8119f225",
            "https://git.kernel.org/stable/c/511804ab701c0503b72eac08217eabfd366ba069",
            "https://git.kernel.org/stable/c/be35504b959f2749bab280f4671e8df96dcf836f",
            "https://git.kernel.org/stable/c/cfa1a2329a691ffd991fcf7248a57d752e712881",
            "https://git.kernel.org/stable/c/d1b9df0435bc61e0b44f578846516df8ef476686",
            "https://www.cve.org/CVERecord?id=CVE-2024-41009\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41009\nhttps://lore.kernel.org/linux-cve-announce/2024071715-CVE-2024-41009-cac5@gregkh/T"
        ]
    },
    "CVE-2024-41012": {
        "cve": "CVE-2024-41012",
        "cvss_v2": null,
        "cvss_v3": 6.3,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfilelock: Remove locks reliably when fcntl/close race is detected\n\nWhen fcntl_setlk() races with close(), it removes the created lock with\ndo_lock_file_wait().\nHowever, LSMs can allow the first do_lock_file_wait() that created the lock\nwhile denying the second do_lock_file_wait() that tries to remove the lock.\nSeparately, posix_lock_file() could also fail to\nremove a lock due to GFP_KERNEL allocation failure (when splitting a range\nin the middle).\n\nAfter the bug has been triggered, use-after-free reads will occur in\nlock_get_status() when userspace reads /proc/locks. This can likely be used\nto read arbitrary kernel memory, but can't corrupt kernel memory.\n\nFix it by calling locks_remove_posix() instead, which is designed to\nreliably get rid of POSIX locks associated with the given file and\nfiles_struct and is also used by filp_flush().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41012",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/d30ff33040834c3b9eee29740acd92f9c7ba2250",
            "patch_url": "https://git.kernel.org/stable/p/d30ff33040834c3b9eee29740acd92f9c7ba2250",
            "filename": "CVE-2024-41012-d30ff33040834c3b9eee29740acd92f9c7ba2250.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41012/CVE-2024-41012-d30ff33040834c3b9eee29740acd92f9c7ba2250.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3cad1bc010416c6dd780643476bc59ed742436b9",
                "patch_url": "https://git.kernel.org/stable/p/3cad1bc010416c6dd780643476bc59ed742436b9",
                "filename": "CVE-2024-41012-3cad1bc010416c6dd780643476bc59ed742436b9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41012/CVE-2024-41012-3cad1bc010416c6dd780643476bc59ed742436b9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/52c87ab18c76c14d7209646ccb3283b3f5d87b22",
                "patch_url": "https://git.kernel.org/stable/p/52c87ab18c76c14d7209646ccb3283b3f5d87b22",
                "filename": "CVE-2024-41012-52c87ab18c76c14d7209646ccb3283b3f5d87b22.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41012/CVE-2024-41012-52c87ab18c76c14d7209646ccb3283b3f5d87b22.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5661b9c7ec189406c2dde00837aaa4672efb6240",
                "patch_url": "https://git.kernel.org/stable/p/5661b9c7ec189406c2dde00837aaa4672efb6240",
                "filename": "CVE-2024-41012-5661b9c7ec189406c2dde00837aaa4672efb6240.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41012/CVE-2024-41012-5661b9c7ec189406c2dde00837aaa4672efb6240.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5f5d0799eb0a01d550c21b7894e26b2d9db55763",
                "patch_url": "https://git.kernel.org/stable/p/5f5d0799eb0a01d550c21b7894e26b2d9db55763",
                "filename": "CVE-2024-41012-5f5d0799eb0a01d550c21b7894e26b2d9db55763.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41012/CVE-2024-41012-5f5d0799eb0a01d550c21b7894e26b2d9db55763.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b6d223942c34057fdfd8f149e763fa823731b224",
                "patch_url": "https://git.kernel.org/stable/p/b6d223942c34057fdfd8f149e763fa823731b224",
                "filename": "CVE-2024-41012-b6d223942c34057fdfd8f149e763fa823731b224.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41012/CVE-2024-41012-b6d223942c34057fdfd8f149e763fa823731b224.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d30ff33040834c3b9eee29740acd92f9c7ba2250",
                "patch_url": "https://git.kernel.org/stable/p/d30ff33040834c3b9eee29740acd92f9c7ba2250",
                "filename": "CVE-2024-41012-d30ff33040834c3b9eee29740acd92f9c7ba2250.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41012/CVE-2024-41012-d30ff33040834c3b9eee29740acd92f9c7ba2250.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dc2ce1dfceaa0767211a9d963ddb029ab21c4235",
                "patch_url": "https://git.kernel.org/stable/p/dc2ce1dfceaa0767211a9d963ddb029ab21c4235",
                "filename": "CVE-2024-41012-dc2ce1dfceaa0767211a9d963ddb029ab21c4235.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41012/CVE-2024-41012-dc2ce1dfceaa0767211a9d963ddb029ab21c4235.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ef8fc41cd6f95f9a4a3470f085aecf350569a0b3",
                "patch_url": "https://git.kernel.org/stable/p/ef8fc41cd6f95f9a4a3470f085aecf350569a0b3",
                "filename": "CVE-2024-41012-ef8fc41cd6f95f9a4a3470f085aecf350569a0b3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41012/CVE-2024-41012-ef8fc41cd6f95f9a4a3470f085aecf350569a0b3.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3cad1bc010416c6dd780643476bc59ed742436b9",
            "https://git.kernel.org/stable/c/52c87ab18c76c14d7209646ccb3283b3f5d87b22",
            "https://git.kernel.org/stable/c/5661b9c7ec189406c2dde00837aaa4672efb6240",
            "https://git.kernel.org/stable/c/5f5d0799eb0a01d550c21b7894e26b2d9db55763",
            "https://git.kernel.org/stable/c/b6d223942c34057fdfd8f149e763fa823731b224",
            "https://git.kernel.org/stable/c/d30ff33040834c3b9eee29740acd92f9c7ba2250",
            "https://git.kernel.org/stable/c/dc2ce1dfceaa0767211a9d963ddb029ab21c4235",
            "https://git.kernel.org/stable/c/ef8fc41cd6f95f9a4a3470f085aecf350569a0b3",
            "https://www.cve.org/CVERecord?id=CVE-2024-41012\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41012\nhttps://lore.kernel.org/linux-cve-announce/2024072314-CVE-2024-41012-a1cf@gregkh/T"
        ]
    },
    "CVE-2024-41013": {
        "cve": "CVE-2024-41013",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: don't walk off the end of a directory data block\n\nThis adds sanity checks for xfs_dir2_data_unused and xfs_dir2_data_entry\nto make sure don't stray beyond valid memory region. Before patching, the\nloop simply checks that the start offset of the dup and dep is within the\nrange. So in a crafted image, if last entry is xfs_dir2_data_unused, we\ncan change dup->length to dup->length-1 and leave 1 byte of space. In the\nnext traversal, this space will be considered as dup or dep. We may\nencounter an out of bound read when accessing the fixed members.\n\nIn the patch, we make sure that the remaining bytes large enough to hold\nan unused entry before accessing xfs_dir2_data_unused and\nxfs_dir2_data_unused is XFS_DIR2_DATA_ALIGN byte aligned. We also make\nsure that the remaining bytes large enough to hold a dirent with a\nsingle-byte name before accessing xfs_dir2_data_entry.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41013",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ca96d83c93071f95cf962ce92406621a472df31b",
            "patch_url": "https://git.kernel.org/stable/p/ca96d83c93071f95cf962ce92406621a472df31b",
            "filename": "CVE-2024-41013-ca96d83c93071f95cf962ce92406621a472df31b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41013/CVE-2024-41013-ca96d83c93071f95cf962ce92406621a472df31b.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0c7fcdb6d06cdf8b19b57c17605215b06afa864a",
                "patch_url": "https://git.kernel.org/stable/p/0c7fcdb6d06cdf8b19b57c17605215b06afa864a",
                "filename": "CVE-2024-41013-0c7fcdb6d06cdf8b19b57c17605215b06afa864a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41013/CVE-2024-41013-0c7fcdb6d06cdf8b19b57c17605215b06afa864a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b0932e4f9da85349d1c8f2a77d2a7a7163b8511d",
                "patch_url": "https://git.kernel.org/stable/p/b0932e4f9da85349d1c8f2a77d2a7a7163b8511d",
                "filename": "CVE-2024-41013-b0932e4f9da85349d1c8f2a77d2a7a7163b8511d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41013/CVE-2024-41013-b0932e4f9da85349d1c8f2a77d2a7a7163b8511d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ca96d83c93071f95cf962ce92406621a472df31b",
                "patch_url": "https://git.kernel.org/stable/p/ca96d83c93071f95cf962ce92406621a472df31b",
                "filename": "CVE-2024-41013-ca96d83c93071f95cf962ce92406621a472df31b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41013/CVE-2024-41013-ca96d83c93071f95cf962ce92406621a472df31b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0c7fcdb6d06cdf8b19b57c17605215b06afa864a",
            "https://git.kernel.org/stable/c/b0932e4f9da85349d1c8f2a77d2a7a7163b8511d",
            "https://git.kernel.org/stable/c/ca96d83c93071f95cf962ce92406621a472df31b",
            "https://www.cve.org/CVERecord?id=CVE-2024-41013\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41013\nhttps://lore.kernel.org/linux-cve-announce/2024072908-CVE-2024-41013-2996@gregkh/T"
        ]
    },
    "CVE-2024-41014": {
        "cve": "CVE-2024-41014",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: add bounds checking to xlog_recover_process_data\n\nThere is a lack of verification of the space occupied by fixed members\nof xlog_op_header in the xlog_recover_process_data.\n\nWe can create a crafted image to trigger an out of bounds read by\nfollowing these steps:\n    1) Mount an image of xfs, and do some file operations to leave records\n    2) Before umounting, copy the image for subsequent steps to simulate\n       abnormal exit. Because umount will ensure that tail_blk and\n       head_blk are the same, which will result in the inability to enter\n       xlog_recover_process_data\n    3) Write a tool to parse and modify the copied image in step 2\n    4) Make the end of the xlog_op_header entries only 1 byte away from\n       xlog_rec_header->h_size\n    5) xlog_rec_header->h_num_logops++\n    6) Modify xlog_rec_header->h_crc\n\nFix:\nAdd a check to make sure there is sufficient space to access fixed members\nof xlog_op_header.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41014",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/d1e3efe783365db59da88f08a2e0bfe1cc95b143",
            "patch_url": "https://git.kernel.org/stable/p/d1e3efe783365db59da88f08a2e0bfe1cc95b143",
            "filename": "CVE-2024-41014-d1e3efe783365db59da88f08a2e0bfe1cc95b143.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41014/CVE-2024-41014-d1e3efe783365db59da88f08a2e0bfe1cc95b143.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/7cd9f0a33e738cd58876f1bc8d6c1aa5bc4fc8c1",
                "patch_url": "https://git.kernel.org/stable/p/7cd9f0a33e738cd58876f1bc8d6c1aa5bc4fc8c1",
                "filename": "CVE-2024-41014-7cd9f0a33e738cd58876f1bc8d6c1aa5bc4fc8c1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41014/CVE-2024-41014-7cd9f0a33e738cd58876f1bc8d6c1aa5bc4fc8c1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d1e3efe783365db59da88f08a2e0bfe1cc95b143",
                "patch_url": "https://git.kernel.org/stable/p/d1e3efe783365db59da88f08a2e0bfe1cc95b143",
                "filename": "CVE-2024-41014-d1e3efe783365db59da88f08a2e0bfe1cc95b143.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41014/CVE-2024-41014-d1e3efe783365db59da88f08a2e0bfe1cc95b143.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fb63435b7c7dc112b1ae1baea5486e0a6e27b196",
                "patch_url": "https://git.kernel.org/stable/p/fb63435b7c7dc112b1ae1baea5486e0a6e27b196",
                "filename": "CVE-2024-41014-fb63435b7c7dc112b1ae1baea5486e0a6e27b196.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41014/CVE-2024-41014-fb63435b7c7dc112b1ae1baea5486e0a6e27b196.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/7cd9f0a33e738cd58876f1bc8d6c1aa5bc4fc8c1",
            "https://git.kernel.org/stable/c/d1e3efe783365db59da88f08a2e0bfe1cc95b143",
            "https://git.kernel.org/stable/c/fb63435b7c7dc112b1ae1baea5486e0a6e27b196",
            "https://www.cve.org/CVERecord?id=CVE-2024-41014\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41014\nhttps://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41014-9186@gregkh/T"
        ]
    },
    "CVE-2024-41023": {
        "cve": "CVE-2024-41023",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/deadline: Fix task_struct reference leak\n\nDuring the execution of the following stress test with linux-rt:\n\nstress-ng --cyclic 30 --timeout 30 --minimize --quiet\n\nkmemleak frequently reported a memory leak concerning the task_struct:\n\nunreferenced object 0xffff8881305b8000 (size 16136):\n  comm \"stress-ng\", pid 614, jiffies 4294883961 (age 286.412s)\n  object hex dump (first 32 bytes):\n    02 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00  .@..............\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  debug hex dump (first 16 bytes):\n    53 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00  S...............\n  backtrace:\n    [<00000000046b6790>] dup_task_struct+0x30/0x540\n    [<00000000c5ca0f0b>] copy_process+0x3d9/0x50e0\n    [<00000000ced59777>] kernel_clone+0xb0/0x770\n    [<00000000a50befdc>] __do_sys_clone+0xb6/0xf0\n    [<000000001dbf2008>] do_syscall_64+0x5d/0xf0\n    [<00000000552900ff>] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nThe issue occurs in start_dl_timer(), which increments the task_struct\nreference count and sets a timer. The timer callback, dl_task_timer,\nis supposed to decrement the reference count upon expiration. However,\nif enqueue_task_dl() is called before the timer expires and cancels it,\nthe reference count is not decremented, leading to the leak.\n\nThis patch fixes the reference leak by ensuring the task_struct\nreference count is properly decremented when the timer is canceled.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41023",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/b58652db66c910c2245f5bee7deca41c12d707b9",
            "patch_url": "https://git.kernel.org/stable/p/b58652db66c910c2245f5bee7deca41c12d707b9",
            "filename": "CVE-2024-41023-b58652db66c910c2245f5bee7deca41c12d707b9.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41023/CVE-2024-41023-b58652db66c910c2245f5bee7deca41c12d707b9.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/7a54d31face626f62de415ebe77b43f76c3ffaf4",
                "patch_url": "https://git.kernel.org/stable/p/7a54d31face626f62de415ebe77b43f76c3ffaf4",
                "filename": "CVE-2024-41023-7a54d31face626f62de415ebe77b43f76c3ffaf4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41023/CVE-2024-41023-7a54d31face626f62de415ebe77b43f76c3ffaf4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b58652db66c910c2245f5bee7deca41c12d707b9",
                "patch_url": "https://git.kernel.org/stable/p/b58652db66c910c2245f5bee7deca41c12d707b9",
                "filename": "CVE-2024-41023-b58652db66c910c2245f5bee7deca41c12d707b9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41023/CVE-2024-41023-b58652db66c910c2245f5bee7deca41c12d707b9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/7a54d31face626f62de415ebe77b43f76c3ffaf4",
            "https://git.kernel.org/stable/c/b58652db66c910c2245f5bee7deca41c12d707b9",
            "https://www.cve.org/CVERecord?id=CVE-2024-41023\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41023\nhttps://lore.kernel.org/linux-cve-announce/2024072917-CVE-2024-41023-32a0@gregkh/T"
        ]
    },
    "CVE-2024-41035": {
        "cve": "CVE-2024-41035",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor\n\nSyzbot has identified a bug in usbcore (see the Closes: tag below)\ncaused by our assumption that the reserved bits in an endpoint\ndescriptor's bEndpointAddress field will always be 0.  As a result of\nthe bug, the endpoint_is_duplicate() routine in config.c (and possibly\nother routines as well) may believe that two descriptors are for\ndistinct endpoints, even though they have the same direction and\nendpoint number.  This can lead to confusion, including the bug\nidentified by syzbot (two descriptors with matching endpoint numbers\nand directions, where one was interrupt and the other was bulk).\n\nTo fix the bug, we will clear the reserved bits in bEndpointAddress\nwhen we parse the descriptor.  (Note that both the USB-2.0 and USB-3.1\nspecs say these bits are \"Reserved, reset to zero\".)  This requires us\nto make a copy of the descriptor earlier in usb_parse_endpoint() and\nuse the copy instead of the original when checking for duplicates.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41035",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/60abea505b726b38232a0ef410d2bd1994a77f78",
            "patch_url": "https://git.kernel.org/stable/p/60abea505b726b38232a0ef410d2bd1994a77f78",
            "filename": "CVE-2024-41035-60abea505b726b38232a0ef410d2bd1994a77f78.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41035/CVE-2024-41035-60abea505b726b38232a0ef410d2bd1994a77f78.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2bd8534a1b83c65702aec3cab164170f8e584188",
                "patch_url": "https://git.kernel.org/stable/p/2bd8534a1b83c65702aec3cab164170f8e584188",
                "filename": "CVE-2024-41035-2bd8534a1b83c65702aec3cab164170f8e584188.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41035/CVE-2024-41035-2bd8534a1b83c65702aec3cab164170f8e584188.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/37514a5c1251a8c5c95c323f55050736e7069ac7",
                "patch_url": "https://git.kernel.org/stable/p/37514a5c1251a8c5c95c323f55050736e7069ac7",
                "filename": "CVE-2024-41035-37514a5c1251a8c5c95c323f55050736e7069ac7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41035/CVE-2024-41035-37514a5c1251a8c5c95c323f55050736e7069ac7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/60abea505b726b38232a0ef410d2bd1994a77f78",
                "patch_url": "https://git.kernel.org/stable/p/60abea505b726b38232a0ef410d2bd1994a77f78",
                "filename": "CVE-2024-41035-60abea505b726b38232a0ef410d2bd1994a77f78.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41035/CVE-2024-41035-60abea505b726b38232a0ef410d2bd1994a77f78.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/647d61aef106dbed9c70447bcddbd4968e67ca64",
                "patch_url": "https://git.kernel.org/stable/p/647d61aef106dbed9c70447bcddbd4968e67ca64",
                "filename": "CVE-2024-41035-647d61aef106dbed9c70447bcddbd4968e67ca64.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41035/CVE-2024-41035-647d61aef106dbed9c70447bcddbd4968e67ca64.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9edcf317620d7c6a8354911b69b874cf89716646",
                "patch_url": "https://git.kernel.org/stable/p/9edcf317620d7c6a8354911b69b874cf89716646",
                "filename": "CVE-2024-41035-9edcf317620d7c6a8354911b69b874cf89716646.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41035/CVE-2024-41035-9edcf317620d7c6a8354911b69b874cf89716646.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a368ecde8a5055b627749b09c6218ef793043e47",
                "patch_url": "https://git.kernel.org/stable/p/a368ecde8a5055b627749b09c6218ef793043e47",
                "filename": "CVE-2024-41035-a368ecde8a5055b627749b09c6218ef793043e47.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41035/CVE-2024-41035-a368ecde8a5055b627749b09c6218ef793043e47.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf",
                "patch_url": "https://git.kernel.org/stable/p/d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf",
                "filename": "CVE-2024-41035-d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41035/CVE-2024-41035-d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d8418fd083d1b90a6c007cf8dcf81aeae274727b",
                "patch_url": "https://git.kernel.org/stable/p/d8418fd083d1b90a6c007cf8dcf81aeae274727b",
                "filename": "CVE-2024-41035-d8418fd083d1b90a6c007cf8dcf81aeae274727b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41035/CVE-2024-41035-d8418fd083d1b90a6c007cf8dcf81aeae274727b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2bd8534a1b83c65702aec3cab164170f8e584188",
            "https://git.kernel.org/stable/c/37514a5c1251a8c5c95c323f55050736e7069ac7",
            "https://git.kernel.org/stable/c/60abea505b726b38232a0ef410d2bd1994a77f78",
            "https://git.kernel.org/stable/c/647d61aef106dbed9c70447bcddbd4968e67ca64",
            "https://git.kernel.org/stable/c/9edcf317620d7c6a8354911b69b874cf89716646",
            "https://git.kernel.org/stable/c/a368ecde8a5055b627749b09c6218ef793043e47",
            "https://git.kernel.org/stable/c/d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf",
            "https://git.kernel.org/stable/c/d8418fd083d1b90a6c007cf8dcf81aeae274727b",
            "https://www.cve.org/CVERecord?id=CVE-2024-41035\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41035\nhttps://lore.kernel.org/linux-cve-announce/2024072922-CVE-2024-41035-5e6b@gregkh/T"
        ]
    },
    "CVE-2024-41038": {
        "cve": "CVE-2024-41038",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers\n\nCheck that all fields of a V2 algorithm header fit into the available\nfirmware data buffer.\n\nThe wmfw V2 format introduced variable-length strings in the algorithm\nblock header. This means the overall header length is variable, and the\nposition of most fields varies depending on the length of the string\nfields. Each field must be checked to ensure that it does not overflow\nthe firmware data buffer.\n\nAs this ia bugfix patch, the fixes avoid making any significant change to\nthe existing code. This makes it easier to review and less likely to\nintroduce new bugs.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41038",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6619aa48a011364e9f29083cc76368e6acfe5b11",
            "patch_url": "https://git.kernel.org/stable/p/6619aa48a011364e9f29083cc76368e6acfe5b11",
            "filename": "CVE-2024-41038-6619aa48a011364e9f29083cc76368e6acfe5b11.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41038/CVE-2024-41038-6619aa48a011364e9f29083cc76368e6acfe5b11.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/014239b9971d79421a0ba652579e1ca1b7b57b6d",
                "patch_url": "https://git.kernel.org/stable/p/014239b9971d79421a0ba652579e1ca1b7b57b6d",
                "filename": "CVE-2024-41038-014239b9971d79421a0ba652579e1ca1b7b57b6d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41038/CVE-2024-41038-014239b9971d79421a0ba652579e1ca1b7b57b6d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2163aff6bebbb752edf73f79700f5e2095f3559e",
                "patch_url": "https://git.kernel.org/stable/p/2163aff6bebbb752edf73f79700f5e2095f3559e",
                "filename": "CVE-2024-41038-2163aff6bebbb752edf73f79700f5e2095f3559e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41038/CVE-2024-41038-2163aff6bebbb752edf73f79700f5e2095f3559e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6619aa48a011364e9f29083cc76368e6acfe5b11",
                "patch_url": "https://git.kernel.org/stable/p/6619aa48a011364e9f29083cc76368e6acfe5b11",
                "filename": "CVE-2024-41038-6619aa48a011364e9f29083cc76368e6acfe5b11.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41038/CVE-2024-41038-6619aa48a011364e9f29083cc76368e6acfe5b11.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/76ea8e13aaefdfda6e5601323d6ea5340359dcfa",
                "patch_url": "https://git.kernel.org/stable/p/76ea8e13aaefdfda6e5601323d6ea5340359dcfa",
                "filename": "CVE-2024-41038-76ea8e13aaefdfda6e5601323d6ea5340359dcfa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41038/CVE-2024-41038-76ea8e13aaefdfda6e5601323d6ea5340359dcfa.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/014239b9971d79421a0ba652579e1ca1b7b57b6d",
            "https://git.kernel.org/stable/c/2163aff6bebbb752edf73f79700f5e2095f3559e",
            "https://git.kernel.org/stable/c/6619aa48a011364e9f29083cc76368e6acfe5b11",
            "https://git.kernel.org/stable/c/76ea8e13aaefdfda6e5601323d6ea5340359dcfa",
            "https://www.cve.org/CVERecord?id=CVE-2024-41038\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41038\nhttps://lore.kernel.org/linux-cve-announce/2024072923-CVE-2024-41038-41ba@gregkh/T"
        ]
    },
    "CVE-2024-41039": {
        "cve": "CVE-2024-41039",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Fix overflow checking of wmfw header\n\nFix the checking that firmware file buffer is large enough for the\nwmfw header, to prevent overrunning the buffer.\n\nThe original code tested that the firmware data buffer contained\nenough bytes for the sums of the size of the structs\n\n\twmfw_header + wmfw_adsp1_sizes + wmfw_footer\n\nBut wmfw_adsp1_sizes is only used on ADSP1 firmware. For ADSP2 and\nHalo Core the equivalent struct is wmfw_adsp2_sizes, which is\n4 bytes longer. So the length check didn't guarantee that there\nare enough bytes in the firmware buffer for a header with\nwmfw_adsp2_sizes.\n\nThis patch splits the length check into three separate parts. Each\nof the wmfw_header, wmfw_adsp?_sizes and wmfw_footer are checked\nseparately before they are used.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41039",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/fd035f0810b33c2a8792effdb82bf35920221565",
            "patch_url": "https://git.kernel.org/stable/p/fd035f0810b33c2a8792effdb82bf35920221565",
            "filename": "CVE-2024-41039-fd035f0810b33c2a8792effdb82bf35920221565.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41039/CVE-2024-41039-fd035f0810b33c2a8792effdb82bf35920221565.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3019b86bce16fbb5bc1964f3544d0ce7d0137278",
                "patch_url": "https://git.kernel.org/stable/p/3019b86bce16fbb5bc1964f3544d0ce7d0137278",
                "filename": "CVE-2024-41039-3019b86bce16fbb5bc1964f3544d0ce7d0137278.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41039/CVE-2024-41039-3019b86bce16fbb5bc1964f3544d0ce7d0137278.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/49a79f344d0a17c6a5eef53716cc76fcdbfca9ba",
                "patch_url": "https://git.kernel.org/stable/p/49a79f344d0a17c6a5eef53716cc76fcdbfca9ba",
                "filename": "CVE-2024-41039-49a79f344d0a17c6a5eef53716cc76fcdbfca9ba.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41039/CVE-2024-41039-49a79f344d0a17c6a5eef53716cc76fcdbfca9ba.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9c9877a96e033bf6c6470b3b4f06106d91ace11e",
                "patch_url": "https://git.kernel.org/stable/p/9c9877a96e033bf6c6470b3b4f06106d91ace11e",
                "filename": "CVE-2024-41039-9c9877a96e033bf6c6470b3b4f06106d91ace11e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41039/CVE-2024-41039-9c9877a96e033bf6c6470b3b4f06106d91ace11e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fd035f0810b33c2a8792effdb82bf35920221565",
                "patch_url": "https://git.kernel.org/stable/p/fd035f0810b33c2a8792effdb82bf35920221565",
                "filename": "CVE-2024-41039-fd035f0810b33c2a8792effdb82bf35920221565.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41039/CVE-2024-41039-fd035f0810b33c2a8792effdb82bf35920221565.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3019b86bce16fbb5bc1964f3544d0ce7d0137278",
            "https://git.kernel.org/stable/c/49a79f344d0a17c6a5eef53716cc76fcdbfca9ba",
            "https://git.kernel.org/stable/c/9c9877a96e033bf6c6470b3b4f06106d91ace11e",
            "https://git.kernel.org/stable/c/fd035f0810b33c2a8792effdb82bf35920221565",
            "https://www.cve.org/CVERecord?id=CVE-2024-41039\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41039\nhttps://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41039-b3bc@gregkh/T"
        ]
    },
    "CVE-2024-41040": {
        "cve": "CVE-2024-41040",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Fix UAF when resolving a clash\n\nKASAN reports the following UAF:\n\n BUG: KASAN: slab-use-after-free in tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]\n Read of size 1 at addr ffff888c07603600 by task handler130/6469\n\n Call Trace:\n  <IRQ>\n  dump_stack_lvl+0x48/0x70\n  print_address_description.constprop.0+0x33/0x3d0\n  print_report+0xc0/0x2b0\n  kasan_report+0xd0/0x120\n  __asan_load1+0x6c/0x80\n  tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]\n  tcf_ct_act+0x886/0x1350 [act_ct]\n  tcf_action_exec+0xf8/0x1f0\n  fl_classify+0x355/0x360 [cls_flower]\n  __tcf_classify+0x1fd/0x330\n  tcf_classify+0x21c/0x3c0\n  sch_handle_ingress.constprop.0+0x2c5/0x500\n  __netif_receive_skb_core.constprop.0+0xb25/0x1510\n  __netif_receive_skb_list_core+0x220/0x4c0\n  netif_receive_skb_list_internal+0x446/0x620\n  napi_complete_done+0x157/0x3d0\n  gro_cell_poll+0xcf/0x100\n  __napi_poll+0x65/0x310\n  net_rx_action+0x30c/0x5c0\n  __do_softirq+0x14f/0x491\n  __irq_exit_rcu+0x82/0xc0\n  irq_exit_rcu+0xe/0x20\n  common_interrupt+0xa1/0xb0\n  </IRQ>\n  <TASK>\n  asm_common_interrupt+0x27/0x40\n\n Allocated by task 6469:\n  kasan_save_stack+0x38/0x70\n  kasan_set_track+0x25/0x40\n  kasan_save_alloc_info+0x1e/0x40\n  __kasan_krealloc+0x133/0x190\n  krealloc+0xaa/0x130\n  nf_ct_ext_add+0xed/0x230 [nf_conntrack]\n  tcf_ct_act+0x1095/0x1350 [act_ct]\n  tcf_action_exec+0xf8/0x1f0\n  fl_classify+0x355/0x360 [cls_flower]\n  __tcf_classify+0x1fd/0x330\n  tcf_classify+0x21c/0x3c0\n  sch_handle_ingress.constprop.0+0x2c5/0x500\n  __netif_receive_skb_core.constprop.0+0xb25/0x1510\n  __netif_receive_skb_list_core+0x220/0x4c0\n  netif_receive_skb_list_internal+0x446/0x620\n  napi_complete_done+0x157/0x3d0\n  gro_cell_poll+0xcf/0x100\n  __napi_poll+0x65/0x310\n  net_rx_action+0x30c/0x5c0\n  __do_softirq+0x14f/0x491\n\n Freed by task 6469:\n  kasan_save_stack+0x38/0x70\n  kasan_set_track+0x25/0x40\n  kasan_save_free_info+0x2b/0x60\n  ____kasan_slab_free+0x180/0x1f0\n  __kasan_slab_free+0x12/0x30\n  slab_free_freelist_hook+0xd2/0x1a0\n  __kmem_cache_free+0x1a2/0x2f0\n  kfree+0x78/0x120\n  nf_conntrack_free+0x74/0x130 [nf_conntrack]\n  nf_ct_destroy+0xb2/0x140 [nf_conntrack]\n  __nf_ct_resolve_clash+0x529/0x5d0 [nf_conntrack]\n  nf_ct_resolve_clash+0xf6/0x490 [nf_conntrack]\n  __nf_conntrack_confirm+0x2c6/0x770 [nf_conntrack]\n  tcf_ct_act+0x12ad/0x1350 [act_ct]\n  tcf_action_exec+0xf8/0x1f0\n  fl_classify+0x355/0x360 [cls_flower]\n  __tcf_classify+0x1fd/0x330\n  tcf_classify+0x21c/0x3c0\n  sch_handle_ingress.constprop.0+0x2c5/0x500\n  __netif_receive_skb_core.constprop.0+0xb25/0x1510\n  __netif_receive_skb_list_core+0x220/0x4c0\n  netif_receive_skb_list_internal+0x446/0x620\n  napi_complete_done+0x157/0x3d0\n  gro_cell_poll+0xcf/0x100\n  __napi_poll+0x65/0x310\n  net_rx_action+0x30c/0x5c0\n  __do_softirq+0x14f/0x491\n\nThe ct may be dropped if a clash has been resolved but is still passed to\nthe tcf_ct_flow_table_process_conn function for further usage. This issue\ncan be fixed by retrieving ct from skb again after confirming conntrack.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41040",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2b4d68df3f57ea746c430941ba9c03d7d8b5a23f",
            "patch_url": "https://git.kernel.org/stable/p/2b4d68df3f57ea746c430941ba9c03d7d8b5a23f",
            "filename": "CVE-2024-41040-2b4d68df3f57ea746c430941ba9c03d7d8b5a23f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41040/CVE-2024-41040-2b4d68df3f57ea746c430941ba9c03d7d8b5a23f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/26488172b0292bed837b95a006a3f3431d1898c3",
                "patch_url": "https://git.kernel.org/stable/p/26488172b0292bed837b95a006a3f3431d1898c3",
                "filename": "CVE-2024-41040-26488172b0292bed837b95a006a3f3431d1898c3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41040/CVE-2024-41040-26488172b0292bed837b95a006a3f3431d1898c3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2b4d68df3f57ea746c430941ba9c03d7d8b5a23f",
                "patch_url": "https://git.kernel.org/stable/p/2b4d68df3f57ea746c430941ba9c03d7d8b5a23f",
                "filename": "CVE-2024-41040-2b4d68df3f57ea746c430941ba9c03d7d8b5a23f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41040/CVE-2024-41040-2b4d68df3f57ea746c430941ba9c03d7d8b5a23f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4e71b10a100861fb27d9c5755dfd68f615629fae",
                "patch_url": "https://git.kernel.org/stable/p/4e71b10a100861fb27d9c5755dfd68f615629fae",
                "filename": "CVE-2024-41040-4e71b10a100861fb27d9c5755dfd68f615629fae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41040/CVE-2024-41040-4e71b10a100861fb27d9c5755dfd68f615629fae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/799a34901b634008db4a7ece3900e2b971d4c932",
                "patch_url": "https://git.kernel.org/stable/p/799a34901b634008db4a7ece3900e2b971d4c932",
                "filename": "CVE-2024-41040-799a34901b634008db4a7ece3900e2b971d4c932.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41040/CVE-2024-41040-799a34901b634008db4a7ece3900e2b971d4c932.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b81a523d54ea689414f67c9fb81a5b917a41ed55",
                "patch_url": "https://git.kernel.org/stable/p/b81a523d54ea689414f67c9fb81a5b917a41ed55",
                "filename": "CVE-2024-41040-b81a523d54ea689414f67c9fb81a5b917a41ed55.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41040/CVE-2024-41040-b81a523d54ea689414f67c9fb81a5b917a41ed55.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ef472cc6693b16b202a916482df72f35d94bd69e",
                "patch_url": "https://git.kernel.org/stable/p/ef472cc6693b16b202a916482df72f35d94bd69e",
                "filename": "CVE-2024-41040-ef472cc6693b16b202a916482df72f35d94bd69e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41040/CVE-2024-41040-ef472cc6693b16b202a916482df72f35d94bd69e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/26488172b0292bed837b95a006a3f3431d1898c3",
            "https://git.kernel.org/stable/c/2b4d68df3f57ea746c430941ba9c03d7d8b5a23f",
            "https://git.kernel.org/stable/c/4e71b10a100861fb27d9c5755dfd68f615629fae",
            "https://git.kernel.org/stable/c/799a34901b634008db4a7ece3900e2b971d4c932",
            "https://git.kernel.org/stable/c/b81a523d54ea689414f67c9fb81a5b917a41ed55",
            "https://git.kernel.org/stable/c/ef472cc6693b16b202a916482df72f35d94bd69e",
            "https://www.cve.org/CVERecord?id=CVE-2024-41040\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41040\nhttps://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41040-63d5@gregkh/T"
        ]
    },
    "CVE-2024-41041": {
        "cve": "CVE-2024-41041",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().\n\nsyzkaller triggered the warning [0] in udp_v4_early_demux().\n\nIn udp_v[46]_early_demux() and sk_lookup(), we do not touch the refcount\nof the looked-up sk and use sock_pfree() as skb->destructor, so we check\nSOCK_RCU_FREE to ensure that the sk is safe to access during the RCU grace\nperiod.\n\nCurrently, SOCK_RCU_FREE is flagged for a bound socket after being put\ninto the hash table.  Moreover, the SOCK_RCU_FREE check is done too early\nin udp_v[46]_early_demux() and sk_lookup(), so there could be a small race\nwindow:\n\n  CPU1                                 CPU2\n  ----                                 ----\n  udp_v4_early_demux()                 udp_lib_get_port()\n  |                                    |- hlist_add_head_rcu()\n  |- sk = __udp4_lib_demux_lookup()    |\n  |- DEBUG_NET_WARN_ON_ONCE(sk_is_refcounted(sk));\n                                       `- sock_set_flag(sk, SOCK_RCU_FREE)\n\nWe had the same bug in TCP and fixed it in commit 871019b22d1b (\"net:\nset SOCK_RCU_FREE before inserting socket into hashtable\").\n\nLet's apply the same fix for UDP.\n\n[0]:\nWARNING: CPU: 0 PID: 11198 at net/ipv4/udp.c:2599 udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nModules linked in:\nCPU: 0 PID: 11198 Comm: syz-executor.1 Not tainted 6.9.0-g93bda33046e7 #13\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nRIP: 0010:udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599\nCode: c5 7a 15 fe bb 01 00 00 00 44 89 e9 31 ff d3 e3 81 e3 bf ef ff ff 89 de e8 2c 74 15 fe 85 db 0f 85 02 06 00 00 e8 9f 7a 15 fe <0f> 0b e8 98 7a 15 fe 49 8d 7e 60 e8 4f 39 2f fe 49 c7 46 60 20 52\nRSP: 0018:ffffc9000ce3fa58 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8318c92c\nRDX: ffff888036ccde00 RSI: ffffffff8318c2f1 RDI: 0000000000000001\nRBP: ffff88805a2dd6e0 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0001ffffffffffff R12: ffff88805a2dd680\nR13: 0000000000000007 R14: ffff88800923f900 R15: ffff88805456004e\nFS:  00007fc449127640(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fc449126e38 CR3: 000000003de4b002 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600\nPKRU: 55555554\nCall Trace:\n <TASK>\n ip_rcv_finish_core.constprop.0+0xbdd/0xd20 net/ipv4/ip_input.c:349\n ip_rcv_finish+0xda/0x150 net/ipv4/ip_input.c:447\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip_rcv+0x16c/0x180 net/ipv4/ip_input.c:569\n __netif_receive_skb_one_core+0xb3/0xe0 net/core/dev.c:5624\n __netif_receive_skb+0x21/0xd0 net/core/dev.c:5738\n netif_receive_skb_internal net/core/dev.c:5824 [inline]\n netif_receive_skb+0x271/0x300 net/core/dev.c:5884\n tun_rx_batched drivers/net/tun.c:1549 [inline]\n tun_get_user+0x24db/0x2c50 drivers/net/tun.c:2002\n tun_chr_write_iter+0x107/0x1a0 drivers/net/tun.c:2048\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x76f/0x8d0 fs/read_write.c:590\n ksys_write+0xbf/0x190 fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __x64_sys_write+0x41/0x50 fs/read_write.c:652\n x64_sys_call+0xe66/0x1990 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x4b/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\nRIP: 0033:0x7fc44a68bc1f\nCode: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 e9 cf f5 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 3c d0 f5 ff 48\nRSP: 002b:00007fc449126c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00000000004bc050 RCX: 00007fc44a68bc1f\nR\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41041",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/a6db0d3ea6536e7120871e5448b3032570152ec6",
            "patch_url": "https://git.kernel.org/stable/p/a6db0d3ea6536e7120871e5448b3032570152ec6",
            "filename": "CVE-2024-41041-a6db0d3ea6536e7120871e5448b3032570152ec6.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41041/CVE-2024-41041-a6db0d3ea6536e7120871e5448b3032570152ec6.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/20ceae10623c3b29fdf7609690849475bcdebdb0",
                "patch_url": "https://git.kernel.org/stable/p/20ceae10623c3b29fdf7609690849475bcdebdb0",
                "filename": "CVE-2024-41041-20ceae10623c3b29fdf7609690849475bcdebdb0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41041/CVE-2024-41041-20ceae10623c3b29fdf7609690849475bcdebdb0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5c0b485a8c6116516f33925b9ce5b6104a6eadfd",
                "patch_url": "https://git.kernel.org/stable/p/5c0b485a8c6116516f33925b9ce5b6104a6eadfd",
                "filename": "CVE-2024-41041-5c0b485a8c6116516f33925b9ce5b6104a6eadfd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41041/CVE-2024-41041-5c0b485a8c6116516f33925b9ce5b6104a6eadfd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7a67c4e47626e6daccda62888f8b096abb5d3940",
                "patch_url": "https://git.kernel.org/stable/p/7a67c4e47626e6daccda62888f8b096abb5d3940",
                "filename": "CVE-2024-41041-7a67c4e47626e6daccda62888f8b096abb5d3940.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41041/CVE-2024-41041-7a67c4e47626e6daccda62888f8b096abb5d3940.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9f965684c57c3117cfd2f754dd3270383c529fba",
                "patch_url": "https://git.kernel.org/stable/p/9f965684c57c3117cfd2f754dd3270383c529fba",
                "filename": "CVE-2024-41041-9f965684c57c3117cfd2f754dd3270383c529fba.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41041/CVE-2024-41041-9f965684c57c3117cfd2f754dd3270383c529fba.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a6db0d3ea6536e7120871e5448b3032570152ec6",
                "patch_url": "https://git.kernel.org/stable/p/a6db0d3ea6536e7120871e5448b3032570152ec6",
                "filename": "CVE-2024-41041-a6db0d3ea6536e7120871e5448b3032570152ec6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41041/CVE-2024-41041-a6db0d3ea6536e7120871e5448b3032570152ec6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c5fd77ca13d657c6e99bf04f0917445e6a80231e",
                "patch_url": "https://git.kernel.org/stable/p/c5fd77ca13d657c6e99bf04f0917445e6a80231e",
                "filename": "CVE-2024-41041-c5fd77ca13d657c6e99bf04f0917445e6a80231e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41041/CVE-2024-41041-c5fd77ca13d657c6e99bf04f0917445e6a80231e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ddf516e50bf8a7bc9b3bd8a9831f9c7a8131a32a",
                "patch_url": "https://git.kernel.org/stable/p/ddf516e50bf8a7bc9b3bd8a9831f9c7a8131a32a",
                "filename": "CVE-2024-41041-ddf516e50bf8a7bc9b3bd8a9831f9c7a8131a32a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41041/CVE-2024-41041-ddf516e50bf8a7bc9b3bd8a9831f9c7a8131a32a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/20ceae10623c3b29fdf7609690849475bcdebdb0",
            "https://git.kernel.org/stable/c/5c0b485a8c6116516f33925b9ce5b6104a6eadfd",
            "https://git.kernel.org/stable/c/7a67c4e47626e6daccda62888f8b096abb5d3940",
            "https://git.kernel.org/stable/c/9f965684c57c3117cfd2f754dd3270383c529fba",
            "https://git.kernel.org/stable/c/a6db0d3ea6536e7120871e5448b3032570152ec6",
            "https://git.kernel.org/stable/c/c5fd77ca13d657c6e99bf04f0917445e6a80231e",
            "https://git.kernel.org/stable/c/ddf516e50bf8a7bc9b3bd8a9831f9c7a8131a32a",
            "https://www.cve.org/CVERecord?id=CVE-2024-41041\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41041\nhttps://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41041-ae0c@gregkh/T"
        ]
    },
    "CVE-2024-41042": {
        "cve": "CVE-2024-41042",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: prefer nft_chain_validate\n\nnft_chain_validate already performs loop detection because a cycle will\nresult in a call stack overflow (ctx->level >= NFT_JUMP_STACK_SIZE).\n\nIt also follows maps via ->validate callback in nft_lookup, so there\nappears no reason to iterate the maps again.\n\nnf_tables_check_loops() and all its helper functions can be removed.\nThis improves ruleset load time significantly, from 23s down to 12s.\n\nThis also fixes a crash bug. Old loop detection code can result in\nunbounded recursion:\n\nBUG: TASK stack guard page was hit at ....\nOops: stack guard page: 0000 [#1] PREEMPT SMP KASAN\nCPU: 4 PID: 1539 Comm: nft Not tainted 6.10.0-rc5+ #1\n[..]\n\nwith a suitable ruleset during validation of register stores.\n\nI can't see any actual reason to attempt to check for this from\nnft_validate_register_store(), at this point the transaction is still in\nprogress, so we don't have a full picture of the rule graph.\n\nFor nf-next it might make sense to either remove it or make this depend\non table->validate_state in case we could catch an error earlier\n(for improved error reporting to userspace).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41042",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1947e4c3346faa8ac7e343652c0fd3b3e394202f",
            "patch_url": "https://git.kernel.org/stable/p/1947e4c3346faa8ac7e343652c0fd3b3e394202f",
            "filename": "CVE-2024-41042-1947e4c3346faa8ac7e343652c0fd3b3e394202f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41042/CVE-2024-41042-1947e4c3346faa8ac7e343652c0fd3b3e394202f.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1947e4c3346faa8ac7e343652c0fd3b3e394202f",
                "patch_url": "https://git.kernel.org/stable/p/1947e4c3346faa8ac7e343652c0fd3b3e394202f",
                "filename": "CVE-2024-41042-1947e4c3346faa8ac7e343652c0fd3b3e394202f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41042/CVE-2024-41042-1947e4c3346faa8ac7e343652c0fd3b3e394202f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/31c35f9f89ef585f1edb53e17ac73a0ca4a9712b",
                "patch_url": "https://git.kernel.org/stable/p/31c35f9f89ef585f1edb53e17ac73a0ca4a9712b",
                "filename": "CVE-2024-41042-31c35f9f89ef585f1edb53e17ac73a0ca4a9712b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41042/CVE-2024-41042-31c35f9f89ef585f1edb53e17ac73a0ca4a9712b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/717c91c6ed73e248de6a15bc53adefb81446c9d0",
                "patch_url": "https://git.kernel.org/stable/p/717c91c6ed73e248de6a15bc53adefb81446c9d0",
                "filename": "CVE-2024-41042-717c91c6ed73e248de6a15bc53adefb81446c9d0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41042/CVE-2024-41042-717c91c6ed73e248de6a15bc53adefb81446c9d0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8246b7466c8da49d0d9e85e26cbd69dd6d3e3d1e",
                "patch_url": "https://git.kernel.org/stable/p/8246b7466c8da49d0d9e85e26cbd69dd6d3e3d1e",
                "filename": "CVE-2024-41042-8246b7466c8da49d0d9e85e26cbd69dd6d3e3d1e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41042/CVE-2024-41042-8246b7466c8da49d0d9e85e26cbd69dd6d3e3d1e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9df785aeb7dcc8efd1d4110bb27d26005298ebae",
                "patch_url": "https://git.kernel.org/stable/p/9df785aeb7dcc8efd1d4110bb27d26005298ebae",
                "filename": "CVE-2024-41042-9df785aeb7dcc8efd1d4110bb27d26005298ebae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41042/CVE-2024-41042-9df785aeb7dcc8efd1d4110bb27d26005298ebae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b6b6e430470e1c3c5513311cb35a15a205595abe",
                "patch_url": "https://git.kernel.org/stable/p/b6b6e430470e1c3c5513311cb35a15a205595abe",
                "filename": "CVE-2024-41042-b6b6e430470e1c3c5513311cb35a15a205595abe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41042/CVE-2024-41042-b6b6e430470e1c3c5513311cb35a15a205595abe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cd4348e0a50286282c314ad6d2b0740e7c812c24",
                "patch_url": "https://git.kernel.org/stable/p/cd4348e0a50286282c314ad6d2b0740e7c812c24",
                "filename": "CVE-2024-41042-cd4348e0a50286282c314ad6d2b0740e7c812c24.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41042/CVE-2024-41042-cd4348e0a50286282c314ad6d2b0740e7c812c24.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cff3bd012a9512ac5ed858d38e6ed65f6391008c",
                "patch_url": "https://git.kernel.org/stable/p/cff3bd012a9512ac5ed858d38e6ed65f6391008c",
                "filename": "CVE-2024-41042-cff3bd012a9512ac5ed858d38e6ed65f6391008c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41042/CVE-2024-41042-cff3bd012a9512ac5ed858d38e6ed65f6391008c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1947e4c3346faa8ac7e343652c0fd3b3e394202f",
            "https://git.kernel.org/stable/c/31c35f9f89ef585f1edb53e17ac73a0ca4a9712b",
            "https://git.kernel.org/stable/c/717c91c6ed73e248de6a15bc53adefb81446c9d0",
            "https://git.kernel.org/stable/c/8246b7466c8da49d0d9e85e26cbd69dd6d3e3d1e",
            "https://git.kernel.org/stable/c/9df785aeb7dcc8efd1d4110bb27d26005298ebae",
            "https://git.kernel.org/stable/c/b6b6e430470e1c3c5513311cb35a15a205595abe",
            "https://git.kernel.org/stable/c/cd4348e0a50286282c314ad6d2b0740e7c812c24",
            "https://git.kernel.org/stable/c/cff3bd012a9512ac5ed858d38e6ed65f6391008c",
            "https://www.cve.org/CVERecord?id=CVE-2024-41042\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41042\nhttps://lore.kernel.org/linux-cve-announce/2024072924-CVE-2024-41042-c338@gregkh/T"
        ]
    },
    "CVE-2024-41044": {
        "cve": "CVE-2024-41044",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp: reject claimed-as-LCP but actually malformed packets\n\nSince 'ppp_async_encode()' assumes valid LCP packets (with code\nfrom 1 to 7 inclusive), add 'ppp_check_packet()' to ensure that\nLCP packet has an actual body beyond PPP_LCP header bytes, and\nreject claimed-as-LCP but actually malformed data otherwise.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41044",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/97d1efd8be26615ff680cdde86937d5943138f37",
            "patch_url": "https://git.kernel.org/stable/p/97d1efd8be26615ff680cdde86937d5943138f37",
            "filename": "CVE-2024-41044-97d1efd8be26615ff680cdde86937d5943138f37.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41044/CVE-2024-41044-97d1efd8be26615ff680cdde86937d5943138f37.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/099502ca410922b56353ccef2749bc0de669da78",
                "patch_url": "https://git.kernel.org/stable/p/099502ca410922b56353ccef2749bc0de669da78",
                "filename": "CVE-2024-41044-099502ca410922b56353ccef2749bc0de669da78.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41044/CVE-2024-41044-099502ca410922b56353ccef2749bc0de669da78.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3134bdf7356ed952dcecb480861d2afcc1e40492",
                "patch_url": "https://git.kernel.org/stable/p/3134bdf7356ed952dcecb480861d2afcc1e40492",
                "filename": "CVE-2024-41044-3134bdf7356ed952dcecb480861d2afcc1e40492.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41044/CVE-2024-41044-3134bdf7356ed952dcecb480861d2afcc1e40492.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3ba12c2afd933fc1bf800f6d3f6c7ec8f602ce56",
                "patch_url": "https://git.kernel.org/stable/p/3ba12c2afd933fc1bf800f6d3f6c7ec8f602ce56",
                "filename": "CVE-2024-41044-3ba12c2afd933fc1bf800f6d3f6c7ec8f602ce56.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41044/CVE-2024-41044-3ba12c2afd933fc1bf800f6d3f6c7ec8f602ce56.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6e8f1c21174f9482033bbb59f13ce1a8cbe843c3",
                "patch_url": "https://git.kernel.org/stable/p/6e8f1c21174f9482033bbb59f13ce1a8cbe843c3",
                "filename": "CVE-2024-41044-6e8f1c21174f9482033bbb59f13ce1a8cbe843c3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41044/CVE-2024-41044-6e8f1c21174f9482033bbb59f13ce1a8cbe843c3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/97d1efd8be26615ff680cdde86937d5943138f37",
                "patch_url": "https://git.kernel.org/stable/p/97d1efd8be26615ff680cdde86937d5943138f37",
                "filename": "CVE-2024-41044-97d1efd8be26615ff680cdde86937d5943138f37.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41044/CVE-2024-41044-97d1efd8be26615ff680cdde86937d5943138f37.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d683e7f3fc48f59576af34631b4fb07fd931343e",
                "patch_url": "https://git.kernel.org/stable/p/d683e7f3fc48f59576af34631b4fb07fd931343e",
                "filename": "CVE-2024-41044-d683e7f3fc48f59576af34631b4fb07fd931343e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41044/CVE-2024-41044-d683e7f3fc48f59576af34631b4fb07fd931343e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ebc5c630457783d17d0c438b0ad70b232a64a82f",
                "patch_url": "https://git.kernel.org/stable/p/ebc5c630457783d17d0c438b0ad70b232a64a82f",
                "filename": "CVE-2024-41044-ebc5c630457783d17d0c438b0ad70b232a64a82f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41044/CVE-2024-41044-ebc5c630457783d17d0c438b0ad70b232a64a82f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f2aeb7306a898e1cbd03963d376f4b6656ca2b55",
                "patch_url": "https://git.kernel.org/stable/p/f2aeb7306a898e1cbd03963d376f4b6656ca2b55",
                "filename": "CVE-2024-41044-f2aeb7306a898e1cbd03963d376f4b6656ca2b55.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41044/CVE-2024-41044-f2aeb7306a898e1cbd03963d376f4b6656ca2b55.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/099502ca410922b56353ccef2749bc0de669da78",
            "https://git.kernel.org/stable/c/3134bdf7356ed952dcecb480861d2afcc1e40492",
            "https://git.kernel.org/stable/c/3ba12c2afd933fc1bf800f6d3f6c7ec8f602ce56",
            "https://git.kernel.org/stable/c/6e8f1c21174f9482033bbb59f13ce1a8cbe843c3",
            "https://git.kernel.org/stable/c/97d1efd8be26615ff680cdde86937d5943138f37",
            "https://git.kernel.org/stable/c/d683e7f3fc48f59576af34631b4fb07fd931343e",
            "https://git.kernel.org/stable/c/ebc5c630457783d17d0c438b0ad70b232a64a82f",
            "https://git.kernel.org/stable/c/f2aeb7306a898e1cbd03963d376f4b6656ca2b55",
            "https://www.cve.org/CVERecord?id=CVE-2024-41044\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41044\nhttps://lore.kernel.org/linux-cve-announce/2024072925-CVE-2024-41044-5b26@gregkh/T"
        ]
    },
    "CVE-2024-41055": {
        "cve": "CVE-2024-41055",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: prevent derefencing NULL ptr in pfn_section_valid()\n\nCommit 5ec8e8ea8b77 (\"mm/sparsemem: fix race in accessing\nmemory_section->usage\") changed pfn_section_valid() to add a READ_ONCE()\ncall around \"ms->usage\" to fix a race with section_deactivate() where\nms->usage can be cleared.  The READ_ONCE() call, by itself, is not enough\nto prevent NULL pointer dereference.  We need to check its value before\ndereferencing it.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41055",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0100aeb8a12d51950418e685f879cc80cb8e5982",
            "patch_url": "https://git.kernel.org/stable/p/0100aeb8a12d51950418e685f879cc80cb8e5982",
            "filename": "CVE-2024-41055-0100aeb8a12d51950418e685f879cc80cb8e5982.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41055/CVE-2024-41055-0100aeb8a12d51950418e685f879cc80cb8e5982.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0100aeb8a12d51950418e685f879cc80cb8e5982",
                "patch_url": "https://git.kernel.org/stable/p/0100aeb8a12d51950418e685f879cc80cb8e5982",
                "filename": "CVE-2024-41055-0100aeb8a12d51950418e685f879cc80cb8e5982.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41055/CVE-2024-41055-0100aeb8a12d51950418e685f879cc80cb8e5982.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/797323d1cf92d09b7a017cfec576d9babf99cde7",
                "patch_url": "https://git.kernel.org/stable/p/797323d1cf92d09b7a017cfec576d9babf99cde7",
                "filename": "CVE-2024-41055-797323d1cf92d09b7a017cfec576d9babf99cde7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41055/CVE-2024-41055-797323d1cf92d09b7a017cfec576d9babf99cde7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/82f0b6f041fad768c28b4ad05a683065412c226e",
                "patch_url": "https://git.kernel.org/stable/p/82f0b6f041fad768c28b4ad05a683065412c226e",
                "filename": "CVE-2024-41055-82f0b6f041fad768c28b4ad05a683065412c226e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41055/CVE-2024-41055-82f0b6f041fad768c28b4ad05a683065412c226e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/941e816185661bf2b44b488565d09444ae316509",
                "patch_url": "https://git.kernel.org/stable/p/941e816185661bf2b44b488565d09444ae316509",
                "filename": "CVE-2024-41055-941e816185661bf2b44b488565d09444ae316509.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41055/CVE-2024-41055-941e816185661bf2b44b488565d09444ae316509.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/adccdf702b4ea913ded5ff512239e382d7473b63",
                "patch_url": "https://git.kernel.org/stable/p/adccdf702b4ea913ded5ff512239e382d7473b63",
                "filename": "CVE-2024-41055-adccdf702b4ea913ded5ff512239e382d7473b63.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41055/CVE-2024-41055-adccdf702b4ea913ded5ff512239e382d7473b63.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bc17f2377818dca643a74499c3f5333500c90503",
                "patch_url": "https://git.kernel.org/stable/p/bc17f2377818dca643a74499c3f5333500c90503",
                "filename": "CVE-2024-41055-bc17f2377818dca643a74499c3f5333500c90503.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41055/CVE-2024-41055-bc17f2377818dca643a74499c3f5333500c90503.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0100aeb8a12d51950418e685f879cc80cb8e5982",
            "https://git.kernel.org/stable/c/797323d1cf92d09b7a017cfec576d9babf99cde7",
            "https://git.kernel.org/stable/c/82f0b6f041fad768c28b4ad05a683065412c226e",
            "https://git.kernel.org/stable/c/941e816185661bf2b44b488565d09444ae316509",
            "https://git.kernel.org/stable/c/adccdf702b4ea913ded5ff512239e382d7473b63",
            "https://git.kernel.org/stable/c/bc17f2377818dca643a74499c3f5333500c90503",
            "https://www.cve.org/CVERecord?id=CVE-2024-41055\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41055\nhttps://lore.kernel.org/linux-cve-announce/2024072928-CVE-2024-41055-5764@gregkh/T"
        ]
    },
    "CVE-2024-41056": {
        "cve": "CVE-2024-41056",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files\n\nUse strnlen() instead of strlen() on the algorithm and coefficient name\nstring arrays in V1 wmfw files.\n\nIn V1 wmfw files the name is a NUL-terminated string in a fixed-size\narray. cs_dsp should protect against overrunning the array if the NUL\nterminator is missing.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41056",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/16d76857d6b5426f41b587d0bb925de3f25bfb21",
            "patch_url": "https://git.kernel.org/stable/p/16d76857d6b5426f41b587d0bb925de3f25bfb21",
            "filename": "CVE-2024-41056-16d76857d6b5426f41b587d0bb925de3f25bfb21.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41056/CVE-2024-41056-16d76857d6b5426f41b587d0bb925de3f25bfb21.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/16d76857d6b5426f41b587d0bb925de3f25bfb21",
                "patch_url": "https://git.kernel.org/stable/p/16d76857d6b5426f41b587d0bb925de3f25bfb21",
                "filename": "CVE-2024-41056-16d76857d6b5426f41b587d0bb925de3f25bfb21.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41056/CVE-2024-41056-16d76857d6b5426f41b587d0bb925de3f25bfb21.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/392cff2f86a25a4286ff3151c7739143c61c1781",
                "patch_url": "https://git.kernel.org/stable/p/392cff2f86a25a4286ff3151c7739143c61c1781",
                "filename": "CVE-2024-41056-392cff2f86a25a4286ff3151c7739143c61c1781.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41056/CVE-2024-41056-392cff2f86a25a4286ff3151c7739143c61c1781.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/53a9f8cdbf35a682e9894e1a606f4640e5359185",
                "patch_url": "https://git.kernel.org/stable/p/53a9f8cdbf35a682e9894e1a606f4640e5359185",
                "filename": "CVE-2024-41056-53a9f8cdbf35a682e9894e1a606f4640e5359185.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41056/CVE-2024-41056-53a9f8cdbf35a682e9894e1a606f4640e5359185.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/680e126ec0400f6daecf0510c5bb97a55779ff03",
                "patch_url": "https://git.kernel.org/stable/p/680e126ec0400f6daecf0510c5bb97a55779ff03",
                "filename": "CVE-2024-41056-680e126ec0400f6daecf0510c5bb97a55779ff03.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41056/CVE-2024-41056-680e126ec0400f6daecf0510c5bb97a55779ff03.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/16d76857d6b5426f41b587d0bb925de3f25bfb21",
            "https://git.kernel.org/stable/c/392cff2f86a25a4286ff3151c7739143c61c1781",
            "https://git.kernel.org/stable/c/53a9f8cdbf35a682e9894e1a606f4640e5359185",
            "https://git.kernel.org/stable/c/680e126ec0400f6daecf0510c5bb97a55779ff03",
            "https://www.cve.org/CVERecord?id=CVE-2024-41056\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41056\nhttps://lore.kernel.org/linux-cve-announce/2024072930-CVE-2024-41056-c324@gregkh/T"
        ]
    },
    "CVE-2024-41060": {
        "cve": "CVE-2024-41060",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: check bo_va->bo is non-NULL before using it\n\nThe call to radeon_vm_clear_freed might clear bo_va->bo, so\nwe have to check it before dereferencing it.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41060",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/a9100f17428cb733c4f6fbb132d98bed76318342",
            "patch_url": "https://git.kernel.org/stable/p/a9100f17428cb733c4f6fbb132d98bed76318342",
            "filename": "CVE-2024-41060-a9100f17428cb733c4f6fbb132d98bed76318342.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41060/CVE-2024-41060-a9100f17428cb733c4f6fbb132d98bed76318342.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/6fb15dcbcf4f212930350eaee174bb60ed40a536",
                "patch_url": "https://git.kernel.org/stable/p/6fb15dcbcf4f212930350eaee174bb60ed40a536",
                "filename": "CVE-2024-41060-6fb15dcbcf4f212930350eaee174bb60ed40a536.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41060/CVE-2024-41060-6fb15dcbcf4f212930350eaee174bb60ed40a536.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8a500b3a5f0a58c6f99039091fbd715f64f2f8af",
                "patch_url": "https://git.kernel.org/stable/p/8a500b3a5f0a58c6f99039091fbd715f64f2f8af",
                "filename": "CVE-2024-41060-8a500b3a5f0a58c6f99039091fbd715f64f2f8af.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41060/CVE-2024-41060-8a500b3a5f0a58c6f99039091fbd715f64f2f8af.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a2b201f83971df03c8e81a480b2f2846ae8ce1a3",
                "patch_url": "https://git.kernel.org/stable/p/a2b201f83971df03c8e81a480b2f2846ae8ce1a3",
                "filename": "CVE-2024-41060-a2b201f83971df03c8e81a480b2f2846ae8ce1a3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41060/CVE-2024-41060-a2b201f83971df03c8e81a480b2f2846ae8ce1a3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a9100f17428cb733c4f6fbb132d98bed76318342",
                "patch_url": "https://git.kernel.org/stable/p/a9100f17428cb733c4f6fbb132d98bed76318342",
                "filename": "CVE-2024-41060-a9100f17428cb733c4f6fbb132d98bed76318342.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41060/CVE-2024-41060-a9100f17428cb733c4f6fbb132d98bed76318342.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e8d3c53c6f1cccea9c03113f06dd39521c228831",
                "patch_url": "https://git.kernel.org/stable/p/e8d3c53c6f1cccea9c03113f06dd39521c228831",
                "filename": "CVE-2024-41060-e8d3c53c6f1cccea9c03113f06dd39521c228831.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41060/CVE-2024-41060-e8d3c53c6f1cccea9c03113f06dd39521c228831.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f13c96e0e325a057c03f8a47734adb360e112efe",
                "patch_url": "https://git.kernel.org/stable/p/f13c96e0e325a057c03f8a47734adb360e112efe",
                "filename": "CVE-2024-41060-f13c96e0e325a057c03f8a47734adb360e112efe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41060/CVE-2024-41060-f13c96e0e325a057c03f8a47734adb360e112efe.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/6fb15dcbcf4f212930350eaee174bb60ed40a536",
            "https://git.kernel.org/stable/c/8a500b3a5f0a58c6f99039091fbd715f64f2f8af",
            "https://git.kernel.org/stable/c/a2b201f83971df03c8e81a480b2f2846ae8ce1a3",
            "https://git.kernel.org/stable/c/a9100f17428cb733c4f6fbb132d98bed76318342",
            "https://git.kernel.org/stable/c/e8d3c53c6f1cccea9c03113f06dd39521c228831",
            "https://git.kernel.org/stable/c/f13c96e0e325a057c03f8a47734adb360e112efe",
            "https://www.cve.org/CVERecord?id=CVE-2024-41060\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41060\nhttps://lore.kernel.org/linux-cve-announce/2024072905-CVE-2024-41060-b7de@gregkh/T"
        ]
    },
    "CVE-2024-41064": {
        "cve": "CVE-2024-41064",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/eeh: avoid possible crash when edev->pdev changes\n\nIf a PCI device is removed during eeh_pe_report_edev(), edev->pdev\nwill change and can cause a crash, hold the PCI rescan/remove lock\nwhile taking a copy of edev->pdev->bus.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41064",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4bc246d2d60d071314842fa448faa4ed39082aff",
            "patch_url": "https://git.kernel.org/stable/p/4bc246d2d60d071314842fa448faa4ed39082aff",
            "filename": "CVE-2024-41064-4bc246d2d60d071314842fa448faa4ed39082aff.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41064/CVE-2024-41064-4bc246d2d60d071314842fa448faa4ed39082aff.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/033c51dfdbb6b79ab43fb3587276fa82d0a329e1",
                "patch_url": "https://git.kernel.org/stable/p/033c51dfdbb6b79ab43fb3587276fa82d0a329e1",
                "filename": "CVE-2024-41064-033c51dfdbb6b79ab43fb3587276fa82d0a329e1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41064/CVE-2024-41064-033c51dfdbb6b79ab43fb3587276fa82d0a329e1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/428d940a8b6b3350b282c14d3f63350bde65c48b",
                "patch_url": "https://git.kernel.org/stable/p/428d940a8b6b3350b282c14d3f63350bde65c48b",
                "filename": "CVE-2024-41064-428d940a8b6b3350b282c14d3f63350bde65c48b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41064/CVE-2024-41064-428d940a8b6b3350b282c14d3f63350bde65c48b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4bc246d2d60d071314842fa448faa4ed39082aff",
                "patch_url": "https://git.kernel.org/stable/p/4bc246d2d60d071314842fa448faa4ed39082aff",
                "filename": "CVE-2024-41064-4bc246d2d60d071314842fa448faa4ed39082aff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41064/CVE-2024-41064-4bc246d2d60d071314842fa448faa4ed39082aff.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4fad7fef847b6028475dd7b4c14fcb82b3e51274",
                "patch_url": "https://git.kernel.org/stable/p/4fad7fef847b6028475dd7b4c14fcb82b3e51274",
                "filename": "CVE-2024-41064-4fad7fef847b6028475dd7b4c14fcb82b3e51274.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41064/CVE-2024-41064-4fad7fef847b6028475dd7b4c14fcb82b3e51274.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8836e1bf5838ac6c08760e0a2dd7cf6410aa7ff3",
                "patch_url": "https://git.kernel.org/stable/p/8836e1bf5838ac6c08760e0a2dd7cf6410aa7ff3",
                "filename": "CVE-2024-41064-8836e1bf5838ac6c08760e0a2dd7cf6410aa7ff3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41064/CVE-2024-41064-8836e1bf5838ac6c08760e0a2dd7cf6410aa7ff3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a1216e62d039bf63a539bbe718536ec789a853dd",
                "patch_url": "https://git.kernel.org/stable/p/a1216e62d039bf63a539bbe718536ec789a853dd",
                "filename": "CVE-2024-41064-a1216e62d039bf63a539bbe718536ec789a853dd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41064/CVE-2024-41064-a1216e62d039bf63a539bbe718536ec789a853dd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f23c3d1ca9c4b2d626242a4e7e1ec1770447f7b5",
                "patch_url": "https://git.kernel.org/stable/p/f23c3d1ca9c4b2d626242a4e7e1ec1770447f7b5",
                "filename": "CVE-2024-41064-f23c3d1ca9c4b2d626242a4e7e1ec1770447f7b5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41064/CVE-2024-41064-f23c3d1ca9c4b2d626242a4e7e1ec1770447f7b5.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/033c51dfdbb6b79ab43fb3587276fa82d0a329e1",
            "https://git.kernel.org/stable/c/428d940a8b6b3350b282c14d3f63350bde65c48b",
            "https://git.kernel.org/stable/c/4bc246d2d60d071314842fa448faa4ed39082aff",
            "https://git.kernel.org/stable/c/4fad7fef847b6028475dd7b4c14fcb82b3e51274",
            "https://git.kernel.org/stable/c/8836e1bf5838ac6c08760e0a2dd7cf6410aa7ff3",
            "https://git.kernel.org/stable/c/a1216e62d039bf63a539bbe718536ec789a853dd",
            "https://git.kernel.org/stable/c/f23c3d1ca9c4b2d626242a4e7e1ec1770447f7b5",
            "https://www.cve.org/CVERecord?id=CVE-2024-41064\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41064\nhttps://lore.kernel.org/linux-cve-announce/2024072907-CVE-2024-41064-6ecb@gregkh/T"
        ]
    },
    "CVE-2024-41065": {
        "cve": "CVE-2024-41065",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries: Whitelist dtl slub object for copying to userspace\n\nReading the dispatch trace log from /sys/kernel/debug/powerpc/dtl/cpu-*\nresults in a BUG() when the config CONFIG_HARDENED_USERCOPY is enabled as\nshown below.\n\n    kernel BUG at mm/usercopy.c:102!\n    Oops: Exception in kernel mode, sig: 5 [#1]\n    LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\n    Modules linked in: xfs libcrc32c dm_service_time sd_mod t10_pi sg ibmvfc\n    scsi_transport_fc ibmveth pseries_wdt dm_multipath dm_mirror dm_region_hash dm_log dm_mod fuse\n    CPU: 27 PID: 1815 Comm: python3 Not tainted 6.10.0-rc3 #85\n    Hardware name: IBM,9040-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_042) hv:phyp pSeries\n    NIP:  c0000000005d23d4 LR: c0000000005d23d0 CTR: 00000000006ee6f8\n    REGS: c000000120c078c0 TRAP: 0700   Not tainted  (6.10.0-rc3)\n    MSR:  8000000000029033 <SF,EE,ME,IR,DR,RI,LE>  CR: 2828220f  XER: 0000000e\n    CFAR: c0000000001fdc80 IRQMASK: 0\n    [ ... GPRs omitted ... ]\n    NIP [c0000000005d23d4] usercopy_abort+0x78/0xb0\n    LR [c0000000005d23d0] usercopy_abort+0x74/0xb0\n    Call Trace:\n     usercopy_abort+0x74/0xb0 (unreliable)\n     __check_heap_object+0xf8/0x120\n     check_heap_object+0x218/0x240\n     __check_object_size+0x84/0x1a4\n     dtl_file_read+0x17c/0x2c4\n     full_proxy_read+0x8c/0x110\n     vfs_read+0xdc/0x3a0\n     ksys_read+0x84/0x144\n     system_call_exception+0x124/0x330\n     system_call_vectored_common+0x15c/0x2ec\n    --- interrupt: 3000 at 0x7fff81f3ab34\n\nCommit 6d07d1cd300f (\"usercopy: Restrict non-usercopy caches to size 0\")\nrequires that only whitelisted areas in slab/slub objects can be copied to\nuserspace when usercopy hardening is enabled using CONFIG_HARDENED_USERCOPY.\nDtl contains hypervisor dispatch events which are expected to be read by\nprivileged users. Hence mark this safe for user access.\nSpecify useroffset=0 and usersize=DISPATCH_LOG_BYTES to whitelist the\nentire object.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41065",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/a7b952941ce07e1e7a2cafd08c64a98e14f553e6",
            "patch_url": "https://git.kernel.org/stable/p/a7b952941ce07e1e7a2cafd08c64a98e14f553e6",
            "filename": "CVE-2024-41065-a7b952941ce07e1e7a2cafd08c64a98e14f553e6.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41065/CVE-2024-41065-a7b952941ce07e1e7a2cafd08c64a98e14f553e6.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0f5892212c27be31792ef1daa89c8dac1b3047e4",
                "patch_url": "https://git.kernel.org/stable/p/0f5892212c27be31792ef1daa89c8dac1b3047e4",
                "filename": "CVE-2024-41065-0f5892212c27be31792ef1daa89c8dac1b3047e4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41065/CVE-2024-41065-0f5892212c27be31792ef1daa89c8dac1b3047e4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1a14150e1656f7a332a943154fc486504db4d586",
                "patch_url": "https://git.kernel.org/stable/p/1a14150e1656f7a332a943154fc486504db4d586",
                "filename": "CVE-2024-41065-1a14150e1656f7a332a943154fc486504db4d586.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41065/CVE-2024-41065-1a14150e1656f7a332a943154fc486504db4d586.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1ee68686d1e2a5da35d5650be0be1ce06fe2ceb2",
                "patch_url": "https://git.kernel.org/stable/p/1ee68686d1e2a5da35d5650be0be1ce06fe2ceb2",
                "filename": "CVE-2024-41065-1ee68686d1e2a5da35d5650be0be1ce06fe2ceb2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41065/CVE-2024-41065-1ee68686d1e2a5da35d5650be0be1ce06fe2ceb2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6b16098148ea58a67430d90e20476be2377c3acd",
                "patch_url": "https://git.kernel.org/stable/p/6b16098148ea58a67430d90e20476be2377c3acd",
                "filename": "CVE-2024-41065-6b16098148ea58a67430d90e20476be2377c3acd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41065/CVE-2024-41065-6b16098148ea58a67430d90e20476be2377c3acd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a7b952941ce07e1e7a2cafd08c64a98e14f553e6",
                "patch_url": "https://git.kernel.org/stable/p/a7b952941ce07e1e7a2cafd08c64a98e14f553e6",
                "filename": "CVE-2024-41065-a7b952941ce07e1e7a2cafd08c64a98e14f553e6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41065/CVE-2024-41065-a7b952941ce07e1e7a2cafd08c64a98e14f553e6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e512a59b472684d8585125101ab03b86c2c1348a",
                "patch_url": "https://git.kernel.org/stable/p/e512a59b472684d8585125101ab03b86c2c1348a",
                "filename": "CVE-2024-41065-e512a59b472684d8585125101ab03b86c2c1348a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41065/CVE-2024-41065-e512a59b472684d8585125101ab03b86c2c1348a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e59822f9d700349cd17968d22c979db23a2d347f",
                "patch_url": "https://git.kernel.org/stable/p/e59822f9d700349cd17968d22c979db23a2d347f",
                "filename": "CVE-2024-41065-e59822f9d700349cd17968d22c979db23a2d347f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41065/CVE-2024-41065-e59822f9d700349cd17968d22c979db23a2d347f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0f5892212c27be31792ef1daa89c8dac1b3047e4",
            "https://git.kernel.org/stable/c/1a14150e1656f7a332a943154fc486504db4d586",
            "https://git.kernel.org/stable/c/1ee68686d1e2a5da35d5650be0be1ce06fe2ceb2",
            "https://git.kernel.org/stable/c/6b16098148ea58a67430d90e20476be2377c3acd",
            "https://git.kernel.org/stable/c/a7b952941ce07e1e7a2cafd08c64a98e14f553e6",
            "https://git.kernel.org/stable/c/e512a59b472684d8585125101ab03b86c2c1348a",
            "https://git.kernel.org/stable/c/e59822f9d700349cd17968d22c979db23a2d347f",
            "https://www.cve.org/CVERecord?id=CVE-2024-41065\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41065\nhttps://lore.kernel.org/linux-cve-announce/2024072907-CVE-2024-41065-2501@gregkh/T"
        ]
    },
    "CVE-2024-41066": {
        "cve": "CVE-2024-41066",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nibmvnic: Add tx check to prevent skb leak\n\nBelow is a summary of how the driver stores a reference to an skb during\ntransmit:\n    tx_buff[free_map[consumer_index]]->skb = new_skb;\n    free_map[consumer_index] = IBMVNIC_INVALID_MAP;\n    consumer_index ++;\nWhere variable data looks like this:\n    free_map == [4, IBMVNIC_INVALID_MAP, IBMVNIC_INVALID_MAP, 0, 3]\n                                               \tconsumer_index^\n    tx_buff == [skb=null, skb=<ptr>, skb=<ptr>, skb=null, skb=null]\n\nThe driver has checks to ensure that free_map[consumer_index] pointed to\na valid index but there was no check to ensure that this index pointed\nto an unused/null skb address. So, if, by some chance, our free_map and\ntx_buff lists become out of sync then we were previously risking an\nskb memory leak. This could then cause tcp congestion control to stop\nsending packets, eventually leading to ETIMEDOUT.\n\nTherefore, add a conditional to ensure that the skb address is null. If\nnot then warn the user (because this is still a bug that should be\npatched) and free the old pointer to prevent memleak/tcp problems.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41066",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0983d288caf984de0202c66641577b739caad561",
            "patch_url": "https://git.kernel.org/stable/p/0983d288caf984de0202c66641577b739caad561",
            "filename": "CVE-2024-41066-0983d288caf984de0202c66641577b739caad561.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41066/CVE-2024-41066-0983d288caf984de0202c66641577b739caad561.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0983d288caf984de0202c66641577b739caad561",
                "patch_url": "https://git.kernel.org/stable/p/0983d288caf984de0202c66641577b739caad561",
                "filename": "CVE-2024-41066-0983d288caf984de0202c66641577b739caad561.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41066/CVE-2024-41066-0983d288caf984de0202c66641577b739caad561.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/16ad1557cae582e79bb82dddd612d9bdfaa11d4c",
                "patch_url": "https://git.kernel.org/stable/p/16ad1557cae582e79bb82dddd612d9bdfaa11d4c",
                "filename": "CVE-2024-41066-16ad1557cae582e79bb82dddd612d9bdfaa11d4c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41066/CVE-2024-41066-16ad1557cae582e79bb82dddd612d9bdfaa11d4c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/267c61c4afed0ff9a2e83462abad3f41d8ca1f06",
                "patch_url": "https://git.kernel.org/stable/p/267c61c4afed0ff9a2e83462abad3f41d8ca1f06",
                "filename": "CVE-2024-41066-267c61c4afed0ff9a2e83462abad3f41d8ca1f06.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41066/CVE-2024-41066-267c61c4afed0ff9a2e83462abad3f41d8ca1f06.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e7b75def33eae61ddaad6cb616c517dc3882eb2a",
                "patch_url": "https://git.kernel.org/stable/p/e7b75def33eae61ddaad6cb616c517dc3882eb2a",
                "filename": "CVE-2024-41066-e7b75def33eae61ddaad6cb616c517dc3882eb2a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41066/CVE-2024-41066-e7b75def33eae61ddaad6cb616c517dc3882eb2a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0983d288caf984de0202c66641577b739caad561",
            "https://git.kernel.org/stable/c/16ad1557cae582e79bb82dddd612d9bdfaa11d4c",
            "https://git.kernel.org/stable/c/267c61c4afed0ff9a2e83462abad3f41d8ca1f06",
            "https://git.kernel.org/stable/c/e7b75def33eae61ddaad6cb616c517dc3882eb2a",
            "https://www.cve.org/CVERecord?id=CVE-2024-41066\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41066\nhttps://lore.kernel.org/linux-cve-announce/2024072907-CVE-2024-41066-0a52@gregkh/T"
        ]
    },
    "CVE-2024-41071": {
        "cve": "CVE-2024-41071",
        "cvss_v2": null,
        "cvss_v3": null,
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41071",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/a2bb0c5d0086be5ab5054465dfaa381a1144905c",
            "patch_url": "https://git.kernel.org/stable/p/a2bb0c5d0086be5ab5054465dfaa381a1144905c",
            "filename": "CVE-2024-41071-a2bb0c5d0086be5ab5054465dfaa381a1144905c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41071/CVE-2024-41071-a2bb0c5d0086be5ab5054465dfaa381a1144905c.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2663d0462eb32ae7c9b035300ab6b1523886c718",
                "patch_url": "https://git.kernel.org/stable/p/2663d0462eb32ae7c9b035300ab6b1523886c718",
                "filename": "CVE-2024-41071-2663d0462eb32ae7c9b035300ab6b1523886c718.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41071/CVE-2024-41071-2663d0462eb32ae7c9b035300ab6b1523886c718.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/26b177ecdd311f20de4c379f0630858a675dfc0c",
                "patch_url": "https://git.kernel.org/stable/p/26b177ecdd311f20de4c379f0630858a675dfc0c",
                "filename": "CVE-2024-41071-26b177ecdd311f20de4c379f0630858a675dfc0c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41071/CVE-2024-41071-26b177ecdd311f20de4c379f0630858a675dfc0c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0",
                "patch_url": "https://git.kernel.org/stable/p/4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0",
                "filename": "CVE-2024-41071-4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41071/CVE-2024-41071-4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a2bb0c5d0086be5ab5054465dfaa381a1144905c",
                "patch_url": "https://git.kernel.org/stable/p/a2bb0c5d0086be5ab5054465dfaa381a1144905c",
                "filename": "CVE-2024-41071-a2bb0c5d0086be5ab5054465dfaa381a1144905c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41071/CVE-2024-41071-a2bb0c5d0086be5ab5054465dfaa381a1144905c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://bugzilla.kernel.org/show_bug.cgi?id=218810",
            "https://git.kernel.org/stable/c/2663d0462eb32ae7c9b035300ab6b1523886c718",
            "https://git.kernel.org/stable/c/26b177ecdd311f20de4c379f0630858a675dfc0c",
            "https://git.kernel.org/stable/c/4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0",
            "https://git.kernel.org/stable/c/a2bb0c5d0086be5ab5054465dfaa381a1144905c",
            "https://www.cve.org/CVERecord?id=CVE-2024-41071\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41071\nhttps://lore.kernel.org/linux-cve-announce/2024072909-CVE-2024-41071-4eb6@gregkh/T"
        ]
    },
    "CVE-2024-41076": {
        "cve": "CVE-2024-41076",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4: Fix memory leak in nfs4_set_security_label\n\nWe leak nfs_fattr and nfs4_label every time we set a security xattr.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41076",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/b98090699319e64f5de1e8db5bb75870f1eb1c6e",
            "patch_url": "https://git.kernel.org/stable/p/b98090699319e64f5de1e8db5bb75870f1eb1c6e",
            "filename": "CVE-2024-41076-b98090699319e64f5de1e8db5bb75870f1eb1c6e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41076/CVE-2024-41076-b98090699319e64f5de1e8db5bb75870f1eb1c6e.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/899604a7c958771840941caff9ee3dd8193d984c",
                "patch_url": "https://git.kernel.org/stable/p/899604a7c958771840941caff9ee3dd8193d984c",
                "filename": "CVE-2024-41076-899604a7c958771840941caff9ee3dd8193d984c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41076/CVE-2024-41076-899604a7c958771840941caff9ee3dd8193d984c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aad11473f8f4be3df86461081ce35ec5b145ba68",
                "patch_url": "https://git.kernel.org/stable/p/aad11473f8f4be3df86461081ce35ec5b145ba68",
                "filename": "CVE-2024-41076-aad11473f8f4be3df86461081ce35ec5b145ba68.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41076/CVE-2024-41076-aad11473f8f4be3df86461081ce35ec5b145ba68.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b98090699319e64f5de1e8db5bb75870f1eb1c6e",
                "patch_url": "https://git.kernel.org/stable/p/b98090699319e64f5de1e8db5bb75870f1eb1c6e",
                "filename": "CVE-2024-41076-b98090699319e64f5de1e8db5bb75870f1eb1c6e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41076/CVE-2024-41076-b98090699319e64f5de1e8db5bb75870f1eb1c6e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d130220ccc94d74d70da984a199477937e7bf03c",
                "patch_url": "https://git.kernel.org/stable/p/d130220ccc94d74d70da984a199477937e7bf03c",
                "filename": "CVE-2024-41076-d130220ccc94d74d70da984a199477937e7bf03c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41076/CVE-2024-41076-d130220ccc94d74d70da984a199477937e7bf03c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/899604a7c958771840941caff9ee3dd8193d984c",
            "https://git.kernel.org/stable/c/aad11473f8f4be3df86461081ce35ec5b145ba68",
            "https://git.kernel.org/stable/c/b98090699319e64f5de1e8db5bb75870f1eb1c6e",
            "https://git.kernel.org/stable/c/d130220ccc94d74d70da984a199477937e7bf03c",
            "https://www.cve.org/CVERecord?id=CVE-2024-41076\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41076\nhttps://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41076-6124@gregkh/T"
        ]
    },
    "CVE-2024-41090": {
        "cve": "CVE-2024-41090",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntap: add missing verification for short frame\n\nThe cited commit missed to check against the validity of the frame length\nin the tap_get_user_xdp() path, which could cause a corrupted skb to be\nsent downstack. Even before the skb is transmitted, the\ntap_get_user_xdp()-->skb_set_network_header() may assume the size is more\nthan ETH_HLEN. Once transmitted, this could either cause out-of-bound\naccess beyond the actual length, or confuse the underlayer with incorrect\nor inconsistent header length in the skb metadata.\n\nIn the alternative path, tap_get_user() already prohibits short frame which\nhas the length less than Ethernet header size from being transmitted.\n\nThis is to drop any frame shorter than the Ethernet header size just like\nhow tap_get_user() does.\n\nCVE: CVE-2024-41090",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41090",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ee93e6da30377cf2a75e16cd32bb9fcd86a61c46",
            "patch_url": "https://git.kernel.org/stable/p/ee93e6da30377cf2a75e16cd32bb9fcd86a61c46",
            "filename": "CVE-2024-41090-ee93e6da30377cf2a75e16cd32bb9fcd86a61c46.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41090/CVE-2024-41090-ee93e6da30377cf2a75e16cd32bb9fcd86a61c46.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/73d462a38d5f782b7c872fe9ae8393d9ef5483da",
                "patch_url": "https://git.kernel.org/stable/p/73d462a38d5f782b7c872fe9ae8393d9ef5483da",
                "filename": "CVE-2024-41090-73d462a38d5f782b7c872fe9ae8393d9ef5483da.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41090/CVE-2024-41090-73d462a38d5f782b7c872fe9ae8393d9ef5483da.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7431144b406ae82807eb87d8c98e518475b0450f",
                "patch_url": "https://git.kernel.org/stable/p/7431144b406ae82807eb87d8c98e518475b0450f",
                "filename": "CVE-2024-41090-7431144b406ae82807eb87d8c98e518475b0450f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41090/CVE-2024-41090-7431144b406ae82807eb87d8c98e518475b0450f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8be915fc5ff9a5e296f6538be12ea75a1a93bdea",
                "patch_url": "https://git.kernel.org/stable/p/8be915fc5ff9a5e296f6538be12ea75a1a93bdea",
                "filename": "CVE-2024-41090-8be915fc5ff9a5e296f6538be12ea75a1a93bdea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41090/CVE-2024-41090-8be915fc5ff9a5e296f6538be12ea75a1a93bdea.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aa6a5704cab861c9b2ae9f475076e1881e87f5aa",
                "patch_url": "https://git.kernel.org/stable/p/aa6a5704cab861c9b2ae9f475076e1881e87f5aa",
                "filename": "CVE-2024-41090-aa6a5704cab861c9b2ae9f475076e1881e87f5aa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41090/CVE-2024-41090-aa6a5704cab861c9b2ae9f475076e1881e87f5aa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e1a786b9bbb767fd1c922d424aaa8078cc542309",
                "patch_url": "https://git.kernel.org/stable/p/e1a786b9bbb767fd1c922d424aaa8078cc542309",
                "filename": "CVE-2024-41090-e1a786b9bbb767fd1c922d424aaa8078cc542309.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41090/CVE-2024-41090-e1a786b9bbb767fd1c922d424aaa8078cc542309.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e5e5e63c506b93b89b01f522b6a7343585f784e6",
                "patch_url": "https://git.kernel.org/stable/p/e5e5e63c506b93b89b01f522b6a7343585f784e6",
                "filename": "CVE-2024-41090-e5e5e63c506b93b89b01f522b6a7343585f784e6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41090/CVE-2024-41090-e5e5e63c506b93b89b01f522b6a7343585f784e6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ed7f2afdd0e043a397677e597ced0830b83ba0b3",
                "patch_url": "https://git.kernel.org/stable/p/ed7f2afdd0e043a397677e597ced0830b83ba0b3",
                "filename": "CVE-2024-41090-ed7f2afdd0e043a397677e597ced0830b83ba0b3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41090/CVE-2024-41090-ed7f2afdd0e043a397677e597ced0830b83ba0b3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ee93e6da30377cf2a75e16cd32bb9fcd86a61c46",
                "patch_url": "https://git.kernel.org/stable/p/ee93e6da30377cf2a75e16cd32bb9fcd86a61c46",
                "filename": "CVE-2024-41090-ee93e6da30377cf2a75e16cd32bb9fcd86a61c46.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41090/CVE-2024-41090-ee93e6da30377cf2a75e16cd32bb9fcd86a61c46.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/73d462a38d5f782b7c872fe9ae8393d9ef5483da",
            "https://git.kernel.org/stable/c/7431144b406ae82807eb87d8c98e518475b0450f",
            "https://git.kernel.org/stable/c/8be915fc5ff9a5e296f6538be12ea75a1a93bdea",
            "https://git.kernel.org/stable/c/aa6a5704cab861c9b2ae9f475076e1881e87f5aa",
            "https://git.kernel.org/stable/c/e1a786b9bbb767fd1c922d424aaa8078cc542309",
            "https://git.kernel.org/stable/c/e5e5e63c506b93b89b01f522b6a7343585f784e6",
            "https://git.kernel.org/stable/c/ed7f2afdd0e043a397677e597ced0830b83ba0b3",
            "https://git.kernel.org/stable/c/ee93e6da30377cf2a75e16cd32bb9fcd86a61c46",
            "https://www.cve.org/CVERecord?id=CVE-2024-41090\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41090\nhttps://lore.kernel.org/linux-cve-announce/2024072916-CVE-2024-41090-9830@gregkh\nhttps://www.openwall.com/lists/oss-security/2024/07/24/4"
        ]
    },
    "CVE-2024-41091": {
        "cve": "CVE-2024-41091",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntun: add missing verification for short frame\n\nThe cited commit missed to check against the validity of the frame length\nin the tun_xdp_one() path, which could cause a corrupted skb to be sent\ndownstack. Even before the skb is transmitted, the\ntun_xdp_one-->eth_type_trans() may access the Ethernet header although it\ncan be less than ETH_HLEN. Once transmitted, this could either cause\nout-of-bound access beyond the actual length, or confuse the underlayer\nwith incorrect or inconsistent header length in the skb metadata.\n\nIn the alternative path, tun_get_user() already prohibits short frame which\nhas the length less than Ethernet header size from being transmitted for\nIFF_TAP.\n\nThis is to drop any frame shorter than the Ethernet header size just like\nhow tun_get_user() does.\n\nCVE: CVE-2024-41091",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41091",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ad6b3f622ccfb4bfedfa53b6ebd91c3d1d04f146",
            "patch_url": "https://git.kernel.org/stable/p/ad6b3f622ccfb4bfedfa53b6ebd91c3d1d04f146",
            "filename": "CVE-2024-41091-ad6b3f622ccfb4bfedfa53b6ebd91c3d1d04f146.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41091/CVE-2024-41091-ad6b3f622ccfb4bfedfa53b6ebd91c3d1d04f146.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/049584807f1d797fc3078b68035450a9769eb5c3",
                "patch_url": "https://git.kernel.org/stable/p/049584807f1d797fc3078b68035450a9769eb5c3",
                "filename": "CVE-2024-41091-049584807f1d797fc3078b68035450a9769eb5c3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41091/CVE-2024-41091-049584807f1d797fc3078b68035450a9769eb5c3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/32b0aaba5dbc85816898167d9b5d45a22eae82e9",
                "patch_url": "https://git.kernel.org/stable/p/32b0aaba5dbc85816898167d9b5d45a22eae82e9",
                "filename": "CVE-2024-41091-32b0aaba5dbc85816898167d9b5d45a22eae82e9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41091/CVE-2024-41091-32b0aaba5dbc85816898167d9b5d45a22eae82e9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/589382f50b4a5d90d16d8bc9dcbc0e927a3e39b2",
                "patch_url": "https://git.kernel.org/stable/p/589382f50b4a5d90d16d8bc9dcbc0e927a3e39b2",
                "filename": "CVE-2024-41091-589382f50b4a5d90d16d8bc9dcbc0e927a3e39b2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41091/CVE-2024-41091-589382f50b4a5d90d16d8bc9dcbc0e927a3e39b2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6100e0237204890269e3f934acfc50d35fd6f319",
                "patch_url": "https://git.kernel.org/stable/p/6100e0237204890269e3f934acfc50d35fd6f319",
                "filename": "CVE-2024-41091-6100e0237204890269e3f934acfc50d35fd6f319.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41091/CVE-2024-41091-6100e0237204890269e3f934acfc50d35fd6f319.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8418f55302fa1d2eeb73e16e345167e545c598a5",
                "patch_url": "https://git.kernel.org/stable/p/8418f55302fa1d2eeb73e16e345167e545c598a5",
                "filename": "CVE-2024-41091-8418f55302fa1d2eeb73e16e345167e545c598a5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41091/CVE-2024-41091-8418f55302fa1d2eeb73e16e345167e545c598a5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a9d1c27e2ee3b0ea5d40c105d6e728fc114470bb",
                "patch_url": "https://git.kernel.org/stable/p/a9d1c27e2ee3b0ea5d40c105d6e728fc114470bb",
                "filename": "CVE-2024-41091-a9d1c27e2ee3b0ea5d40c105d6e728fc114470bb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41091/CVE-2024-41091-a9d1c27e2ee3b0ea5d40c105d6e728fc114470bb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ad6b3f622ccfb4bfedfa53b6ebd91c3d1d04f146",
                "patch_url": "https://git.kernel.org/stable/p/ad6b3f622ccfb4bfedfa53b6ebd91c3d1d04f146",
                "filename": "CVE-2024-41091-ad6b3f622ccfb4bfedfa53b6ebd91c3d1d04f146.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41091/CVE-2024-41091-ad6b3f622ccfb4bfedfa53b6ebd91c3d1d04f146.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d5ad89b7d01ed4e66fd04734fc63d6e78536692a",
                "patch_url": "https://git.kernel.org/stable/p/d5ad89b7d01ed4e66fd04734fc63d6e78536692a",
                "filename": "CVE-2024-41091-d5ad89b7d01ed4e66fd04734fc63d6e78536692a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41091/CVE-2024-41091-d5ad89b7d01ed4e66fd04734fc63d6e78536692a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/049584807f1d797fc3078b68035450a9769eb5c3",
            "https://git.kernel.org/stable/c/32b0aaba5dbc85816898167d9b5d45a22eae82e9",
            "https://git.kernel.org/stable/c/589382f50b4a5d90d16d8bc9dcbc0e927a3e39b2",
            "https://git.kernel.org/stable/c/6100e0237204890269e3f934acfc50d35fd6f319",
            "https://git.kernel.org/stable/c/8418f55302fa1d2eeb73e16e345167e545c598a5",
            "https://git.kernel.org/stable/c/a9d1c27e2ee3b0ea5d40c105d6e728fc114470bb",
            "https://git.kernel.org/stable/c/ad6b3f622ccfb4bfedfa53b6ebd91c3d1d04f146",
            "https://git.kernel.org/stable/c/d5ad89b7d01ed4e66fd04734fc63d6e78536692a",
            "https://www.cve.org/CVERecord?id=CVE-2024-41091\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41091\nhttps://lore.kernel.org/linux-cve-announce/2024072918-CVE-2024-41091-35b7@gregkh\nhttps://www.openwall.com/lists/oss-security/2024/07/24/4"
        ]
    },
    "CVE-2024-41092": {
        "cve": "CVE-2024-41092",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/gt: Fix potential UAF by revoke of fence registers\n\nCI has been sporadically reporting the following issue triggered by\nigt@i915_selftest@live@hangcheck on ADL-P and similar machines:\n\n<6> [414.049203] i915: Running intel_hangcheck_live_selftests/igt_reset_evict_fence\n...\n<6> [414.068804] i915 0000:00:02.0: [drm] GT0: GUC: submission enabled\n<6> [414.068812] i915 0000:00:02.0: [drm] GT0: GUC: SLPC enabled\n<3> [414.070354] Unable to pin Y-tiled fence; err:-4\n<3> [414.071282] i915_vma_revoke_fence:301 GEM_BUG_ON(!i915_active_is_idle(&fence->active))\n...\n<4>[  609.603992] ------------[ cut here ]------------\n<2>[  609.603995] kernel BUG at drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c:301!\n<4>[  609.604003] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n<4>[  609.604006] CPU: 0 PID: 268 Comm: kworker/u64:3 Tainted: G     U  W          6.9.0-CI_DRM_14785-g1ba62f8cea9c+ #1\n<4>[  609.604008] Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023\n<4>[  609.604010] Workqueue: i915 __i915_gem_free_work [i915]\n<4>[  609.604149] RIP: 0010:i915_vma_revoke_fence+0x187/0x1f0 [i915]\n...\n<4>[  609.604271] Call Trace:\n<4>[  609.604273]  <TASK>\n...\n<4>[  609.604716]  __i915_vma_evict+0x2e9/0x550 [i915]\n<4>[  609.604852]  __i915_vma_unbind+0x7c/0x160 [i915]\n<4>[  609.604977]  force_unbind+0x24/0xa0 [i915]\n<4>[  609.605098]  i915_vma_destroy+0x2f/0xa0 [i915]\n<4>[  609.605210]  __i915_gem_object_pages_fini+0x51/0x2f0 [i915]\n<4>[  609.605330]  __i915_gem_free_objects.isra.0+0x6a/0xc0 [i915]\n<4>[  609.605440]  process_scheduled_works+0x351/0x690\n...\n\nIn the past, there were similar failures reported by CI from other IGT\ntests, observed on other platforms.\n\nBefore commit 63baf4f3d587 (\"drm/i915/gt: Only wait for GPU activity\nbefore unbinding a GGTT fence\"), i915_vma_revoke_fence() was waiting for\nidleness of vma->active via fence_update().   That commit introduced\nvma->fence->active in order for the fence_update() to be able to wait\nselectively on that one instead of vma->active since only idleness of\nfence registers was needed.  But then, another commit 0d86ee35097a\n(\"drm/i915/gt: Make fence revocation unequivocal\") replaced the call to\nfence_update() in i915_vma_revoke_fence() with only fence_write(), and\nalso added that GEM_BUG_ON(!i915_active_is_idle(&fence->active)) in front.\nNo justification was provided on why we might then expect idleness of\nvma->fence->active without first waiting on it.\n\nThe issue can be potentially caused by a race among revocation of fence\nregisters on one side and sequential execution of signal callbacks invoked\non completion of a request that was using them on the other, still\nprocessed in parallel to revocation of those fence registers.  Fix it by\nwaiting for idleness of vma->fence->active in i915_vma_revoke_fence().\n\n(cherry picked from commit 24bb052d3dd499c5956abad5f7d8e4fd07da7fb1)",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41092",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ca0fabd365a27a94a36e68a7a02df8ff3c13dac6",
            "patch_url": "https://git.kernel.org/stable/p/ca0fabd365a27a94a36e68a7a02df8ff3c13dac6",
            "filename": "CVE-2024-41092-ca0fabd365a27a94a36e68a7a02df8ff3c13dac6.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41092/CVE-2024-41092-ca0fabd365a27a94a36e68a7a02df8ff3c13dac6.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/06dec31a0a5112a91f49085e8a8fa1a82296d5c7",
                "patch_url": "https://git.kernel.org/stable/p/06dec31a0a5112a91f49085e8a8fa1a82296d5c7",
                "filename": "CVE-2024-41092-06dec31a0a5112a91f49085e8a8fa1a82296d5c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41092/CVE-2024-41092-06dec31a0a5112a91f49085e8a8fa1a82296d5c7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/29c0fdf49078ab161570d3d1c6e13d66f182717d",
                "patch_url": "https://git.kernel.org/stable/p/29c0fdf49078ab161570d3d1c6e13d66f182717d",
                "filename": "CVE-2024-41092-29c0fdf49078ab161570d3d1c6e13d66f182717d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41092/CVE-2024-41092-29c0fdf49078ab161570d3d1c6e13d66f182717d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/414f4a31f7a811008fd9a33b06216b060bad18fc",
                "patch_url": "https://git.kernel.org/stable/p/414f4a31f7a811008fd9a33b06216b060bad18fc",
                "filename": "CVE-2024-41092-414f4a31f7a811008fd9a33b06216b060bad18fc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41092/CVE-2024-41092-414f4a31f7a811008fd9a33b06216b060bad18fc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/996c3412a06578e9d779a16b9e79ace18125ab50",
                "patch_url": "https://git.kernel.org/stable/p/996c3412a06578e9d779a16b9e79ace18125ab50",
                "filename": "CVE-2024-41092-996c3412a06578e9d779a16b9e79ace18125ab50.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41092/CVE-2024-41092-996c3412a06578e9d779a16b9e79ace18125ab50.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ca0fabd365a27a94a36e68a7a02df8ff3c13dac6",
                "patch_url": "https://git.kernel.org/stable/p/ca0fabd365a27a94a36e68a7a02df8ff3c13dac6",
                "filename": "CVE-2024-41092-ca0fabd365a27a94a36e68a7a02df8ff3c13dac6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41092/CVE-2024-41092-ca0fabd365a27a94a36e68a7a02df8ff3c13dac6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f771b91f21c46ad1217328d05e72a2c7e3add535",
                "patch_url": "https://git.kernel.org/stable/p/f771b91f21c46ad1217328d05e72a2c7e3add535",
                "filename": "CVE-2024-41092-f771b91f21c46ad1217328d05e72a2c7e3add535.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41092/CVE-2024-41092-f771b91f21c46ad1217328d05e72a2c7e3add535.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/06dec31a0a5112a91f49085e8a8fa1a82296d5c7",
            "https://git.kernel.org/stable/c/29c0fdf49078ab161570d3d1c6e13d66f182717d",
            "https://git.kernel.org/stable/c/414f4a31f7a811008fd9a33b06216b060bad18fc",
            "https://git.kernel.org/stable/c/996c3412a06578e9d779a16b9e79ace18125ab50",
            "https://git.kernel.org/stable/c/ca0fabd365a27a94a36e68a7a02df8ff3c13dac6",
            "https://git.kernel.org/stable/c/f771b91f21c46ad1217328d05e72a2c7e3add535",
            "https://www.cve.org/CVERecord?id=CVE-2024-41092\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41092\nhttps://lore.kernel.org/linux-cve-announce/2024072953-CVE-2024-41092-8bd7@gregkh/T"
        ]
    },
    "CVE-2024-41093": {
        "cve": "CVE-2024-41093",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: avoid using null object of framebuffer\n\nInstead of using state->fb->obj[0] directly, get object from framebuffer\nby calling drm_gem_fb_get_obj() and return error code when object is\nnull to avoid using null object of framebuffer.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41093",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/330c8c1453848c04d335bad81371a66710210800",
            "patch_url": "https://git.kernel.org/stable/p/330c8c1453848c04d335bad81371a66710210800",
            "filename": "CVE-2024-41093-330c8c1453848c04d335bad81371a66710210800.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41093/CVE-2024-41093-330c8c1453848c04d335bad81371a66710210800.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/330c8c1453848c04d335bad81371a66710210800",
                "patch_url": "https://git.kernel.org/stable/p/330c8c1453848c04d335bad81371a66710210800",
                "filename": "CVE-2024-41093-330c8c1453848c04d335bad81371a66710210800.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41093/CVE-2024-41093-330c8c1453848c04d335bad81371a66710210800.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6ce0544cabaa608018d5922ab404dc656a9d8447",
                "patch_url": "https://git.kernel.org/stable/p/6ce0544cabaa608018d5922ab404dc656a9d8447",
                "filename": "CVE-2024-41093-6ce0544cabaa608018d5922ab404dc656a9d8447.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41093/CVE-2024-41093-6ce0544cabaa608018d5922ab404dc656a9d8447.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7f35e01cb0ea4d295f5c067bb5c67dfcddaf05bc",
                "patch_url": "https://git.kernel.org/stable/p/7f35e01cb0ea4d295f5c067bb5c67dfcddaf05bc",
                "filename": "CVE-2024-41093-7f35e01cb0ea4d295f5c067bb5c67dfcddaf05bc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41093/CVE-2024-41093-7f35e01cb0ea4d295f5c067bb5c67dfcddaf05bc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bcfa48ff785bd121316592b131ff6531e3e696bb",
                "patch_url": "https://git.kernel.org/stable/p/bcfa48ff785bd121316592b131ff6531e3e696bb",
                "filename": "CVE-2024-41093-bcfa48ff785bd121316592b131ff6531e3e696bb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41093/CVE-2024-41093-bcfa48ff785bd121316592b131ff6531e3e696bb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dd9ec0ea4cdde0fc48116e63969fc83e81d7ef46",
                "patch_url": "https://git.kernel.org/stable/p/dd9ec0ea4cdde0fc48116e63969fc83e81d7ef46",
                "filename": "CVE-2024-41093-dd9ec0ea4cdde0fc48116e63969fc83e81d7ef46.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41093/CVE-2024-41093-dd9ec0ea4cdde0fc48116e63969fc83e81d7ef46.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/330c8c1453848c04d335bad81371a66710210800",
            "https://git.kernel.org/stable/c/6ce0544cabaa608018d5922ab404dc656a9d8447",
            "https://git.kernel.org/stable/c/7f35e01cb0ea4d295f5c067bb5c67dfcddaf05bc",
            "https://git.kernel.org/stable/c/bcfa48ff785bd121316592b131ff6531e3e696bb",
            "https://git.kernel.org/stable/c/dd9ec0ea4cdde0fc48116e63969fc83e81d7ef46",
            "https://www.cve.org/CVERecord?id=CVE-2024-41093\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41093\nhttps://lore.kernel.org/linux-cve-announce/2024072953-CVE-2024-41093-9d6c@gregkh/T"
        ]
    },
    "CVE-2024-41097": {
        "cve": "CVE-2024-41097",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: atm: cxacru: fix endpoint checking in cxacru_bind()\n\nSyzbot is still reporting quite an old issue [1] that occurs due to\nincomplete checking of present usb endpoints. As such, wrong\nendpoints types may be used at urb sumbitting stage which in turn\ntriggers a warning in usb_submit_urb().\n\nFix the issue by verifying that required endpoint types are present\nfor both in and out endpoints, taking into account cmd endpoint type.\n\nUnfortunately, this patch has not been tested on real hardware.\n\n[1] Syzbot report:\nusb 1-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 0 PID: 8667 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\nModules linked in:\nCPU: 0 PID: 8667 Comm: kworker/0:4 Not tainted 5.14.0-rc4-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502\n...\nCall Trace:\n cxacru_cm+0x3c0/0x8e0 drivers/usb/atm/cxacru.c:649\n cxacru_card_status+0x22/0xd0 drivers/usb/atm/cxacru.c:760\n cxacru_bind+0x7ac/0x11a0 drivers/usb/atm/cxacru.c:1209\n usbatm_usb_probe+0x321/0x1ae0 drivers/usb/atm/usbatm.c:1055\n cxacru_usb_probe+0xdf/0x1e0 drivers/usb/atm/cxacru.c:1363\n usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:517 [inline]\n really_probe+0x23c/0xcd0 drivers/base/dd.c:595\n __driver_probe_device+0x338/0x4d0 drivers/base/dd.c:747\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:777\n __device_attach_driver+0x20b/0x2f0 drivers/base/dd.c:894\n bus_for_each_drv+0x15f/0x1e0 drivers/base/bus.c:427\n __device_attach+0x228/0x4a0 drivers/base/dd.c:965\n bus_probe_device+0x1e4/0x290 drivers/base/bus.c:487\n device_add+0xc2f/0x2180 drivers/base/core.c:3354\n usb_set_configuration+0x113a/0x1910 drivers/usb/core/message.c:2170\n usb_generic_driver_probe+0xba/0x100 drivers/usb/core/generic.c:238\n usb_probe_device+0xd9/0x2c0 drivers/usb/core/driver.c:293",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-41097",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1aac4be1aaa5177506219f01dce5e29194e5e95a",
            "patch_url": "https://git.kernel.org/stable/p/1aac4be1aaa5177506219f01dce5e29194e5e95a",
            "filename": "CVE-2024-41097-1aac4be1aaa5177506219f01dce5e29194e5e95a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41097/CVE-2024-41097-1aac4be1aaa5177506219f01dce5e29194e5e95a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1aac4be1aaa5177506219f01dce5e29194e5e95a",
                "patch_url": "https://git.kernel.org/stable/p/1aac4be1aaa5177506219f01dce5e29194e5e95a",
                "filename": "CVE-2024-41097-1aac4be1aaa5177506219f01dce5e29194e5e95a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41097/CVE-2024-41097-1aac4be1aaa5177506219f01dce5e29194e5e95a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/23926d316d2836315cb113569f91393266eb5b47",
                "patch_url": "https://git.kernel.org/stable/p/23926d316d2836315cb113569f91393266eb5b47",
                "filename": "CVE-2024-41097-23926d316d2836315cb113569f91393266eb5b47.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41097/CVE-2024-41097-23926d316d2836315cb113569f91393266eb5b47.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2eabb655a968b862bc0c31629a09f0fbf3c80d51",
                "patch_url": "https://git.kernel.org/stable/p/2eabb655a968b862bc0c31629a09f0fbf3c80d51",
                "filename": "CVE-2024-41097-2eabb655a968b862bc0c31629a09f0fbf3c80d51.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41097/CVE-2024-41097-2eabb655a968b862bc0c31629a09f0fbf3c80d51.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5159a81924311c1ec786ad9fdef784ead8676a6a",
                "patch_url": "https://git.kernel.org/stable/p/5159a81924311c1ec786ad9fdef784ead8676a6a",
                "filename": "CVE-2024-41097-5159a81924311c1ec786ad9fdef784ead8676a6a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41097/CVE-2024-41097-5159a81924311c1ec786ad9fdef784ead8676a6a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5584c776a1af7807ca815ee6265f2c1429fc5727",
                "patch_url": "https://git.kernel.org/stable/p/5584c776a1af7807ca815ee6265f2c1429fc5727",
                "filename": "CVE-2024-41097-5584c776a1af7807ca815ee6265f2c1429fc5727.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41097/CVE-2024-41097-5584c776a1af7807ca815ee6265f2c1429fc5727.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/75ddbf776dd04a09fb9e5267ead5d0c989f84506",
                "patch_url": "https://git.kernel.org/stable/p/75ddbf776dd04a09fb9e5267ead5d0c989f84506",
                "filename": "CVE-2024-41097-75ddbf776dd04a09fb9e5267ead5d0c989f84506.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41097/CVE-2024-41097-75ddbf776dd04a09fb9e5267ead5d0c989f84506.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ac9007520e392541a29daebaae8b9109007bc781",
                "patch_url": "https://git.kernel.org/stable/p/ac9007520e392541a29daebaae8b9109007bc781",
                "filename": "CVE-2024-41097-ac9007520e392541a29daebaae8b9109007bc781.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41097/CVE-2024-41097-ac9007520e392541a29daebaae8b9109007bc781.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f536f09eb45e4de8d1b9accee9d992aa1846f1d4",
                "patch_url": "https://git.kernel.org/stable/p/f536f09eb45e4de8d1b9accee9d992aa1846f1d4",
                "filename": "CVE-2024-41097-f536f09eb45e4de8d1b9accee9d992aa1846f1d4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-41097/CVE-2024-41097-f536f09eb45e4de8d1b9accee9d992aa1846f1d4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1aac4be1aaa5177506219f01dce5e29194e5e95a",
            "https://git.kernel.org/stable/c/23926d316d2836315cb113569f91393266eb5b47",
            "https://git.kernel.org/stable/c/2eabb655a968b862bc0c31629a09f0fbf3c80d51",
            "https://git.kernel.org/stable/c/5159a81924311c1ec786ad9fdef784ead8676a6a",
            "https://git.kernel.org/stable/c/5584c776a1af7807ca815ee6265f2c1429fc5727",
            "https://git.kernel.org/stable/c/75ddbf776dd04a09fb9e5267ead5d0c989f84506",
            "https://git.kernel.org/stable/c/ac9007520e392541a29daebaae8b9109007bc781",
            "https://git.kernel.org/stable/c/f536f09eb45e4de8d1b9accee9d992aa1846f1d4",
            "https://www.cve.org/CVERecord?id=CVE-2024-41097\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-41097\nhttps://lore.kernel.org/linux-cve-announce/2024072954-CVE-2024-41097-248c@gregkh/T"
        ]
    },
    "CVE-2024-42070": {
        "cve": "CVE-2024-42070",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers\n\nregister store validation for NFT_DATA_VALUE is conditional, however,\nthe datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This\nonly requires a new helper function to infer the register type from the\nset datatype so this conditional check can be removed. Otherwise,\npointer to chain object can be leaked through the registers.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42070",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4",
            "patch_url": "https://git.kernel.org/stable/p/23752737c6a618e994f9a310ec2568881a6b49c4",
            "filename": "CVE-2024-42070-23752737c6a618e994f9a310ec2568881a6b49c4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42070/CVE-2024-42070-23752737c6a618e994f9a310ec2568881a6b49c4.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4",
                "patch_url": "https://git.kernel.org/stable/p/23752737c6a618e994f9a310ec2568881a6b49c4",
                "filename": "CVE-2024-42070-23752737c6a618e994f9a310ec2568881a6b49c4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42070/CVE-2024-42070-23752737c6a618e994f9a310ec2568881a6b49c4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f",
                "patch_url": "https://git.kernel.org/stable/p/40188a25a9847dbeb7ec67517174a835a677752f",
                "filename": "CVE-2024-42070-40188a25a9847dbeb7ec67517174a835a677752f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42070/CVE-2024-42070-40188a25a9847dbeb7ec67517174a835a677752f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f",
                "patch_url": "https://git.kernel.org/stable/p/41a6375d48deaf7f730304b5153848bfa1c2980f",
                "filename": "CVE-2024-42070-41a6375d48deaf7f730304b5153848bfa1c2980f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42070/CVE-2024-42070-41a6375d48deaf7f730304b5153848bfa1c2980f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8",
                "patch_url": "https://git.kernel.org/stable/p/461302e07f49687ffe7d105fa0a330c07c7646d8",
                "filename": "CVE-2024-42070-461302e07f49687ffe7d105fa0a330c07c7646d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42070/CVE-2024-42070-461302e07f49687ffe7d105fa0a330c07c7646d8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf",
                "patch_url": "https://git.kernel.org/stable/p/5d43d789b57943720dca4181a05f6477362b94cf",
                "filename": "CVE-2024-42070-5d43d789b57943720dca4181a05f6477362b94cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42070/CVE-2024-42070-5d43d789b57943720dca4181a05f6477362b94cf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c",
                "patch_url": "https://git.kernel.org/stable/p/7931d32955e09d0a11b1fe0b6aac1bfa061c005c",
                "filename": "CVE-2024-42070-7931d32955e09d0a11b1fe0b6aac1bfa061c005c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42070/CVE-2024-42070-7931d32955e09d0a11b1fe0b6aac1bfa061c005c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564",
                "patch_url": "https://git.kernel.org/stable/p/952bf8df222599baadbd4f838a49c4fef81d2564",
                "filename": "CVE-2024-42070-952bf8df222599baadbd4f838a49c4fef81d2564.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42070/CVE-2024-42070-952bf8df222599baadbd4f838a49c4fef81d2564.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007",
                "patch_url": "https://git.kernel.org/stable/p/efb27ad05949403848f487823b597ed67060e007",
                "filename": "CVE-2024-42070-efb27ad05949403848f487823b597ed67060e007.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42070/CVE-2024-42070-efb27ad05949403848f487823b597ed67060e007.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/23752737c6a618e994f9a310ec2568881a6b49c4",
            "https://git.kernel.org/stable/c/40188a25a9847dbeb7ec67517174a835a677752f",
            "https://git.kernel.org/stable/c/41a6375d48deaf7f730304b5153848bfa1c2980f",
            "https://git.kernel.org/stable/c/461302e07f49687ffe7d105fa0a330c07c7646d8",
            "https://git.kernel.org/stable/c/5d43d789b57943720dca4181a05f6477362b94cf",
            "https://git.kernel.org/stable/c/7931d32955e09d0a11b1fe0b6aac1bfa061c005c",
            "https://git.kernel.org/stable/c/952bf8df222599baadbd4f838a49c4fef81d2564",
            "https://git.kernel.org/stable/c/efb27ad05949403848f487823b597ed67060e007",
            "https://www.cve.org/CVERecord?id=CVE-2024-42070\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42070\nhttps://lore.kernel.org/linux-cve-announce/2024072952-CVE-2024-42070-b271@gregkh/T"
        ]
    },
    "CVE-2024-42079": {
        "cve": "CVE-2024-42079",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix NULL pointer dereference in gfs2_log_flush\n\nIn gfs2_jindex_free(), set sdp->sd_jdesc to NULL under the log flush\nlock to provide exclusion against gfs2_log_flush().\n\nIn gfs2_log_flush(), check if sdp->sd_jdesc is non-NULL before\ndereferencing it.  Otherwise, we could run into a NULL pointer\ndereference when outstanding glock work races with an unmount\n(glock_work_func -> run_queue -> do_xmote -> inode_go_sync ->\ngfs2_log_flush).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42079",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/c3c5cfa3170c0940bc66a142859caac07d19b9d6",
            "patch_url": "https://git.kernel.org/stable/p/c3c5cfa3170c0940bc66a142859caac07d19b9d6",
            "filename": "CVE-2024-42079-c3c5cfa3170c0940bc66a142859caac07d19b9d6.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42079/CVE-2024-42079-c3c5cfa3170c0940bc66a142859caac07d19b9d6.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3429ef5f50909cee9e498c50f0c499b9397116ce",
                "patch_url": "https://git.kernel.org/stable/p/3429ef5f50909cee9e498c50f0c499b9397116ce",
                "filename": "CVE-2024-42079-3429ef5f50909cee9e498c50f0c499b9397116ce.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42079/CVE-2024-42079-3429ef5f50909cee9e498c50f0c499b9397116ce.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/35264909e9d1973ab9aaa2a1b07cda70f12bb828",
                "patch_url": "https://git.kernel.org/stable/p/35264909e9d1973ab9aaa2a1b07cda70f12bb828",
                "filename": "CVE-2024-42079-35264909e9d1973ab9aaa2a1b07cda70f12bb828.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42079/CVE-2024-42079-35264909e9d1973ab9aaa2a1b07cda70f12bb828.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5f6a84cfb33b34610623857bd93919dcb661e29b",
                "patch_url": "https://git.kernel.org/stable/p/5f6a84cfb33b34610623857bd93919dcb661e29b",
                "filename": "CVE-2024-42079-5f6a84cfb33b34610623857bd93919dcb661e29b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42079/CVE-2024-42079-5f6a84cfb33b34610623857bd93919dcb661e29b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c3c5cfa3170c0940bc66a142859caac07d19b9d6",
                "patch_url": "https://git.kernel.org/stable/p/c3c5cfa3170c0940bc66a142859caac07d19b9d6",
                "filename": "CVE-2024-42079-c3c5cfa3170c0940bc66a142859caac07d19b9d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42079/CVE-2024-42079-c3c5cfa3170c0940bc66a142859caac07d19b9d6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f54f9d5368a4e92ede7dd078a62788dae3a7c6ef",
                "patch_url": "https://git.kernel.org/stable/p/f54f9d5368a4e92ede7dd078a62788dae3a7c6ef",
                "filename": "CVE-2024-42079-f54f9d5368a4e92ede7dd078a62788dae3a7c6ef.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42079/CVE-2024-42079-f54f9d5368a4e92ede7dd078a62788dae3a7c6ef.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3429ef5f50909cee9e498c50f0c499b9397116ce",
            "https://git.kernel.org/stable/c/35264909e9d1973ab9aaa2a1b07cda70f12bb828",
            "https://git.kernel.org/stable/c/5f6a84cfb33b34610623857bd93919dcb661e29b",
            "https://git.kernel.org/stable/c/c3c5cfa3170c0940bc66a142859caac07d19b9d6",
            "https://git.kernel.org/stable/c/f54f9d5368a4e92ede7dd078a62788dae3a7c6ef",
            "https://www.cve.org/CVERecord?id=CVE-2024-42079\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42079\nhttps://lore.kernel.org/linux-cve-announce/2024072955-CVE-2024-42079-a13c@gregkh/T"
        ]
    },
    "CVE-2024-42084": {
        "cve": "CVE-2024-42084",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nftruncate: pass a signed offset\n\nThe old ftruncate() syscall, using the 32-bit off_t misses a sign\nextension when called in compat mode on 64-bit architectures.  As a\nresult, passing a negative length accidentally succeeds in truncating\nto file size between 2GiB and 4GiB.\n\nChanging the type of the compat syscall to the signed compat_off_t\nchanges the behavior so it instead returns -EINVAL.\n\nThe native entry point, the truncate() syscall and the corresponding\nloff_t based variants are all correct already and do not suffer\nfrom this mistake.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42084",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/836359247b0403e0634bfbc83e5bb8063fad287a",
            "patch_url": "https://git.kernel.org/stable/p/836359247b0403e0634bfbc83e5bb8063fad287a",
            "filename": "CVE-2024-42084-836359247b0403e0634bfbc83e5bb8063fad287a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42084/CVE-2024-42084-836359247b0403e0634bfbc83e5bb8063fad287a.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4b8e88e563b5f666446d002ad0dc1e6e8e7102b0",
                "patch_url": "https://git.kernel.org/stable/p/4b8e88e563b5f666446d002ad0dc1e6e8e7102b0",
                "filename": "CVE-2024-42084-4b8e88e563b5f666446d002ad0dc1e6e8e7102b0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42084/CVE-2024-42084-4b8e88e563b5f666446d002ad0dc1e6e8e7102b0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5ae6af68410bdad6181ec82104bb9985a7a6a0fa",
                "patch_url": "https://git.kernel.org/stable/p/5ae6af68410bdad6181ec82104bb9985a7a6a0fa",
                "filename": "CVE-2024-42084-5ae6af68410bdad6181ec82104bb9985a7a6a0fa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42084/CVE-2024-42084-5ae6af68410bdad6181ec82104bb9985a7a6a0fa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/836359247b0403e0634bfbc83e5bb8063fad287a",
                "patch_url": "https://git.kernel.org/stable/p/836359247b0403e0634bfbc83e5bb8063fad287a",
                "filename": "CVE-2024-42084-836359247b0403e0634bfbc83e5bb8063fad287a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42084/CVE-2024-42084-836359247b0403e0634bfbc83e5bb8063fad287a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/84bf6b64a1a0dfc6de7e1b1c776d58d608e7865a",
                "patch_url": "https://git.kernel.org/stable/p/84bf6b64a1a0dfc6de7e1b1c776d58d608e7865a",
                "filename": "CVE-2024-42084-84bf6b64a1a0dfc6de7e1b1c776d58d608e7865a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42084/CVE-2024-42084-84bf6b64a1a0dfc6de7e1b1c776d58d608e7865a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/930a4c369f74da26816eaaa71b5888d29b759c27",
                "patch_url": "https://git.kernel.org/stable/p/930a4c369f74da26816eaaa71b5888d29b759c27",
                "filename": "CVE-2024-42084-930a4c369f74da26816eaaa71b5888d29b759c27.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42084/CVE-2024-42084-930a4c369f74da26816eaaa71b5888d29b759c27.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c329760749b5419769e57cb2be80955d2805f9c9",
                "patch_url": "https://git.kernel.org/stable/p/c329760749b5419769e57cb2be80955d2805f9c9",
                "filename": "CVE-2024-42084-c329760749b5419769e57cb2be80955d2805f9c9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42084/CVE-2024-42084-c329760749b5419769e57cb2be80955d2805f9c9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dbb226d81cd02cee140139c2369791e6f61f2007",
                "patch_url": "https://git.kernel.org/stable/p/dbb226d81cd02cee140139c2369791e6f61f2007",
                "filename": "CVE-2024-42084-dbb226d81cd02cee140139c2369791e6f61f2007.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42084/CVE-2024-42084-dbb226d81cd02cee140139c2369791e6f61f2007.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f531d4bc6c5588d713359e42ed65e46816d841d8",
                "patch_url": "https://git.kernel.org/stable/p/f531d4bc6c5588d713359e42ed65e46816d841d8",
                "filename": "CVE-2024-42084-f531d4bc6c5588d713359e42ed65e46816d841d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42084/CVE-2024-42084-f531d4bc6c5588d713359e42ed65e46816d841d8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4b8e88e563b5f666446d002ad0dc1e6e8e7102b0",
            "https://git.kernel.org/stable/c/5ae6af68410bdad6181ec82104bb9985a7a6a0fa",
            "https://git.kernel.org/stable/c/836359247b0403e0634bfbc83e5bb8063fad287a",
            "https://git.kernel.org/stable/c/84bf6b64a1a0dfc6de7e1b1c776d58d608e7865a",
            "https://git.kernel.org/stable/c/930a4c369f74da26816eaaa71b5888d29b759c27",
            "https://git.kernel.org/stable/c/c329760749b5419769e57cb2be80955d2805f9c9",
            "https://git.kernel.org/stable/c/dbb226d81cd02cee140139c2369791e6f61f2007",
            "https://git.kernel.org/stable/c/f531d4bc6c5588d713359e42ed65e46816d841d8",
            "https://www.cve.org/CVERecord?id=CVE-2024-42084\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42084\nhttps://lore.kernel.org/linux-cve-announce/2024072942-CVE-2024-42084-9283@gregkh/T"
        ]
    },
    "CVE-2024-42090": {
        "cve": "CVE-2024-42090",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER\n\nIn create_pinctrl(), pinctrl_maps_mutex is acquired before calling\nadd_setting(). If add_setting() returns -EPROBE_DEFER, create_pinctrl()\ncalls pinctrl_free(). However, pinctrl_free() attempts to acquire\npinctrl_maps_mutex, which is already held by create_pinctrl(), leading to\na potential deadlock.\n\nThis patch resolves the issue by releasing pinctrl_maps_mutex before\ncalling pinctrl_free(), preventing the deadlock.\n\nThis bug was discovered and resolved using Coverity Static Analysis\nSecurity Testing (SAST) by Synopsys, Inc.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42090",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/420ce1261907e5dbeda1e4daffd5b6c76f8188c0",
            "patch_url": "https://git.kernel.org/stable/p/420ce1261907e5dbeda1e4daffd5b6c76f8188c0",
            "filename": "CVE-2024-42090-420ce1261907e5dbeda1e4daffd5b6c76f8188c0.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42090/CVE-2024-42090-420ce1261907e5dbeda1e4daffd5b6c76f8188c0.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/01fe2f885f7813f8aed5d3704b384a97b1116a9e",
                "patch_url": "https://git.kernel.org/stable/p/01fe2f885f7813f8aed5d3704b384a97b1116a9e",
                "filename": "CVE-2024-42090-01fe2f885f7813f8aed5d3704b384a97b1116a9e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42090/CVE-2024-42090-01fe2f885f7813f8aed5d3704b384a97b1116a9e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4038c57bf61631219b31f1bd6e92106ec7f084dc",
                "patch_url": "https://git.kernel.org/stable/p/4038c57bf61631219b31f1bd6e92106ec7f084dc",
                "filename": "CVE-2024-42090-4038c57bf61631219b31f1bd6e92106ec7f084dc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42090/CVE-2024-42090-4038c57bf61631219b31f1bd6e92106ec7f084dc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/420ce1261907e5dbeda1e4daffd5b6c76f8188c0",
                "patch_url": "https://git.kernel.org/stable/p/420ce1261907e5dbeda1e4daffd5b6c76f8188c0",
                "filename": "CVE-2024-42090-420ce1261907e5dbeda1e4daffd5b6c76f8188c0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42090/CVE-2024-42090-420ce1261907e5dbeda1e4daffd5b6c76f8188c0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/48a7a7c9571c3e62f17012dd7f2063e926179ddd",
                "patch_url": "https://git.kernel.org/stable/p/48a7a7c9571c3e62f17012dd7f2063e926179ddd",
                "filename": "CVE-2024-42090-48a7a7c9571c3e62f17012dd7f2063e926179ddd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42090/CVE-2024-42090-48a7a7c9571c3e62f17012dd7f2063e926179ddd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/adec57ff8e66aee632f3dd1f93787c13d112b7a1",
                "patch_url": "https://git.kernel.org/stable/p/adec57ff8e66aee632f3dd1f93787c13d112b7a1",
                "filename": "CVE-2024-42090-adec57ff8e66aee632f3dd1f93787c13d112b7a1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42090/CVE-2024-42090-adec57ff8e66aee632f3dd1f93787c13d112b7a1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b36efd2e3e22a329444b6b24fa48df6d20ae66e6",
                "patch_url": "https://git.kernel.org/stable/p/b36efd2e3e22a329444b6b24fa48df6d20ae66e6",
                "filename": "CVE-2024-42090-b36efd2e3e22a329444b6b24fa48df6d20ae66e6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42090/CVE-2024-42090-b36efd2e3e22a329444b6b24fa48df6d20ae66e6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b813e3fd102a959c5b208ed68afe27e0137a561b",
                "patch_url": "https://git.kernel.org/stable/p/b813e3fd102a959c5b208ed68afe27e0137a561b",
                "filename": "CVE-2024-42090-b813e3fd102a959c5b208ed68afe27e0137a561b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42090/CVE-2024-42090-b813e3fd102a959c5b208ed68afe27e0137a561b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e65a0dc2e85efb28e182aca50218e8a056d0ce04",
                "patch_url": "https://git.kernel.org/stable/p/e65a0dc2e85efb28e182aca50218e8a056d0ce04",
                "filename": "CVE-2024-42090-e65a0dc2e85efb28e182aca50218e8a056d0ce04.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42090/CVE-2024-42090-e65a0dc2e85efb28e182aca50218e8a056d0ce04.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/01fe2f885f7813f8aed5d3704b384a97b1116a9e",
            "https://git.kernel.org/stable/c/4038c57bf61631219b31f1bd6e92106ec7f084dc",
            "https://git.kernel.org/stable/c/420ce1261907e5dbeda1e4daffd5b6c76f8188c0",
            "https://git.kernel.org/stable/c/48a7a7c9571c3e62f17012dd7f2063e926179ddd",
            "https://git.kernel.org/stable/c/adec57ff8e66aee632f3dd1f93787c13d112b7a1",
            "https://git.kernel.org/stable/c/b36efd2e3e22a329444b6b24fa48df6d20ae66e6",
            "https://git.kernel.org/stable/c/b813e3fd102a959c5b208ed68afe27e0137a561b",
            "https://git.kernel.org/stable/c/e65a0dc2e85efb28e182aca50218e8a056d0ce04",
            "https://www.cve.org/CVERecord?id=CVE-2024-42090\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42090\nhttps://lore.kernel.org/linux-cve-announce/2024072946-CVE-2024-42090-5687@gregkh/T"
        ]
    },
    "CVE-2024-42094": {
        "cve": "CVE-2024-42094",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/iucv: Avoid explicit cpumask var allocation on stack\n\nFor CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask\nvariable on stack is not recommended since it can cause potential stack\noverflow.\n\nInstead, kernel code should always use *cpumask_var API(s) to allocate\ncpumask var in config-neutral way, leaving allocation strategy to\nCONFIG_CPUMASK_OFFSTACK.\n\nUse *cpumask_var API(s) to address it.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42094",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2b085521be5292016097b5e7ca81b26be3f7098d",
            "patch_url": "https://git.kernel.org/stable/p/2b085521be5292016097b5e7ca81b26be3f7098d",
            "filename": "CVE-2024-42094-2b085521be5292016097b5e7ca81b26be3f7098d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42094/CVE-2024-42094-2b085521be5292016097b5e7ca81b26be3f7098d.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0af718a690acc089aa1bbb95a93df833d864ef53",
                "patch_url": "https://git.kernel.org/stable/p/0af718a690acc089aa1bbb95a93df833d864ef53",
                "filename": "CVE-2024-42094-0af718a690acc089aa1bbb95a93df833d864ef53.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42094/CVE-2024-42094-0af718a690acc089aa1bbb95a93df833d864ef53.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2b085521be5292016097b5e7ca81b26be3f7098d",
                "patch_url": "https://git.kernel.org/stable/p/2b085521be5292016097b5e7ca81b26be3f7098d",
                "filename": "CVE-2024-42094-2b085521be5292016097b5e7ca81b26be3f7098d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42094/CVE-2024-42094-2b085521be5292016097b5e7ca81b26be3f7098d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2d090c7f7be3b26fcb80ac04d08a4a8062b1d959",
                "patch_url": "https://git.kernel.org/stable/p/2d090c7f7be3b26fcb80ac04d08a4a8062b1d959",
                "filename": "CVE-2024-42094-2d090c7f7be3b26fcb80ac04d08a4a8062b1d959.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42094/CVE-2024-42094-2d090c7f7be3b26fcb80ac04d08a4a8062b1d959.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/724e7965af054079242b8d6f7e50ee226730a756",
                "patch_url": "https://git.kernel.org/stable/p/724e7965af054079242b8d6f7e50ee226730a756",
                "filename": "CVE-2024-42094-724e7965af054079242b8d6f7e50ee226730a756.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42094/CVE-2024-42094-724e7965af054079242b8d6f7e50ee226730a756.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/842afb47d84536fc976fece8fb6c54bea711ad1a",
                "patch_url": "https://git.kernel.org/stable/p/842afb47d84536fc976fece8fb6c54bea711ad1a",
                "filename": "CVE-2024-42094-842afb47d84536fc976fece8fb6c54bea711ad1a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42094/CVE-2024-42094-842afb47d84536fc976fece8fb6c54bea711ad1a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9dadab0db7d904413ea1cdaa13f127da05c31e71",
                "patch_url": "https://git.kernel.org/stable/p/9dadab0db7d904413ea1cdaa13f127da05c31e71",
                "filename": "CVE-2024-42094-9dadab0db7d904413ea1cdaa13f127da05c31e71.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42094/CVE-2024-42094-9dadab0db7d904413ea1cdaa13f127da05c31e71.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/be4e1304419c99a164b4c0e101c7c2a756b635b9",
                "patch_url": "https://git.kernel.org/stable/p/be4e1304419c99a164b4c0e101c7c2a756b635b9",
                "filename": "CVE-2024-42094-be4e1304419c99a164b4c0e101c7c2a756b635b9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42094/CVE-2024-42094-be4e1304419c99a164b4c0e101c7c2a756b635b9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d85ca8179a54ff8cf1e1f8c3c9e3799831319bae",
                "patch_url": "https://git.kernel.org/stable/p/d85ca8179a54ff8cf1e1f8c3c9e3799831319bae",
                "filename": "CVE-2024-42094-d85ca8179a54ff8cf1e1f8c3c9e3799831319bae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42094/CVE-2024-42094-d85ca8179a54ff8cf1e1f8c3c9e3799831319bae.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0af718a690acc089aa1bbb95a93df833d864ef53",
            "https://git.kernel.org/stable/c/2b085521be5292016097b5e7ca81b26be3f7098d",
            "https://git.kernel.org/stable/c/2d090c7f7be3b26fcb80ac04d08a4a8062b1d959",
            "https://git.kernel.org/stable/c/724e7965af054079242b8d6f7e50ee226730a756",
            "https://git.kernel.org/stable/c/842afb47d84536fc976fece8fb6c54bea711ad1a",
            "https://git.kernel.org/stable/c/9dadab0db7d904413ea1cdaa13f127da05c31e71",
            "https://git.kernel.org/stable/c/be4e1304419c99a164b4c0e101c7c2a756b635b9",
            "https://git.kernel.org/stable/c/d85ca8179a54ff8cf1e1f8c3c9e3799831319bae",
            "https://www.cve.org/CVERecord?id=CVE-2024-42094\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42094\nhttps://lore.kernel.org/linux-cve-announce/2024072911-CVE-2024-42094-135f@gregkh/T"
        ]
    },
    "CVE-2024-42096": {
        "cve": "CVE-2024-42096",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86: stop playing stack games in profile_pc()\n\nThe 'profile_pc()' function is used for timer-based profiling, which\nisn't really all that relevant any more to begin with, but it also ends\nup making assumptions based on the stack layout that aren't necessarily\nvalid.\n\nBasically, the code tries to account the time spent in spinlocks to the\ncaller rather than the spinlock, and while I support that as a concept,\nit's not worth the code complexity or the KASAN warnings when no serious\nprofiling is done using timers anyway these days.\n\nAnd the code really does depend on stack layout that is only true in the\nsimplest of cases.  We've lost the comment at some point (I think when\nthe 32-bit and 64-bit code was unified), but it used to say:\n\n\tAssume the lock function has either no stack frame or a copy\n\tof eflags from PUSHF.\n\nwhich explains why it just blindly loads a word or two straight off the\nstack pointer and then takes a minimal look at the values to just check\nif they might be eflags or the return pc:\n\n\tEflags always has bits 22 and up cleared unlike kernel addresses\n\nbut that basic stack layout assumption assumes that there isn't any lock\ndebugging etc going on that would complicate the code and cause a stack\nframe.\n\nIt causes KASAN unhappiness reported for years by syzkaller [1] and\nothers [2].\n\nWith no real practical reason for this any more, just remove the code.\n\nJust for historical interest, here's some background commits relating to\nthis code from 2006:\n\n  0cb91a229364 (\"i386: Account spinlocks to the caller during profiling for !FP kernels\")\n  31679f38d886 (\"Simplify profile_pc on x86-64\")\n\nand a code unification from 2009:\n\n  ef4512882dbe (\"x86: time_32/64.c unify profile_pc\")\n\nbut the basics of this thing actually goes back to before the git tree.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42096",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/093d9603b60093a9aaae942db56107f6432a5dca",
            "patch_url": "https://git.kernel.org/stable/p/093d9603b60093a9aaae942db56107f6432a5dca",
            "filename": "CVE-2024-42096-093d9603b60093a9aaae942db56107f6432a5dca.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42096/CVE-2024-42096-093d9603b60093a9aaae942db56107f6432a5dca.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/093d9603b60093a9aaae942db56107f6432a5dca",
                "patch_url": "https://git.kernel.org/stable/p/093d9603b60093a9aaae942db56107f6432a5dca",
                "filename": "CVE-2024-42096-093d9603b60093a9aaae942db56107f6432a5dca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42096/CVE-2024-42096-093d9603b60093a9aaae942db56107f6432a5dca.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/161cef818545ecf980f0e2ebaf8ba7326ce53c2b",
                "patch_url": "https://git.kernel.org/stable/p/161cef818545ecf980f0e2ebaf8ba7326ce53c2b",
                "filename": "CVE-2024-42096-161cef818545ecf980f0e2ebaf8ba7326ce53c2b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42096/CVE-2024-42096-161cef818545ecf980f0e2ebaf8ba7326ce53c2b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/16222beb9f8e5ceb0beeb5cbe54bef16df501a92",
                "patch_url": "https://git.kernel.org/stable/p/16222beb9f8e5ceb0beeb5cbe54bef16df501a92",
                "filename": "CVE-2024-42096-16222beb9f8e5ceb0beeb5cbe54bef16df501a92.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42096/CVE-2024-42096-16222beb9f8e5ceb0beeb5cbe54bef16df501a92.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/27c3be840911b15a3f24ed623f86153c825b6b29",
                "patch_url": "https://git.kernel.org/stable/p/27c3be840911b15a3f24ed623f86153c825b6b29",
                "filename": "CVE-2024-42096-27c3be840911b15a3f24ed623f86153c825b6b29.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42096/CVE-2024-42096-27c3be840911b15a3f24ed623f86153c825b6b29.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2d07fea561d64357fb7b3f3751e653bf20306d77",
                "patch_url": "https://git.kernel.org/stable/p/2d07fea561d64357fb7b3f3751e653bf20306d77",
                "filename": "CVE-2024-42096-2d07fea561d64357fb7b3f3751e653bf20306d77.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42096/CVE-2024-42096-2d07fea561d64357fb7b3f3751e653bf20306d77.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/49c09ca35a5f521d7fa18caf62fdf378f15e8aa4",
                "patch_url": "https://git.kernel.org/stable/p/49c09ca35a5f521d7fa18caf62fdf378f15e8aa4",
                "filename": "CVE-2024-42096-49c09ca35a5f521d7fa18caf62fdf378f15e8aa4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42096/CVE-2024-42096-49c09ca35a5f521d7fa18caf62fdf378f15e8aa4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/65ebdde16e7f5da99dbf8a548fb635837d78384e",
                "patch_url": "https://git.kernel.org/stable/p/65ebdde16e7f5da99dbf8a548fb635837d78384e",
                "filename": "CVE-2024-42096-65ebdde16e7f5da99dbf8a548fb635837d78384e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42096/CVE-2024-42096-65ebdde16e7f5da99dbf8a548fb635837d78384e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a3b65c8cbc139bfce9541bc81c1bb766e5ba3f68",
                "patch_url": "https://git.kernel.org/stable/p/a3b65c8cbc139bfce9541bc81c1bb766e5ba3f68",
                "filename": "CVE-2024-42096-a3b65c8cbc139bfce9541bc81c1bb766e5ba3f68.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42096/CVE-2024-42096-a3b65c8cbc139bfce9541bc81c1bb766e5ba3f68.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/093d9603b60093a9aaae942db56107f6432a5dca",
            "https://git.kernel.org/stable/c/161cef818545ecf980f0e2ebaf8ba7326ce53c2b",
            "https://git.kernel.org/stable/c/16222beb9f8e5ceb0beeb5cbe54bef16df501a92",
            "https://git.kernel.org/stable/c/27c3be840911b15a3f24ed623f86153c825b6b29",
            "https://git.kernel.org/stable/c/2d07fea561d64357fb7b3f3751e653bf20306d77",
            "https://git.kernel.org/stable/c/49c09ca35a5f521d7fa18caf62fdf378f15e8aa4",
            "https://git.kernel.org/stable/c/65ebdde16e7f5da99dbf8a548fb635837d78384e",
            "https://git.kernel.org/stable/c/a3b65c8cbc139bfce9541bc81c1bb766e5ba3f68",
            "https://www.cve.org/CVERecord?id=CVE-2024-42096\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42096\nhttps://lore.kernel.org/linux-cve-announce/2024072911-CVE-2024-42096-67f3@gregkh/T"
        ]
    },
    "CVE-2024-42102": {
        "cve": "CVE-2024-42102",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again\"\n\nPatch series \"mm: Avoid possible overflows in dirty throttling\".\n\nDirty throttling logic assumes dirty limits in page units fit into\n32-bits.  This patch series makes sure this is true (see patch 2/2 for\nmore details).\n\n\nThis patch (of 2):\n\nThis reverts commit 9319b647902cbd5cc884ac08a8a6d54ce111fc78.\n\nThe commit is broken in several ways.  Firstly, the removed (u64) cast\nfrom the multiplication will introduce a multiplication overflow on 32-bit\narchs if wb_thresh * bg_thresh >= 1<<32 (which is actually common - the\ndefault settings with 4GB of RAM will trigger this).  Secondly, the\ndiv64_u64() is unnecessarily expensive on 32-bit archs.  We have\ndiv64_ul() in case we want to be safe & cheap.  Thirdly, if dirty\nthresholds are larger than 1<<32 pages, then dirty balancing is going to\nblow up in many other spectacular ways anyway so trying to fix one\npossible overflow is just moot.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42102",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/000099d71648504fb9c7a4616f92c2b70c3e44ec",
            "patch_url": "https://git.kernel.org/stable/p/000099d71648504fb9c7a4616f92c2b70c3e44ec",
            "filename": "CVE-2024-42102-000099d71648504fb9c7a4616f92c2b70c3e44ec.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42102/CVE-2024-42102-000099d71648504fb9c7a4616f92c2b70c3e44ec.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/000099d71648504fb9c7a4616f92c2b70c3e44ec",
                "patch_url": "https://git.kernel.org/stable/p/000099d71648504fb9c7a4616f92c2b70c3e44ec",
                "filename": "CVE-2024-42102-000099d71648504fb9c7a4616f92c2b70c3e44ec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42102/CVE-2024-42102-000099d71648504fb9c7a4616f92c2b70c3e44ec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/145faa3d03688cbb7bbaaecbd84c01539852942c",
                "patch_url": "https://git.kernel.org/stable/p/145faa3d03688cbb7bbaaecbd84c01539852942c",
                "filename": "CVE-2024-42102-145faa3d03688cbb7bbaaecbd84c01539852942c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42102/CVE-2024-42102-145faa3d03688cbb7bbaaecbd84c01539852942c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807",
                "patch_url": "https://git.kernel.org/stable/p/23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807",
                "filename": "CVE-2024-42102-23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42102/CVE-2024-42102-23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/253f9ea7e8e53a5176bd80ceb174907b10724c1a",
                "patch_url": "https://git.kernel.org/stable/p/253f9ea7e8e53a5176bd80ceb174907b10724c1a",
                "filename": "CVE-2024-42102-253f9ea7e8e53a5176bd80ceb174907b10724c1a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42102/CVE-2024-42102-253f9ea7e8e53a5176bd80ceb174907b10724c1a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2820005edae13b140f2d54267d1bd6bb23915f59",
                "patch_url": "https://git.kernel.org/stable/p/2820005edae13b140f2d54267d1bd6bb23915f59",
                "filename": "CVE-2024-42102-2820005edae13b140f2d54267d1bd6bb23915f59.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42102/CVE-2024-42102-2820005edae13b140f2d54267d1bd6bb23915f59.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/30139c702048f1097342a31302cbd3d478f50c63",
                "patch_url": "https://git.kernel.org/stable/p/30139c702048f1097342a31302cbd3d478f50c63",
                "filename": "CVE-2024-42102-30139c702048f1097342a31302cbd3d478f50c63.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42102/CVE-2024-42102-30139c702048f1097342a31302cbd3d478f50c63.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cbbe17a324437c0ff99881a3ee453da45b228a00",
                "patch_url": "https://git.kernel.org/stable/p/cbbe17a324437c0ff99881a3ee453da45b228a00",
                "filename": "CVE-2024-42102-cbbe17a324437c0ff99881a3ee453da45b228a00.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42102/CVE-2024-42102-cbbe17a324437c0ff99881a3ee453da45b228a00.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f6620df12cb6bdcad671d269debbb23573502f9d",
                "patch_url": "https://git.kernel.org/stable/p/f6620df12cb6bdcad671d269debbb23573502f9d",
                "filename": "CVE-2024-42102-f6620df12cb6bdcad671d269debbb23573502f9d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42102/CVE-2024-42102-f6620df12cb6bdcad671d269debbb23573502f9d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/000099d71648504fb9c7a4616f92c2b70c3e44ec",
            "https://git.kernel.org/stable/c/145faa3d03688cbb7bbaaecbd84c01539852942c",
            "https://git.kernel.org/stable/c/23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807",
            "https://git.kernel.org/stable/c/253f9ea7e8e53a5176bd80ceb174907b10724c1a",
            "https://git.kernel.org/stable/c/2820005edae13b140f2d54267d1bd6bb23915f59",
            "https://git.kernel.org/stable/c/30139c702048f1097342a31302cbd3d478f50c63",
            "https://git.kernel.org/stable/c/cbbe17a324437c0ff99881a3ee453da45b228a00",
            "https://git.kernel.org/stable/c/f6620df12cb6bdcad671d269debbb23573502f9d",
            "https://www.cve.org/CVERecord?id=CVE-2024-42102\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42102\nhttps://lore.kernel.org/linux-cve-announce/2024073019-CVE-2024-42102-bcee@gregkh/T"
        ]
    },
    "CVE-2024-42114": {
        "cve": "CVE-2024-42114",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values\n\nsyzbot is able to trigger softlockups, setting NL80211_ATTR_TXQ_QUANTUM\nto 2^31.\n\nWe had a similar issue in sch_fq, fixed with commit\nd9e15a273306 (\"pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM\")\n\nwatchdog: BUG: soft lockup - CPU#1 stuck for 26s! [kworker/1:0:24]\nModules linked in:\nirq event stamp: 131135\n hardirqs last  enabled at (131134): [<ffff80008ae8778c>] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:85 [inline]\n hardirqs last  enabled at (131134): [<ffff80008ae8778c>] exit_to_kernel_mode+0xdc/0x10c arch/arm64/kernel/entry-common.c:95\n hardirqs last disabled at (131135): [<ffff80008ae85378>] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]\n hardirqs last disabled at (131135): [<ffff80008ae85378>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551\n softirqs last  enabled at (125892): [<ffff80008907e82c>] neigh_hh_init net/core/neighbour.c:1538 [inline]\n softirqs last  enabled at (125892): [<ffff80008907e82c>] neigh_resolve_output+0x268/0x658 net/core/neighbour.c:1553\n softirqs last disabled at (125896): [<ffff80008904166c>] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19\nCPU: 1 PID: 24 Comm: kworker/1:0 Not tainted 6.9.0-rc7-syzkaller-gfda5695d692c #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nWorkqueue: mld mld_ifc_work\npstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : __list_del include/linux/list.h:195 [inline]\n pc : __list_del_entry include/linux/list.h:218 [inline]\n pc : list_move_tail include/linux/list.h:310 [inline]\n pc : fq_tin_dequeue include/net/fq_impl.h:112 [inline]\n pc : ieee80211_tx_dequeue+0x6b8/0x3b4c net/mac80211/tx.c:3854\n lr : __list_del_entry include/linux/list.h:218 [inline]\n lr : list_move_tail include/linux/list.h:310 [inline]\n lr : fq_tin_dequeue include/net/fq_impl.h:112 [inline]\n lr : ieee80211_tx_dequeue+0x67c/0x3b4c net/mac80211/tx.c:3854\nsp : ffff800093d36700\nx29: ffff800093d36a60 x28: ffff800093d36960 x27: dfff800000000000\nx26: ffff0000d800ad50 x25: ffff0000d800abe0 x24: ffff0000d800abf0\nx23: ffff0000e0032468 x22: ffff0000e00324d4 x21: ffff0000d800abf0\nx20: ffff0000d800abf8 x19: ffff0000d800abf0 x18: ffff800093d363c0\nx17: 000000000000d476 x16: ffff8000805519dc x15: ffff7000127a6cc8\nx14: 1ffff000127a6cc8 x13: 0000000000000004 x12: ffffffffffffffff\nx11: ffff7000127a6cc8 x10: 0000000000ff0100 x9 : 0000000000000000\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : ffff80009287aa08 x4 : 0000000000000008 x3 : ffff80008034c7fc\nx2 : ffff0000e0032468 x1 : 00000000da0e46b8 x0 : ffff0000e0032470\nCall trace:\n  __list_del include/linux/list.h:195 [inline]\n  __list_del_entry include/linux/list.h:218 [inline]\n  list_move_tail include/linux/list.h:310 [inline]\n  fq_tin_dequeue include/net/fq_impl.h:112 [inline]\n  ieee80211_tx_dequeue+0x6b8/0x3b4c net/mac80211/tx.c:3854\n  wake_tx_push_queue net/mac80211/util.c:294 [inline]\n  ieee80211_handle_wake_tx_queue+0x118/0x274 net/mac80211/util.c:315\n  drv_wake_tx_queue net/mac80211/driver-ops.h:1350 [inline]\n  schedule_and_wake_txq net/mac80211/driver-ops.h:1357 [inline]\n  ieee80211_queue_skb+0x18e8/0x2244 net/mac80211/tx.c:1664\n  ieee80211_tx+0x260/0x400 net/mac80211/tx.c:1966\n  ieee80211_xmit+0x278/0x354 net/mac80211/tx.c:2062\n  __ieee80211_subif_start_xmit+0xab8/0x122c net/mac80211/tx.c:4338\n  ieee80211_subif_start_xmit+0xe0/0x438 net/mac80211/tx.c:4532\n  __netdev_start_xmit include/linux/netdevice.h:4903 [inline]\n  netdev_start_xmit include/linux/netdevice.h:4917 [inline]\n  xmit_one net/core/dev.c:3531 [inline]\n  dev_hard_start_xmit+0x27c/0x938 net/core/dev.c:3547\n  __dev_queue_xmit+0x1678/0x33fc net/core/dev.c:4341\n  dev_queue_xmit include/linux/netdevice.h:3091 [inline]\n  neigh_resolve_output+0x558/0x658 net/core/neighbour.c:1563\n  neigh_output include/net/neighbour.h:542 [inline]\n  ip6_fini\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42114",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3fc06f6d142d2840735543216a60d0a8c345bdec",
            "patch_url": "https://git.kernel.org/stable/p/3fc06f6d142d2840735543216a60d0a8c345bdec",
            "filename": "CVE-2024-42114-3fc06f6d142d2840735543216a60d0a8c345bdec.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42114/CVE-2024-42114-3fc06f6d142d2840735543216a60d0a8c345bdec.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/33ac5a4eb3d4bea2146658f1b6d1fa86d62d2b22",
                "patch_url": "https://git.kernel.org/stable/p/33ac5a4eb3d4bea2146658f1b6d1fa86d62d2b22",
                "filename": "CVE-2024-42114-33ac5a4eb3d4bea2146658f1b6d1fa86d62d2b22.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42114/CVE-2024-42114-33ac5a4eb3d4bea2146658f1b6d1fa86d62d2b22.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3fc06f6d142d2840735543216a60d0a8c345bdec",
                "patch_url": "https://git.kernel.org/stable/p/3fc06f6d142d2840735543216a60d0a8c345bdec",
                "filename": "CVE-2024-42114-3fc06f6d142d2840735543216a60d0a8c345bdec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42114/CVE-2024-42114-3fc06f6d142d2840735543216a60d0a8c345bdec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/80ac0cc9c0bef984e29637b1efa93d7214b42f53",
                "patch_url": "https://git.kernel.org/stable/p/80ac0cc9c0bef984e29637b1efa93d7214b42f53",
                "filename": "CVE-2024-42114-80ac0cc9c0bef984e29637b1efa93d7214b42f53.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42114/CVE-2024-42114-80ac0cc9c0bef984e29637b1efa93d7214b42f53.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8a3ac7fb36962c34698f884bd697938054ff2afa",
                "patch_url": "https://git.kernel.org/stable/p/8a3ac7fb36962c34698f884bd697938054ff2afa",
                "filename": "CVE-2024-42114-8a3ac7fb36962c34698f884bd697938054ff2afa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42114/CVE-2024-42114-8a3ac7fb36962c34698f884bd697938054ff2afa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d1cba2ea8121e7fdbe1328cea782876b1dd80993",
                "patch_url": "https://git.kernel.org/stable/p/d1cba2ea8121e7fdbe1328cea782876b1dd80993",
                "filename": "CVE-2024-42114-d1cba2ea8121e7fdbe1328cea782876b1dd80993.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42114/CVE-2024-42114-d1cba2ea8121e7fdbe1328cea782876b1dd80993.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e87c2f098f52aa2fe20258a5bb1738d6a74e9ed7",
                "patch_url": "https://git.kernel.org/stable/p/e87c2f098f52aa2fe20258a5bb1738d6a74e9ed7",
                "filename": "CVE-2024-42114-e87c2f098f52aa2fe20258a5bb1738d6a74e9ed7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42114/CVE-2024-42114-e87c2f098f52aa2fe20258a5bb1738d6a74e9ed7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/33ac5a4eb3d4bea2146658f1b6d1fa86d62d2b22",
            "https://git.kernel.org/stable/c/3fc06f6d142d2840735543216a60d0a8c345bdec",
            "https://git.kernel.org/stable/c/80ac0cc9c0bef984e29637b1efa93d7214b42f53",
            "https://git.kernel.org/stable/c/8a3ac7fb36962c34698f884bd697938054ff2afa",
            "https://git.kernel.org/stable/c/d1cba2ea8121e7fdbe1328cea782876b1dd80993",
            "https://git.kernel.org/stable/c/e87c2f098f52aa2fe20258a5bb1738d6a74e9ed7",
            "https://www.cve.org/CVERecord?id=CVE-2024-42114\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42114\nhttps://lore.kernel.org/linux-cve-announce/2024073022-CVE-2024-42114-4585@gregkh/T"
        ]
    },
    "CVE-2024-42124": {
        "cve": "CVE-2024-42124",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Make qedf_execute_tmf() non-preemptible\n\nStop calling smp_processor_id() from preemptible code in\nqedf_execute_tmf90.  This results in BUG_ON() when running an RT kernel.\n\n[ 659.343280] BUG: using smp_processor_id() in preemptible [00000000] code: sg_reset/3646\n[ 659.343282] caller is qedf_execute_tmf+0x8b/0x360 [qedf]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42124",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0a8a91932b2772e75bf3f6d133ca4225d1d3e920",
            "patch_url": "https://git.kernel.org/stable/p/0a8a91932b2772e75bf3f6d133ca4225d1d3e920",
            "filename": "CVE-2024-42124-0a8a91932b2772e75bf3f6d133ca4225d1d3e920.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42124/CVE-2024-42124-0a8a91932b2772e75bf3f6d133ca4225d1d3e920.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0a8a91932b2772e75bf3f6d133ca4225d1d3e920",
                "patch_url": "https://git.kernel.org/stable/p/0a8a91932b2772e75bf3f6d133ca4225d1d3e920",
                "filename": "CVE-2024-42124-0a8a91932b2772e75bf3f6d133ca4225d1d3e920.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42124/CVE-2024-42124-0a8a91932b2772e75bf3f6d133ca4225d1d3e920.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0d8b637c9c5eeaa1a4e3dfb336f3ff918eb64fec",
                "patch_url": "https://git.kernel.org/stable/p/0d8b637c9c5eeaa1a4e3dfb336f3ff918eb64fec",
                "filename": "CVE-2024-42124-0d8b637c9c5eeaa1a4e3dfb336f3ff918eb64fec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42124/CVE-2024-42124-0d8b637c9c5eeaa1a4e3dfb336f3ff918eb64fec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2b9c7787cfcd1e76d873a78f16cf45bfa4b100ea",
                "patch_url": "https://git.kernel.org/stable/p/2b9c7787cfcd1e76d873a78f16cf45bfa4b100ea",
                "filename": "CVE-2024-42124-2b9c7787cfcd1e76d873a78f16cf45bfa4b100ea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42124/CVE-2024-42124-2b9c7787cfcd1e76d873a78f16cf45bfa4b100ea.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f314aadeed8cdf42c8cf30769425b5e44702748",
                "patch_url": "https://git.kernel.org/stable/p/4f314aadeed8cdf42c8cf30769425b5e44702748",
                "filename": "CVE-2024-42124-4f314aadeed8cdf42c8cf30769425b5e44702748.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42124/CVE-2024-42124-4f314aadeed8cdf42c8cf30769425b5e44702748.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5ceb40cdee721e13cbe15a0515cacf984e11236b",
                "patch_url": "https://git.kernel.org/stable/p/5ceb40cdee721e13cbe15a0515cacf984e11236b",
                "filename": "CVE-2024-42124-5ceb40cdee721e13cbe15a0515cacf984e11236b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42124/CVE-2024-42124-5ceb40cdee721e13cbe15a0515cacf984e11236b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b6ded5316ec56e973dcf5f9997945aad01a9f062",
                "patch_url": "https://git.kernel.org/stable/p/b6ded5316ec56e973dcf5f9997945aad01a9f062",
                "filename": "CVE-2024-42124-b6ded5316ec56e973dcf5f9997945aad01a9f062.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42124/CVE-2024-42124-b6ded5316ec56e973dcf5f9997945aad01a9f062.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fa49c65a1cec6a3901ef884fdb24d98068b63493",
                "patch_url": "https://git.kernel.org/stable/p/fa49c65a1cec6a3901ef884fdb24d98068b63493",
                "filename": "CVE-2024-42124-fa49c65a1cec6a3901ef884fdb24d98068b63493.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42124/CVE-2024-42124-fa49c65a1cec6a3901ef884fdb24d98068b63493.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0a8a91932b2772e75bf3f6d133ca4225d1d3e920",
            "https://git.kernel.org/stable/c/0d8b637c9c5eeaa1a4e3dfb336f3ff918eb64fec",
            "https://git.kernel.org/stable/c/2b9c7787cfcd1e76d873a78f16cf45bfa4b100ea",
            "https://git.kernel.org/stable/c/4f314aadeed8cdf42c8cf30769425b5e44702748",
            "https://git.kernel.org/stable/c/5ceb40cdee721e13cbe15a0515cacf984e11236b",
            "https://git.kernel.org/stable/c/b6ded5316ec56e973dcf5f9997945aad01a9f062",
            "https://git.kernel.org/stable/c/fa49c65a1cec6a3901ef884fdb24d98068b63493",
            "https://www.cve.org/CVERecord?id=CVE-2024-42124\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42124\nhttps://lore.kernel.org/linux-cve-announce/2024073025-CVE-2024-42124-e4ad@gregkh/T"
        ]
    },
    "CVE-2024-42131": {
        "cve": "CVE-2024-42131",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: avoid overflows in dirty throttling logic\n\nThe dirty throttling logic is interspersed with assumptions that dirty\nlimits in PAGE_SIZE units fit into 32-bit (so that various multiplications\nfit into 64-bits).  If limits end up being larger, we will hit overflows,\npossible divisions by 0 etc.  Fix these problems by never allowing so\nlarge dirty limits as they have dubious practical value anyway.  For\ndirty_bytes / dirty_background_bytes interfaces we can just refuse to set\nso large limits.  For dirty_ratio / dirty_background_ratio it isn't so\nsimple as the dirty limit is computed from the amount of available memory\nwhich can change due to memory hotplug etc.  So when converting dirty\nlimits from ratios to numbers of pages, we just don't allow the result to\nexceed UINT_MAX.\n\nThis is root-only triggerable problem which occurs when the operator\nsets dirty limits to >16 TB.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42131",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/7a49389771ae7666f4dc3426e2a4594bf23ae290",
            "patch_url": "https://git.kernel.org/stable/p/7a49389771ae7666f4dc3426e2a4594bf23ae290",
            "filename": "CVE-2024-42131-7a49389771ae7666f4dc3426e2a4594bf23ae290.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42131/CVE-2024-42131-7a49389771ae7666f4dc3426e2a4594bf23ae290.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2b2d2b8766db028bd827af34075f221ae9e9efff",
                "patch_url": "https://git.kernel.org/stable/p/2b2d2b8766db028bd827af34075f221ae9e9efff",
                "filename": "CVE-2024-42131-2b2d2b8766db028bd827af34075f221ae9e9efff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42131/CVE-2024-42131-2b2d2b8766db028bd827af34075f221ae9e9efff.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/385d838df280eba6c8680f9777bfa0d0bfe7e8b2",
                "patch_url": "https://git.kernel.org/stable/p/385d838df280eba6c8680f9777bfa0d0bfe7e8b2",
                "filename": "CVE-2024-42131-385d838df280eba6c8680f9777bfa0d0bfe7e8b2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42131/CVE-2024-42131-385d838df280eba6c8680f9777bfa0d0bfe7e8b2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4d3817b64eda07491bdd86a234629fe0764fb42a",
                "patch_url": "https://git.kernel.org/stable/p/4d3817b64eda07491bdd86a234629fe0764fb42a",
                "filename": "CVE-2024-42131-4d3817b64eda07491bdd86a234629fe0764fb42a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42131/CVE-2024-42131-4d3817b64eda07491bdd86a234629fe0764fb42a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7a49389771ae7666f4dc3426e2a4594bf23ae290",
                "patch_url": "https://git.kernel.org/stable/p/7a49389771ae7666f4dc3426e2a4594bf23ae290",
                "filename": "CVE-2024-42131-7a49389771ae7666f4dc3426e2a4594bf23ae290.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42131/CVE-2024-42131-7a49389771ae7666f4dc3426e2a4594bf23ae290.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8e0b5e7f2895eccef5c2a0018b589266f90c4805",
                "patch_url": "https://git.kernel.org/stable/p/8e0b5e7f2895eccef5c2a0018b589266f90c4805",
                "filename": "CVE-2024-42131-8e0b5e7f2895eccef5c2a0018b589266f90c4805.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42131/CVE-2024-42131-8e0b5e7f2895eccef5c2a0018b589266f90c4805.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a25e8536184516b55ef89ab91dd2eea429de28d2",
                "patch_url": "https://git.kernel.org/stable/p/a25e8536184516b55ef89ab91dd2eea429de28d2",
                "filename": "CVE-2024-42131-a25e8536184516b55ef89ab91dd2eea429de28d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42131/CVE-2024-42131-a25e8536184516b55ef89ab91dd2eea429de28d2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bd16a7ee339aef3ee4c90cb23902afb6af379ea0",
                "patch_url": "https://git.kernel.org/stable/p/bd16a7ee339aef3ee4c90cb23902afb6af379ea0",
                "filename": "CVE-2024-42131-bd16a7ee339aef3ee4c90cb23902afb6af379ea0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42131/CVE-2024-42131-bd16a7ee339aef3ee4c90cb23902afb6af379ea0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c83ed422c24f0d4b264f89291d4fabe285f80dbc",
                "patch_url": "https://git.kernel.org/stable/p/c83ed422c24f0d4b264f89291d4fabe285f80dbc",
                "filename": "CVE-2024-42131-c83ed422c24f0d4b264f89291d4fabe285f80dbc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42131/CVE-2024-42131-c83ed422c24f0d4b264f89291d4fabe285f80dbc.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2b2d2b8766db028bd827af34075f221ae9e9efff",
            "https://git.kernel.org/stable/c/385d838df280eba6c8680f9777bfa0d0bfe7e8b2",
            "https://git.kernel.org/stable/c/4d3817b64eda07491bdd86a234629fe0764fb42a",
            "https://git.kernel.org/stable/c/7a49389771ae7666f4dc3426e2a4594bf23ae290",
            "https://git.kernel.org/stable/c/8e0b5e7f2895eccef5c2a0018b589266f90c4805",
            "https://git.kernel.org/stable/c/a25e8536184516b55ef89ab91dd2eea429de28d2",
            "https://git.kernel.org/stable/c/bd16a7ee339aef3ee4c90cb23902afb6af379ea0",
            "https://git.kernel.org/stable/c/c83ed422c24f0d4b264f89291d4fabe285f80dbc",
            "https://www.cve.org/CVERecord?id=CVE-2024-42131\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42131\nhttps://lore.kernel.org/linux-cve-announce/2024073027-CVE-2024-42131-2f7f@gregkh/T"
        ]
    },
    "CVE-2024-42152": {
        "cve": "CVE-2024-42152",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix a possible leak when destroy a ctrl during qp establishment\n\nIn nvmet_sq_destroy we capture sq->ctrl early and if it is non-NULL we\nknow that a ctrl was allocated (in the admin connect request handler)\nand we need to release pending AERs, clear ctrl->sqs and sq->ctrl\n(for nvme-loop primarily), and drop the final reference on the ctrl.\n\nHowever, a small window is possible where nvmet_sq_destroy starts (as\na result of the client giving up and disconnecting) concurrently with\nthe nvme admin connect cmd (which may be in an early stage). But *before*\nkill_and_confirm of sq->ref (i.e. the admin connect managed to get an sq\nlive reference). In this case, sq->ctrl was allocated however after it was\ncaptured in a local variable in nvmet_sq_destroy.\nThis prevented the final reference drop on the ctrl.\n\nSolve this by re-capturing the sq->ctrl after all inflight request has\ncompleted, where for sure sq->ctrl reference is final, and move forward\nbased on that.\n\nThis issue was observed in an environment with many hosts connecting\nmultiple ctrls simoutanuosly, creating a delay in allocating a ctrl\nleading up to this race window.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42152",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/b4fed1443a6571d49c6ffe7d97af3bbe5ee6dff5",
            "patch_url": "https://git.kernel.org/stable/p/b4fed1443a6571d49c6ffe7d97af3bbe5ee6dff5",
            "filename": "CVE-2024-42152-b4fed1443a6571d49c6ffe7d97af3bbe5ee6dff5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42152/CVE-2024-42152-b4fed1443a6571d49c6ffe7d97af3bbe5ee6dff5.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2f3c22b1d3d7e86712253244797a651998c141fa",
                "patch_url": "https://git.kernel.org/stable/p/2f3c22b1d3d7e86712253244797a651998c141fa",
                "filename": "CVE-2024-42152-2f3c22b1d3d7e86712253244797a651998c141fa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42152/CVE-2024-42152-2f3c22b1d3d7e86712253244797a651998c141fa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5502c1f1d0d7472706cc1f201aecf1c935d302d1",
                "patch_url": "https://git.kernel.org/stable/p/5502c1f1d0d7472706cc1f201aecf1c935d302d1",
                "filename": "CVE-2024-42152-5502c1f1d0d7472706cc1f201aecf1c935d302d1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42152/CVE-2024-42152-5502c1f1d0d7472706cc1f201aecf1c935d302d1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/818004f2a380420c19872171be716174d4985e33",
                "patch_url": "https://git.kernel.org/stable/p/818004f2a380420c19872171be716174d4985e33",
                "filename": "CVE-2024-42152-818004f2a380420c19872171be716174d4985e33.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42152/CVE-2024-42152-818004f2a380420c19872171be716174d4985e33.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/940a71f08ef153ef807f751310b0648d1fa5d0da",
                "patch_url": "https://git.kernel.org/stable/p/940a71f08ef153ef807f751310b0648d1fa5d0da",
                "filename": "CVE-2024-42152-940a71f08ef153ef807f751310b0648d1fa5d0da.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42152/CVE-2024-42152-940a71f08ef153ef807f751310b0648d1fa5d0da.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b4fed1443a6571d49c6ffe7d97af3bbe5ee6dff5",
                "patch_url": "https://git.kernel.org/stable/p/b4fed1443a6571d49c6ffe7d97af3bbe5ee6dff5",
                "filename": "CVE-2024-42152-b4fed1443a6571d49c6ffe7d97af3bbe5ee6dff5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42152/CVE-2024-42152-b4fed1443a6571d49c6ffe7d97af3bbe5ee6dff5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c758b77d4a0a0ed3a1292b3fd7a2aeccd1a169a4",
                "patch_url": "https://git.kernel.org/stable/p/c758b77d4a0a0ed3a1292b3fd7a2aeccd1a169a4",
                "filename": "CVE-2024-42152-c758b77d4a0a0ed3a1292b3fd7a2aeccd1a169a4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42152/CVE-2024-42152-c758b77d4a0a0ed3a1292b3fd7a2aeccd1a169a4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2f3c22b1d3d7e86712253244797a651998c141fa",
            "https://git.kernel.org/stable/c/5502c1f1d0d7472706cc1f201aecf1c935d302d1",
            "https://git.kernel.org/stable/c/818004f2a380420c19872171be716174d4985e33",
            "https://git.kernel.org/stable/c/940a71f08ef153ef807f751310b0648d1fa5d0da",
            "https://git.kernel.org/stable/c/b4fed1443a6571d49c6ffe7d97af3bbe5ee6dff5",
            "https://git.kernel.org/stable/c/c758b77d4a0a0ed3a1292b3fd7a2aeccd1a169a4",
            "https://www.cve.org/CVERecord?id=CVE-2024-42152\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42152\nhttps://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42152-c248@gregkh/T"
        ]
    },
    "CVE-2024-42154": {
        "cve": "CVE-2024-42154",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: validate source addr length\n\nI don't see anything checking that TCP_METRICS_ATTR_SADDR_IPV4\nis at least 4 bytes long, and the policy doesn't have an entry\nfor this attribute at all (neither does it for IPv6 but v6 is\nmanually validated).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42154",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2a2e79dbe2236a1289412d2044994f7ab419b44c",
            "patch_url": "https://git.kernel.org/stable/p/2a2e79dbe2236a1289412d2044994f7ab419b44c",
            "filename": "CVE-2024-42154-2a2e79dbe2236a1289412d2044994f7ab419b44c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42154/CVE-2024-42154-2a2e79dbe2236a1289412d2044994f7ab419b44c.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/19d997b59fa1fd7a02e770ee0881c0652b9c32c9",
                "patch_url": "https://git.kernel.org/stable/p/19d997b59fa1fd7a02e770ee0881c0652b9c32c9",
                "filename": "CVE-2024-42154-19d997b59fa1fd7a02e770ee0881c0652b9c32c9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42154/CVE-2024-42154-19d997b59fa1fd7a02e770ee0881c0652b9c32c9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2a2e79dbe2236a1289412d2044994f7ab419b44c",
                "patch_url": "https://git.kernel.org/stable/p/2a2e79dbe2236a1289412d2044994f7ab419b44c",
                "filename": "CVE-2024-42154-2a2e79dbe2236a1289412d2044994f7ab419b44c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42154/CVE-2024-42154-2a2e79dbe2236a1289412d2044994f7ab419b44c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/31f03bb04146c1c6df6c03e9f45401f5f5a985d3",
                "patch_url": "https://git.kernel.org/stable/p/31f03bb04146c1c6df6c03e9f45401f5f5a985d3",
                "filename": "CVE-2024-42154-31f03bb04146c1c6df6c03e9f45401f5f5a985d3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42154/CVE-2024-42154-31f03bb04146c1c6df6c03e9f45401f5f5a985d3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3d550dd5418729a6e77fe7721d27adea7152e321",
                "patch_url": "https://git.kernel.org/stable/p/3d550dd5418729a6e77fe7721d27adea7152e321",
                "filename": "CVE-2024-42154-3d550dd5418729a6e77fe7721d27adea7152e321.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42154/CVE-2024-42154-3d550dd5418729a6e77fe7721d27adea7152e321.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/66be40e622e177316ae81717aa30057ba9e61dff",
                "patch_url": "https://git.kernel.org/stable/p/66be40e622e177316ae81717aa30057ba9e61dff",
                "filename": "CVE-2024-42154-66be40e622e177316ae81717aa30057ba9e61dff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42154/CVE-2024-42154-66be40e622e177316ae81717aa30057ba9e61dff.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8c2debdd170e395934ac0e039748576dfde14e99",
                "patch_url": "https://git.kernel.org/stable/p/8c2debdd170e395934ac0e039748576dfde14e99",
                "filename": "CVE-2024-42154-8c2debdd170e395934ac0e039748576dfde14e99.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42154/CVE-2024-42154-8c2debdd170e395934ac0e039748576dfde14e99.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cdffc358717e436bb67122bb82c1a2a26e050f98",
                "patch_url": "https://git.kernel.org/stable/p/cdffc358717e436bb67122bb82c1a2a26e050f98",
                "filename": "CVE-2024-42154-cdffc358717e436bb67122bb82c1a2a26e050f98.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42154/CVE-2024-42154-cdffc358717e436bb67122bb82c1a2a26e050f98.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ef7c428b425beeb52b894e16f1c4b629d6cebfb6",
                "patch_url": "https://git.kernel.org/stable/p/ef7c428b425beeb52b894e16f1c4b629d6cebfb6",
                "filename": "CVE-2024-42154-ef7c428b425beeb52b894e16f1c4b629d6cebfb6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42154/CVE-2024-42154-ef7c428b425beeb52b894e16f1c4b629d6cebfb6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/19d997b59fa1fd7a02e770ee0881c0652b9c32c9",
            "https://git.kernel.org/stable/c/2a2e79dbe2236a1289412d2044994f7ab419b44c",
            "https://git.kernel.org/stable/c/31f03bb04146c1c6df6c03e9f45401f5f5a985d3",
            "https://git.kernel.org/stable/c/3d550dd5418729a6e77fe7721d27adea7152e321",
            "https://git.kernel.org/stable/c/66be40e622e177316ae81717aa30057ba9e61dff",
            "https://git.kernel.org/stable/c/8c2debdd170e395934ac0e039748576dfde14e99",
            "https://git.kernel.org/stable/c/cdffc358717e436bb67122bb82c1a2a26e050f98",
            "https://git.kernel.org/stable/c/ef7c428b425beeb52b894e16f1c4b629d6cebfb6",
            "https://www.cve.org/CVERecord?id=CVE-2024-42154\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42154\nhttps://lore.kernel.org/linux-cve-announce/2024073034-CVE-2024-42154-cf82@gregkh/T"
        ]
    },
    "CVE-2024-42225": {
        "cve": "CVE-2024-42225",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: replace skb_put with skb_put_zero\n\nAvoid potentially reusing uninitialized data",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42225",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/22ea2a7f0b64d323625950414a4496520fb33657",
            "patch_url": "https://git.kernel.org/stable/p/22ea2a7f0b64d323625950414a4496520fb33657",
            "filename": "CVE-2024-42225-22ea2a7f0b64d323625950414a4496520fb33657.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42225/CVE-2024-42225-22ea2a7f0b64d323625950414a4496520fb33657.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/22ea2a7f0b64d323625950414a4496520fb33657",
                "patch_url": "https://git.kernel.org/stable/p/22ea2a7f0b64d323625950414a4496520fb33657",
                "filename": "CVE-2024-42225-22ea2a7f0b64d323625950414a4496520fb33657.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42225/CVE-2024-42225-22ea2a7f0b64d323625950414a4496520fb33657.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/64f86337ccfe77fe3be5a9356b0dabde23fbb074",
                "patch_url": "https://git.kernel.org/stable/p/64f86337ccfe77fe3be5a9356b0dabde23fbb074",
                "filename": "CVE-2024-42225-64f86337ccfe77fe3be5a9356b0dabde23fbb074.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42225/CVE-2024-42225-64f86337ccfe77fe3be5a9356b0dabde23fbb074.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7f819a2f4fbc510e088b49c79addcf1734503578",
                "patch_url": "https://git.kernel.org/stable/p/7f819a2f4fbc510e088b49c79addcf1734503578",
                "filename": "CVE-2024-42225-7f819a2f4fbc510e088b49c79addcf1734503578.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42225/CVE-2024-42225-7f819a2f4fbc510e088b49c79addcf1734503578.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dc7f14d00d0c4c21898f3504607f4a31079065a2",
                "patch_url": "https://git.kernel.org/stable/p/dc7f14d00d0c4c21898f3504607f4a31079065a2",
                "filename": "CVE-2024-42225-dc7f14d00d0c4c21898f3504607f4a31079065a2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42225/CVE-2024-42225-dc7f14d00d0c4c21898f3504607f4a31079065a2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ff6b26be13032c5fbd6b6a0b24358f8eaac4f3af",
                "patch_url": "https://git.kernel.org/stable/p/ff6b26be13032c5fbd6b6a0b24358f8eaac4f3af",
                "filename": "CVE-2024-42225-ff6b26be13032c5fbd6b6a0b24358f8eaac4f3af.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42225/CVE-2024-42225-ff6b26be13032c5fbd6b6a0b24358f8eaac4f3af.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/22ea2a7f0b64d323625950414a4496520fb33657",
            "https://git.kernel.org/stable/c/64f86337ccfe77fe3be5a9356b0dabde23fbb074",
            "https://git.kernel.org/stable/c/7f819a2f4fbc510e088b49c79addcf1734503578",
            "https://git.kernel.org/stable/c/dc7f14d00d0c4c21898f3504607f4a31079065a2",
            "https://git.kernel.org/stable/c/ff6b26be13032c5fbd6b6a0b24358f8eaac4f3af",
            "https://www.cve.org/CVERecord?id=CVE-2024-42225\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42225\nhttps://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42225-bdfa@gregkh/T"
        ]
    },
    "CVE-2024-42226": {
        "cve": "CVE-2024-42226",
        "cvss_v2": null,
        "cvss_v3": "5.5",
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42226",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1f4a10cb826fdec5cd442df010bcb3043bfd6464",
            "patch_url": "https://git.kernel.org/stable/p/1f4a10cb826fdec5cd442df010bcb3043bfd6464",
            "filename": "CVE-2024-42226-1f4a10cb826fdec5cd442df010bcb3043bfd6464.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42226/CVE-2024-42226-1f4a10cb826fdec5cd442df010bcb3043bfd6464.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1f4a10cb826fdec5cd442df010bcb3043bfd6464",
                "patch_url": "https://git.kernel.org/stable/p/1f4a10cb826fdec5cd442df010bcb3043bfd6464",
                "filename": "CVE-2024-42226-1f4a10cb826fdec5cd442df010bcb3043bfd6464.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42226/CVE-2024-42226-1f4a10cb826fdec5cd442df010bcb3043bfd6464.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/66cb618bf0bb82859875b00eeffaf223557cb416",
                "patch_url": "https://git.kernel.org/stable/p/66cb618bf0bb82859875b00eeffaf223557cb416",
                "filename": "CVE-2024-42226-66cb618bf0bb82859875b00eeffaf223557cb416.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42226/CVE-2024-42226-66cb618bf0bb82859875b00eeffaf223557cb416.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/69bed24c82139bbad0a78a075e1834a2ea7bd064",
                "patch_url": "https://git.kernel.org/stable/p/69bed24c82139bbad0a78a075e1834a2ea7bd064",
                "filename": "CVE-2024-42226-69bed24c82139bbad0a78a075e1834a2ea7bd064.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42226/CVE-2024-42226-69bed24c82139bbad0a78a075e1834a2ea7bd064.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/948554f1bb16e15b90006c109c3a558c66d4c4ac",
                "patch_url": "https://git.kernel.org/stable/p/948554f1bb16e15b90006c109c3a558c66d4c4ac",
                "filename": "CVE-2024-42226-948554f1bb16e15b90006c109c3a558c66d4c4ac.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42226/CVE-2024-42226-948554f1bb16e15b90006c109c3a558c66d4c4ac.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9a24eb8010c2dc6a2eba56e3eb9fc07d14ffe00a",
                "patch_url": "https://git.kernel.org/stable/p/9a24eb8010c2dc6a2eba56e3eb9fc07d14ffe00a",
                "filename": "CVE-2024-42226-9a24eb8010c2dc6a2eba56e3eb9fc07d14ffe00a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42226/CVE-2024-42226-9a24eb8010c2dc6a2eba56e3eb9fc07d14ffe00a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c0ee01e8ba19ff7edc98f68a114d4789faa219b9",
                "patch_url": "https://git.kernel.org/stable/p/c0ee01e8ba19ff7edc98f68a114d4789faa219b9",
                "filename": "CVE-2024-42226-c0ee01e8ba19ff7edc98f68a114d4789faa219b9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42226/CVE-2024-42226-c0ee01e8ba19ff7edc98f68a114d4789faa219b9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1f4a10cb826fdec5cd442df010bcb3043bfd6464",
            "https://git.kernel.org/stable/c/66cb618bf0bb82859875b00eeffaf223557cb416",
            "https://git.kernel.org/stable/c/69bed24c82139bbad0a78a075e1834a2ea7bd064",
            "https://git.kernel.org/stable/c/948554f1bb16e15b90006c109c3a558c66d4c4ac",
            "https://git.kernel.org/stable/c/9a24eb8010c2dc6a2eba56e3eb9fc07d14ffe00a",
            "https://git.kernel.org/stable/c/c0ee01e8ba19ff7edc98f68a114d4789faa219b9",
            "https://www.cve.org/CVERecord?id=CVE-2024-42226\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42226\nhttps://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42226-fa39@gregkh/T"
        ]
    },
    "CVE-2024-42228": {
        "cve": "CVE-2024-42228",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc\n\nInitialize the size before calling amdgpu_vce_cs_reloc, such as case 0x03000001.\nV2: To really improve the handling we would actually\n   need to have a separate value of 0xffffffff.(Christian)",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42228",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9ee1534ecdd5b4c013064663502d7fde824d2144",
            "patch_url": "https://git.kernel.org/stable/p/9ee1534ecdd5b4c013064663502d7fde824d2144",
            "filename": "CVE-2024-42228-9ee1534ecdd5b4c013064663502d7fde824d2144.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42228/CVE-2024-42228-9ee1534ecdd5b4c013064663502d7fde824d2144.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3b505759447637dcccb50cbd98ec6f8d2a04fc46",
                "patch_url": "https://git.kernel.org/stable/p/3b505759447637dcccb50cbd98ec6f8d2a04fc46",
                "filename": "CVE-2024-42228-3b505759447637dcccb50cbd98ec6f8d2a04fc46.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42228/CVE-2024-42228-3b505759447637dcccb50cbd98ec6f8d2a04fc46.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/855ae72c20310e5402b2317fc537d911e87537ef",
                "patch_url": "https://git.kernel.org/stable/p/855ae72c20310e5402b2317fc537d911e87537ef",
                "filename": "CVE-2024-42228-855ae72c20310e5402b2317fc537d911e87537ef.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42228/CVE-2024-42228-855ae72c20310e5402b2317fc537d911e87537ef.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/88a9a467c548d0b3c7761b4fd54a68e70f9c0944",
                "patch_url": "https://git.kernel.org/stable/p/88a9a467c548d0b3c7761b4fd54a68e70f9c0944",
                "filename": "CVE-2024-42228-88a9a467c548d0b3c7761b4fd54a68e70f9c0944.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42228/CVE-2024-42228-88a9a467c548d0b3c7761b4fd54a68e70f9c0944.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ee1534ecdd5b4c013064663502d7fde824d2144",
                "patch_url": "https://git.kernel.org/stable/p/9ee1534ecdd5b4c013064663502d7fde824d2144",
                "filename": "CVE-2024-42228-9ee1534ecdd5b4c013064663502d7fde824d2144.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42228/CVE-2024-42228-9ee1534ecdd5b4c013064663502d7fde824d2144.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d35cf41c8eb5d9fe95b21ae6ee2910f9ba4878e8",
                "patch_url": "https://git.kernel.org/stable/p/d35cf41c8eb5d9fe95b21ae6ee2910f9ba4878e8",
                "filename": "CVE-2024-42228-d35cf41c8eb5d9fe95b21ae6ee2910f9ba4878e8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42228/CVE-2024-42228-d35cf41c8eb5d9fe95b21ae6ee2910f9ba4878e8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/da6a85d197888067e8d38b5d22c986b5b5cab712",
                "patch_url": "https://git.kernel.org/stable/p/da6a85d197888067e8d38b5d22c986b5b5cab712",
                "filename": "CVE-2024-42228-da6a85d197888067e8d38b5d22c986b5b5cab712.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42228/CVE-2024-42228-da6a85d197888067e8d38b5d22c986b5b5cab712.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/df02642c21c984303fe34c3f7d72965792fb1a15",
                "patch_url": "https://git.kernel.org/stable/p/df02642c21c984303fe34c3f7d72965792fb1a15",
                "filename": "CVE-2024-42228-df02642c21c984303fe34c3f7d72965792fb1a15.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42228/CVE-2024-42228-df02642c21c984303fe34c3f7d72965792fb1a15.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f8f120b3de48b8b6bdf8988a9b334c2d61c17440",
                "patch_url": "https://git.kernel.org/stable/p/f8f120b3de48b8b6bdf8988a9b334c2d61c17440",
                "filename": "CVE-2024-42228-f8f120b3de48b8b6bdf8988a9b334c2d61c17440.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42228/CVE-2024-42228-f8f120b3de48b8b6bdf8988a9b334c2d61c17440.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3b505759447637dcccb50cbd98ec6f8d2a04fc46",
            "https://git.kernel.org/stable/c/855ae72c20310e5402b2317fc537d911e87537ef",
            "https://git.kernel.org/stable/c/88a9a467c548d0b3c7761b4fd54a68e70f9c0944",
            "https://git.kernel.org/stable/c/9ee1534ecdd5b4c013064663502d7fde824d2144",
            "https://git.kernel.org/stable/c/d35cf41c8eb5d9fe95b21ae6ee2910f9ba4878e8",
            "https://git.kernel.org/stable/c/da6a85d197888067e8d38b5d22c986b5b5cab712",
            "https://git.kernel.org/stable/c/df02642c21c984303fe34c3f7d72965792fb1a15",
            "https://git.kernel.org/stable/c/f8f120b3de48b8b6bdf8988a9b334c2d61c17440",
            "https://www.cve.org/CVERecord?id=CVE-2024-42228\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42228\nhttps://lore.kernel.org/linux-cve-announce/2024073038-CVE-2024-42228-86f5@gregkh/T"
        ]
    },
    "CVE-2024-42237": {
        "cve": "CVE-2024-42237",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Validate payload length before processing block\n\nMove the payload length check in cs_dsp_load() and cs_dsp_coeff_load()\nto be done before the block is processed.\n\nThe check that the length of a block payload does not exceed the number\nof remaining bytes in the firwmware file buffer was being done near the\nend of the loop iteration. However, some code before that check used the\nlength field without validating it.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42237",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/259955eca9b7acf1299b1ac077d8cfbe12df35d8",
            "patch_url": "https://git.kernel.org/stable/p/259955eca9b7acf1299b1ac077d8cfbe12df35d8",
            "filename": "CVE-2024-42237-259955eca9b7acf1299b1ac077d8cfbe12df35d8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42237/CVE-2024-42237-259955eca9b7acf1299b1ac077d8cfbe12df35d8.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/259955eca9b7acf1299b1ac077d8cfbe12df35d8",
                "patch_url": "https://git.kernel.org/stable/p/259955eca9b7acf1299b1ac077d8cfbe12df35d8",
                "filename": "CVE-2024-42237-259955eca9b7acf1299b1ac077d8cfbe12df35d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42237/CVE-2024-42237-259955eca9b7acf1299b1ac077d8cfbe12df35d8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3a9cd924aec1288d675df721f244da4dd7e16cff",
                "patch_url": "https://git.kernel.org/stable/p/3a9cd924aec1288d675df721f244da4dd7e16cff",
                "filename": "CVE-2024-42237-3a9cd924aec1288d675df721f244da4dd7e16cff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42237/CVE-2024-42237-3a9cd924aec1288d675df721f244da4dd7e16cff.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6598afa9320b6ab13041616950ca5f8f938c0cf1",
                "patch_url": "https://git.kernel.org/stable/p/6598afa9320b6ab13041616950ca5f8f938c0cf1",
                "filename": "CVE-2024-42237-6598afa9320b6ab13041616950ca5f8f938c0cf1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42237/CVE-2024-42237-6598afa9320b6ab13041616950ca5f8f938c0cf1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/71d9e313d8f7e18c543a9c80506fe6b1eb1fe0c8",
                "patch_url": "https://git.kernel.org/stable/p/71d9e313d8f7e18c543a9c80506fe6b1eb1fe0c8",
                "filename": "CVE-2024-42237-71d9e313d8f7e18c543a9c80506fe6b1eb1fe0c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42237/CVE-2024-42237-71d9e313d8f7e18c543a9c80506fe6b1eb1fe0c8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/259955eca9b7acf1299b1ac077d8cfbe12df35d8",
            "https://git.kernel.org/stable/c/3a9cd924aec1288d675df721f244da4dd7e16cff",
            "https://git.kernel.org/stable/c/6598afa9320b6ab13041616950ca5f8f938c0cf1",
            "https://git.kernel.org/stable/c/71d9e313d8f7e18c543a9c80506fe6b1eb1fe0c8",
            "https://www.cve.org/CVERecord?id=CVE-2024-42237\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42237\nhttps://lore.kernel.org/linux-cve-announce/2024080740-CVE-2024-42237-eba4@gregkh/T"
        ]
    },
    "CVE-2024-42238": {
        "cve": "CVE-2024-42238",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: cs_dsp: Return error if block header overflows file\n\nReturn an error from cs_dsp_power_up() if a block header is longer\nthan the amount of data left in the file.\n\nThe previous code in cs_dsp_load() and cs_dsp_load_coeff() would loop\nwhile there was enough data left in the file for a valid region. This\nprotected against overrunning the end of the file data, but it didn't\nabort the file processing with an error.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42238",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/b8be70566b33abbd0180105070b4c67cfef8c44f",
            "patch_url": "https://git.kernel.org/stable/p/b8be70566b33abbd0180105070b4c67cfef8c44f",
            "filename": "CVE-2024-42238-b8be70566b33abbd0180105070b4c67cfef8c44f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42238/CVE-2024-42238-b8be70566b33abbd0180105070b4c67cfef8c44f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/6eabd23383805725eff416c203688b7a390d4153",
                "patch_url": "https://git.kernel.org/stable/p/6eabd23383805725eff416c203688b7a390d4153",
                "filename": "CVE-2024-42238-6eabd23383805725eff416c203688b7a390d4153.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42238/CVE-2024-42238-6eabd23383805725eff416c203688b7a390d4153.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/90ab191b7d181057d71234e8632e06b5844ac38e",
                "patch_url": "https://git.kernel.org/stable/p/90ab191b7d181057d71234e8632e06b5844ac38e",
                "filename": "CVE-2024-42238-90ab191b7d181057d71234e8632e06b5844ac38e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42238/CVE-2024-42238-90ab191b7d181057d71234e8632e06b5844ac38e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/959fe01e85b7241e3ec305d657febbe82da16a02",
                "patch_url": "https://git.kernel.org/stable/p/959fe01e85b7241e3ec305d657febbe82da16a02",
                "filename": "CVE-2024-42238-959fe01e85b7241e3ec305d657febbe82da16a02.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42238/CVE-2024-42238-959fe01e85b7241e3ec305d657febbe82da16a02.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b8be70566b33abbd0180105070b4c67cfef8c44f",
                "patch_url": "https://git.kernel.org/stable/p/b8be70566b33abbd0180105070b4c67cfef8c44f",
                "filename": "CVE-2024-42238-b8be70566b33abbd0180105070b4c67cfef8c44f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42238/CVE-2024-42238-b8be70566b33abbd0180105070b4c67cfef8c44f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/6eabd23383805725eff416c203688b7a390d4153",
            "https://git.kernel.org/stable/c/90ab191b7d181057d71234e8632e06b5844ac38e",
            "https://git.kernel.org/stable/c/959fe01e85b7241e3ec305d657febbe82da16a02",
            "https://git.kernel.org/stable/c/b8be70566b33abbd0180105070b4c67cfef8c44f",
            "https://www.cve.org/CVERecord?id=CVE-2024-42238\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42238\nhttps://lore.kernel.org/linux-cve-announce/2024080740-CVE-2024-42238-a5fd@gregkh/T"
        ]
    },
    "CVE-2024-42240": {
        "cve": "CVE-2024-42240",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/bhi: Avoid warning in #DB handler due to BHI mitigation\n\nWhen BHI mitigation is enabled, if SYSENTER is invoked with the TF flag set\nthen entry_SYSENTER_compat() uses CLEAR_BRANCH_HISTORY and calls the\nclear_bhb_loop() before the TF flag is cleared. This causes the #DB handler\n(exc_debug_kernel()) to issue a warning because single-step is used outside the\nentry_SYSENTER_compat() function.\n\nTo address this issue, entry_SYSENTER_compat() should use CLEAR_BRANCH_HISTORY\nafter making sure the TF flag is cleared.\n\nThe problem can be reproduced with the following sequence:\n\n  $ cat sysenter_step.c\n  int main()\n  { asm(\"pushf; pop %ax; bts $8,%ax; push %ax; popf; sysenter\"); }\n\n  $ gcc -o sysenter_step sysenter_step.c\n\n  $ ./sysenter_step\n  Segmentation fault (core dumped)\n\nThe program is expected to crash, and the #DB handler will issue a warning.\n\nKernel log:\n\n  WARNING: CPU: 27 PID: 7000 at arch/x86/kernel/traps.c:1009 exc_debug_kernel+0xd2/0x160\n  ...\n  RIP: 0010:exc_debug_kernel+0xd2/0x160\n  ...\n  Call Trace:\n  <#DB>\n   ? show_regs+0x68/0x80\n   ? __warn+0x8c/0x140\n   ? exc_debug_kernel+0xd2/0x160\n   ? report_bug+0x175/0x1a0\n   ? handle_bug+0x44/0x90\n   ? exc_invalid_op+0x1c/0x70\n   ? asm_exc_invalid_op+0x1f/0x30\n   ? exc_debug_kernel+0xd2/0x160\n   exc_debug+0x43/0x50\n   asm_exc_debug+0x1e/0x40\n  RIP: 0010:clear_bhb_loop+0x0/0xb0\n  ...\n  </#DB>\n  <TASK>\n   ? entry_SYSENTER_compat_after_hwframe+0x6e/0x8d\n  </TASK>\n\n  [ bp: Massage commit message. ]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42240",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/08518d48e5b744620524f0acd7c26c19bda7f513",
            "patch_url": "https://git.kernel.org/stable/p/08518d48e5b744620524f0acd7c26c19bda7f513",
            "filename": "CVE-2024-42240-08518d48e5b744620524f0acd7c26c19bda7f513.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42240/CVE-2024-42240-08518d48e5b744620524f0acd7c26c19bda7f513.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/08518d48e5b744620524f0acd7c26c19bda7f513",
                "patch_url": "https://git.kernel.org/stable/p/08518d48e5b744620524f0acd7c26c19bda7f513",
                "filename": "CVE-2024-42240-08518d48e5b744620524f0acd7c26c19bda7f513.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42240/CVE-2024-42240-08518d48e5b744620524f0acd7c26c19bda7f513.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a765679defe1dc1b8fa01928a6ad6361e72a1364",
                "patch_url": "https://git.kernel.org/stable/p/a765679defe1dc1b8fa01928a6ad6361e72a1364",
                "filename": "CVE-2024-42240-a765679defe1dc1b8fa01928a6ad6361e72a1364.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42240/CVE-2024-42240-a765679defe1dc1b8fa01928a6ad6361e72a1364.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ac8b270b61d48fcc61f052097777e3b5e11591e0",
                "patch_url": "https://git.kernel.org/stable/p/ac8b270b61d48fcc61f052097777e3b5e11591e0",
                "filename": "CVE-2024-42240-ac8b270b61d48fcc61f052097777e3b5e11591e0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42240/CVE-2024-42240-ac8b270b61d48fcc61f052097777e3b5e11591e0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dae3543db8f0cf8ac1a198c3bb4b6e3c24d576cf",
                "patch_url": "https://git.kernel.org/stable/p/dae3543db8f0cf8ac1a198c3bb4b6e3c24d576cf",
                "filename": "CVE-2024-42240-dae3543db8f0cf8ac1a198c3bb4b6e3c24d576cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42240/CVE-2024-42240-dae3543db8f0cf8ac1a198c3bb4b6e3c24d576cf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/db56615e96c439e13783d7715330e824b4fd4b84",
                "patch_url": "https://git.kernel.org/stable/p/db56615e96c439e13783d7715330e824b4fd4b84",
                "filename": "CVE-2024-42240-db56615e96c439e13783d7715330e824b4fd4b84.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42240/CVE-2024-42240-db56615e96c439e13783d7715330e824b4fd4b84.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/08518d48e5b744620524f0acd7c26c19bda7f513",
            "https://git.kernel.org/stable/c/a765679defe1dc1b8fa01928a6ad6361e72a1364",
            "https://git.kernel.org/stable/c/ac8b270b61d48fcc61f052097777e3b5e11591e0",
            "https://git.kernel.org/stable/c/dae3543db8f0cf8ac1a198c3bb4b6e3c24d576cf",
            "https://git.kernel.org/stable/c/db56615e96c439e13783d7715330e824b4fd4b84",
            "https://www.cve.org/CVERecord?id=CVE-2024-42240\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42240\nhttps://lore.kernel.org/linux-cve-announce/2024080741-CVE-2024-42240-3d04@gregkh/T"
        ]
    },
    "CVE-2024-42244": {
        "cve": "CVE-2024-42244",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: serial: mos7840: fix crash on resume\n\nSince commit c49cfa917025 (\"USB: serial: use generic method if no\nalternative is provided in usb serial layer\"), USB serial core calls the\ngeneric resume implementation when the driver has not provided one.\n\nThis can trigger a crash on resume with mos7840 since support for\nmultiple read URBs was added back in 2011. Specifically, both port read\nURBs are now submitted on resume for open ports, but the context pointer\nof the second URB is left set to the core rather than mos7840 port\nstructure.\n\nFix this by implementing dedicated suspend and resume functions for\nmos7840.\n\nTested with Delock 87414 USB 2.0 to 4x serial adapter.\n\n[ johan: analyse crash and rewrite commit message; set busy flag on\n         resume; drop bulk-in check; drop unnecessary usb_kill_urb() ]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42244",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/932a86a711c722b45ed47ba2103adca34d225b33",
            "patch_url": "https://git.kernel.org/stable/p/932a86a711c722b45ed47ba2103adca34d225b33",
            "filename": "CVE-2024-42244-932a86a711c722b45ed47ba2103adca34d225b33.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42244/CVE-2024-42244-932a86a711c722b45ed47ba2103adca34d225b33.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1094ed500987e67a9d18b0f95e1812f1cc720856",
                "patch_url": "https://git.kernel.org/stable/p/1094ed500987e67a9d18b0f95e1812f1cc720856",
                "filename": "CVE-2024-42244-1094ed500987e67a9d18b0f95e1812f1cc720856.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42244/CVE-2024-42244-1094ed500987e67a9d18b0f95e1812f1cc720856.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/553e67dec846323b5575e78a776cf594c13f98c4",
                "patch_url": "https://git.kernel.org/stable/p/553e67dec846323b5575e78a776cf594c13f98c4",
                "filename": "CVE-2024-42244-553e67dec846323b5575e78a776cf594c13f98c4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42244/CVE-2024-42244-553e67dec846323b5575e78a776cf594c13f98c4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5ae6a64f18211851c8df6b4221381c438b9a7348",
                "patch_url": "https://git.kernel.org/stable/p/5ae6a64f18211851c8df6b4221381c438b9a7348",
                "filename": "CVE-2024-42244-5ae6a64f18211851c8df6b4221381c438b9a7348.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42244/CVE-2024-42244-5ae6a64f18211851c8df6b4221381c438b9a7348.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/932a86a711c722b45ed47ba2103adca34d225b33",
                "patch_url": "https://git.kernel.org/stable/p/932a86a711c722b45ed47ba2103adca34d225b33",
                "filename": "CVE-2024-42244-932a86a711c722b45ed47ba2103adca34d225b33.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42244/CVE-2024-42244-932a86a711c722b45ed47ba2103adca34d225b33.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b14aa5673e0a8077ff4b74f0bb260735e7d5e6a4",
                "patch_url": "https://git.kernel.org/stable/p/b14aa5673e0a8077ff4b74f0bb260735e7d5e6a4",
                "filename": "CVE-2024-42244-b14aa5673e0a8077ff4b74f0bb260735e7d5e6a4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42244/CVE-2024-42244-b14aa5673e0a8077ff4b74f0bb260735e7d5e6a4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c15a688e49987385baa8804bf65d570e362f8576",
                "patch_url": "https://git.kernel.org/stable/p/c15a688e49987385baa8804bf65d570e362f8576",
                "filename": "CVE-2024-42244-c15a688e49987385baa8804bf65d570e362f8576.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42244/CVE-2024-42244-c15a688e49987385baa8804bf65d570e362f8576.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1094ed500987e67a9d18b0f95e1812f1cc720856",
            "https://git.kernel.org/stable/c/553e67dec846323b5575e78a776cf594c13f98c4",
            "https://git.kernel.org/stable/c/5ae6a64f18211851c8df6b4221381c438b9a7348",
            "https://git.kernel.org/stable/c/932a86a711c722b45ed47ba2103adca34d225b33",
            "https://git.kernel.org/stable/c/b14aa5673e0a8077ff4b74f0bb260735e7d5e6a4",
            "https://git.kernel.org/stable/c/c15a688e49987385baa8804bf65d570e362f8576",
            "https://www.cve.org/CVERecord?id=CVE-2024-42244\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42244\nhttps://lore.kernel.org/linux-cve-announce/2024080741-CVE-2024-42244-2346@gregkh/T"
        ]
    },
    "CVE-2024-42246": {
        "cve": "CVE-2024-42246",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket\n\nWhen using a BPF program on kernel_connect(), the call can return -EPERM. This\ncauses xs_tcp_setup_socket() to loop forever, filling up the syslog and causing\nthe kernel to potentially freeze up.\n\nNeil suggested:\n\n  This will propagate -EPERM up into other layers which might not be ready\n  to handle it. It might be safer to map EPERM to an error we would be more\n  likely to expect from the network system - such as ECONNREFUSED or ENETDOWN.\n\nECONNREFUSED as error seems reasonable. For programs setting a different error\ncan be out of reach (see handling in 4fbac77d2d09) in particular on kernels\nwhich do not have f10d05966196 (\"bpf: Make BPF_PROG_RUN_ARRAY return -err\ninstead of allow boolean\"), thus given that it is better to simply remap for\nconsistent behavior. UDP does handle EPERM in xs_udp_send_request().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42246",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/f2431e7db0fe0daccb2f06bb0d23740affcd2fa6",
            "patch_url": "https://git.kernel.org/stable/p/f2431e7db0fe0daccb2f06bb0d23740affcd2fa6",
            "filename": "CVE-2024-42246-f2431e7db0fe0daccb2f06bb0d23740affcd2fa6.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42246/CVE-2024-42246-f2431e7db0fe0daccb2f06bb0d23740affcd2fa6.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/02ee1976edb21a96ce8e3fd4ef563f14cc16d041",
                "patch_url": "https://git.kernel.org/stable/p/02ee1976edb21a96ce8e3fd4ef563f14cc16d041",
                "filename": "CVE-2024-42246-02ee1976edb21a96ce8e3fd4ef563f14cc16d041.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42246/CVE-2024-42246-02ee1976edb21a96ce8e3fd4ef563f14cc16d041.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5d8254e012996cee1a0f9cc920531cb7e4d9a011",
                "patch_url": "https://git.kernel.org/stable/p/5d8254e012996cee1a0f9cc920531cb7e4d9a011",
                "filename": "CVE-2024-42246-5d8254e012996cee1a0f9cc920531cb7e4d9a011.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42246/CVE-2024-42246-5d8254e012996cee1a0f9cc920531cb7e4d9a011.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/626dfed5fa3bfb41e0dffd796032b555b69f9cde",
                "patch_url": "https://git.kernel.org/stable/p/626dfed5fa3bfb41e0dffd796032b555b69f9cde",
                "filename": "CVE-2024-42246-626dfed5fa3bfb41e0dffd796032b555b69f9cde.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42246/CVE-2024-42246-626dfed5fa3bfb41e0dffd796032b555b69f9cde.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/934247ea65bc5eca8bdb7f8c0ddc15cef992a5d6",
                "patch_url": "https://git.kernel.org/stable/p/934247ea65bc5eca8bdb7f8c0ddc15cef992a5d6",
                "filename": "CVE-2024-42246-934247ea65bc5eca8bdb7f8c0ddc15cef992a5d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42246/CVE-2024-42246-934247ea65bc5eca8bdb7f8c0ddc15cef992a5d6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bc790261218952635f846aaf90bcc0974f6f62c6",
                "patch_url": "https://git.kernel.org/stable/p/bc790261218952635f846aaf90bcc0974f6f62c6",
                "filename": "CVE-2024-42246-bc790261218952635f846aaf90bcc0974f6f62c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42246/CVE-2024-42246-bc790261218952635f846aaf90bcc0974f6f62c6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d6c686c01c5f12ff8f7264e0ddf71df6cb0d4414",
                "patch_url": "https://git.kernel.org/stable/p/d6c686c01c5f12ff8f7264e0ddf71df6cb0d4414",
                "filename": "CVE-2024-42246-d6c686c01c5f12ff8f7264e0ddf71df6cb0d4414.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42246/CVE-2024-42246-d6c686c01c5f12ff8f7264e0ddf71df6cb0d4414.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f2431e7db0fe0daccb2f06bb0d23740affcd2fa6",
                "patch_url": "https://git.kernel.org/stable/p/f2431e7db0fe0daccb2f06bb0d23740affcd2fa6",
                "filename": "CVE-2024-42246-f2431e7db0fe0daccb2f06bb0d23740affcd2fa6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42246/CVE-2024-42246-f2431e7db0fe0daccb2f06bb0d23740affcd2fa6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f388cfd913a2b96c05339a335f365795db1b36b6",
                "patch_url": "https://git.kernel.org/stable/p/f388cfd913a2b96c05339a335f365795db1b36b6",
                "filename": "CVE-2024-42246-f388cfd913a2b96c05339a335f365795db1b36b6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42246/CVE-2024-42246-f388cfd913a2b96c05339a335f365795db1b36b6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/02ee1976edb21a96ce8e3fd4ef563f14cc16d041",
            "https://git.kernel.org/stable/c/5d8254e012996cee1a0f9cc920531cb7e4d9a011",
            "https://git.kernel.org/stable/c/626dfed5fa3bfb41e0dffd796032b555b69f9cde",
            "https://git.kernel.org/stable/c/934247ea65bc5eca8bdb7f8c0ddc15cef992a5d6",
            "https://git.kernel.org/stable/c/bc790261218952635f846aaf90bcc0974f6f62c6",
            "https://git.kernel.org/stable/c/d6c686c01c5f12ff8f7264e0ddf71df6cb0d4414",
            "https://git.kernel.org/stable/c/f2431e7db0fe0daccb2f06bb0d23740affcd2fa6",
            "https://git.kernel.org/stable/c/f388cfd913a2b96c05339a335f365795db1b36b6",
            "https://www.cve.org/CVERecord?id=CVE-2024-42246\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42246\nhttps://lore.kernel.org/linux-cve-announce/2024080742-CVE-2024-42246-0777@gregkh/T"
        ]
    },
    "CVE-2024-42265": {
        "cve": "CVE-2024-42265",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nprotect the fetch of ->fd[fd] in do_dup2() from mispredictions\n\nboth callers have verified that fd is not greater than ->max_fds;\nhowever, misprediction might end up with\n        tofree = fdt->fd[fd];\nbeing speculatively executed.  That's wrong for the same reasons\nwhy it's wrong in close_fd()/file_close_fd_locked(); the same\nsolution applies - array_index_nospec(fd, fdt->max_fds) could differ\nfrom fd only in case of speculative execution on mispredicted path.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42265",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/08775b3d6ed117cf4518754ec7300ee42b6a5368",
            "patch_url": "https://git.kernel.org/stable/p/08775b3d6ed117cf4518754ec7300ee42b6a5368",
            "filename": "CVE-2024-42265-08775b3d6ed117cf4518754ec7300ee42b6a5368.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42265/CVE-2024-42265-08775b3d6ed117cf4518754ec7300ee42b6a5368.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/08775b3d6ed117cf4518754ec7300ee42b6a5368",
                "patch_url": "https://git.kernel.org/stable/p/08775b3d6ed117cf4518754ec7300ee42b6a5368",
                "filename": "CVE-2024-42265-08775b3d6ed117cf4518754ec7300ee42b6a5368.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42265/CVE-2024-42265-08775b3d6ed117cf4518754ec7300ee42b6a5368.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1171ceccabfd596ca370c5d2cbb47d110c3f2fe1",
                "patch_url": "https://git.kernel.org/stable/p/1171ceccabfd596ca370c5d2cbb47d110c3f2fe1",
                "filename": "CVE-2024-42265-1171ceccabfd596ca370c5d2cbb47d110c3f2fe1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42265/CVE-2024-42265-1171ceccabfd596ca370c5d2cbb47d110c3f2fe1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3f480493550b6a23d3a65d095d6569d4a7f56a0f",
                "patch_url": "https://git.kernel.org/stable/p/3f480493550b6a23d3a65d095d6569d4a7f56a0f",
                "filename": "CVE-2024-42265-3f480493550b6a23d3a65d095d6569d4a7f56a0f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42265/CVE-2024-42265-3f480493550b6a23d3a65d095d6569d4a7f56a0f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/41a6c31df77bd8e050136b0a200b537da9e1084a",
                "patch_url": "https://git.kernel.org/stable/p/41a6c31df77bd8e050136b0a200b537da9e1084a",
                "filename": "CVE-2024-42265-41a6c31df77bd8e050136b0a200b537da9e1084a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42265/CVE-2024-42265-41a6c31df77bd8e050136b0a200b537da9e1084a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5db999fff545b924b24c9afd368ef5c17279b176",
                "patch_url": "https://git.kernel.org/stable/p/5db999fff545b924b24c9afd368ef5c17279b176",
                "filename": "CVE-2024-42265-5db999fff545b924b24c9afd368ef5c17279b176.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42265/CVE-2024-42265-5db999fff545b924b24c9afd368ef5c17279b176.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8aa37bde1a7b645816cda8b80df4753ecf172bf1",
                "patch_url": "https://git.kernel.org/stable/p/8aa37bde1a7b645816cda8b80df4753ecf172bf1",
                "filename": "CVE-2024-42265-8aa37bde1a7b645816cda8b80df4753ecf172bf1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42265/CVE-2024-42265-8aa37bde1a7b645816cda8b80df4753ecf172bf1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/da72e783afd27d9f487836b2e6738146c0edd149",
                "patch_url": "https://git.kernel.org/stable/p/da72e783afd27d9f487836b2e6738146c0edd149",
                "filename": "CVE-2024-42265-da72e783afd27d9f487836b2e6738146c0edd149.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42265/CVE-2024-42265-da72e783afd27d9f487836b2e6738146c0edd149.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ed42e8ff509d2a61c6642d1825032072dab79f26",
                "patch_url": "https://git.kernel.org/stable/p/ed42e8ff509d2a61c6642d1825032072dab79f26",
                "filename": "CVE-2024-42265-ed42e8ff509d2a61c6642d1825032072dab79f26.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42265/CVE-2024-42265-ed42e8ff509d2a61c6642d1825032072dab79f26.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/08775b3d6ed117cf4518754ec7300ee42b6a5368",
            "https://git.kernel.org/stable/c/1171ceccabfd596ca370c5d2cbb47d110c3f2fe1",
            "https://git.kernel.org/stable/c/3f480493550b6a23d3a65d095d6569d4a7f56a0f",
            "https://git.kernel.org/stable/c/41a6c31df77bd8e050136b0a200b537da9e1084a",
            "https://git.kernel.org/stable/c/5db999fff545b924b24c9afd368ef5c17279b176",
            "https://git.kernel.org/stable/c/8aa37bde1a7b645816cda8b80df4753ecf172bf1",
            "https://git.kernel.org/stable/c/da72e783afd27d9f487836b2e6738146c0edd149",
            "https://git.kernel.org/stable/c/ed42e8ff509d2a61c6642d1825032072dab79f26",
            "https://www.cve.org/CVERecord?id=CVE-2024-42265\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42265\nhttps://lore.kernel.org/linux-cve-announce/2024081737-CVE-2024-42265-a943@gregkh/T"
        ]
    },
    "CVE-2024-42284": {
        "cve": "CVE-2024-42284",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Return non-zero value from tipc_udp_addr2str() on error\n\ntipc_udp_addr2str() should return non-zero value if the UDP media\naddress is invalid. Otherwise, a buffer overflow access can occur in\ntipc_media_addr_printf(). Fix this by returning 1 on an invalid UDP\nmedia address.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42284",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/aa38bf74899de07cf70b50cd17f8ad45fb6654c8",
            "patch_url": "https://git.kernel.org/stable/p/aa38bf74899de07cf70b50cd17f8ad45fb6654c8",
            "filename": "CVE-2024-42284-aa38bf74899de07cf70b50cd17f8ad45fb6654c8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42284/CVE-2024-42284-aa38bf74899de07cf70b50cd17f8ad45fb6654c8.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/253405541be2f15ffebdeac2f4cf4b7e9144d12f",
                "patch_url": "https://git.kernel.org/stable/p/253405541be2f15ffebdeac2f4cf4b7e9144d12f",
                "filename": "CVE-2024-42284-253405541be2f15ffebdeac2f4cf4b7e9144d12f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42284/CVE-2024-42284-253405541be2f15ffebdeac2f4cf4b7e9144d12f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2abe350db1aa599eeebc6892237d0bce0f1de62a",
                "patch_url": "https://git.kernel.org/stable/p/2abe350db1aa599eeebc6892237d0bce0f1de62a",
                "filename": "CVE-2024-42284-2abe350db1aa599eeebc6892237d0bce0f1de62a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42284/CVE-2024-42284-2abe350db1aa599eeebc6892237d0bce0f1de62a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5eea127675450583680c8170358bcba43227bd69",
                "patch_url": "https://git.kernel.org/stable/p/5eea127675450583680c8170358bcba43227bd69",
                "filename": "CVE-2024-42284-5eea127675450583680c8170358bcba43227bd69.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42284/CVE-2024-42284-5eea127675450583680c8170358bcba43227bd69.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/728734352743a78b4c5a7285b282127696a4a813",
                "patch_url": "https://git.kernel.org/stable/p/728734352743a78b4c5a7285b282127696a4a813",
                "filename": "CVE-2024-42284-728734352743a78b4c5a7285b282127696a4a813.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42284/CVE-2024-42284-728734352743a78b4c5a7285b282127696a4a813.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/76ddf84a52f0d8ec3f5db6ccce08faf202a17d28",
                "patch_url": "https://git.kernel.org/stable/p/76ddf84a52f0d8ec3f5db6ccce08faf202a17d28",
                "filename": "CVE-2024-42284-76ddf84a52f0d8ec3f5db6ccce08faf202a17d28.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42284/CVE-2024-42284-76ddf84a52f0d8ec3f5db6ccce08faf202a17d28.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7ec3335dd89c8d169e9650e4bac64fde71fdf15b",
                "patch_url": "https://git.kernel.org/stable/p/7ec3335dd89c8d169e9650e4bac64fde71fdf15b",
                "filename": "CVE-2024-42284-7ec3335dd89c8d169e9650e4bac64fde71fdf15b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42284/CVE-2024-42284-7ec3335dd89c8d169e9650e4bac64fde71fdf15b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aa38bf74899de07cf70b50cd17f8ad45fb6654c8",
                "patch_url": "https://git.kernel.org/stable/p/aa38bf74899de07cf70b50cd17f8ad45fb6654c8",
                "filename": "CVE-2024-42284-aa38bf74899de07cf70b50cd17f8ad45fb6654c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42284/CVE-2024-42284-aa38bf74899de07cf70b50cd17f8ad45fb6654c8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fa96c6baef1b5385e2f0c0677b32b3839e716076",
                "patch_url": "https://git.kernel.org/stable/p/fa96c6baef1b5385e2f0c0677b32b3839e716076",
                "filename": "CVE-2024-42284-fa96c6baef1b5385e2f0c0677b32b3839e716076.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42284/CVE-2024-42284-fa96c6baef1b5385e2f0c0677b32b3839e716076.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/253405541be2f15ffebdeac2f4cf4b7e9144d12f",
            "https://git.kernel.org/stable/c/2abe350db1aa599eeebc6892237d0bce0f1de62a",
            "https://git.kernel.org/stable/c/5eea127675450583680c8170358bcba43227bd69",
            "https://git.kernel.org/stable/c/728734352743a78b4c5a7285b282127696a4a813",
            "https://git.kernel.org/stable/c/76ddf84a52f0d8ec3f5db6ccce08faf202a17d28",
            "https://git.kernel.org/stable/c/7ec3335dd89c8d169e9650e4bac64fde71fdf15b",
            "https://git.kernel.org/stable/c/aa38bf74899de07cf70b50cd17f8ad45fb6654c8",
            "https://git.kernel.org/stable/c/fa96c6baef1b5385e2f0c0677b32b3839e716076",
            "https://www.cve.org/CVERecord?id=CVE-2024-42284\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42284\nhttps://lore.kernel.org/linux-cve-announce/2024081743-CVE-2024-42284-bbfa@gregkh/T"
        ]
    },
    "CVE-2024-42292": {
        "cve": "CVE-2024-42292",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nkobject_uevent: Fix OOB access within zap_modalias_env()\n\nzap_modalias_env() wrongly calculates size of memory block to move, so\nwill cause OOB memory access issue if variable MODALIAS is not the last\none within its @env parameter, fixed by correcting size to memmove.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42292",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/81a15d28f32af01493ae8c5457e0d55314a4167d",
            "patch_url": "https://git.kernel.org/stable/p/81a15d28f32af01493ae8c5457e0d55314a4167d",
            "filename": "CVE-2024-42292-81a15d28f32af01493ae8c5457e0d55314a4167d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42292/CVE-2024-42292-81a15d28f32af01493ae8c5457e0d55314a4167d.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/57fe01d3d04276875c7e3a6dc763517fc05b8762",
                "patch_url": "https://git.kernel.org/stable/p/57fe01d3d04276875c7e3a6dc763517fc05b8762",
                "filename": "CVE-2024-42292-57fe01d3d04276875c7e3a6dc763517fc05b8762.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42292/CVE-2024-42292-57fe01d3d04276875c7e3a6dc763517fc05b8762.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/648d5490460d38436640da0812bf7f6351c150d2",
                "patch_url": "https://git.kernel.org/stable/p/648d5490460d38436640da0812bf7f6351c150d2",
                "filename": "CVE-2024-42292-648d5490460d38436640da0812bf7f6351c150d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42292/CVE-2024-42292-648d5490460d38436640da0812bf7f6351c150d2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/68d63ace80b76395e7935687ecdb86421adc2168",
                "patch_url": "https://git.kernel.org/stable/p/68d63ace80b76395e7935687ecdb86421adc2168",
                "filename": "CVE-2024-42292-68d63ace80b76395e7935687ecdb86421adc2168.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42292/CVE-2024-42292-68d63ace80b76395e7935687ecdb86421adc2168.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/81a15d28f32af01493ae8c5457e0d55314a4167d",
                "patch_url": "https://git.kernel.org/stable/p/81a15d28f32af01493ae8c5457e0d55314a4167d",
                "filename": "CVE-2024-42292-81a15d28f32af01493ae8c5457e0d55314a4167d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42292/CVE-2024-42292-81a15d28f32af01493ae8c5457e0d55314a4167d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b59a5e86a3934f1b6a5bd1368902dbc79bdecc90",
                "patch_url": "https://git.kernel.org/stable/p/b59a5e86a3934f1b6a5bd1368902dbc79bdecc90",
                "filename": "CVE-2024-42292-b59a5e86a3934f1b6a5bd1368902dbc79bdecc90.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42292/CVE-2024-42292-b59a5e86a3934f1b6a5bd1368902dbc79bdecc90.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c5ee8adc8d98a49703320d13878ba2b923b142f5",
                "patch_url": "https://git.kernel.org/stable/p/c5ee8adc8d98a49703320d13878ba2b923b142f5",
                "filename": "CVE-2024-42292-c5ee8adc8d98a49703320d13878ba2b923b142f5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42292/CVE-2024-42292-c5ee8adc8d98a49703320d13878ba2b923b142f5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d4663536754defff75ff1eca0aaebc41da165a8d",
                "patch_url": "https://git.kernel.org/stable/p/d4663536754defff75ff1eca0aaebc41da165a8d",
                "filename": "CVE-2024-42292-d4663536754defff75ff1eca0aaebc41da165a8d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42292/CVE-2024-42292-d4663536754defff75ff1eca0aaebc41da165a8d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dd6e9894b451e7c85cceb8e9dc5432679a70e7dc",
                "patch_url": "https://git.kernel.org/stable/p/dd6e9894b451e7c85cceb8e9dc5432679a70e7dc",
                "filename": "CVE-2024-42292-dd6e9894b451e7c85cceb8e9dc5432679a70e7dc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42292/CVE-2024-42292-dd6e9894b451e7c85cceb8e9dc5432679a70e7dc.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/57fe01d3d04276875c7e3a6dc763517fc05b8762",
            "https://git.kernel.org/stable/c/648d5490460d38436640da0812bf7f6351c150d2",
            "https://git.kernel.org/stable/c/68d63ace80b76395e7935687ecdb86421adc2168",
            "https://git.kernel.org/stable/c/81a15d28f32af01493ae8c5457e0d55314a4167d",
            "https://git.kernel.org/stable/c/b59a5e86a3934f1b6a5bd1368902dbc79bdecc90",
            "https://git.kernel.org/stable/c/c5ee8adc8d98a49703320d13878ba2b923b142f5",
            "https://git.kernel.org/stable/c/d4663536754defff75ff1eca0aaebc41da165a8d",
            "https://git.kernel.org/stable/c/dd6e9894b451e7c85cceb8e9dc5432679a70e7dc",
            "https://www.cve.org/CVERecord?id=CVE-2024-42292\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42292\nhttps://lore.kernel.org/linux-cve-announce/2024081746-CVE-2024-42292-5387@gregkh/T"
        ]
    },
    "CVE-2024-42301": {
        "cve": "CVE-2024-42301",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndev/parport: fix the array out-of-bounds risk\n\nFixed array out-of-bounds issues caused by sprintf\nby replacing it with snprintf for safer data copying,\nensuring the destination buffer is not overflowed.\n\nBelow is the stack trace I encountered during the actual issue:\n\n[ 66.575408s] [pid:5118,cpu4,QThread,4]Kernel panic - not syncing: stack-protector:\nKernel stack is corrupted in: do_hardware_base_addr+0xcc/0xd0 [parport]\n[ 66.575408s] [pid:5118,cpu4,QThread,5]CPU: 4 PID: 5118 Comm:\nQThread Tainted: G S W O 5.10.97-arm64-desktop #7100.57021.2\n[ 66.575439s] [pid:5118,cpu4,QThread,6]TGID: 5087 Comm: EFileApp\n[ 66.575439s] [pid:5118,cpu4,QThread,7]Hardware name: HUAWEI HUAWEI QingYun\nPGUX-W515x-B081/SP1PANGUXM, BIOS 1.00.07 04/29/2024\n[ 66.575439s] [pid:5118,cpu4,QThread,8]Call trace:\n[ 66.575469s] [pid:5118,cpu4,QThread,9] dump_backtrace+0x0/0x1c0\n[ 66.575469s] [pid:5118,cpu4,QThread,0] show_stack+0x14/0x20\n[ 66.575469s] [pid:5118,cpu4,QThread,1] dump_stack+0xd4/0x10c\n[ 66.575500s] [pid:5118,cpu4,QThread,2] panic+0x1d8/0x3bc\n[ 66.575500s] [pid:5118,cpu4,QThread,3] __stack_chk_fail+0x2c/0x38\n[ 66.575500s] [pid:5118,cpu4,QThread,4] do_hardware_base_addr+0xcc/0xd0 [parport]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42301",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/166a0bddcc27de41fe13f861c8348e8e53e988c8",
            "patch_url": "https://git.kernel.org/stable/p/166a0bddcc27de41fe13f861c8348e8e53e988c8",
            "filename": "CVE-2024-42301-166a0bddcc27de41fe13f861c8348e8e53e988c8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42301/CVE-2024-42301-166a0bddcc27de41fe13f861c8348e8e53e988c8.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/166a0bddcc27de41fe13f861c8348e8e53e988c8",
                "patch_url": "https://git.kernel.org/stable/p/166a0bddcc27de41fe13f861c8348e8e53e988c8",
                "filename": "CVE-2024-42301-166a0bddcc27de41fe13f861c8348e8e53e988c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42301/CVE-2024-42301-166a0bddcc27de41fe13f861c8348e8e53e988c8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/47b3dce100778001cd76f7e9188944b5cb27a76d",
                "patch_url": "https://git.kernel.org/stable/p/47b3dce100778001cd76f7e9188944b5cb27a76d",
                "filename": "CVE-2024-42301-47b3dce100778001cd76f7e9188944b5cb27a76d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42301/CVE-2024-42301-47b3dce100778001cd76f7e9188944b5cb27a76d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7789a1d6792af410aa9b39a1eb237ed24fa2170a",
                "patch_url": "https://git.kernel.org/stable/p/7789a1d6792af410aa9b39a1eb237ed24fa2170a",
                "filename": "CVE-2024-42301-7789a1d6792af410aa9b39a1eb237ed24fa2170a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42301/CVE-2024-42301-7789a1d6792af410aa9b39a1eb237ed24fa2170a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7f4da759092a1a6ce35fb085182d02de8cc4cc84",
                "patch_url": "https://git.kernel.org/stable/p/7f4da759092a1a6ce35fb085182d02de8cc4cc84",
                "filename": "CVE-2024-42301-7f4da759092a1a6ce35fb085182d02de8cc4cc84.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42301/CVE-2024-42301-7f4da759092a1a6ce35fb085182d02de8cc4cc84.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a44f88f7576bc1916d8d6293f5c62fbe7cbe03e0",
                "patch_url": "https://git.kernel.org/stable/p/a44f88f7576bc1916d8d6293f5c62fbe7cbe03e0",
                "filename": "CVE-2024-42301-a44f88f7576bc1916d8d6293f5c62fbe7cbe03e0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42301/CVE-2024-42301-a44f88f7576bc1916d8d6293f5c62fbe7cbe03e0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ab11dac93d2d568d151b1918d7b84c2d02bacbd5",
                "patch_url": "https://git.kernel.org/stable/p/ab11dac93d2d568d151b1918d7b84c2d02bacbd5",
                "filename": "CVE-2024-42301-ab11dac93d2d568d151b1918d7b84c2d02bacbd5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42301/CVE-2024-42301-ab11dac93d2d568d151b1918d7b84c2d02bacbd5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b579ea3516c371ecf59d073772bc45dfd28c8a0e",
                "patch_url": "https://git.kernel.org/stable/p/b579ea3516c371ecf59d073772bc45dfd28c8a0e",
                "filename": "CVE-2024-42301-b579ea3516c371ecf59d073772bc45dfd28c8a0e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42301/CVE-2024-42301-b579ea3516c371ecf59d073772bc45dfd28c8a0e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c719b393374d3763e64900ee19aaed767d5a08d6",
                "patch_url": "https://git.kernel.org/stable/p/c719b393374d3763e64900ee19aaed767d5a08d6",
                "filename": "CVE-2024-42301-c719b393374d3763e64900ee19aaed767d5a08d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42301/CVE-2024-42301-c719b393374d3763e64900ee19aaed767d5a08d6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/166a0bddcc27de41fe13f861c8348e8e53e988c8",
            "https://git.kernel.org/stable/c/47b3dce100778001cd76f7e9188944b5cb27a76d",
            "https://git.kernel.org/stable/c/7789a1d6792af410aa9b39a1eb237ed24fa2170a",
            "https://git.kernel.org/stable/c/7f4da759092a1a6ce35fb085182d02de8cc4cc84",
            "https://git.kernel.org/stable/c/a44f88f7576bc1916d8d6293f5c62fbe7cbe03e0",
            "https://git.kernel.org/stable/c/ab11dac93d2d568d151b1918d7b84c2d02bacbd5",
            "https://git.kernel.org/stable/c/b579ea3516c371ecf59d073772bc45dfd28c8a0e",
            "https://git.kernel.org/stable/c/c719b393374d3763e64900ee19aaed767d5a08d6",
            "https://www.cve.org/CVERecord?id=CVE-2024-42301\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42301\nhttps://lore.kernel.org/linux-cve-announce/2024081749-CVE-2024-42301-4026@gregkh/T"
        ]
    },
    "CVE-2024-42322": {
        "cve": "CVE-2024-42322",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: properly dereference pe in ip_vs_add_service\n\nUse pe directly to resolve sparse warning:\n\n  net/netfilter/ipvs/ip_vs_ctl.c:1471:27: warning: dereference of noderef expression",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-42322",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/b2c664df3bb46aabac6a5fd78aaa5bd614cfad97",
            "patch_url": "https://git.kernel.org/stable/p/b2c664df3bb46aabac6a5fd78aaa5bd614cfad97",
            "filename": "CVE-2024-42322-b2c664df3bb46aabac6a5fd78aaa5bd614cfad97.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42322/CVE-2024-42322-b2c664df3bb46aabac6a5fd78aaa5bd614cfad97.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/211168339657f36f32fb597afd0e3ac82d726119",
                "patch_url": "https://git.kernel.org/stable/p/211168339657f36f32fb597afd0e3ac82d726119",
                "filename": "CVE-2024-42322-211168339657f36f32fb597afd0e3ac82d726119.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42322/CVE-2024-42322-211168339657f36f32fb597afd0e3ac82d726119.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/36c997f1e03601475ad0fda0e0f59b7a209e756b",
                "patch_url": "https://git.kernel.org/stable/p/36c997f1e03601475ad0fda0e0f59b7a209e756b",
                "filename": "CVE-2024-42322-36c997f1e03601475ad0fda0e0f59b7a209e756b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42322/CVE-2024-42322-36c997f1e03601475ad0fda0e0f59b7a209e756b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3dd428039e06e1967ce294e2cd6342825aaaad77",
                "patch_url": "https://git.kernel.org/stable/p/3dd428039e06e1967ce294e2cd6342825aaaad77",
                "filename": "CVE-2024-42322-3dd428039e06e1967ce294e2cd6342825aaaad77.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42322/CVE-2024-42322-3dd428039e06e1967ce294e2cd6342825aaaad77.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b2c664df3bb46aabac6a5fd78aaa5bd614cfad97",
                "patch_url": "https://git.kernel.org/stable/p/b2c664df3bb46aabac6a5fd78aaa5bd614cfad97",
                "filename": "CVE-2024-42322-b2c664df3bb46aabac6a5fd78aaa5bd614cfad97.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42322/CVE-2024-42322-b2c664df3bb46aabac6a5fd78aaa5bd614cfad97.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c420cd5d5bc6797f3a8824e7d74f38f0c286fca5",
                "patch_url": "https://git.kernel.org/stable/p/c420cd5d5bc6797f3a8824e7d74f38f0c286fca5",
                "filename": "CVE-2024-42322-c420cd5d5bc6797f3a8824e7d74f38f0c286fca5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42322/CVE-2024-42322-c420cd5d5bc6797f3a8824e7d74f38f0c286fca5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cbd070a4ae62f119058973f6d2c984e325bce6e7",
                "patch_url": "https://git.kernel.org/stable/p/cbd070a4ae62f119058973f6d2c984e325bce6e7",
                "filename": "CVE-2024-42322-cbd070a4ae62f119058973f6d2c984e325bce6e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-42322/CVE-2024-42322-cbd070a4ae62f119058973f6d2c984e325bce6e7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/211168339657f36f32fb597afd0e3ac82d726119",
            "https://git.kernel.org/stable/c/36c997f1e03601475ad0fda0e0f59b7a209e756b",
            "https://git.kernel.org/stable/c/3dd428039e06e1967ce294e2cd6342825aaaad77",
            "https://git.kernel.org/stable/c/b2c664df3bb46aabac6a5fd78aaa5bd614cfad97",
            "https://git.kernel.org/stable/c/c420cd5d5bc6797f3a8824e7d74f38f0c286fca5",
            "https://git.kernel.org/stable/c/cbd070a4ae62f119058973f6d2c984e325bce6e7",
            "https://www.cve.org/CVERecord?id=CVE-2024-42322\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-42322\nhttps://lore.kernel.org/linux-cve-announce/2024081755-CVE-2024-42322-e2ef@gregkh/T"
        ]
    },
    "CVE-2024-43830": {
        "cve": "CVE-2024-43830",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nleds: trigger: Unregister sysfs attributes before calling deactivate()\n\nTriggers which have trigger specific sysfs attributes typically store\nrelated data in trigger-data allocated by the activate() callback and\nfreed by the deactivate() callback.\n\nCalling device_remove_groups() after calling deactivate() leaves a window\nwhere the sysfs attributes show/store functions could be called after\ndeactivation and then operate on the just freed trigger-data.\n\nMove the device_remove_groups() call to before deactivate() to close\nthis race window.\n\nThis also makes the deactivation path properly do things in reverse order\nof the activation path which calls the activate() callback before calling\ndevice_add_groups().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-43830",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/c3b7a650c8717aa89df318364609c86cbc040156",
            "patch_url": "https://git.kernel.org/stable/p/c3b7a650c8717aa89df318364609c86cbc040156",
            "filename": "CVE-2024-43830-c3b7a650c8717aa89df318364609c86cbc040156.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43830/CVE-2024-43830-c3b7a650c8717aa89df318364609c86cbc040156.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0788a6f3523d3686a9eed5ea1e6fcce6841277b2",
                "patch_url": "https://git.kernel.org/stable/p/0788a6f3523d3686a9eed5ea1e6fcce6841277b2",
                "filename": "CVE-2024-43830-0788a6f3523d3686a9eed5ea1e6fcce6841277b2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43830/CVE-2024-43830-0788a6f3523d3686a9eed5ea1e6fcce6841277b2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/09c1583f0e10c918855d6e7540a79461a353e5d6",
                "patch_url": "https://git.kernel.org/stable/p/09c1583f0e10c918855d6e7540a79461a353e5d6",
                "filename": "CVE-2024-43830-09c1583f0e10c918855d6e7540a79461a353e5d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43830/CVE-2024-43830-09c1583f0e10c918855d6e7540a79461a353e5d6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3fb6a9d67cfd812a547ac73ec02e1077c26c640d",
                "patch_url": "https://git.kernel.org/stable/p/3fb6a9d67cfd812a547ac73ec02e1077c26c640d",
                "filename": "CVE-2024-43830-3fb6a9d67cfd812a547ac73ec02e1077c26c640d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43830/CVE-2024-43830-3fb6a9d67cfd812a547ac73ec02e1077c26c640d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/734ba6437e80dfc780e9ee9d95f912392d12b5ea",
                "patch_url": "https://git.kernel.org/stable/p/734ba6437e80dfc780e9ee9d95f912392d12b5ea",
                "filename": "CVE-2024-43830-734ba6437e80dfc780e9ee9d95f912392d12b5ea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43830/CVE-2024-43830-734ba6437e80dfc780e9ee9d95f912392d12b5ea.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c0dc9adf9474ecb7106e60e5472577375aedaed3",
                "patch_url": "https://git.kernel.org/stable/p/c0dc9adf9474ecb7106e60e5472577375aedaed3",
                "filename": "CVE-2024-43830-c0dc9adf9474ecb7106e60e5472577375aedaed3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43830/CVE-2024-43830-c0dc9adf9474ecb7106e60e5472577375aedaed3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c3b7a650c8717aa89df318364609c86cbc040156",
                "patch_url": "https://git.kernel.org/stable/p/c3b7a650c8717aa89df318364609c86cbc040156",
                "filename": "CVE-2024-43830-c3b7a650c8717aa89df318364609c86cbc040156.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43830/CVE-2024-43830-c3b7a650c8717aa89df318364609c86cbc040156.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cb8aa9d2a4c8a15d6a43ccf901ef3d094aa60374",
                "patch_url": "https://git.kernel.org/stable/p/cb8aa9d2a4c8a15d6a43ccf901ef3d094aa60374",
                "filename": "CVE-2024-43830-cb8aa9d2a4c8a15d6a43ccf901ef3d094aa60374.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43830/CVE-2024-43830-cb8aa9d2a4c8a15d6a43ccf901ef3d094aa60374.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d1415125b701ef13370e2761f691ec632a5eb93a",
                "patch_url": "https://git.kernel.org/stable/p/d1415125b701ef13370e2761f691ec632a5eb93a",
                "filename": "CVE-2024-43830-d1415125b701ef13370e2761f691ec632a5eb93a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43830/CVE-2024-43830-d1415125b701ef13370e2761f691ec632a5eb93a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0788a6f3523d3686a9eed5ea1e6fcce6841277b2",
            "https://git.kernel.org/stable/c/09c1583f0e10c918855d6e7540a79461a353e5d6",
            "https://git.kernel.org/stable/c/3fb6a9d67cfd812a547ac73ec02e1077c26c640d",
            "https://git.kernel.org/stable/c/734ba6437e80dfc780e9ee9d95f912392d12b5ea",
            "https://git.kernel.org/stable/c/c0dc9adf9474ecb7106e60e5472577375aedaed3",
            "https://git.kernel.org/stable/c/c3b7a650c8717aa89df318364609c86cbc040156",
            "https://git.kernel.org/stable/c/cb8aa9d2a4c8a15d6a43ccf901ef3d094aa60374",
            "https://git.kernel.org/stable/c/d1415125b701ef13370e2761f691ec632a5eb93a",
            "https://www.cve.org/CVERecord?id=CVE-2024-43830\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-43830\nhttps://lore.kernel.org/linux-cve-announce/2024081727-CVE-2024-43830-3b85@gregkh/T"
        ]
    },
    "CVE-2024-43842": {
        "cve": "CVE-2024-43842",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()\n\nIn rtw89_sta_info_get_iter() 'status->he_gi' is compared to array size.\nBut then 'rate->he_gi' is used as array index instead of 'status->he_gi'.\nThis can lead to go beyond array boundaries in case of 'rate->he_gi' is\nnot equal to 'status->he_gi' and is bigger than array size. Looks like\n\"copy-paste\" mistake.\n\nFix this mistake by replacing 'rate->he_gi' with 'status->he_gi'.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-43842",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/a2a095c08b95372d6d0c5819b77f071af5e75366",
            "patch_url": "https://git.kernel.org/stable/p/a2a095c08b95372d6d0c5819b77f071af5e75366",
            "filename": "CVE-2024-43842-a2a095c08b95372d6d0c5819b77f071af5e75366.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43842/CVE-2024-43842-a2a095c08b95372d6d0c5819b77f071af5e75366.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/7a0edc3d83aff3a48813d78c9cad9daf38decc74",
                "patch_url": "https://git.kernel.org/stable/p/7a0edc3d83aff3a48813d78c9cad9daf38decc74",
                "filename": "CVE-2024-43842-7a0edc3d83aff3a48813d78c9cad9daf38decc74.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43842/CVE-2024-43842-7a0edc3d83aff3a48813d78c9cad9daf38decc74.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/85099c7ce4f9e64c66aa397cd9a37473637ab891",
                "patch_url": "https://git.kernel.org/stable/p/85099c7ce4f9e64c66aa397cd9a37473637ab891",
                "filename": "CVE-2024-43842-85099c7ce4f9e64c66aa397cd9a37473637ab891.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43842/CVE-2024-43842-85099c7ce4f9e64c66aa397cd9a37473637ab891.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/96ae4de5bc4c8ba39fd072369398f59495b73f58",
                "patch_url": "https://git.kernel.org/stable/p/96ae4de5bc4c8ba39fd072369398f59495b73f58",
                "filename": "CVE-2024-43842-96ae4de5bc4c8ba39fd072369398f59495b73f58.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43842/CVE-2024-43842-96ae4de5bc4c8ba39fd072369398f59495b73f58.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a2a095c08b95372d6d0c5819b77f071af5e75366",
                "patch_url": "https://git.kernel.org/stable/p/a2a095c08b95372d6d0c5819b77f071af5e75366",
                "filename": "CVE-2024-43842-a2a095c08b95372d6d0c5819b77f071af5e75366.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43842/CVE-2024-43842-a2a095c08b95372d6d0c5819b77f071af5e75366.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/7a0edc3d83aff3a48813d78c9cad9daf38decc74",
            "https://git.kernel.org/stable/c/85099c7ce4f9e64c66aa397cd9a37473637ab891",
            "https://git.kernel.org/stable/c/96ae4de5bc4c8ba39fd072369398f59495b73f58",
            "https://git.kernel.org/stable/c/a2a095c08b95372d6d0c5819b77f071af5e75366",
            "https://www.cve.org/CVERecord?id=CVE-2024-43842\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-43842\nhttps://lore.kernel.org/linux-cve-announce/2024081730-CVE-2024-43842-31e7@gregkh/T"
        ]
    },
    "CVE-2024-43854": {
        "cve": "CVE-2024-43854",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: initialize integrity buffer to zero before writing it to media\n\nMetadata added by bio_integrity_prep is using plain kmalloc, which leads\nto random kernel memory being written media.  For PI metadata this is\nlimited to the app tag that isn't used by kernel generated metadata,\nbut for non-PI metadata the entire buffer leaks kernel memory.\n\nFix this by adding the __GFP_ZERO flag to allocations for writes.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-43854",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9f4af4cf08f9a0329ade3d938f55d2220c40d0a6",
            "patch_url": "https://git.kernel.org/stable/p/9f4af4cf08f9a0329ade3d938f55d2220c40d0a6",
            "filename": "CVE-2024-43854-9f4af4cf08f9a0329ade3d938f55d2220c40d0a6.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43854/CVE-2024-43854-9f4af4cf08f9a0329ade3d938f55d2220c40d0a6.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/129f95948a96105c1fad8e612c9097763e88ac5f",
                "patch_url": "https://git.kernel.org/stable/p/129f95948a96105c1fad8e612c9097763e88ac5f",
                "filename": "CVE-2024-43854-129f95948a96105c1fad8e612c9097763e88ac5f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43854/CVE-2024-43854-129f95948a96105c1fad8e612c9097763e88ac5f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/23a19655fb56f241e592041156dfb1c6d04da644",
                "patch_url": "https://git.kernel.org/stable/p/23a19655fb56f241e592041156dfb1c6d04da644",
                "filename": "CVE-2024-43854-23a19655fb56f241e592041156dfb1c6d04da644.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43854/CVE-2024-43854-23a19655fb56f241e592041156dfb1c6d04da644.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3fd11fe4f20756b4c0847f755a64cd96f8c6a005",
                "patch_url": "https://git.kernel.org/stable/p/3fd11fe4f20756b4c0847f755a64cd96f8c6a005",
                "filename": "CVE-2024-43854-3fd11fe4f20756b4c0847f755a64cd96f8c6a005.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43854/CVE-2024-43854-3fd11fe4f20756b4c0847f755a64cd96f8c6a005.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/899ee2c3829c5ac14bfc7d3c4a5846c0b709b78f",
                "patch_url": "https://git.kernel.org/stable/p/899ee2c3829c5ac14bfc7d3c4a5846c0b709b78f",
                "filename": "CVE-2024-43854-899ee2c3829c5ac14bfc7d3c4a5846c0b709b78f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43854/CVE-2024-43854-899ee2c3829c5ac14bfc7d3c4a5846c0b709b78f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9f4af4cf08f9a0329ade3d938f55d2220c40d0a6",
                "patch_url": "https://git.kernel.org/stable/p/9f4af4cf08f9a0329ade3d938f55d2220c40d0a6",
                "filename": "CVE-2024-43854-9f4af4cf08f9a0329ade3d938f55d2220c40d0a6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43854/CVE-2024-43854-9f4af4cf08f9a0329ade3d938f55d2220c40d0a6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf6b45ea7a8df0f61bded1dc4a8561ac6ad143d2",
                "patch_url": "https://git.kernel.org/stable/p/cf6b45ea7a8df0f61bded1dc4a8561ac6ad143d2",
                "filename": "CVE-2024-43854-cf6b45ea7a8df0f61bded1dc4a8561ac6ad143d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43854/CVE-2024-43854-cf6b45ea7a8df0f61bded1dc4a8561ac6ad143d2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d418313bd8f55c079a7da12651951b489a638ac1",
                "patch_url": "https://git.kernel.org/stable/p/d418313bd8f55c079a7da12651951b489a638ac1",
                "filename": "CVE-2024-43854-d418313bd8f55c079a7da12651951b489a638ac1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43854/CVE-2024-43854-d418313bd8f55c079a7da12651951b489a638ac1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ebc0e91ba76dc6544fff9f5b66408b1982806a00",
                "patch_url": "https://git.kernel.org/stable/p/ebc0e91ba76dc6544fff9f5b66408b1982806a00",
                "filename": "CVE-2024-43854-ebc0e91ba76dc6544fff9f5b66408b1982806a00.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43854/CVE-2024-43854-ebc0e91ba76dc6544fff9f5b66408b1982806a00.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/129f95948a96105c1fad8e612c9097763e88ac5f",
            "https://git.kernel.org/stable/c/23a19655fb56f241e592041156dfb1c6d04da644",
            "https://git.kernel.org/stable/c/3fd11fe4f20756b4c0847f755a64cd96f8c6a005",
            "https://git.kernel.org/stable/c/899ee2c3829c5ac14bfc7d3c4a5846c0b709b78f",
            "https://git.kernel.org/stable/c/9f4af4cf08f9a0329ade3d938f55d2220c40d0a6",
            "https://git.kernel.org/stable/c/cf6b45ea7a8df0f61bded1dc4a8561ac6ad143d2",
            "https://git.kernel.org/stable/c/d418313bd8f55c079a7da12651951b489a638ac1",
            "https://git.kernel.org/stable/c/ebc0e91ba76dc6544fff9f5b66408b1982806a00",
            "https://www.cve.org/CVERecord?id=CVE-2024-43854\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-43854\nhttps://lore.kernel.org/linux-cve-announce/2024081734-CVE-2024-43854-5586@gregkh/T"
        ]
    },
    "CVE-2024-43871": {
        "cve": "CVE-2024-43871",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndevres: Fix memory leakage caused by driver API devm_free_percpu()\n\nIt will cause memory leakage when use driver API devm_free_percpu()\nto free memory allocated by devm_alloc_percpu(), fixed by using\ndevres_release() instead of devres_destroy() within devm_free_percpu().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-43871",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3047f99caec240a88ccd06197af2868da1af6a96",
            "patch_url": "https://git.kernel.org/stable/p/3047f99caec240a88ccd06197af2868da1af6a96",
            "filename": "CVE-2024-43871-3047f99caec240a88ccd06197af2868da1af6a96.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43871/CVE-2024-43871-3047f99caec240a88ccd06197af2868da1af6a96.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3047f99caec240a88ccd06197af2868da1af6a96",
                "patch_url": "https://git.kernel.org/stable/p/3047f99caec240a88ccd06197af2868da1af6a96",
                "filename": "CVE-2024-43871-3047f99caec240a88ccd06197af2868da1af6a96.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43871/CVE-2024-43871-3047f99caec240a88ccd06197af2868da1af6a96.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3dcd0673e47664bc6c719ad47dadac6d55d5950d",
                "patch_url": "https://git.kernel.org/stable/p/3dcd0673e47664bc6c719ad47dadac6d55d5950d",
                "filename": "CVE-2024-43871-3dcd0673e47664bc6c719ad47dadac6d55d5950d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43871/CVE-2024-43871-3dcd0673e47664bc6c719ad47dadac6d55d5950d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/700e8abd65b10792b2f179ce4e858f2ca2880f85",
                "patch_url": "https://git.kernel.org/stable/p/700e8abd65b10792b2f179ce4e858f2ca2880f85",
                "filename": "CVE-2024-43871-700e8abd65b10792b2f179ce4e858f2ca2880f85.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43871/CVE-2024-43871-700e8abd65b10792b2f179ce4e858f2ca2880f85.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/95065edb8ebb27771d5f1e898eef6ab43dc6c87c",
                "patch_url": "https://git.kernel.org/stable/p/95065edb8ebb27771d5f1e898eef6ab43dc6c87c",
                "filename": "CVE-2024-43871-95065edb8ebb27771d5f1e898eef6ab43dc6c87c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43871/CVE-2024-43871-95065edb8ebb27771d5f1e898eef6ab43dc6c87c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b044588a16a978cd891cb3d665dd7ae06850d5bf",
                "patch_url": "https://git.kernel.org/stable/p/b044588a16a978cd891cb3d665dd7ae06850d5bf",
                "filename": "CVE-2024-43871-b044588a16a978cd891cb3d665dd7ae06850d5bf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43871/CVE-2024-43871-b044588a16a978cd891cb3d665dd7ae06850d5bf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b67552d7c61f52f1271031adfa7834545ae99701",
                "patch_url": "https://git.kernel.org/stable/p/b67552d7c61f52f1271031adfa7834545ae99701",
                "filename": "CVE-2024-43871-b67552d7c61f52f1271031adfa7834545ae99701.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43871/CVE-2024-43871-b67552d7c61f52f1271031adfa7834545ae99701.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bd50a974097bb82d52a458bd3ee39fb723129a0c",
                "patch_url": "https://git.kernel.org/stable/p/bd50a974097bb82d52a458bd3ee39fb723129a0c",
                "filename": "CVE-2024-43871-bd50a974097bb82d52a458bd3ee39fb723129a0c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43871/CVE-2024-43871-bd50a974097bb82d52a458bd3ee39fb723129a0c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ef56dcdca8f2a53abc3a83d388b8336447533d85",
                "patch_url": "https://git.kernel.org/stable/p/ef56dcdca8f2a53abc3a83d388b8336447533d85",
                "filename": "CVE-2024-43871-ef56dcdca8f2a53abc3a83d388b8336447533d85.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43871/CVE-2024-43871-ef56dcdca8f2a53abc3a83d388b8336447533d85.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3047f99caec240a88ccd06197af2868da1af6a96",
            "https://git.kernel.org/stable/c/3dcd0673e47664bc6c719ad47dadac6d55d5950d",
            "https://git.kernel.org/stable/c/700e8abd65b10792b2f179ce4e858f2ca2880f85",
            "https://git.kernel.org/stable/c/95065edb8ebb27771d5f1e898eef6ab43dc6c87c",
            "https://git.kernel.org/stable/c/b044588a16a978cd891cb3d665dd7ae06850d5bf",
            "https://git.kernel.org/stable/c/b67552d7c61f52f1271031adfa7834545ae99701",
            "https://git.kernel.org/stable/c/bd50a974097bb82d52a458bd3ee39fb723129a0c",
            "https://git.kernel.org/stable/c/ef56dcdca8f2a53abc3a83d388b8336447533d85",
            "https://www.cve.org/CVERecord?id=CVE-2024-43871\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-43871\nhttps://lore.kernel.org/linux-cve-announce/2024082136-CVE-2024-43871-c2cd@gregkh/T"
        ]
    },
    "CVE-2024-43880": {
        "cve": "CVE-2024-43880",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_erp: Fix object nesting warning\n\nACLs in Spectrum-2 and newer ASICs can reside in the algorithmic TCAM\n(A-TCAM) or in the ordinary circuit TCAM (C-TCAM). The former can\ncontain more ACLs (i.e., tc filters), but the number of masks in each\nregion (i.e., tc chain) is limited.\n\nIn order to mitigate the effects of the above limitation, the device\nallows filters to share a single mask if their masks only differ in up\nto 8 consecutive bits. For example, dst_ip/25 can be represented using\ndst_ip/24 with a delta of 1 bit. The C-TCAM does not have a limit on the\nnumber of masks being used (and therefore does not support mask\naggregation), but can contain a limited number of filters.\n\nThe driver uses the \"objagg\" library to perform the mask aggregation by\npassing it objects that consist of the filter's mask and whether the\nfilter is to be inserted into the A-TCAM or the C-TCAM since filters in\ndifferent TCAMs cannot share a mask.\n\nThe set of created objects is dependent on the insertion order of the\nfilters and is not necessarily optimal. Therefore, the driver will\nperiodically ask the library to compute a more optimal set (\"hints\") by\nlooking at all the existing objects.\n\nWhen the library asks the driver whether two objects can be aggregated\nthe driver only compares the provided masks and ignores the A-TCAM /\nC-TCAM indication. This is the right thing to do since the goal is to\nmove as many filters as possible to the A-TCAM. The driver also forbids\ntwo identical masks from being aggregated since this can only happen if\none was intentionally put in the C-TCAM to avoid a conflict in the\nA-TCAM.\n\nThe above can result in the following set of hints:\n\nH1: {mask X, A-TCAM} -> H2: {mask Y, A-TCAM} // X is Y + delta\nH3: {mask Y, C-TCAM} -> H4: {mask Z, A-TCAM} // Y is Z + delta\n\nAfter getting the hints from the library the driver will start migrating\nfilters from one region to another while consulting the computed hints\nand instructing the device to perform a lookup in both regions during\nthe transition.\n\nAssuming a filter with mask X is being migrated into the A-TCAM in the\nnew region, the hints lookup will return H1. Since H2 is the parent of\nH1, the library will try to find the object associated with it and\ncreate it if necessary in which case another hints lookup (recursive)\nwill be performed. This hints lookup for {mask Y, A-TCAM} will either\nreturn H2 or H3 since the driver passes the library an object comparison\nfunction that ignores the A-TCAM / C-TCAM indication.\n\nThis can eventually lead to nested objects which are not supported by\nthe library [1].\n\nFix by removing the object comparison function from both the driver and\nthe library as the driver was the only user. That way the lookup will\nonly return exact matches.\n\nI do not have a reliable reproducer that can reproduce the issue in a\ntimely manner, but before the fix the issue would reproduce in several\nminutes and with the fix it does not reproduce in over an hour.\n\nNote that the current usefulness of the hints is limited because they\ninclude the C-TCAM indication and represent aggregation that cannot\nactually happen. This will be addressed in net-next.\n\n[1]\nWARNING: CPU: 0 PID: 153 at lib/objagg.c:170 objagg_obj_parent_assign+0xb5/0xd0\nModules linked in:\nCPU: 0 PID: 153 Comm: kworker/0:18 Not tainted 6.9.0-rc6-custom-g70fbc2c1c38b #42\nHardware name: Mellanox Technologies Ltd. MSN3700C/VMOD0008, BIOS 5.11 10/10/2018\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nRIP: 0010:objagg_obj_parent_assign+0xb5/0xd0\n[...]\nCall Trace:\n <TASK>\n __objagg_obj_get+0x2bb/0x580\n objagg_obj_get+0xe/0x80\n mlxsw_sp_acl_erp_mask_get+0xb5/0xf0\n mlxsw_sp_acl_atcam_entry_add+0xe8/0x3c0\n mlxsw_sp_acl_tcam_entry_create+0x5e/0xa0\n mlxsw_sp_acl_tcam_vchunk_migrate_one+0x16b/0x270\n mlxsw_sp_acl_tcam_vregion_rehash_work+0xbe/0x510\n process_one_work+0x151/0x370",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-43880",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/36a9996e020dd5aa325e0ecc55eb2328288ea6bb",
            "patch_url": "https://git.kernel.org/stable/p/36a9996e020dd5aa325e0ecc55eb2328288ea6bb",
            "filename": "CVE-2024-43880-36a9996e020dd5aa325e0ecc55eb2328288ea6bb.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43880/CVE-2024-43880-36a9996e020dd5aa325e0ecc55eb2328288ea6bb.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0e59c2d22853266704e127915653598f7f104037",
                "patch_url": "https://git.kernel.org/stable/p/0e59c2d22853266704e127915653598f7f104037",
                "filename": "CVE-2024-43880-0e59c2d22853266704e127915653598f7f104037.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43880/CVE-2024-43880-0e59c2d22853266704e127915653598f7f104037.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/25c6fd9648ad05da493a5d30881896a78a08b624",
                "patch_url": "https://git.kernel.org/stable/p/25c6fd9648ad05da493a5d30881896a78a08b624",
                "filename": "CVE-2024-43880-25c6fd9648ad05da493a5d30881896a78a08b624.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43880/CVE-2024-43880-25c6fd9648ad05da493a5d30881896a78a08b624.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/36a9996e020dd5aa325e0ecc55eb2328288ea6bb",
                "patch_url": "https://git.kernel.org/stable/p/36a9996e020dd5aa325e0ecc55eb2328288ea6bb",
                "filename": "CVE-2024-43880-36a9996e020dd5aa325e0ecc55eb2328288ea6bb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43880/CVE-2024-43880-36a9996e020dd5aa325e0ecc55eb2328288ea6bb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4dc09f6f260db3c4565a4ec52ba369393598f2fb",
                "patch_url": "https://git.kernel.org/stable/p/4dc09f6f260db3c4565a4ec52ba369393598f2fb",
                "filename": "CVE-2024-43880-4dc09f6f260db3c4565a4ec52ba369393598f2fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43880/CVE-2024-43880-4dc09f6f260db3c4565a4ec52ba369393598f2fb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/97d833ceb27dc19f8777d63f90be4a27b5daeedf",
                "patch_url": "https://git.kernel.org/stable/p/97d833ceb27dc19f8777d63f90be4a27b5daeedf",
                "filename": "CVE-2024-43880-97d833ceb27dc19f8777d63f90be4a27b5daeedf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43880/CVE-2024-43880-97d833ceb27dc19f8777d63f90be4a27b5daeedf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9a5261a984bba4f583d966c550fa72c33ff3714e",
                "patch_url": "https://git.kernel.org/stable/p/9a5261a984bba4f583d966c550fa72c33ff3714e",
                "filename": "CVE-2024-43880-9a5261a984bba4f583d966c550fa72c33ff3714e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43880/CVE-2024-43880-9a5261a984bba4f583d966c550fa72c33ff3714e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fb5d4fc578e655d113f09565f6f047e15f7ab578",
                "patch_url": "https://git.kernel.org/stable/p/fb5d4fc578e655d113f09565f6f047e15f7ab578",
                "filename": "CVE-2024-43880-fb5d4fc578e655d113f09565f6f047e15f7ab578.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43880/CVE-2024-43880-fb5d4fc578e655d113f09565f6f047e15f7ab578.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0e59c2d22853266704e127915653598f7f104037",
            "https://git.kernel.org/stable/c/25c6fd9648ad05da493a5d30881896a78a08b624",
            "https://git.kernel.org/stable/c/36a9996e020dd5aa325e0ecc55eb2328288ea6bb",
            "https://git.kernel.org/stable/c/4dc09f6f260db3c4565a4ec52ba369393598f2fb",
            "https://git.kernel.org/stable/c/97d833ceb27dc19f8777d63f90be4a27b5daeedf",
            "https://git.kernel.org/stable/c/9a5261a984bba4f583d966c550fa72c33ff3714e",
            "https://git.kernel.org/stable/c/fb5d4fc578e655d113f09565f6f047e15f7ab578",
            "https://www.cve.org/CVERecord?id=CVE-2024-43880\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-43880\nhttps://lore.kernel.org/linux-cve-announce/2024082137-CVE-2024-43880-78ec@gregkh/T"
        ]
    },
    "CVE-2024-43889": {
        "cve": "CVE-2024-43889",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: Fix possible divide-by-0 panic in padata_mt_helper()\n\nWe are hit with a not easily reproducible divide-by-0 panic in padata.c at\nbootup time.\n\n  [   10.017908] Oops: divide error: 0000 1 PREEMPT SMP NOPTI\n  [   10.017908] CPU: 26 PID: 2627 Comm: kworker/u1666:1 Not tainted 6.10.0-15.el10.x86_64 #1\n  [   10.017908] Hardware name: Lenovo ThinkSystem SR950 [7X12CTO1WW]/[7X12CTO1WW], BIOS [PSE140J-2.30] 07/20/2021\n  [   10.017908] Workqueue: events_unbound padata_mt_helper\n  [   10.017908] RIP: 0010:padata_mt_helper+0x39/0xb0\n    :\n  [   10.017963] Call Trace:\n  [   10.017968]  <TASK>\n  [   10.018004]  ? padata_mt_helper+0x39/0xb0\n  [   10.018084]  process_one_work+0x174/0x330\n  [   10.018093]  worker_thread+0x266/0x3a0\n  [   10.018111]  kthread+0xcf/0x100\n  [   10.018124]  ret_from_fork+0x31/0x50\n  [   10.018138]  ret_from_fork_asm+0x1a/0x30\n  [   10.018147]  </TASK>\n\nLooking at the padata_mt_helper() function, the only way a divide-by-0\npanic can happen is when ps->chunk_size is 0.  The way that chunk_size is\ninitialized in padata_do_multithreaded(), chunk_size can be 0 when the\nmin_chunk in the passed-in padata_mt_job structure is 0.\n\nFix this divide-by-0 panic by making sure that chunk_size will be at least\n1 no matter what the input parameters are.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-43889",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/ab8b397d5997d8c37610252528edc54bebf9f6d3",
            "patch_url": "https://git.kernel.org/stable/p/ab8b397d5997d8c37610252528edc54bebf9f6d3",
            "filename": "CVE-2024-43889-ab8b397d5997d8c37610252528edc54bebf9f6d3.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43889/CVE-2024-43889-ab8b397d5997d8c37610252528edc54bebf9f6d3.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/6d45e1c948a8b7ed6ceddb14319af69424db730c",
                "patch_url": "https://git.kernel.org/stable/p/6d45e1c948a8b7ed6ceddb14319af69424db730c",
                "filename": "CVE-2024-43889-6d45e1c948a8b7ed6ceddb14319af69424db730c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43889/CVE-2024-43889-6d45e1c948a8b7ed6ceddb14319af69424db730c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8f5ffd2af7274853ff91d6cd62541191d9fbd10d",
                "patch_url": "https://git.kernel.org/stable/p/8f5ffd2af7274853ff91d6cd62541191d9fbd10d",
                "filename": "CVE-2024-43889-8f5ffd2af7274853ff91d6cd62541191d9fbd10d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43889/CVE-2024-43889-8f5ffd2af7274853ff91d6cd62541191d9fbd10d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/924f788c906dccaca30acab86c7124371e1d6f2c",
                "patch_url": "https://git.kernel.org/stable/p/924f788c906dccaca30acab86c7124371e1d6f2c",
                "filename": "CVE-2024-43889-924f788c906dccaca30acab86c7124371e1d6f2c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43889/CVE-2024-43889-924f788c906dccaca30acab86c7124371e1d6f2c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a29cfcb848c31f22b4de6a531c3e1d68c9bfe09f",
                "patch_url": "https://git.kernel.org/stable/p/a29cfcb848c31f22b4de6a531c3e1d68c9bfe09f",
                "filename": "CVE-2024-43889-a29cfcb848c31f22b4de6a531c3e1d68c9bfe09f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43889/CVE-2024-43889-a29cfcb848c31f22b4de6a531c3e1d68c9bfe09f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ab8b397d5997d8c37610252528edc54bebf9f6d3",
                "patch_url": "https://git.kernel.org/stable/p/ab8b397d5997d8c37610252528edc54bebf9f6d3",
                "filename": "CVE-2024-43889-ab8b397d5997d8c37610252528edc54bebf9f6d3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43889/CVE-2024-43889-ab8b397d5997d8c37610252528edc54bebf9f6d3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/da0ffe84fcc1627a7dff82c80b823b94236af905",
                "patch_url": "https://git.kernel.org/stable/p/da0ffe84fcc1627a7dff82c80b823b94236af905",
                "filename": "CVE-2024-43889-da0ffe84fcc1627a7dff82c80b823b94236af905.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43889/CVE-2024-43889-da0ffe84fcc1627a7dff82c80b823b94236af905.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/6d45e1c948a8b7ed6ceddb14319af69424db730c",
            "https://git.kernel.org/stable/c/8f5ffd2af7274853ff91d6cd62541191d9fbd10d",
            "https://git.kernel.org/stable/c/924f788c906dccaca30acab86c7124371e1d6f2c",
            "https://git.kernel.org/stable/c/a29cfcb848c31f22b4de6a531c3e1d68c9bfe09f",
            "https://git.kernel.org/stable/c/ab8b397d5997d8c37610252528edc54bebf9f6d3",
            "https://git.kernel.org/stable/c/da0ffe84fcc1627a7dff82c80b823b94236af905",
            "https://www.cve.org/CVERecord?id=CVE-2024-43889\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-43889\nhttps://lore.kernel.org/linux-cve-announce/2024082600-CVE-2024-43889-4d0b@gregkh/T"
        ]
    },
    "CVE-2024-43892": {
        "cve": "CVE-2024-43892",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemcg: protect concurrent access to mem_cgroup_idr\n\nCommit 73f576c04b94 (\"mm: memcontrol: fix cgroup creation failure after\nmany small jobs\") decoupled the memcg IDs from the CSS ID space to fix the\ncgroup creation failures.  It introduced IDR to maintain the memcg ID\nspace.  The IDR depends on external synchronization mechanisms for\nmodifications.  For the mem_cgroup_idr, the idr_alloc() and idr_replace()\nhappen within css callback and thus are protected through cgroup_mutex\nfrom concurrent modifications.  However idr_remove() for mem_cgroup_idr\nwas not protected against concurrency and can be run concurrently for\ndifferent memcgs when they hit their refcnt to zero.  Fix that.\n\nWe have been seeing list_lru based kernel crashes at a low frequency in\nour fleet for a long time.  These crashes were in different part of\nlist_lru code including list_lru_add(), list_lru_del() and reparenting\ncode.  Upon further inspection, it looked like for a given object (dentry\nand inode), the super_block's list_lru didn't have list_lru_one for the\nmemcg of that object.  The initial suspicions were either the object is\nnot allocated through kmem_cache_alloc_lru() or somehow\nmemcg_list_lru_alloc() failed to allocate list_lru_one() for a memcg but\nreturned success.  No evidence were found for these cases.\n\nLooking more deeply, we started seeing situations where valid memcg's id\nis not present in mem_cgroup_idr and in some cases multiple valid memcgs\nhave same id and mem_cgroup_idr is pointing to one of them.  So, the most\nreasonable explanation is that these situations can happen due to race\nbetween multiple idr_remove() calls or race between\nidr_alloc()/idr_replace() and idr_remove().  These races are causing\nmultiple memcgs to acquire the same ID and then offlining of one of them\nwould cleanup list_lrus on the system for all of them.  Later access from\nother memcgs to the list_lru cause crashes due to missing list_lru_one.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-43892",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/912736a0435ef40e6a4ae78197ccb5553cb80b05",
            "patch_url": "https://git.kernel.org/stable/p/912736a0435ef40e6a4ae78197ccb5553cb80b05",
            "filename": "CVE-2024-43892-912736a0435ef40e6a4ae78197ccb5553cb80b05.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43892/CVE-2024-43892-912736a0435ef40e6a4ae78197ccb5553cb80b05.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/37a060b64ae83b76600d187d76591ce488ab836b",
                "patch_url": "https://git.kernel.org/stable/p/37a060b64ae83b76600d187d76591ce488ab836b",
                "filename": "CVE-2024-43892-37a060b64ae83b76600d187d76591ce488ab836b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43892/CVE-2024-43892-37a060b64ae83b76600d187d76591ce488ab836b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/51c0b1bb7541f8893ec1accba59eb04361a70946",
                "patch_url": "https://git.kernel.org/stable/p/51c0b1bb7541f8893ec1accba59eb04361a70946",
                "filename": "CVE-2024-43892-51c0b1bb7541f8893ec1accba59eb04361a70946.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43892/CVE-2024-43892-51c0b1bb7541f8893ec1accba59eb04361a70946.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/56fd70f4aa8b82199dbe7e99366b1fd7a04d86fb",
                "patch_url": "https://git.kernel.org/stable/p/56fd70f4aa8b82199dbe7e99366b1fd7a04d86fb",
                "filename": "CVE-2024-43892-56fd70f4aa8b82199dbe7e99366b1fd7a04d86fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43892/CVE-2024-43892-56fd70f4aa8b82199dbe7e99366b1fd7a04d86fb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/912736a0435ef40e6a4ae78197ccb5553cb80b05",
                "patch_url": "https://git.kernel.org/stable/p/912736a0435ef40e6a4ae78197ccb5553cb80b05",
                "filename": "CVE-2024-43892-912736a0435ef40e6a4ae78197ccb5553cb80b05.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43892/CVE-2024-43892-912736a0435ef40e6a4ae78197ccb5553cb80b05.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9972605a238339b85bd16b084eed5f18414d22db",
                "patch_url": "https://git.kernel.org/stable/p/9972605a238339b85bd16b084eed5f18414d22db",
                "filename": "CVE-2024-43892-9972605a238339b85bd16b084eed5f18414d22db.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43892/CVE-2024-43892-9972605a238339b85bd16b084eed5f18414d22db.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e6cc9ff2ac0b5df9f25eb790934c3104f6710278",
                "patch_url": "https://git.kernel.org/stable/p/e6cc9ff2ac0b5df9f25eb790934c3104f6710278",
                "filename": "CVE-2024-43892-e6cc9ff2ac0b5df9f25eb790934c3104f6710278.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-43892/CVE-2024-43892-e6cc9ff2ac0b5df9f25eb790934c3104f6710278.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/37a060b64ae83b76600d187d76591ce488ab836b",
            "https://git.kernel.org/stable/c/51c0b1bb7541f8893ec1accba59eb04361a70946",
            "https://git.kernel.org/stable/c/56fd70f4aa8b82199dbe7e99366b1fd7a04d86fb",
            "https://git.kernel.org/stable/c/912736a0435ef40e6a4ae78197ccb5553cb80b05",
            "https://git.kernel.org/stable/c/9972605a238339b85bd16b084eed5f18414d22db",
            "https://git.kernel.org/stable/c/e6cc9ff2ac0b5df9f25eb790934c3104f6710278",
            "https://www.cve.org/CVERecord?id=CVE-2024-43892\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-43892\nhttps://lore.kernel.org/linux-cve-announce/2024082604-CVE-2024-43892-584a@gregkh/T"
        ]
    },
    "CVE-2024-4418": {
        "cve": "CVE-2024-4418",
        "cvss_v2": null,
        "cvss_v3": 6.2,
        "description": "A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being \"freed\" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-4418",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-4467": {
        "cve": "CVE-2024-4467",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-4467",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-44935": {
        "cve": "CVE-2024-44935",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix null-ptr-deref in reuseport_add_sock().\n\nsyzbot reported a null-ptr-deref while accessing sk2->sk_reuseport_cb in\nreuseport_add_sock(). [0]\n\nThe repro first creates a listener with SO_REUSEPORT.  Then, it creates\nanother listener on the same port and concurrently closes the first\nlistener.\n\nThe second listen() calls reuseport_add_sock() with the first listener as\nsk2, where sk2->sk_reuseport_cb is not expected to be cleared concurrently,\nbut the close() does clear it by reuseport_detach_sock().\n\nThe problem is SCTP does not properly synchronise reuseport_alloc(),\nreuseport_add_sock(), and reuseport_detach_sock().\n\nThe caller of reuseport_alloc() and reuseport_{add,detach}_sock() must\nprovide synchronisation for sockets that are classified into the same\nreuseport group.\n\nOtherwise, such sockets form multiple identical reuseport groups, and\nall groups except one would be silently dead.\n\n  1. Two sockets call listen() concurrently\n  2. No socket in the same group found in sctp_ep_hashtable[]\n  3. Two sockets call reuseport_alloc() and form two reuseport groups\n  4. Only one group hit first in __sctp_rcv_lookup_endpoint() receives\n      incoming packets\n\nAlso, the reported null-ptr-deref could occur.\n\nTCP/UDP guarantees that would not happen by holding the hash bucket lock.\n\nLet's apply the locking strategy to __sctp_hash_endpoint() and\n__sctp_unhash_endpoint().\n\n[0]:\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\nCPU: 1 UID: 0 PID: 10230 Comm: syz-executor119 Not tainted 6.10.0-syzkaller-12585-g301927d2d2eb #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024\nRIP: 0010:reuseport_add_sock+0x27e/0x5e0 net/core/sock_reuseport.c:350\nCode: 00 0f b7 5d 00 bf 01 00 00 00 89 de e8 1b a4 ff f7 83 fb 01 0f 85 a3 01 00 00 e8 6d a0 ff f7 49 8d 7e 12 48 89 f8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 4b 02 00 00 41 0f b7 5e 12 49 8d 7e 14\nRSP: 0018:ffffc9000b947c98 EFLAGS: 00010202\nRAX: 0000000000000002 RBX: ffff8880252ddf98 RCX: ffff888079478000\nRDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000012\nRBP: 0000000000000001 R08: ffffffff8993e18d R09: 1ffffffff1fef385\nR10: dffffc0000000000 R11: fffffbfff1fef386 R12: ffff8880252ddac0\nR13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000\nFS:  00007f24e45b96c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffcced5f7b8 CR3: 00000000241be000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n __sctp_hash_endpoint net/sctp/input.c:762 [inline]\n sctp_hash_endpoint+0x52a/0x600 net/sctp/input.c:790\n sctp_listen_start net/sctp/socket.c:8570 [inline]\n sctp_inet_listen+0x767/0xa20 net/sctp/socket.c:8625\n __sys_listen_socket net/socket.c:1883 [inline]\n __sys_listen+0x1b7/0x230 net/socket.c:1894\n __do_sys_listen net/socket.c:1902 [inline]\n __se_sys_listen net/socket.c:1900 [inline]\n __x64_sys_listen+0x5a/0x70 net/socket.c:1900\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f24e46039b9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f24e45b9228 EFLAGS: 00000246 ORIG_RAX: 0000000000000032\nRAX: ffffffffffffffda RBX: 00007f24e468e428 RCX: 00007f24e46039b9\nRDX: 00007f24e46039b9 RSI: 0000000000000003 RDI: 0000000000000004\nRBP: 00007f24e468e420 R08: 00007f24e45b96c0 R09: 00007f24e45b96c0\nR10: 00007f24e45b96c0 R11: 0000000000000246 R12: 00007f24e468e42c\nR13:\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-44935",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/05e4a0fa248240efd99a539853e844f0f0a9e6a5",
            "patch_url": "https://git.kernel.org/stable/p/05e4a0fa248240efd99a539853e844f0f0a9e6a5",
            "filename": "CVE-2024-44935-05e4a0fa248240efd99a539853e844f0f0a9e6a5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44935/CVE-2024-44935-05e4a0fa248240efd99a539853e844f0f0a9e6a5.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/05e4a0fa248240efd99a539853e844f0f0a9e6a5",
                "patch_url": "https://git.kernel.org/stable/p/05e4a0fa248240efd99a539853e844f0f0a9e6a5",
                "filename": "CVE-2024-44935-05e4a0fa248240efd99a539853e844f0f0a9e6a5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44935/CVE-2024-44935-05e4a0fa248240efd99a539853e844f0f0a9e6a5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1407be30fc17eff918a98e0a990c0e988f11dc84",
                "patch_url": "https://git.kernel.org/stable/p/1407be30fc17eff918a98e0a990c0e988f11dc84",
                "filename": "CVE-2024-44935-1407be30fc17eff918a98e0a990c0e988f11dc84.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44935/CVE-2024-44935-1407be30fc17eff918a98e0a990c0e988f11dc84.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/52319d9d2f522ed939af31af70f8c3a0f0f67e6c",
                "patch_url": "https://git.kernel.org/stable/p/52319d9d2f522ed939af31af70f8c3a0f0f67e6c",
                "filename": "CVE-2024-44935-52319d9d2f522ed939af31af70f8c3a0f0f67e6c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44935/CVE-2024-44935-52319d9d2f522ed939af31af70f8c3a0f0f67e6c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/54b303d8f9702b8ab618c5032fae886b16356928",
                "patch_url": "https://git.kernel.org/stable/p/54b303d8f9702b8ab618c5032fae886b16356928",
                "filename": "CVE-2024-44935-54b303d8f9702b8ab618c5032fae886b16356928.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44935/CVE-2024-44935-54b303d8f9702b8ab618c5032fae886b16356928.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ab0faa7f9ffe31296dbb9bbe6f76c72c14eea18",
                "patch_url": "https://git.kernel.org/stable/p/9ab0faa7f9ffe31296dbb9bbe6f76c72c14eea18",
                "filename": "CVE-2024-44935-9ab0faa7f9ffe31296dbb9bbe6f76c72c14eea18.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44935/CVE-2024-44935-9ab0faa7f9ffe31296dbb9bbe6f76c72c14eea18.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c9b3fc4f157867e858734e31022ebee8a24f0de7",
                "patch_url": "https://git.kernel.org/stable/p/c9b3fc4f157867e858734e31022ebee8a24f0de7",
                "filename": "CVE-2024-44935-c9b3fc4f157867e858734e31022ebee8a24f0de7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44935/CVE-2024-44935-c9b3fc4f157867e858734e31022ebee8a24f0de7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e809a84c802377ef61525a298a1ec1728759b913",
                "patch_url": "https://git.kernel.org/stable/p/e809a84c802377ef61525a298a1ec1728759b913",
                "filename": "CVE-2024-44935-e809a84c802377ef61525a298a1ec1728759b913.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44935/CVE-2024-44935-e809a84c802377ef61525a298a1ec1728759b913.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/05e4a0fa248240efd99a539853e844f0f0a9e6a5",
            "https://git.kernel.org/stable/c/1407be30fc17eff918a98e0a990c0e988f11dc84",
            "https://git.kernel.org/stable/c/52319d9d2f522ed939af31af70f8c3a0f0f67e6c",
            "https://git.kernel.org/stable/c/54b303d8f9702b8ab618c5032fae886b16356928",
            "https://git.kernel.org/stable/c/9ab0faa7f9ffe31296dbb9bbe6f76c72c14eea18",
            "https://git.kernel.org/stable/c/c9b3fc4f157867e858734e31022ebee8a24f0de7",
            "https://git.kernel.org/stable/c/e809a84c802377ef61525a298a1ec1728759b913",
            "https://www.cve.org/CVERecord?id=CVE-2024-44935\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-44935\nhttps://lore.kernel.org/linux-cve-announce/2024082642-CVE-2024-44935-3452@gregkh/T"
        ]
    },
    "CVE-2024-44970": {
        "cve": "CVE-2024-44970",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: SHAMPO, Fix invalid WQ linked list unlink\n\nWhen all the strides in a WQE have been consumed, the WQE is unlinked\nfrom the WQ linked list (mlx5_wq_ll_pop()). For SHAMPO, it is possible\nto receive CQEs with 0 consumed strides for the same WQE even after the\nWQE is fully consumed and unlinked. This triggers an additional unlink\nfor the same wqe which corrupts the linked list.\n\nFix this scenario by accepting 0 sized consumed strides without\nunlinking the WQE again.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-44970",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/7b379353e9144e1f7460ff15f39862012c9d0d78",
            "patch_url": "https://git.kernel.org/stable/p/7b379353e9144e1f7460ff15f39862012c9d0d78",
            "filename": "CVE-2024-44970-7b379353e9144e1f7460ff15f39862012c9d0d78.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44970/CVE-2024-44970-7b379353e9144e1f7460ff15f39862012c9d0d78.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/50d8009a0ac02c3311b23a0066511f8337bd88d9",
                "patch_url": "https://git.kernel.org/stable/p/50d8009a0ac02c3311b23a0066511f8337bd88d9",
                "filename": "CVE-2024-44970-50d8009a0ac02c3311b23a0066511f8337bd88d9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44970/CVE-2024-44970-50d8009a0ac02c3311b23a0066511f8337bd88d9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/650e24748e1e0a7ff91d5c72b72a2f2a452b5b76",
                "patch_url": "https://git.kernel.org/stable/p/650e24748e1e0a7ff91d5c72b72a2f2a452b5b76",
                "filename": "CVE-2024-44970-650e24748e1e0a7ff91d5c72b72a2f2a452b5b76.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44970/CVE-2024-44970-650e24748e1e0a7ff91d5c72b72a2f2a452b5b76.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7b379353e9144e1f7460ff15f39862012c9d0d78",
                "patch_url": "https://git.kernel.org/stable/p/7b379353e9144e1f7460ff15f39862012c9d0d78",
                "filename": "CVE-2024-44970-7b379353e9144e1f7460ff15f39862012c9d0d78.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44970/CVE-2024-44970-7b379353e9144e1f7460ff15f39862012c9d0d78.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fba8334721e266f92079632598e46e5f89082f30",
                "patch_url": "https://git.kernel.org/stable/p/fba8334721e266f92079632598e46e5f89082f30",
                "filename": "CVE-2024-44970-fba8334721e266f92079632598e46e5f89082f30.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44970/CVE-2024-44970-fba8334721e266f92079632598e46e5f89082f30.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/50d8009a0ac02c3311b23a0066511f8337bd88d9",
            "https://git.kernel.org/stable/c/650e24748e1e0a7ff91d5c72b72a2f2a452b5b76",
            "https://git.kernel.org/stable/c/7b379353e9144e1f7460ff15f39862012c9d0d78",
            "https://git.kernel.org/stable/c/fba8334721e266f92079632598e46e5f89082f30",
            "https://www.cve.org/CVERecord?id=CVE-2024-44970\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-44970\nhttps://lore.kernel.org/linux-cve-announce/2024090456-CVE-2024-44970-f687@gregkh/T"
        ]
    },
    "CVE-2024-44989": {
        "cve": "CVE-2024-44989",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: fix xfrm real_dev null pointer dereference\n\nWe shouldn't set real_dev to NULL because packets can be in transit and\nxfrm might call xdo_dev_offload_ok() in parallel. All callbacks assume\nreal_dev is set.\n\n Example trace:\n kernel: BUG: unable to handle page fault for address: 0000000000001030\n kernel: bond0: (slave eni0np1): making interface the new active one\n kernel: #PF: supervisor write access in kernel mode\n kernel: #PF: error_code(0x0002) - not-present page\n kernel: PGD 0 P4D 0\n kernel: Oops: 0002 [#1] PREEMPT SMP\n kernel: CPU: 4 PID: 2237 Comm: ping Not tainted 6.7.7+ #12\n kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014\n kernel: RIP: 0010:nsim_ipsec_offload_ok+0xc/0x20 [netdevsim]\n kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA\n kernel: Code: e0 0f 0b 48 83 7f 38 00 74 de 0f 0b 48 8b 47 08 48 8b 37 48 8b 78 40 e9 b2 e5 9a d7 66 90 0f 1f 44 00 00 48 8b 86 80 02 00 00 <83> 80 30 10 00 00 01 b8 01 00 00 00 c3 0f 1f 80 00 00 00 00 0f 1f\n kernel: bond0: (slave eni0np1): making interface the new active one\n kernel: RSP: 0018:ffffabde81553b98 EFLAGS: 00010246\n kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA\n kernel:\n kernel: RAX: 0000000000000000 RBX: ffff9eb404e74900 RCX: ffff9eb403d97c60\n kernel: RDX: ffffffffc090de10 RSI: ffff9eb404e74900 RDI: ffff9eb3c5de9e00\n kernel: RBP: ffff9eb3c0a42000 R08: 0000000000000010 R09: 0000000000000014\n kernel: R10: 7974203030303030 R11: 3030303030303030 R12: 0000000000000000\n kernel: R13: ffff9eb3c5de9e00 R14: ffffabde81553cc8 R15: ffff9eb404c53000\n kernel: FS:  00007f2a77a3ad00(0000) GS:ffff9eb43bd00000(0000) knlGS:0000000000000000\n kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n kernel: CR2: 0000000000001030 CR3: 00000001122ab000 CR4: 0000000000350ef0\n kernel: bond0: (slave eni0np1): making interface the new active one\n kernel: Call Trace:\n kernel:  <TASK>\n kernel:  ? __die+0x1f/0x60\n kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA\n kernel:  ? page_fault_oops+0x142/0x4c0\n kernel:  ? do_user_addr_fault+0x65/0x670\n kernel:  ? kvm_read_and_reset_apf_flags+0x3b/0x50\n kernel: bond0: (slave eni0np1): making interface the new active one\n kernel:  ? exc_page_fault+0x7b/0x180\n kernel:  ? asm_exc_page_fault+0x22/0x30\n kernel:  ? nsim_bpf_uninit+0x50/0x50 [netdevsim]\n kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA\n kernel:  ? nsim_ipsec_offload_ok+0xc/0x20 [netdevsim]\n kernel: bond0: (slave eni0np1): making interface the new active one\n kernel:  bond_ipsec_offload_ok+0x7b/0x90 [bonding]\n kernel:  xfrm_output+0x61/0x3b0\n kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA\n kernel:  ip_push_pending_frames+0x56/0x80",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-44989",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/21816b696c172c19d53a30d45ee005cce246ed21",
            "patch_url": "https://git.kernel.org/stable/p/21816b696c172c19d53a30d45ee005cce246ed21",
            "filename": "CVE-2024-44989-21816b696c172c19d53a30d45ee005cce246ed21.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44989/CVE-2024-44989-21816b696c172c19d53a30d45ee005cce246ed21.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/21816b696c172c19d53a30d45ee005cce246ed21",
                "patch_url": "https://git.kernel.org/stable/p/21816b696c172c19d53a30d45ee005cce246ed21",
                "filename": "CVE-2024-44989-21816b696c172c19d53a30d45ee005cce246ed21.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44989/CVE-2024-44989-21816b696c172c19d53a30d45ee005cce246ed21.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f72c6a66bcd7e0187ec085237fee5db27145294",
                "patch_url": "https://git.kernel.org/stable/p/2f72c6a66bcd7e0187ec085237fee5db27145294",
                "filename": "CVE-2024-44989-2f72c6a66bcd7e0187ec085237fee5db27145294.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44989/CVE-2024-44989-2f72c6a66bcd7e0187ec085237fee5db27145294.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4582d4ff413a07d4ed8a4823c652dc5207760548",
                "patch_url": "https://git.kernel.org/stable/p/4582d4ff413a07d4ed8a4823c652dc5207760548",
                "filename": "CVE-2024-44989-4582d4ff413a07d4ed8a4823c652dc5207760548.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44989/CVE-2024-44989-4582d4ff413a07d4ed8a4823c652dc5207760548.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7fa9243391ad2afe798ef4ea2e2851947b95754f",
                "patch_url": "https://git.kernel.org/stable/p/7fa9243391ad2afe798ef4ea2e2851947b95754f",
                "filename": "CVE-2024-44989-7fa9243391ad2afe798ef4ea2e2851947b95754f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44989/CVE-2024-44989-7fa9243391ad2afe798ef4ea2e2851947b95754f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/89fc1dca79db5c3e7a2d589ecbf8a3661c65f436",
                "patch_url": "https://git.kernel.org/stable/p/89fc1dca79db5c3e7a2d589ecbf8a3661c65f436",
                "filename": "CVE-2024-44989-89fc1dca79db5c3e7a2d589ecbf8a3661c65f436.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44989/CVE-2024-44989-89fc1dca79db5c3e7a2d589ecbf8a3661c65f436.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f8cde9805981c50d0c029063dc7d82821806fc44",
                "patch_url": "https://git.kernel.org/stable/p/f8cde9805981c50d0c029063dc7d82821806fc44",
                "filename": "CVE-2024-44989-f8cde9805981c50d0c029063dc7d82821806fc44.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44989/CVE-2024-44989-f8cde9805981c50d0c029063dc7d82821806fc44.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/21816b696c172c19d53a30d45ee005cce246ed21",
            "https://git.kernel.org/stable/c/2f72c6a66bcd7e0187ec085237fee5db27145294",
            "https://git.kernel.org/stable/c/4582d4ff413a07d4ed8a4823c652dc5207760548",
            "https://git.kernel.org/stable/c/7fa9243391ad2afe798ef4ea2e2851947b95754f",
            "https://git.kernel.org/stable/c/89fc1dca79db5c3e7a2d589ecbf8a3661c65f436",
            "https://git.kernel.org/stable/c/f8cde9805981c50d0c029063dc7d82821806fc44",
            "https://www.cve.org/CVERecord?id=CVE-2024-44989\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-44989\nhttps://lore.kernel.org/linux-cve-announce/2024090446-CVE-2024-44989-8a2d@gregkh/T"
        ]
    },
    "CVE-2024-44990": {
        "cve": "CVE-2024-44990",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: fix null pointer deref in bond_ipsec_offload_ok\n\nWe must check if there is an active slave before dereferencing the pointer.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-44990",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/81216b9352be43f8958092d379f6dec85443c309",
            "patch_url": "https://git.kernel.org/stable/p/81216b9352be43f8958092d379f6dec85443c309",
            "filename": "CVE-2024-44990-81216b9352be43f8958092d379f6dec85443c309.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44990/CVE-2024-44990-81216b9352be43f8958092d379f6dec85443c309.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0707260a18312bbcd2a5668584e3692d0a29e3f6",
                "patch_url": "https://git.kernel.org/stable/p/0707260a18312bbcd2a5668584e3692d0a29e3f6",
                "filename": "CVE-2024-44990-0707260a18312bbcd2a5668584e3692d0a29e3f6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44990/CVE-2024-44990-0707260a18312bbcd2a5668584e3692d0a29e3f6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f5bdd68c1ce64bda6bef4d361a3de23b04ccd59",
                "patch_url": "https://git.kernel.org/stable/p/2f5bdd68c1ce64bda6bef4d361a3de23b04ccd59",
                "filename": "CVE-2024-44990-2f5bdd68c1ce64bda6bef4d361a3de23b04ccd59.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44990/CVE-2024-44990-2f5bdd68c1ce64bda6bef4d361a3de23b04ccd59.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/32a0173600c63aadaf2103bf02f074982e8602ab",
                "patch_url": "https://git.kernel.org/stable/p/32a0173600c63aadaf2103bf02f074982e8602ab",
                "filename": "CVE-2024-44990-32a0173600c63aadaf2103bf02f074982e8602ab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44990/CVE-2024-44990-32a0173600c63aadaf2103bf02f074982e8602ab.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/81216b9352be43f8958092d379f6dec85443c309",
                "patch_url": "https://git.kernel.org/stable/p/81216b9352be43f8958092d379f6dec85443c309",
                "filename": "CVE-2024-44990-81216b9352be43f8958092d379f6dec85443c309.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44990/CVE-2024-44990-81216b9352be43f8958092d379f6dec85443c309.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/95c90e4ad89d493a7a14fa200082e466e2548f9d",
                "patch_url": "https://git.kernel.org/stable/p/95c90e4ad89d493a7a14fa200082e466e2548f9d",
                "filename": "CVE-2024-44990-95c90e4ad89d493a7a14fa200082e466e2548f9d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44990/CVE-2024-44990-95c90e4ad89d493a7a14fa200082e466e2548f9d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b70b0ddfed31fc92c8dc722d0afafc8e14cb550c",
                "patch_url": "https://git.kernel.org/stable/p/b70b0ddfed31fc92c8dc722d0afafc8e14cb550c",
                "filename": "CVE-2024-44990-b70b0ddfed31fc92c8dc722d0afafc8e14cb550c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-44990/CVE-2024-44990-b70b0ddfed31fc92c8dc722d0afafc8e14cb550c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0707260a18312bbcd2a5668584e3692d0a29e3f6",
            "https://git.kernel.org/stable/c/2f5bdd68c1ce64bda6bef4d361a3de23b04ccd59",
            "https://git.kernel.org/stable/c/32a0173600c63aadaf2103bf02f074982e8602ab",
            "https://git.kernel.org/stable/c/81216b9352be43f8958092d379f6dec85443c309",
            "https://git.kernel.org/stable/c/95c90e4ad89d493a7a14fa200082e466e2548f9d",
            "https://git.kernel.org/stable/c/b70b0ddfed31fc92c8dc722d0afafc8e14cb550c",
            "https://www.cve.org/CVERecord?id=CVE-2024-44990\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-44990\nhttps://lore.kernel.org/linux-cve-announce/2024090446-CVE-2024-44990-6b62@gregkh/T"
        ]
    },
    "CVE-2024-45018": {
        "cve": "CVE-2024-45018",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: flowtable: initialise extack before use\n\nFix missing initialisation of extack in flow offload.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-45018",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/e5ceff2196dc633c995afb080f6f44a72cff6e1d",
            "patch_url": "https://git.kernel.org/stable/p/e5ceff2196dc633c995afb080f6f44a72cff6e1d",
            "filename": "CVE-2024-45018-e5ceff2196dc633c995afb080f6f44a72cff6e1d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-45018/CVE-2024-45018-e5ceff2196dc633c995afb080f6f44a72cff6e1d.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/119be227bc04f5035efa64cb823b8a5ca5e2d1c1",
                "patch_url": "https://git.kernel.org/stable/p/119be227bc04f5035efa64cb823b8a5ca5e2d1c1",
                "filename": "CVE-2024-45018-119be227bc04f5035efa64cb823b8a5ca5e2d1c1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-45018/CVE-2024-45018-119be227bc04f5035efa64cb823b8a5ca5e2d1c1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/356beb911b63a8cff34cb57f755c2a2d2ee9dec7",
                "patch_url": "https://git.kernel.org/stable/p/356beb911b63a8cff34cb57f755c2a2d2ee9dec7",
                "filename": "CVE-2024-45018-356beb911b63a8cff34cb57f755c2a2d2ee9dec7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-45018/CVE-2024-45018-356beb911b63a8cff34cb57f755c2a2d2ee9dec7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7eafeec6be68ebd6140a830ce9ae68ad5b67ec78",
                "patch_url": "https://git.kernel.org/stable/p/7eafeec6be68ebd6140a830ce9ae68ad5b67ec78",
                "filename": "CVE-2024-45018-7eafeec6be68ebd6140a830ce9ae68ad5b67ec78.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-45018/CVE-2024-45018-7eafeec6be68ebd6140a830ce9ae68ad5b67ec78.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c7b760499f7791352b49b11667ed04b23d7f5b0f",
                "patch_url": "https://git.kernel.org/stable/p/c7b760499f7791352b49b11667ed04b23d7f5b0f",
                "filename": "CVE-2024-45018-c7b760499f7791352b49b11667ed04b23d7f5b0f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-45018/CVE-2024-45018-c7b760499f7791352b49b11667ed04b23d7f5b0f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e5ceff2196dc633c995afb080f6f44a72cff6e1d",
                "patch_url": "https://git.kernel.org/stable/p/e5ceff2196dc633c995afb080f6f44a72cff6e1d",
                "filename": "CVE-2024-45018-e5ceff2196dc633c995afb080f6f44a72cff6e1d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-45018/CVE-2024-45018-e5ceff2196dc633c995afb080f6f44a72cff6e1d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e9767137308daf906496613fd879808a07f006a2",
                "patch_url": "https://git.kernel.org/stable/p/e9767137308daf906496613fd879808a07f006a2",
                "filename": "CVE-2024-45018-e9767137308daf906496613fd879808a07f006a2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-45018/CVE-2024-45018-e9767137308daf906496613fd879808a07f006a2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/119be227bc04f5035efa64cb823b8a5ca5e2d1c1",
            "https://git.kernel.org/stable/c/356beb911b63a8cff34cb57f755c2a2d2ee9dec7",
            "https://git.kernel.org/stable/c/7eafeec6be68ebd6140a830ce9ae68ad5b67ec78",
            "https://git.kernel.org/stable/c/c7b760499f7791352b49b11667ed04b23d7f5b0f",
            "https://git.kernel.org/stable/c/e5ceff2196dc633c995afb080f6f44a72cff6e1d",
            "https://git.kernel.org/stable/c/e9767137308daf906496613fd879808a07f006a2",
            "https://www.cve.org/CVERecord?id=CVE-2024-45018\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-45018\nhttps://lore.kernel.org/linux-cve-announce/2024091108-CVE-2024-45018-7e30@gregkh/T"
        ]
    },
    "CVE-2024-45490": {
        "cve": "CVE-2024-45490",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-45490",
        "selected_patch": {
            "url": "https://github.com/libexpat/libexpat/pull/890",
            "patch_url": "https://github.com/libexpat/libexpat/pull/890.patch",
            "filename": "CVE-2024-45490-https___github_com_libexpat_libexpat_pull_890_patch.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-45490/CVE-2024-45490-https___github_com_libexpat_libexpat_pull_890_patch.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/libexpat/libexpat/pull/890",
                "patch_url": "https://github.com/libexpat/libexpat/pull/890.patch",
                "filename": "CVE-2024-45490-https___github_com_libexpat_libexpat_pull_890_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-45490/CVE-2024-45490-https___github_com_libexpat_libexpat_pull_890_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/libexpat/libexpat/pull/890"
        ]
    },
    "CVE-2024-45491": {
        "cve": "CVE-2024-45491",
        "cvss_v2": null,
        "cvss_v3": 9.8,
        "description": "An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-45491",
        "selected_patch": {
            "url": "https://github.com/libexpat/libexpat/pull/891",
            "patch_url": "https://github.com/libexpat/libexpat/pull/891.patch",
            "filename": "CVE-2024-45491-https___github_com_libexpat_libexpat_pull_891_patch.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-45491/CVE-2024-45491-https___github_com_libexpat_libexpat_pull_891_patch.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/libexpat/libexpat/pull/891",
                "patch_url": "https://github.com/libexpat/libexpat/pull/891.patch",
                "filename": "CVE-2024-45491-https___github_com_libexpat_libexpat_pull_891_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-45491/CVE-2024-45491-https___github_com_libexpat_libexpat_pull_891_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/libexpat/libexpat/pull/891"
        ]
    },
    "CVE-2024-45492": {
        "cve": "CVE-2024-45492",
        "cvss_v2": null,
        "cvss_v3": 9.8,
        "description": "An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-45492",
        "selected_patch": {
            "url": "https://github.com/libexpat/libexpat/pull/892",
            "patch_url": "https://github.com/libexpat/libexpat/pull/892.patch",
            "filename": "CVE-2024-45492-https___github_com_libexpat_libexpat_pull_892_patch.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-45492/CVE-2024-45492-https___github_com_libexpat_libexpat_pull_892_patch.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/libexpat/libexpat/pull/892",
                "patch_url": "https://github.com/libexpat/libexpat/pull/892.patch",
                "filename": "CVE-2024-45492-https___github_com_libexpat_libexpat_pull_892_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-45492/CVE-2024-45492-https___github_com_libexpat_libexpat_pull_892_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/libexpat/libexpat/pull/892"
        ]
    },
    "CVE-2024-46695": {
        "cve": "CVE-2024-46695",
        "cvss_v2": null,
        "cvss_v3": 4.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux,smack: don't bypass permissions check in inode_setsecctx hook\n\nMarek Gresko reports that the root user on an NFS client is able to\nchange the security labels on files on an NFS filesystem that is\nexported with root squashing enabled.\n\nThe end of the kerneldoc comment for __vfs_setxattr_noperm() states:\n\n *  This function requires the caller to lock the inode's i_mutex before it\n *  is executed. It also assumes that the caller will make the appropriate\n *  permission checks.\n\nnfsd_setattr() does do permissions checking via fh_verify() and\nnfsd_permission(), but those don't do all the same permissions checks\nthat are done by security_inode_setxattr() and its related LSM hooks do.\n\nSince nfsd_setattr() is the only consumer of security_inode_setsecctx(),\nsimplest solution appears to be to replace the call to\n__vfs_setxattr_noperm() with a call to __vfs_setxattr_locked().  This\nfixes the above issue and has the added benefit of causing nfsd to\nrecall conflicting delegations on a file when a client tries to change\nits security label.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-46695",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2dbc4b7bac60b02cc6e70d05bf6a7dfd551f9dda",
            "patch_url": "https://git.kernel.org/stable/p/2dbc4b7bac60b02cc6e70d05bf6a7dfd551f9dda",
            "filename": "CVE-2024-46695-2dbc4b7bac60b02cc6e70d05bf6a7dfd551f9dda.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46695/CVE-2024-46695-2dbc4b7bac60b02cc6e70d05bf6a7dfd551f9dda.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2dbc4b7bac60b02cc6e70d05bf6a7dfd551f9dda",
                "patch_url": "https://git.kernel.org/stable/p/2dbc4b7bac60b02cc6e70d05bf6a7dfd551f9dda",
                "filename": "CVE-2024-46695-2dbc4b7bac60b02cc6e70d05bf6a7dfd551f9dda.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46695/CVE-2024-46695-2dbc4b7bac60b02cc6e70d05bf6a7dfd551f9dda.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/459584258d47ec3cc6245a82e8a49c9d08eb8b57",
                "patch_url": "https://git.kernel.org/stable/p/459584258d47ec3cc6245a82e8a49c9d08eb8b57",
                "filename": "CVE-2024-46695-459584258d47ec3cc6245a82e8a49c9d08eb8b57.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46695/CVE-2024-46695-459584258d47ec3cc6245a82e8a49c9d08eb8b57.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/76a0e79bc84f466999fa501fce5bf7a07641b8a7",
                "patch_url": "https://git.kernel.org/stable/p/76a0e79bc84f466999fa501fce5bf7a07641b8a7",
                "filename": "CVE-2024-46695-76a0e79bc84f466999fa501fce5bf7a07641b8a7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46695/CVE-2024-46695-76a0e79bc84f466999fa501fce5bf7a07641b8a7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eebec98791d0137e455cc006411bb92a54250924",
                "patch_url": "https://git.kernel.org/stable/p/eebec98791d0137e455cc006411bb92a54250924",
                "filename": "CVE-2024-46695-eebec98791d0137e455cc006411bb92a54250924.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46695/CVE-2024-46695-eebec98791d0137e455cc006411bb92a54250924.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f71ec019257ba4f7ab198bd948c5902a207bad96",
                "patch_url": "https://git.kernel.org/stable/p/f71ec019257ba4f7ab198bd948c5902a207bad96",
                "filename": "CVE-2024-46695-f71ec019257ba4f7ab198bd948c5902a207bad96.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46695/CVE-2024-46695-f71ec019257ba4f7ab198bd948c5902a207bad96.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fe0cd53791119f6287b6532af8ce41576d664930",
                "patch_url": "https://git.kernel.org/stable/p/fe0cd53791119f6287b6532af8ce41576d664930",
                "filename": "CVE-2024-46695-fe0cd53791119f6287b6532af8ce41576d664930.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46695/CVE-2024-46695-fe0cd53791119f6287b6532af8ce41576d664930.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2dbc4b7bac60b02cc6e70d05bf6a7dfd551f9dda",
            "https://git.kernel.org/stable/c/459584258d47ec3cc6245a82e8a49c9d08eb8b57",
            "https://git.kernel.org/stable/c/76a0e79bc84f466999fa501fce5bf7a07641b8a7",
            "https://git.kernel.org/stable/c/eebec98791d0137e455cc006411bb92a54250924",
            "https://git.kernel.org/stable/c/f71ec019257ba4f7ab198bd948c5902a207bad96",
            "https://git.kernel.org/stable/c/fe0cd53791119f6287b6532af8ce41576d664930",
            "https://www.cve.org/CVERecord?id=CVE-2024-46695\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-46695\nhttps://lore.kernel.org/linux-cve-announce/2024091340-CVE-2024-46695-affc@gregkh/T"
        ]
    },
    "CVE-2024-46826": {
        "cve": "CVE-2024-46826",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nELF: fix kernel.randomize_va_space double read\n\nELF loader uses \"randomize_va_space\" twice. It is sysctl and can change\nat any moment, so 2 loads could see 2 different values in theory with\nunpredictable consequences.\n\nIssue exactly one load for consistent value across one exec.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-46826",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1cf8cd80903073440b6ea055811d04edd24fe4f7",
            "patch_url": "https://git.kernel.org/stable/p/1cf8cd80903073440b6ea055811d04edd24fe4f7",
            "filename": "CVE-2024-46826-1cf8cd80903073440b6ea055811d04edd24fe4f7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46826/CVE-2024-46826-1cf8cd80903073440b6ea055811d04edd24fe4f7.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1cf8cd80903073440b6ea055811d04edd24fe4f7",
                "patch_url": "https://git.kernel.org/stable/p/1cf8cd80903073440b6ea055811d04edd24fe4f7",
                "filename": "CVE-2024-46826-1cf8cd80903073440b6ea055811d04edd24fe4f7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46826/CVE-2024-46826-1cf8cd80903073440b6ea055811d04edd24fe4f7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1f81d51141a234ad0a3874b4d185dc27a521cd27",
                "patch_url": "https://git.kernel.org/stable/p/1f81d51141a234ad0a3874b4d185dc27a521cd27",
                "filename": "CVE-2024-46826-1f81d51141a234ad0a3874b4d185dc27a521cd27.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46826/CVE-2024-46826-1f81d51141a234ad0a3874b4d185dc27a521cd27.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2a97388a807b6ab5538aa8f8537b2463c6988bd2",
                "patch_url": "https://git.kernel.org/stable/p/2a97388a807b6ab5538aa8f8537b2463c6988bd2",
                "filename": "CVE-2024-46826-2a97388a807b6ab5538aa8f8537b2463c6988bd2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46826/CVE-2024-46826-2a97388a807b6ab5538aa8f8537b2463c6988bd2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/53f17409abf61f66b6f05aff795e938e5ba811d1",
                "patch_url": "https://git.kernel.org/stable/p/53f17409abf61f66b6f05aff795e938e5ba811d1",
                "filename": "CVE-2024-46826-53f17409abf61f66b6f05aff795e938e5ba811d1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46826/CVE-2024-46826-53f17409abf61f66b6f05aff795e938e5ba811d1.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1cf8cd80903073440b6ea055811d04edd24fe4f7",
            "https://git.kernel.org/stable/c/1f81d51141a234ad0a3874b4d185dc27a521cd27",
            "https://git.kernel.org/stable/c/2a97388a807b6ab5538aa8f8537b2463c6988bd2",
            "https://git.kernel.org/stable/c/53f17409abf61f66b6f05aff795e938e5ba811d1",
            "https://www.cve.org/CVERecord?id=CVE-2024-46826\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-46826\nhttps://lore.kernel.org/linux-cve-announce/2024092750-CVE-2024-46826-7b80@gregkh/T"
        ]
    },
    "CVE-2024-46858": {
        "cve": "CVE-2024-46858",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: pm: Fix uaf in __timer_delete_sync\n\nThere are two paths to access mptcp_pm_del_add_timer, result in a race\ncondition:\n\n     CPU1\t\t\t\tCPU2\n     ====                               ====\n     net_rx_action\n     napi_poll                          netlink_sendmsg\n     __napi_poll                        netlink_unicast\n     process_backlog                    netlink_unicast_kernel\n     __netif_receive_skb                genl_rcv\n     __netif_receive_skb_one_core       netlink_rcv_skb\n     NF_HOOK                            genl_rcv_msg\n     ip_local_deliver_finish            genl_family_rcv_msg\n     ip_protocol_deliver_rcu            genl_family_rcv_msg_doit\n     tcp_v4_rcv                         mptcp_pm_nl_flush_addrs_doit\n     tcp_v4_do_rcv                      mptcp_nl_remove_addrs_list\n     tcp_rcv_established                mptcp_pm_remove_addrs_and_subflows\n     tcp_data_queue                     remove_anno_list_by_saddr\n     mptcp_incoming_options             mptcp_pm_del_add_timer\n     mptcp_pm_del_add_timer             kfree(entry)\n\nIn remove_anno_list_by_saddr(running on CPU2), after leaving the critical\nzone protected by \"pm.lock\", the entry will be released, which leads to the\noccurrence of uaf in the mptcp_pm_del_add_timer(running on CPU1).\n\nKeeping a reference to add_timer inside the lock, and calling\nsk_stop_timer_sync() with this reference, instead of \"entry->add_timer\".\n\nMove list_del(&entry->list) to mptcp_pm_del_add_timer and inside the pm lock,\ndo not directly access any members of the entry outside the pm lock, which\ncan avoid similar \"entry->x\" uaf.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-46858",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3554482f4691571fc4b5490c17ae26896e62171c",
            "patch_url": "https://git.kernel.org/stable/p/3554482f4691571fc4b5490c17ae26896e62171c",
            "filename": "CVE-2024-46858-3554482f4691571fc4b5490c17ae26896e62171c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46858/CVE-2024-46858-3554482f4691571fc4b5490c17ae26896e62171c.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0e7814b028cd50b3ff79659d23dfa9da6a1e75e1",
                "patch_url": "https://git.kernel.org/stable/p/0e7814b028cd50b3ff79659d23dfa9da6a1e75e1",
                "filename": "CVE-2024-46858-0e7814b028cd50b3ff79659d23dfa9da6a1e75e1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46858/CVE-2024-46858-0e7814b028cd50b3ff79659d23dfa9da6a1e75e1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/12134a652b0a10064844ea235173e70246eba6dc",
                "patch_url": "https://git.kernel.org/stable/p/12134a652b0a10064844ea235173e70246eba6dc",
                "filename": "CVE-2024-46858-12134a652b0a10064844ea235173e70246eba6dc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46858/CVE-2024-46858-12134a652b0a10064844ea235173e70246eba6dc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3554482f4691571fc4b5490c17ae26896e62171c",
                "patch_url": "https://git.kernel.org/stable/p/3554482f4691571fc4b5490c17ae26896e62171c",
                "filename": "CVE-2024-46858-3554482f4691571fc4b5490c17ae26896e62171c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46858/CVE-2024-46858-3554482f4691571fc4b5490c17ae26896e62171c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6452b162549c7f9ef54655d3fb9977b9192e6e5b",
                "patch_url": "https://git.kernel.org/stable/p/6452b162549c7f9ef54655d3fb9977b9192e6e5b",
                "filename": "CVE-2024-46858-6452b162549c7f9ef54655d3fb9977b9192e6e5b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46858/CVE-2024-46858-6452b162549c7f9ef54655d3fb9977b9192e6e5b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/67409b358500c71632116356a0b065f112d7b707",
                "patch_url": "https://git.kernel.org/stable/p/67409b358500c71632116356a0b065f112d7b707",
                "filename": "CVE-2024-46858-67409b358500c71632116356a0b065f112d7b707.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46858/CVE-2024-46858-67409b358500c71632116356a0b065f112d7b707.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b4cd80b0338945a94972ac3ed54f8338d2da2076",
                "patch_url": "https://git.kernel.org/stable/p/b4cd80b0338945a94972ac3ed54f8338d2da2076",
                "filename": "CVE-2024-46858-b4cd80b0338945a94972ac3ed54f8338d2da2076.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-46858/CVE-2024-46858-b4cd80b0338945a94972ac3ed54f8338d2da2076.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0e7814b028cd50b3ff79659d23dfa9da6a1e75e1",
            "https://git.kernel.org/stable/c/12134a652b0a10064844ea235173e70246eba6dc",
            "https://git.kernel.org/stable/c/3554482f4691571fc4b5490c17ae26896e62171c",
            "https://git.kernel.org/stable/c/6452b162549c7f9ef54655d3fb9977b9192e6e5b",
            "https://git.kernel.org/stable/c/67409b358500c71632116356a0b065f112d7b707",
            "https://git.kernel.org/stable/c/b4cd80b0338945a94972ac3ed54f8338d2da2076",
            "https://www.cve.org/CVERecord?id=CVE-2024-46858\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-46858\nhttps://lore.kernel.org/linux-cve-announce/2024092744-CVE-2024-46858-dab6@gregkh/T"
        ]
    },
    "CVE-2024-47668": {
        "cve": "CVE-2024-47668",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nlib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()\n\nIf we need to increase the tree depth, allocate a new node, and then\nrace with another thread that increased the tree depth before us, we'll\nstill have a preallocated node that might be used later.\n\nIf we then use that node for a new non-root node, it'll still have a\npointer to the old root instead of being zeroed - fix this by zeroing it\nin the cmpxchg failure path.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-47668",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0f27f4f445390cb7f73d4209cb2bf32834dc53da",
            "patch_url": "https://git.kernel.org/stable/p/0f27f4f445390cb7f73d4209cb2bf32834dc53da",
            "filename": "CVE-2024-47668-0f27f4f445390cb7f73d4209cb2bf32834dc53da.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-47668/CVE-2024-47668-0f27f4f445390cb7f73d4209cb2bf32834dc53da.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0f078f8ca93b28a34e20bd050f12cd4efeee7c0f",
                "patch_url": "https://git.kernel.org/stable/p/0f078f8ca93b28a34e20bd050f12cd4efeee7c0f",
                "filename": "CVE-2024-47668-0f078f8ca93b28a34e20bd050f12cd4efeee7c0f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-47668/CVE-2024-47668-0f078f8ca93b28a34e20bd050f12cd4efeee7c0f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0f27f4f445390cb7f73d4209cb2bf32834dc53da",
                "patch_url": "https://git.kernel.org/stable/p/0f27f4f445390cb7f73d4209cb2bf32834dc53da",
                "filename": "CVE-2024-47668-0f27f4f445390cb7f73d4209cb2bf32834dc53da.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-47668/CVE-2024-47668-0f27f4f445390cb7f73d4209cb2bf32834dc53da.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/99418ec776a39609f50934720419e0b464ca2283",
                "patch_url": "https://git.kernel.org/stable/p/99418ec776a39609f50934720419e0b464ca2283",
                "filename": "CVE-2024-47668-99418ec776a39609f50934720419e0b464ca2283.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-47668/CVE-2024-47668-99418ec776a39609f50934720419e0b464ca2283.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ad5ee9feebc2eb8cfc76ed74a2d6e55343b0e169",
                "patch_url": "https://git.kernel.org/stable/p/ad5ee9feebc2eb8cfc76ed74a2d6e55343b0e169",
                "filename": "CVE-2024-47668-ad5ee9feebc2eb8cfc76ed74a2d6e55343b0e169.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-47668/CVE-2024-47668-ad5ee9feebc2eb8cfc76ed74a2d6e55343b0e169.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b2f11c6f3e1fc60742673b8675c95b78447f3dae",
                "patch_url": "https://git.kernel.org/stable/p/b2f11c6f3e1fc60742673b8675c95b78447f3dae",
                "filename": "CVE-2024-47668-b2f11c6f3e1fc60742673b8675c95b78447f3dae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-47668/CVE-2024-47668-b2f11c6f3e1fc60742673b8675c95b78447f3dae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d942e855324a60107025c116245095632476613e",
                "patch_url": "https://git.kernel.org/stable/p/d942e855324a60107025c116245095632476613e",
                "filename": "CVE-2024-47668-d942e855324a60107025c116245095632476613e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-47668/CVE-2024-47668-d942e855324a60107025c116245095632476613e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ebeff038744c498a036e7a92eb8e433ae0a386d7",
                "patch_url": "https://git.kernel.org/stable/p/ebeff038744c498a036e7a92eb8e433ae0a386d7",
                "filename": "CVE-2024-47668-ebeff038744c498a036e7a92eb8e433ae0a386d7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-47668/CVE-2024-47668-ebeff038744c498a036e7a92eb8e433ae0a386d7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0f078f8ca93b28a34e20bd050f12cd4efeee7c0f",
            "https://git.kernel.org/stable/c/0f27f4f445390cb7f73d4209cb2bf32834dc53da",
            "https://git.kernel.org/stable/c/99418ec776a39609f50934720419e0b464ca2283",
            "https://git.kernel.org/stable/c/ad5ee9feebc2eb8cfc76ed74a2d6e55343b0e169",
            "https://git.kernel.org/stable/c/b2f11c6f3e1fc60742673b8675c95b78447f3dae",
            "https://git.kernel.org/stable/c/d942e855324a60107025c116245095632476613e",
            "https://git.kernel.org/stable/c/ebeff038744c498a036e7a92eb8e433ae0a386d7",
            "https://www.cve.org/CVERecord?id=CVE-2024-47668\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-47668\nhttps://lore.kernel.org/linux-cve-announce/2024100906-CVE-2024-47668-6b53@gregkh/T"
        ]
    },
    "CVE-2024-49949": {
        "cve": "CVE-2024-49949",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: avoid potential underflow in qdisc_pkt_len_init() with UFO\n\nAfter commit 7c6d2ecbda83 (\"net: be more gentle about silly gso\nrequests coming from user\") virtio_net_hdr_to_skb() had sanity check\nto detect malicious attempts from user space to cook a bad GSO packet.\n\nThen commit cf9acc90c80ec (\"net: virtio_net_hdr_to_skb: count\ntransport header in UFO\") while fixing one issue, allowed user space\nto cook a GSO packet with the following characteristic :\n\nIPv4 SKB_GSO_UDP, gso_size=3, skb->len = 28.\n\nWhen this packet arrives in qdisc_pkt_len_init(), we end up\nwith hdr_len = 28 (IPv4 header + UDP header), matching skb->len\n\nThen the following sets gso_segs to 0 :\n\ngso_segs = DIV_ROUND_UP(skb->len - hdr_len,\n                        shinfo->gso_size);\n\nThen later we set qdisc_skb_cb(skb)->pkt_len to back to zero :/\n\nqdisc_skb_cb(skb)->pkt_len += (gso_segs - 1) * hdr_len;\n\nThis leads to the following crash in fq_codel [1]\n\nqdisc_pkt_len_init() is best effort, we only want an estimation\nof the bytes sent on the wire, not crashing the kernel.\n\nThis patch is fixing this particular issue, a following one\nadds more sanity checks for another potential bug.\n\n[1]\n[   70.724101] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[   70.724561] #PF: supervisor read access in kernel mode\n[   70.724561] #PF: error_code(0x0000) - not-present page\n[   70.724561] PGD 10ac61067 P4D 10ac61067 PUD 107ee2067 PMD 0\n[   70.724561] Oops: Oops: 0000 [#1] SMP NOPTI\n[   70.724561] CPU: 11 UID: 0 PID: 2163 Comm: b358537762 Not tainted 6.11.0-virtme #991\n[   70.724561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[   70.724561] RIP: 0010:fq_codel_enqueue (net/sched/sch_fq_codel.c:120 net/sched/sch_fq_codel.c:168 net/sched/sch_fq_codel.c:230) sch_fq_codel\n[ 70.724561] Code: 24 08 49 c1 e1 06 44 89 7c 24 18 45 31 ed 45 31 c0 31 ff 89 44 24 14 4c 03 8b 90 01 00 00 eb 04 39 ca 73 37 4d 8b 39 83 c7 01 <49> 8b 17 49 89 11 41 8b 57 28 45 8b 5f 34 49 c7 07 00 00 00 00 49\nAll code\n========\n   0:\t24 08                \tand    $0x8,%al\n   2:\t49 c1 e1 06          \tshl    $0x6,%r9\n   6:\t44 89 7c 24 18       \tmov    %r15d,0x18(%rsp)\n   b:\t45 31 ed             \txor    %r13d,%r13d\n   e:\t45 31 c0             \txor    %r8d,%r8d\n  11:\t31 ff                \txor    %edi,%edi\n  13:\t89 44 24 14          \tmov    %eax,0x14(%rsp)\n  17:\t4c 03 8b 90 01 00 00 \tadd    0x190(%rbx),%r9\n  1e:\teb 04                \tjmp    0x24\n  20:\t39 ca                \tcmp    %ecx,%edx\n  22:\t73 37                \tjae    0x5b\n  24:\t4d 8b 39             \tmov    (%r9),%r15\n  27:\t83 c7 01             \tadd    $0x1,%edi\n  2a:*\t49 8b 17             \tmov    (%r15),%rdx\t\t<-- trapping instruction\n  2d:\t49 89 11             \tmov    %rdx,(%r9)\n  30:\t41 8b 57 28          \tmov    0x28(%r15),%edx\n  34:\t45 8b 5f 34          \tmov    0x34(%r15),%r11d\n  38:\t49 c7 07 00 00 00 00 \tmovq   $0x0,(%r15)\n  3f:\t49                   \trex.WB\n\nCode starting with the faulting instruction\n===========================================\n   0:\t49 8b 17             \tmov    (%r15),%rdx\n   3:\t49 89 11             \tmov    %rdx,(%r9)\n   6:\t41 8b 57 28          \tmov    0x28(%r15),%edx\n   a:\t45 8b 5f 34          \tmov    0x34(%r15),%r11d\n   e:\t49 c7 07 00 00 00 00 \tmovq   $0x0,(%r15)\n  15:\t49                   \trex.WB\n[   70.724561] RSP: 0018:ffff95ae85e6fb90 EFLAGS: 00000202\n[   70.724561] RAX: 0000000002000000 RBX: ffff95ae841de000 RCX: 0000000000000000\n[   70.724561] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001\n[   70.724561] RBP: ffff95ae85e6fbf8 R08: 0000000000000000 R09: ffff95b710a30000\n[   70.724561] R10: 0000000000000000 R11: bdf289445ce31881 R12: ffff95ae85e6fc58\n[   70.724561] R13: 0000000000000000 R14: 0000000000000040 R15: 0000000000000000\n[   70.724561] FS:  000000002c5c1380(0000) GS:ffff95bd7fcc0000(0000) knlGS:0000000000000000\n[   70.724561] CS:  0010 DS: 0000 ES: 0000 C\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-49949",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/d6114993e0a89fde84a60a60a8329a571580b174",
            "patch_url": "https://git.kernel.org/stable/p/d6114993e0a89fde84a60a60a8329a571580b174",
            "filename": "CVE-2024-49949-d6114993e0a89fde84a60a60a8329a571580b174.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-49949/CVE-2024-49949-d6114993e0a89fde84a60a60a8329a571580b174.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1598d70ad9c7d0a4d9d54b82094e9f45908fda6d",
                "patch_url": "https://git.kernel.org/stable/p/1598d70ad9c7d0a4d9d54b82094e9f45908fda6d",
                "filename": "CVE-2024-49949-1598d70ad9c7d0a4d9d54b82094e9f45908fda6d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-49949/CVE-2024-49949-1598d70ad9c7d0a4d9d54b82094e9f45908fda6d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/25ab0b87dbd89cecef8a9c60a02bb97832e471d1",
                "patch_url": "https://git.kernel.org/stable/p/25ab0b87dbd89cecef8a9c60a02bb97832e471d1",
                "filename": "CVE-2024-49949-25ab0b87dbd89cecef8a9c60a02bb97832e471d1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-49949/CVE-2024-49949-25ab0b87dbd89cecef8a9c60a02bb97832e471d1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/81fd007dcd47c34471766249853e4d4bce8eea4b",
                "patch_url": "https://git.kernel.org/stable/p/81fd007dcd47c34471766249853e4d4bce8eea4b",
                "filename": "CVE-2024-49949-81fd007dcd47c34471766249853e4d4bce8eea4b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-49949/CVE-2024-49949-81fd007dcd47c34471766249853e4d4bce8eea4b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/939c88cbdc668dadd8cfa7a35d9066331239041c",
                "patch_url": "https://git.kernel.org/stable/p/939c88cbdc668dadd8cfa7a35d9066331239041c",
                "filename": "CVE-2024-49949-939c88cbdc668dadd8cfa7a35d9066331239041c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-49949/CVE-2024-49949-939c88cbdc668dadd8cfa7a35d9066331239041c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ba26060a29d3ca1bfc737aa79f7125128f35147c",
                "patch_url": "https://git.kernel.org/stable/p/ba26060a29d3ca1bfc737aa79f7125128f35147c",
                "filename": "CVE-2024-49949-ba26060a29d3ca1bfc737aa79f7125128f35147c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-49949/CVE-2024-49949-ba26060a29d3ca1bfc737aa79f7125128f35147c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c20029db28399ecc50e556964eaba75c43b1e2f1",
                "patch_url": "https://git.kernel.org/stable/p/c20029db28399ecc50e556964eaba75c43b1e2f1",
                "filename": "CVE-2024-49949-c20029db28399ecc50e556964eaba75c43b1e2f1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-49949/CVE-2024-49949-c20029db28399ecc50e556964eaba75c43b1e2f1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d6114993e0a89fde84a60a60a8329a571580b174",
                "patch_url": "https://git.kernel.org/stable/p/d6114993e0a89fde84a60a60a8329a571580b174",
                "filename": "CVE-2024-49949-d6114993e0a89fde84a60a60a8329a571580b174.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-49949/CVE-2024-49949-d6114993e0a89fde84a60a60a8329a571580b174.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d70ca7598943572d5e384227bd268acb5109bf72",
                "patch_url": "https://git.kernel.org/stable/p/d70ca7598943572d5e384227bd268acb5109bf72",
                "filename": "CVE-2024-49949-d70ca7598943572d5e384227bd268acb5109bf72.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-49949/CVE-2024-49949-d70ca7598943572d5e384227bd268acb5109bf72.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f959cce8a2a04ce776aa8b78e83ce339e0d7fbac",
                "patch_url": "https://git.kernel.org/stable/p/f959cce8a2a04ce776aa8b78e83ce339e0d7fbac",
                "filename": "CVE-2024-49949-f959cce8a2a04ce776aa8b78e83ce339e0d7fbac.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-49949/CVE-2024-49949-f959cce8a2a04ce776aa8b78e83ce339e0d7fbac.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1598d70ad9c7d0a4d9d54b82094e9f45908fda6d",
            "https://git.kernel.org/stable/c/25ab0b87dbd89cecef8a9c60a02bb97832e471d1",
            "https://git.kernel.org/stable/c/81fd007dcd47c34471766249853e4d4bce8eea4b",
            "https://git.kernel.org/stable/c/939c88cbdc668dadd8cfa7a35d9066331239041c",
            "https://git.kernel.org/stable/c/ba26060a29d3ca1bfc737aa79f7125128f35147c",
            "https://git.kernel.org/stable/c/c20029db28399ecc50e556964eaba75c43b1e2f1",
            "https://git.kernel.org/stable/c/d6114993e0a89fde84a60a60a8329a571580b174",
            "https://git.kernel.org/stable/c/d70ca7598943572d5e384227bd268acb5109bf72",
            "https://git.kernel.org/stable/c/f959cce8a2a04ce776aa8b78e83ce339e0d7fbac",
            "https://www.cve.org/CVERecord?id=CVE-2024-49949\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-49949\nhttps://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-49949-c792@gregkh/T"
        ]
    },
    "CVE-2024-50082": {
        "cve": "CVE-2024-50082",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race\n\nWe're seeing crashes from rq_qos_wake_function that look like this:\n\n  BUG: unable to handle page fault for address: ffffafe180a40084\n  #PF: supervisor write access in kernel mode\n  #PF: error_code(0x0002) - not-present page\n  PGD 100000067 P4D 100000067 PUD 10027c067 PMD 10115d067 PTE 0\n  Oops: Oops: 0002 [#1] PREEMPT SMP PTI\n  CPU: 17 UID: 0 PID: 0 Comm: swapper/17 Not tainted 6.12.0-rc3-00013-geca631b8fe80 #11\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n  RIP: 0010:_raw_spin_lock_irqsave+0x1d/0x40\n  Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 9c 41 5c fa 65 ff 05 62 97 30 4c 31 c0 ba 01 00 00 00 <f0> 0f b1 17 75 0a 4c 89 e0 41 5c c3 cc cc cc cc 89 c6 e8 2c 0b 00\n  RSP: 0018:ffffafe180580ca0 EFLAGS: 00010046\n  RAX: 0000000000000000 RBX: ffffafe180a3f7a8 RCX: 0000000000000011\n  RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffafe180a40084\n  RBP: 0000000000000000 R08: 00000000001e7240 R09: 0000000000000011\n  R10: 0000000000000028 R11: 0000000000000888 R12: 0000000000000002\n  R13: ffffafe180a40084 R14: 0000000000000000 R15: 0000000000000003\n  FS:  0000000000000000(0000) GS:ffff9aaf1f280000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: ffffafe180a40084 CR3: 000000010e428002 CR4: 0000000000770ef0\n  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n  PKRU: 55555554\n  Call Trace:\n   <IRQ>\n   try_to_wake_up+0x5a/0x6a0\n   rq_qos_wake_function+0x71/0x80\n   __wake_up_common+0x75/0xa0\n   __wake_up+0x36/0x60\n   scale_up.part.0+0x50/0x110\n   wb_timer_fn+0x227/0x450\n   ...\n\nSo rq_qos_wake_function() calls wake_up_process(data->task), which calls\ntry_to_wake_up(), which faults in raw_spin_lock_irqsave(&p->pi_lock).\n\np comes from data->task, and data comes from the waitqueue entry, which\nis stored on the waiter's stack in rq_qos_wait(). Analyzing the core\ndump with drgn, I found that the waiter had already woken up and moved\non to a completely unrelated code path, clobbering what was previously\ndata->task. Meanwhile, the waker was passing the clobbered garbage in\ndata->task to wake_up_process(), leading to the crash.\n\nWhat's happening is that in between rq_qos_wake_function() deleting the\nwaitqueue entry and calling wake_up_process(), rq_qos_wait() is finding\nthat it already got a token and returning. The race looks like this:\n\nrq_qos_wait()                           rq_qos_wake_function()\n==============================================================\nprepare_to_wait_exclusive()\n                                        data->got_token = true;\n                                        list_del_init(&curr->entry);\nif (data.got_token)\n        break;\nfinish_wait(&rqw->wait, &data.wq);\n  ^- returns immediately because\n     list_empty_careful(&wq_entry->entry)\n     is true\n... return, go do something else ...\n                                        wake_up_process(data->task)\n                                          (NO LONGER VALID!)-^\n\nNormally, finish_wait() is supposed to synchronize against the waker.\nBut, as noted above, it is returning immediately because the waitqueue\nentry has already been removed from the waitqueue.\n\nThe bug is that rq_qos_wake_function() is accessing the waitqueue entry\nAFTER deleting it. Note that autoremove_wake_function() wakes the waiter\nand THEN deletes the waitqueue entry, which is the proper order.\n\nFix it by swapping the order. We also need to use\nlist_del_init_careful() to match the list_empty_careful() in\nfinish_wait().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-50082",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3bc6d0f8b70a9101456cf02ab99acb75254e1852",
            "patch_url": "https://git.kernel.org/stable/p/3bc6d0f8b70a9101456cf02ab99acb75254e1852",
            "filename": "CVE-2024-50082-3bc6d0f8b70a9101456cf02ab99acb75254e1852.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50082/CVE-2024-50082-3bc6d0f8b70a9101456cf02ab99acb75254e1852.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/04f283fc16c8d5db641b6bffd2d8310aa7eccebc",
                "patch_url": "https://git.kernel.org/stable/p/04f283fc16c8d5db641b6bffd2d8310aa7eccebc",
                "filename": "CVE-2024-50082-04f283fc16c8d5db641b6bffd2d8310aa7eccebc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50082/CVE-2024-50082-04f283fc16c8d5db641b6bffd2d8310aa7eccebc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3bc6d0f8b70a9101456cf02ab99acb75254e1852",
                "patch_url": "https://git.kernel.org/stable/p/3bc6d0f8b70a9101456cf02ab99acb75254e1852",
                "filename": "CVE-2024-50082-3bc6d0f8b70a9101456cf02ab99acb75254e1852.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50082/CVE-2024-50082-3bc6d0f8b70a9101456cf02ab99acb75254e1852.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/455a469758e57a6fe070e3e342db12e4a629e0eb",
                "patch_url": "https://git.kernel.org/stable/p/455a469758e57a6fe070e3e342db12e4a629e0eb",
                "filename": "CVE-2024-50082-455a469758e57a6fe070e3e342db12e4a629e0eb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50082/CVE-2024-50082-455a469758e57a6fe070e3e342db12e4a629e0eb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4c5b123ab289767afe940389dbb963c5c05e594e",
                "patch_url": "https://git.kernel.org/stable/p/4c5b123ab289767afe940389dbb963c5c05e594e",
                "filename": "CVE-2024-50082-4c5b123ab289767afe940389dbb963c5c05e594e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50082/CVE-2024-50082-4c5b123ab289767afe940389dbb963c5c05e594e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b5e900a3612b69423a0e1b0ab67841a1fb4af80f",
                "patch_url": "https://git.kernel.org/stable/p/b5e900a3612b69423a0e1b0ab67841a1fb4af80f",
                "filename": "CVE-2024-50082-b5e900a3612b69423a0e1b0ab67841a1fb4af80f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50082/CVE-2024-50082-b5e900a3612b69423a0e1b0ab67841a1fb4af80f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d04b72c9ef2b0689bfc1057d21c4aeed087c329f",
                "patch_url": "https://git.kernel.org/stable/p/d04b72c9ef2b0689bfc1057d21c4aeed087c329f",
                "filename": "CVE-2024-50082-d04b72c9ef2b0689bfc1057d21c4aeed087c329f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50082/CVE-2024-50082-d04b72c9ef2b0689bfc1057d21c4aeed087c329f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e972b08b91ef48488bae9789f03cfedb148667fb",
                "patch_url": "https://git.kernel.org/stable/p/e972b08b91ef48488bae9789f03cfedb148667fb",
                "filename": "CVE-2024-50082-e972b08b91ef48488bae9789f03cfedb148667fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50082/CVE-2024-50082-e972b08b91ef48488bae9789f03cfedb148667fb.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/04f283fc16c8d5db641b6bffd2d8310aa7eccebc",
            "https://git.kernel.org/stable/c/3bc6d0f8b70a9101456cf02ab99acb75254e1852",
            "https://git.kernel.org/stable/c/455a469758e57a6fe070e3e342db12e4a629e0eb",
            "https://git.kernel.org/stable/c/4c5b123ab289767afe940389dbb963c5c05e594e",
            "https://git.kernel.org/stable/c/b5e900a3612b69423a0e1b0ab67841a1fb4af80f",
            "https://git.kernel.org/stable/c/d04b72c9ef2b0689bfc1057d21c4aeed087c329f",
            "https://git.kernel.org/stable/c/e972b08b91ef48488bae9789f03cfedb148667fb",
            "https://www.cve.org/CVERecord?id=CVE-2024-50082\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-50082\nhttps://lore.kernel.org/linux-cve-announce/2024102937-CVE-2024-50082-c5b1@gregkh/T"
        ]
    },
    "CVE-2024-50099": {
        "cve": "CVE-2024-50099",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: probes: Remove broken LDR (literal) uprobe support\n\nThe simulate_ldr_literal() and simulate_ldrsw_literal() functions are\nunsafe to use for uprobes. Both functions were originally written for\nuse with kprobes, and access memory with plain C accesses. When uprobes\nwas added, these were reused unmodified even though they cannot safely\naccess user memory.\n\nThere are three key problems:\n\n1) The plain C accesses do not have corresponding extable entries, and\n   thus if they encounter a fault the kernel will treat these as\n   unintentional accesses to user memory, resulting in a BUG() which\n   will kill the kernel thread, and likely lead to further issues (e.g.\n   lockup or panic()).\n\n2) The plain C accesses are subject to HW PAN and SW PAN, and so when\n   either is in use, any attempt to simulate an access to user memory\n   will fault. Thus neither simulate_ldr_literal() nor\n   simulate_ldrsw_literal() can do anything useful when simulating a\n   user instruction on any system with HW PAN or SW PAN.\n\n3) The plain C accesses are privileged, as they run in kernel context,\n   and in practice can access a small range of kernel virtual addresses.\n   The instructions they simulate have a range of +/-1MiB, and since the\n   simulated instructions must itself be a user instructions in the\n   TTBR0 address range, these can address the final 1MiB of the TTBR1\n   acddress range by wrapping downwards from an address in the first\n   1MiB of the TTBR0 address range.\n\n   In contemporary kernels the last 8MiB of TTBR1 address range is\n   reserved, and accesses to this will always fault, meaning this is no\n   worse than (1).\n\n   Historically, it was theoretically possible for the linear map or\n   vmemmap to spill into the final 8MiB of the TTBR1 address range, but\n   in practice this is extremely unlikely to occur as this would\n   require either:\n\n   * Having enough physical memory to fill the entire linear map all the\n     way to the final 1MiB of the TTBR1 address range.\n\n   * Getting unlucky with KASLR randomization of the linear map such\n     that the populated region happens to overlap with the last 1MiB of\n     the TTBR address range.\n\n   ... and in either case if we were to spill into the final page there\n   would be larger problems as the final page would alias with error\n   pointers.\n\nPractically speaking, (1) and (2) are the big issues. Given there have\nbeen no reports of problems since the broken code was introduced, it\nappears that no-one is relying on probing these instructions with\nuprobes.\n\nAvoid these issues by not allowing uprobes on LDR (literal) and LDRSW\n(literal), limiting the use of simulate_ldr_literal() and\nsimulate_ldrsw_literal() to kprobes. Attempts to place uprobes on LDR\n(literal) and LDRSW (literal) will be rejected as\narm_probe_decode_insn() will return INSN_REJECTED. In future we can\nconsider introducing working uprobes support for these instructions, but\nthis will require more significant work.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-50099",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/cc86f2e9876c8b5300238cec6bf0bd8c842078ee",
            "patch_url": "https://git.kernel.org/stable/p/cc86f2e9876c8b5300238cec6bf0bd8c842078ee",
            "filename": "CVE-2024-50099-cc86f2e9876c8b5300238cec6bf0bd8c842078ee.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50099/CVE-2024-50099-cc86f2e9876c8b5300238cec6bf0bd8c842078ee.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/20cde998315a3d2df08e26079a3ea7501abce6db",
                "patch_url": "https://git.kernel.org/stable/p/20cde998315a3d2df08e26079a3ea7501abce6db",
                "filename": "CVE-2024-50099-20cde998315a3d2df08e26079a3ea7501abce6db.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50099/CVE-2024-50099-20cde998315a3d2df08e26079a3ea7501abce6db.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3728b4eb27910ffedd173018279a970705f2e03a",
                "patch_url": "https://git.kernel.org/stable/p/3728b4eb27910ffedd173018279a970705f2e03a",
                "filename": "CVE-2024-50099-3728b4eb27910ffedd173018279a970705f2e03a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50099/CVE-2024-50099-3728b4eb27910ffedd173018279a970705f2e03a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9f1e7735474e7457a4d919a517900e46868ae5f6",
                "patch_url": "https://git.kernel.org/stable/p/9f1e7735474e7457a4d919a517900e46868ae5f6",
                "filename": "CVE-2024-50099-9f1e7735474e7457a4d919a517900e46868ae5f6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50099/CVE-2024-50099-9f1e7735474e7457a4d919a517900e46868ae5f6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/acc450aa07099d071b18174c22a1119c57da8227",
                "patch_url": "https://git.kernel.org/stable/p/acc450aa07099d071b18174c22a1119c57da8227",
                "filename": "CVE-2024-50099-acc450aa07099d071b18174c22a1119c57da8227.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50099/CVE-2024-50099-acc450aa07099d071b18174c22a1119c57da8227.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ad4bc35a6d22e9ff9b67d0d0c38bce654232f195",
                "patch_url": "https://git.kernel.org/stable/p/ad4bc35a6d22e9ff9b67d0d0c38bce654232f195",
                "filename": "CVE-2024-50099-ad4bc35a6d22e9ff9b67d0d0c38bce654232f195.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50099/CVE-2024-50099-ad4bc35a6d22e9ff9b67d0d0c38bce654232f195.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ae743deca78d9e4b7f4f60ad2f95e20e8ea057f9",
                "patch_url": "https://git.kernel.org/stable/p/ae743deca78d9e4b7f4f60ad2f95e20e8ea057f9",
                "filename": "CVE-2024-50099-ae743deca78d9e4b7f4f60ad2f95e20e8ea057f9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50099/CVE-2024-50099-ae743deca78d9e4b7f4f60ad2f95e20e8ea057f9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bae792617a7e911477f67a3aff850ad4ddf51572",
                "patch_url": "https://git.kernel.org/stable/p/bae792617a7e911477f67a3aff850ad4ddf51572",
                "filename": "CVE-2024-50099-bae792617a7e911477f67a3aff850ad4ddf51572.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50099/CVE-2024-50099-bae792617a7e911477f67a3aff850ad4ddf51572.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cc86f2e9876c8b5300238cec6bf0bd8c842078ee",
                "patch_url": "https://git.kernel.org/stable/p/cc86f2e9876c8b5300238cec6bf0bd8c842078ee",
                "filename": "CVE-2024-50099-cc86f2e9876c8b5300238cec6bf0bd8c842078ee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50099/CVE-2024-50099-cc86f2e9876c8b5300238cec6bf0bd8c842078ee.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/20cde998315a3d2df08e26079a3ea7501abce6db",
            "https://git.kernel.org/stable/c/3728b4eb27910ffedd173018279a970705f2e03a",
            "https://git.kernel.org/stable/c/9f1e7735474e7457a4d919a517900e46868ae5f6",
            "https://git.kernel.org/stable/c/acc450aa07099d071b18174c22a1119c57da8227",
            "https://git.kernel.org/stable/c/ad4bc35a6d22e9ff9b67d0d0c38bce654232f195",
            "https://git.kernel.org/stable/c/ae743deca78d9e4b7f4f60ad2f95e20e8ea057f9",
            "https://git.kernel.org/stable/c/bae792617a7e911477f67a3aff850ad4ddf51572",
            "https://git.kernel.org/stable/c/cc86f2e9876c8b5300238cec6bf0bd8c842078ee",
            "https://www.cve.org/CVERecord?id=CVE-2024-50099\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-50099\nhttps://lore.kernel.org/linux-cve-announce/2024110526-CVE-2024-50099-1758@gregkh/T"
        ]
    },
    "CVE-2024-50110": {
        "cve": "CVE-2024-50110",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: fix one more kernel-infoleak in algo dumping\n\nDuring fuzz testing, the following issue was discovered:\n\nBUG: KMSAN: kernel-infoleak in _copy_to_iter+0x598/0x2a30\n _copy_to_iter+0x598/0x2a30\n __skb_datagram_iter+0x168/0x1060\n skb_copy_datagram_iter+0x5b/0x220\n netlink_recvmsg+0x362/0x1700\n sock_recvmsg+0x2dc/0x390\n __sys_recvfrom+0x381/0x6d0\n __x64_sys_recvfrom+0x130/0x200\n x64_sys_call+0x32c8/0x3cc0\n do_syscall_64+0xd8/0x1c0\n entry_SYSCALL_64_after_hwframe+0x79/0x81\n\nUninit was stored to memory at:\n copy_to_user_state_extra+0xcc1/0x1e00\n dump_one_state+0x28c/0x5f0\n xfrm_state_walk+0x548/0x11e0\n xfrm_dump_sa+0x1e0/0x840\n netlink_dump+0x943/0x1c40\n __netlink_dump_start+0x746/0xdb0\n xfrm_user_rcv_msg+0x429/0xc00\n netlink_rcv_skb+0x613/0x780\n xfrm_netlink_rcv+0x77/0xc0\n netlink_unicast+0xe90/0x1280\n netlink_sendmsg+0x126d/0x1490\n __sock_sendmsg+0x332/0x3d0\n ____sys_sendmsg+0x863/0xc30\n ___sys_sendmsg+0x285/0x3e0\n __x64_sys_sendmsg+0x2d6/0x560\n x64_sys_call+0x1316/0x3cc0\n do_syscall_64+0xd8/0x1c0\n entry_SYSCALL_64_after_hwframe+0x79/0x81\n\nUninit was created at:\n __kmalloc+0x571/0xd30\n attach_auth+0x106/0x3e0\n xfrm_add_sa+0x2aa0/0x4230\n xfrm_user_rcv_msg+0x832/0xc00\n netlink_rcv_skb+0x613/0x780\n xfrm_netlink_rcv+0x77/0xc0\n netlink_unicast+0xe90/0x1280\n netlink_sendmsg+0x126d/0x1490\n __sock_sendmsg+0x332/0x3d0\n ____sys_sendmsg+0x863/0xc30\n ___sys_sendmsg+0x285/0x3e0\n __x64_sys_sendmsg+0x2d6/0x560\n x64_sys_call+0x1316/0x3cc0\n do_syscall_64+0xd8/0x1c0\n entry_SYSCALL_64_after_hwframe+0x79/0x81\n\nBytes 328-379 of 732 are uninitialized\nMemory access of size 732 starts at ffff88800e18e000\nData copied to user address 00007ff30f48aff0\n\nCPU: 2 PID: 18167 Comm: syz-executor.0 Not tainted 6.8.11 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n\nFixes copying of xfrm algorithms where some random\ndata of the structure fields can end up in userspace.\nPadding in structures may be filled with random (possibly sensitve)\ndata and should never be given directly to user-space.\n\nA similar issue was resolved in the commit\n8222d5910dae (\"xfrm: Zero padding when dumping algos and encap\")\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-50110",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1e8fbd2441cb2ea28d6825f2985bf7d84af060bb",
            "patch_url": "https://git.kernel.org/stable/p/1e8fbd2441cb2ea28d6825f2985bf7d84af060bb",
            "filename": "CVE-2024-50110-1e8fbd2441cb2ea28d6825f2985bf7d84af060bb.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50110/CVE-2024-50110-1e8fbd2441cb2ea28d6825f2985bf7d84af060bb.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1e8fbd2441cb2ea28d6825f2985bf7d84af060bb",
                "patch_url": "https://git.kernel.org/stable/p/1e8fbd2441cb2ea28d6825f2985bf7d84af060bb",
                "filename": "CVE-2024-50110-1e8fbd2441cb2ea28d6825f2985bf7d84af060bb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50110/CVE-2024-50110-1e8fbd2441cb2ea28d6825f2985bf7d84af060bb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/610d4cea9b442b22b4820695fc3335e64849725e",
                "patch_url": "https://git.kernel.org/stable/p/610d4cea9b442b22b4820695fc3335e64849725e",
                "filename": "CVE-2024-50110-610d4cea9b442b22b4820695fc3335e64849725e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50110/CVE-2024-50110-610d4cea9b442b22b4820695fc3335e64849725e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6889cd2a93e1e3606b3f6e958aa0924e836de4d2",
                "patch_url": "https://git.kernel.org/stable/p/6889cd2a93e1e3606b3f6e958aa0924e836de4d2",
                "filename": "CVE-2024-50110-6889cd2a93e1e3606b3f6e958aa0924e836de4d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50110/CVE-2024-50110-6889cd2a93e1e3606b3f6e958aa0924e836de4d2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c73bca72b84b453c8d26a5e7673b20adb294bf54",
                "patch_url": "https://git.kernel.org/stable/p/c73bca72b84b453c8d26a5e7673b20adb294bf54",
                "filename": "CVE-2024-50110-c73bca72b84b453c8d26a5e7673b20adb294bf54.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50110/CVE-2024-50110-c73bca72b84b453c8d26a5e7673b20adb294bf54.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dc2ad8e8818e4bf1a93db78d81745b4877b32972",
                "patch_url": "https://git.kernel.org/stable/p/dc2ad8e8818e4bf1a93db78d81745b4877b32972",
                "filename": "CVE-2024-50110-dc2ad8e8818e4bf1a93db78d81745b4877b32972.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50110/CVE-2024-50110-dc2ad8e8818e4bf1a93db78d81745b4877b32972.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1e8fbd2441cb2ea28d6825f2985bf7d84af060bb",
            "https://git.kernel.org/stable/c/610d4cea9b442b22b4820695fc3335e64849725e",
            "https://git.kernel.org/stable/c/6889cd2a93e1e3606b3f6e958aa0924e836de4d2",
            "https://git.kernel.org/stable/c/c73bca72b84b453c8d26a5e7673b20adb294bf54",
            "https://git.kernel.org/stable/c/dc2ad8e8818e4bf1a93db78d81745b4877b32972",
            "https://www.cve.org/CVERecord?id=CVE-2024-50110\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-50110\nhttps://lore.kernel.org/linux-cve-announce/2024110554-CVE-2024-50110-b4aa@gregkh/T"
        ]
    },
    "CVE-2024-50142": {
        "cve": "CVE-2024-50142",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: validate new SA's prefixlen using SA family when sel.family is unset\n\nThis expands the validation introduced in commit 07bf7908950a (\"xfrm:\nValidate address prefix lengths in the xfrm selector.\")\n\nsyzbot created an SA with\n    usersa.sel.family = AF_UNSPEC\n    usersa.sel.prefixlen_s = 128\n    usersa.family = AF_INET\n\nBecause of the AF_UNSPEC selector, verify_newsa_info doesn't put\nlimits on prefixlen_{s,d}. But then copy_from_user_state sets\nx->sel.family to usersa.family (AF_INET). Do the same conversion in\nverify_newsa_info before validating prefixlen_{s,d}, since that's how\nprefixlen is going to be used later on.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-50142",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/f31398570acf0f0804c644006f7bfa9067106b0a",
            "patch_url": "https://git.kernel.org/stable/p/f31398570acf0f0804c644006f7bfa9067106b0a",
            "filename": "CVE-2024-50142-f31398570acf0f0804c644006f7bfa9067106b0a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50142/CVE-2024-50142-f31398570acf0f0804c644006f7bfa9067106b0a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2d08a6c31c65f23db71a5385ee9cf9d8f9a67a71",
                "patch_url": "https://git.kernel.org/stable/p/2d08a6c31c65f23db71a5385ee9cf9d8f9a67a71",
                "filename": "CVE-2024-50142-2d08a6c31c65f23db71a5385ee9cf9d8f9a67a71.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50142/CVE-2024-50142-2d08a6c31c65f23db71a5385ee9cf9d8f9a67a71.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3f0ab59e6537c6a8f9e1b355b48f9c05a76e8563",
                "patch_url": "https://git.kernel.org/stable/p/3f0ab59e6537c6a8f9e1b355b48f9c05a76e8563",
                "filename": "CVE-2024-50142-3f0ab59e6537c6a8f9e1b355b48f9c05a76e8563.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50142/CVE-2024-50142-3f0ab59e6537c6a8f9e1b355b48f9c05a76e8563.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/401ad99a5ae7180dd9449eac104cb755f442e7f3",
                "patch_url": "https://git.kernel.org/stable/p/401ad99a5ae7180dd9449eac104cb755f442e7f3",
                "filename": "CVE-2024-50142-401ad99a5ae7180dd9449eac104cb755f442e7f3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50142/CVE-2024-50142-401ad99a5ae7180dd9449eac104cb755f442e7f3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7d9868180bd1e4cf37e7c5067362658971162366",
                "patch_url": "https://git.kernel.org/stable/p/7d9868180bd1e4cf37e7c5067362658971162366",
                "filename": "CVE-2024-50142-7d9868180bd1e4cf37e7c5067362658971162366.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50142/CVE-2024-50142-7d9868180bd1e4cf37e7c5067362658971162366.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8df5cd51fd70c33aa1776e5cbcd82b0a86649d73",
                "patch_url": "https://git.kernel.org/stable/p/8df5cd51fd70c33aa1776e5cbcd82b0a86649d73",
                "filename": "CVE-2024-50142-8df5cd51fd70c33aa1776e5cbcd82b0a86649d73.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50142/CVE-2024-50142-8df5cd51fd70c33aa1776e5cbcd82b0a86649d73.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bce1afaa212ec380bf971614f70909a27882b862",
                "patch_url": "https://git.kernel.org/stable/p/bce1afaa212ec380bf971614f70909a27882b862",
                "filename": "CVE-2024-50142-bce1afaa212ec380bf971614f70909a27882b862.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50142/CVE-2024-50142-bce1afaa212ec380bf971614f70909a27882b862.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e68dd80ba498265d2266b12dc3459164f4ff0c4a",
                "patch_url": "https://git.kernel.org/stable/p/e68dd80ba498265d2266b12dc3459164f4ff0c4a",
                "filename": "CVE-2024-50142-e68dd80ba498265d2266b12dc3459164f4ff0c4a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50142/CVE-2024-50142-e68dd80ba498265d2266b12dc3459164f4ff0c4a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f31398570acf0f0804c644006f7bfa9067106b0a",
                "patch_url": "https://git.kernel.org/stable/p/f31398570acf0f0804c644006f7bfa9067106b0a",
                "filename": "CVE-2024-50142-f31398570acf0f0804c644006f7bfa9067106b0a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50142/CVE-2024-50142-f31398570acf0f0804c644006f7bfa9067106b0a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2d08a6c31c65f23db71a5385ee9cf9d8f9a67a71",
            "https://git.kernel.org/stable/c/3f0ab59e6537c6a8f9e1b355b48f9c05a76e8563",
            "https://git.kernel.org/stable/c/401ad99a5ae7180dd9449eac104cb755f442e7f3",
            "https://git.kernel.org/stable/c/7d9868180bd1e4cf37e7c5067362658971162366",
            "https://git.kernel.org/stable/c/8df5cd51fd70c33aa1776e5cbcd82b0a86649d73",
            "https://git.kernel.org/stable/c/bce1afaa212ec380bf971614f70909a27882b862",
            "https://git.kernel.org/stable/c/e68dd80ba498265d2266b12dc3459164f4ff0c4a",
            "https://git.kernel.org/stable/c/f31398570acf0f0804c644006f7bfa9067106b0a",
            "https://www.cve.org/CVERecord?id=CVE-2024-50142\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-50142\nhttps://lore.kernel.org/linux-cve-announce/2024110743-CVE-2024-50142-e0dc@gregkh/T"
        ]
    },
    "CVE-2024-50154": {
        "cve": "CVE-2024-50154",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().\n\nMartin KaFai Lau reported use-after-free [0] in reqsk_timer_handler().\n\n  \"\"\"\n  We are seeing a use-after-free from a bpf prog attached to\n  trace_tcp_retransmit_synack. The program passes the req->sk to the\n  bpf_sk_storage_get_tracing kernel helper which does check for null\n  before using it.\n  \"\"\"\n\nThe commit 83fccfc3940c (\"inet: fix potential deadlock in\nreqsk_queue_unlink()\") added timer_pending() in reqsk_queue_unlink() not\nto call del_timer_sync() from reqsk_timer_handler(), but it introduced a\nsmall race window.\n\nBefore the timer is called, expire_timers() calls detach_timer(timer, true)\nto clear timer->entry.pprev and marks it as not pending.\n\nIf reqsk_queue_unlink() checks timer_pending() just after expire_timers()\ncalls detach_timer(), TCP will miss del_timer_sync(); the reqsk timer will\ncontinue running and send multiple SYN+ACKs until it expires.\n\nThe reported UAF could happen if req->sk is close()d earlier than the timer\nexpiration, which is 63s by default.\n\nThe scenario would be\n\n  1. inet_csk_complete_hashdance() calls inet_csk_reqsk_queue_drop(),\n     but del_timer_sync() is missed\n\n  2. reqsk timer is executed and scheduled again\n\n  3. req->sk is accept()ed and reqsk_put() decrements rsk_refcnt, but\n     reqsk timer still has another one, and inet_csk_accept() does not\n     clear req->sk for non-TFO sockets\n\n  4. sk is close()d\n\n  5. reqsk timer is executed again, and BPF touches req->sk\n\nLet's not use timer_pending() by passing the caller context to\n__inet_csk_reqsk_queue_drop().\n\nNote that reqsk timer is pinned, so the issue does not happen in most\nuse cases. [1]\n\n[0]\nBUG: KFENCE: use-after-free read in bpf_sk_storage_get_tracing+0x2e/0x1b0\n\nUse-after-free read at 0x00000000a891fb3a (in kfence-#1):\nbpf_sk_storage_get_tracing+0x2e/0x1b0\nbpf_prog_5ea3e95db6da0438_tcp_retransmit_synack+0x1d20/0x1dda\nbpf_trace_run2+0x4c/0xc0\ntcp_rtx_synack+0xf9/0x100\nreqsk_timer_handler+0xda/0x3d0\nrun_timer_softirq+0x292/0x8a0\nirq_exit_rcu+0xf5/0x320\nsysvec_apic_timer_interrupt+0x6d/0x80\nasm_sysvec_apic_timer_interrupt+0x16/0x20\nintel_idle_irq+0x5a/0xa0\ncpuidle_enter_state+0x94/0x273\ncpu_startup_entry+0x15e/0x260\nstart_secondary+0x8a/0x90\nsecondary_startup_64_no_verify+0xfa/0xfb\n\nkfence-#1: 0x00000000a72cc7b6-0x00000000d97616d9, size=2376, cache=TCPv6\n\nallocated by task 0 on cpu 9 at 260507.901592s:\nsk_prot_alloc+0x35/0x140\nsk_clone_lock+0x1f/0x3f0\ninet_csk_clone_lock+0x15/0x160\ntcp_create_openreq_child+0x1f/0x410\ntcp_v6_syn_recv_sock+0x1da/0x700\ntcp_check_req+0x1fb/0x510\ntcp_v6_rcv+0x98b/0x1420\nipv6_list_rcv+0x2258/0x26e0\nnapi_complete_done+0x5b1/0x2990\nmlx5e_napi_poll+0x2ae/0x8d0\nnet_rx_action+0x13e/0x590\nirq_exit_rcu+0xf5/0x320\ncommon_interrupt+0x80/0x90\nasm_common_interrupt+0x22/0x40\ncpuidle_enter_state+0xfb/0x273\ncpu_startup_entry+0x15e/0x260\nstart_secondary+0x8a/0x90\nsecondary_startup_64_no_verify+0xfa/0xfb\n\nfreed by task 0 on cpu 9 at 260507.927527s:\nrcu_core_si+0x4ff/0xf10\nirq_exit_rcu+0xf5/0x320\nsysvec_apic_timer_interrupt+0x6d/0x80\nasm_sysvec_apic_timer_interrupt+0x16/0x20\ncpuidle_enter_state+0xfb/0x273\ncpu_startup_entry+0x15e/0x260\nstart_secondary+0x8a/0x90\nsecondary_startup_64_no_verify+0xfa/0xfb",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-50154",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/106e457953315e476b3642ef24be25ed862aaba3",
            "patch_url": "https://git.kernel.org/stable/p/106e457953315e476b3642ef24be25ed862aaba3",
            "filename": "CVE-2024-50154-106e457953315e476b3642ef24be25ed862aaba3.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50154/CVE-2024-50154-106e457953315e476b3642ef24be25ed862aaba3.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/106e457953315e476b3642ef24be25ed862aaba3",
                "patch_url": "https://git.kernel.org/stable/p/106e457953315e476b3642ef24be25ed862aaba3",
                "filename": "CVE-2024-50154-106e457953315e476b3642ef24be25ed862aaba3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50154/CVE-2024-50154-106e457953315e476b3642ef24be25ed862aaba3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5071beb59ee416e8ab456ac8647a4dabcda823b1",
                "patch_url": "https://git.kernel.org/stable/p/5071beb59ee416e8ab456ac8647a4dabcda823b1",
                "filename": "CVE-2024-50154-5071beb59ee416e8ab456ac8647a4dabcda823b1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50154/CVE-2024-50154-5071beb59ee416e8ab456ac8647a4dabcda823b1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/51e34db64f4e43c7b055ccf881b7f3e0c31bb26d",
                "patch_url": "https://git.kernel.org/stable/p/51e34db64f4e43c7b055ccf881b7f3e0c31bb26d",
                "filename": "CVE-2024-50154-51e34db64f4e43c7b055ccf881b7f3e0c31bb26d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50154/CVE-2024-50154-51e34db64f4e43c7b055ccf881b7f3e0c31bb26d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8459d61fbf24967839a70235165673148c7c7f17",
                "patch_url": "https://git.kernel.org/stable/p/8459d61fbf24967839a70235165673148c7c7f17",
                "filename": "CVE-2024-50154-8459d61fbf24967839a70235165673148c7c7f17.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50154/CVE-2024-50154-8459d61fbf24967839a70235165673148c7c7f17.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/997ae8da14f1639ce6fb66a063dab54031cd61b3",
                "patch_url": "https://git.kernel.org/stable/p/997ae8da14f1639ce6fb66a063dab54031cd61b3",
                "filename": "CVE-2024-50154-997ae8da14f1639ce6fb66a063dab54031cd61b3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50154/CVE-2024-50154-997ae8da14f1639ce6fb66a063dab54031cd61b3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c964bf65f80a14288d767023a1b300b30f5b9cd0",
                "patch_url": "https://git.kernel.org/stable/p/c964bf65f80a14288d767023a1b300b30f5b9cd0",
                "filename": "CVE-2024-50154-c964bf65f80a14288d767023a1b300b30f5b9cd0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50154/CVE-2024-50154-c964bf65f80a14288d767023a1b300b30f5b9cd0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e8c526f2bdf1845bedaf6a478816a3d06fa78b8f",
                "patch_url": "https://git.kernel.org/stable/p/e8c526f2bdf1845bedaf6a478816a3d06fa78b8f",
                "filename": "CVE-2024-50154-e8c526f2bdf1845bedaf6a478816a3d06fa78b8f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50154/CVE-2024-50154-e8c526f2bdf1845bedaf6a478816a3d06fa78b8f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/106e457953315e476b3642ef24be25ed862aaba3",
            "https://git.kernel.org/stable/c/5071beb59ee416e8ab456ac8647a4dabcda823b1",
            "https://git.kernel.org/stable/c/51e34db64f4e43c7b055ccf881b7f3e0c31bb26d",
            "https://git.kernel.org/stable/c/8459d61fbf24967839a70235165673148c7c7f17",
            "https://git.kernel.org/stable/c/997ae8da14f1639ce6fb66a063dab54031cd61b3",
            "https://git.kernel.org/stable/c/c964bf65f80a14288d767023a1b300b30f5b9cd0",
            "https://git.kernel.org/stable/c/e8c526f2bdf1845bedaf6a478816a3d06fa78b8f",
            "https://www.cve.org/CVERecord?id=CVE-2024-50154\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-50154\nhttps://lore.kernel.org/linux-cve-announce/2024110745-CVE-2024-50154-0259@gregkh/T"
        ]
    },
    "CVE-2024-50192": {
        "cve": "CVE-2024-50192",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v4: Don't allow a VMOVP on a dying VPE\n\nKunkun Jiang reported that there is a small window of opportunity for\nuserspace to force a change of affinity for a VPE while the VPE has already\nbeen unmapped, but the corresponding doorbell interrupt still visible in\n/proc/irq/.\n\nPlug the race by checking the value of vmapp_count, which tracks whether\nthe VPE is mapped ot not, and returning an error in this case.\n\nThis involves making vmapp_count common to both GICv4.1 and its v4.0\nancestor.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-50192",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/64b12b061c5488e2d69e67c4eaae5da64fd30bfe",
            "patch_url": "https://git.kernel.org/stable/p/64b12b061c5488e2d69e67c4eaae5da64fd30bfe",
            "filename": "CVE-2024-50192-64b12b061c5488e2d69e67c4eaae5da64fd30bfe.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50192/CVE-2024-50192-64b12b061c5488e2d69e67c4eaae5da64fd30bfe.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/01282ab5182f85e42234df2ff42f0ce790f465ff",
                "patch_url": "https://git.kernel.org/stable/p/01282ab5182f85e42234df2ff42f0ce790f465ff",
                "filename": "CVE-2024-50192-01282ab5182f85e42234df2ff42f0ce790f465ff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50192/CVE-2024-50192-01282ab5182f85e42234df2ff42f0ce790f465ff.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1442ee0011983f0c5c4b92380e6853afb513841a",
                "patch_url": "https://git.kernel.org/stable/p/1442ee0011983f0c5c4b92380e6853afb513841a",
                "filename": "CVE-2024-50192-1442ee0011983f0c5c4b92380e6853afb513841a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50192/CVE-2024-50192-1442ee0011983f0c5c4b92380e6853afb513841a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/64b12b061c5488e2d69e67c4eaae5da64fd30bfe",
                "patch_url": "https://git.kernel.org/stable/p/64b12b061c5488e2d69e67c4eaae5da64fd30bfe",
                "filename": "CVE-2024-50192-64b12b061c5488e2d69e67c4eaae5da64fd30bfe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50192/CVE-2024-50192-64b12b061c5488e2d69e67c4eaae5da64fd30bfe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/755b9532c885b8761fb135fedcd705e21e61cccb",
                "patch_url": "https://git.kernel.org/stable/p/755b9532c885b8761fb135fedcd705e21e61cccb",
                "filename": "CVE-2024-50192-755b9532c885b8761fb135fedcd705e21e61cccb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50192/CVE-2024-50192-755b9532c885b8761fb135fedcd705e21e61cccb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7d7b7fc876f836f40bf48a87e07ea18756ba196",
                "patch_url": "https://git.kernel.org/stable/p/b7d7b7fc876f836f40bf48a87e07ea18756ba196",
                "filename": "CVE-2024-50192-b7d7b7fc876f836f40bf48a87e07ea18756ba196.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50192/CVE-2024-50192-b7d7b7fc876f836f40bf48a87e07ea18756ba196.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d960505a869e66184fff97fb334980a5b797c7c6",
                "patch_url": "https://git.kernel.org/stable/p/d960505a869e66184fff97fb334980a5b797c7c6",
                "filename": "CVE-2024-50192-d960505a869e66184fff97fb334980a5b797c7c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50192/CVE-2024-50192-d960505a869e66184fff97fb334980a5b797c7c6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/01282ab5182f85e42234df2ff42f0ce790f465ff",
            "https://git.kernel.org/stable/c/1442ee0011983f0c5c4b92380e6853afb513841a",
            "https://git.kernel.org/stable/c/64b12b061c5488e2d69e67c4eaae5da64fd30bfe",
            "https://git.kernel.org/stable/c/755b9532c885b8761fb135fedcd705e21e61cccb",
            "https://git.kernel.org/stable/c/b7d7b7fc876f836f40bf48a87e07ea18756ba196",
            "https://git.kernel.org/stable/c/d960505a869e66184fff97fb334980a5b797c7c6",
            "https://www.cve.org/CVERecord?id=CVE-2024-50192\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-50192\nhttps://git.kernel.org/pub/scm/linux/security/vulns.git/tree/cve/published/2024/.CVE-2024-50192mbox"
        ]
    },
    "CVE-2024-50256": {
        "cve": "CVE-2024-50256",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()\n\nI got a syzbot report without a repro [1] crashing in nf_send_reset6()\n\nI think the issue is that dev->hard_header_len is zero, and we attempt\nlater to push an Ethernet header.\n\nUse LL_MAX_HEADER, as other functions in net/ipv6/netfilter/nf_reject_ipv6.c.\n\n[1]\n\nskbuff: skb_under_panic: text:ffffffff89b1d008 len:74 put:14 head:ffff88803123aa00 data:ffff88803123a9f2 tail:0x3c end:0x140 dev:syz_tun\n kernel BUG at net/core/skbuff.c:206 !\nOops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\nCPU: 0 UID: 0 PID: 7373 Comm: syz.1.568 Not tainted 6.12.0-rc2-syzkaller-00631-g6d858708d465 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\n RIP: 0010:skb_panic net/core/skbuff.c:206 [inline]\n RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216\nCode: 0d 8d 48 c7 c6 60 a6 29 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 ba 30 38 02 48 83 c4 20 90 <0f> 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3\nRSP: 0018:ffffc900045269b0 EFLAGS: 00010282\nRAX: 0000000000000088 RBX: dffffc0000000000 RCX: cd66dacdc5d8e800\nRDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000000000000\nRBP: ffff88802d39a3d0 R08: ffffffff8174afec R09: 1ffff920008a4ccc\nR10: dffffc0000000000 R11: fffff520008a4ccd R12: 0000000000000140\nR13: ffff88803123aa00 R14: ffff88803123a9f2 R15: 000000000000003c\nFS:  00007fdbee5ff6c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000000 CR3: 000000005d322000 CR4: 00000000003526f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n  skb_push+0xe5/0x100 net/core/skbuff.c:2636\n  eth_header+0x38/0x1f0 net/ethernet/eth.c:83\n  dev_hard_header include/linux/netdevice.h:3208 [inline]\n  nf_send_reset6+0xce6/0x1270 net/ipv6/netfilter/nf_reject_ipv6.c:358\n  nft_reject_inet_eval+0x3b9/0x690 net/netfilter/nft_reject_inet.c:48\n  expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n  nft_do_chain+0x4ad/0x1da0 net/netfilter/nf_tables_core.c:288\n  nft_do_chain_inet+0x418/0x6b0 net/netfilter/nft_chain_filter.c:161\n  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n  nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626\n  nf_hook include/linux/netfilter.h:269 [inline]\n  NF_HOOK include/linux/netfilter.h:312 [inline]\n  br_nf_pre_routing_ipv6+0x63e/0x770 net/bridge/br_netfilter_ipv6.c:184\n  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n  nf_hook_bridge_pre net/bridge/br_input.c:277 [inline]\n  br_handle_frame+0x9fd/0x1530 net/bridge/br_input.c:424\n  __netif_receive_skb_core+0x13e8/0x4570 net/core/dev.c:5562\n  __netif_receive_skb_one_core net/core/dev.c:5666 [inline]\n  __netif_receive_skb+0x12f/0x650 net/core/dev.c:5781\n  netif_receive_skb_internal net/core/dev.c:5867 [inline]\n  netif_receive_skb+0x1e8/0x890 net/core/dev.c:5926\n  tun_rx_batched+0x1b7/0x8f0 drivers/net/tun.c:1550\n  tun_get_user+0x3056/0x47e0 drivers/net/tun.c:2007\n  tun_chr_write_iter+0x10d/0x1f0 drivers/net/tun.c:2053\n  new_sync_write fs/read_write.c:590 [inline]\n  vfs_write+0xa6d/0xc90 fs/read_write.c:683\n  ksys_write+0x183/0x2b0 fs/read_write.c:736\n  do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fdbeeb7d1ff\nCode: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48\nRSP: 002b:00007fdbee5ff000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00007fdbeed36058 RCX: 00007fdbeeb7d1ff\nRDX: 000000000000008e RSI: 0000000020000040 RDI: 00000000000000c8\nRBP: 00007fdbeebf12be R08: 0000000\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-50256",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4ed234fe793f27a3b151c43d2106df2ff0d81aac",
            "patch_url": "https://git.kernel.org/stable/p/4ed234fe793f27a3b151c43d2106df2ff0d81aac",
            "filename": "CVE-2024-50256-4ed234fe793f27a3b151c43d2106df2ff0d81aac.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50256/CVE-2024-50256-4ed234fe793f27a3b151c43d2106df2ff0d81aac.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4ed234fe793f27a3b151c43d2106df2ff0d81aac",
                "patch_url": "https://git.kernel.org/stable/p/4ed234fe793f27a3b151c43d2106df2ff0d81aac",
                "filename": "CVE-2024-50256-4ed234fe793f27a3b151c43d2106df2ff0d81aac.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50256/CVE-2024-50256-4ed234fe793f27a3b151c43d2106df2ff0d81aac.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f7b586aae53c2ed820661803da8ce18b1361921",
                "patch_url": "https://git.kernel.org/stable/p/4f7b586aae53c2ed820661803da8ce18b1361921",
                "filename": "CVE-2024-50256-4f7b586aae53c2ed820661803da8ce18b1361921.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50256/CVE-2024-50256-4f7b586aae53c2ed820661803da8ce18b1361921.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f85b057e34419e5ec0583a65078a11ccc1d4540a",
                "patch_url": "https://git.kernel.org/stable/p/f85b057e34419e5ec0583a65078a11ccc1d4540a",
                "filename": "CVE-2024-50256-f85b057e34419e5ec0583a65078a11ccc1d4540a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50256/CVE-2024-50256-f85b057e34419e5ec0583a65078a11ccc1d4540a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fef63832317d9d24e1214cdd8f204d02ebdf8499",
                "patch_url": "https://git.kernel.org/stable/p/fef63832317d9d24e1214cdd8f204d02ebdf8499",
                "filename": "CVE-2024-50256-fef63832317d9d24e1214cdd8f204d02ebdf8499.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50256/CVE-2024-50256-fef63832317d9d24e1214cdd8f204d02ebdf8499.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4ed234fe793f27a3b151c43d2106df2ff0d81aac",
            "https://git.kernel.org/stable/c/4f7b586aae53c2ed820661803da8ce18b1361921",
            "https://git.kernel.org/stable/c/f85b057e34419e5ec0583a65078a11ccc1d4540a",
            "https://git.kernel.org/stable/c/fef63832317d9d24e1214cdd8f204d02ebdf8499",
            "https://www.cve.org/CVERecord?id=CVE-2024-50256\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-50256\nhttps://lore.kernel.org/linux-cve-announce/2024110938-CVE-2024-50256-5b66@gregkh/T"
        ]
    },
    "CVE-2024-50264": {
        "cve": "CVE-2024-50264",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: Initialization of the dangling pointer occurring in vsk->trans\n\nDuring loopback communication, a dangling pointer can be created in\nvsk->trans, potentially leading to a Use-After-Free condition.  This\nissue is resolved by initializing vsk->trans to NULL.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-50264",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/fd8ae346692a56b4437d626c5460c7104980f389",
            "patch_url": "https://git.kernel.org/stable/p/fd8ae346692a56b4437d626c5460c7104980f389",
            "filename": "CVE-2024-50264-fd8ae346692a56b4437d626c5460c7104980f389.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50264/CVE-2024-50264-fd8ae346692a56b4437d626c5460c7104980f389.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2a6a4e69f255b7aed17f93995691ab4f0d3c2203",
                "patch_url": "https://git.kernel.org/stable/p/2a6a4e69f255b7aed17f93995691ab4f0d3c2203",
                "filename": "CVE-2024-50264-2a6a4e69f255b7aed17f93995691ab4f0d3c2203.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50264/CVE-2024-50264-2a6a4e69f255b7aed17f93995691ab4f0d3c2203.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/44d29897eafd0e1196453d3003a4d5e0b968eeab",
                "patch_url": "https://git.kernel.org/stable/p/44d29897eafd0e1196453d3003a4d5e0b968eeab",
                "filename": "CVE-2024-50264-44d29897eafd0e1196453d3003a4d5e0b968eeab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50264/CVE-2024-50264-44d29897eafd0e1196453d3003a4d5e0b968eeab.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5f092a4271f6dccf88fe0d132475a17b69ef71df",
                "patch_url": "https://git.kernel.org/stable/p/5f092a4271f6dccf88fe0d132475a17b69ef71df",
                "filename": "CVE-2024-50264-5f092a4271f6dccf88fe0d132475a17b69ef71df.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50264/CVE-2024-50264-5f092a4271f6dccf88fe0d132475a17b69ef71df.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5f970935d09934222fdef3d0e20c648ea7a963c1",
                "patch_url": "https://git.kernel.org/stable/p/5f970935d09934222fdef3d0e20c648ea7a963c1",
                "filename": "CVE-2024-50264-5f970935d09934222fdef3d0e20c648ea7a963c1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50264/CVE-2024-50264-5f970935d09934222fdef3d0e20c648ea7a963c1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6ca575374dd9a507cdd16dfa0e78c2e9e20bd05f",
                "patch_url": "https://git.kernel.org/stable/p/6ca575374dd9a507cdd16dfa0e78c2e9e20bd05f",
                "filename": "CVE-2024-50264-6ca575374dd9a507cdd16dfa0e78c2e9e20bd05f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50264/CVE-2024-50264-6ca575374dd9a507cdd16dfa0e78c2e9e20bd05f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b110196fec44fe966952004bd426967c2a8fd358",
                "patch_url": "https://git.kernel.org/stable/p/b110196fec44fe966952004bd426967c2a8fd358",
                "filename": "CVE-2024-50264-b110196fec44fe966952004bd426967c2a8fd358.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50264/CVE-2024-50264-b110196fec44fe966952004bd426967c2a8fd358.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eb1bdcb7dfc30b24495ee4c5533af0ed135cb5f1",
                "patch_url": "https://git.kernel.org/stable/p/eb1bdcb7dfc30b24495ee4c5533af0ed135cb5f1",
                "filename": "CVE-2024-50264-eb1bdcb7dfc30b24495ee4c5533af0ed135cb5f1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50264/CVE-2024-50264-eb1bdcb7dfc30b24495ee4c5533af0ed135cb5f1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fd8ae346692a56b4437d626c5460c7104980f389",
                "patch_url": "https://git.kernel.org/stable/p/fd8ae346692a56b4437d626c5460c7104980f389",
                "filename": "CVE-2024-50264-fd8ae346692a56b4437d626c5460c7104980f389.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50264/CVE-2024-50264-fd8ae346692a56b4437d626c5460c7104980f389.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2a6a4e69f255b7aed17f93995691ab4f0d3c2203",
            "https://git.kernel.org/stable/c/44d29897eafd0e1196453d3003a4d5e0b968eeab",
            "https://git.kernel.org/stable/c/5f092a4271f6dccf88fe0d132475a17b69ef71df",
            "https://git.kernel.org/stable/c/5f970935d09934222fdef3d0e20c648ea7a963c1",
            "https://git.kernel.org/stable/c/6ca575374dd9a507cdd16dfa0e78c2e9e20bd05f",
            "https://git.kernel.org/stable/c/b110196fec44fe966952004bd426967c2a8fd358",
            "https://git.kernel.org/stable/c/eb1bdcb7dfc30b24495ee4c5533af0ed135cb5f1",
            "https://git.kernel.org/stable/c/fd8ae346692a56b4437d626c5460c7104980f389",
            "https://www.cve.org/CVERecord?id=CVE-2024-50264\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-50264\nhttps://lore.kernel.org/linux-cve-announce/2024111920-CVE-2024-50264-0889@gregkh/T"
        ]
    },
    "CVE-2024-50275": {
        "cve": "CVE-2024-50275",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/sve: Discard stale CPU state when handling SVE traps\n\nThe logic for handling SVE traps manipulates saved FPSIMD/SVE state\nincorrectly, and a race with preemption can result in a task having\nTIF_SVE set and TIF_FOREIGN_FPSTATE clear even though the live CPU state\nis stale (e.g. with SVE traps enabled). This has been observed to result\nin warnings from do_sve_acc() where SVE traps are not expected while\nTIF_SVE is set:\n\n|         if (test_and_set_thread_flag(TIF_SVE))\n|                 WARN_ON(1); /* SVE access shouldn't have trapped */\n\nWarnings of this form have been reported intermittently, e.g.\n\n  https://lore.kernel.org/linux-arm-kernel/CA+G9fYtEGe_DhY2Ms7+L7NKsLYUomGsgqpdBj+QwDLeSg=JhGg@mail.gmail.com/\n  https://lore.kernel.org/linux-arm-kernel/000000000000511e9a060ce5a45c@google.com/\n\nThe race can occur when the SVE trap handler is preempted before and\nafter manipulating the saved FPSIMD/SVE state, starting and ending on\nthe same CPU, e.g.\n\n| void do_sve_acc(unsigned long esr, struct pt_regs *regs)\n| {\n|         // Trap on CPU 0 with TIF_SVE clear, SVE traps enabled\n|         // task->fpsimd_cpu is 0.\n|         // per_cpu_ptr(&fpsimd_last_state, 0) is task.\n|\n|         ...\n|\n|         // Preempted; migrated from CPU 0 to CPU 1.\n|         // TIF_FOREIGN_FPSTATE is set.\n|\n|         get_cpu_fpsimd_context();\n|\n|         if (test_and_set_thread_flag(TIF_SVE))\n|                 WARN_ON(1); /* SVE access shouldn't have trapped */\n|\n|         sve_init_regs() {\n|                 if (!test_thread_flag(TIF_FOREIGN_FPSTATE)) {\n|                         ...\n|                 } else {\n|                         fpsimd_to_sve(current);\n|                         current->thread.fp_type = FP_STATE_SVE;\n|                 }\n|         }\n|\n|         put_cpu_fpsimd_context();\n|\n|         // Preempted; migrated from CPU 1 to CPU 0.\n|         // task->fpsimd_cpu is still 0\n|         // If per_cpu_ptr(&fpsimd_last_state, 0) is still task then:\n|         // - Stale HW state is reused (with SVE traps enabled)\n|         // - TIF_FOREIGN_FPSTATE is cleared\n|         // - A return to userspace skips HW state restore\n| }\n\nFix the case where the state is not live and TIF_FOREIGN_FPSTATE is set\nby calling fpsimd_flush_task_state() to detach from the saved CPU\nstate. This ensures that a subsequent context switch will not reuse the\nstale CPU state, and will instead set TIF_FOREIGN_FPSTATE, forcing the\nnew state to be reloaded from memory prior to a return to userspace.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-50275",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/51d3d80a6dc314982a9a0aeb0961085922a1aa15",
            "patch_url": "https://git.kernel.org/stable/p/51d3d80a6dc314982a9a0aeb0961085922a1aa15",
            "filename": "CVE-2024-50275-51d3d80a6dc314982a9a0aeb0961085922a1aa15.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50275/CVE-2024-50275-51d3d80a6dc314982a9a0aeb0961085922a1aa15.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/51d11ea0250d6ee461987403bbfd4b2abb5613a7",
                "patch_url": "https://git.kernel.org/stable/p/51d11ea0250d6ee461987403bbfd4b2abb5613a7",
                "filename": "CVE-2024-50275-51d11ea0250d6ee461987403bbfd4b2abb5613a7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50275/CVE-2024-50275-51d11ea0250d6ee461987403bbfd4b2abb5613a7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/51d3d80a6dc314982a9a0aeb0961085922a1aa15",
                "patch_url": "https://git.kernel.org/stable/p/51d3d80a6dc314982a9a0aeb0961085922a1aa15",
                "filename": "CVE-2024-50275-51d3d80a6dc314982a9a0aeb0961085922a1aa15.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50275/CVE-2024-50275-51d3d80a6dc314982a9a0aeb0961085922a1aa15.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/751ecf6afd6568adc98f2a6052315552c0483d18",
                "patch_url": "https://git.kernel.org/stable/p/751ecf6afd6568adc98f2a6052315552c0483d18",
                "filename": "CVE-2024-50275-751ecf6afd6568adc98f2a6052315552c0483d18.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50275/CVE-2024-50275-751ecf6afd6568adc98f2a6052315552c0483d18.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/de529504b3274d57caf8f66800b714b0d3ee235a",
                "patch_url": "https://git.kernel.org/stable/p/de529504b3274d57caf8f66800b714b0d3ee235a",
                "filename": "CVE-2024-50275-de529504b3274d57caf8f66800b714b0d3ee235a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50275/CVE-2024-50275-de529504b3274d57caf8f66800b714b0d3ee235a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fa9ce027b3ce37a2bb173bf2553b5caa438fd8c9",
                "patch_url": "https://git.kernel.org/stable/p/fa9ce027b3ce37a2bb173bf2553b5caa438fd8c9",
                "filename": "CVE-2024-50275-fa9ce027b3ce37a2bb173bf2553b5caa438fd8c9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50275/CVE-2024-50275-fa9ce027b3ce37a2bb173bf2553b5caa438fd8c9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/51d11ea0250d6ee461987403bbfd4b2abb5613a7",
            "https://git.kernel.org/stable/c/51d3d80a6dc314982a9a0aeb0961085922a1aa15",
            "https://git.kernel.org/stable/c/751ecf6afd6568adc98f2a6052315552c0483d18",
            "https://git.kernel.org/stable/c/de529504b3274d57caf8f66800b714b0d3ee235a",
            "https://git.kernel.org/stable/c/fa9ce027b3ce37a2bb173bf2553b5caa438fd8c9",
            "https://lore.kernel.org/linux-arm-kernel/",
            "https://lore.kernel.org/linux-arm-kernel/CA+G9fYtEGe_DhY2Ms7+L7NKsLYUomGsgqpdBj+QwDLeSg=JhGg@mail.gmail.com/",
            "https://www.cve.org/CVERecord?id=CVE-2024-50275\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-50275\nhttps://lore.kernel.org/linux-cve-announce/2024111934-CVE-2024-50275-2e49@gregkh/T"
        ]
    },
    "CVE-2024-50301": {
        "cve": "CVE-2024-50301",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsecurity/keys: fix slab-out-of-bounds in key_task_permission\n\nKASAN reports an out of bounds read:\nBUG: KASAN: slab-out-of-bounds in __kuid_val include/linux/uidgid.h:36\nBUG: KASAN: slab-out-of-bounds in uid_eq include/linux/uidgid.h:63 [inline]\nBUG: KASAN: slab-out-of-bounds in key_task_permission+0x394/0x410\nsecurity/keys/permission.c:54\nRead of size 4 at addr ffff88813c3ab618 by task stress-ng/4362\n\nCPU: 2 PID: 4362 Comm: stress-ng Not tainted 5.10.0-14930-gafbffd6c3ede #15\nCall Trace:\n __dump_stack lib/dump_stack.c:82 [inline]\n dump_stack+0x107/0x167 lib/dump_stack.c:123\n print_address_description.constprop.0+0x19/0x170 mm/kasan/report.c:400\n __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560\n kasan_report+0x3a/0x50 mm/kasan/report.c:585\n __kuid_val include/linux/uidgid.h:36 [inline]\n uid_eq include/linux/uidgid.h:63 [inline]\n key_task_permission+0x394/0x410 security/keys/permission.c:54\n search_nested_keyrings+0x90e/0xe90 security/keys/keyring.c:793\n\nThis issue was also reported by syzbot.\n\nIt can be reproduced by following these steps(more details [1]):\n1. Obtain more than 32 inputs that have similar hashes, which ends with the\n   pattern '0xxxxxxxe6'.\n2. Reboot and add the keys obtained in step 1.\n\nThe reproducer demonstrates how this issue happened:\n1. In the search_nested_keyrings function, when it iterates through the\n   slots in a node(below tag ascend_to_node), if the slot pointer is meta\n   and node->back_pointer != NULL(it means a root), it will proceed to\n   descend_to_node. However, there is an exception. If node is the root,\n   and one of the slots points to a shortcut, it will be treated as a\n   keyring.\n2. Whether the ptr is keyring decided by keyring_ptr_is_keyring function.\n   However, KEYRING_PTR_SUBTYPE is 0x2UL, the same as\n   ASSOC_ARRAY_PTR_SUBTYPE_MASK.\n3. When 32 keys with the similar hashes are added to the tree, the ROOT\n   has keys with hashes that are not similar (e.g. slot 0) and it splits\n   NODE A without using a shortcut. When NODE A is filled with keys that\n   all hashes are xxe6, the keys are similar, NODE A will split with a\n   shortcut. Finally, it forms the tree as shown below, where slot 6 points\n   to a shortcut.\n\n                      NODE A\n              +------>+---+\n      ROOT    |       | 0 | xxe6\n      +---+   |       +---+\n xxxx | 0 | shortcut  :   : xxe6\n      +---+   |       +---+\n xxe6 :   :   |       |   | xxe6\n      +---+   |       +---+\n      | 6 |---+       :   : xxe6\n      +---+           +---+\n xxe6 :   :           | f | xxe6\n      +---+           +---+\n xxe6 | f |\n      +---+\n\n4. As mentioned above, If a slot(slot 6) of the root points to a shortcut,\n   it may be mistakenly transferred to a key*, leading to a read\n   out-of-bounds read.\n\nTo fix this issue, one should jump to descend_to_node if the ptr is a\nshortcut, regardless of whether the node is root or not.\n\n[1] https://lore.kernel.org/linux-kernel/1cfa878e-8c7b-4570-8606-21daf5e13ce7@huaweicloud.com/\n\n[jarkko: tweaked the commit message a bit to have an appropriate closes\n tag.]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-50301",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/c3ce634ad953ce48c75c39bdfd8b711dd95f346f",
            "patch_url": "https://git.kernel.org/stable/p/c3ce634ad953ce48c75c39bdfd8b711dd95f346f",
            "filename": "CVE-2024-50301-c3ce634ad953ce48c75c39bdfd8b711dd95f346f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50301/CVE-2024-50301-c3ce634ad953ce48c75c39bdfd8b711dd95f346f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/199c20fb7499c79557a075dc24e9a7dae7d9f1ce",
                "patch_url": "https://git.kernel.org/stable/p/199c20fb7499c79557a075dc24e9a7dae7d9f1ce",
                "filename": "CVE-2024-50301-199c20fb7499c79557a075dc24e9a7dae7d9f1ce.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50301/CVE-2024-50301-199c20fb7499c79557a075dc24e9a7dae7d9f1ce.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1e4332581cd4eed75aea77af6f66cdcdda8b49b9",
                "patch_url": "https://git.kernel.org/stable/p/1e4332581cd4eed75aea77af6f66cdcdda8b49b9",
                "filename": "CVE-2024-50301-1e4332581cd4eed75aea77af6f66cdcdda8b49b9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50301/CVE-2024-50301-1e4332581cd4eed75aea77af6f66cdcdda8b49b9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3e79ad156bedf2da0ab909a118d2cec6c9c22b79",
                "patch_url": "https://git.kernel.org/stable/p/3e79ad156bedf2da0ab909a118d2cec6c9c22b79",
                "filename": "CVE-2024-50301-3e79ad156bedf2da0ab909a118d2cec6c9c22b79.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50301/CVE-2024-50301-3e79ad156bedf2da0ab909a118d2cec6c9c22b79.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4a74da044ec9ec8679e6beccc4306b936b62873f",
                "patch_url": "https://git.kernel.org/stable/p/4a74da044ec9ec8679e6beccc4306b936b62873f",
                "filename": "CVE-2024-50301-4a74da044ec9ec8679e6beccc4306b936b62873f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50301/CVE-2024-50301-4a74da044ec9ec8679e6beccc4306b936b62873f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4efb69a0e294ef201bcdf7ce3d6202cd0a545a5d",
                "patch_url": "https://git.kernel.org/stable/p/4efb69a0e294ef201bcdf7ce3d6202cd0a545a5d",
                "filename": "CVE-2024-50301-4efb69a0e294ef201bcdf7ce3d6202cd0a545a5d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50301/CVE-2024-50301-4efb69a0e294ef201bcdf7ce3d6202cd0a545a5d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bbad2d5b6c99db468d8f88b6ba6a56ed409b4881",
                "patch_url": "https://git.kernel.org/stable/p/bbad2d5b6c99db468d8f88b6ba6a56ed409b4881",
                "filename": "CVE-2024-50301-bbad2d5b6c99db468d8f88b6ba6a56ed409b4881.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50301/CVE-2024-50301-bbad2d5b6c99db468d8f88b6ba6a56ed409b4881.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c3ce634ad953ce48c75c39bdfd8b711dd95f346f",
                "patch_url": "https://git.kernel.org/stable/p/c3ce634ad953ce48c75c39bdfd8b711dd95f346f",
                "filename": "CVE-2024-50301-c3ce634ad953ce48c75c39bdfd8b711dd95f346f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50301/CVE-2024-50301-c3ce634ad953ce48c75c39bdfd8b711dd95f346f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e0a317ad68e4ea48a0158187238c5407e4fdec8b",
                "patch_url": "https://git.kernel.org/stable/p/e0a317ad68e4ea48a0158187238c5407e4fdec8b",
                "filename": "CVE-2024-50301-e0a317ad68e4ea48a0158187238c5407e4fdec8b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50301/CVE-2024-50301-e0a317ad68e4ea48a0158187238c5407e4fdec8b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/199c20fb7499c79557a075dc24e9a7dae7d9f1ce",
            "https://git.kernel.org/stable/c/1e4332581cd4eed75aea77af6f66cdcdda8b49b9",
            "https://git.kernel.org/stable/c/3e79ad156bedf2da0ab909a118d2cec6c9c22b79",
            "https://git.kernel.org/stable/c/4a74da044ec9ec8679e6beccc4306b936b62873f",
            "https://git.kernel.org/stable/c/4efb69a0e294ef201bcdf7ce3d6202cd0a545a5d",
            "https://git.kernel.org/stable/c/bbad2d5b6c99db468d8f88b6ba6a56ed409b4881",
            "https://git.kernel.org/stable/c/c3ce634ad953ce48c75c39bdfd8b711dd95f346f",
            "https://git.kernel.org/stable/c/e0a317ad68e4ea48a0158187238c5407e4fdec8b",
            "https://lore.kernel.org/linux-kernel/",
            "https://www.cve.org/CVERecord?id=CVE-2024-50301\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-50301\nhttps://lore.kernel.org/linux-cve-announce/2024111907-CVE-2024-50301-ec76@gregkh/T"
        ]
    },
    "CVE-2024-50302": {
        "cve": "CVE-2024-50302",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: zero-initialize the report buffer\n\nSince the report buffer is used by all kinds of drivers in various ways, let's\nzero-initialize it during allocation to make sure that it can't be ever used\nto leak kernel memory via specially-crafted report.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-50302",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3f9e88f2672c4635960570ee9741778d4135ecf5",
            "patch_url": "https://git.kernel.org/stable/p/3f9e88f2672c4635960570ee9741778d4135ecf5",
            "filename": "CVE-2024-50302-3f9e88f2672c4635960570ee9741778d4135ecf5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50302/CVE-2024-50302-3f9e88f2672c4635960570ee9741778d4135ecf5.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/05ade5d4337867929e7ef664e7ac8e0c734f1aaf",
                "patch_url": "https://git.kernel.org/stable/p/05ade5d4337867929e7ef664e7ac8e0c734f1aaf",
                "filename": "CVE-2024-50302-05ade5d4337867929e7ef664e7ac8e0c734f1aaf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50302/CVE-2024-50302-05ade5d4337867929e7ef664e7ac8e0c734f1aaf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/177f25d1292c7e16e1199b39c85480f7f8815552",
                "patch_url": "https://git.kernel.org/stable/p/177f25d1292c7e16e1199b39c85480f7f8815552",
                "filename": "CVE-2024-50302-177f25d1292c7e16e1199b39c85480f7f8815552.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50302/CVE-2024-50302-177f25d1292c7e16e1199b39c85480f7f8815552.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1884ab3d22536a5c14b17c78c2ce76d1734e8b0b",
                "patch_url": "https://git.kernel.org/stable/p/1884ab3d22536a5c14b17c78c2ce76d1734e8b0b",
                "filename": "CVE-2024-50302-1884ab3d22536a5c14b17c78c2ce76d1734e8b0b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50302/CVE-2024-50302-1884ab3d22536a5c14b17c78c2ce76d1734e8b0b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3f9e88f2672c4635960570ee9741778d4135ecf5",
                "patch_url": "https://git.kernel.org/stable/p/3f9e88f2672c4635960570ee9741778d4135ecf5",
                "filename": "CVE-2024-50302-3f9e88f2672c4635960570ee9741778d4135ecf5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50302/CVE-2024-50302-3f9e88f2672c4635960570ee9741778d4135ecf5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/492015e6249fbcd42138b49de3c588d826dd9648",
                "patch_url": "https://git.kernel.org/stable/p/492015e6249fbcd42138b49de3c588d826dd9648",
                "filename": "CVE-2024-50302-492015e6249fbcd42138b49de3c588d826dd9648.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50302/CVE-2024-50302-492015e6249fbcd42138b49de3c588d826dd9648.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9d9f5c75c0c7f31766ec27d90f7a6ac673193191",
                "patch_url": "https://git.kernel.org/stable/p/9d9f5c75c0c7f31766ec27d90f7a6ac673193191",
                "filename": "CVE-2024-50302-9d9f5c75c0c7f31766ec27d90f7a6ac673193191.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50302/CVE-2024-50302-9d9f5c75c0c7f31766ec27d90f7a6ac673193191.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d7dc68d82ab3fcfc3f65322465da3d7031d4ab46",
                "patch_url": "https://git.kernel.org/stable/p/d7dc68d82ab3fcfc3f65322465da3d7031d4ab46",
                "filename": "CVE-2024-50302-d7dc68d82ab3fcfc3f65322465da3d7031d4ab46.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50302/CVE-2024-50302-d7dc68d82ab3fcfc3f65322465da3d7031d4ab46.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e7ea60184e1e88a3c9e437b3265cbb6439aa7e26",
                "patch_url": "https://git.kernel.org/stable/p/e7ea60184e1e88a3c9e437b3265cbb6439aa7e26",
                "filename": "CVE-2024-50302-e7ea60184e1e88a3c9e437b3265cbb6439aa7e26.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50302/CVE-2024-50302-e7ea60184e1e88a3c9e437b3265cbb6439aa7e26.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/05ade5d4337867929e7ef664e7ac8e0c734f1aaf",
            "https://git.kernel.org/stable/c/177f25d1292c7e16e1199b39c85480f7f8815552",
            "https://git.kernel.org/stable/c/1884ab3d22536a5c14b17c78c2ce76d1734e8b0b",
            "https://git.kernel.org/stable/c/3f9e88f2672c4635960570ee9741778d4135ecf5",
            "https://git.kernel.org/stable/c/492015e6249fbcd42138b49de3c588d826dd9648",
            "https://git.kernel.org/stable/c/9d9f5c75c0c7f31766ec27d90f7a6ac673193191",
            "https://git.kernel.org/stable/c/d7dc68d82ab3fcfc3f65322465da3d7031d4ab46",
            "https://git.kernel.org/stable/c/e7ea60184e1e88a3c9e437b3265cbb6439aa7e26",
            "https://www.cve.org/CVERecord?id=CVE-2024-50302\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-50302\nhttps://lore.kernel.org/linux-cve-announce/2024111908-CVE-2024-50302-f677@gregkh/T\nhttps://securitylab.amnesty.org/latest/2025/02/cellebrite-zero-day-exploit-used-to-target-phone-of-serbian-student-activist/\nhttps://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        ]
    },
    "CVE-2024-50602": {
        "cve": "CVE-2024-50602",
        "cvss_v2": null,
        "cvss_v3": 5.9,
        "description": "An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-50602",
        "selected_patch": {
            "url": "https://github.com/libexpat/libexpat/pull/915",
            "patch_url": "https://github.com/libexpat/libexpat/pull/915.patch",
            "filename": "CVE-2024-50602-https___github_com_libexpat_libexpat_pull_915_patch.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50602/CVE-2024-50602-https___github_com_libexpat_libexpat_pull_915_patch.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/libexpat/libexpat/pull/915",
                "patch_url": "https://github.com/libexpat/libexpat/pull/915.patch",
                "filename": "CVE-2024-50602-https___github_com_libexpat_libexpat_pull_915_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-50602/CVE-2024-50602-https___github_com_libexpat_libexpat_pull_915_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/libexpat/libexpat/pull/915"
        ]
    },
    "CVE-2024-52337": {
        "cve": "CVE-2024-52337",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-52337",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-52533": {
        "cve": "CVE-2024-52533",
        "cvss_v2": null,
        "cvss_v3": 9.8,
        "description": "gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\\0' character.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-52533",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-53064": {
        "cve": "CVE-2024-53064",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix idpf_vc_core_init error path\n\nIn an event where the platform running the device control plane\nis rebooted, reset is detected on the driver. It releases\nall the resources and waits for the reset to complete. Once the\nreset is done, it tries to build the resources back. At this\ntime if the device control plane is not yet started, then\nthe driver timeouts on the virtchnl message and retries to\nestablish the mailbox again.\n\nIn the retry flow, mailbox is deinitialized but the mailbox\nworkqueue is still alive and polling for the mailbox message.\nThis results in accessing the released control queue leading to\nnull-ptr-deref. Fix it by unrolling the work queue cancellation\nand mailbox deinitialization in the reverse order which they got\ninitialized.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-53064",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/683fcd90ba22507ebeb1921a26dfe77efff8c266",
            "patch_url": "https://git.kernel.org/stable/p/683fcd90ba22507ebeb1921a26dfe77efff8c266",
            "filename": "CVE-2024-53064-683fcd90ba22507ebeb1921a26dfe77efff8c266.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53064/CVE-2024-53064-683fcd90ba22507ebeb1921a26dfe77efff8c266.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/683fcd90ba22507ebeb1921a26dfe77efff8c266",
                "patch_url": "https://git.kernel.org/stable/p/683fcd90ba22507ebeb1921a26dfe77efff8c266",
                "filename": "CVE-2024-53064-683fcd90ba22507ebeb1921a26dfe77efff8c266.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53064/CVE-2024-53064-683fcd90ba22507ebeb1921a26dfe77efff8c266.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9b58031ff96b84a38d7b73b23c7ecfb2e0557f43",
                "patch_url": "https://git.kernel.org/stable/p/9b58031ff96b84a38d7b73b23c7ecfb2e0557f43",
                "filename": "CVE-2024-53064-9b58031ff96b84a38d7b73b23c7ecfb2e0557f43.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53064/CVE-2024-53064-9b58031ff96b84a38d7b73b23c7ecfb2e0557f43.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/683fcd90ba22507ebeb1921a26dfe77efff8c266",
            "https://git.kernel.org/stable/c/9b58031ff96b84a38d7b73b23c7ecfb2e0557f43",
            "https://www.cve.org/CVERecord?id=CVE-2024-53064\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-53064\nhttps://lore.kernel.org/linux-cve-announce/2024111932-CVE-2024-53064-119c@gregkh/T"
        ]
    },
    "CVE-2024-53088": {
        "cve": "CVE-2024-53088",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: fix race condition by adding filter's intermediate sync state\n\nFix a race condition in the i40e driver that leads to MAC/VLAN filters\nbecoming corrupted and leaking. Address the issue that occurs under\nheavy load when multiple threads are concurrently modifying MAC/VLAN\nfilters by setting mac and port VLAN.\n\n1. Thread T0 allocates a filter in i40e_add_filter() within\n        i40e_ndo_set_vf_port_vlan().\n2. Thread T1 concurrently frees the filter in __i40e_del_filter() within\n        i40e_ndo_set_vf_mac().\n3. Subsequently, i40e_service_task() calls i40e_sync_vsi_filters(), which\n        refers to the already freed filter memory, causing corruption.\n\nReproduction steps:\n1. Spawn multiple VFs.\n2. Apply a concurrent heavy load by running parallel operations to change\n        MAC addresses on the VFs and change port VLANs on the host.\n3. Observe errors in dmesg:\n\"Error I40E_AQ_RC_ENOSPC adding RX filters on VF XX,\n\tplease set promiscuous on manually for VF XX\".\n\nExact code for stable reproduction Intel can't open-source now.\n\nThe fix involves implementing a new intermediate filter state,\nI40E_FILTER_NEW_SYNC, for the time when a filter is on a tmp_add_list.\nThese filters cannot be deleted from the hash list directly but\nmust be removed using the full process.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-53088",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/262dc6ea5f1eb18c4d08ad83d51222d0dd0dd42a",
            "patch_url": "https://git.kernel.org/stable/p/262dc6ea5f1eb18c4d08ad83d51222d0dd0dd42a",
            "filename": "CVE-2024-53088-262dc6ea5f1eb18c4d08ad83d51222d0dd0dd42a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53088/CVE-2024-53088-262dc6ea5f1eb18c4d08ad83d51222d0dd0dd42a.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/262dc6ea5f1eb18c4d08ad83d51222d0dd0dd42a",
                "patch_url": "https://git.kernel.org/stable/p/262dc6ea5f1eb18c4d08ad83d51222d0dd0dd42a",
                "filename": "CVE-2024-53088-262dc6ea5f1eb18c4d08ad83d51222d0dd0dd42a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53088/CVE-2024-53088-262dc6ea5f1eb18c4d08ad83d51222d0dd0dd42a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6e046f4937474bc1b9fa980c1ad8f3253fc638f6",
                "patch_url": "https://git.kernel.org/stable/p/6e046f4937474bc1b9fa980c1ad8f3253fc638f6",
                "filename": "CVE-2024-53088-6e046f4937474bc1b9fa980c1ad8f3253fc638f6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53088/CVE-2024-53088-6e046f4937474bc1b9fa980c1ad8f3253fc638f6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7ad3fb3bfd43feb4e15c81dffd23ac4e55742791",
                "patch_url": "https://git.kernel.org/stable/p/7ad3fb3bfd43feb4e15c81dffd23ac4e55742791",
                "filename": "CVE-2024-53088-7ad3fb3bfd43feb4e15c81dffd23ac4e55742791.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53088/CVE-2024-53088-7ad3fb3bfd43feb4e15c81dffd23ac4e55742791.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bf5f837d9fd27d32fb76df0a108babcaf4446ff1",
                "patch_url": "https://git.kernel.org/stable/p/bf5f837d9fd27d32fb76df0a108babcaf4446ff1",
                "filename": "CVE-2024-53088-bf5f837d9fd27d32fb76df0a108babcaf4446ff1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53088/CVE-2024-53088-bf5f837d9fd27d32fb76df0a108babcaf4446ff1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f30490e9695ef7da3d0899c6a0293cc7cd373567",
                "patch_url": "https://git.kernel.org/stable/p/f30490e9695ef7da3d0899c6a0293cc7cd373567",
                "filename": "CVE-2024-53088-f30490e9695ef7da3d0899c6a0293cc7cd373567.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53088/CVE-2024-53088-f30490e9695ef7da3d0899c6a0293cc7cd373567.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/262dc6ea5f1eb18c4d08ad83d51222d0dd0dd42a",
            "https://git.kernel.org/stable/c/6e046f4937474bc1b9fa980c1ad8f3253fc638f6",
            "https://git.kernel.org/stable/c/7ad3fb3bfd43feb4e15c81dffd23ac4e55742791",
            "https://git.kernel.org/stable/c/bf5f837d9fd27d32fb76df0a108babcaf4446ff1",
            "https://git.kernel.org/stable/c/f30490e9695ef7da3d0899c6a0293cc7cd373567",
            "https://www.cve.org/CVERecord?id=CVE-2024-53088\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-53088\nhttps://lore.kernel.org/linux-cve-announce/2024111906-CVE-2024-53088-795c@gregkh/T"
        ]
    },
    "CVE-2024-53104": {
        "cve": "CVE-2024-53104",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format\n\nThis can lead to out of bounds writes since frames of this type were not\ntaken into account when calculating the size of the frames buffer in\nuvc_parse_streaming.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-53104",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/467d84dc78c9abf6b217ada22b3fdba336262e29",
            "patch_url": "https://git.kernel.org/stable/p/467d84dc78c9abf6b217ada22b3fdba336262e29",
            "filename": "CVE-2024-53104-467d84dc78c9abf6b217ada22b3fdba336262e29.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53104/CVE-2024-53104-467d84dc78c9abf6b217ada22b3fdba336262e29.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1ee9d9122801eb688783acd07791f2906b87cb4f",
                "patch_url": "https://git.kernel.org/stable/p/1ee9d9122801eb688783acd07791f2906b87cb4f",
                "filename": "CVE-2024-53104-1ee9d9122801eb688783acd07791f2906b87cb4f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53104/CVE-2024-53104-1ee9d9122801eb688783acd07791f2906b87cb4f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/467d84dc78c9abf6b217ada22b3fdba336262e29",
                "patch_url": "https://git.kernel.org/stable/p/467d84dc78c9abf6b217ada22b3fdba336262e29",
                "filename": "CVE-2024-53104-467d84dc78c9abf6b217ada22b3fdba336262e29.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53104/CVE-2024-53104-467d84dc78c9abf6b217ada22b3fdba336262e29.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/575a562f7a3ec2d54ff77ab6810e3fbceef2a91d",
                "patch_url": "https://git.kernel.org/stable/p/575a562f7a3ec2d54ff77ab6810e3fbceef2a91d",
                "filename": "CVE-2024-53104-575a562f7a3ec2d54ff77ab6810e3fbceef2a91d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53104/CVE-2024-53104-575a562f7a3ec2d54ff77ab6810e3fbceef2a91d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/622ad10aae5f5e03b7927ea95f7f32812f692bb5",
                "patch_url": "https://git.kernel.org/stable/p/622ad10aae5f5e03b7927ea95f7f32812f692bb5",
                "filename": "CVE-2024-53104-622ad10aae5f5e03b7927ea95f7f32812f692bb5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53104/CVE-2024-53104-622ad10aae5f5e03b7927ea95f7f32812f692bb5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/684022f81f128338fe3587ec967459669a1204ae",
                "patch_url": "https://git.kernel.org/stable/p/684022f81f128338fe3587ec967459669a1204ae",
                "filename": "CVE-2024-53104-684022f81f128338fe3587ec967459669a1204ae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53104/CVE-2024-53104-684022f81f128338fe3587ec967459669a1204ae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/95edf13a48e75dc2cc5b0bc57bf90d6948a22fe8",
                "patch_url": "https://git.kernel.org/stable/p/95edf13a48e75dc2cc5b0bc57bf90d6948a22fe8",
                "filename": "CVE-2024-53104-95edf13a48e75dc2cc5b0bc57bf90d6948a22fe8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53104/CVE-2024-53104-95edf13a48e75dc2cc5b0bc57bf90d6948a22fe8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/beced2cb09b58c1243733f374c560a55382003d6",
                "patch_url": "https://git.kernel.org/stable/p/beced2cb09b58c1243733f374c560a55382003d6",
                "filename": "CVE-2024-53104-beced2cb09b58c1243733f374c560a55382003d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53104/CVE-2024-53104-beced2cb09b58c1243733f374c560a55382003d6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ecf2b43018da9579842c774b7f35dbe11b5c38dd",
                "patch_url": "https://git.kernel.org/stable/p/ecf2b43018da9579842c774b7f35dbe11b5c38dd",
                "filename": "CVE-2024-53104-ecf2b43018da9579842c774b7f35dbe11b5c38dd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53104/CVE-2024-53104-ecf2b43018da9579842c774b7f35dbe11b5c38dd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/faff5bbb2762c44ec7426037b3000e77a11d6773",
                "patch_url": "https://git.kernel.org/stable/p/faff5bbb2762c44ec7426037b3000e77a11d6773",
                "filename": "CVE-2024-53104-faff5bbb2762c44ec7426037b3000e77a11d6773.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53104/CVE-2024-53104-faff5bbb2762c44ec7426037b3000e77a11d6773.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1ee9d9122801eb688783acd07791f2906b87cb4f",
            "https://git.kernel.org/stable/c/467d84dc78c9abf6b217ada22b3fdba336262e29",
            "https://git.kernel.org/stable/c/575a562f7a3ec2d54ff77ab6810e3fbceef2a91d",
            "https://git.kernel.org/stable/c/622ad10aae5f5e03b7927ea95f7f32812f692bb5",
            "https://git.kernel.org/stable/c/684022f81f128338fe3587ec967459669a1204ae",
            "https://git.kernel.org/stable/c/95edf13a48e75dc2cc5b0bc57bf90d6948a22fe8",
            "https://git.kernel.org/stable/c/beced2cb09b58c1243733f374c560a55382003d6",
            "https://git.kernel.org/stable/c/ecf2b43018da9579842c774b7f35dbe11b5c38dd",
            "https://git.kernel.org/stable/c/faff5bbb2762c44ec7426037b3000e77a11d6773",
            "https://www.cve.org/CVERecord?id=CVE-2024-53104\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-53104\nhttps://access.redhat.com/articles/7107058\nhttps://lore.kernel.org/linux-cve-announce/2024120232-CVE-2024-53104-d781@gregkh/T\nhttps://securitylab.amnesty.org/latest/2025/02/cellebrite-zero-day-exploit-used-to-target-phone-of-serbian-student-activist/\nhttps://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        ]
    },
    "CVE-2024-53122": {
        "cve": "CVE-2024-53122",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: cope racing subflow creation in mptcp_rcv_space_adjust\n\nAdditional active subflows - i.e. created by the in kernel path\nmanager - are included into the subflow list before starting the\n3whs.\n\nA racing recvmsg() spooling data received on an already established\nsubflow would unconditionally call tcp_cleanup_rbuf() on all the\ncurrent subflows, potentially hitting a divide by zero error on\nthe newly created ones.\n\nExplicitly check that the subflow is in a suitable state before\ninvoking tcp_cleanup_rbuf().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-53122",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0a9a182ea5c7bb0374e527130fd85024ace7279b",
            "patch_url": "https://git.kernel.org/stable/p/0a9a182ea5c7bb0374e527130fd85024ace7279b",
            "filename": "CVE-2024-53122-0a9a182ea5c7bb0374e527130fd85024ace7279b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53122/CVE-2024-53122-0a9a182ea5c7bb0374e527130fd85024ace7279b.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0a9a182ea5c7bb0374e527130fd85024ace7279b",
                "patch_url": "https://git.kernel.org/stable/p/0a9a182ea5c7bb0374e527130fd85024ace7279b",
                "filename": "CVE-2024-53122-0a9a182ea5c7bb0374e527130fd85024ace7279b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53122/CVE-2024-53122-0a9a182ea5c7bb0374e527130fd85024ace7279b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/24995851d58c4a205ad0ffa7b2f21e479a9c8527",
                "patch_url": "https://git.kernel.org/stable/p/24995851d58c4a205ad0ffa7b2f21e479a9c8527",
                "filename": "CVE-2024-53122-24995851d58c4a205ad0ffa7b2f21e479a9c8527.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53122/CVE-2024-53122-24995851d58c4a205ad0ffa7b2f21e479a9c8527.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aad6412c63baa39dd813e81f16a14d976b3de2e8",
                "patch_url": "https://git.kernel.org/stable/p/aad6412c63baa39dd813e81f16a14d976b3de2e8",
                "filename": "CVE-2024-53122-aad6412c63baa39dd813e81f16a14d976b3de2e8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53122/CVE-2024-53122-aad6412c63baa39dd813e81f16a14d976b3de2e8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ce7356ae35943cc6494cc692e62d51a734062b7d",
                "patch_url": "https://git.kernel.org/stable/p/ce7356ae35943cc6494cc692e62d51a734062b7d",
                "filename": "CVE-2024-53122-ce7356ae35943cc6494cc692e62d51a734062b7d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53122/CVE-2024-53122-ce7356ae35943cc6494cc692e62d51a734062b7d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ff825ab2f455299c0c7287550915a8878e2a66e0",
                "patch_url": "https://git.kernel.org/stable/p/ff825ab2f455299c0c7287550915a8878e2a66e0",
                "filename": "CVE-2024-53122-ff825ab2f455299c0c7287550915a8878e2a66e0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53122/CVE-2024-53122-ff825ab2f455299c0c7287550915a8878e2a66e0.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0a9a182ea5c7bb0374e527130fd85024ace7279b",
            "https://git.kernel.org/stable/c/24995851d58c4a205ad0ffa7b2f21e479a9c8527",
            "https://git.kernel.org/stable/c/aad6412c63baa39dd813e81f16a14d976b3de2e8",
            "https://git.kernel.org/stable/c/ce7356ae35943cc6494cc692e62d51a734062b7d",
            "https://git.kernel.org/stable/c/ff825ab2f455299c0c7287550915a8878e2a66e0",
            "https://www.cve.org/CVERecord?id=CVE-2024-53122\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-53122\nhttps://lore.kernel.org/linux-cve-announce/2024120252-CVE-2024-53122-f35c@gregkh/T"
        ]
    },
    "CVE-2024-53141": {
        "cve": "CVE-2024-53141",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: add missing range check in bitmap_ip_uadt\n\nWhen tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists,\nthe values of ip and ip_to are slightly swapped. Therefore, the range check\nfor ip should be done later, but this part is missing and it seems that the\nvulnerability occurs.\n\nSo we should add missing range checks and remove unnecessary range checks.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-53141",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3c20b5948f119ae61ee35ad8584d666020c91581",
            "patch_url": "https://git.kernel.org/stable/p/3c20b5948f119ae61ee35ad8584d666020c91581",
            "filename": "CVE-2024-53141-3c20b5948f119ae61ee35ad8584d666020c91581.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53141/CVE-2024-53141-3c20b5948f119ae61ee35ad8584d666020c91581.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/15794835378ed56fb9bacc6a5dd3b9f33520604e",
                "patch_url": "https://git.kernel.org/stable/p/15794835378ed56fb9bacc6a5dd3b9f33520604e",
                "filename": "CVE-2024-53141-15794835378ed56fb9bacc6a5dd3b9f33520604e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53141/CVE-2024-53141-15794835378ed56fb9bacc6a5dd3b9f33520604e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2e151b8ca31607d14fddc4ad0f14da0893e1a7c7",
                "patch_url": "https://git.kernel.org/stable/p/2e151b8ca31607d14fddc4ad0f14da0893e1a7c7",
                "filename": "CVE-2024-53141-2e151b8ca31607d14fddc4ad0f14da0893e1a7c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53141/CVE-2024-53141-2e151b8ca31607d14fddc4ad0f14da0893e1a7c7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/35f56c554eb1b56b77b3cf197a6b00922d49033d",
                "patch_url": "https://git.kernel.org/stable/p/35f56c554eb1b56b77b3cf197a6b00922d49033d",
                "filename": "CVE-2024-53141-35f56c554eb1b56b77b3cf197a6b00922d49033d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53141/CVE-2024-53141-35f56c554eb1b56b77b3cf197a6b00922d49033d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3c20b5948f119ae61ee35ad8584d666020c91581",
                "patch_url": "https://git.kernel.org/stable/p/3c20b5948f119ae61ee35ad8584d666020c91581",
                "filename": "CVE-2024-53141-3c20b5948f119ae61ee35ad8584d666020c91581.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53141/CVE-2024-53141-3c20b5948f119ae61ee35ad8584d666020c91581.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/591efa494a1cf649f50a35def649c43ae984cd03",
                "patch_url": "https://git.kernel.org/stable/p/591efa494a1cf649f50a35def649c43ae984cd03",
                "filename": "CVE-2024-53141-591efa494a1cf649f50a35def649c43ae984cd03.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53141/CVE-2024-53141-591efa494a1cf649f50a35def649c43ae984cd03.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/78b0f2028f1043227a8eb0c41944027fc6a04596",
                "patch_url": "https://git.kernel.org/stable/p/78b0f2028f1043227a8eb0c41944027fc6a04596",
                "filename": "CVE-2024-53141-78b0f2028f1043227a8eb0c41944027fc6a04596.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53141/CVE-2024-53141-78b0f2028f1043227a8eb0c41944027fc6a04596.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7ffef5e5d5eeecd9687204a5ec2d863752aafb7e",
                "patch_url": "https://git.kernel.org/stable/p/7ffef5e5d5eeecd9687204a5ec2d863752aafb7e",
                "filename": "CVE-2024-53141-7ffef5e5d5eeecd9687204a5ec2d863752aafb7e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53141/CVE-2024-53141-7ffef5e5d5eeecd9687204a5ec2d863752aafb7e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/856023ef032d824309abd5c747241dffa33aae8c",
                "patch_url": "https://git.kernel.org/stable/p/856023ef032d824309abd5c747241dffa33aae8c",
                "filename": "CVE-2024-53141-856023ef032d824309abd5c747241dffa33aae8c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53141/CVE-2024-53141-856023ef032d824309abd5c747241dffa33aae8c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e67471437ae9083fa73fa67eee1573fec1b7c8cf",
                "patch_url": "https://git.kernel.org/stable/p/e67471437ae9083fa73fa67eee1573fec1b7c8cf",
                "filename": "CVE-2024-53141-e67471437ae9083fa73fa67eee1573fec1b7c8cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53141/CVE-2024-53141-e67471437ae9083fa73fa67eee1573fec1b7c8cf.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/15794835378ed56fb9bacc6a5dd3b9f33520604e",
            "https://git.kernel.org/stable/c/2e151b8ca31607d14fddc4ad0f14da0893e1a7c7",
            "https://git.kernel.org/stable/c/35f56c554eb1b56b77b3cf197a6b00922d49033d",
            "https://git.kernel.org/stable/c/3c20b5948f119ae61ee35ad8584d666020c91581",
            "https://git.kernel.org/stable/c/591efa494a1cf649f50a35def649c43ae984cd03",
            "https://git.kernel.org/stable/c/78b0f2028f1043227a8eb0c41944027fc6a04596",
            "https://git.kernel.org/stable/c/7ffef5e5d5eeecd9687204a5ec2d863752aafb7e",
            "https://git.kernel.org/stable/c/856023ef032d824309abd5c747241dffa33aae8c",
            "https://git.kernel.org/stable/c/e67471437ae9083fa73fa67eee1573fec1b7c8cf",
            "https://www.cve.org/CVERecord?id=CVE-2024-53141\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-53141\nhttps://lore.kernel.org/linux-cve-announce/2024120606-CVE-2024-53141-195b@gregkh/T"
        ]
    },
    "CVE-2024-53150": {
        "cve": "CVE-2024-53150",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix out of bounds reads when finding clock sources\n\nThe current USB-audio driver code doesn't check bLength of each\ndescriptor at traversing for clock descriptors.  That is, when a\ndevice provides a bogus descriptor with a shorter bLength, the driver\nmight hit out-of-bounds reads.\n\nFor addressing it, this patch adds sanity checks to the validator\nfunctions for the clock descriptor traversal.  When the descriptor\nlength is shorter than expected, it's skipped in the loop.\n\nFor the clock source and clock multiplier descriptors, we can just\ncheck bLength against the sizeof() of each descriptor type.\nOTOH, the clock selector descriptor of UAC2 and UAC3 has an array\nof bNrInPins elements and two more fields at its tail, hence those\nhave to be checked in addition to the sizeof() check.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-53150",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/096bb5b43edf755bc4477e64004fa3a20539ec2f",
            "patch_url": "https://git.kernel.org/stable/p/096bb5b43edf755bc4477e64004fa3a20539ec2f",
            "filename": "CVE-2024-53150-096bb5b43edf755bc4477e64004fa3a20539ec2f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53150/CVE-2024-53150-096bb5b43edf755bc4477e64004fa3a20539ec2f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/096bb5b43edf755bc4477e64004fa3a20539ec2f",
                "patch_url": "https://git.kernel.org/stable/p/096bb5b43edf755bc4477e64004fa3a20539ec2f",
                "filename": "CVE-2024-53150-096bb5b43edf755bc4477e64004fa3a20539ec2f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53150/CVE-2024-53150-096bb5b43edf755bc4477e64004fa3a20539ec2f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/45a92cbc88e4013bfed7fd2ccab3ade45f8e896b",
                "patch_url": "https://git.kernel.org/stable/p/45a92cbc88e4013bfed7fd2ccab3ade45f8e896b",
                "filename": "CVE-2024-53150-45a92cbc88e4013bfed7fd2ccab3ade45f8e896b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53150/CVE-2024-53150-45a92cbc88e4013bfed7fd2ccab3ade45f8e896b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/74cb86e1006c5437b1d90084d22018da30fddc77",
                "patch_url": "https://git.kernel.org/stable/p/74cb86e1006c5437b1d90084d22018da30fddc77",
                "filename": "CVE-2024-53150-74cb86e1006c5437b1d90084d22018da30fddc77.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53150/CVE-2024-53150-74cb86e1006c5437b1d90084d22018da30fddc77.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a3dd4d63eeb452cfb064a13862fb376ab108f6a6",
                "patch_url": "https://git.kernel.org/stable/p/a3dd4d63eeb452cfb064a13862fb376ab108f6a6",
                "filename": "CVE-2024-53150-a3dd4d63eeb452cfb064a13862fb376ab108f6a6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53150/CVE-2024-53150-a3dd4d63eeb452cfb064a13862fb376ab108f6a6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a632bdcb359fd8145e86486ff8612da98e239acd",
                "patch_url": "https://git.kernel.org/stable/p/a632bdcb359fd8145e86486ff8612da98e239acd",
                "filename": "CVE-2024-53150-a632bdcb359fd8145e86486ff8612da98e239acd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53150/CVE-2024-53150-a632bdcb359fd8145e86486ff8612da98e239acd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ab011f7439d9bbfd34fd3b9cef4b2d6d952c9bb9",
                "patch_url": "https://git.kernel.org/stable/p/ab011f7439d9bbfd34fd3b9cef4b2d6d952c9bb9",
                "filename": "CVE-2024-53150-ab011f7439d9bbfd34fd3b9cef4b2d6d952c9bb9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53150/CVE-2024-53150-ab011f7439d9bbfd34fd3b9cef4b2d6d952c9bb9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/da13ade87a12dd58829278bc816a61bea06a56a9",
                "patch_url": "https://git.kernel.org/stable/p/da13ade87a12dd58829278bc816a61bea06a56a9",
                "filename": "CVE-2024-53150-da13ade87a12dd58829278bc816a61bea06a56a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53150/CVE-2024-53150-da13ade87a12dd58829278bc816a61bea06a56a9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ea0fa76f61cf8e932d1d26e6193513230816e11d",
                "patch_url": "https://git.kernel.org/stable/p/ea0fa76f61cf8e932d1d26e6193513230816e11d",
                "filename": "CVE-2024-53150-ea0fa76f61cf8e932d1d26e6193513230816e11d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53150/CVE-2024-53150-ea0fa76f61cf8e932d1d26e6193513230816e11d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/096bb5b43edf755bc4477e64004fa3a20539ec2f",
            "https://git.kernel.org/stable/c/45a92cbc88e4013bfed7fd2ccab3ade45f8e896b",
            "https://git.kernel.org/stable/c/74cb86e1006c5437b1d90084d22018da30fddc77",
            "https://git.kernel.org/stable/c/a3dd4d63eeb452cfb064a13862fb376ab108f6a6",
            "https://git.kernel.org/stable/c/a632bdcb359fd8145e86486ff8612da98e239acd",
            "https://git.kernel.org/stable/c/ab011f7439d9bbfd34fd3b9cef4b2d6d952c9bb9",
            "https://git.kernel.org/stable/c/da13ade87a12dd58829278bc816a61bea06a56a9",
            "https://git.kernel.org/stable/c/ea0fa76f61cf8e932d1d26e6193513230816e11d",
            "https://www.cve.org/CVERecord?id=CVE-2024-53150\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-53150\nhttps://lore.kernel.org/linux-cve-announce/2024122427-CVE-2024-53150-3a7d@gregkh/T\nhttps://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        ]
    },
    "CVE-2024-53197": {
        "cve": "CVE-2024-53197",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices\n\nA bogus device can provide a bNumConfigurations value that exceeds the\ninitial value used in usb_get_configuration for allocating dev->config.\n\nThis can lead to out-of-bounds accesses later, e.g. in\nusb_destroy_configuration.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-53197",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/920a369a9f014f10ec282fd298d0666129379f1b",
            "patch_url": "https://git.kernel.org/stable/p/920a369a9f014f10ec282fd298d0666129379f1b",
            "filename": "CVE-2024-53197-920a369a9f014f10ec282fd298d0666129379f1b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53197/CVE-2024-53197-920a369a9f014f10ec282fd298d0666129379f1b.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0b4ea4bfe16566b84645ded1403756a2dc4e0f19",
                "patch_url": "https://git.kernel.org/stable/p/0b4ea4bfe16566b84645ded1403756a2dc4e0f19",
                "filename": "CVE-2024-53197-0b4ea4bfe16566b84645ded1403756a2dc4e0f19.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53197/CVE-2024-53197-0b4ea4bfe16566b84645ded1403756a2dc4e0f19.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/379d3b9799d9da953391e973b934764f01e03960",
                "patch_url": "https://git.kernel.org/stable/p/379d3b9799d9da953391e973b934764f01e03960",
                "filename": "CVE-2024-53197-379d3b9799d9da953391e973b934764f01e03960.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53197/CVE-2024-53197-379d3b9799d9da953391e973b934764f01e03960.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/62dc01c83fa71e10446ee4c31e0e3d5d1291e865",
                "patch_url": "https://git.kernel.org/stable/p/62dc01c83fa71e10446ee4c31e0e3d5d1291e865",
                "filename": "CVE-2024-53197-62dc01c83fa71e10446ee4c31e0e3d5d1291e865.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53197/CVE-2024-53197-62dc01c83fa71e10446ee4c31e0e3d5d1291e865.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/920a369a9f014f10ec282fd298d0666129379f1b",
                "patch_url": "https://git.kernel.org/stable/p/920a369a9f014f10ec282fd298d0666129379f1b",
                "filename": "CVE-2024-53197-920a369a9f014f10ec282fd298d0666129379f1b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53197/CVE-2024-53197-920a369a9f014f10ec282fd298d0666129379f1b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9887d859cd60727432a01564e8f91302d361b72b",
                "patch_url": "https://git.kernel.org/stable/p/9887d859cd60727432a01564e8f91302d361b72b",
                "filename": "CVE-2024-53197-9887d859cd60727432a01564e8f91302d361b72b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53197/CVE-2024-53197-9887d859cd60727432a01564e8f91302d361b72b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9b8460a2a7ce478e0b625af7c56d444dc24190f7",
                "patch_url": "https://git.kernel.org/stable/p/9b8460a2a7ce478e0b625af7c56d444dc24190f7",
                "filename": "CVE-2024-53197-9b8460a2a7ce478e0b625af7c56d444dc24190f7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53197/CVE-2024-53197-9b8460a2a7ce478e0b625af7c56d444dc24190f7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b521b53ac6eb04e41c03f46f7fe452e4d8e9bcca",
                "patch_url": "https://git.kernel.org/stable/p/b521b53ac6eb04e41c03f46f7fe452e4d8e9bcca",
                "filename": "CVE-2024-53197-b521b53ac6eb04e41c03f46f7fe452e4d8e9bcca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53197/CVE-2024-53197-b521b53ac6eb04e41c03f46f7fe452e4d8e9bcca.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b8f8b81dabe52b413fe9e062e8a852c48dd0680d",
                "patch_url": "https://git.kernel.org/stable/p/b8f8b81dabe52b413fe9e062e8a852c48dd0680d",
                "filename": "CVE-2024-53197-b8f8b81dabe52b413fe9e062e8a852c48dd0680d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53197/CVE-2024-53197-b8f8b81dabe52b413fe9e062e8a852c48dd0680d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b909df18ce2a998afef81d58bbd1a05dc0788c40",
                "patch_url": "https://git.kernel.org/stable/p/b909df18ce2a998afef81d58bbd1a05dc0788c40",
                "filename": "CVE-2024-53197-b909df18ce2a998afef81d58bbd1a05dc0788c40.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53197/CVE-2024-53197-b909df18ce2a998afef81d58bbd1a05dc0788c40.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0b4ea4bfe16566b84645ded1403756a2dc4e0f19",
            "https://git.kernel.org/stable/c/379d3b9799d9da953391e973b934764f01e03960",
            "https://git.kernel.org/stable/c/62dc01c83fa71e10446ee4c31e0e3d5d1291e865",
            "https://git.kernel.org/stable/c/920a369a9f014f10ec282fd298d0666129379f1b",
            "https://git.kernel.org/stable/c/9887d859cd60727432a01564e8f91302d361b72b",
            "https://git.kernel.org/stable/c/9b8460a2a7ce478e0b625af7c56d444dc24190f7",
            "https://git.kernel.org/stable/c/b521b53ac6eb04e41c03f46f7fe452e4d8e9bcca",
            "https://git.kernel.org/stable/c/b8f8b81dabe52b413fe9e062e8a852c48dd0680d",
            "https://git.kernel.org/stable/c/b909df18ce2a998afef81d58bbd1a05dc0788c40",
            "https://www.cve.org/CVERecord?id=CVE-2024-53197\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-53197\nhttps://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-53197-6aef@gregkh/T\nhttps://securitylab.amnesty.org/latest/2025/02/cellebrite-zero-day-exploit-used-to-target-phone-of-serbian-student-activist/\nhttps://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        ]
    },
    "CVE-2024-53241": {
        "cve": "CVE-2024-53241",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/xen: don't do PV iret hypercall through hypercall page\n\nInstead of jumping to the Xen hypercall page for doing the iret\nhypercall, directly code the required sequence in xen-asm.S.\n\nThis is done in preparation of no longer using hypercall page at all,\nas it has shown to cause problems with speculation mitigations.\n\nThis is part of XSA-466 / CVE-2024-53241.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-53241",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/05df6e6cd9a76b778aee33c3c18c9f3b3566d4a5",
            "patch_url": "https://git.kernel.org/stable/p/05df6e6cd9a76b778aee33c3c18c9f3b3566d4a5",
            "filename": "CVE-2024-53241-05df6e6cd9a76b778aee33c3c18c9f3b3566d4a5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53241/CVE-2024-53241-05df6e6cd9a76b778aee33c3c18c9f3b3566d4a5.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/05df6e6cd9a76b778aee33c3c18c9f3b3566d4a5",
                "patch_url": "https://git.kernel.org/stable/p/05df6e6cd9a76b778aee33c3c18c9f3b3566d4a5",
                "filename": "CVE-2024-53241-05df6e6cd9a76b778aee33c3c18c9f3b3566d4a5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53241/CVE-2024-53241-05df6e6cd9a76b778aee33c3c18c9f3b3566d4a5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/82c211ead1ec440dbf81727e17b03b5e3c44b93d",
                "patch_url": "https://git.kernel.org/stable/p/82c211ead1ec440dbf81727e17b03b5e3c44b93d",
                "filename": "CVE-2024-53241-82c211ead1ec440dbf81727e17b03b5e3c44b93d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53241/CVE-2024-53241-82c211ead1ec440dbf81727e17b03b5e3c44b93d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906",
                "patch_url": "https://git.kernel.org/stable/p/a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906",
                "filename": "CVE-2024-53241-a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53241/CVE-2024-53241-a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c7b4cfa6213a44fa48714186dfdf125072d036e3",
                "patch_url": "https://git.kernel.org/stable/p/c7b4cfa6213a44fa48714186dfdf125072d036e3",
                "filename": "CVE-2024-53241-c7b4cfa6213a44fa48714186dfdf125072d036e3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53241/CVE-2024-53241-c7b4cfa6213a44fa48714186dfdf125072d036e3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f7c3fdad0a474062d566aae3289d490d7e702d30",
                "patch_url": "https://git.kernel.org/stable/p/f7c3fdad0a474062d566aae3289d490d7e702d30",
                "filename": "CVE-2024-53241-f7c3fdad0a474062d566aae3289d490d7e702d30.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53241/CVE-2024-53241-f7c3fdad0a474062d566aae3289d490d7e702d30.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fa719857f613fed94a79da055b13ca51214c694f",
                "patch_url": "https://git.kernel.org/stable/p/fa719857f613fed94a79da055b13ca51214c694f",
                "filename": "CVE-2024-53241-fa719857f613fed94a79da055b13ca51214c694f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-53241/CVE-2024-53241-fa719857f613fed94a79da055b13ca51214c694f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/05df6e6cd9a76b778aee33c3c18c9f3b3566d4a5",
            "https://git.kernel.org/stable/c/82c211ead1ec440dbf81727e17b03b5e3c44b93d",
            "https://git.kernel.org/stable/c/a2796dff62d6c6bfc5fbebdf2bee0d5ac0438906",
            "https://git.kernel.org/stable/c/c7b4cfa6213a44fa48714186dfdf125072d036e3",
            "https://git.kernel.org/stable/c/f7c3fdad0a474062d566aae3289d490d7e702d30",
            "https://git.kernel.org/stable/c/fa719857f613fed94a79da055b13ca51214c694f"
        ]
    },
    "CVE-2024-5564": {
        "cve": "CVE-2024-5564",
        "cvss_v2": null,
        "cvss_v3": 8.1,
        "description": "A vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. This issue occurred as libndp was not correctly validating the route length information.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-5564",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-56171": {
        "cve": "CVE-2024-56171",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-56171",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-56644": {
        "cve": "CVE-2024-56644",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ipv6: release expired exception dst cached in socket\n\nDst objects get leaked in ip6_negative_advice() when this function is\nexecuted for an expired IPv6 route located in the exception table. There\nare several conditions that must be fulfilled for the leak to occur:\n* an ICMPv6 packet indicating a change of the MTU for the path is received,\n  resulting in an exception dst being created\n* a TCP connection that uses the exception dst for routing packets must\n  start timing out so that TCP begins retransmissions\n* after the exception dst expires, the FIB6 garbage collector must not run\n  before TCP executes ip6_negative_advice() for the expired exception dst\n\nWhen TCP executes ip6_negative_advice() for an exception dst that has\nexpired and if no other socket holds a reference to the exception dst, the\nrefcount of the exception dst is 2, which corresponds to the increment\nmade by dst_init() and the increment made by the TCP socket for which the\nconnection is timing out. The refcount made by the socket is never\nreleased. The refcount of the dst is decremented in sk_dst_reset() but\nthat decrement is counteracted by a dst_hold() intentionally placed just\nbefore the sk_dst_reset() in ip6_negative_advice(). After\nip6_negative_advice() has finished, there is no other object tied to the\ndst. The socket lost its reference stored in sk_dst_cache and the dst is\nno longer in the exception table. The exception dst becomes a leaked\nobject.\n\nAs a result of this dst leak, an unbalanced refcount is reported for the\nloopback device of a net namespace being destroyed under kernels that do\nnot contain e5f80fcf869a (\"ipv6: give an IPv6 dev to blackhole_netdev\"):\nunregister_netdevice: waiting for lo to become free. Usage count = 2\n\nFix the dst leak by removing the dst_hold() in ip6_negative_advice(). The\npatch that introduced the dst_hold() in ip6_negative_advice() was\n92f1655aa2b22 (\"net: fix __dst_negative_advice() race\"). But 92f1655aa2b22\nmerely refactored the code with regards to the dst refcount so the issue\nwas present even before 92f1655aa2b22. The bug was introduced in\n54c1a859efd9f (\"ipv6: Don't drop cache route entry unless timer actually\nexpired.\") where the expired cached route is deleted and the sk_dst_cache\nmember of the socket is set to NULL by calling dst_negative_advice() but\nthe refcount belonging to the socket is left unbalanced.\n\nThe IPv4 version - ipv4_negative_advice() - is not affected by this bug.\nWhen the TCP connection times out ipv4_negative_advice() merely resets the\nsk_dst_cache of the socket while decrementing the refcount of the\nexception dst.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-56644",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0b8903e6c881f72c6849d4952de742c656eb5ab9",
            "patch_url": "https://git.kernel.org/stable/p/0b8903e6c881f72c6849d4952de742c656eb5ab9",
            "filename": "CVE-2024-56644-0b8903e6c881f72c6849d4952de742c656eb5ab9.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-56644/CVE-2024-56644-0b8903e6c881f72c6849d4952de742c656eb5ab9.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0b8903e6c881f72c6849d4952de742c656eb5ab9",
                "patch_url": "https://git.kernel.org/stable/p/0b8903e6c881f72c6849d4952de742c656eb5ab9",
                "filename": "CVE-2024-56644-0b8903e6c881f72c6849d4952de742c656eb5ab9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-56644/CVE-2024-56644-0b8903e6c881f72c6849d4952de742c656eb5ab9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3301ab7d5aeb0fe270f73a3d4810c9d1b6a9f045",
                "patch_url": "https://git.kernel.org/stable/p/3301ab7d5aeb0fe270f73a3d4810c9d1b6a9f045",
                "filename": "CVE-2024-56644-3301ab7d5aeb0fe270f73a3d4810c9d1b6a9f045.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-56644/CVE-2024-56644-3301ab7d5aeb0fe270f73a3d4810c9d1b6a9f045.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/535add1e9f274502209cb997801208bbe1ae6c6f",
                "patch_url": "https://git.kernel.org/stable/p/535add1e9f274502209cb997801208bbe1ae6c6f",
                "filename": "CVE-2024-56644-535add1e9f274502209cb997801208bbe1ae6c6f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-56644/CVE-2024-56644-535add1e9f274502209cb997801208bbe1ae6c6f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8b591bd522b71c42a82898290e35d32b482047e4",
                "patch_url": "https://git.kernel.org/stable/p/8b591bd522b71c42a82898290e35d32b482047e4",
                "filename": "CVE-2024-56644-8b591bd522b71c42a82898290e35d32b482047e4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-56644/CVE-2024-56644-8b591bd522b71c42a82898290e35d32b482047e4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a95808252e8acc0123bacd2dff8b9af10bc145b7",
                "patch_url": "https://git.kernel.org/stable/p/a95808252e8acc0123bacd2dff8b9af10bc145b7",
                "filename": "CVE-2024-56644-a95808252e8acc0123bacd2dff8b9af10bc145b7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-56644/CVE-2024-56644-a95808252e8acc0123bacd2dff8b9af10bc145b7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b90d061345bb8cd51fece561a800bae1c95448a6",
                "patch_url": "https://git.kernel.org/stable/p/b90d061345bb8cd51fece561a800bae1c95448a6",
                "filename": "CVE-2024-56644-b90d061345bb8cd51fece561a800bae1c95448a6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-56644/CVE-2024-56644-b90d061345bb8cd51fece561a800bae1c95448a6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f43d12fd0fa8ee5b9caf8a3927e10d06431764d2",
                "patch_url": "https://git.kernel.org/stable/p/f43d12fd0fa8ee5b9caf8a3927e10d06431764d2",
                "filename": "CVE-2024-56644-f43d12fd0fa8ee5b9caf8a3927e10d06431764d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-56644/CVE-2024-56644-f43d12fd0fa8ee5b9caf8a3927e10d06431764d2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0b8903e6c881f72c6849d4952de742c656eb5ab9",
            "https://git.kernel.org/stable/c/3301ab7d5aeb0fe270f73a3d4810c9d1b6a9f045",
            "https://git.kernel.org/stable/c/535add1e9f274502209cb997801208bbe1ae6c6f",
            "https://git.kernel.org/stable/c/8b591bd522b71c42a82898290e35d32b482047e4",
            "https://git.kernel.org/stable/c/a95808252e8acc0123bacd2dff8b9af10bc145b7",
            "https://git.kernel.org/stable/c/b90d061345bb8cd51fece561a800bae1c95448a6",
            "https://git.kernel.org/stable/c/f43d12fd0fa8ee5b9caf8a3927e10d06431764d2",
            "https://www.cve.org/CVERecord?id=CVE-2024-56644\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-56644\nhttps://lore.kernel.org/linux-cve-announce/2024122737-CVE-2024-56644-83c2@gregkh/T"
        ]
    },
    "CVE-2024-57807": {
        "cve": "CVE-2024-57807",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: megaraid_sas: Fix for a potential deadlock\n\nThis fixes a 'possible circular locking dependency detected' warning\n      CPU0                    CPU1\n      ----                    ----\n lock(&instance->reset_mutex);\n                              lock(&shost->scan_mutex);\n                              lock(&instance->reset_mutex);\n lock(&shost->scan_mutex);\n\nFix this by temporarily releasing the reset_mutex.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-57807",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/f50783148ec98a1d38b87422e2ceaf2380b7b606",
            "patch_url": "https://git.kernel.org/stable/p/f50783148ec98a1d38b87422e2ceaf2380b7b606",
            "filename": "CVE-2024-57807-f50783148ec98a1d38b87422e2ceaf2380b7b606.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57807/CVE-2024-57807-f50783148ec98a1d38b87422e2ceaf2380b7b606.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3c654998a3e8167a58b6c6fede545fe400a4b554",
                "patch_url": "https://git.kernel.org/stable/p/3c654998a3e8167a58b6c6fede545fe400a4b554",
                "filename": "CVE-2024-57807-3c654998a3e8167a58b6c6fede545fe400a4b554.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57807/CVE-2024-57807-3c654998a3e8167a58b6c6fede545fe400a4b554.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/466ca39dbf5d0ba71c16b15c27478a9c7d4022a8",
                "patch_url": "https://git.kernel.org/stable/p/466ca39dbf5d0ba71c16b15c27478a9c7d4022a8",
                "filename": "CVE-2024-57807-466ca39dbf5d0ba71c16b15c27478a9c7d4022a8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57807/CVE-2024-57807-466ca39dbf5d0ba71c16b15c27478a9c7d4022a8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/50740f4dc78b41dec7c8e39772619d5ba841ddd7",
                "patch_url": "https://git.kernel.org/stable/p/50740f4dc78b41dec7c8e39772619d5ba841ddd7",
                "filename": "CVE-2024-57807-50740f4dc78b41dec7c8e39772619d5ba841ddd7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57807/CVE-2024-57807-50740f4dc78b41dec7c8e39772619d5ba841ddd7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/78afb9bfad00c4aa58a424111d7edbcab9452f2b",
                "patch_url": "https://git.kernel.org/stable/p/78afb9bfad00c4aa58a424111d7edbcab9452f2b",
                "filename": "CVE-2024-57807-78afb9bfad00c4aa58a424111d7edbcab9452f2b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57807/CVE-2024-57807-78afb9bfad00c4aa58a424111d7edbcab9452f2b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/edadc693bfcc0f1ea08b8fa041c9361fd042410d",
                "patch_url": "https://git.kernel.org/stable/p/edadc693bfcc0f1ea08b8fa041c9361fd042410d",
                "filename": "CVE-2024-57807-edadc693bfcc0f1ea08b8fa041c9361fd042410d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57807/CVE-2024-57807-edadc693bfcc0f1ea08b8fa041c9361fd042410d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f36d024bd15ed356a80dda3ddc46d0a62aa55815",
                "patch_url": "https://git.kernel.org/stable/p/f36d024bd15ed356a80dda3ddc46d0a62aa55815",
                "filename": "CVE-2024-57807-f36d024bd15ed356a80dda3ddc46d0a62aa55815.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57807/CVE-2024-57807-f36d024bd15ed356a80dda3ddc46d0a62aa55815.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f50783148ec98a1d38b87422e2ceaf2380b7b606",
                "patch_url": "https://git.kernel.org/stable/p/f50783148ec98a1d38b87422e2ceaf2380b7b606",
                "filename": "CVE-2024-57807-f50783148ec98a1d38b87422e2ceaf2380b7b606.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57807/CVE-2024-57807-f50783148ec98a1d38b87422e2ceaf2380b7b606.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3c654998a3e8167a58b6c6fede545fe400a4b554",
            "https://git.kernel.org/stable/c/466ca39dbf5d0ba71c16b15c27478a9c7d4022a8",
            "https://git.kernel.org/stable/c/50740f4dc78b41dec7c8e39772619d5ba841ddd7",
            "https://git.kernel.org/stable/c/78afb9bfad00c4aa58a424111d7edbcab9452f2b",
            "https://git.kernel.org/stable/c/edadc693bfcc0f1ea08b8fa041c9361fd042410d",
            "https://git.kernel.org/stable/c/f36d024bd15ed356a80dda3ddc46d0a62aa55815",
            "https://git.kernel.org/stable/c/f50783148ec98a1d38b87422e2ceaf2380b7b606",
            "https://www.cve.org/CVERecord?id=CVE-2024-57807\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-57807\nhttps://lore.kernel.org/linux-cve-announce/2025011153-CVE-2024-57807-b595@gregkh/T"
        ]
    },
    "CVE-2024-57979": {
        "cve": "CVE-2024-57979",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: Fix a use-after-free\n\nOn a board running ntpd and gpsd, I'm seeing a consistent use-after-free\nin sys_exit() from gpsd when rebooting:\n\n    pps pps1: removed\n    ------------[ cut here ]------------\n    kobject: '(null)' (00000000db4bec24): is not initialized, yet kobject_put() is being called.\n    WARNING: CPU: 2 PID: 440 at lib/kobject.c:734 kobject_put+0x120/0x150\n    CPU: 2 UID: 299 PID: 440 Comm: gpsd Not tainted 6.11.0-rc6-00308-gb31c44928842 #1\n    Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT)\n    pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n    pc : kobject_put+0x120/0x150\n    lr : kobject_put+0x120/0x150\n    sp : ffffffc0803d3ae0\n    x29: ffffffc0803d3ae0 x28: ffffff8042dc9738 x27: 0000000000000001\n    x26: 0000000000000000 x25: ffffff8042dc9040 x24: ffffff8042dc9440\n    x23: ffffff80402a4620 x22: ffffff8042ef4bd0 x21: ffffff80405cb600\n    x20: 000000000008001b x19: ffffff8040b3b6e0 x18: 0000000000000000\n    x17: 0000000000000000 x16: 0000000000000000 x15: 696e6920746f6e20\n    x14: 7369203a29343263 x13: 205d303434542020 x12: 0000000000000000\n    x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n    x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\n    x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\n    x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000\n    Call trace:\n     kobject_put+0x120/0x150\n     cdev_put+0x20/0x3c\n     __fput+0x2c4/0x2d8\n     ____fput+0x1c/0x38\n     task_work_run+0x70/0xfc\n     do_exit+0x2a0/0x924\n     do_group_exit+0x34/0x90\n     get_signal+0x7fc/0x8c0\n     do_signal+0x128/0x13b4\n     do_notify_resume+0xdc/0x160\n     el0_svc+0xd4/0xf8\n     el0t_64_sync_handler+0x140/0x14c\n     el0t_64_sync+0x190/0x194\n    ---[ end trace 0000000000000000 ]---\n\n...followed by more symptoms of corruption, with similar stacks:\n\n    refcount_t: underflow; use-after-free.\n    kernel BUG at lib/list_debug.c:62!\n    Kernel panic - not syncing: Oops - BUG: Fatal exception\n\nThis happens because pps_device_destruct() frees the pps_device with the\nembedded cdev immediately after calling cdev_del(), but, as the comment\nabove cdev_del() notes, fops for previously opened cdevs are still\ncallable even after cdev_del() returns. I think this bug has always\nbeen there: I can't explain why it suddenly started happening every time\nI reboot this particular board.\n\nIn commit d953e0e837e6 (\"pps: Fix a use-after free bug when\nunregistering a source.\"), George Spelvin suggested removing the\nembedded cdev. That seems like the simplest way to fix this, so I've\nimplemented his suggestion, using __register_chrdev() with pps_idr\nbecoming the source of truth for which minor corresponds to which\ndevice.\n\nBut now that pps_idr defines userspace visibility instead of cdev_add(),\nwe need to be sure the pps->dev refcount can't reach zero while\nuserspace can still find it again. So, the idr_remove() call moves to\npps_unregister_cdev(), and pps_idr now holds a reference to pps->dev.\n\n    pps_core: source serial1 got cdev (251:1)\n    <...>\n    pps pps1: removed\n    pps_core: unregistering pps1\n    pps_core: deallocating pps1",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-57979",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1a7735ab2cb9747518a7416fb5929e85442dec62",
            "patch_url": "https://git.kernel.org/stable/p/1a7735ab2cb9747518a7416fb5929e85442dec62",
            "filename": "CVE-2024-57979-1a7735ab2cb9747518a7416fb5929e85442dec62.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57979/CVE-2024-57979-1a7735ab2cb9747518a7416fb5929e85442dec62.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1a7735ab2cb9747518a7416fb5929e85442dec62",
                "patch_url": "https://git.kernel.org/stable/p/1a7735ab2cb9747518a7416fb5929e85442dec62",
                "filename": "CVE-2024-57979-1a7735ab2cb9747518a7416fb5929e85442dec62.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57979/CVE-2024-57979-1a7735ab2cb9747518a7416fb5929e85442dec62.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/785c78ed0d39d1717cca3ef931d3e51337b5e90e",
                "patch_url": "https://git.kernel.org/stable/p/785c78ed0d39d1717cca3ef931d3e51337b5e90e",
                "filename": "CVE-2024-57979-785c78ed0d39d1717cca3ef931d3e51337b5e90e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57979/CVE-2024-57979-785c78ed0d39d1717cca3ef931d3e51337b5e90e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7e5ee3281dc09014367f5112b6d566ba36ea2d49",
                "patch_url": "https://git.kernel.org/stable/p/7e5ee3281dc09014367f5112b6d566ba36ea2d49",
                "filename": "CVE-2024-57979-7e5ee3281dc09014367f5112b6d566ba36ea2d49.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57979/CVE-2024-57979-7e5ee3281dc09014367f5112b6d566ba36ea2d49.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/85241f7de216f8298f6e48540ea13d7dcd100870",
                "patch_url": "https://git.kernel.org/stable/p/85241f7de216f8298f6e48540ea13d7dcd100870",
                "filename": "CVE-2024-57979-85241f7de216f8298f6e48540ea13d7dcd100870.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57979/CVE-2024-57979-85241f7de216f8298f6e48540ea13d7dcd100870.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/91932db1d96b2952299ce30c1c693d834d10ace6",
                "patch_url": "https://git.kernel.org/stable/p/91932db1d96b2952299ce30c1c693d834d10ace6",
                "filename": "CVE-2024-57979-91932db1d96b2952299ce30c1c693d834d10ace6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57979/CVE-2024-57979-91932db1d96b2952299ce30c1c693d834d10ace6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c4041b6b0a7a3def8cf3f3d6120ff337bc4c40f7",
                "patch_url": "https://git.kernel.org/stable/p/c4041b6b0a7a3def8cf3f3d6120ff337bc4c40f7",
                "filename": "CVE-2024-57979-c4041b6b0a7a3def8cf3f3d6120ff337bc4c40f7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57979/CVE-2024-57979-c4041b6b0a7a3def8cf3f3d6120ff337bc4c40f7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c79a39dc8d060b9e64e8b0fa9d245d44befeefbe",
                "patch_url": "https://git.kernel.org/stable/p/c79a39dc8d060b9e64e8b0fa9d245d44befeefbe",
                "filename": "CVE-2024-57979-c79a39dc8d060b9e64e8b0fa9d245d44befeefbe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57979/CVE-2024-57979-c79a39dc8d060b9e64e8b0fa9d245d44befeefbe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cd3bbcb6b3a7caa5ce67de76723b6d8531fb7f64",
                "patch_url": "https://git.kernel.org/stable/p/cd3bbcb6b3a7caa5ce67de76723b6d8531fb7f64",
                "filename": "CVE-2024-57979-cd3bbcb6b3a7caa5ce67de76723b6d8531fb7f64.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57979/CVE-2024-57979-cd3bbcb6b3a7caa5ce67de76723b6d8531fb7f64.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1a7735ab2cb9747518a7416fb5929e85442dec62",
            "https://git.kernel.org/stable/c/785c78ed0d39d1717cca3ef931d3e51337b5e90e",
            "https://git.kernel.org/stable/c/7e5ee3281dc09014367f5112b6d566ba36ea2d49",
            "https://git.kernel.org/stable/c/85241f7de216f8298f6e48540ea13d7dcd100870",
            "https://git.kernel.org/stable/c/91932db1d96b2952299ce30c1c693d834d10ace6",
            "https://git.kernel.org/stable/c/c4041b6b0a7a3def8cf3f3d6120ff337bc4c40f7",
            "https://git.kernel.org/stable/c/c79a39dc8d060b9e64e8b0fa9d245d44befeefbe",
            "https://git.kernel.org/stable/c/cd3bbcb6b3a7caa5ce67de76723b6d8531fb7f64",
            "https://www.cve.org/CVERecord?id=CVE-2024-57979\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-57979\nhttps://lore.kernel.org/linux-cve-announce/2025022634-CVE-2024-57979-aad0@gregkh/T"
        ]
    },
    "CVE-2024-57980": {
        "cve": "CVE-2024-57980",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Fix double free in error path\n\nIf the uvc_status_init() function fails to allocate the int_urb, it will\nfree the dev->status pointer but doesn't reset the pointer to NULL. This\nresults in the kfree() call in uvc_status_cleanup() trying to\ndouble-free the memory. Fix it by resetting the dev->status pointer to\nNULL after freeing it.\n\nReviewed by: Ricardo Ribalda <ribalda@chromium.org>",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-57980",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9232719ac9ce4d5c213cebda23d72aec3e1c4c0d",
            "patch_url": "https://git.kernel.org/stable/p/9232719ac9ce4d5c213cebda23d72aec3e1c4c0d",
            "filename": "CVE-2024-57980-9232719ac9ce4d5c213cebda23d72aec3e1c4c0d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57980/CVE-2024-57980-9232719ac9ce4d5c213cebda23d72aec3e1c4c0d.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3ba8884a56a3eb97c22f0ce0e4dd410d4ca4c277",
                "patch_url": "https://git.kernel.org/stable/p/3ba8884a56a3eb97c22f0ce0e4dd410d4ca4c277",
                "filename": "CVE-2024-57980-3ba8884a56a3eb97c22f0ce0e4dd410d4ca4c277.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57980/CVE-2024-57980-3ba8884a56a3eb97c22f0ce0e4dd410d4ca4c277.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6c36dcd662ec5276782838660f8533a7cb26be49",
                "patch_url": "https://git.kernel.org/stable/p/6c36dcd662ec5276782838660f8533a7cb26be49",
                "filename": "CVE-2024-57980-6c36dcd662ec5276782838660f8533a7cb26be49.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57980/CVE-2024-57980-6c36dcd662ec5276782838660f8533a7cb26be49.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/87522ef165e5b6de8ef98cc318f3335166a1512c",
                "patch_url": "https://git.kernel.org/stable/p/87522ef165e5b6de8ef98cc318f3335166a1512c",
                "filename": "CVE-2024-57980-87522ef165e5b6de8ef98cc318f3335166a1512c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57980/CVE-2024-57980-87522ef165e5b6de8ef98cc318f3335166a1512c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9232719ac9ce4d5c213cebda23d72aec3e1c4c0d",
                "patch_url": "https://git.kernel.org/stable/p/9232719ac9ce4d5c213cebda23d72aec3e1c4c0d",
                "filename": "CVE-2024-57980-9232719ac9ce4d5c213cebda23d72aec3e1c4c0d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57980/CVE-2024-57980-9232719ac9ce4d5c213cebda23d72aec3e1c4c0d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac",
                "patch_url": "https://git.kernel.org/stable/p/c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac",
                "filename": "CVE-2024-57980-c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57980/CVE-2024-57980-c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d1f8e69eec91d5a75ef079778a5d0151db2a7f22",
                "patch_url": "https://git.kernel.org/stable/p/d1f8e69eec91d5a75ef079778a5d0151db2a7f22",
                "filename": "CVE-2024-57980-d1f8e69eec91d5a75ef079778a5d0151db2a7f22.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57980/CVE-2024-57980-d1f8e69eec91d5a75ef079778a5d0151db2a7f22.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d6e5ba2516c5bef87c1fcb8189b6f3cad7c64b2d",
                "patch_url": "https://git.kernel.org/stable/p/d6e5ba2516c5bef87c1fcb8189b6f3cad7c64b2d",
                "filename": "CVE-2024-57980-d6e5ba2516c5bef87c1fcb8189b6f3cad7c64b2d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57980/CVE-2024-57980-d6e5ba2516c5bef87c1fcb8189b6f3cad7c64b2d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d8e63dd7b6683969d3d47c7b8e9635f96d554ad4",
                "patch_url": "https://git.kernel.org/stable/p/d8e63dd7b6683969d3d47c7b8e9635f96d554ad4",
                "filename": "CVE-2024-57980-d8e63dd7b6683969d3d47c7b8e9635f96d554ad4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-57980/CVE-2024-57980-d8e63dd7b6683969d3d47c7b8e9635f96d554ad4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3ba8884a56a3eb97c22f0ce0e4dd410d4ca4c277",
            "https://git.kernel.org/stable/c/6c36dcd662ec5276782838660f8533a7cb26be49",
            "https://git.kernel.org/stable/c/87522ef165e5b6de8ef98cc318f3335166a1512c",
            "https://git.kernel.org/stable/c/9232719ac9ce4d5c213cebda23d72aec3e1c4c0d",
            "https://git.kernel.org/stable/c/c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac",
            "https://git.kernel.org/stable/c/d1f8e69eec91d5a75ef079778a5d0151db2a7f22",
            "https://git.kernel.org/stable/c/d6e5ba2516c5bef87c1fcb8189b6f3cad7c64b2d",
            "https://git.kernel.org/stable/c/d8e63dd7b6683969d3d47c7b8e9635f96d554ad4",
            "https://www.cve.org/CVERecord?id=CVE-2024-57980\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-57980\nhttps://lore.kernel.org/linux-cve-announce/2025022634-CVE-2024-57980-4b5a@gregkh/T"
        ]
    },
    "CVE-2024-58002": {
        "cve": "CVE-2024-58002",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Remove dangling pointers\n\nWhen an async control is written, we copy a pointer to the file handle\nthat started the operation. That pointer will be used when the device is\ndone. Which could be anytime in the future.\n\nIf the user closes that file descriptor, its structure will be freed,\nand there will be one dangling pointer per pending async control, that\nthe driver will try to use.\n\nClean all the dangling pointers during release().\n\nTo avoid adding a performance penalty in the most common case (no async\noperation), a counter has been introduced with some logic to make sure\nthat it is properly handled.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-58002",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/117f7a2975baa4b7d702d3f4830d5a4ebd0c6d50",
            "patch_url": "https://git.kernel.org/stable/p/117f7a2975baa4b7d702d3f4830d5a4ebd0c6d50",
            "filename": "CVE-2024-58002-117f7a2975baa4b7d702d3f4830d5a4ebd0c6d50.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-58002/CVE-2024-58002-117f7a2975baa4b7d702d3f4830d5a4ebd0c6d50.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/117f7a2975baa4b7d702d3f4830d5a4ebd0c6d50",
                "patch_url": "https://git.kernel.org/stable/p/117f7a2975baa4b7d702d3f4830d5a4ebd0c6d50",
                "filename": "CVE-2024-58002-117f7a2975baa4b7d702d3f4830d5a4ebd0c6d50.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-58002/CVE-2024-58002-117f7a2975baa4b7d702d3f4830d5a4ebd0c6d50.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/221cd51efe4565501a3dbf04cc011b537dcce7fb",
                "patch_url": "https://git.kernel.org/stable/p/221cd51efe4565501a3dbf04cc011b537dcce7fb",
                "filename": "CVE-2024-58002-221cd51efe4565501a3dbf04cc011b537dcce7fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-58002/CVE-2024-58002-221cd51efe4565501a3dbf04cc011b537dcce7fb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2a29413ace64627e178fd422dd8a5d95219a2c0b",
                "patch_url": "https://git.kernel.org/stable/p/2a29413ace64627e178fd422dd8a5d95219a2c0b",
                "filename": "CVE-2024-58002-2a29413ace64627e178fd422dd8a5d95219a2c0b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-58002/CVE-2024-58002-2a29413ace64627e178fd422dd8a5d95219a2c0b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/438bda062b2c40ddd7df23b932e29ffe0a448cac",
                "patch_url": "https://git.kernel.org/stable/p/438bda062b2c40ddd7df23b932e29ffe0a448cac",
                "filename": "CVE-2024-58002-438bda062b2c40ddd7df23b932e29ffe0a448cac.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-58002/CVE-2024-58002-438bda062b2c40ddd7df23b932e29ffe0a448cac.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4dbaa738c583a0e947803c69e8996e88cf98d971",
                "patch_url": "https://git.kernel.org/stable/p/4dbaa738c583a0e947803c69e8996e88cf98d971",
                "filename": "CVE-2024-58002-4dbaa738c583a0e947803c69e8996e88cf98d971.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-58002/CVE-2024-58002-4dbaa738c583a0e947803c69e8996e88cf98d971.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/653993f46861f2971e95e9a0e36a34b49dec542c",
                "patch_url": "https://git.kernel.org/stable/p/653993f46861f2971e95e9a0e36a34b49dec542c",
                "filename": "CVE-2024-58002-653993f46861f2971e95e9a0e36a34b49dec542c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-58002/CVE-2024-58002-653993f46861f2971e95e9a0e36a34b49dec542c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9edc7d25f7e49c33a1ce7a5ffadea2222065516c",
                "patch_url": "https://git.kernel.org/stable/p/9edc7d25f7e49c33a1ce7a5ffadea2222065516c",
                "filename": "CVE-2024-58002-9edc7d25f7e49c33a1ce7a5ffadea2222065516c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-58002/CVE-2024-58002-9edc7d25f7e49c33a1ce7a5ffadea2222065516c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ac18d781466252cd35a3e311e0a4b264260fd927",
                "patch_url": "https://git.kernel.org/stable/p/ac18d781466252cd35a3e311e0a4b264260fd927",
                "filename": "CVE-2024-58002-ac18d781466252cd35a3e311e0a4b264260fd927.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-58002/CVE-2024-58002-ac18d781466252cd35a3e311e0a4b264260fd927.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/117f7a2975baa4b7d702d3f4830d5a4ebd0c6d50",
            "https://git.kernel.org/stable/c/221cd51efe4565501a3dbf04cc011b537dcce7fb",
            "https://git.kernel.org/stable/c/2a29413ace64627e178fd422dd8a5d95219a2c0b",
            "https://git.kernel.org/stable/c/438bda062b2c40ddd7df23b932e29ffe0a448cac",
            "https://git.kernel.org/stable/c/4dbaa738c583a0e947803c69e8996e88cf98d971",
            "https://git.kernel.org/stable/c/653993f46861f2971e95e9a0e36a34b49dec542c",
            "https://git.kernel.org/stable/c/9edc7d25f7e49c33a1ce7a5ffadea2222065516c",
            "https://git.kernel.org/stable/c/ac18d781466252cd35a3e311e0a4b264260fd927",
            "https://www.cve.org/CVERecord?id=CVE-2024-58002\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-58002\nhttps://lore.kernel.org/linux-cve-announce/2025022654-CVE-2024-58002-6f93@gregkh/T"
        ]
    },
    "CVE-2024-6345": {
        "cve": "CVE-2024-6345",
        "cvss_v2": null,
        "cvss_v3": 8.8,
        "description": "A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-6345",
        "selected_patch": {
            "url": "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0",
            "patch_url": "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0.patch",
            "filename": "CVE-2024-6345-88807c7062788254f654ea8c03427adc859321f0.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-6345/CVE-2024-6345-88807c7062788254f654ea8c03427adc859321f0.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0",
                "patch_url": "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0.patch",
                "filename": "CVE-2024-6345-88807c7062788254f654ea8c03427adc859321f0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-6345/CVE-2024-6345-88807c7062788254f654ea8c03427adc859321f0.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0"
        ]
    },
    "CVE-2024-7383": {
        "cve": "CVE-2024-7383",
        "cvss_v2": null,
        "cvss_v3": 7.4,
        "description": "A flaw was found in libnbd. The client did not always correctly verify the NBD server's certificate when using TLS to connect to an NBD server. This issue allows a man-in-the-middle attack on NBD traffic.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-7383",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-7409": {
        "cve": "CVE-2024-7409",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-7409",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2024-8176": {
        "cve": "CVE-2024-8176",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-8176",
        "selected_patch": {
            "url": "https://github.com/libexpat/libexpat/pull/973",
            "patch_url": "https://github.com/libexpat/libexpat/pull/973.patch",
            "filename": "CVE-2024-8176-https___github_com_libexpat_libexpat_pull_973_patch.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-8176/CVE-2024-8176-https___github_com_libexpat_libexpat_pull_973_patch.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/libexpat/libexpat/pull/973",
                "patch_url": "https://github.com/libexpat/libexpat/pull/973.patch",
                "filename": "CVE-2024-8176-https___github_com_libexpat_libexpat_pull_973_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2024-8176/CVE-2024-8176-https___github_com_libexpat_libexpat_pull_973_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/libexpat/libexpat/pull/973"
        ]
    },
    "CVE-2024-8508": {
        "cve": "CVE-2024-8508",
        "cvss_v2": null,
        "cvss_v3": 5.3,
        "description": "NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to avoid locking the CPU for long. This change should not affect normal DNS traffic.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2024-8508",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-0624": {
        "cve": "CVE-2025-0624",
        "cvss_v2": null,
        "cvss_v3": 7.6,
        "description": "A flaw was found in grub2. During the network boot process, when trying to search for the configuration file, grub copies data from a user controlled environment variable into an internal buffer using the grub_strcpy() function. During this step, it fails to consider the environment variable length when allocating the internal buffer, resulting in an out-of-bounds write. If correctly exploited, this issue may result in remote code execution through the same network segment grub is searching for the boot information, which can be used to by-pass secure boot protections.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-0624",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-0938": {
        "cve": "CVE-2025-0938",
        "cvss_v2": null,
        "cvss_v3": "6.8",
        "description": "The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-0938",
        "selected_patch": {
            "url": "https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba",
            "patch_url": "https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba.patch",
            "filename": "CVE-2025-0938-526617ed68cde460236c973e5d0a8bad4de896ba.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-0938/CVE-2025-0938-526617ed68cde460236c973e5d0a8bad4de896ba.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba",
                "patch_url": "https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba.patch",
                "filename": "CVE-2025-0938-526617ed68cde460236c973e5d0a8bad4de896ba.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-0938/CVE-2025-0938-526617ed68cde460236c973e5d0a8bad4de896ba.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403",
                "patch_url": "https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403.patch",
                "filename": "CVE-2025-0938-90e526ae67b172ed7c6c56e7edad36263b0f9403.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-0938/CVE-2025-0938-90e526ae67b172ed7c6c56e7edad36263b0f9403.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568",
                "patch_url": "https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568.patch",
                "filename": "CVE-2025-0938-a7084f6075c9595ba60119ce8c62f1496f50c568.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-0938/CVE-2025-0938-a7084f6075c9595ba60119ce8c62f1496f50c568.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab",
                "patch_url": "https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab.patch",
                "filename": "CVE-2025-0938-b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-0938/CVE-2025-0938-b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a",
                "patch_url": "https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a.patch",
                "filename": "CVE-2025-0938-d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-0938/CVE-2025-0938-d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32",
                "patch_url": "https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32.patch",
                "filename": "CVE-2025-0938-ff4e5c25666f63544071a6b075ae8b25c98b7a32.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-0938/CVE-2025-0938-ff4e5c25666f63544071a6b075ae8b25c98b7a32.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/pull/129418",
                "patch_url": "https://github.com/python/cpython/pull/129418.patch",
                "filename": "CVE-2025-0938-https___github_com_python_cpython_pull_129418_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-0938/CVE-2025-0938-https___github_com_python_cpython_pull_129418_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba",
            "https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403",
            "https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568",
            "https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab",
            "https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a",
            "https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32",
            "https://github.com/python/cpython/pull/129418"
        ]
    },
    "CVE-2025-11234": {
        "cve": "CVE-2025-11234",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VNC client authentication.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-11234",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-11561": {
        "cve": "CVE-2025-11561",
        "cvss_v2": null,
        "cvss_v3": 8.8,
        "description": "A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. In default configurations, the Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is enabled, but a fallback to the an2ln plugin is possible. This fallback allows an attacker with permission to modify certain AD attributes (such as userPrincipalName or samAccountName) to impersonate privileged users, potentially resulting in unauthorized access or privilege escalation on domain-joined Linux hosts.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-11561",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-12084": {
        "cve": "CVE-2025-12084",
        "cvss_v2": null,
        "cvss_v3": 5.3,
        "description": "When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-12084",
        "selected_patch": {
            "url": "https://github.com/python/cpython/commit/027f21e417b26eed4505ac2db101a4352b7c51a0",
            "patch_url": "https://github.com/python/cpython/commit/027f21e417b26eed4505ac2db101a4352b7c51a0.patch",
            "filename": "CVE-2025-12084-027f21e417b26eed4505ac2db101a4352b7c51a0.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-12084/CVE-2025-12084-027f21e417b26eed4505ac2db101a4352b7c51a0.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/python/cpython/commit/027f21e417b26eed4505ac2db101a4352b7c51a0",
                "patch_url": "https://github.com/python/cpython/commit/027f21e417b26eed4505ac2db101a4352b7c51a0.patch",
                "filename": "CVE-2025-12084-027f21e417b26eed4505ac2db101a4352b7c51a0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-12084/CVE-2025-12084-027f21e417b26eed4505ac2db101a4352b7c51a0.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/08d8e18ad81cd45bc4a27d6da478b51ea49486e4",
                "patch_url": "https://github.com/python/cpython/commit/08d8e18ad81cd45bc4a27d6da478b51ea49486e4.patch",
                "filename": "CVE-2025-12084-08d8e18ad81cd45bc4a27d6da478b51ea49486e4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-12084/CVE-2025-12084-08d8e18ad81cd45bc4a27d6da478b51ea49486e4.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/27648a1818749ef44c420afe6173af6868715437",
                "patch_url": "https://github.com/python/cpython/commit/27648a1818749ef44c420afe6173af6868715437.patch",
                "filename": "CVE-2025-12084-27648a1818749ef44c420afe6173af6868715437.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-12084/CVE-2025-12084-27648a1818749ef44c420afe6173af6868715437.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/41f468786762348960486c166833a218a0a436af",
                "patch_url": "https://github.com/python/cpython/commit/41f468786762348960486c166833a218a0a436af.patch",
                "filename": "CVE-2025-12084-41f468786762348960486c166833a218a0a436af.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-12084/CVE-2025-12084-41f468786762348960486c166833a218a0a436af.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/57937a8e5e293f0dcba5115f7b7a11b1e0c9a273",
                "patch_url": "https://github.com/python/cpython/commit/57937a8e5e293f0dcba5115f7b7a11b1e0c9a273.patch",
                "filename": "CVE-2025-12084-57937a8e5e293f0dcba5115f7b7a11b1e0c9a273.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-12084/CVE-2025-12084-57937a8e5e293f0dcba5115f7b7a11b1e0c9a273.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/8d2d7bb2e754f8649a68ce4116271a4932f76907",
                "patch_url": "https://github.com/python/cpython/commit/8d2d7bb2e754f8649a68ce4116271a4932f76907.patch",
                "filename": "CVE-2025-12084-8d2d7bb2e754f8649a68ce4116271a4932f76907.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-12084/CVE-2025-12084-8d2d7bb2e754f8649a68ce4116271a4932f76907.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/9c9dda6625a2a90d2a06c657eee021d6be19842d",
                "patch_url": "https://github.com/python/cpython/commit/9c9dda6625a2a90d2a06c657eee021d6be19842d.patch",
                "filename": "CVE-2025-12084-9c9dda6625a2a90d2a06c657eee021d6be19842d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-12084/CVE-2025-12084-9c9dda6625a2a90d2a06c657eee021d6be19842d.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/a46c10ec9d4050ab67b8a932e0859a2ea60c3cb8",
                "patch_url": "https://github.com/python/cpython/commit/a46c10ec9d4050ab67b8a932e0859a2ea60c3cb8.patch",
                "filename": "CVE-2025-12084-a46c10ec9d4050ab67b8a932e0859a2ea60c3cb8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-12084/CVE-2025-12084-a46c10ec9d4050ab67b8a932e0859a2ea60c3cb8.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/a696ba8b4d42fd632afc9bc88ad830a2e4cceed8",
                "patch_url": "https://github.com/python/cpython/commit/a696ba8b4d42fd632afc9bc88ad830a2e4cceed8.patch",
                "filename": "CVE-2025-12084-a696ba8b4d42fd632afc9bc88ad830a2e4cceed8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-12084/CVE-2025-12084-a696ba8b4d42fd632afc9bc88ad830a2e4cceed8.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/c97e87593063d84a2bd9fe7068b30eb44de23dc0",
                "patch_url": "https://github.com/python/cpython/commit/c97e87593063d84a2bd9fe7068b30eb44de23dc0.patch",
                "filename": "CVE-2025-12084-c97e87593063d84a2bd9fe7068b30eb44de23dc0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-12084/CVE-2025-12084-c97e87593063d84a2bd9fe7068b30eb44de23dc0.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/ddcd2acd85d891a53e281c773b3093f9db953964",
                "patch_url": "https://github.com/python/cpython/commit/ddcd2acd85d891a53e281c773b3093f9db953964.patch",
                "filename": "CVE-2025-12084-ddcd2acd85d891a53e281c773b3093f9db953964.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-12084/CVE-2025-12084-ddcd2acd85d891a53e281c773b3093f9db953964.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/e91c11449cad34bac3ea55ee09ca557691d92b53",
                "patch_url": "https://github.com/python/cpython/commit/e91c11449cad34bac3ea55ee09ca557691d92b53.patch",
                "filename": "CVE-2025-12084-e91c11449cad34bac3ea55ee09ca557691d92b53.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-12084/CVE-2025-12084-e91c11449cad34bac3ea55ee09ca557691d92b53.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/pull/142146",
                "patch_url": "https://github.com/python/cpython/pull/142146.patch",
                "filename": "CVE-2025-12084-https___github_com_python_cpython_pull_142146_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-12084/CVE-2025-12084-https___github_com_python_cpython_pull_142146_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/python/cpython/commit/027f21e417b26eed4505ac2db101a4352b7c51a0",
            "https://github.com/python/cpython/commit/08d8e18ad81cd45bc4a27d6da478b51ea49486e4",
            "https://github.com/python/cpython/commit/27648a1818749ef44c420afe6173af6868715437",
            "https://github.com/python/cpython/commit/41f468786762348960486c166833a218a0a436af",
            "https://github.com/python/cpython/commit/57937a8e5e293f0dcba5115f7b7a11b1e0c9a273",
            "https://github.com/python/cpython/commit/8d2d7bb2e754f8649a68ce4116271a4932f76907",
            "https://github.com/python/cpython/commit/9c9dda6625a2a90d2a06c657eee021d6be19842d",
            "https://github.com/python/cpython/commit/a46c10ec9d4050ab67b8a932e0859a2ea60c3cb8",
            "https://github.com/python/cpython/commit/a696ba8b4d42fd632afc9bc88ad830a2e4cceed8",
            "https://github.com/python/cpython/commit/c97e87593063d84a2bd9fe7068b30eb44de23dc0",
            "https://github.com/python/cpython/commit/ddcd2acd85d891a53e281c773b3093f9db953964",
            "https://github.com/python/cpython/commit/e91c11449cad34bac3ea55ee09ca557691d92b53",
            "https://github.com/python/cpython/pull/142146"
        ]
    },
    "CVE-2025-12801": {
        "cve": "CVE-2025-12801",
        "cvss_v2": null,
        "cvss_v3": 6.5,
        "description": "A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-12801",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-13601": {
        "cve": "CVE-2025-13601",
        "cvss_v2": null,
        "cvss_v3": 7.7,
        "description": "A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-13601",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-14104": {
        "cve": "CVE-2025-14104",
        "cvss_v2": null,
        "cvss_v3": 6.1,
        "description": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-14104",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-14831": {
        "cve": "CVE-2025-14831",
        "cvss_v2": null,
        "cvss_v3": 5.3,
        "description": "A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-14831",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-15366": {
        "cve": "CVE-2025-15366",
        "cvss_v2": null,
        "cvss_v3": "7.1",
        "description": "The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-15366",
        "selected_patch": {
            "url": "https://github.com/python/cpython/commit/6262704b134db2a4ba12e85ecfbd968534f28b45",
            "patch_url": "https://github.com/python/cpython/commit/6262704b134db2a4ba12e85ecfbd968534f28b45.patch",
            "filename": "CVE-2025-15366-6262704b134db2a4ba12e85ecfbd968534f28b45.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-15366/CVE-2025-15366-6262704b134db2a4ba12e85ecfbd968534f28b45.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/python/cpython/commit/6262704b134db2a4ba12e85ecfbd968534f28b45",
                "patch_url": "https://github.com/python/cpython/commit/6262704b134db2a4ba12e85ecfbd968534f28b45.patch",
                "filename": "CVE-2025-15366-6262704b134db2a4ba12e85ecfbd968534f28b45.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-15366/CVE-2025-15366-6262704b134db2a4ba12e85ecfbd968534f28b45.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/pull/143922",
                "patch_url": "https://github.com/python/cpython/pull/143922.patch",
                "filename": "CVE-2025-15366-https___github_com_python_cpython_pull_143922_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-15366/CVE-2025-15366-https___github_com_python_cpython_pull_143922_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/python/cpython/commit/6262704b134db2a4ba12e85ecfbd968534f28b45",
            "https://github.com/python/cpython/pull/143922"
        ]
    },
    "CVE-2025-15367": {
        "cve": "CVE-2025-15367",
        "cvss_v2": null,
        "cvss_v3": "7.1",
        "description": "The poplib module, when passed a user-controlled command, can have\nadditional commands injected using newlines. Mitigation rejects commands\ncontaining control characters.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-15367",
        "selected_patch": {
            "url": "https://github.com/python/cpython/commit/b234a2b67539f787e191d2ef19a7cbdce32874e7",
            "patch_url": "https://github.com/python/cpython/commit/b234a2b67539f787e191d2ef19a7cbdce32874e7.patch",
            "filename": "CVE-2025-15367-b234a2b67539f787e191d2ef19a7cbdce32874e7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-15367/CVE-2025-15367-b234a2b67539f787e191d2ef19a7cbdce32874e7.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/python/cpython/commit/b234a2b67539f787e191d2ef19a7cbdce32874e7",
                "patch_url": "https://github.com/python/cpython/commit/b234a2b67539f787e191d2ef19a7cbdce32874e7.patch",
                "filename": "CVE-2025-15367-b234a2b67539f787e191d2ef19a7cbdce32874e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-15367/CVE-2025-15367-b234a2b67539f787e191d2ef19a7cbdce32874e7.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/pull/143924",
                "patch_url": "https://github.com/python/cpython/pull/143924.patch",
                "filename": "CVE-2025-15367-https___github_com_python_cpython_pull_143924_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-15367/CVE-2025-15367-https___github_com_python_cpython_pull_143924_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/python/cpython/commit/b234a2b67539f787e191d2ef19a7cbdce32874e7",
            "https://github.com/python/cpython/pull/143924"
        ]
    },
    "CVE-2025-21727": {
        "cve": "CVE-2025-21727",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: fix UAF in padata_reorder\n\nA bug was found when run ltp test:\n\nBUG: KASAN: slab-use-after-free in padata_find_next+0x29/0x1a0\nRead of size 4 at addr ffff88bbfe003524 by task kworker/u113:2/3039206\n\nCPU: 0 PID: 3039206 Comm: kworker/u113:2 Kdump: loaded Not tainted 6.6.0+\nWorkqueue: pdecrypt_parallel padata_parallel_worker\nCall Trace:\n<TASK>\ndump_stack_lvl+0x32/0x50\nprint_address_description.constprop.0+0x6b/0x3d0\nprint_report+0xdd/0x2c0\nkasan_report+0xa5/0xd0\npadata_find_next+0x29/0x1a0\npadata_reorder+0x131/0x220\npadata_parallel_worker+0x3d/0xc0\nprocess_one_work+0x2ec/0x5a0\n\nIf 'mdelay(10)' is added before calling 'padata_find_next' in the\n'padata_reorder' function, this issue could be reproduced easily with\nltp test (pcrypt_aead01).\n\nThis can be explained as bellow:\n\npcrypt_aead_encrypt\n...\npadata_do_parallel\nrefcount_inc(&pd->refcnt); // add refcnt\n...\npadata_do_serial\npadata_reorder // pd\nwhile (1) {\npadata_find_next(pd, true); // using pd\nqueue_work_on\n...\npadata_serial_worker\t\t\t\tcrypto_del_alg\npadata_put_pd_cnt // sub refcnt\n\t\t\t\t\t\tpadata_free_shell\n\t\t\t\t\t\tpadata_put_pd(ps->pd);\n\t\t\t\t\t\t// pd is freed\n// loop again, but pd is freed\n// call padata_find_next, UAF\n}\n\nIn the padata_reorder function, when it loops in 'while', if the alg is\ndeleted, the refcnt may be decreased to 0 before entering\n'padata_find_next', which leads to UAF.\n\nAs mentioned in [1], do_serial is supposed to be called with BHs disabled\nand always happen under RCU protection, to address this issue, add\nsynchronize_rcu() in 'padata_free_shell' wait for all _do_serial calls\nto finish.\n\n[1] https://lore.kernel.org/all/20221028160401.cccypv4euxikusiq@parnassus.localdomain/\n[2] https://lore.kernel.org/linux-kernel/jfjz5d7zwbytztackem7ibzalm5lnxldi2eofeiczqmqs2m7o6@fq426cwnjtkm/",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-21727",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0ae2f332cfd2d74cf3ce344ec9938cf3e29c3ccd",
            "patch_url": "https://git.kernel.org/stable/p/0ae2f332cfd2d74cf3ce344ec9938cf3e29c3ccd",
            "filename": "CVE-2025-21727-0ae2f332cfd2d74cf3ce344ec9938cf3e29c3ccd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21727/CVE-2025-21727-0ae2f332cfd2d74cf3ce344ec9938cf3e29c3ccd.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0ae2f332cfd2d74cf3ce344ec9938cf3e29c3ccd",
                "patch_url": "https://git.kernel.org/stable/p/0ae2f332cfd2d74cf3ce344ec9938cf3e29c3ccd",
                "filename": "CVE-2025-21727-0ae2f332cfd2d74cf3ce344ec9938cf3e29c3ccd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21727/CVE-2025-21727-0ae2f332cfd2d74cf3ce344ec9938cf3e29c3ccd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/573ac9c70bf7885dc85d82fa44550581bfc3b738",
                "patch_url": "https://git.kernel.org/stable/p/573ac9c70bf7885dc85d82fa44550581bfc3b738",
                "filename": "CVE-2025-21727-573ac9c70bf7885dc85d82fa44550581bfc3b738.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21727/CVE-2025-21727-573ac9c70bf7885dc85d82fa44550581bfc3b738.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/80231f069240d52e98b6a317456c67b2eafd0781",
                "patch_url": "https://git.kernel.org/stable/p/80231f069240d52e98b6a317456c67b2eafd0781",
                "filename": "CVE-2025-21727-80231f069240d52e98b6a317456c67b2eafd0781.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21727/CVE-2025-21727-80231f069240d52e98b6a317456c67b2eafd0781.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bbccae982e9fa1d7abcb23a5ec81cb0ec883f7de",
                "patch_url": "https://git.kernel.org/stable/p/bbccae982e9fa1d7abcb23a5ec81cb0ec883f7de",
                "filename": "CVE-2025-21727-bbccae982e9fa1d7abcb23a5ec81cb0ec883f7de.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21727/CVE-2025-21727-bbccae982e9fa1d7abcb23a5ec81cb0ec883f7de.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e01780ea4661172734118d2a5f41bc9720765668",
                "patch_url": "https://git.kernel.org/stable/p/e01780ea4661172734118d2a5f41bc9720765668",
                "filename": "CVE-2025-21727-e01780ea4661172734118d2a5f41bc9720765668.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21727/CVE-2025-21727-e01780ea4661172734118d2a5f41bc9720765668.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f3e0b9f790f8e8065d59e67b565a83154d9f3079",
                "patch_url": "https://git.kernel.org/stable/p/f3e0b9f790f8e8065d59e67b565a83154d9f3079",
                "filename": "CVE-2025-21727-f3e0b9f790f8e8065d59e67b565a83154d9f3079.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21727/CVE-2025-21727-f3e0b9f790f8e8065d59e67b565a83154d9f3079.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f78170bee51469734b1a306a74fc5f777bb22ba6",
                "patch_url": "https://git.kernel.org/stable/p/f78170bee51469734b1a306a74fc5f777bb22ba6",
                "filename": "CVE-2025-21727-f78170bee51469734b1a306a74fc5f777bb22ba6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21727/CVE-2025-21727-f78170bee51469734b1a306a74fc5f777bb22ba6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0ae2f332cfd2d74cf3ce344ec9938cf3e29c3ccd",
            "https://git.kernel.org/stable/c/573ac9c70bf7885dc85d82fa44550581bfc3b738",
            "https://git.kernel.org/stable/c/80231f069240d52e98b6a317456c67b2eafd0781",
            "https://git.kernel.org/stable/c/bbccae982e9fa1d7abcb23a5ec81cb0ec883f7de",
            "https://git.kernel.org/stable/c/e01780ea4661172734118d2a5f41bc9720765668",
            "https://git.kernel.org/stable/c/f3e0b9f790f8e8065d59e67b565a83154d9f3079",
            "https://git.kernel.org/stable/c/f78170bee51469734b1a306a74fc5f777bb22ba6",
            "https://lore.kernel.org/all/",
            "https://lore.kernel.org/linux-kernel/jfjz5d7zwbytztackem7ibzalm5lnxldi2eofeiczqmqs2m7o6@fq426cwnjtkm/",
            "https://www.cve.org/CVERecord?id=CVE-2025-21727\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-21727\nhttps://lore.kernel.org/linux-cve-announce/2025022648-CVE-2025-21727-b034@gregkh/T"
        ]
    },
    "CVE-2025-21756": {
        "cve": "CVE-2025-21756",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Keep the binding until socket destruction\n\nPreserve sockets bindings; this includes both resulting from an explicit\nbind() and those implicitly bound through autobind during connect().\n\nPrevents socket unbinding during a transport reassignment, which fixes a\nuse-after-free:\n\n    1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2)\n    2. transport->release() calls vsock_remove_bound() without checking if\n       sk was bound and moved to bound list (refcnt=1)\n    3. vsock_bind() assumes sk is in unbound list and before\n       __vsock_insert_bound(vsock_bound_sockets()) calls\n       __vsock_remove_bound() which does:\n           list_del_init(&vsk->bound_table); // nop\n           sock_put(&vsk->sk);               // refcnt=0\n\nBUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730\nRead of size 4 at addr ffff88816b46a74c by task a.out/2057\n dump_stack_lvl+0x68/0x90\n print_report+0x174/0x4f6\n kasan_report+0xb9/0x190\n __vsock_bind+0x62e/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nAllocated by task 2057:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n __kasan_slab_alloc+0x85/0x90\n kmem_cache_alloc_noprof+0x131/0x450\n sk_prot_alloc+0x5b/0x220\n sk_alloc+0x2c/0x870\n __vsock_create.constprop.0+0x2e/0xb60\n vsock_create+0xe4/0x420\n __sock_create+0x241/0x650\n __sys_socket+0xf2/0x1a0\n __x64_sys_socket+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFreed by task 2057:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n kasan_save_free_info+0x37/0x60\n __kasan_slab_free+0x4b/0x70\n kmem_cache_free+0x1a1/0x590\n __sk_destruct+0x388/0x5a0\n __vsock_bind+0x5e1/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 7 PID: 2057 at lib/refcount.c:25 refcount_warn_saturate+0xce/0x150\nRIP: 0010:refcount_warn_saturate+0xce/0x150\n __vsock_bind+0x66d/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 7 PID: 2057 at lib/refcount.c:28 refcount_warn_saturate+0xee/0x150\nRIP: 0010:refcount_warn_saturate+0xee/0x150\n vsock_remove_bound+0x187/0x1e0\n __vsock_release+0x383/0x4a0\n vsock_release+0x90/0x120\n __sock_release+0xa3/0x250\n sock_close+0x14/0x20\n __fput+0x359/0xa80\n task_work_run+0x107/0x1d0\n do_exit+0x847/0x2560\n do_group_exit+0xb8/0x250\n __x64_sys_exit_group+0x3a/0x50\n x64_sys_call+0xfec/0x14f0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-21756",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3f43540166128951cc1be7ab1ce6b7f05c670d8b",
            "patch_url": "https://git.kernel.org/stable/p/3f43540166128951cc1be7ab1ce6b7f05c670d8b",
            "filename": "CVE-2025-21756-3f43540166128951cc1be7ab1ce6b7f05c670d8b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21756/CVE-2025-21756-3f43540166128951cc1be7ab1ce6b7f05c670d8b.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3f43540166128951cc1be7ab1ce6b7f05c670d8b",
                "patch_url": "https://git.kernel.org/stable/p/3f43540166128951cc1be7ab1ce6b7f05c670d8b",
                "filename": "CVE-2025-21756-3f43540166128951cc1be7ab1ce6b7f05c670d8b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21756/CVE-2025-21756-3f43540166128951cc1be7ab1ce6b7f05c670d8b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/42b33381e5e1f2b967dc4fb4221ddb9aaf10d197",
                "patch_url": "https://git.kernel.org/stable/p/42b33381e5e1f2b967dc4fb4221ddb9aaf10d197",
                "filename": "CVE-2025-21756-42b33381e5e1f2b967dc4fb4221ddb9aaf10d197.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21756/CVE-2025-21756-42b33381e5e1f2b967dc4fb4221ddb9aaf10d197.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/645ce25aa0e67895b11d89f27bb86c9d444c40f8",
                "patch_url": "https://git.kernel.org/stable/p/645ce25aa0e67895b11d89f27bb86c9d444c40f8",
                "filename": "CVE-2025-21756-645ce25aa0e67895b11d89f27bb86c9d444c40f8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21756/CVE-2025-21756-645ce25aa0e67895b11d89f27bb86c9d444c40f8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b1afd40321f1c243cffbcf40ea7ca41aca87fa5e",
                "patch_url": "https://git.kernel.org/stable/p/b1afd40321f1c243cffbcf40ea7ca41aca87fa5e",
                "filename": "CVE-2025-21756-b1afd40321f1c243cffbcf40ea7ca41aca87fa5e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21756/CVE-2025-21756-b1afd40321f1c243cffbcf40ea7ca41aca87fa5e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e48fcb403c2d0e574c19683f09399ab4cf67809c",
                "patch_url": "https://git.kernel.org/stable/p/e48fcb403c2d0e574c19683f09399ab4cf67809c",
                "filename": "CVE-2025-21756-e48fcb403c2d0e574c19683f09399ab4cf67809c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21756/CVE-2025-21756-e48fcb403c2d0e574c19683f09399ab4cf67809c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e7754d564579a5db9c5c9f74228df5d6dd6f1173",
                "patch_url": "https://git.kernel.org/stable/p/e7754d564579a5db9c5c9f74228df5d6dd6f1173",
                "filename": "CVE-2025-21756-e7754d564579a5db9c5c9f74228df5d6dd6f1173.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21756/CVE-2025-21756-e7754d564579a5db9c5c9f74228df5d6dd6f1173.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fcdd2242c0231032fc84e1404315c245ae56322a",
                "patch_url": "https://git.kernel.org/stable/p/fcdd2242c0231032fc84e1404315c245ae56322a",
                "filename": "CVE-2025-21756-fcdd2242c0231032fc84e1404315c245ae56322a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21756/CVE-2025-21756-fcdd2242c0231032fc84e1404315c245ae56322a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3f43540166128951cc1be7ab1ce6b7f05c670d8b",
            "https://git.kernel.org/stable/c/42b33381e5e1f2b967dc4fb4221ddb9aaf10d197",
            "https://git.kernel.org/stable/c/645ce25aa0e67895b11d89f27bb86c9d444c40f8",
            "https://git.kernel.org/stable/c/b1afd40321f1c243cffbcf40ea7ca41aca87fa5e",
            "https://git.kernel.org/stable/c/e48fcb403c2d0e574c19683f09399ab4cf67809c",
            "https://git.kernel.org/stable/c/e7754d564579a5db9c5c9f74228df5d6dd6f1173",
            "https://git.kernel.org/stable/c/fcdd2242c0231032fc84e1404315c245ae56322a",
            "https://www.cve.org/CVERecord?id=CVE-2025-21756\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-21756\nhttps://lore.kernel.org/linux-cve-announce/2025022603-CVE-2025-21756-5e09@gregkh/T"
        ]
    },
    "CVE-2025-21759": {
        "cve": "CVE-2025-21759",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: mcast: extend RCU protection in igmp6_send()\n\nigmp6_send() can be called without RTNL or RCU being held.\n\nExtend RCU protection so that we can safely fetch the net pointer\nand avoid a potential UAF.\n\nNote that we no longer can use sock_alloc_send_skb() because\nipv6.igmp_sk uses GFP_KERNEL allocations which can sleep.\n\nInstead use alloc_skb() and charge the net->ipv6.igmp_sk\nsocket under RCU protection.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-21759",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/087c1faa594fa07a66933d750c0b2610aa1a2946",
            "patch_url": "https://git.kernel.org/stable/p/087c1faa594fa07a66933d750c0b2610aa1a2946",
            "filename": "CVE-2025-21759-087c1faa594fa07a66933d750c0b2610aa1a2946.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21759/CVE-2025-21759-087c1faa594fa07a66933d750c0b2610aa1a2946.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/087c1faa594fa07a66933d750c0b2610aa1a2946",
                "patch_url": "https://git.kernel.org/stable/p/087c1faa594fa07a66933d750c0b2610aa1a2946",
                "filename": "CVE-2025-21759-087c1faa594fa07a66933d750c0b2610aa1a2946.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21759/CVE-2025-21759-087c1faa594fa07a66933d750c0b2610aa1a2946.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0bf8e2f3768629d437a32cb824149e6e98254381",
                "patch_url": "https://git.kernel.org/stable/p/0bf8e2f3768629d437a32cb824149e6e98254381",
                "filename": "CVE-2025-21759-0bf8e2f3768629d437a32cb824149e6e98254381.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21759/CVE-2025-21759-0bf8e2f3768629d437a32cb824149e6e98254381.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/81b25a07ebf53f9ef4ca8f3d96a8ddb94561dd5a",
                "patch_url": "https://git.kernel.org/stable/p/81b25a07ebf53f9ef4ca8f3d96a8ddb94561dd5a",
                "filename": "CVE-2025-21759-81b25a07ebf53f9ef4ca8f3d96a8ddb94561dd5a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21759/CVE-2025-21759-81b25a07ebf53f9ef4ca8f3d96a8ddb94561dd5a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8e92d6a413feaf968a33f0b439ecf27404407458",
                "patch_url": "https://git.kernel.org/stable/p/8e92d6a413feaf968a33f0b439ecf27404407458",
                "filename": "CVE-2025-21759-8e92d6a413feaf968a33f0b439ecf27404407458.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21759/CVE-2025-21759-8e92d6a413feaf968a33f0b439ecf27404407458.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/087c1faa594fa07a66933d750c0b2610aa1a2946",
            "https://git.kernel.org/stable/c/0bf8e2f3768629d437a32cb824149e6e98254381",
            "https://git.kernel.org/stable/c/81b25a07ebf53f9ef4ca8f3d96a8ddb94561dd5a",
            "https://git.kernel.org/stable/c/8e92d6a413feaf968a33f0b439ecf27404407458",
            "https://www.cve.org/CVERecord?id=CVE-2025-21759\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-21759\nhttps://lore.kernel.org/linux-cve-announce/2025022604-CVE-2025-21759-ad7c@gregkh/T"
        ]
    },
    "CVE-2025-21764": {
        "cve": "CVE-2025-21764",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nndisc: use RCU protection in ndisc_alloc_skb()\n\nndisc_alloc_skb() can be called without RTNL or RCU being held.\n\nAdd RCU protection to avoid possible UAF.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-21764",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/96fc896d0e5b37c12808df797397fb16f3080879",
            "patch_url": "https://git.kernel.org/stable/p/96fc896d0e5b37c12808df797397fb16f3080879",
            "filename": "CVE-2025-21764-96fc896d0e5b37c12808df797397fb16f3080879.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21764/CVE-2025-21764-96fc896d0e5b37c12808df797397fb16f3080879.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3c2d705f5adf5d860aaef90cb4211c0fde2ba66d",
                "patch_url": "https://git.kernel.org/stable/p/3c2d705f5adf5d860aaef90cb4211c0fde2ba66d",
                "filename": "CVE-2025-21764-3c2d705f5adf5d860aaef90cb4211c0fde2ba66d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21764/CVE-2025-21764-3c2d705f5adf5d860aaef90cb4211c0fde2ba66d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/628e6d18930bbd21f2d4562228afe27694f66da9",
                "patch_url": "https://git.kernel.org/stable/p/628e6d18930bbd21f2d4562228afe27694f66da9",
                "filename": "CVE-2025-21764-628e6d18930bbd21f2d4562228afe27694f66da9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21764/CVE-2025-21764-628e6d18930bbd21f2d4562228afe27694f66da9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/96fc896d0e5b37c12808df797397fb16f3080879",
                "patch_url": "https://git.kernel.org/stable/p/96fc896d0e5b37c12808df797397fb16f3080879",
                "filename": "CVE-2025-21764-96fc896d0e5b37c12808df797397fb16f3080879.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21764/CVE-2025-21764-96fc896d0e5b37c12808df797397fb16f3080879.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9e0ec817eb41a55327a46cd3ce331a9868d60304",
                "patch_url": "https://git.kernel.org/stable/p/9e0ec817eb41a55327a46cd3ce331a9868d60304",
                "filename": "CVE-2025-21764-9e0ec817eb41a55327a46cd3ce331a9868d60304.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21764/CVE-2025-21764-9e0ec817eb41a55327a46cd3ce331a9868d60304.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b870256dd2a5648d5ed2f22316b3ac29a7e5ed63",
                "patch_url": "https://git.kernel.org/stable/p/b870256dd2a5648d5ed2f22316b3ac29a7e5ed63",
                "filename": "CVE-2025-21764-b870256dd2a5648d5ed2f22316b3ac29a7e5ed63.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21764/CVE-2025-21764-b870256dd2a5648d5ed2f22316b3ac29a7e5ed63.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bbec88e4108e8d6fb468d3817fa652140a44ff28",
                "patch_url": "https://git.kernel.org/stable/p/bbec88e4108e8d6fb468d3817fa652140a44ff28",
                "filename": "CVE-2025-21764-bbec88e4108e8d6fb468d3817fa652140a44ff28.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21764/CVE-2025-21764-bbec88e4108e8d6fb468d3817fa652140a44ff28.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c30893ef3d9cde8e7e8e4fd06b53d2c935bbccb1",
                "patch_url": "https://git.kernel.org/stable/p/c30893ef3d9cde8e7e8e4fd06b53d2c935bbccb1",
                "filename": "CVE-2025-21764-c30893ef3d9cde8e7e8e4fd06b53d2c935bbccb1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21764/CVE-2025-21764-c30893ef3d9cde8e7e8e4fd06b53d2c935bbccb1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cd1065f92eb7ff21b9ba5308a86f33d1670bf926",
                "patch_url": "https://git.kernel.org/stable/p/cd1065f92eb7ff21b9ba5308a86f33d1670bf926",
                "filename": "CVE-2025-21764-cd1065f92eb7ff21b9ba5308a86f33d1670bf926.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21764/CVE-2025-21764-cd1065f92eb7ff21b9ba5308a86f33d1670bf926.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3c2d705f5adf5d860aaef90cb4211c0fde2ba66d",
            "https://git.kernel.org/stable/c/628e6d18930bbd21f2d4562228afe27694f66da9",
            "https://git.kernel.org/stable/c/96fc896d0e5b37c12808df797397fb16f3080879",
            "https://git.kernel.org/stable/c/9e0ec817eb41a55327a46cd3ce331a9868d60304",
            "https://git.kernel.org/stable/c/b870256dd2a5648d5ed2f22316b3ac29a7e5ed63",
            "https://git.kernel.org/stable/c/bbec88e4108e8d6fb468d3817fa652140a44ff28",
            "https://git.kernel.org/stable/c/c30893ef3d9cde8e7e8e4fd06b53d2c935bbccb1",
            "https://git.kernel.org/stable/c/cd1065f92eb7ff21b9ba5308a86f33d1670bf926",
            "https://www.cve.org/CVERecord?id=CVE-2025-21764\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-21764\nhttps://lore.kernel.org/linux-cve-announce/2025022605-CVE-2025-21764-1061@gregkh/T"
        ]
    },
    "CVE-2025-21785": {
        "cve": "CVE-2025-21785",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array\n\nThe loop that detects/populates cache information already has a bounds\ncheck on the array size but does not account for cache levels with\nseparate data/instructions cache. Fix this by incrementing the index\nfor any populated leaf (instead of any populated level).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-21785",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/67b99a2b5811df4294c2ad50f9bff3b6a08bd618",
            "patch_url": "https://git.kernel.org/stable/p/67b99a2b5811df4294c2ad50f9bff3b6a08bd618",
            "filename": "CVE-2025-21785-67b99a2b5811df4294c2ad50f9bff3b6a08bd618.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21785/CVE-2025-21785-67b99a2b5811df4294c2ad50f9bff3b6a08bd618.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4371ac7b494e933fffee2bd6265d18d73c4f05aa",
                "patch_url": "https://git.kernel.org/stable/p/4371ac7b494e933fffee2bd6265d18d73c4f05aa",
                "filename": "CVE-2025-21785-4371ac7b494e933fffee2bd6265d18d73c4f05aa.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21785/CVE-2025-21785-4371ac7b494e933fffee2bd6265d18d73c4f05aa.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4ff25f0b18d1d0174c105e4620428bcdc1213860",
                "patch_url": "https://git.kernel.org/stable/p/4ff25f0b18d1d0174c105e4620428bcdc1213860",
                "filename": "CVE-2025-21785-4ff25f0b18d1d0174c105e4620428bcdc1213860.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21785/CVE-2025-21785-4ff25f0b18d1d0174c105e4620428bcdc1213860.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/67b99a2b5811df4294c2ad50f9bff3b6a08bd618",
                "patch_url": "https://git.kernel.org/stable/p/67b99a2b5811df4294c2ad50f9bff3b6a08bd618",
                "filename": "CVE-2025-21785-67b99a2b5811df4294c2ad50f9bff3b6a08bd618.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21785/CVE-2025-21785-67b99a2b5811df4294c2ad50f9bff3b6a08bd618.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/715eb1af64779e1b1aa0a7b2ffb81414d9f708e5",
                "patch_url": "https://git.kernel.org/stable/p/715eb1af64779e1b1aa0a7b2ffb81414d9f708e5",
                "filename": "CVE-2025-21785-715eb1af64779e1b1aa0a7b2ffb81414d9f708e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21785/CVE-2025-21785-715eb1af64779e1b1aa0a7b2ffb81414d9f708e5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/875d742cf5327c93cba1f11e12b08d3cce7a88d2",
                "patch_url": "https://git.kernel.org/stable/p/875d742cf5327c93cba1f11e12b08d3cce7a88d2",
                "filename": "CVE-2025-21785-875d742cf5327c93cba1f11e12b08d3cce7a88d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21785/CVE-2025-21785-875d742cf5327c93cba1f11e12b08d3cce7a88d2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/88a3e6afaf002250220793df99404977d343db14",
                "patch_url": "https://git.kernel.org/stable/p/88a3e6afaf002250220793df99404977d343db14",
                "filename": "CVE-2025-21785-88a3e6afaf002250220793df99404977d343db14.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21785/CVE-2025-21785-88a3e6afaf002250220793df99404977d343db14.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ab90894f33c15b14c1cee6959ab6c8dcb09127f8",
                "patch_url": "https://git.kernel.org/stable/p/ab90894f33c15b14c1cee6959ab6c8dcb09127f8",
                "filename": "CVE-2025-21785-ab90894f33c15b14c1cee6959ab6c8dcb09127f8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21785/CVE-2025-21785-ab90894f33c15b14c1cee6959ab6c8dcb09127f8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e4fde33107351ec33f1a64188612fbc6ca659284",
                "patch_url": "https://git.kernel.org/stable/p/e4fde33107351ec33f1a64188612fbc6ca659284",
                "filename": "CVE-2025-21785-e4fde33107351ec33f1a64188612fbc6ca659284.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21785/CVE-2025-21785-e4fde33107351ec33f1a64188612fbc6ca659284.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4371ac7b494e933fffee2bd6265d18d73c4f05aa",
            "https://git.kernel.org/stable/c/4ff25f0b18d1d0174c105e4620428bcdc1213860",
            "https://git.kernel.org/stable/c/67b99a2b5811df4294c2ad50f9bff3b6a08bd618",
            "https://git.kernel.org/stable/c/715eb1af64779e1b1aa0a7b2ffb81414d9f708e5",
            "https://git.kernel.org/stable/c/875d742cf5327c93cba1f11e12b08d3cce7a88d2",
            "https://git.kernel.org/stable/c/88a3e6afaf002250220793df99404977d343db14",
            "https://git.kernel.org/stable/c/ab90894f33c15b14c1cee6959ab6c8dcb09127f8",
            "https://git.kernel.org/stable/c/e4fde33107351ec33f1a64188612fbc6ca659284",
            "https://www.cve.org/CVERecord?id=CVE-2025-21785\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-21785\nhttps://lore.kernel.org/linux-cve-announce/2025022608-CVE-2025-21785-184c@gregkh/T"
        ]
    },
    "CVE-2025-21905": {
        "cve": "CVE-2025-21905",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: limit printed string from FW file\n\nThere's no guarantee here that the file is always with a\nNUL-termination, so reading the string may read beyond the\nend of the TLV. If that's the last TLV in the file, it can\nperhaps even read beyond the end of the file buffer.\n\nFix that by limiting the print format to the size of the\nbuffer we have.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-21905",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/88ed69f924638c7503644e1f8eed1e976f3ffa7a",
            "patch_url": "https://git.kernel.org/stable/p/88ed69f924638c7503644e1f8eed1e976f3ffa7a",
            "filename": "CVE-2025-21905-88ed69f924638c7503644e1f8eed1e976f3ffa7a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21905/CVE-2025-21905-88ed69f924638c7503644e1f8eed1e976f3ffa7a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/38f0d398b6d7640d223db69df022c4a232f24774",
                "patch_url": "https://git.kernel.org/stable/p/38f0d398b6d7640d223db69df022c4a232f24774",
                "filename": "CVE-2025-21905-38f0d398b6d7640d223db69df022c4a232f24774.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21905/CVE-2025-21905-38f0d398b6d7640d223db69df022c4a232f24774.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/47616b82f2d42ea2060334746fed9a2988d845c9",
                "patch_url": "https://git.kernel.org/stable/p/47616b82f2d42ea2060334746fed9a2988d845c9",
                "filename": "CVE-2025-21905-47616b82f2d42ea2060334746fed9a2988d845c9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21905/CVE-2025-21905-47616b82f2d42ea2060334746fed9a2988d845c9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/59cdda202829d1d6a095d233386870a59aff986f",
                "patch_url": "https://git.kernel.org/stable/p/59cdda202829d1d6a095d233386870a59aff986f",
                "filename": "CVE-2025-21905-59cdda202829d1d6a095d233386870a59aff986f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21905/CVE-2025-21905-59cdda202829d1d6a095d233386870a59aff986f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/88ed69f924638c7503644e1f8eed1e976f3ffa7a",
                "patch_url": "https://git.kernel.org/stable/p/88ed69f924638c7503644e1f8eed1e976f3ffa7a",
                "filename": "CVE-2025-21905-88ed69f924638c7503644e1f8eed1e976f3ffa7a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21905/CVE-2025-21905-88ed69f924638c7503644e1f8eed1e976f3ffa7a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b02f8d5a71c8571ccf77f285737c566db73ef5e5",
                "patch_url": "https://git.kernel.org/stable/p/b02f8d5a71c8571ccf77f285737c566db73ef5e5",
                "filename": "CVE-2025-21905-b02f8d5a71c8571ccf77f285737c566db73ef5e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21905/CVE-2025-21905-b02f8d5a71c8571ccf77f285737c566db73ef5e5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c0e626f2b2390472afac52dfe72b29daf9ed8e1d",
                "patch_url": "https://git.kernel.org/stable/p/c0e626f2b2390472afac52dfe72b29daf9ed8e1d",
                "filename": "CVE-2025-21905-c0e626f2b2390472afac52dfe72b29daf9ed8e1d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21905/CVE-2025-21905-c0e626f2b2390472afac52dfe72b29daf9ed8e1d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e0dc2c1bef722cbf16ae557690861e5f91208129",
                "patch_url": "https://git.kernel.org/stable/p/e0dc2c1bef722cbf16ae557690861e5f91208129",
                "filename": "CVE-2025-21905-e0dc2c1bef722cbf16ae557690861e5f91208129.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21905/CVE-2025-21905-e0dc2c1bef722cbf16ae557690861e5f91208129.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f265e6031d0bc4fc40c4619cb42466722b46eaa9",
                "patch_url": "https://git.kernel.org/stable/p/f265e6031d0bc4fc40c4619cb42466722b46eaa9",
                "filename": "CVE-2025-21905-f265e6031d0bc4fc40c4619cb42466722b46eaa9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21905/CVE-2025-21905-f265e6031d0bc4fc40c4619cb42466722b46eaa9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/38f0d398b6d7640d223db69df022c4a232f24774",
            "https://git.kernel.org/stable/c/47616b82f2d42ea2060334746fed9a2988d845c9",
            "https://git.kernel.org/stable/c/59cdda202829d1d6a095d233386870a59aff986f",
            "https://git.kernel.org/stable/c/88ed69f924638c7503644e1f8eed1e976f3ffa7a",
            "https://git.kernel.org/stable/c/b02f8d5a71c8571ccf77f285737c566db73ef5e5",
            "https://git.kernel.org/stable/c/c0e626f2b2390472afac52dfe72b29daf9ed8e1d",
            "https://git.kernel.org/stable/c/e0dc2c1bef722cbf16ae557690861e5f91208129",
            "https://git.kernel.org/stable/c/f265e6031d0bc4fc40c4619cb42466722b46eaa9",
            "https://www.cve.org/CVERecord?id=CVE-2025-21905\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-21905\nhttps://lore.kernel.org/linux-cve-announce/2025040129-CVE-2025-21905-348b@gregkh/T"
        ]
    },
    "CVE-2025-21919": {
        "cve": "CVE-2025-21919",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/fair: Fix potential memory corruption in child_cfs_rq_on_list\n\nchild_cfs_rq_on_list attempts to convert a 'prev' pointer to a cfs_rq.\nThis 'prev' pointer can originate from struct rq's leaf_cfs_rq_list,\nmaking the conversion invalid and potentially leading to memory\ncorruption. Depending on the relative positions of leaf_cfs_rq_list and\nthe task group (tg) pointer within the struct, this can cause a memory\nfault or access garbage data.\n\nThe issue arises in list_add_leaf_cfs_rq, where both\ncfs_rq->leaf_cfs_rq_list and rq->leaf_cfs_rq_list are added to the same\nleaf list. Also, rq->tmp_alone_branch can be set to rq->leaf_cfs_rq_list.\n\nThis adds a check `if (prev == &rq->leaf_cfs_rq_list)` after the main\nconditional in child_cfs_rq_on_list. This ensures that the container_of\noperation will convert a correct cfs_rq struct.\n\nThis check is sufficient because only cfs_rqs on the same CPU are added\nto the list, so verifying the 'prev' pointer against the current rq's list\nhead is enough.\n\nFixes a potential memory corruption issue that due to current struct\nlayout might not be manifesting as a crash but could lead to unpredictable\nbehavior when the layout changes.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-21919",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/5cb300dcdd27e6a351ac02541e0231261c775852",
            "patch_url": "https://git.kernel.org/stable/p/5cb300dcdd27e6a351ac02541e0231261c775852",
            "filename": "CVE-2025-21919-5cb300dcdd27e6a351ac02541e0231261c775852.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21919/CVE-2025-21919-5cb300dcdd27e6a351ac02541e0231261c775852.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/000c9ee43928f2ce68a156dd40bab7616256f4dd",
                "patch_url": "https://git.kernel.org/stable/p/000c9ee43928f2ce68a156dd40bab7616256f4dd",
                "filename": "CVE-2025-21919-000c9ee43928f2ce68a156dd40bab7616256f4dd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21919/CVE-2025-21919-000c9ee43928f2ce68a156dd40bab7616256f4dd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3b4035ddbfc8e4521f85569998a7569668cccf51",
                "patch_url": "https://git.kernel.org/stable/p/3b4035ddbfc8e4521f85569998a7569668cccf51",
                "filename": "CVE-2025-21919-3b4035ddbfc8e4521f85569998a7569668cccf51.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21919/CVE-2025-21919-3b4035ddbfc8e4521f85569998a7569668cccf51.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5cb300dcdd27e6a351ac02541e0231261c775852",
                "patch_url": "https://git.kernel.org/stable/p/5cb300dcdd27e6a351ac02541e0231261c775852",
                "filename": "CVE-2025-21919-5cb300dcdd27e6a351ac02541e0231261c775852.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21919/CVE-2025-21919-5cb300dcdd27e6a351ac02541e0231261c775852.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9cc7f0018609f75a349e42e3aebc3b0e905ba775",
                "patch_url": "https://git.kernel.org/stable/p/9cc7f0018609f75a349e42e3aebc3b0e905ba775",
                "filename": "CVE-2025-21919-9cc7f0018609f75a349e42e3aebc3b0e905ba775.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21919/CVE-2025-21919-9cc7f0018609f75a349e42e3aebc3b0e905ba775.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b5741e4b9ef3567613b2351384f91d3f16e59986",
                "patch_url": "https://git.kernel.org/stable/p/b5741e4b9ef3567613b2351384f91d3f16e59986",
                "filename": "CVE-2025-21919-b5741e4b9ef3567613b2351384f91d3f16e59986.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21919/CVE-2025-21919-b5741e4b9ef3567613b2351384f91d3f16e59986.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e1dd09df30ba86716cb2ffab97dc35195c01eb8f",
                "patch_url": "https://git.kernel.org/stable/p/e1dd09df30ba86716cb2ffab97dc35195c01eb8f",
                "filename": "CVE-2025-21919-e1dd09df30ba86716cb2ffab97dc35195c01eb8f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21919/CVE-2025-21919-e1dd09df30ba86716cb2ffab97dc35195c01eb8f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/000c9ee43928f2ce68a156dd40bab7616256f4dd",
            "https://git.kernel.org/stable/c/3b4035ddbfc8e4521f85569998a7569668cccf51",
            "https://git.kernel.org/stable/c/5cb300dcdd27e6a351ac02541e0231261c775852",
            "https://git.kernel.org/stable/c/9cc7f0018609f75a349e42e3aebc3b0e905ba775",
            "https://git.kernel.org/stable/c/b5741e4b9ef3567613b2351384f91d3f16e59986",
            "https://git.kernel.org/stable/c/e1dd09df30ba86716cb2ffab97dc35195c01eb8f",
            "https://www.cve.org/CVERecord?id=CVE-2025-21919\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-21919\nhttps://lore.kernel.org/linux-cve-announce/2025040131-CVE-2025-21919-5f2a@gregkh/T"
        ]
    },
    "CVE-2025-21928": {
        "cve": "CVE-2025-21928",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()\n\nThe system can experience a random crash a few minutes after the driver is\nremoved. This issue occurs due to improper handling of memory freeing in\nthe ishtp_hid_remove() function.\n\nThe function currently frees the `driver_data` directly within the loop\nthat destroys the HID devices, which can lead to accessing freed memory.\nSpecifically, `hid_destroy_device()` uses `driver_data` when it calls\n`hid_ishtp_set_feature()` to power off the sensor, so freeing\n`driver_data` beforehand can result in accessing invalid memory.\n\nThis patch resolves the issue by storing the `driver_data` in a temporary\nvariable before calling `hid_destroy_device()`, and then freeing the\n`driver_data` after the device is destroyed.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-21928",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/01b18a330cda61cc21423a7d1af92cf31ded8f60",
            "patch_url": "https://git.kernel.org/stable/p/01b18a330cda61cc21423a7d1af92cf31ded8f60",
            "filename": "CVE-2025-21928-01b18a330cda61cc21423a7d1af92cf31ded8f60.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21928/CVE-2025-21928-01b18a330cda61cc21423a7d1af92cf31ded8f60.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/01b18a330cda61cc21423a7d1af92cf31ded8f60",
                "patch_url": "https://git.kernel.org/stable/p/01b18a330cda61cc21423a7d1af92cf31ded8f60",
                "filename": "CVE-2025-21928-01b18a330cda61cc21423a7d1af92cf31ded8f60.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21928/CVE-2025-21928-01b18a330cda61cc21423a7d1af92cf31ded8f60.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/07583a0010696a17fb0942e0b499a62785c5fc9f",
                "patch_url": "https://git.kernel.org/stable/p/07583a0010696a17fb0942e0b499a62785c5fc9f",
                "filename": "CVE-2025-21928-07583a0010696a17fb0942e0b499a62785c5fc9f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21928/CVE-2025-21928-07583a0010696a17fb0942e0b499a62785c5fc9f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0c1fb475ef999d6c22fc3f963fdf20cb3ed1b03d",
                "patch_url": "https://git.kernel.org/stable/p/0c1fb475ef999d6c22fc3f963fdf20cb3ed1b03d",
                "filename": "CVE-2025-21928-0c1fb475ef999d6c22fc3f963fdf20cb3ed1b03d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21928/CVE-2025-21928-0c1fb475ef999d6c22fc3f963fdf20cb3ed1b03d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/560f4d1299342504a6ab8a47f575b5e6b8345ada",
                "patch_url": "https://git.kernel.org/stable/p/560f4d1299342504a6ab8a47f575b5e6b8345ada",
                "filename": "CVE-2025-21928-560f4d1299342504a6ab8a47f575b5e6b8345ada.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21928/CVE-2025-21928-560f4d1299342504a6ab8a47f575b5e6b8345ada.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf1a6015d2f6b1f0afaa0fd6a0124ff2c7943394",
                "patch_url": "https://git.kernel.org/stable/p/cf1a6015d2f6b1f0afaa0fd6a0124ff2c7943394",
                "filename": "CVE-2025-21928-cf1a6015d2f6b1f0afaa0fd6a0124ff2c7943394.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21928/CVE-2025-21928-cf1a6015d2f6b1f0afaa0fd6a0124ff2c7943394.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d3faae7f42181865c799d88c5054176f38ae4625",
                "patch_url": "https://git.kernel.org/stable/p/d3faae7f42181865c799d88c5054176f38ae4625",
                "filename": "CVE-2025-21928-d3faae7f42181865c799d88c5054176f38ae4625.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21928/CVE-2025-21928-d3faae7f42181865c799d88c5054176f38ae4625.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dea6a349bcaf243fff95dfd0428a26be6a0fb44e",
                "patch_url": "https://git.kernel.org/stable/p/dea6a349bcaf243fff95dfd0428a26be6a0fb44e",
                "filename": "CVE-2025-21928-dea6a349bcaf243fff95dfd0428a26be6a0fb44e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21928/CVE-2025-21928-dea6a349bcaf243fff95dfd0428a26be6a0fb44e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eb0695d87a81e7c1f0509b7d8ee7c65fbc26aec9",
                "patch_url": "https://git.kernel.org/stable/p/eb0695d87a81e7c1f0509b7d8ee7c65fbc26aec9",
                "filename": "CVE-2025-21928-eb0695d87a81e7c1f0509b7d8ee7c65fbc26aec9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21928/CVE-2025-21928-eb0695d87a81e7c1f0509b7d8ee7c65fbc26aec9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/01b18a330cda61cc21423a7d1af92cf31ded8f60",
            "https://git.kernel.org/stable/c/07583a0010696a17fb0942e0b499a62785c5fc9f",
            "https://git.kernel.org/stable/c/0c1fb475ef999d6c22fc3f963fdf20cb3ed1b03d",
            "https://git.kernel.org/stable/c/560f4d1299342504a6ab8a47f575b5e6b8345ada",
            "https://git.kernel.org/stable/c/cf1a6015d2f6b1f0afaa0fd6a0124ff2c7943394",
            "https://git.kernel.org/stable/c/d3faae7f42181865c799d88c5054176f38ae4625",
            "https://git.kernel.org/stable/c/dea6a349bcaf243fff95dfd0428a26be6a0fb44e",
            "https://git.kernel.org/stable/c/eb0695d87a81e7c1f0509b7d8ee7c65fbc26aec9",
            "https://www.cve.org/CVERecord?id=CVE-2025-21928\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-21928\nhttps://lore.kernel.org/linux-cve-announce/2025040133-CVE-2025-21928-e444@gregkh/T"
        ]
    },
    "CVE-2025-21991": {
        "cve": "CVE-2025-21991",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes\n\nCurrently, load_microcode_amd() iterates over all NUMA nodes, retrieves their\nCPU masks and unconditionally accesses per-CPU data for the first CPU of each\nmask.\n\nAccording to Documentation/admin-guide/mm/numaperf.rst:\n\n  \"Some memory may share the same node as a CPU, and others are provided as\n  memory only nodes.\"\n\nTherefore, some node CPU masks may be empty and wouldn't have a \"first CPU\".\n\nOn a machine with far memory (and therefore CPU-less NUMA nodes):\n- cpumask_of_node(nid) is 0\n- cpumask_first(0) is CONFIG_NR_CPUS\n- cpu_data(CONFIG_NR_CPUS) accesses the cpu_info per-CPU array at an\n  index that is 1 out of bounds\n\nThis does not have any security implications since flashing microcode is\na privileged operation but I believe this has reliability implications by\npotentially corrupting memory while flashing a microcode update.\n\nWhen booting with CONFIG_UBSAN_BOUNDS=y on an AMD machine that flashes\na microcode update. I get the following splat:\n\n  UBSAN: array-index-out-of-bounds in arch/x86/kernel/cpu/microcode/amd.c:X:Y\n  index 512 is out of range for type 'unsigned long[512]'\n  [...]\n  Call Trace:\n   dump_stack\n   __ubsan_handle_out_of_bounds\n   load_microcode_amd\n   request_microcode_amd\n   reload_store\n   kernfs_fop_write_iter\n   vfs_write\n   ksys_write\n   do_syscall_64\n   entry_SYSCALL_64_after_hwframe\n\nChange the loop to go over only NUMA nodes which have CPUs before determining\nwhether the first CPU on the respective node needs microcode update.\n\n  [ bp: Massage commit message, fix typo. ]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-21991",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/18b5d857c6496b78ead2fd10001b81ae32d30cac",
            "patch_url": "https://git.kernel.org/stable/p/18b5d857c6496b78ead2fd10001b81ae32d30cac",
            "filename": "CVE-2025-21991-18b5d857c6496b78ead2fd10001b81ae32d30cac.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21991/CVE-2025-21991-18b5d857c6496b78ead2fd10001b81ae32d30cac.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/18b5d857c6496b78ead2fd10001b81ae32d30cac",
                "patch_url": "https://git.kernel.org/stable/p/18b5d857c6496b78ead2fd10001b81ae32d30cac",
                "filename": "CVE-2025-21991-18b5d857c6496b78ead2fd10001b81ae32d30cac.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21991/CVE-2025-21991-18b5d857c6496b78ead2fd10001b81ae32d30cac.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/488ffc0cac38f203979f83634236ee53251ce593",
                "patch_url": "https://git.kernel.org/stable/p/488ffc0cac38f203979f83634236ee53251ce593",
                "filename": "CVE-2025-21991-488ffc0cac38f203979f83634236ee53251ce593.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21991/CVE-2025-21991-488ffc0cac38f203979f83634236ee53251ce593.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5ac295dfccb5b015493f86694fa13a0dde4d3665",
                "patch_url": "https://git.kernel.org/stable/p/5ac295dfccb5b015493f86694fa13a0dde4d3665",
                "filename": "CVE-2025-21991-5ac295dfccb5b015493f86694fa13a0dde4d3665.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21991/CVE-2025-21991-5ac295dfccb5b015493f86694fa13a0dde4d3665.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/985a536e04bbfffb1770df43c6470f635a6b1073",
                "patch_url": "https://git.kernel.org/stable/p/985a536e04bbfffb1770df43c6470f635a6b1073",
                "filename": "CVE-2025-21991-985a536e04bbfffb1770df43c6470f635a6b1073.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21991/CVE-2025-21991-985a536e04bbfffb1770df43c6470f635a6b1073.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d509c4731090ebd9bbdb72c70a2d70003ae81f4f",
                "patch_url": "https://git.kernel.org/stable/p/d509c4731090ebd9bbdb72c70a2d70003ae81f4f",
                "filename": "CVE-2025-21991-d509c4731090ebd9bbdb72c70a2d70003ae81f4f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21991/CVE-2025-21991-d509c4731090ebd9bbdb72c70a2d70003ae81f4f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e3e89178a9f4a80092578af3ff3c8478f9187d59",
                "patch_url": "https://git.kernel.org/stable/p/e3e89178a9f4a80092578af3ff3c8478f9187d59",
                "filename": "CVE-2025-21991-e3e89178a9f4a80092578af3ff3c8478f9187d59.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21991/CVE-2025-21991-e3e89178a9f4a80092578af3ff3c8478f9187d59.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e686349cc19e800dac8971929089ba5ff59abfb0",
                "patch_url": "https://git.kernel.org/stable/p/e686349cc19e800dac8971929089ba5ff59abfb0",
                "filename": "CVE-2025-21991-e686349cc19e800dac8971929089ba5ff59abfb0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21991/CVE-2025-21991-e686349cc19e800dac8971929089ba5ff59abfb0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ec52240622c4d218d0240079b7c1d3ec2328a9f4",
                "patch_url": "https://git.kernel.org/stable/p/ec52240622c4d218d0240079b7c1d3ec2328a9f4",
                "filename": "CVE-2025-21991-ec52240622c4d218d0240079b7c1d3ec2328a9f4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-21991/CVE-2025-21991-ec52240622c4d218d0240079b7c1d3ec2328a9f4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/18b5d857c6496b78ead2fd10001b81ae32d30cac",
            "https://git.kernel.org/stable/c/488ffc0cac38f203979f83634236ee53251ce593",
            "https://git.kernel.org/stable/c/5ac295dfccb5b015493f86694fa13a0dde4d3665",
            "https://git.kernel.org/stable/c/985a536e04bbfffb1770df43c6470f635a6b1073",
            "https://git.kernel.org/stable/c/d509c4731090ebd9bbdb72c70a2d70003ae81f4f",
            "https://git.kernel.org/stable/c/e3e89178a9f4a80092578af3ff3c8478f9187d59",
            "https://git.kernel.org/stable/c/e686349cc19e800dac8971929089ba5ff59abfb0",
            "https://git.kernel.org/stable/c/ec52240622c4d218d0240079b7c1d3ec2328a9f4",
            "https://www.cve.org/CVERecord?id=CVE-2025-21991\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-21991\nhttps://lore.kernel.org/linux-cve-announce/2025040257-CVE-2025-21991-6aae@gregkh/T"
        ]
    },
    "CVE-2025-22004": {
        "cve": "CVE-2025-22004",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atm: fix use after free in lec_send()\n\nThe ->send() operation frees skb so save the length before calling\n->send() to avoid a use after free.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-22004",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/326223182e4703cde99fdbd36d07d0b3de9980fb",
            "patch_url": "https://git.kernel.org/stable/p/326223182e4703cde99fdbd36d07d0b3de9980fb",
            "filename": "CVE-2025-22004-326223182e4703cde99fdbd36d07d0b3de9980fb.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22004/CVE-2025-22004-326223182e4703cde99fdbd36d07d0b3de9980fb.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/326223182e4703cde99fdbd36d07d0b3de9980fb",
                "patch_url": "https://git.kernel.org/stable/p/326223182e4703cde99fdbd36d07d0b3de9980fb",
                "filename": "CVE-2025-22004-326223182e4703cde99fdbd36d07d0b3de9980fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22004/CVE-2025-22004-326223182e4703cde99fdbd36d07d0b3de9980fb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/50e288097c2c6e5f374ae079394436fc29d1e88e",
                "patch_url": "https://git.kernel.org/stable/p/50e288097c2c6e5f374ae079394436fc29d1e88e",
                "filename": "CVE-2025-22004-50e288097c2c6e5f374ae079394436fc29d1e88e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22004/CVE-2025-22004-50e288097c2c6e5f374ae079394436fc29d1e88e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/51e8be9578a2e74f9983d8fd8de8cafed191f30c",
                "patch_url": "https://git.kernel.org/stable/p/51e8be9578a2e74f9983d8fd8de8cafed191f30c",
                "filename": "CVE-2025-22004-51e8be9578a2e74f9983d8fd8de8cafed191f30c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22004/CVE-2025-22004-51e8be9578a2e74f9983d8fd8de8cafed191f30c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/82d9084a97892de1ee4881eb5c17911fcd9be6f6",
                "patch_url": "https://git.kernel.org/stable/p/82d9084a97892de1ee4881eb5c17911fcd9be6f6",
                "filename": "CVE-2025-22004-82d9084a97892de1ee4881eb5c17911fcd9be6f6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22004/CVE-2025-22004-82d9084a97892de1ee4881eb5c17911fcd9be6f6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8cd90c7db08f32829bfa1b5b2b11fbc542afbab7",
                "patch_url": "https://git.kernel.org/stable/p/8cd90c7db08f32829bfa1b5b2b11fbc542afbab7",
                "filename": "CVE-2025-22004-8cd90c7db08f32829bfa1b5b2b11fbc542afbab7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22004/CVE-2025-22004-8cd90c7db08f32829bfa1b5b2b11fbc542afbab7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9566f6ee13b17a15d0a47667ad1b1893c539f730",
                "patch_url": "https://git.kernel.org/stable/p/9566f6ee13b17a15d0a47667ad1b1893c539f730",
                "filename": "CVE-2025-22004-9566f6ee13b17a15d0a47667ad1b1893c539f730.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22004/CVE-2025-22004-9566f6ee13b17a15d0a47667ad1b1893c539f730.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f3009d0d6ab78053117f8857b921a8237f4d17b3",
                "patch_url": "https://git.kernel.org/stable/p/f3009d0d6ab78053117f8857b921a8237f4d17b3",
                "filename": "CVE-2025-22004-f3009d0d6ab78053117f8857b921a8237f4d17b3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22004/CVE-2025-22004-f3009d0d6ab78053117f8857b921a8237f4d17b3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f3271f7548385e0096739965961c7cbf7e6b4762",
                "patch_url": "https://git.kernel.org/stable/p/f3271f7548385e0096739965961c7cbf7e6b4762",
                "filename": "CVE-2025-22004-f3271f7548385e0096739965961c7cbf7e6b4762.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22004/CVE-2025-22004-f3271f7548385e0096739965961c7cbf7e6b4762.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/326223182e4703cde99fdbd36d07d0b3de9980fb",
            "https://git.kernel.org/stable/c/50e288097c2c6e5f374ae079394436fc29d1e88e",
            "https://git.kernel.org/stable/c/51e8be9578a2e74f9983d8fd8de8cafed191f30c",
            "https://git.kernel.org/stable/c/82d9084a97892de1ee4881eb5c17911fcd9be6f6",
            "https://git.kernel.org/stable/c/8cd90c7db08f32829bfa1b5b2b11fbc542afbab7",
            "https://git.kernel.org/stable/c/9566f6ee13b17a15d0a47667ad1b1893c539f730",
            "https://git.kernel.org/stable/c/f3009d0d6ab78053117f8857b921a8237f4d17b3",
            "https://git.kernel.org/stable/c/f3271f7548385e0096739965961c7cbf7e6b4762",
            "https://www.cve.org/CVERecord?id=CVE-2025-22004\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-22004\nhttps://lore.kernel.org/linux-cve-announce/2025040349-CVE-2025-22004-64f9@gregkh/T"
        ]
    },
    "CVE-2025-22020": {
        "cve": "CVE-2025-22020",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove\n\nThis fixes the following crash:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]\nRead of size 8 at addr ffff888136335380 by task kworker/6:0/140241\n\nCPU: 6 UID: 0 PID: 140241 Comm: kworker/6:0 Kdump: loaded Tainted: G            E      6.14.0-rc6+ #1\nTainted: [E]=UNSIGNED_MODULE\nHardware name: LENOVO 30FNA1V7CW/1057, BIOS S0EKT54A 07/01/2024\nWorkqueue: events rtsx_usb_ms_poll_card [rtsx_usb_ms]\nCall Trace:\n <TASK>\n dump_stack_lvl+0x51/0x70\n print_address_description.constprop.0+0x27/0x320\n ? rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]\n print_report+0x3e/0x70\n kasan_report+0xab/0xe0\n ? rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]\n rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]\n ? __pfx_rtsx_usb_ms_poll_card+0x10/0x10 [rtsx_usb_ms]\n ? __pfx___schedule+0x10/0x10\n ? kick_pool+0x3b/0x270\n process_one_work+0x357/0x660\n worker_thread+0x390/0x4c0\n ? __pfx_worker_thread+0x10/0x10\n kthread+0x190/0x1d0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x2d/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\nAllocated by task 161446:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x10/0x30\n __kasan_kmalloc+0x7b/0x90\n __kmalloc_noprof+0x1a7/0x470\n memstick_alloc_host+0x1f/0xe0 [memstick]\n rtsx_usb_ms_drv_probe+0x47/0x320 [rtsx_usb_ms]\n platform_probe+0x60/0xe0\n call_driver_probe+0x35/0x120\n really_probe+0x123/0x410\n __driver_probe_device+0xc7/0x1e0\n driver_probe_device+0x49/0xf0\n __device_attach_driver+0xc6/0x160\n bus_for_each_drv+0xe4/0x160\n __device_attach+0x13a/0x2b0\n bus_probe_device+0xbd/0xd0\n device_add+0x4a5/0x760\n platform_device_add+0x189/0x370\n mfd_add_device+0x587/0x5e0\n mfd_add_devices+0xb1/0x130\n rtsx_usb_probe+0x28e/0x2e0 [rtsx_usb]\n usb_probe_interface+0x15c/0x460\n call_driver_probe+0x35/0x120\n really_probe+0x123/0x410\n __driver_probe_device+0xc7/0x1e0\n driver_probe_device+0x49/0xf0\n __device_attach_driver+0xc6/0x160\n bus_for_each_drv+0xe4/0x160\n __device_attach+0x13a/0x2b0\n rebind_marked_interfaces.isra.0+0xcc/0x110\n usb_reset_device+0x352/0x410\n usbdev_do_ioctl+0xe5c/0x1860\n usbdev_ioctl+0xa/0x20\n __x64_sys_ioctl+0xc5/0xf0\n do_syscall_64+0x59/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFreed by task 161506:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x10/0x30\n kasan_save_free_info+0x36/0x60\n __kasan_slab_free+0x34/0x50\n kfree+0x1fd/0x3b0\n device_release+0x56/0xf0\n kobject_cleanup+0x73/0x1c0\n rtsx_usb_ms_drv_remove+0x13d/0x220 [rtsx_usb_ms]\n platform_remove+0x2f/0x50\n device_release_driver_internal+0x24b/0x2e0\n bus_remove_device+0x124/0x1d0\n device_del+0x239/0x530\n platform_device_del.part.0+0x19/0xe0\n platform_device_unregister+0x1c/0x40\n mfd_remove_devices_fn+0x167/0x170\n device_for_each_child_reverse+0xc9/0x130\n mfd_remove_devices+0x6e/0xa0\n rtsx_usb_disconnect+0x2e/0xd0 [rtsx_usb]\n usb_unbind_interface+0xf3/0x3f0\n device_release_driver_internal+0x24b/0x2e0\n proc_disconnect_claim+0x13d/0x220\n usbdev_do_ioctl+0xb5e/0x1860\n usbdev_ioctl+0xa/0x20\n __x64_sys_ioctl+0xc5/0xf0\n do_syscall_64+0x59/0x170\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nLast potentially related work creation:\n kasan_save_stack+0x20/0x40\n kasan_record_aux_stack+0x85/0x90\n insert_work+0x29/0x100\n __queue_work+0x34a/0x540\n call_timer_fn+0x2a/0x160\n expire_timers+0x5f/0x1f0\n __run_timer_base.part.0+0x1b6/0x1e0\n run_timer_softirq+0x8b/0xe0\n handle_softirqs+0xf9/0x360\n __irq_exit_rcu+0x114/0x130\n sysvec_apic_timer_interrupt+0x72/0x90\n asm_sysvec_apic_timer_interrupt+0x16/0x20\n\nSecond to last potentially related work creation:\n kasan_save_stack+0x20/0x40\n kasan_record_aux_stack+0x85/0x90\n insert_work+0x29/0x100\n __queue_work+0x34a/0x540\n call_timer_fn+0x2a/0x160\n expire_timers+0x5f/0x1f0\n __run_timer_base.part.0+0x1b6/0x1e0\n run_timer_softirq+0x8b/0xe0\n handle_softirqs+0xf9/0x\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-22020",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0067cb7d7e7c277e91a0887a3c24e71462379469",
            "patch_url": "https://git.kernel.org/stable/p/0067cb7d7e7c277e91a0887a3c24e71462379469",
            "filename": "CVE-2025-22020-0067cb7d7e7c277e91a0887a3c24e71462379469.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22020/CVE-2025-22020-0067cb7d7e7c277e91a0887a3c24e71462379469.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0067cb7d7e7c277e91a0887a3c24e71462379469",
                "patch_url": "https://git.kernel.org/stable/p/0067cb7d7e7c277e91a0887a3c24e71462379469",
                "filename": "CVE-2025-22020-0067cb7d7e7c277e91a0887a3c24e71462379469.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22020/CVE-2025-22020-0067cb7d7e7c277e91a0887a3c24e71462379469.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/31f0eaed6914333f42501fc7e0f6830879f5ef2d",
                "patch_url": "https://git.kernel.org/stable/p/31f0eaed6914333f42501fc7e0f6830879f5ef2d",
                "filename": "CVE-2025-22020-31f0eaed6914333f42501fc7e0f6830879f5ef2d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22020/CVE-2025-22020-31f0eaed6914333f42501fc7e0f6830879f5ef2d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4676741a3464b300b486e70585c3c9b692be1632",
                "patch_url": "https://git.kernel.org/stable/p/4676741a3464b300b486e70585c3c9b692be1632",
                "filename": "CVE-2025-22020-4676741a3464b300b486e70585c3c9b692be1632.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22020/CVE-2025-22020-4676741a3464b300b486e70585c3c9b692be1632.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/52d942a5302eefb3b7a3bfee310a5a33feeedc21",
                "patch_url": "https://git.kernel.org/stable/p/52d942a5302eefb3b7a3bfee310a5a33feeedc21",
                "filename": "CVE-2025-22020-52d942a5302eefb3b7a3bfee310a5a33feeedc21.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22020/CVE-2025-22020-52d942a5302eefb3b7a3bfee310a5a33feeedc21.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6186fb2cd36317277a8423687982140a7f3f7841",
                "patch_url": "https://git.kernel.org/stable/p/6186fb2cd36317277a8423687982140a7f3f7841",
                "filename": "CVE-2025-22020-6186fb2cd36317277a8423687982140a7f3f7841.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22020/CVE-2025-22020-6186fb2cd36317277a8423687982140a7f3f7841.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/75123adf204f997e11bbddee48408c284f51c050",
                "patch_url": "https://git.kernel.org/stable/p/75123adf204f997e11bbddee48408c284f51c050",
                "filename": "CVE-2025-22020-75123adf204f997e11bbddee48408c284f51c050.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22020/CVE-2025-22020-75123adf204f997e11bbddee48408c284f51c050.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/914c5e5bfceb9878f3056eaf4d1c88f2cbe0a185",
                "patch_url": "https://git.kernel.org/stable/p/914c5e5bfceb9878f3056eaf4d1c88f2cbe0a185",
                "filename": "CVE-2025-22020-914c5e5bfceb9878f3056eaf4d1c88f2cbe0a185.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22020/CVE-2025-22020-914c5e5bfceb9878f3056eaf4d1c88f2cbe0a185.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9dfaf4d723c62bda8d9d1340e2e78acf0c190439",
                "patch_url": "https://git.kernel.org/stable/p/9dfaf4d723c62bda8d9d1340e2e78acf0c190439",
                "filename": "CVE-2025-22020-9dfaf4d723c62bda8d9d1340e2e78acf0c190439.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22020/CVE-2025-22020-9dfaf4d723c62bda8d9d1340e2e78acf0c190439.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b094e8e3988e02e8cef7a756c8d2cea9c12509ab",
                "patch_url": "https://git.kernel.org/stable/p/b094e8e3988e02e8cef7a756c8d2cea9c12509ab",
                "filename": "CVE-2025-22020-b094e8e3988e02e8cef7a756c8d2cea9c12509ab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22020/CVE-2025-22020-b094e8e3988e02e8cef7a756c8d2cea9c12509ab.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0067cb7d7e7c277e91a0887a3c24e71462379469",
            "https://git.kernel.org/stable/c/31f0eaed6914333f42501fc7e0f6830879f5ef2d",
            "https://git.kernel.org/stable/c/4676741a3464b300b486e70585c3c9b692be1632",
            "https://git.kernel.org/stable/c/52d942a5302eefb3b7a3bfee310a5a33feeedc21",
            "https://git.kernel.org/stable/c/6186fb2cd36317277a8423687982140a7f3f7841",
            "https://git.kernel.org/stable/c/75123adf204f997e11bbddee48408c284f51c050",
            "https://git.kernel.org/stable/c/914c5e5bfceb9878f3056eaf4d1c88f2cbe0a185",
            "https://git.kernel.org/stable/c/9dfaf4d723c62bda8d9d1340e2e78acf0c190439",
            "https://git.kernel.org/stable/c/b094e8e3988e02e8cef7a756c8d2cea9c12509ab",
            "https://www.cve.org/CVERecord?id=CVE-2025-22020\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-22020\nhttps://lore.kernel.org/linux-cve-announce/2025041642-CVE-2025-22020-70e8@gregkh/T"
        ]
    },
    "CVE-2025-22026": {
        "cve": "CVE-2025-22026",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: don't ignore the return code of svc_proc_register()\n\nCurrently, nfsd_proc_stat_init() ignores the return value of\nsvc_proc_register(). If the procfile creation fails, then the kernel\nwill WARN when it tries to remove the entry later.\n\nFix nfsd_proc_stat_init() to return the same type of pointer as\nsvc_proc_register(), and fix up nfsd_net_init() to check that and fail\nthe nfsd_net construction if it occurs.\n\nsvc_proc_register() can fail if the dentry can't be allocated, or if an\nidentical dentry already exists. The second case is pretty unlikely in\nthe nfsd_net construction codepath, so if this happens, return -ENOMEM.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-22026",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/30405b23b4d5e2a596fb756d48119d7293194e75",
            "patch_url": "https://git.kernel.org/stable/p/30405b23b4d5e2a596fb756d48119d7293194e75",
            "filename": "CVE-2025-22026-30405b23b4d5e2a596fb756d48119d7293194e75.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22026/CVE-2025-22026-30405b23b4d5e2a596fb756d48119d7293194e75.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/30405b23b4d5e2a596fb756d48119d7293194e75",
                "patch_url": "https://git.kernel.org/stable/p/30405b23b4d5e2a596fb756d48119d7293194e75",
                "filename": "CVE-2025-22026-30405b23b4d5e2a596fb756d48119d7293194e75.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22026/CVE-2025-22026-30405b23b4d5e2a596fb756d48119d7293194e75.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/51da899c209a9624e48be416bd30e7ed5cd6c3d8",
                "patch_url": "https://git.kernel.org/stable/p/51da899c209a9624e48be416bd30e7ed5cd6c3d8",
                "filename": "CVE-2025-22026-51da899c209a9624e48be416bd30e7ed5cd6c3d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22026/CVE-2025-22026-51da899c209a9624e48be416bd30e7ed5cd6c3d8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6a59b70fe71ec66c0dd19e2c279c71846a3fb2f0",
                "patch_url": "https://git.kernel.org/stable/p/6a59b70fe71ec66c0dd19e2c279c71846a3fb2f0",
                "filename": "CVE-2025-22026-6a59b70fe71ec66c0dd19e2c279c71846a3fb2f0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22026/CVE-2025-22026-6a59b70fe71ec66c0dd19e2c279c71846a3fb2f0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/930b64ca0c511521f0abdd1d57ce52b2a6e3476b",
                "patch_url": "https://git.kernel.org/stable/p/930b64ca0c511521f0abdd1d57ce52b2a6e3476b",
                "filename": "CVE-2025-22026-930b64ca0c511521f0abdd1d57ce52b2a6e3476b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22026/CVE-2025-22026-930b64ca0c511521f0abdd1d57ce52b2a6e3476b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9d9456185fd5f1891c74354ee297f19538141ead",
                "patch_url": "https://git.kernel.org/stable/p/9d9456185fd5f1891c74354ee297f19538141ead",
                "filename": "CVE-2025-22026-9d9456185fd5f1891c74354ee297f19538141ead.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22026/CVE-2025-22026-9d9456185fd5f1891c74354ee297f19538141ead.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e31957a819e60cf0bc9a49408765e6095fd3d046",
                "patch_url": "https://git.kernel.org/stable/p/e31957a819e60cf0bc9a49408765e6095fd3d046",
                "filename": "CVE-2025-22026-e31957a819e60cf0bc9a49408765e6095fd3d046.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22026/CVE-2025-22026-e31957a819e60cf0bc9a49408765e6095fd3d046.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/30405b23b4d5e2a596fb756d48119d7293194e75",
            "https://git.kernel.org/stable/c/51da899c209a9624e48be416bd30e7ed5cd6c3d8",
            "https://git.kernel.org/stable/c/6a59b70fe71ec66c0dd19e2c279c71846a3fb2f0",
            "https://git.kernel.org/stable/c/930b64ca0c511521f0abdd1d57ce52b2a6e3476b",
            "https://git.kernel.org/stable/c/9d9456185fd5f1891c74354ee297f19538141ead",
            "https://git.kernel.org/stable/c/e31957a819e60cf0bc9a49408765e6095fd3d046",
            "https://www.cve.org/CVERecord?id=CVE-2025-22026\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-22026\nhttps://lore.kernel.org/linux-cve-announce/2025041654-CVE-2025-22026-f6be@gregkh/T"
        ]
    },
    "CVE-2025-22058": {
        "cve": "CVE-2025-22058",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nudp: Fix memory accounting leak.\n\nMatt Dowling reported a weird UDP memory usage issue.\n\nUnder normal operation, the UDP memory usage reported in /proc/net/sockstat\nremains close to zero.  However, it occasionally spiked to 524,288 pages\nand never dropped.  Moreover, the value doubled when the application was\nterminated.  Finally, it caused intermittent packet drops.\n\nWe can reproduce the issue with the script below [0]:\n\n  1. /proc/net/sockstat reports 0 pages\n\n    # cat /proc/net/sockstat | grep UDP:\n    UDP: inuse 1 mem 0\n\n  2. Run the script till the report reaches 524,288\n\n    # python3 test.py & sleep 5\n    # cat /proc/net/sockstat | grep UDP:\n    UDP: inuse 3 mem 524288  <-- (INT_MAX + 1) >> PAGE_SHIFT\n\n  3. Kill the socket and confirm the number never drops\n\n    # pkill python3 && sleep 5\n    # cat /proc/net/sockstat | grep UDP:\n    UDP: inuse 1 mem 524288\n\n  4. (necessary since v6.0) Trigger proto_memory_pcpu_drain()\n\n    # python3 test.py & sleep 1 && pkill python3\n\n  5. The number doubles\n\n    # cat /proc/net/sockstat | grep UDP:\n    UDP: inuse 1 mem 1048577\n\nThe application set INT_MAX to SO_RCVBUF, which triggered an integer\noverflow in udp_rmem_release().\n\nWhen a socket is close()d, udp_destruct_common() purges its receive\nqueue and sums up skb->truesize in the queue.  This total is calculated\nand stored in a local unsigned integer variable.\n\nThe total size is then passed to udp_rmem_release() to adjust memory\naccounting.  However, because the function takes a signed integer\nargument, the total size can wrap around, causing an overflow.\n\nThen, the released amount is calculated as follows:\n\n  1) Add size to sk->sk_forward_alloc.\n  2) Round down sk->sk_forward_alloc to the nearest lower multiple of\n      PAGE_SIZE and assign it to amount.\n  3) Subtract amount from sk->sk_forward_alloc.\n  4) Pass amount >> PAGE_SHIFT to __sk_mem_reduce_allocated().\n\nWhen the issue occurred, the total in udp_destruct_common() was 2147484480\n(INT_MAX + 833), which was cast to -2147482816 in udp_rmem_release().\n\nAt 1) sk->sk_forward_alloc is changed from 3264 to -2147479552, and\n2) sets -2147479552 to amount.  3) reverts the wraparound, so we don't\nsee a warning in inet_sock_destruct().  However, udp_memory_allocated\nends up doubling at 4).\n\nSince commit 3cd3399dd7a8 (\"net: implement per-cpu reserves for\nmemory_allocated\"), memory usage no longer doubles immediately after\na socket is close()d because __sk_mem_reduce_allocated() caches the\namount in udp_memory_per_cpu_fw_alloc.  However, the next time a UDP\nsocket receives a packet, the subtraction takes effect, causing UDP\nmemory usage to double.\n\nThis issue makes further memory allocation fail once the socket's\nsk->sk_rmem_alloc exceeds net.ipv4.udp_rmem_min, resulting in packet\ndrops.\n\nTo prevent this issue, let's use unsigned int for the calculation and\ncall sk_forward_alloc_add() only once for the small delta.\n\nNote that first_packet_length() also potentially has the same problem.\n\n[0]:\nfrom socket import *\n\nSO_RCVBUFFORCE = 33\nINT_MAX = (2 ** 31) - 1\n\ns = socket(AF_INET, SOCK_DGRAM)\ns.bind(('', 0))\ns.setsockopt(SOL_SOCKET, SO_RCVBUFFORCE, INT_MAX)\n\nc = socket(AF_INET, SOCK_DGRAM)\nc.connect(s.getsockname())\n\ndata = b'a' * 100\n\nwhile True:\n    c.send(data)",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-22058",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/d9c8266ce536e8314d84370e983afcaa36fb19cf",
            "patch_url": "https://git.kernel.org/stable/p/d9c8266ce536e8314d84370e983afcaa36fb19cf",
            "filename": "CVE-2025-22058-d9c8266ce536e8314d84370e983afcaa36fb19cf.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22058/CVE-2025-22058-d9c8266ce536e8314d84370e983afcaa36fb19cf.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/13550273171f5108b1ac572d8f72f4256ab92854",
                "patch_url": "https://git.kernel.org/stable/p/13550273171f5108b1ac572d8f72f4256ab92854",
                "filename": "CVE-2025-22058-13550273171f5108b1ac572d8f72f4256ab92854.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22058/CVE-2025-22058-13550273171f5108b1ac572d8f72f4256ab92854.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3836029448e76c1e6f77cc5fe0adc09b018b5fa8",
                "patch_url": "https://git.kernel.org/stable/p/3836029448e76c1e6f77cc5fe0adc09b018b5fa8",
                "filename": "CVE-2025-22058-3836029448e76c1e6f77cc5fe0adc09b018b5fa8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22058/CVE-2025-22058-3836029448e76c1e6f77cc5fe0adc09b018b5fa8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9122fec396950cc866137af7154b1d0d989be52e",
                "patch_url": "https://git.kernel.org/stable/p/9122fec396950cc866137af7154b1d0d989be52e",
                "filename": "CVE-2025-22058-9122fec396950cc866137af7154b1d0d989be52e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22058/CVE-2025-22058-9122fec396950cc866137af7154b1d0d989be52e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a116b271bf3cb72c8155b6b7f39083c1b80dcd00",
                "patch_url": "https://git.kernel.org/stable/p/a116b271bf3cb72c8155b6b7f39083c1b80dcd00",
                "filename": "CVE-2025-22058-a116b271bf3cb72c8155b6b7f39083c1b80dcd00.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22058/CVE-2025-22058-a116b271bf3cb72c8155b6b7f39083c1b80dcd00.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aeef6456692c6f11ae53d278df64f1316a2a405a",
                "patch_url": "https://git.kernel.org/stable/p/aeef6456692c6f11ae53d278df64f1316a2a405a",
                "filename": "CVE-2025-22058-aeef6456692c6f11ae53d278df64f1316a2a405a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22058/CVE-2025-22058-aeef6456692c6f11ae53d278df64f1316a2a405a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c3ad8c30b6b109283d2643e925f8e65f2e7ab34e",
                "patch_url": "https://git.kernel.org/stable/p/c3ad8c30b6b109283d2643e925f8e65f2e7ab34e",
                "filename": "CVE-2025-22058-c3ad8c30b6b109283d2643e925f8e65f2e7ab34e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22058/CVE-2025-22058-c3ad8c30b6b109283d2643e925f8e65f2e7ab34e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c4bac6c398118fba79e32b1cd01db22dbfe29fbf",
                "patch_url": "https://git.kernel.org/stable/p/c4bac6c398118fba79e32b1cd01db22dbfe29fbf",
                "filename": "CVE-2025-22058-c4bac6c398118fba79e32b1cd01db22dbfe29fbf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22058/CVE-2025-22058-c4bac6c398118fba79e32b1cd01db22dbfe29fbf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d9c8266ce536e8314d84370e983afcaa36fb19cf",
                "patch_url": "https://git.kernel.org/stable/p/d9c8266ce536e8314d84370e983afcaa36fb19cf",
                "filename": "CVE-2025-22058-d9c8266ce536e8314d84370e983afcaa36fb19cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22058/CVE-2025-22058-d9c8266ce536e8314d84370e983afcaa36fb19cf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/df207de9d9e7a4d92f8567e2c539d9c8c12fd99d",
                "patch_url": "https://git.kernel.org/stable/p/df207de9d9e7a4d92f8567e2c539d9c8c12fd99d",
                "filename": "CVE-2025-22058-df207de9d9e7a4d92f8567e2c539d9c8c12fd99d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22058/CVE-2025-22058-df207de9d9e7a4d92f8567e2c539d9c8c12fd99d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/13550273171f5108b1ac572d8f72f4256ab92854",
            "https://git.kernel.org/stable/c/3836029448e76c1e6f77cc5fe0adc09b018b5fa8",
            "https://git.kernel.org/stable/c/9122fec396950cc866137af7154b1d0d989be52e",
            "https://git.kernel.org/stable/c/a116b271bf3cb72c8155b6b7f39083c1b80dcd00",
            "https://git.kernel.org/stable/c/aeef6456692c6f11ae53d278df64f1316a2a405a",
            "https://git.kernel.org/stable/c/c3ad8c30b6b109283d2643e925f8e65f2e7ab34e",
            "https://git.kernel.org/stable/c/c4bac6c398118fba79e32b1cd01db22dbfe29fbf",
            "https://git.kernel.org/stable/c/d9c8266ce536e8314d84370e983afcaa36fb19cf",
            "https://git.kernel.org/stable/c/df207de9d9e7a4d92f8567e2c539d9c8c12fd99d",
            "https://www.cve.org/CVERecord?id=CVE-2025-22058\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-22058\nhttps://lore.kernel.org/linux-cve-announce/2025041606-CVE-2025-22058-045a@gregkh/T"
        ]
    },
    "CVE-2025-22097": {
        "cve": "CVE-2025-22097",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vkms: Fix use after free and double free on init error\n\nIf the driver initialization fails, the vkms_exit() function might\naccess an uninitialized or freed default_config pointer and it might\ndouble free it.\n\nFix both possible errors by initializing default_config only when the\ndriver initialization succeeded.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-22097",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1f68f1cf09d06061eb549726ff8339e064eddebd",
            "patch_url": "https://git.kernel.org/stable/p/1f68f1cf09d06061eb549726ff8339e064eddebd",
            "filename": "CVE-2025-22097-1f68f1cf09d06061eb549726ff8339e064eddebd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22097/CVE-2025-22097-1f68f1cf09d06061eb549726ff8339e064eddebd.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1f68f1cf09d06061eb549726ff8339e064eddebd",
                "patch_url": "https://git.kernel.org/stable/p/1f68f1cf09d06061eb549726ff8339e064eddebd",
                "filename": "CVE-2025-22097-1f68f1cf09d06061eb549726ff8339e064eddebd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22097/CVE-2025-22097-1f68f1cf09d06061eb549726ff8339e064eddebd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/49a69f67f53518bdd9b7eeebf019a2da6cc0e954",
                "patch_url": "https://git.kernel.org/stable/p/49a69f67f53518bdd9b7eeebf019a2da6cc0e954",
                "filename": "CVE-2025-22097-49a69f67f53518bdd9b7eeebf019a2da6cc0e954.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22097/CVE-2025-22097-49a69f67f53518bdd9b7eeebf019a2da6cc0e954.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/561fc0c5cf41f646f3e9e61784cbc0fc832fb936",
                "patch_url": "https://git.kernel.org/stable/p/561fc0c5cf41f646f3e9e61784cbc0fc832fb936",
                "filename": "CVE-2025-22097-561fc0c5cf41f646f3e9e61784cbc0fc832fb936.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22097/CVE-2025-22097-561fc0c5cf41f646f3e9e61784cbc0fc832fb936.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/79d138d137b80eeb0a83244d1cff29e64cf91067",
                "patch_url": "https://git.kernel.org/stable/p/79d138d137b80eeb0a83244d1cff29e64cf91067",
                "filename": "CVE-2025-22097-79d138d137b80eeb0a83244d1cff29e64cf91067.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22097/CVE-2025-22097-79d138d137b80eeb0a83244d1cff29e64cf91067.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b8a18bb53e06d6d3c1fd03d12533d6e333ba8853",
                "patch_url": "https://git.kernel.org/stable/p/b8a18bb53e06d6d3c1fd03d12533d6e333ba8853",
                "filename": "CVE-2025-22097-b8a18bb53e06d6d3c1fd03d12533d6e333ba8853.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22097/CVE-2025-22097-b8a18bb53e06d6d3c1fd03d12533d6e333ba8853.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d5eb8e347905ab17788a7903fa1d3d06747355f5",
                "patch_url": "https://git.kernel.org/stable/p/d5eb8e347905ab17788a7903fa1d3d06747355f5",
                "filename": "CVE-2025-22097-d5eb8e347905ab17788a7903fa1d3d06747355f5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22097/CVE-2025-22097-d5eb8e347905ab17788a7903fa1d3d06747355f5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ed15511a773df86205bda66c37193569575ae828",
                "patch_url": "https://git.kernel.org/stable/p/ed15511a773df86205bda66c37193569575ae828",
                "filename": "CVE-2025-22097-ed15511a773df86205bda66c37193569575ae828.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-22097/CVE-2025-22097-ed15511a773df86205bda66c37193569575ae828.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1f68f1cf09d06061eb549726ff8339e064eddebd",
            "https://git.kernel.org/stable/c/49a69f67f53518bdd9b7eeebf019a2da6cc0e954",
            "https://git.kernel.org/stable/c/561fc0c5cf41f646f3e9e61784cbc0fc832fb936",
            "https://git.kernel.org/stable/c/79d138d137b80eeb0a83244d1cff29e64cf91067",
            "https://git.kernel.org/stable/c/b8a18bb53e06d6d3c1fd03d12533d6e333ba8853",
            "https://git.kernel.org/stable/c/d5eb8e347905ab17788a7903fa1d3d06747355f5",
            "https://git.kernel.org/stable/c/ed15511a773df86205bda66c37193569575ae828",
            "https://www.cve.org/CVERecord?id=CVE-2025-22097\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-22097\nhttps://lore.kernel.org/linux-cve-announce/2025041619-CVE-2025-22097-d4f5@gregkh/T"
        ]
    },
    "CVE-2025-23150": {
        "cve": "CVE-2025-23150",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix off-by-one error in do_split\n\nSyzkaller detected a use-after-free issue in ext4_insert_dentry that was\ncaused by out-of-bounds access due to incorrect splitting in do_split.\n\nBUG: KASAN: use-after-free in ext4_insert_dentry+0x36a/0x6d0 fs/ext4/namei.c:2109\nWrite of size 251 at addr ffff888074572f14 by task syz-executor335/5847\n\nCPU: 0 UID: 0 PID: 5847 Comm: syz-executor335 Not tainted 6.12.0-rc6-syzkaller-00318-ga9cda7c0ffed #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n kasan_check_range+0x282/0x290 mm/kasan/generic.c:189\n __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106\n ext4_insert_dentry+0x36a/0x6d0 fs/ext4/namei.c:2109\n add_dirent_to_buf+0x3d9/0x750 fs/ext4/namei.c:2154\n make_indexed_dir+0xf98/0x1600 fs/ext4/namei.c:2351\n ext4_add_entry+0x222a/0x25d0 fs/ext4/namei.c:2455\n ext4_add_nondir+0x8d/0x290 fs/ext4/namei.c:2796\n ext4_symlink+0x920/0xb50 fs/ext4/namei.c:3431\n vfs_symlink+0x137/0x2e0 fs/namei.c:4615\n do_symlinkat+0x222/0x3a0 fs/namei.c:4641\n __do_sys_symlink fs/namei.c:4662 [inline]\n __se_sys_symlink fs/namei.c:4660 [inline]\n __x64_sys_symlink+0x7a/0x90 fs/namei.c:4660\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n </TASK>\n\nThe following loop is located right above 'if' statement.\n\nfor (i = count-1; i >= 0; i--) {\n\t/* is more than half of this entry in 2nd half of the block? */\n\tif (size + map[i].size/2 > blocksize/2)\n\t\tbreak;\n\tsize += map[i].size;\n\tmove++;\n}\n\n'i' in this case could go down to -1, in which case sum of active entries\nwouldn't exceed half the block size, but previous behaviour would also do\nsplit in half if sum would exceed at the very last block, which in case of\nhaving too many long name files in a single block could lead to\nout-of-bounds access and following use-after-free.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-23150",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/b96bd2c3db26ad0daec5b78c85c098b53900e2e1",
            "patch_url": "https://git.kernel.org/stable/p/b96bd2c3db26ad0daec5b78c85c098b53900e2e1",
            "filename": "CVE-2025-23150-b96bd2c3db26ad0daec5b78c85c098b53900e2e1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-23150/CVE-2025-23150-b96bd2c3db26ad0daec5b78c85c098b53900e2e1.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/16d9067f00e3a7d1df7c3aa9c20d214923d27e10",
                "patch_url": "https://git.kernel.org/stable/p/16d9067f00e3a7d1df7c3aa9c20d214923d27e10",
                "filename": "CVE-2025-23150-16d9067f00e3a7d1df7c3aa9c20d214923d27e10.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-23150/CVE-2025-23150-16d9067f00e3a7d1df7c3aa9c20d214923d27e10.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/17df39f455f1289319d4d09e4826aa46852ffd17",
                "patch_url": "https://git.kernel.org/stable/p/17df39f455f1289319d4d09e4826aa46852ffd17",
                "filename": "CVE-2025-23150-17df39f455f1289319d4d09e4826aa46852ffd17.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-23150/CVE-2025-23150-17df39f455f1289319d4d09e4826aa46852ffd17.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2883e9e74f73f9265e5f8d1aaaa89034b308e433",
                "patch_url": "https://git.kernel.org/stable/p/2883e9e74f73f9265e5f8d1aaaa89034b308e433",
                "filename": "CVE-2025-23150-2883e9e74f73f9265e5f8d1aaaa89034b308e433.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-23150/CVE-2025-23150-2883e9e74f73f9265e5f8d1aaaa89034b308e433.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2eeb1085bf7bd5c7ba796ca4119925fa5d336a3f",
                "patch_url": "https://git.kernel.org/stable/p/2eeb1085bf7bd5c7ba796ca4119925fa5d336a3f",
                "filename": "CVE-2025-23150-2eeb1085bf7bd5c7ba796ca4119925fa5d336a3f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-23150/CVE-2025-23150-2eeb1085bf7bd5c7ba796ca4119925fa5d336a3f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/35d0aa6db9d93307085871ceab8a729594a98162",
                "patch_url": "https://git.kernel.org/stable/p/35d0aa6db9d93307085871ceab8a729594a98162",
                "filename": "CVE-2025-23150-35d0aa6db9d93307085871ceab8a729594a98162.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-23150/CVE-2025-23150-35d0aa6db9d93307085871ceab8a729594a98162.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/515c34cff899eb5dae6aa7eee01c1295b07d81af",
                "patch_url": "https://git.kernel.org/stable/p/515c34cff899eb5dae6aa7eee01c1295b07d81af",
                "filename": "CVE-2025-23150-515c34cff899eb5dae6aa7eee01c1295b07d81af.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-23150/CVE-2025-23150-515c34cff899eb5dae6aa7eee01c1295b07d81af.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/94824ac9a8aaf2fb3c54b4bdde842db80ffa555d",
                "patch_url": "https://git.kernel.org/stable/p/94824ac9a8aaf2fb3c54b4bdde842db80ffa555d",
                "filename": "CVE-2025-23150-94824ac9a8aaf2fb3c54b4bdde842db80ffa555d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-23150/CVE-2025-23150-94824ac9a8aaf2fb3c54b4bdde842db80ffa555d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ab0cc5c25552ae0d20eae94b40a93be11b080fc5",
                "patch_url": "https://git.kernel.org/stable/p/ab0cc5c25552ae0d20eae94b40a93be11b080fc5",
                "filename": "CVE-2025-23150-ab0cc5c25552ae0d20eae94b40a93be11b080fc5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-23150/CVE-2025-23150-ab0cc5c25552ae0d20eae94b40a93be11b080fc5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b96bd2c3db26ad0daec5b78c85c098b53900e2e1",
                "patch_url": "https://git.kernel.org/stable/p/b96bd2c3db26ad0daec5b78c85c098b53900e2e1",
                "filename": "CVE-2025-23150-b96bd2c3db26ad0daec5b78c85c098b53900e2e1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-23150/CVE-2025-23150-b96bd2c3db26ad0daec5b78c85c098b53900e2e1.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/16d9067f00e3a7d1df7c3aa9c20d214923d27e10",
            "https://git.kernel.org/stable/c/17df39f455f1289319d4d09e4826aa46852ffd17",
            "https://git.kernel.org/stable/c/2883e9e74f73f9265e5f8d1aaaa89034b308e433",
            "https://git.kernel.org/stable/c/2eeb1085bf7bd5c7ba796ca4119925fa5d336a3f",
            "https://git.kernel.org/stable/c/35d0aa6db9d93307085871ceab8a729594a98162",
            "https://git.kernel.org/stable/c/515c34cff899eb5dae6aa7eee01c1295b07d81af",
            "https://git.kernel.org/stable/c/94824ac9a8aaf2fb3c54b4bdde842db80ffa555d",
            "https://git.kernel.org/stable/c/ab0cc5c25552ae0d20eae94b40a93be11b080fc5",
            "https://git.kernel.org/stable/c/b96bd2c3db26ad0daec5b78c85c098b53900e2e1",
            "https://www.cve.org/CVERecord?id=CVE-2025-23150\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-23150\nhttps://lore.kernel.org/linux-cve-announce/2025050127-CVE-2025-23150-15b8@gregkh/T"
        ]
    },
    "CVE-2025-24928": {
        "cve": "CVE-2025-24928",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-24928",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-26465": {
        "cve": "CVE-2025-26465",
        "cvss_v2": null,
        "cvss_v3": 6.8,
        "description": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-26465",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-27363": {
        "cve": "CVE-2025-27363",
        "cvss_v2": null,
        "cvss_v3": 8.1,
        "description": "An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-27363",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-32414": {
        "cve": "CVE-2025-32414",
        "cvss_v2": null,
        "cvss_v3": 5.6,
        "description": "In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-32414",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-32415": {
        "cve": "CVE-2025-32415",
        "cvss_v2": null,
        "cvss_v3": 2.9,
        "description": "In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-32415",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-32462": {
        "cve": "CVE-2025-32462",
        "cvss_v2": null,
        "cvss_v3": 2.8,
        "description": "Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-32462",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-37738": {
        "cve": "CVE-2025-37738",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: ignore xattrs past end\n\nOnce inside 'ext4_xattr_inode_dec_ref_all' we should\nignore xattrs entries past the 'end' entry.\n\nThis fixes the following KASAN reported issue:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in ext4_xattr_inode_dec_ref_all+0xb8c/0xe90\nRead of size 4 at addr ffff888012c120c4 by task repro/2065\n\nCPU: 1 UID: 0 PID: 2065 Comm: repro Not tainted 6.13.0-rc2+ #11\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl+0x1fd/0x300\n ? tcp_gro_dev_warn+0x260/0x260\n ? _printk+0xc0/0x100\n ? read_lock_is_recursive+0x10/0x10\n ? irq_work_queue+0x72/0xf0\n ? __virt_addr_valid+0x17b/0x4b0\n print_address_description+0x78/0x390\n print_report+0x107/0x1f0\n ? __virt_addr_valid+0x17b/0x4b0\n ? __virt_addr_valid+0x3ff/0x4b0\n ? __phys_addr+0xb5/0x160\n ? ext4_xattr_inode_dec_ref_all+0xb8c/0xe90\n kasan_report+0xcc/0x100\n ? ext4_xattr_inode_dec_ref_all+0xb8c/0xe90\n ext4_xattr_inode_dec_ref_all+0xb8c/0xe90\n ? ext4_xattr_delete_inode+0xd30/0xd30\n ? __ext4_journal_ensure_credits+0x5f0/0x5f0\n ? __ext4_journal_ensure_credits+0x2b/0x5f0\n ? inode_update_timestamps+0x410/0x410\n ext4_xattr_delete_inode+0xb64/0xd30\n ? ext4_truncate+0xb70/0xdc0\n ? ext4_expand_extra_isize_ea+0x1d20/0x1d20\n ? __ext4_mark_inode_dirty+0x670/0x670\n ? ext4_journal_check_start+0x16f/0x240\n ? ext4_inode_is_fast_symlink+0x2f2/0x3a0\n ext4_evict_inode+0xc8c/0xff0\n ? ext4_inode_is_fast_symlink+0x3a0/0x3a0\n ? do_raw_spin_unlock+0x53/0x8a0\n ? ext4_inode_is_fast_symlink+0x3a0/0x3a0\n evict+0x4ac/0x950\n ? proc_nr_inodes+0x310/0x310\n ? trace_ext4_drop_inode+0xa2/0x220\n ? _raw_spin_unlock+0x1a/0x30\n ? iput+0x4cb/0x7e0\n do_unlinkat+0x495/0x7c0\n ? try_break_deleg+0x120/0x120\n ? 0xffffffff81000000\n ? __check_object_size+0x15a/0x210\n ? strncpy_from_user+0x13e/0x250\n ? getname_flags+0x1dc/0x530\n __x64_sys_unlinkat+0xc8/0xf0\n do_syscall_64+0x65/0x110\n entry_SYSCALL_64_after_hwframe+0x67/0x6f\nRIP: 0033:0x434ffd\nCode: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 8\nRSP: 002b:00007ffc50fa7b28 EFLAGS: 00000246 ORIG_RAX: 0000000000000107\nRAX: ffffffffffffffda RBX: 00007ffc50fa7e18 RCX: 0000000000434ffd\nRDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005\nRBP: 00007ffc50fa7be0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001\nR13: 00007ffc50fa7e08 R14: 00000000004bbf30 R15: 0000000000000001\n </TASK>\n\nThe buggy address belongs to the object at ffff888012c12000\n which belongs to the cache filp of size 360\nThe buggy address is located 196 bytes inside of\n freed 360-byte region [ffff888012c12000, ffff888012c12168)\n\nThe buggy address belongs to the physical page:\npage: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12c12\nhead: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\nflags: 0x40(head|node=0|zone=0)\npage_type: f5(slab)\nraw: 0000000000000040 ffff888000ad7640 ffffea0000497a00 dead000000000004\nraw: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000\nhead: 0000000000000040 ffff888000ad7640 ffffea0000497a00 dead000000000004\nhead: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000\nhead: 0000000000000001 ffffea00004b0481 ffffffffffffffff 0000000000000000\nhead: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff888012c11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff888012c12000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n> ffff888012c12080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                                           ^\n ffff888012c12100: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc\n ffff888012c12180: fc fc fc fc fc fc fc fc fc\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-37738",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/f737418b6de31c962c7192777ee4018906975383",
            "patch_url": "https://git.kernel.org/stable/p/f737418b6de31c962c7192777ee4018906975383",
            "filename": "CVE-2025-37738-f737418b6de31c962c7192777ee4018906975383.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37738/CVE-2025-37738-f737418b6de31c962c7192777ee4018906975383.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/362a90cecd36e8a5c415966d0b75b04a0270e4dd",
                "patch_url": "https://git.kernel.org/stable/p/362a90cecd36e8a5c415966d0b75b04a0270e4dd",
                "filename": "CVE-2025-37738-362a90cecd36e8a5c415966d0b75b04a0270e4dd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37738/CVE-2025-37738-362a90cecd36e8a5c415966d0b75b04a0270e4dd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3bc6317033f365ce578eb6039445fb66162722fd",
                "patch_url": "https://git.kernel.org/stable/p/3bc6317033f365ce578eb6039445fb66162722fd",
                "filename": "CVE-2025-37738-3bc6317033f365ce578eb6039445fb66162722fd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37738/CVE-2025-37738-3bc6317033f365ce578eb6039445fb66162722fd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6aff941cb0f7d0c897c3698ad2e30672709135e3",
                "patch_url": "https://git.kernel.org/stable/p/6aff941cb0f7d0c897c3698ad2e30672709135e3",
                "filename": "CVE-2025-37738-6aff941cb0f7d0c897c3698ad2e30672709135e3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37738/CVE-2025-37738-6aff941cb0f7d0c897c3698ad2e30672709135e3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/76c365fa7e2a8bb85f0190cdb4b8cdc99b2fdce3",
                "patch_url": "https://git.kernel.org/stable/p/76c365fa7e2a8bb85f0190cdb4b8cdc99b2fdce3",
                "filename": "CVE-2025-37738-76c365fa7e2a8bb85f0190cdb4b8cdc99b2fdce3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37738/CVE-2025-37738-76c365fa7e2a8bb85f0190cdb4b8cdc99b2fdce3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/836e625b03a666cf93ff5be328c8cb30336db872",
                "patch_url": "https://git.kernel.org/stable/p/836e625b03a666cf93ff5be328c8cb30336db872",
                "filename": "CVE-2025-37738-836e625b03a666cf93ff5be328c8cb30336db872.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37738/CVE-2025-37738-836e625b03a666cf93ff5be328c8cb30336db872.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c8e008b60492cf6fd31ef127aea6d02fd3d314cd",
                "patch_url": "https://git.kernel.org/stable/p/c8e008b60492cf6fd31ef127aea6d02fd3d314cd",
                "filename": "CVE-2025-37738-c8e008b60492cf6fd31ef127aea6d02fd3d314cd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37738/CVE-2025-37738-c8e008b60492cf6fd31ef127aea6d02fd3d314cd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf9291a3449b04688b81e32621e88de8f4314b54",
                "patch_url": "https://git.kernel.org/stable/p/cf9291a3449b04688b81e32621e88de8f4314b54",
                "filename": "CVE-2025-37738-cf9291a3449b04688b81e32621e88de8f4314b54.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37738/CVE-2025-37738-cf9291a3449b04688b81e32621e88de8f4314b54.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eb59cc31b6ea076021d14b04e7faab1636b87d0e",
                "patch_url": "https://git.kernel.org/stable/p/eb59cc31b6ea076021d14b04e7faab1636b87d0e",
                "filename": "CVE-2025-37738-eb59cc31b6ea076021d14b04e7faab1636b87d0e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37738/CVE-2025-37738-eb59cc31b6ea076021d14b04e7faab1636b87d0e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f737418b6de31c962c7192777ee4018906975383",
                "patch_url": "https://git.kernel.org/stable/p/f737418b6de31c962c7192777ee4018906975383",
                "filename": "CVE-2025-37738-f737418b6de31c962c7192777ee4018906975383.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37738/CVE-2025-37738-f737418b6de31c962c7192777ee4018906975383.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/362a90cecd36e8a5c415966d0b75b04a0270e4dd",
            "https://git.kernel.org/stable/c/3bc6317033f365ce578eb6039445fb66162722fd",
            "https://git.kernel.org/stable/c/6aff941cb0f7d0c897c3698ad2e30672709135e3",
            "https://git.kernel.org/stable/c/76c365fa7e2a8bb85f0190cdb4b8cdc99b2fdce3",
            "https://git.kernel.org/stable/c/836e625b03a666cf93ff5be328c8cb30336db872",
            "https://git.kernel.org/stable/c/c8e008b60492cf6fd31ef127aea6d02fd3d314cd",
            "https://git.kernel.org/stable/c/cf9291a3449b04688b81e32621e88de8f4314b54",
            "https://git.kernel.org/stable/c/eb59cc31b6ea076021d14b04e7faab1636b87d0e",
            "https://git.kernel.org/stable/c/f737418b6de31c962c7192777ee4018906975383",
            "https://www.cve.org/CVERecord?id=CVE-2025-37738\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-37738\nhttps://lore.kernel.org/linux-cve-announce/2025050132-CVE-2025-37738-deb1@gregkh/T"
        ]
    },
    "CVE-2025-37797": {
        "cve": "CVE-2025-37797",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a UAF vulnerability in class handling\n\nThis patch fixes a Use-After-Free vulnerability in the HFSC qdisc class\nhandling. The issue occurs due to a time-of-check/time-of-use condition\nin hfsc_change_class() when working with certain child qdiscs like netem\nor codel.\n\nThe vulnerability works as follows:\n1. hfsc_change_class() checks if a class has packets (q.qlen != 0)\n2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g.,\n   codel, netem) might drop packets and empty the queue\n3. The code continues assuming the queue is still non-empty, adding\n   the class to vttree\n4. This breaks HFSC scheduler assumptions that only non-empty classes\n   are in vttree\n5. Later, when the class is destroyed, this can lead to a Use-After-Free\n\nThe fix adds a second queue length check after qdisc_peek_len() to verify\nthe queue wasn't emptied.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-37797",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3aa852e3605000d5c47035c3fc3a986d14ccfa9f",
            "patch_url": "https://git.kernel.org/stable/p/3aa852e3605000d5c47035c3fc3a986d14ccfa9f",
            "filename": "CVE-2025-37797-3aa852e3605000d5c47035c3fc3a986d14ccfa9f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37797/CVE-2025-37797-3aa852e3605000d5c47035c3fc3a986d14ccfa9f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/20d584a33e480ae80d105f43e0e7b56784da41b9",
                "patch_url": "https://git.kernel.org/stable/p/20d584a33e480ae80d105f43e0e7b56784da41b9",
                "filename": "CVE-2025-37797-20d584a33e480ae80d105f43e0e7b56784da41b9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37797/CVE-2025-37797-20d584a33e480ae80d105f43e0e7b56784da41b9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/28b09a067831f7317c3841812276022d6c940677",
                "patch_url": "https://git.kernel.org/stable/p/28b09a067831f7317c3841812276022d6c940677",
                "filename": "CVE-2025-37797-28b09a067831f7317c3841812276022d6c940677.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37797/CVE-2025-37797-28b09a067831f7317c3841812276022d6c940677.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/39b9095dd3b55d9b2743df038c32138efa34a9de",
                "patch_url": "https://git.kernel.org/stable/p/39b9095dd3b55d9b2743df038c32138efa34a9de",
                "filename": "CVE-2025-37797-39b9095dd3b55d9b2743df038c32138efa34a9de.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37797/CVE-2025-37797-39b9095dd3b55d9b2743df038c32138efa34a9de.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3aa852e3605000d5c47035c3fc3a986d14ccfa9f",
                "patch_url": "https://git.kernel.org/stable/p/3aa852e3605000d5c47035c3fc3a986d14ccfa9f",
                "filename": "CVE-2025-37797-3aa852e3605000d5c47035c3fc3a986d14ccfa9f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37797/CVE-2025-37797-3aa852e3605000d5c47035c3fc3a986d14ccfa9f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3df275ef0a6ae181e8428a6589ef5d5231e58b5c",
                "patch_url": "https://git.kernel.org/stable/p/3df275ef0a6ae181e8428a6589ef5d5231e58b5c",
                "filename": "CVE-2025-37797-3df275ef0a6ae181e8428a6589ef5d5231e58b5c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37797/CVE-2025-37797-3df275ef0a6ae181e8428a6589ef5d5231e58b5c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/86cd4641c713455a4f1c8e54c370c598c2b1cee0",
                "patch_url": "https://git.kernel.org/stable/p/86cd4641c713455a4f1c8e54c370c598c2b1cee0",
                "filename": "CVE-2025-37797-86cd4641c713455a4f1c8e54c370c598c2b1cee0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37797/CVE-2025-37797-86cd4641c713455a4f1c8e54c370c598c2b1cee0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bb583c88d23b72d8d16453d24856c99bd93dadf5",
                "patch_url": "https://git.kernel.org/stable/p/bb583c88d23b72d8d16453d24856c99bd93dadf5",
                "filename": "CVE-2025-37797-bb583c88d23b72d8d16453d24856c99bd93dadf5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37797/CVE-2025-37797-bb583c88d23b72d8d16453d24856c99bd93dadf5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fcc8ede663569c704fb00a702973bd6c00373283",
                "patch_url": "https://git.kernel.org/stable/p/fcc8ede663569c704fb00a702973bd6c00373283",
                "filename": "CVE-2025-37797-fcc8ede663569c704fb00a702973bd6c00373283.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37797/CVE-2025-37797-fcc8ede663569c704fb00a702973bd6c00373283.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/20d584a33e480ae80d105f43e0e7b56784da41b9",
            "https://git.kernel.org/stable/c/28b09a067831f7317c3841812276022d6c940677",
            "https://git.kernel.org/stable/c/39b9095dd3b55d9b2743df038c32138efa34a9de",
            "https://git.kernel.org/stable/c/3aa852e3605000d5c47035c3fc3a986d14ccfa9f",
            "https://git.kernel.org/stable/c/3df275ef0a6ae181e8428a6589ef5d5231e58b5c",
            "https://git.kernel.org/stable/c/86cd4641c713455a4f1c8e54c370c598c2b1cee0",
            "https://git.kernel.org/stable/c/bb583c88d23b72d8d16453d24856c99bd93dadf5",
            "https://git.kernel.org/stable/c/fcc8ede663569c704fb00a702973bd6c00373283",
            "https://www.cve.org/CVERecord?id=CVE-2025-37797\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-37797\nhttps://lore.kernel.org/linux-cve-announce/2025050210-CVE-2025-37797-2aab@gregkh/T"
        ]
    },
    "CVE-2025-37890": {
        "cve": "CVE-2025-37890",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc\n\nAs described in Gerrard's report [1], we have a UAF case when an hfsc class\nhas a netem child qdisc. The crux of the issue is that hfsc is assuming\nthat checking for cl->qdisc->q.qlen == 0 guarantees that it hasn't inserted\nthe class in the vttree or eltree (which is not true for the netem\nduplicate case).\n\nThis patch checks the n_active class variable to make sure that the code\nwon't insert the class in the vttree or eltree twice, catering for the\nreentrant case.\n\n[1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-37890",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/8df7d37d626430035b413b97cee18396b3450bef",
            "patch_url": "https://git.kernel.org/stable/p/8df7d37d626430035b413b97cee18396b3450bef",
            "filename": "CVE-2025-37890-8df7d37d626430035b413b97cee18396b3450bef.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37890/CVE-2025-37890-8df7d37d626430035b413b97cee18396b3450bef.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/141d34391abbb315d68556b7c67ad97885407547",
                "patch_url": "https://git.kernel.org/stable/p/141d34391abbb315d68556b7c67ad97885407547",
                "filename": "CVE-2025-37890-141d34391abbb315d68556b7c67ad97885407547.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37890/CVE-2025-37890-141d34391abbb315d68556b7c67ad97885407547.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/273bbcfa53541cde38b2003ad88a59b770306421",
                "patch_url": "https://git.kernel.org/stable/p/273bbcfa53541cde38b2003ad88a59b770306421",
                "filename": "CVE-2025-37890-273bbcfa53541cde38b2003ad88a59b770306421.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37890/CVE-2025-37890-273bbcfa53541cde38b2003ad88a59b770306421.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2e7093c7a8aba5d4f8809f271488e5babe75e202",
                "patch_url": "https://git.kernel.org/stable/p/2e7093c7a8aba5d4f8809f271488e5babe75e202",
                "filename": "CVE-2025-37890-2e7093c7a8aba5d4f8809f271488e5babe75e202.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37890/CVE-2025-37890-2e7093c7a8aba5d4f8809f271488e5babe75e202.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6082a87af4c52f58150d40dec1716011d871ac21",
                "patch_url": "https://git.kernel.org/stable/p/6082a87af4c52f58150d40dec1716011d871ac21",
                "filename": "CVE-2025-37890-6082a87af4c52f58150d40dec1716011d871ac21.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37890/CVE-2025-37890-6082a87af4c52f58150d40dec1716011d871ac21.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8df7d37d626430035b413b97cee18396b3450bef",
                "patch_url": "https://git.kernel.org/stable/p/8df7d37d626430035b413b97cee18396b3450bef",
                "filename": "CVE-2025-37890-8df7d37d626430035b413b97cee18396b3450bef.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37890/CVE-2025-37890-8df7d37d626430035b413b97cee18396b3450bef.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ac39fd4a757584d78ed062d4f6fd913f83bd98b5",
                "patch_url": "https://git.kernel.org/stable/p/ac39fd4a757584d78ed062d4f6fd913f83bd98b5",
                "filename": "CVE-2025-37890-ac39fd4a757584d78ed062d4f6fd913f83bd98b5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37890/CVE-2025-37890-ac39fd4a757584d78ed062d4f6fd913f83bd98b5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e0cf8ee23e1915431f262a7b2dee0c7a7d699af0",
                "patch_url": "https://git.kernel.org/stable/p/e0cf8ee23e1915431f262a7b2dee0c7a7d699af0",
                "filename": "CVE-2025-37890-e0cf8ee23e1915431f262a7b2dee0c7a7d699af0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37890/CVE-2025-37890-e0cf8ee23e1915431f262a7b2dee0c7a7d699af0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e3e949a39a91d1f829a4890e7dfe9417ac72e4d0",
                "patch_url": "https://git.kernel.org/stable/p/e3e949a39a91d1f829a4890e7dfe9417ac72e4d0",
                "filename": "CVE-2025-37890-e3e949a39a91d1f829a4890e7dfe9417ac72e4d0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37890/CVE-2025-37890-e3e949a39a91d1f829a4890e7dfe9417ac72e4d0.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/141d34391abbb315d68556b7c67ad97885407547",
            "https://git.kernel.org/stable/c/273bbcfa53541cde38b2003ad88a59b770306421",
            "https://git.kernel.org/stable/c/2e7093c7a8aba5d4f8809f271488e5babe75e202",
            "https://git.kernel.org/stable/c/6082a87af4c52f58150d40dec1716011d871ac21",
            "https://git.kernel.org/stable/c/8df7d37d626430035b413b97cee18396b3450bef",
            "https://git.kernel.org/stable/c/ac39fd4a757584d78ed062d4f6fd913f83bd98b5",
            "https://git.kernel.org/stable/c/e0cf8ee23e1915431f262a7b2dee0c7a7d699af0",
            "https://git.kernel.org/stable/c/e3e949a39a91d1f829a4890e7dfe9417ac72e4d0",
            "https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/",
            "https://www.cve.org/CVERecord?id=CVE-2025-37890\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-37890\nhttps://lore.kernel.org/linux-cve-announce/2025051617-CVE-2025-37890-437b@gregkh/T"
        ]
    },
    "CVE-2025-37914": {
        "cve": "CVE-2025-37914",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: ets: Fix double list add in class with netem as child qdisc\n\nAs described in Gerrard's report [1], there are use cases where a netem\nchild qdisc will make the parent qdisc's enqueue callback reentrant.\nIn the case of ets, there won't be a UAF, but the code will add the same\nclassifier to the list twice, which will cause memory corruption.\n\nIn addition to checking for qlen being zero, this patch checks whether\nthe class was already added to the active_list (cl_is_active) before\ndoing the addition to cater for the reentrant case.\n\n[1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-37914",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/24388ba0a1b1b6d4af1b205927ac7f7b119ee4ea",
            "patch_url": "https://git.kernel.org/stable/p/24388ba0a1b1b6d4af1b205927ac7f7b119ee4ea",
            "filename": "CVE-2025-37914-24388ba0a1b1b6d4af1b205927ac7f7b119ee4ea.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37914/CVE-2025-37914-24388ba0a1b1b6d4af1b205927ac7f7b119ee4ea.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1a6d0c00fa07972384b0c308c72db091d49988b6",
                "patch_url": "https://git.kernel.org/stable/p/1a6d0c00fa07972384b0c308c72db091d49988b6",
                "filename": "CVE-2025-37914-1a6d0c00fa07972384b0c308c72db091d49988b6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37914/CVE-2025-37914-1a6d0c00fa07972384b0c308c72db091d49988b6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1f01e9f961605eb397c6ecd1d7b0233dfbf9077c",
                "patch_url": "https://git.kernel.org/stable/p/1f01e9f961605eb397c6ecd1d7b0233dfbf9077c",
                "filename": "CVE-2025-37914-1f01e9f961605eb397c6ecd1d7b0233dfbf9077c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37914/CVE-2025-37914-1f01e9f961605eb397c6ecd1d7b0233dfbf9077c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/24388ba0a1b1b6d4af1b205927ac7f7b119ee4ea",
                "patch_url": "https://git.kernel.org/stable/p/24388ba0a1b1b6d4af1b205927ac7f7b119ee4ea",
                "filename": "CVE-2025-37914-24388ba0a1b1b6d4af1b205927ac7f7b119ee4ea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37914/CVE-2025-37914-24388ba0a1b1b6d4af1b205927ac7f7b119ee4ea.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/554acc5a2ea9703e08023eb9a003f9e5a830a502",
                "patch_url": "https://git.kernel.org/stable/p/554acc5a2ea9703e08023eb9a003f9e5a830a502",
                "filename": "CVE-2025-37914-554acc5a2ea9703e08023eb9a003f9e5a830a502.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37914/CVE-2025-37914-554acc5a2ea9703e08023eb9a003f9e5a830a502.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/72c3da7e6ceb74e74ddbb5a305a35c9fdfcac6e3",
                "patch_url": "https://git.kernel.org/stable/p/72c3da7e6ceb74e74ddbb5a305a35c9fdfcac6e3",
                "filename": "CVE-2025-37914-72c3da7e6ceb74e74ddbb5a305a35c9fdfcac6e3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37914/CVE-2025-37914-72c3da7e6ceb74e74ddbb5a305a35c9fdfcac6e3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9efb6a0fa88e0910d079fdfeb4f7ce4d4ac6c990",
                "patch_url": "https://git.kernel.org/stable/p/9efb6a0fa88e0910d079fdfeb4f7ce4d4ac6c990",
                "filename": "CVE-2025-37914-9efb6a0fa88e0910d079fdfeb4f7ce4d4ac6c990.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37914/CVE-2025-37914-9efb6a0fa88e0910d079fdfeb4f7ce4d4ac6c990.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bc321f714de693aae06e3786f88df2975376d996",
                "patch_url": "https://git.kernel.org/stable/p/bc321f714de693aae06e3786f88df2975376d996",
                "filename": "CVE-2025-37914-bc321f714de693aae06e3786f88df2975376d996.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-37914/CVE-2025-37914-bc321f714de693aae06e3786f88df2975376d996.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1a6d0c00fa07972384b0c308c72db091d49988b6",
            "https://git.kernel.org/stable/c/1f01e9f961605eb397c6ecd1d7b0233dfbf9077c",
            "https://git.kernel.org/stable/c/24388ba0a1b1b6d4af1b205927ac7f7b119ee4ea",
            "https://git.kernel.org/stable/c/554acc5a2ea9703e08023eb9a003f9e5a830a502",
            "https://git.kernel.org/stable/c/72c3da7e6ceb74e74ddbb5a305a35c9fdfcac6e3",
            "https://git.kernel.org/stable/c/9efb6a0fa88e0910d079fdfeb4f7ce4d4ac6c990",
            "https://git.kernel.org/stable/c/bc321f714de693aae06e3786f88df2975376d996",
            "https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/",
            "https://www.cve.org/CVERecord?id=CVE-2025-37914\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-37914\nhttps://lore.kernel.org/linux-cve-announce/2025052000-CVE-2025-37914-1a4f@gregkh/T"
        ]
    },
    "CVE-2025-38022": {
        "cve": "CVE-2025-38022",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Fix \"KASAN: slab-use-after-free Read in ib_register_device\" problem\n\nCall Trace:\n\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0xc3/0x670 mm/kasan/report.c:521\n kasan_report+0xe0/0x110 mm/kasan/report.c:634\n strlen+0x93/0xa0 lib/string.c:420\n __fortify_strlen include/linux/fortify-string.h:268 [inline]\n get_kobj_path_length lib/kobject.c:118 [inline]\n kobject_get_path+0x3f/0x2a0 lib/kobject.c:158\n kobject_uevent_env+0x289/0x1870 lib/kobject_uevent.c:545\n ib_register_device drivers/infiniband/core/device.c:1472 [inline]\n ib_register_device+0x8cf/0xe00 drivers/infiniband/core/device.c:1393\n rxe_register_device+0x275/0x320 drivers/infiniband/sw/rxe/rxe_verbs.c:1552\n rxe_net_add+0x8e/0xe0 drivers/infiniband/sw/rxe/rxe_net.c:550\n rxe_newlink+0x70/0x190 drivers/infiniband/sw/rxe/rxe.c:225\n nldev_newlink+0x3a3/0x680 drivers/infiniband/core/nldev.c:1796\n rdma_nl_rcv_msg+0x387/0x6e0 drivers/infiniband/core/netlink.c:195\n rdma_nl_rcv_skb.constprop.0.isra.0+0x2e5/0x450\n netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]\n netlink_unicast+0x53a/0x7f0 net/netlink/af_netlink.c:1339\n netlink_sendmsg+0x8d1/0xdd0 net/netlink/af_netlink.c:1883\n sock_sendmsg_nosec net/socket.c:712 [inline]\n __sock_sendmsg net/socket.c:727 [inline]\n ____sys_sendmsg+0xa95/0xc70 net/socket.c:2566\n ___sys_sendmsg+0x134/0x1d0 net/socket.c:2620\n __sys_sendmsg+0x16d/0x220 net/socket.c:2652\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nThis problem is similar to the problem that the\ncommit 1d6a9e7449e2 (\"RDMA/core: Fix use-after-free when rename device name\")\nfixes.\n\nThe root cause is: the function ib_device_rename() renames the name with\nlock. But in the function kobject_uevent(), this name is accessed without\nlock protection at the same time.\n\nThe solution is to add the lock protection when this name is accessed in\nthe function kobject_uevent().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38022",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/5629064f92f0de6d6b3572055cd35361c3ad953c",
            "patch_url": "https://git.kernel.org/stable/p/5629064f92f0de6d6b3572055cd35361c3ad953c",
            "filename": "CVE-2025-38022-5629064f92f0de6d6b3572055cd35361c3ad953c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38022/CVE-2025-38022-5629064f92f0de6d6b3572055cd35361c3ad953c.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/03df57ad4b0ff9c5a93ff981aba0b42578ad1571",
                "patch_url": "https://git.kernel.org/stable/p/03df57ad4b0ff9c5a93ff981aba0b42578ad1571",
                "filename": "CVE-2025-38022-03df57ad4b0ff9c5a93ff981aba0b42578ad1571.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38022/CVE-2025-38022-03df57ad4b0ff9c5a93ff981aba0b42578ad1571.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/10c7f1c647da3b77ef8827d974a97b6530b64df0",
                "patch_url": "https://git.kernel.org/stable/p/10c7f1c647da3b77ef8827d974a97b6530b64df0",
                "filename": "CVE-2025-38022-10c7f1c647da3b77ef8827d974a97b6530b64df0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38022/CVE-2025-38022-10c7f1c647da3b77ef8827d974a97b6530b64df0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/17d3103325e891e10994e7aa28d12bea04dc2c60",
                "patch_url": "https://git.kernel.org/stable/p/17d3103325e891e10994e7aa28d12bea04dc2c60",
                "filename": "CVE-2025-38022-17d3103325e891e10994e7aa28d12bea04dc2c60.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38022/CVE-2025-38022-17d3103325e891e10994e7aa28d12bea04dc2c60.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/312dae3499106ec8cb7442ada12be080aa9fbc3b",
                "patch_url": "https://git.kernel.org/stable/p/312dae3499106ec8cb7442ada12be080aa9fbc3b",
                "filename": "CVE-2025-38022-312dae3499106ec8cb7442ada12be080aa9fbc3b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38022/CVE-2025-38022-312dae3499106ec8cb7442ada12be080aa9fbc3b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5629064f92f0de6d6b3572055cd35361c3ad953c",
                "patch_url": "https://git.kernel.org/stable/p/5629064f92f0de6d6b3572055cd35361c3ad953c",
                "filename": "CVE-2025-38022-5629064f92f0de6d6b3572055cd35361c3ad953c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38022/CVE-2025-38022-5629064f92f0de6d6b3572055cd35361c3ad953c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ba467b6870ea2a73590478d9612d6ea1dcdd68b7",
                "patch_url": "https://git.kernel.org/stable/p/ba467b6870ea2a73590478d9612d6ea1dcdd68b7",
                "filename": "CVE-2025-38022-ba467b6870ea2a73590478d9612d6ea1dcdd68b7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38022/CVE-2025-38022-ba467b6870ea2a73590478d9612d6ea1dcdd68b7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d0706bfd3ee40923c001c6827b786a309e2a8713",
                "patch_url": "https://git.kernel.org/stable/p/d0706bfd3ee40923c001c6827b786a309e2a8713",
                "filename": "CVE-2025-38022-d0706bfd3ee40923c001c6827b786a309e2a8713.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38022/CVE-2025-38022-d0706bfd3ee40923c001c6827b786a309e2a8713.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/03df57ad4b0ff9c5a93ff981aba0b42578ad1571",
            "https://git.kernel.org/stable/c/10c7f1c647da3b77ef8827d974a97b6530b64df0",
            "https://git.kernel.org/stable/c/17d3103325e891e10994e7aa28d12bea04dc2c60",
            "https://git.kernel.org/stable/c/312dae3499106ec8cb7442ada12be080aa9fbc3b",
            "https://git.kernel.org/stable/c/5629064f92f0de6d6b3572055cd35361c3ad953c",
            "https://git.kernel.org/stable/c/ba467b6870ea2a73590478d9612d6ea1dcdd68b7",
            "https://git.kernel.org/stable/c/d0706bfd3ee40923c001c6827b786a309e2a8713",
            "https://www.cve.org/CVERecord?id=CVE-2025-38022\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38022\nhttps://lore.kernel.org/linux-cve-announce/2025061846-CVE-2025-38022-41b3@gregkh/T"
        ]
    },
    "CVE-2025-38024": {
        "cve": "CVE-2025-38024",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug\n\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x7d/0xa0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xcf/0x610 mm/kasan/report.c:489\n kasan_report+0xb5/0xe0 mm/kasan/report.c:602\n rxe_queue_cleanup+0xd0/0xe0 drivers/infiniband/sw/rxe/rxe_queue.c:195\n rxe_cq_cleanup+0x3f/0x50 drivers/infiniband/sw/rxe/rxe_cq.c:132\n __rxe_cleanup+0x168/0x300 drivers/infiniband/sw/rxe/rxe_pool.c:232\n rxe_create_cq+0x22e/0x3a0 drivers/infiniband/sw/rxe/rxe_verbs.c:1109\n create_cq+0x658/0xb90 drivers/infiniband/core/uverbs_cmd.c:1052\n ib_uverbs_create_cq+0xc7/0x120 drivers/infiniband/core/uverbs_cmd.c:1095\n ib_uverbs_write+0x969/0xc90 drivers/infiniband/core/uverbs_main.c:679\n vfs_write fs/read_write.c:677 [inline]\n vfs_write+0x26a/0xcc0 fs/read_write.c:659\n ksys_write+0x1b8/0x200 fs/read_write.c:731\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xaa/0x1b0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nIn the function rxe_create_cq, when rxe_cq_from_init fails, the function\nrxe_cleanup will be called to handle the allocated resources. In fact,\nsome memory resources have already been freed in the function\nrxe_cq_from_init. Thus, this problem will occur.\n\nThe solution is to let rxe_cleanup do all the work.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38024",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/52daccfc3fa68ee1902d52124921453d7a335591",
            "patch_url": "https://git.kernel.org/stable/p/52daccfc3fa68ee1902d52124921453d7a335591",
            "filename": "CVE-2025-38024-52daccfc3fa68ee1902d52124921453d7a335591.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38024/CVE-2025-38024-52daccfc3fa68ee1902d52124921453d7a335591.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/16c45ced0b3839d3eee72a86bb172bef6cf58980",
                "patch_url": "https://git.kernel.org/stable/p/16c45ced0b3839d3eee72a86bb172bef6cf58980",
                "filename": "CVE-2025-38024-16c45ced0b3839d3eee72a86bb172bef6cf58980.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38024/CVE-2025-38024-16c45ced0b3839d3eee72a86bb172bef6cf58980.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/336edd6b0f5b7fbffc3e065285610624f59e88df",
                "patch_url": "https://git.kernel.org/stable/p/336edd6b0f5b7fbffc3e065285610624f59e88df",
                "filename": "CVE-2025-38024-336edd6b0f5b7fbffc3e065285610624f59e88df.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38024/CVE-2025-38024-336edd6b0f5b7fbffc3e065285610624f59e88df.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3a3b73e135e3bd18423d0baa72571319c7feb759",
                "patch_url": "https://git.kernel.org/stable/p/3a3b73e135e3bd18423d0baa72571319c7feb759",
                "filename": "CVE-2025-38024-3a3b73e135e3bd18423d0baa72571319c7feb759.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38024/CVE-2025-38024-3a3b73e135e3bd18423d0baa72571319c7feb759.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/52daccfc3fa68ee1902d52124921453d7a335591",
                "patch_url": "https://git.kernel.org/stable/p/52daccfc3fa68ee1902d52124921453d7a335591",
                "filename": "CVE-2025-38024-52daccfc3fa68ee1902d52124921453d7a335591.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38024/CVE-2025-38024-52daccfc3fa68ee1902d52124921453d7a335591.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7c7c80c32e00665234e373ab03fe82f5c5c2c230",
                "patch_url": "https://git.kernel.org/stable/p/7c7c80c32e00665234e373ab03fe82f5c5c2c230",
                "filename": "CVE-2025-38024-7c7c80c32e00665234e373ab03fe82f5c5c2c230.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38024/CVE-2025-38024-7c7c80c32e00665234e373ab03fe82f5c5c2c230.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ee4c5a2a38596d548566560c0c022ab797e6f71a",
                "patch_url": "https://git.kernel.org/stable/p/ee4c5a2a38596d548566560c0c022ab797e6f71a",
                "filename": "CVE-2025-38024-ee4c5a2a38596d548566560c0c022ab797e6f71a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38024/CVE-2025-38024-ee4c5a2a38596d548566560c0c022ab797e6f71a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f81b33582f9339d2dc17c69b92040d3650bb4bae",
                "patch_url": "https://git.kernel.org/stable/p/f81b33582f9339d2dc17c69b92040d3650bb4bae",
                "filename": "CVE-2025-38024-f81b33582f9339d2dc17c69b92040d3650bb4bae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38024/CVE-2025-38024-f81b33582f9339d2dc17c69b92040d3650bb4bae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f8f470e3a757425a8f98fb9a5991e3cf62fc7134",
                "patch_url": "https://git.kernel.org/stable/p/f8f470e3a757425a8f98fb9a5991e3cf62fc7134",
                "filename": "CVE-2025-38024-f8f470e3a757425a8f98fb9a5991e3cf62fc7134.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38024/CVE-2025-38024-f8f470e3a757425a8f98fb9a5991e3cf62fc7134.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/16c45ced0b3839d3eee72a86bb172bef6cf58980",
            "https://git.kernel.org/stable/c/336edd6b0f5b7fbffc3e065285610624f59e88df",
            "https://git.kernel.org/stable/c/3a3b73e135e3bd18423d0baa72571319c7feb759",
            "https://git.kernel.org/stable/c/52daccfc3fa68ee1902d52124921453d7a335591",
            "https://git.kernel.org/stable/c/7c7c80c32e00665234e373ab03fe82f5c5c2c230",
            "https://git.kernel.org/stable/c/ee4c5a2a38596d548566560c0c022ab797e6f71a",
            "https://git.kernel.org/stable/c/f81b33582f9339d2dc17c69b92040d3650bb4bae",
            "https://git.kernel.org/stable/c/f8f470e3a757425a8f98fb9a5991e3cf62fc7134",
            "https://www.cve.org/CVERecord?id=CVE-2025-38024\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38024\nhttps://lore.kernel.org/linux-cve-announce/2025061847-CVE-2025-38024-2904@gregkh/T"
        ]
    },
    "CVE-2025-38051": {
        "cve": "CVE-2025-38051",
        "cvss_v2": null,
        "cvss_v3": 7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix use-after-free in cifs_fill_dirent\n\nThere is a race condition in the readdir concurrency process, which may\naccess the rsp buffer after it has been released, triggering the\nfollowing KASAN warning.\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in cifs_fill_dirent+0xb03/0xb60 [cifs]\n Read of size 4 at addr ffff8880099b819c by task a.out/342975\n\n CPU: 2 UID: 0 PID: 342975 Comm: a.out Not tainted 6.15.0-rc6+ #240 PREEMPT(full)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\n Call Trace:\n  <TASK>\n  dump_stack_lvl+0x53/0x70\n  print_report+0xce/0x640\n  kasan_report+0xb8/0xf0\n  cifs_fill_dirent+0xb03/0xb60 [cifs]\n  cifs_readdir+0x12cb/0x3190 [cifs]\n  iterate_dir+0x1a1/0x520\n  __x64_sys_getdents+0x134/0x220\n  do_syscall_64+0x4b/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n RIP: 0033:0x7f996f64b9f9\n Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89\n f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01\n f0 ff ff  0d f7 c3 0c 00 f7 d8 64 89 8\n RSP: 002b:00007f996f53de78 EFLAGS: 00000207 ORIG_RAX: 000000000000004e\n RAX: ffffffffffffffda RBX: 00007f996f53ecdc RCX: 00007f996f64b9f9\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003\n RBP: 00007f996f53dea0 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000207 R12: ffffffffffffff88\n R13: 0000000000000000 R14: 00007ffc8cd9a500 R15: 00007f996f51e000\n  </TASK>\n\n Allocated by task 408:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x14/0x30\n  __kasan_slab_alloc+0x6e/0x70\n  kmem_cache_alloc_noprof+0x117/0x3d0\n  mempool_alloc_noprof+0xf2/0x2c0\n  cifs_buf_get+0x36/0x80 [cifs]\n  allocate_buffers+0x1d2/0x330 [cifs]\n  cifs_demultiplex_thread+0x22b/0x2690 [cifs]\n  kthread+0x394/0x720\n  ret_from_fork+0x34/0x70\n  ret_from_fork_asm+0x1a/0x30\n\n Freed by task 342979:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x14/0x30\n  kasan_save_free_info+0x3b/0x60\n  __kasan_slab_free+0x37/0x50\n  kmem_cache_free+0x2b8/0x500\n  cifs_buf_release+0x3c/0x70 [cifs]\n  cifs_readdir+0x1c97/0x3190 [cifs]\n  iterate_dir+0x1a1/0x520\n  __x64_sys_getdents64+0x134/0x220\n  do_syscall_64+0x4b/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n The buggy address belongs to the object at ffff8880099b8000\n  which belongs to the cache cifs_request of size 16588\n The buggy address is located 412 bytes inside of\n  freed 16588-byte region [ffff8880099b8000, ffff8880099bc0cc)\n\n The buggy address belongs to the physical page:\n page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x99b8\n head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n anon flags: 0x80000000000040(head|node=0|zone=1)\n page_type: f5(slab)\n raw: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000003 ffffea0000266e01 00000000ffffffff 00000000ffffffff\n head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n  ffff8880099b8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8880099b8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n >ffff8880099b8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                             ^\n  ffff8880099b8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8880099b8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ==================================================================\n\nPOC is available in the link [1].\n\nThe problem triggering process is as follows:\n\nProcess 1                       Process 2\n-----------------------------------\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38051",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1b197931fbc821bc7e9e91bf619400db563e3338",
            "patch_url": "https://git.kernel.org/stable/p/1b197931fbc821bc7e9e91bf619400db563e3338",
            "filename": "CVE-2025-38051-1b197931fbc821bc7e9e91bf619400db563e3338.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38051/CVE-2025-38051-1b197931fbc821bc7e9e91bf619400db563e3338.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1b197931fbc821bc7e9e91bf619400db563e3338",
                "patch_url": "https://git.kernel.org/stable/p/1b197931fbc821bc7e9e91bf619400db563e3338",
                "filename": "CVE-2025-38051-1b197931fbc821bc7e9e91bf619400db563e3338.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38051/CVE-2025-38051-1b197931fbc821bc7e9e91bf619400db563e3338.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/73cadde98f67f76c5eba00ac0b72c453383cec8b",
                "patch_url": "https://git.kernel.org/stable/p/73cadde98f67f76c5eba00ac0b72c453383cec8b",
                "filename": "CVE-2025-38051-73cadde98f67f76c5eba00ac0b72c453383cec8b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38051/CVE-2025-38051-73cadde98f67f76c5eba00ac0b72c453383cec8b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9bea368648ac46f8593a780760362e40291d22a9",
                "patch_url": "https://git.kernel.org/stable/p/9bea368648ac46f8593a780760362e40291d22a9",
                "filename": "CVE-2025-38051-9bea368648ac46f8593a780760362e40291d22a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38051/CVE-2025-38051-9bea368648ac46f8593a780760362e40291d22a9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9c9aafbacc183598f064902365e107b5e856531f",
                "patch_url": "https://git.kernel.org/stable/p/9c9aafbacc183598f064902365e107b5e856531f",
                "filename": "CVE-2025-38051-9c9aafbacc183598f064902365e107b5e856531f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38051/CVE-2025-38051-9c9aafbacc183598f064902365e107b5e856531f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e",
                "patch_url": "https://git.kernel.org/stable/p/a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e",
                "filename": "CVE-2025-38051-a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38051/CVE-2025-38051-a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a7a8fe56e932a36f43e031b398aef92341bf5ea0",
                "patch_url": "https://git.kernel.org/stable/p/a7a8fe56e932a36f43e031b398aef92341bf5ea0",
                "filename": "CVE-2025-38051-a7a8fe56e932a36f43e031b398aef92341bf5ea0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38051/CVE-2025-38051-a7a8fe56e932a36f43e031b398aef92341bf5ea0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aee067e88d61eb72e966f094e4749c6b14e7008f",
                "patch_url": "https://git.kernel.org/stable/p/aee067e88d61eb72e966f094e4749c6b14e7008f",
                "filename": "CVE-2025-38051-aee067e88d61eb72e966f094e4749c6b14e7008f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38051/CVE-2025-38051-aee067e88d61eb72e966f094e4749c6b14e7008f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c8623231e0edfcccb7cc6add0288fa0f0594282f",
                "patch_url": "https://git.kernel.org/stable/p/c8623231e0edfcccb7cc6add0288fa0f0594282f",
                "filename": "CVE-2025-38051-c8623231e0edfcccb7cc6add0288fa0f0594282f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38051/CVE-2025-38051-c8623231e0edfcccb7cc6add0288fa0f0594282f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1b197931fbc821bc7e9e91bf619400db563e3338",
            "https://git.kernel.org/stable/c/73cadde98f67f76c5eba00ac0b72c453383cec8b",
            "https://git.kernel.org/stable/c/9bea368648ac46f8593a780760362e40291d22a9",
            "https://git.kernel.org/stable/c/9c9aafbacc183598f064902365e107b5e856531f",
            "https://git.kernel.org/stable/c/a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e",
            "https://git.kernel.org/stable/c/a7a8fe56e932a36f43e031b398aef92341bf5ea0",
            "https://git.kernel.org/stable/c/aee067e88d61eb72e966f094e4749c6b14e7008f",
            "https://git.kernel.org/stable/c/c8623231e0edfcccb7cc6add0288fa0f0594282f",
            "https://www.cve.org/CVERecord?id=CVE-2025-38051\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38051\nhttps://lore.kernel.org/linux-cve-announce/2025061831-CVE-2025-38051-77da@gregkh/T"
        ]
    },
    "CVE-2025-38052": {
        "cve": "CVE-2025-38052",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done\n\nSyzbot reported a slab-use-after-free with the following call trace:\n\n  ==================================================================\n  BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840\n  Read of size 8 at addr ffff88807a733000 by task kworker/1:0/25\n\n  Call Trace:\n   kasan_report+0xd9/0x110 mm/kasan/report.c:601\n   tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840\n   crypto_request_complete include/crypto/algapi.h:266\n   aead_request_complete include/crypto/internal/aead.h:85\n   cryptd_aead_crypt+0x3b8/0x750 crypto/cryptd.c:772\n   crypto_request_complete include/crypto/algapi.h:266\n   cryptd_queue_worker+0x131/0x200 crypto/cryptd.c:181\n   process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231\n\n  Allocated by task 8355:\n   kzalloc_noprof include/linux/slab.h:778\n   tipc_crypto_start+0xcc/0x9e0 net/tipc/crypto.c:1466\n   tipc_init_net+0x2dd/0x430 net/tipc/core.c:72\n   ops_init+0xb9/0x650 net/core/net_namespace.c:139\n   setup_net+0x435/0xb40 net/core/net_namespace.c:343\n   copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508\n   create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110\n   unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228\n   ksys_unshare+0x419/0x970 kernel/fork.c:3323\n   __do_sys_unshare kernel/fork.c:3394\n\n  Freed by task 63:\n   kfree+0x12a/0x3b0 mm/slub.c:4557\n   tipc_crypto_stop+0x23c/0x500 net/tipc/crypto.c:1539\n   tipc_exit_net+0x8c/0x110 net/tipc/core.c:119\n   ops_exit_list+0xb0/0x180 net/core/net_namespace.c:173\n   cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640\n   process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231\n\nAfter freed the tipc_crypto tx by delete namespace, tipc_aead_encrypt_done\nmay still visit it in cryptd_queue_worker workqueue.\n\nI reproduce this issue by:\n  ip netns add ns1\n  ip link add veth1 type veth peer name veth2\n  ip link set veth1 netns ns1\n  ip netns exec ns1 tipc bearer enable media eth dev veth1\n  ip netns exec ns1 tipc node set key this_is_a_master_key master\n  ip netns exec ns1 tipc bearer disable media eth dev veth1\n  ip netns del ns1\n\nThe key of reproduction is that, simd_aead_encrypt is interrupted, leading\nto crypto_simd_usable() return false. Thus, the cryptd_queue_worker is\ntriggered, and the tipc_crypto tx will be visited.\n\n  tipc_disc_timeout\n    tipc_bearer_xmit_skb\n      tipc_crypto_xmit\n        tipc_aead_encrypt\n          crypto_aead_encrypt\n            // encrypt()\n            simd_aead_encrypt\n              // crypto_simd_usable() is false\n              child = &ctx->cryptd_tfm->base;\n\n  simd_aead_encrypt\n    crypto_aead_encrypt\n      // encrypt()\n      cryptd_aead_encrypt_enqueue\n        cryptd_aead_enqueue\n          cryptd_enqueue_request\n            // trigger cryptd_queue_worker\n            queue_work_on(smp_processor_id(), cryptd_wq, &cpu_queue->work)\n\nFix this by holding net reference count before encrypt.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38052",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4a0fddc2c0d5c28aec8c262ad4603be0bef1938c",
            "patch_url": "https://git.kernel.org/stable/p/4a0fddc2c0d5c28aec8c262ad4603be0bef1938c",
            "filename": "CVE-2025-38052-4a0fddc2c0d5c28aec8c262ad4603be0bef1938c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38052/CVE-2025-38052-4a0fddc2c0d5c28aec8c262ad4603be0bef1938c.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4a0fddc2c0d5c28aec8c262ad4603be0bef1938c",
                "patch_url": "https://git.kernel.org/stable/p/4a0fddc2c0d5c28aec8c262ad4603be0bef1938c",
                "filename": "CVE-2025-38052-4a0fddc2c0d5c28aec8c262ad4603be0bef1938c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38052/CVE-2025-38052-4a0fddc2c0d5c28aec8c262ad4603be0bef1938c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/689a205cd968a1572ab561b0c4c2d50a10e9d3b0",
                "patch_url": "https://git.kernel.org/stable/p/689a205cd968a1572ab561b0c4c2d50a10e9d3b0",
                "filename": "CVE-2025-38052-689a205cd968a1572ab561b0c4c2d50a10e9d3b0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38052/CVE-2025-38052-689a205cd968a1572ab561b0c4c2d50a10e9d3b0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b19fc1d0be3c3397e5968fe2627f22e7f84673b1",
                "patch_url": "https://git.kernel.org/stable/p/b19fc1d0be3c3397e5968fe2627f22e7f84673b1",
                "filename": "CVE-2025-38052-b19fc1d0be3c3397e5968fe2627f22e7f84673b1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38052/CVE-2025-38052-b19fc1d0be3c3397e5968fe2627f22e7f84673b1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b8fcae6d2e93c54cacb8f579a77d827c1c643eb5",
                "patch_url": "https://git.kernel.org/stable/p/b8fcae6d2e93c54cacb8f579a77d827c1c643eb5",
                "filename": "CVE-2025-38052-b8fcae6d2e93c54cacb8f579a77d827c1c643eb5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38052/CVE-2025-38052-b8fcae6d2e93c54cacb8f579a77d827c1c643eb5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d42ed4de6aba232d946d20653a70f79158a6535b",
                "patch_url": "https://git.kernel.org/stable/p/d42ed4de6aba232d946d20653a70f79158a6535b",
                "filename": "CVE-2025-38052-d42ed4de6aba232d946d20653a70f79158a6535b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38052/CVE-2025-38052-d42ed4de6aba232d946d20653a70f79158a6535b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e279024617134c94fd3e37470156534d5f2b3472",
                "patch_url": "https://git.kernel.org/stable/p/e279024617134c94fd3e37470156534d5f2b3472",
                "filename": "CVE-2025-38052-e279024617134c94fd3e37470156534d5f2b3472.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38052/CVE-2025-38052-e279024617134c94fd3e37470156534d5f2b3472.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f5c2c4eaaa5a8e7e0685ec031d480e588e263e59",
                "patch_url": "https://git.kernel.org/stable/p/f5c2c4eaaa5a8e7e0685ec031d480e588e263e59",
                "filename": "CVE-2025-38052-f5c2c4eaaa5a8e7e0685ec031d480e588e263e59.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38052/CVE-2025-38052-f5c2c4eaaa5a8e7e0685ec031d480e588e263e59.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4a0fddc2c0d5c28aec8c262ad4603be0bef1938c",
            "https://git.kernel.org/stable/c/689a205cd968a1572ab561b0c4c2d50a10e9d3b0",
            "https://git.kernel.org/stable/c/b19fc1d0be3c3397e5968fe2627f22e7f84673b1",
            "https://git.kernel.org/stable/c/b8fcae6d2e93c54cacb8f579a77d827c1c643eb5",
            "https://git.kernel.org/stable/c/d42ed4de6aba232d946d20653a70f79158a6535b",
            "https://git.kernel.org/stable/c/e279024617134c94fd3e37470156534d5f2b3472",
            "https://git.kernel.org/stable/c/f5c2c4eaaa5a8e7e0685ec031d480e588e263e59",
            "https://www.cve.org/CVERecord?id=CVE-2025-38052\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38052\nhttps://lore.kernel.org/linux-cve-announce/2025061832-CVE-2025-38052-6201@gregkh/T"
        ]
    },
    "CVE-2025-38079": {
        "cve": "CVE-2025-38079",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: algif_hash - fix double free in hash_accept\n\nIf accept(2) is called on socket type algif_hash with\nMSG_MORE flag set and crypto_ahash_import fails,\nsk2 is freed. However, it is also freed in af_alg_release,\nleading to slab-use-after-free error.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38079",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/f0f3d09f53534ea385d55ced408f2b67059b16e4",
            "patch_url": "https://git.kernel.org/stable/p/f0f3d09f53534ea385d55ced408f2b67059b16e4",
            "filename": "CVE-2025-38079-f0f3d09f53534ea385d55ced408f2b67059b16e4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38079/CVE-2025-38079-f0f3d09f53534ea385d55ced408f2b67059b16e4.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0346f4b742345d1c733c977f3a7aef5a6419a967",
                "patch_url": "https://git.kernel.org/stable/p/0346f4b742345d1c733c977f3a7aef5a6419a967",
                "filename": "CVE-2025-38079-0346f4b742345d1c733c977f3a7aef5a6419a967.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38079/CVE-2025-38079-0346f4b742345d1c733c977f3a7aef5a6419a967.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/134daaba93193df9e988524b5cd2f52d15eb1993",
                "patch_url": "https://git.kernel.org/stable/p/134daaba93193df9e988524b5cd2f52d15eb1993",
                "filename": "CVE-2025-38079-134daaba93193df9e988524b5cd2f52d15eb1993.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38079/CVE-2025-38079-134daaba93193df9e988524b5cd2f52d15eb1993.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f45a8d64fb4ed4830a4b3273834ecd6ca504896",
                "patch_url": "https://git.kernel.org/stable/p/2f45a8d64fb4ed4830a4b3273834ecd6ca504896",
                "filename": "CVE-2025-38079-2f45a8d64fb4ed4830a4b3273834ecd6ca504896.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38079/CVE-2025-38079-2f45a8d64fb4ed4830a4b3273834ecd6ca504896.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5bff312b59b3f2a54ff504e4f4e47272b64f3633",
                "patch_url": "https://git.kernel.org/stable/p/5bff312b59b3f2a54ff504e4f4e47272b64f3633",
                "filename": "CVE-2025-38079-5bff312b59b3f2a54ff504e4f4e47272b64f3633.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38079/CVE-2025-38079-5bff312b59b3f2a54ff504e4f4e47272b64f3633.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b2df03ed4052e97126267e8c13ad4204ea6ba9b6",
                "patch_url": "https://git.kernel.org/stable/p/b2df03ed4052e97126267e8c13ad4204ea6ba9b6",
                "filename": "CVE-2025-38079-b2df03ed4052e97126267e8c13ad4204ea6ba9b6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38079/CVE-2025-38079-b2df03ed4052e97126267e8c13ad4204ea6ba9b6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bf7bba75b91539e93615f560893a599c1e1c98bf",
                "patch_url": "https://git.kernel.org/stable/p/bf7bba75b91539e93615f560893a599c1e1c98bf",
                "filename": "CVE-2025-38079-bf7bba75b91539e93615f560893a599c1e1c98bf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38079/CVE-2025-38079-bf7bba75b91539e93615f560893a599c1e1c98bf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c3059d58f79fdfb2201249c2741514e34562b547",
                "patch_url": "https://git.kernel.org/stable/p/c3059d58f79fdfb2201249c2741514e34562b547",
                "filename": "CVE-2025-38079-c3059d58f79fdfb2201249c2741514e34562b547.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38079/CVE-2025-38079-c3059d58f79fdfb2201249c2741514e34562b547.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f0f3d09f53534ea385d55ced408f2b67059b16e4",
                "patch_url": "https://git.kernel.org/stable/p/f0f3d09f53534ea385d55ced408f2b67059b16e4",
                "filename": "CVE-2025-38079-f0f3d09f53534ea385d55ced408f2b67059b16e4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38079/CVE-2025-38079-f0f3d09f53534ea385d55ced408f2b67059b16e4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0346f4b742345d1c733c977f3a7aef5a6419a967",
            "https://git.kernel.org/stable/c/134daaba93193df9e988524b5cd2f52d15eb1993",
            "https://git.kernel.org/stable/c/2f45a8d64fb4ed4830a4b3273834ecd6ca504896",
            "https://git.kernel.org/stable/c/5bff312b59b3f2a54ff504e4f4e47272b64f3633",
            "https://git.kernel.org/stable/c/b2df03ed4052e97126267e8c13ad4204ea6ba9b6",
            "https://git.kernel.org/stable/c/bf7bba75b91539e93615f560893a599c1e1c98bf",
            "https://git.kernel.org/stable/c/c3059d58f79fdfb2201249c2741514e34562b547",
            "https://git.kernel.org/stable/c/f0f3d09f53534ea385d55ced408f2b67059b16e4",
            "https://www.cve.org/CVERecord?id=CVE-2025-38079\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38079\nhttps://lore.kernel.org/linux-cve-announce/2025061841-CVE-2025-38079-7fa5@gregkh/T"
        ]
    },
    "CVE-2025-38085": {
        "cve": "CVE-2025-38085",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\n\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\n\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process.  While I don't see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\n\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38085",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/034a52b5ef57c9c8225d94e9067f3390bb33922f",
            "patch_url": "https://git.kernel.org/stable/p/034a52b5ef57c9c8225d94e9067f3390bb33922f",
            "filename": "CVE-2025-38085-034a52b5ef57c9c8225d94e9067f3390bb33922f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38085/CVE-2025-38085-034a52b5ef57c9c8225d94e9067f3390bb33922f.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/034a52b5ef57c9c8225d94e9067f3390bb33922f",
                "patch_url": "https://git.kernel.org/stable/p/034a52b5ef57c9c8225d94e9067f3390bb33922f",
                "filename": "CVE-2025-38085-034a52b5ef57c9c8225d94e9067f3390bb33922f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38085/CVE-2025-38085-034a52b5ef57c9c8225d94e9067f3390bb33922f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1013af4f585fccc4d3e5c5824d174de2257f7d6d",
                "patch_url": "https://git.kernel.org/stable/p/1013af4f585fccc4d3e5c5824d174de2257f7d6d",
                "filename": "CVE-2025-38085-1013af4f585fccc4d3e5c5824d174de2257f7d6d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38085/CVE-2025-38085-1013af4f585fccc4d3e5c5824d174de2257f7d6d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/952596b08c74e8fe9e2883d1dc8a8f54a37384ec",
                "patch_url": "https://git.kernel.org/stable/p/952596b08c74e8fe9e2883d1dc8a8f54a37384ec",
                "filename": "CVE-2025-38085-952596b08c74e8fe9e2883d1dc8a8f54a37384ec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38085/CVE-2025-38085-952596b08c74e8fe9e2883d1dc8a8f54a37384ec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a3d864c901a300c295692d129159fc3001a56185",
                "patch_url": "https://git.kernel.org/stable/p/a3d864c901a300c295692d129159fc3001a56185",
                "filename": "CVE-2025-38085-a3d864c901a300c295692d129159fc3001a56185.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38085/CVE-2025-38085-a3d864c901a300c295692d129159fc3001a56185.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a6bfeb97941a9187833b526bc6cc4ff5706d0ce9",
                "patch_url": "https://git.kernel.org/stable/p/a6bfeb97941a9187833b526bc6cc4ff5706d0ce9",
                "filename": "CVE-2025-38085-a6bfeb97941a9187833b526bc6cc4ff5706d0ce9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38085/CVE-2025-38085-a6bfeb97941a9187833b526bc6cc4ff5706d0ce9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7754d3aa7bf9f62218d096c0c8f6c13698fac8b",
                "patch_url": "https://git.kernel.org/stable/p/b7754d3aa7bf9f62218d096c0c8f6c13698fac8b",
                "filename": "CVE-2025-38085-b7754d3aa7bf9f62218d096c0c8f6c13698fac8b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38085/CVE-2025-38085-b7754d3aa7bf9f62218d096c0c8f6c13698fac8b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fe684290418ef9ef76630072086ee530b92f02b8",
                "patch_url": "https://git.kernel.org/stable/p/fe684290418ef9ef76630072086ee530b92f02b8",
                "filename": "CVE-2025-38085-fe684290418ef9ef76630072086ee530b92f02b8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38085/CVE-2025-38085-fe684290418ef9ef76630072086ee530b92f02b8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/034a52b5ef57c9c8225d94e9067f3390bb33922f",
            "https://git.kernel.org/stable/c/1013af4f585fccc4d3e5c5824d174de2257f7d6d",
            "https://git.kernel.org/stable/c/952596b08c74e8fe9e2883d1dc8a8f54a37384ec",
            "https://git.kernel.org/stable/c/a3d864c901a300c295692d129159fc3001a56185",
            "https://git.kernel.org/stable/c/a6bfeb97941a9187833b526bc6cc4ff5706d0ce9",
            "https://git.kernel.org/stable/c/b7754d3aa7bf9f62218d096c0c8f6c13698fac8b",
            "https://git.kernel.org/stable/c/fe684290418ef9ef76630072086ee530b92f02b8",
            "https://www.cve.org/CVERecord?id=CVE-2025-38085\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38085\nhttps://lore.kernel.org/linux-cve-announce/2025062836-CVE-2025-38085-8075@gregkh/T"
        ]
    },
    "CVE-2025-38086": {
        "cve": "CVE-2025-38086",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ch9200: fix uninitialised access during mii_nway_restart\n\nIn mii_nway_restart() the code attempts to call\nmii->mdio_read which is ch9200_mdio_read(). ch9200_mdio_read()\nutilises a local buffer called \"buff\", which is initialised\nwith control_read(). However \"buff\" is conditionally\ninitialised inside control_read():\n\n        if (err == size) {\n                memcpy(data, buf, size);\n        }\n\nIf the condition of \"err == size\" is not met, then\n\"buff\" remains uninitialised. Once this happens the\nuninitialised \"buff\" is accessed and returned during\nch9200_mdio_read():\n\n        return (buff[0] | buff[1] << 8);\n\nThe problem stems from the fact that ch9200_mdio_read()\nignores the return value of control_read(), leading to\nuinit-access of \"buff\".\n\nTo fix this we should check the return value of\ncontrol_read() and return early on error.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38086",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/33163c68d2e3061fa3935b5f0a1867958b1cdbd2",
            "patch_url": "https://git.kernel.org/stable/p/33163c68d2e3061fa3935b5f0a1867958b1cdbd2",
            "filename": "CVE-2025-38086-33163c68d2e3061fa3935b5f0a1867958b1cdbd2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38086/CVE-2025-38086-33163c68d2e3061fa3935b5f0a1867958b1cdbd2.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/119766de4930ff40db9f36b960cb53b0c400e81b",
                "patch_url": "https://git.kernel.org/stable/p/119766de4930ff40db9f36b960cb53b0c400e81b",
                "filename": "CVE-2025-38086-119766de4930ff40db9f36b960cb53b0c400e81b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38086/CVE-2025-38086-119766de4930ff40db9f36b960cb53b0c400e81b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/33163c68d2e3061fa3935b5f0a1867958b1cdbd2",
                "patch_url": "https://git.kernel.org/stable/p/33163c68d2e3061fa3935b5f0a1867958b1cdbd2",
                "filename": "CVE-2025-38086-33163c68d2e3061fa3935b5f0a1867958b1cdbd2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38086/CVE-2025-38086-33163c68d2e3061fa3935b5f0a1867958b1cdbd2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4da7fcc098218ff92b2e83a43f545c02f714cedd",
                "patch_url": "https://git.kernel.org/stable/p/4da7fcc098218ff92b2e83a43f545c02f714cedd",
                "filename": "CVE-2025-38086-4da7fcc098218ff92b2e83a43f545c02f714cedd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38086/CVE-2025-38086-4da7fcc098218ff92b2e83a43f545c02f714cedd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6bd2569d0b2f918e9581f744df0263caf73ee76c",
                "patch_url": "https://git.kernel.org/stable/p/6bd2569d0b2f918e9581f744df0263caf73ee76c",
                "filename": "CVE-2025-38086-6bd2569d0b2f918e9581f744df0263caf73ee76c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38086/CVE-2025-38086-6bd2569d0b2f918e9581f744df0263caf73ee76c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9a350f30d65197354706b7759b5c89d6c267b1a9",
                "patch_url": "https://git.kernel.org/stable/p/9a350f30d65197354706b7759b5c89d6c267b1a9",
                "filename": "CVE-2025-38086-9a350f30d65197354706b7759b5c89d6c267b1a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38086/CVE-2025-38086-9a350f30d65197354706b7759b5c89d6c267b1a9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ad0452c0277b816a435433cca601304cfac7c21",
                "patch_url": "https://git.kernel.org/stable/p/9ad0452c0277b816a435433cca601304cfac7c21",
                "filename": "CVE-2025-38086-9ad0452c0277b816a435433cca601304cfac7c21.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38086/CVE-2025-38086-9ad0452c0277b816a435433cca601304cfac7c21.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9da3e442714f7f4393ff01c265c4959c03e88c2f",
                "patch_url": "https://git.kernel.org/stable/p/9da3e442714f7f4393ff01c265c4959c03e88c2f",
                "filename": "CVE-2025-38086-9da3e442714f7f4393ff01c265c4959c03e88c2f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38086/CVE-2025-38086-9da3e442714f7f4393ff01c265c4959c03e88c2f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cdaa6d1cb2ff1219c6c822b27655dd170ffb0f72",
                "patch_url": "https://git.kernel.org/stable/p/cdaa6d1cb2ff1219c6c822b27655dd170ffb0f72",
                "filename": "CVE-2025-38086-cdaa6d1cb2ff1219c6c822b27655dd170ffb0f72.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38086/CVE-2025-38086-cdaa6d1cb2ff1219c6c822b27655dd170ffb0f72.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/119766de4930ff40db9f36b960cb53b0c400e81b",
            "https://git.kernel.org/stable/c/33163c68d2e3061fa3935b5f0a1867958b1cdbd2",
            "https://git.kernel.org/stable/c/4da7fcc098218ff92b2e83a43f545c02f714cedd",
            "https://git.kernel.org/stable/c/6bd2569d0b2f918e9581f744df0263caf73ee76c",
            "https://git.kernel.org/stable/c/9a350f30d65197354706b7759b5c89d6c267b1a9",
            "https://git.kernel.org/stable/c/9ad0452c0277b816a435433cca601304cfac7c21",
            "https://git.kernel.org/stable/c/9da3e442714f7f4393ff01c265c4959c03e88c2f",
            "https://git.kernel.org/stable/c/cdaa6d1cb2ff1219c6c822b27655dd170ffb0f72",
            "https://www.cve.org/CVERecord?id=CVE-2025-38086\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38086\nhttps://lore.kernel.org/linux-cve-announce/2025062801-CVE-2025-38086-783b@gregkh/T"
        ]
    },
    "CVE-2025-38129": {
        "cve": "CVE-2025-38129",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\npage_pool: Fix use-after-free in page_pool_recycle_in_ring\n\nsyzbot reported a uaf in page_pool_recycle_in_ring:\n\nBUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862\nRead of size 8 at addr ffff8880286045a0 by task syz.0.284/6943\n\nCPU: 0 UID: 0 PID: 6943 Comm: syz.0.284 Not tainted 6.13.0-rc3-syzkaller-gdfa94ce54f41 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:489\n kasan_report+0x143/0x180 mm/kasan/report.c:602\n lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862\n __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:165 [inline]\n _raw_spin_unlock_bh+0x1b/0x40 kernel/locking/spinlock.c:210\n spin_unlock_bh include/linux/spinlock.h:396 [inline]\n ptr_ring_produce_bh include/linux/ptr_ring.h:164 [inline]\n page_pool_recycle_in_ring net/core/page_pool.c:707 [inline]\n page_pool_put_unrefed_netmem+0x748/0xb00 net/core/page_pool.c:826\n page_pool_put_netmem include/net/page_pool/helpers.h:323 [inline]\n page_pool_put_full_netmem include/net/page_pool/helpers.h:353 [inline]\n napi_pp_put_page+0x149/0x2b0 net/core/skbuff.c:1036\n skb_pp_recycle net/core/skbuff.c:1047 [inline]\n skb_free_head net/core/skbuff.c:1094 [inline]\n skb_release_data+0x6c4/0x8a0 net/core/skbuff.c:1125\n skb_release_all net/core/skbuff.c:1190 [inline]\n __kfree_skb net/core/skbuff.c:1204 [inline]\n sk_skb_reason_drop+0x1c9/0x380 net/core/skbuff.c:1242\n kfree_skb_reason include/linux/skbuff.h:1263 [inline]\n __skb_queue_purge_reason include/linux/skbuff.h:3343 [inline]\n\nroot cause is:\n\npage_pool_recycle_in_ring\n  ptr_ring_produce\n    spin_lock(&r->producer_lock);\n    WRITE_ONCE(r->queue[r->producer++], ptr)\n      //recycle last page to pool\n\t\t\t\tpage_pool_release\n\t\t\t\t  page_pool_scrub\n\t\t\t\t    page_pool_empty_ring\n\t\t\t\t      ptr_ring_consume\n\t\t\t\t      page_pool_return_page  //release all page\n\t\t\t\t  __page_pool_destroy\n\t\t\t\t     free_percpu(pool->recycle_stats);\n\t\t\t\t     free(pool) //free\n\n     spin_unlock(&r->producer_lock); //pool->ring uaf read\n  recycle_stat_inc(pool, ring);\n\npage_pool can be free while page pool recycle the last page in ring.\nAdd producer-lock barrier to page_pool_release to prevent the page\npool from being free before all pages have been recycled.\n\nrecycle_stat_inc() is empty when CONFIG_PAGE_POOL_STATS is not\nenabled, which will trigger Wempty-body build warning. Add definition\nfor pool stat macro to fix warning.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38129",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1a8c0b61d4cb55c5440583ec9e7f86a730369e32",
            "patch_url": "https://git.kernel.org/stable/p/1a8c0b61d4cb55c5440583ec9e7f86a730369e32",
            "filename": "CVE-2025-38129-1a8c0b61d4cb55c5440583ec9e7f86a730369e32.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38129/CVE-2025-38129-1a8c0b61d4cb55c5440583ec9e7f86a730369e32.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1a8c0b61d4cb55c5440583ec9e7f86a730369e32",
                "patch_url": "https://git.kernel.org/stable/p/1a8c0b61d4cb55c5440583ec9e7f86a730369e32",
                "filename": "CVE-2025-38129-1a8c0b61d4cb55c5440583ec9e7f86a730369e32.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38129/CVE-2025-38129-1a8c0b61d4cb55c5440583ec9e7f86a730369e32.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/271683bb2cf32e5126c592b5d5e6a756fa374fd9",
                "patch_url": "https://git.kernel.org/stable/p/271683bb2cf32e5126c592b5d5e6a756fa374fd9",
                "filename": "CVE-2025-38129-271683bb2cf32e5126c592b5d5e6a756fa374fd9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38129/CVE-2025-38129-271683bb2cf32e5126c592b5d5e6a756fa374fd9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4914c0a166540e534a0c1d43affd329d95fb56fd",
                "patch_url": "https://git.kernel.org/stable/p/4914c0a166540e534a0c1d43affd329d95fb56fd",
                "filename": "CVE-2025-38129-4914c0a166540e534a0c1d43affd329d95fb56fd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38129/CVE-2025-38129-4914c0a166540e534a0c1d43affd329d95fb56fd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4ab8c0f8905c9c4d05e7f437e65a9a365573ff02",
                "patch_url": "https://git.kernel.org/stable/p/4ab8c0f8905c9c4d05e7f437e65a9a365573ff02",
                "filename": "CVE-2025-38129-4ab8c0f8905c9c4d05e7f437e65a9a365573ff02.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38129/CVE-2025-38129-4ab8c0f8905c9c4d05e7f437e65a9a365573ff02.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d69f28ef7cdafdcf37ee310f38b1399e7d05f9a8",
                "patch_url": "https://git.kernel.org/stable/p/d69f28ef7cdafdcf37ee310f38b1399e7d05f9a8",
                "filename": "CVE-2025-38129-d69f28ef7cdafdcf37ee310f38b1399e7d05f9a8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38129/CVE-2025-38129-d69f28ef7cdafdcf37ee310f38b1399e7d05f9a8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e869a85acc2e60dc554579b910826a4919d8cd98",
                "patch_url": "https://git.kernel.org/stable/p/e869a85acc2e60dc554579b910826a4919d8cd98",
                "filename": "CVE-2025-38129-e869a85acc2e60dc554579b910826a4919d8cd98.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38129/CVE-2025-38129-e869a85acc2e60dc554579b910826a4919d8cd98.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1a8c0b61d4cb55c5440583ec9e7f86a730369e32",
            "https://git.kernel.org/stable/c/271683bb2cf32e5126c592b5d5e6a756fa374fd9",
            "https://git.kernel.org/stable/c/4914c0a166540e534a0c1d43affd329d95fb56fd",
            "https://git.kernel.org/stable/c/4ab8c0f8905c9c4d05e7f437e65a9a365573ff02",
            "https://git.kernel.org/stable/c/d69f28ef7cdafdcf37ee310f38b1399e7d05f9a8",
            "https://git.kernel.org/stable/c/e869a85acc2e60dc554579b910826a4919d8cd98",
            "https://www.cve.org/CVERecord?id=CVE-2025-38129\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38129\nhttps://lore.kernel.org/linux-cve-announce/2025070330-CVE-2025-38129-3c0e@gregkh/T"
        ]
    },
    "CVE-2025-38159": {
        "cve": "CVE-2025-38159",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds\n\nSet the size to 6 instead of 2, since 'para' array is passed to\n'rtw_fw_bt_wifi_control(rtwdev, para[0], &para[1])', which reads\n5 bytes:\n\nvoid rtw_fw_bt_wifi_control(struct rtw_dev *rtwdev, u8 op_code, u8 *data)\n{\n    ...\n    SET_BT_WIFI_CONTROL_DATA1(h2c_pkt, *data);\n    SET_BT_WIFI_CONTROL_DATA2(h2c_pkt, *(data + 1));\n    ...\n    SET_BT_WIFI_CONTROL_DATA5(h2c_pkt, *(data + 4));\n\nDetected using the static analysis tool - Svace.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38159",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4c2c372de2e108319236203cce6de44d70ae15cd",
            "patch_url": "https://git.kernel.org/stable/p/4c2c372de2e108319236203cce6de44d70ae15cd",
            "filename": "CVE-2025-38159-4c2c372de2e108319236203cce6de44d70ae15cd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38159/CVE-2025-38159-4c2c372de2e108319236203cce6de44d70ae15cd.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1ee8ea6937d13b20f90ff35d71ccc03ba448182d",
                "patch_url": "https://git.kernel.org/stable/p/1ee8ea6937d13b20f90ff35d71ccc03ba448182d",
                "filename": "CVE-2025-38159-1ee8ea6937d13b20f90ff35d71ccc03ba448182d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38159/CVE-2025-38159-1ee8ea6937d13b20f90ff35d71ccc03ba448182d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4c2c372de2e108319236203cce6de44d70ae15cd",
                "patch_url": "https://git.kernel.org/stable/p/4c2c372de2e108319236203cce6de44d70ae15cd",
                "filename": "CVE-2025-38159-4c2c372de2e108319236203cce6de44d70ae15cd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38159/CVE-2025-38159-4c2c372de2e108319236203cce6de44d70ae15cd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/68a1037f0bac4de9a585aa9c879ef886109f3647",
                "patch_url": "https://git.kernel.org/stable/p/68a1037f0bac4de9a585aa9c879ef886109f3647",
                "filename": "CVE-2025-38159-68a1037f0bac4de9a585aa9c879ef886109f3647.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38159/CVE-2025-38159-68a1037f0bac4de9a585aa9c879ef886109f3647.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/74e18211c2c89ab66c9546baa7408288db61aa0d",
                "patch_url": "https://git.kernel.org/stable/p/74e18211c2c89ab66c9546baa7408288db61aa0d",
                "filename": "CVE-2025-38159-74e18211c2c89ab66c9546baa7408288db61aa0d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38159/CVE-2025-38159-74e18211c2c89ab66c9546baa7408288db61aa0d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9febcc8bded8be0d7efd8237fcef599b6d93b788",
                "patch_url": "https://git.kernel.org/stable/p/9febcc8bded8be0d7efd8237fcef599b6d93b788",
                "filename": "CVE-2025-38159-9febcc8bded8be0d7efd8237fcef599b6d93b788.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38159/CVE-2025-38159-9febcc8bded8be0d7efd8237fcef599b6d93b788.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c13255389499275bc5489a0b5b7940ccea3aef04",
                "patch_url": "https://git.kernel.org/stable/p/c13255389499275bc5489a0b5b7940ccea3aef04",
                "filename": "CVE-2025-38159-c13255389499275bc5489a0b5b7940ccea3aef04.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38159/CVE-2025-38159-c13255389499275bc5489a0b5b7940ccea3aef04.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1ee8ea6937d13b20f90ff35d71ccc03ba448182d",
            "https://git.kernel.org/stable/c/4c2c372de2e108319236203cce6de44d70ae15cd",
            "https://git.kernel.org/stable/c/68a1037f0bac4de9a585aa9c879ef886109f3647",
            "https://git.kernel.org/stable/c/74e18211c2c89ab66c9546baa7408288db61aa0d",
            "https://git.kernel.org/stable/c/9febcc8bded8be0d7efd8237fcef599b6d93b788",
            "https://git.kernel.org/stable/c/c13255389499275bc5489a0b5b7940ccea3aef04",
            "https://www.cve.org/CVERecord?id=CVE-2025-38159\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38159\nhttps://lore.kernel.org/linux-cve-announce/2025070339-CVE-2025-38159-0c95@gregkh/T"
        ]
    },
    "CVE-2025-38180": {
        "cve": "CVE-2025-38180",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atm: fix /proc/net/atm/lec handling\n\n/proc/net/atm/lec must ensure safety against dev_lec[] changes.\n\nIt appears it had dev_put() calls without prior dev_hold(),\nleading to imbalance and UAF.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38180",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/f2d1443b18806640abdb530e88009af7be2588e7",
            "patch_url": "https://git.kernel.org/stable/p/f2d1443b18806640abdb530e88009af7be2588e7",
            "filename": "CVE-2025-38180-f2d1443b18806640abdb530e88009af7be2588e7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38180/CVE-2025-38180-f2d1443b18806640abdb530e88009af7be2588e7.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/5fe1b23a2f87f43aeeac51e08819cbc6fd808cbc",
                "patch_url": "https://git.kernel.org/stable/p/5fe1b23a2f87f43aeeac51e08819cbc6fd808cbc",
                "filename": "CVE-2025-38180-5fe1b23a2f87f43aeeac51e08819cbc6fd808cbc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38180/CVE-2025-38180-5fe1b23a2f87f43aeeac51e08819cbc6fd808cbc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9b9aeb3ada44d8abea1e31e4446113f460848ae4",
                "patch_url": "https://git.kernel.org/stable/p/9b9aeb3ada44d8abea1e31e4446113f460848ae4",
                "filename": "CVE-2025-38180-9b9aeb3ada44d8abea1e31e4446113f460848ae4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38180/CVE-2025-38180-9b9aeb3ada44d8abea1e31e4446113f460848ae4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a5e3a144268899f1a8c445c8a3bfa15873ba85e8",
                "patch_url": "https://git.kernel.org/stable/p/a5e3a144268899f1a8c445c8a3bfa15873ba85e8",
                "filename": "CVE-2025-38180-a5e3a144268899f1a8c445c8a3bfa15873ba85e8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38180/CVE-2025-38180-a5e3a144268899f1a8c445c8a3bfa15873ba85e8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ca3829c18c8d0ceb656605d3bff6bb3dfb078589",
                "patch_url": "https://git.kernel.org/stable/p/ca3829c18c8d0ceb656605d3bff6bb3dfb078589",
                "filename": "CVE-2025-38180-ca3829c18c8d0ceb656605d3bff6bb3dfb078589.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38180/CVE-2025-38180-ca3829c18c8d0ceb656605d3bff6bb3dfb078589.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d03b79f459c7935cff830d98373474f440bd03ae",
                "patch_url": "https://git.kernel.org/stable/p/d03b79f459c7935cff830d98373474f440bd03ae",
                "filename": "CVE-2025-38180-d03b79f459c7935cff830d98373474f440bd03ae.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38180/CVE-2025-38180-d03b79f459c7935cff830d98373474f440bd03ae.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e612c4b014f5808fbc6beae21f5ccaca5e76a2f8",
                "patch_url": "https://git.kernel.org/stable/p/e612c4b014f5808fbc6beae21f5ccaca5e76a2f8",
                "filename": "CVE-2025-38180-e612c4b014f5808fbc6beae21f5ccaca5e76a2f8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38180/CVE-2025-38180-e612c4b014f5808fbc6beae21f5ccaca5e76a2f8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f2d1443b18806640abdb530e88009af7be2588e7",
                "patch_url": "https://git.kernel.org/stable/p/f2d1443b18806640abdb530e88009af7be2588e7",
                "filename": "CVE-2025-38180-f2d1443b18806640abdb530e88009af7be2588e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38180/CVE-2025-38180-f2d1443b18806640abdb530e88009af7be2588e7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fcfccf56f4eba7d00aa2d33c7bb1b33083237742",
                "patch_url": "https://git.kernel.org/stable/p/fcfccf56f4eba7d00aa2d33c7bb1b33083237742",
                "filename": "CVE-2025-38180-fcfccf56f4eba7d00aa2d33c7bb1b33083237742.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38180/CVE-2025-38180-fcfccf56f4eba7d00aa2d33c7bb1b33083237742.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/5fe1b23a2f87f43aeeac51e08819cbc6fd808cbc",
            "https://git.kernel.org/stable/c/9b9aeb3ada44d8abea1e31e4446113f460848ae4",
            "https://git.kernel.org/stable/c/a5e3a144268899f1a8c445c8a3bfa15873ba85e8",
            "https://git.kernel.org/stable/c/ca3829c18c8d0ceb656605d3bff6bb3dfb078589",
            "https://git.kernel.org/stable/c/d03b79f459c7935cff830d98373474f440bd03ae",
            "https://git.kernel.org/stable/c/e612c4b014f5808fbc6beae21f5ccaca5e76a2f8",
            "https://git.kernel.org/stable/c/f2d1443b18806640abdb530e88009af7be2588e7",
            "https://git.kernel.org/stable/c/fcfccf56f4eba7d00aa2d33c7bb1b33083237742",
            "https://www.cve.org/CVERecord?id=CVE-2025-38180\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38180\nhttps://lore.kernel.org/linux-cve-announce/2025070410-CVE-2025-38180-c6d0@gregkh/T"
        ]
    },
    "CVE-2025-38200": {
        "cve": "CVE-2025-38200",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: fix MMIO write access to an invalid page in i40e_clear_hw\n\nWhen the device sends a specific input, an integer underflow can occur, leading\nto MMIO write access to an invalid page.\n\nPrevent the integer underflow by changing the type of related variables.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38200",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/5e75c9082987479e647c75ec8fdf18fa68263c42",
            "patch_url": "https://git.kernel.org/stable/p/5e75c9082987479e647c75ec8fdf18fa68263c42",
            "filename": "CVE-2025-38200-5e75c9082987479e647c75ec8fdf18fa68263c42.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38200/CVE-2025-38200-5e75c9082987479e647c75ec8fdf18fa68263c42.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/015bac5daca978448f2671478c553ce1f300c21e",
                "patch_url": "https://git.kernel.org/stable/p/015bac5daca978448f2671478c553ce1f300c21e",
                "filename": "CVE-2025-38200-015bac5daca978448f2671478c553ce1f300c21e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38200/CVE-2025-38200-015bac5daca978448f2671478c553ce1f300c21e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2a1f4f2e36442a9bdf771acf6ee86f3cf876e5ca",
                "patch_url": "https://git.kernel.org/stable/p/2a1f4f2e36442a9bdf771acf6ee86f3cf876e5ca",
                "filename": "CVE-2025-38200-2a1f4f2e36442a9bdf771acf6ee86f3cf876e5ca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38200/CVE-2025-38200-2a1f4f2e36442a9bdf771acf6ee86f3cf876e5ca.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3502dd42f178dae9d54696013386bb52b4f2e655",
                "patch_url": "https://git.kernel.org/stable/p/3502dd42f178dae9d54696013386bb52b4f2e655",
                "filename": "CVE-2025-38200-3502dd42f178dae9d54696013386bb52b4f2e655.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38200/CVE-2025-38200-3502dd42f178dae9d54696013386bb52b4f2e655.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5e75c9082987479e647c75ec8fdf18fa68263c42",
                "patch_url": "https://git.kernel.org/stable/p/5e75c9082987479e647c75ec8fdf18fa68263c42",
                "filename": "CVE-2025-38200-5e75c9082987479e647c75ec8fdf18fa68263c42.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38200/CVE-2025-38200-5e75c9082987479e647c75ec8fdf18fa68263c42.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/872607632c658d3739e4e7889e4f3c419ae2c193",
                "patch_url": "https://git.kernel.org/stable/p/872607632c658d3739e4e7889e4f3c419ae2c193",
                "filename": "CVE-2025-38200-872607632c658d3739e4e7889e4f3c419ae2c193.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38200/CVE-2025-38200-872607632c658d3739e4e7889e4f3c419ae2c193.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8cde755f56163281ec2c46b4ae8b61f532758a6f",
                "patch_url": "https://git.kernel.org/stable/p/8cde755f56163281ec2c46b4ae8b61f532758a6f",
                "filename": "CVE-2025-38200-8cde755f56163281ec2c46b4ae8b61f532758a6f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38200/CVE-2025-38200-8cde755f56163281ec2c46b4ae8b61f532758a6f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d88a1e8f024ba26e19350958fecbf771a9960352",
                "patch_url": "https://git.kernel.org/stable/p/d88a1e8f024ba26e19350958fecbf771a9960352",
                "filename": "CVE-2025-38200-d88a1e8f024ba26e19350958fecbf771a9960352.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38200/CVE-2025-38200-d88a1e8f024ba26e19350958fecbf771a9960352.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fecb2fc3fc10c95724407cc45ea35af4a65cdde2",
                "patch_url": "https://git.kernel.org/stable/p/fecb2fc3fc10c95724407cc45ea35af4a65cdde2",
                "filename": "CVE-2025-38200-fecb2fc3fc10c95724407cc45ea35af4a65cdde2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38200/CVE-2025-38200-fecb2fc3fc10c95724407cc45ea35af4a65cdde2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/015bac5daca978448f2671478c553ce1f300c21e",
            "https://git.kernel.org/stable/c/2a1f4f2e36442a9bdf771acf6ee86f3cf876e5ca",
            "https://git.kernel.org/stable/c/3502dd42f178dae9d54696013386bb52b4f2e655",
            "https://git.kernel.org/stable/c/5e75c9082987479e647c75ec8fdf18fa68263c42",
            "https://git.kernel.org/stable/c/872607632c658d3739e4e7889e4f3c419ae2c193",
            "https://git.kernel.org/stable/c/8cde755f56163281ec2c46b4ae8b61f532758a6f",
            "https://git.kernel.org/stable/c/d88a1e8f024ba26e19350958fecbf771a9960352",
            "https://git.kernel.org/stable/c/fecb2fc3fc10c95724407cc45ea35af4a65cdde2",
            "https://www.cve.org/CVERecord?id=CVE-2025-38200\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38200\nhttps://lore.kernel.org/linux-cve-announce/2025070418-CVE-2025-38200-47d9@gregkh/T"
        ]
    },
    "CVE-2025-38211": {
        "cve": "CVE-2025-38211",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/iwcm: Fix use-after-free of work objects after cm_id destruction\n\nThe commit 59c68ac31e15 (\"iw_cm: free cm_id resources on the last\nderef\") simplified cm_id resource management by freeing cm_id once all\nreferences to the cm_id were removed. The references are removed either\nupon completion of iw_cm event handlers or when the application destroys\nthe cm_id. This commit introduced the use-after-free condition where\ncm_id_private object could still be in use by event handler works during\nthe destruction of cm_id. The commit aee2424246f9 (\"RDMA/iwcm: Fix a\nuse-after-free related to destroying CM IDs\") addressed this use-after-\nfree by flushing all pending works at the cm_id destruction.\n\nHowever, still another use-after-free possibility remained. It happens\nwith the work objects allocated for each cm_id_priv within\nalloc_work_entries() during cm_id creation, and subsequently freed in\ndealloc_work_entries() once all references to the cm_id are removed.\nIf the cm_id's last reference is decremented in the event handler work,\nthe work object for the work itself gets removed, and causes the use-\nafter-free BUG below:\n\n  BUG: KASAN: slab-use-after-free in __pwq_activate_work+0x1ff/0x250\n  Read of size 8 at addr ffff88811f9cf800 by task kworker/u16:1/147091\n\n  CPU: 2 UID: 0 PID: 147091 Comm: kworker/u16:1 Not tainted 6.15.0-rc2+ #27 PREEMPT(voluntary)\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014\n  Workqueue:  0x0 (iw_cm_wq)\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x6a/0x90\n   print_report+0x174/0x554\n   ? __virt_addr_valid+0x208/0x430\n   ? __pwq_activate_work+0x1ff/0x250\n   kasan_report+0xae/0x170\n   ? __pwq_activate_work+0x1ff/0x250\n   __pwq_activate_work+0x1ff/0x250\n   pwq_dec_nr_in_flight+0x8c5/0xfb0\n   process_one_work+0xc11/0x1460\n   ? __pfx_process_one_work+0x10/0x10\n   ? assign_work+0x16c/0x240\n   worker_thread+0x5ef/0xfd0\n   ? __pfx_worker_thread+0x10/0x10\n   kthread+0x3b0/0x770\n   ? __pfx_kthread+0x10/0x10\n   ? rcu_is_watching+0x11/0xb0\n   ? _raw_spin_unlock_irq+0x24/0x50\n   ? rcu_is_watching+0x11/0xb0\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork+0x30/0x70\n   ? __pfx_kthread+0x10/0x10\n   ret_from_fork_asm+0x1a/0x30\n   </TASK>\n\n  Allocated by task 147416:\n   kasan_save_stack+0x2c/0x50\n   kasan_save_track+0x10/0x30\n   __kasan_kmalloc+0xa6/0xb0\n   alloc_work_entries+0xa9/0x260 [iw_cm]\n   iw_cm_connect+0x23/0x4a0 [iw_cm]\n   rdma_connect_locked+0xbfd/0x1920 [rdma_cm]\n   nvme_rdma_cm_handler+0x8e5/0x1b60 [nvme_rdma]\n   cma_cm_event_handler+0xae/0x320 [rdma_cm]\n   cma_work_handler+0x106/0x1b0 [rdma_cm]\n   process_one_work+0x84f/0x1460\n   worker_thread+0x5ef/0xfd0\n   kthread+0x3b0/0x770\n   ret_from_fork+0x30/0x70\n   ret_from_fork_asm+0x1a/0x30\n\n  Freed by task 147091:\n   kasan_save_stack+0x2c/0x50\n   kasan_save_track+0x10/0x30\n   kasan_save_free_info+0x37/0x60\n   __kasan_slab_free+0x4b/0x70\n   kfree+0x13a/0x4b0\n   dealloc_work_entries+0x125/0x1f0 [iw_cm]\n   iwcm_deref_id+0x6f/0xa0 [iw_cm]\n   cm_work_handler+0x136/0x1ba0 [iw_cm]\n   process_one_work+0x84f/0x1460\n   worker_thread+0x5ef/0xfd0\n   kthread+0x3b0/0x770\n   ret_from_fork+0x30/0x70\n   ret_from_fork_asm+0x1a/0x30\n\n  Last potentially related work creation:\n   kasan_save_stack+0x2c/0x50\n   kasan_record_aux_stack+0xa3/0xb0\n   __queue_work+0x2ff/0x1390\n   queue_work_on+0x67/0xc0\n   cm_event_handler+0x46a/0x820 [iw_cm]\n   siw_cm_upcall+0x330/0x650 [siw]\n   siw_cm_work_handler+0x6b9/0x2b20 [siw]\n   process_one_work+0x84f/0x1460\n   worker_thread+0x5ef/0xfd0\n   kthread+0x3b0/0x770\n   ret_from_fork+0x30/0x70\n   ret_from_fork_asm+0x1a/0x30\n\nThis BUG is reproducible by repeating the blktests test case nvme/061\nfor the rdma transport and the siw driver.\n\nTo avoid the use-after-free of cm_id_private work objects, ensure that\nthe last reference to the cm_id is decremented not in the event handler\nworks, but in the cm_id destruction context. For that purpose, mo\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38211",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/013dcdf6f03bcedbaf1669e3db71c34a197715b2",
            "patch_url": "https://git.kernel.org/stable/p/013dcdf6f03bcedbaf1669e3db71c34a197715b2",
            "filename": "CVE-2025-38211-013dcdf6f03bcedbaf1669e3db71c34a197715b2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38211/CVE-2025-38211-013dcdf6f03bcedbaf1669e3db71c34a197715b2.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/013dcdf6f03bcedbaf1669e3db71c34a197715b2",
                "patch_url": "https://git.kernel.org/stable/p/013dcdf6f03bcedbaf1669e3db71c34a197715b2",
                "filename": "CVE-2025-38211-013dcdf6f03bcedbaf1669e3db71c34a197715b2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38211/CVE-2025-38211-013dcdf6f03bcedbaf1669e3db71c34a197715b2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/23a707bbcbea468eedb398832eeb7e8e0ceafd21",
                "patch_url": "https://git.kernel.org/stable/p/23a707bbcbea468eedb398832eeb7e8e0ceafd21",
                "filename": "CVE-2025-38211-23a707bbcbea468eedb398832eeb7e8e0ceafd21.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38211/CVE-2025-38211-23a707bbcbea468eedb398832eeb7e8e0ceafd21.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3b4a50d733acad6831f6bd9288a76a80f70650ac",
                "patch_url": "https://git.kernel.org/stable/p/3b4a50d733acad6831f6bd9288a76a80f70650ac",
                "filename": "CVE-2025-38211-3b4a50d733acad6831f6bd9288a76a80f70650ac.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38211/CVE-2025-38211-3b4a50d733acad6831f6bd9288a76a80f70650ac.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6883b680e703c6b2efddb4e7a8d891ce1803d06b",
                "patch_url": "https://git.kernel.org/stable/p/6883b680e703c6b2efddb4e7a8d891ce1803d06b",
                "filename": "CVE-2025-38211-6883b680e703c6b2efddb4e7a8d891ce1803d06b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38211/CVE-2025-38211-6883b680e703c6b2efddb4e7a8d891ce1803d06b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/764c9f69beabef8bdc651a7746c59f7a340d104f",
                "patch_url": "https://git.kernel.org/stable/p/764c9f69beabef8bdc651a7746c59f7a340d104f",
                "filename": "CVE-2025-38211-764c9f69beabef8bdc651a7746c59f7a340d104f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38211/CVE-2025-38211-764c9f69beabef8bdc651a7746c59f7a340d104f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/78381dc8a6b61c9bb9987d37b4d671b99767c4a1",
                "patch_url": "https://git.kernel.org/stable/p/78381dc8a6b61c9bb9987d37b4d671b99767c4a1",
                "filename": "CVE-2025-38211-78381dc8a6b61c9bb9987d37b4d671b99767c4a1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38211/CVE-2025-38211-78381dc8a6b61c9bb9987d37b4d671b99767c4a1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bf7eff5e3a36c54bbe8aff7fd6dd7c07490b81c5",
                "patch_url": "https://git.kernel.org/stable/p/bf7eff5e3a36c54bbe8aff7fd6dd7c07490b81c5",
                "filename": "CVE-2025-38211-bf7eff5e3a36c54bbe8aff7fd6dd7c07490b81c5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38211/CVE-2025-38211-bf7eff5e3a36c54bbe8aff7fd6dd7c07490b81c5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fd960b5ddf4faf00da43babdd3acda68842e1f6a",
                "patch_url": "https://git.kernel.org/stable/p/fd960b5ddf4faf00da43babdd3acda68842e1f6a",
                "filename": "CVE-2025-38211-fd960b5ddf4faf00da43babdd3acda68842e1f6a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38211/CVE-2025-38211-fd960b5ddf4faf00da43babdd3acda68842e1f6a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/013dcdf6f03bcedbaf1669e3db71c34a197715b2",
            "https://git.kernel.org/stable/c/23a707bbcbea468eedb398832eeb7e8e0ceafd21",
            "https://git.kernel.org/stable/c/3b4a50d733acad6831f6bd9288a76a80f70650ac",
            "https://git.kernel.org/stable/c/6883b680e703c6b2efddb4e7a8d891ce1803d06b",
            "https://git.kernel.org/stable/c/764c9f69beabef8bdc651a7746c59f7a340d104f",
            "https://git.kernel.org/stable/c/78381dc8a6b61c9bb9987d37b4d671b99767c4a1",
            "https://git.kernel.org/stable/c/bf7eff5e3a36c54bbe8aff7fd6dd7c07490b81c5",
            "https://git.kernel.org/stable/c/fd960b5ddf4faf00da43babdd3acda68842e1f6a",
            "https://www.cve.org/CVERecord?id=CVE-2025-38211\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38211\nhttps://lore.kernel.org/linux-cve-announce/2025070422-CVE-2025-38211-215a@gregkh/T"
        ]
    },
    "CVE-2025-38248": {
        "cve": "CVE-2025-38248",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nbridge: mcast: Fix use-after-free during router port configuration\n\nThe bridge maintains a global list of ports behind which a multicast\nrouter resides. The list is consulted during forwarding to ensure\nmulticast packets are forwarded to these ports even if the ports are not\nmember in the matching MDB entry.\n\nWhen per-VLAN multicast snooping is enabled, the per-port multicast\ncontext is disabled on each port and the port is removed from the global\nrouter port list:\n\n # ip link add name br1 up type bridge vlan_filtering 1 mcast_snooping 1\n # ip link add name dummy1 up master br1 type dummy\n # ip link set dev dummy1 type bridge_slave mcast_router 2\n $ bridge -d mdb show | grep router\n router ports on br1: dummy1\n # ip link set dev br1 type bridge mcast_vlan_snooping 1\n $ bridge -d mdb show | grep router\n\nHowever, the port can be re-added to the global list even when per-VLAN\nmulticast snooping is enabled:\n\n # ip link set dev dummy1 type bridge_slave mcast_router 0\n # ip link set dev dummy1 type bridge_slave mcast_router 2\n $ bridge -d mdb show | grep router\n router ports on br1: dummy1\n\nSince commit 4b30ae9adb04 (\"net: bridge: mcast: re-implement\nbr_multicast_{enable, disable}_port functions\"), when per-VLAN multicast\nsnooping is enabled, multicast disablement on a port will disable the\nper-{port, VLAN} multicast contexts and not the per-port one. As a\nresult, a port will remain in the global router port list even after it\nis deleted. This will lead to a use-after-free [1] when the list is\ntraversed (when adding a new port to the list, for example):\n\n # ip link del dev dummy1\n # ip link add name dummy2 up master br1 type dummy\n # ip link set dev dummy2 type bridge_slave mcast_router 2\n\nSimilarly, stale entries can also be found in the per-VLAN router port\nlist. When per-VLAN multicast snooping is disabled, the per-{port, VLAN}\ncontexts are disabled on each port and the port is removed from the\nper-VLAN router port list:\n\n # ip link add name br1 up type bridge vlan_filtering 1 mcast_snooping 1 mcast_vlan_snooping 1\n # ip link add name dummy1 up master br1 type dummy\n # bridge vlan add vid 2 dev dummy1\n # bridge vlan global set vid 2 dev br1 mcast_snooping 1\n # bridge vlan set vid 2 dev dummy1 mcast_router 2\n $ bridge vlan global show dev br1 vid 2 | grep router\n       router ports: dummy1\n # ip link set dev br1 type bridge mcast_vlan_snooping 0\n $ bridge vlan global show dev br1 vid 2 | grep router\n\nHowever, the port can be re-added to the per-VLAN list even when\nper-VLAN multicast snooping is disabled:\n\n # bridge vlan set vid 2 dev dummy1 mcast_router 0\n # bridge vlan set vid 2 dev dummy1 mcast_router 2\n $ bridge vlan global show dev br1 vid 2 | grep router\n       router ports: dummy1\n\nWhen the VLAN is deleted from the port, the per-{port, VLAN} multicast\ncontext will not be disabled since multicast snooping is not enabled\non the VLAN. As a result, the port will remain in the per-VLAN router\nport list even after it is no longer member in the VLAN. This will lead\nto a use-after-free [2] when the list is traversed (when adding a new\nport to the list, for example):\n\n # ip link add name dummy2 up master br1 type dummy\n # bridge vlan add vid 2 dev dummy2\n # bridge vlan del vid 2 dev dummy1\n # bridge vlan set vid 2 dev dummy2 mcast_router 2\n\nFix these issues by removing the port from the relevant (global or\nper-VLAN) router port list in br_multicast_port_ctx_deinit(). The\nfunction is invoked during port deletion with the per-port multicast\ncontext and during VLAN deletion with the per-{port, VLAN} multicast\ncontext.\n\nNote that deleting the multicast router timer is not enough as it only\ntakes care of the temporary multicast router states (1 or 3) and not the\npermanent one (2).\n\n[1]\nBUG: KASAN: slab-out-of-bounds in br_multicast_add_router.part.0+0x3f1/0x560\nWrite of size 8 at addr ffff888004a67328 by task ip/384\n[...]\nCall Trace:\n <TASK>\n dump_stack\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38248",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4d3c2a1d4c7c33103f1ddfdbc5cfe1ea4f6d0dcd",
            "patch_url": "https://git.kernel.org/stable/p/4d3c2a1d4c7c33103f1ddfdbc5cfe1ea4f6d0dcd",
            "filename": "CVE-2025-38248-4d3c2a1d4c7c33103f1ddfdbc5cfe1ea4f6d0dcd.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38248/CVE-2025-38248-4d3c2a1d4c7c33103f1ddfdbc5cfe1ea4f6d0dcd.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4d3c2a1d4c7c33103f1ddfdbc5cfe1ea4f6d0dcd",
                "patch_url": "https://git.kernel.org/stable/p/4d3c2a1d4c7c33103f1ddfdbc5cfe1ea4f6d0dcd",
                "filename": "CVE-2025-38248-4d3c2a1d4c7c33103f1ddfdbc5cfe1ea4f6d0dcd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38248/CVE-2025-38248-4d3c2a1d4c7c33103f1ddfdbc5cfe1ea4f6d0dcd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7544f3f5b0b58c396f374d060898b5939da31709",
                "patch_url": "https://git.kernel.org/stable/p/7544f3f5b0b58c396f374d060898b5939da31709",
                "filename": "CVE-2025-38248-7544f3f5b0b58c396f374d060898b5939da31709.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38248/CVE-2025-38248-7544f3f5b0b58c396f374d060898b5939da31709.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bdced577da71b118b6ed4242ebd47f81bf54d406",
                "patch_url": "https://git.kernel.org/stable/p/bdced577da71b118b6ed4242ebd47f81bf54d406",
                "filename": "CVE-2025-38248-bdced577da71b118b6ed4242ebd47f81bf54d406.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38248/CVE-2025-38248-bdced577da71b118b6ed4242ebd47f81bf54d406.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f05a4f9e959e0fc098046044c650acf897ea52d2",
                "patch_url": "https://git.kernel.org/stable/p/f05a4f9e959e0fc098046044c650acf897ea52d2",
                "filename": "CVE-2025-38248-f05a4f9e959e0fc098046044c650acf897ea52d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38248/CVE-2025-38248-f05a4f9e959e0fc098046044c650acf897ea52d2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4d3c2a1d4c7c33103f1ddfdbc5cfe1ea4f6d0dcd",
            "https://git.kernel.org/stable/c/7544f3f5b0b58c396f374d060898b5939da31709",
            "https://git.kernel.org/stable/c/bdced577da71b118b6ed4242ebd47f81bf54d406",
            "https://git.kernel.org/stable/c/f05a4f9e959e0fc098046044c650acf897ea52d2",
            "https://www.cve.org/CVERecord?id=CVE-2025-38248\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38248\nhttps://lore.kernel.org/linux-cve-announce/2025070934-CVE-2025-38248-003c@gregkh/T"
        ]
    },
    "CVE-2025-38250": {
        "cve": "CVE-2025-38250",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: Fix use-after-free in vhci_flush()\n\nsyzbot reported use-after-free in vhci_flush() without repro. [0]\n\nFrom the splat, a thread close()d a vhci file descriptor while\nits device was being used by iotcl() on another thread.\n\nOnce the last fd refcnt is released, vhci_release() calls\nhci_unregister_dev(), hci_free_dev(), and kfree() for struct\nvhci_data, which is set to hci_dev->dev->driver_data.\n\nThe problem is that there is no synchronisation after unlinking\nhdev from hci_dev_list in hci_unregister_dev().  There might be\nanother thread still accessing the hdev which was fetched before\nthe unlink operation.\n\nWe can use SRCU for such synchronisation.\n\nLet's run hci_dev_reset() under SRCU and wait for its completion\nin hci_unregister_dev().\n\nAnother option would be to restore hci_dev->destruct(), which was\nremoved in commit 587ae086f6e4 (\"Bluetooth: Remove unused\nhci-destruct cb\").  However, this would not be a good solution, as\nwe should not run hci_unregister_dev() while there are in-flight\nioctl() requests, which could lead to another data-race KCSAN splat.\n\nNote that other drivers seem to have the same problem, for exmaple,\nvirtbt_remove().\n\n[0]:\nBUG: KASAN: slab-use-after-free in skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline]\nBUG: KASAN: slab-use-after-free in skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937\nRead of size 8 at addr ffff88807cb8d858 by task syz.1.219/6718\n\nCPU: 1 UID: 0 PID: 6718 Comm: syz.1.219 Not tainted 6.16.0-rc1-syzkaller-00196-g08207f42d3ff #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nCall Trace:\n <TASK>\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0xd2/0x2b0 mm/kasan/report.c:521\n kasan_report+0x118/0x150 mm/kasan/report.c:634\n skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline]\n skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937\n skb_queue_purge include/linux/skbuff.h:3368 [inline]\n vhci_flush+0x44/0x50 drivers/bluetooth/hci_vhci.c:69\n hci_dev_do_reset net/bluetooth/hci_core.c:552 [inline]\n hci_dev_reset+0x420/0x5c0 net/bluetooth/hci_core.c:592\n sock_do_ioctl+0xd9/0x300 net/socket.c:1190\n sock_ioctl+0x576/0x790 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fcf5b98e929\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fcf5c7b9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007fcf5bbb6160 RCX: 00007fcf5b98e929\nRDX: 0000000000000000 RSI: 00000000400448cb RDI: 0000000000000009\nRBP: 00007fcf5ba10b39 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 0000000000000000 R14: 00007fcf5bbb6160 R15: 00007ffd6353d528\n </TASK>\n\nAllocated by task 6535:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359\n kmalloc_noprof include/linux/slab.h:905 [inline]\n kzalloc_noprof include/linux/slab.h:1039 [inline]\n vhci_open+0x57/0x360 drivers/bluetooth/hci_vhci.c:635\n misc_open+0x2bc/0x330 drivers/char/misc.c:161\n chrdev_open+0x4c9/0x5e0 fs/char_dev.c:414\n do_dentry_open+0xdf0/0x1970 fs/open.c:964\n vfs_open+0x3b/0x340 fs/open.c:1094\n do_open fs/namei.c:3887 [inline]\n path_openat+0x2ee5/0x3830 fs/name\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38250",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0e5c144c557df910ab64d9c25d06399a9a735e65",
            "patch_url": "https://git.kernel.org/stable/p/0e5c144c557df910ab64d9c25d06399a9a735e65",
            "filename": "CVE-2025-38250-0e5c144c557df910ab64d9c25d06399a9a735e65.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38250/CVE-2025-38250-0e5c144c557df910ab64d9c25d06399a9a735e65.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0e5c144c557df910ab64d9c25d06399a9a735e65",
                "patch_url": "https://git.kernel.org/stable/p/0e5c144c557df910ab64d9c25d06399a9a735e65",
                "filename": "CVE-2025-38250-0e5c144c557df910ab64d9c25d06399a9a735e65.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38250/CVE-2025-38250-0e5c144c557df910ab64d9c25d06399a9a735e65.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1d6123102e9fbedc8d25bf4731da6d513173e49e",
                "patch_url": "https://git.kernel.org/stable/p/1d6123102e9fbedc8d25bf4731da6d513173e49e",
                "filename": "CVE-2025-38250-1d6123102e9fbedc8d25bf4731da6d513173e49e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38250/CVE-2025-38250-1d6123102e9fbedc8d25bf4731da6d513173e49e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bc0819a25e04cd68ef3568cfa51b63118fea39a7",
                "patch_url": "https://git.kernel.org/stable/p/bc0819a25e04cd68ef3568cfa51b63118fea39a7",
                "filename": "CVE-2025-38250-bc0819a25e04cd68ef3568cfa51b63118fea39a7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38250/CVE-2025-38250-bc0819a25e04cd68ef3568cfa51b63118fea39a7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c56b177efce8b62798e4d96bdb9867106cb7c4a0",
                "patch_url": "https://git.kernel.org/stable/p/c56b177efce8b62798e4d96bdb9867106cb7c4a0",
                "filename": "CVE-2025-38250-c56b177efce8b62798e4d96bdb9867106cb7c4a0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38250/CVE-2025-38250-c56b177efce8b62798e4d96bdb9867106cb7c4a0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ce23b73f0f27e2dbeb81734a79db710f05aa33c6",
                "patch_url": "https://git.kernel.org/stable/p/ce23b73f0f27e2dbeb81734a79db710f05aa33c6",
                "filename": "CVE-2025-38250-ce23b73f0f27e2dbeb81734a79db710f05aa33c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38250/CVE-2025-38250-ce23b73f0f27e2dbeb81734a79db710f05aa33c6.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0e5c144c557df910ab64d9c25d06399a9a735e65",
            "https://git.kernel.org/stable/c/1d6123102e9fbedc8d25bf4731da6d513173e49e",
            "https://git.kernel.org/stable/c/bc0819a25e04cd68ef3568cfa51b63118fea39a7",
            "https://git.kernel.org/stable/c/c56b177efce8b62798e4d96bdb9867106cb7c4a0",
            "https://git.kernel.org/stable/c/ce23b73f0f27e2dbeb81734a79db710f05aa33c6",
            "https://www.cve.org/CVERecord?id=CVE-2025-38250\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38250\nhttps://lore.kernel.org/linux-cve-announce/2025070934-CVE-2025-38250-3145@gregkh/T"
        ]
    },
    "CVE-2025-38332": {
        "cve": "CVE-2025-38332",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Use memcpy() for BIOS version\n\nThe strlcat() with FORTIFY support is triggering a panic because it\nthinks the target buffer will overflow although the correct target\nbuffer size is passed in.\n\nAnyway, instead of memset() with 0 followed by a strlcat(), just use\nmemcpy() and ensure that the resulting buffer is NULL terminated.\n\nBIOSVersion is only used for the lpfc_printf_log() which expects a\nproperly terminated string.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38332",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/003baa7a1a152576d744bd655820449bbdb0248e",
            "patch_url": "https://git.kernel.org/stable/p/003baa7a1a152576d744bd655820449bbdb0248e",
            "filename": "CVE-2025-38332-003baa7a1a152576d744bd655820449bbdb0248e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38332/CVE-2025-38332-003baa7a1a152576d744bd655820449bbdb0248e.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/003baa7a1a152576d744bd655820449bbdb0248e",
                "patch_url": "https://git.kernel.org/stable/p/003baa7a1a152576d744bd655820449bbdb0248e",
                "filename": "CVE-2025-38332-003baa7a1a152576d744bd655820449bbdb0248e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38332/CVE-2025-38332-003baa7a1a152576d744bd655820449bbdb0248e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f63bf0d2b146956a2f2ff3b25cee71019e64561",
                "patch_url": "https://git.kernel.org/stable/p/2f63bf0d2b146956a2f2ff3b25cee71019e64561",
                "filename": "CVE-2025-38332-2f63bf0d2b146956a2f2ff3b25cee71019e64561.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38332/CVE-2025-38332-2f63bf0d2b146956a2f2ff3b25cee71019e64561.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/34c0a670556b24d36c9f8934227edb819ca5609e",
                "patch_url": "https://git.kernel.org/stable/p/34c0a670556b24d36c9f8934227edb819ca5609e",
                "filename": "CVE-2025-38332-34c0a670556b24d36c9f8934227edb819ca5609e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38332/CVE-2025-38332-34c0a670556b24d36c9f8934227edb819ca5609e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/75ea8375c5a83f46c47bfb3de6217c7589a8df93",
                "patch_url": "https://git.kernel.org/stable/p/75ea8375c5a83f46c47bfb3de6217c7589a8df93",
                "filename": "CVE-2025-38332-75ea8375c5a83f46c47bfb3de6217c7589a8df93.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38332/CVE-2025-38332-75ea8375c5a83f46c47bfb3de6217c7589a8df93.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ac7bfaa099ec3e4d7dfd0ab9726fc3bc7911365d",
                "patch_url": "https://git.kernel.org/stable/p/ac7bfaa099ec3e4d7dfd0ab9726fc3bc7911365d",
                "filename": "CVE-2025-38332-ac7bfaa099ec3e4d7dfd0ab9726fc3bc7911365d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38332/CVE-2025-38332-ac7bfaa099ec3e4d7dfd0ab9726fc3bc7911365d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ae82eaf4aeea060bb736c3e20c0568b67c701d7d",
                "patch_url": "https://git.kernel.org/stable/p/ae82eaf4aeea060bb736c3e20c0568b67c701d7d",
                "filename": "CVE-2025-38332-ae82eaf4aeea060bb736c3e20c0568b67c701d7d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38332/CVE-2025-38332-ae82eaf4aeea060bb736c3e20c0568b67c701d7d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b699bda5db818b684ff62d140defd6394f38f3d6",
                "patch_url": "https://git.kernel.org/stable/p/b699bda5db818b684ff62d140defd6394f38f3d6",
                "filename": "CVE-2025-38332-b699bda5db818b684ff62d140defd6394f38f3d6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38332/CVE-2025-38332-b699bda5db818b684ff62d140defd6394f38f3d6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d34f2384d6df11a6c67039b612c2437f46e587e8",
                "patch_url": "https://git.kernel.org/stable/p/d34f2384d6df11a6c67039b612c2437f46e587e8",
                "filename": "CVE-2025-38332-d34f2384d6df11a6c67039b612c2437f46e587e8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38332/CVE-2025-38332-d34f2384d6df11a6c67039b612c2437f46e587e8.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/003baa7a1a152576d744bd655820449bbdb0248e",
            "https://git.kernel.org/stable/c/2f63bf0d2b146956a2f2ff3b25cee71019e64561",
            "https://git.kernel.org/stable/c/34c0a670556b24d36c9f8934227edb819ca5609e",
            "https://git.kernel.org/stable/c/75ea8375c5a83f46c47bfb3de6217c7589a8df93",
            "https://git.kernel.org/stable/c/ac7bfaa099ec3e4d7dfd0ab9726fc3bc7911365d",
            "https://git.kernel.org/stable/c/ae82eaf4aeea060bb736c3e20c0568b67c701d7d",
            "https://git.kernel.org/stable/c/b699bda5db818b684ff62d140defd6394f38f3d6",
            "https://git.kernel.org/stable/c/d34f2384d6df11a6c67039b612c2437f46e587e8",
            "https://www.cve.org/CVERecord?id=CVE-2025-38332\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38332\nhttps://lore.kernel.org/linux-cve-announce/2025071033-CVE-2025-38332-9590@gregkh/T"
        ]
    },
    "CVE-2025-38350": {
        "cve": "CVE-2025-38350",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Always pass notifications when child class becomes empty\n\nCertain classful qdiscs may invoke their classes' dequeue handler on an\nenqueue operation. This may unexpectedly empty the child qdisc and thus\nmake an in-flight class passive via qlen_notify(). Most qdiscs do not\nexpect such behaviour at this point in time and may re-activate the\nclass eventually anyways which will lead to a use-after-free.\n\nThe referenced fix commit attempted to fix this behavior for the HFSC\ncase by moving the backlog accounting around, though this turned out to\nbe incomplete since the parent's parent may run into the issue too.\nThe following reproducer demonstrates this use-after-free:\n\n    tc qdisc add dev lo root handle 1: drr\n    tc filter add dev lo parent 1: basic classid 1:1\n    tc class add dev lo parent 1: classid 1:1 drr\n    tc qdisc add dev lo parent 1:1 handle 2: hfsc def 1\n    tc class add dev lo parent 2: classid 2:1 hfsc rt m1 8 d 1 m2 0\n    tc qdisc add dev lo parent 2:1 handle 3: netem\n    tc qdisc add dev lo parent 3:1 handle 4: blackhole\n\n    echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888\n    tc class delete dev lo classid 1:1\n    echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888\n\nSince backlog accounting issues leading to a use-after-frees on stale\nclass pointers is a recurring pattern at this point, this patch takes\na different approach. Instead of trying to fix the accounting, the patch\nensures that qdisc_tree_reduce_backlog always calls qlen_notify when\nthe child qdisc is empty. This solves the problem because deletion of\nqdiscs always involves a call to qdisc_reset() and / or\nqdisc_purge_queue() which ultimately resets its qlen to 0 thus causing\nthe following qdisc_tree_reduce_backlog() to report to the parent. Note\nthat this may call qlen_notify on passive classes multiple times. This\nis not a problem after the recent patch series that made all the\nclassful qdiscs qlen_notify() handlers idempotent.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38350",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/e9921b57dca05ac5f4fa1fa8e993d4f0ee52e2b7",
            "patch_url": "https://git.kernel.org/stable/p/e9921b57dca05ac5f4fa1fa8e993d4f0ee52e2b7",
            "filename": "CVE-2025-38350-e9921b57dca05ac5f4fa1fa8e993d4f0ee52e2b7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38350/CVE-2025-38350-e9921b57dca05ac5f4fa1fa8e993d4f0ee52e2b7.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/103406b38c600fec1fe375a77b27d87e314aea09",
                "patch_url": "https://git.kernel.org/stable/p/103406b38c600fec1fe375a77b27d87e314aea09",
                "filename": "CVE-2025-38350-103406b38c600fec1fe375a77b27d87e314aea09.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38350/CVE-2025-38350-103406b38c600fec1fe375a77b27d87e314aea09.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3b290923ad2b23596208c1e29520badef4356a43",
                "patch_url": "https://git.kernel.org/stable/p/3b290923ad2b23596208c1e29520badef4356a43",
                "filename": "CVE-2025-38350-3b290923ad2b23596208c1e29520badef4356a43.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38350/CVE-2025-38350-3b290923ad2b23596208c1e29520badef4356a43.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7874c9c132e906a52a187d045995b115973c93fb",
                "patch_url": "https://git.kernel.org/stable/p/7874c9c132e906a52a187d045995b115973c93fb",
                "filename": "CVE-2025-38350-7874c9c132e906a52a187d045995b115973c93fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38350/CVE-2025-38350-7874c9c132e906a52a187d045995b115973c93fb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a44acdd9e84a211989ff4b9b92bf3545d8456ad5",
                "patch_url": "https://git.kernel.org/stable/p/a44acdd9e84a211989ff4b9b92bf3545d8456ad5",
                "filename": "CVE-2025-38350-a44acdd9e84a211989ff4b9b92bf3545d8456ad5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38350/CVE-2025-38350-a44acdd9e84a211989ff4b9b92bf3545d8456ad5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a553afd91f55ff39b1e8a1c4989a29394c9e0472",
                "patch_url": "https://git.kernel.org/stable/p/a553afd91f55ff39b1e8a1c4989a29394c9e0472",
                "filename": "CVE-2025-38350-a553afd91f55ff39b1e8a1c4989a29394c9e0472.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38350/CVE-2025-38350-a553afd91f55ff39b1e8a1c4989a29394c9e0472.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e269f29e9395527bc00c213c6b15da04ebb35070",
                "patch_url": "https://git.kernel.org/stable/p/e269f29e9395527bc00c213c6b15da04ebb35070",
                "filename": "CVE-2025-38350-e269f29e9395527bc00c213c6b15da04ebb35070.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38350/CVE-2025-38350-e269f29e9395527bc00c213c6b15da04ebb35070.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e9921b57dca05ac5f4fa1fa8e993d4f0ee52e2b7",
                "patch_url": "https://git.kernel.org/stable/p/e9921b57dca05ac5f4fa1fa8e993d4f0ee52e2b7",
                "filename": "CVE-2025-38350-e9921b57dca05ac5f4fa1fa8e993d4f0ee52e2b7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38350/CVE-2025-38350-e9921b57dca05ac5f4fa1fa8e993d4f0ee52e2b7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f680a4643c6f71e758d8fe0431a958e9a6a4f59d",
                "patch_url": "https://git.kernel.org/stable/p/f680a4643c6f71e758d8fe0431a958e9a6a4f59d",
                "filename": "CVE-2025-38350-f680a4643c6f71e758d8fe0431a958e9a6a4f59d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38350/CVE-2025-38350-f680a4643c6f71e758d8fe0431a958e9a6a4f59d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/103406b38c600fec1fe375a77b27d87e314aea09",
            "https://git.kernel.org/stable/c/3b290923ad2b23596208c1e29520badef4356a43",
            "https://git.kernel.org/stable/c/7874c9c132e906a52a187d045995b115973c93fb",
            "https://git.kernel.org/stable/c/a44acdd9e84a211989ff4b9b92bf3545d8456ad5",
            "https://git.kernel.org/stable/c/a553afd91f55ff39b1e8a1c4989a29394c9e0472",
            "https://git.kernel.org/stable/c/e269f29e9395527bc00c213c6b15da04ebb35070",
            "https://git.kernel.org/stable/c/e9921b57dca05ac5f4fa1fa8e993d4f0ee52e2b7",
            "https://git.kernel.org/stable/c/f680a4643c6f71e758d8fe0431a958e9a6a4f59d",
            "https://www.cve.org/CVERecord?id=CVE-2025-38350\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38350\nhttps://lore.kernel.org/linux-cve-announce/2025071933-CVE-2025-38350-262a@gregkh/T"
        ]
    },
    "CVE-2025-38352": {
        "cve": "CVE-2025-38352",
        "cvss_v2": null,
        "cvss_v3": 7.4,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nposix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()\n\nIf an exiting non-autoreaping task has already passed exit_notify() and\ncalls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent\nor debugger right after unlock_task_sighand().\n\nIf a concurrent posix_cpu_timer_del() runs at that moment, it won't be\nable to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or\nlock_task_sighand() will fail.\n\nAdd the tsk->exit_state check into run_posix_cpu_timers() to fix this.\n\nThis fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because\nexit_task_work() is called before exit_notify(). But the check still\nmakes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail\nanyway in this case.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38352",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/78a4b8e3795b31dae58762bc091bb0f4f74a2200",
            "patch_url": "https://git.kernel.org/stable/p/78a4b8e3795b31dae58762bc091bb0f4f74a2200",
            "filename": "CVE-2025-38352-78a4b8e3795b31dae58762bc091bb0f4f74a2200.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38352/CVE-2025-38352-78a4b8e3795b31dae58762bc091bb0f4f74a2200.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2c72fe18cc5f9f1750f5bc148cf1c94c29e106ff",
                "patch_url": "https://git.kernel.org/stable/p/2c72fe18cc5f9f1750f5bc148cf1c94c29e106ff",
                "filename": "CVE-2025-38352-2c72fe18cc5f9f1750f5bc148cf1c94c29e106ff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38352/CVE-2025-38352-2c72fe18cc5f9f1750f5bc148cf1c94c29e106ff.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f3daa04a9328220de46f0d5c919a6c0073a9f0b",
                "patch_url": "https://git.kernel.org/stable/p/2f3daa04a9328220de46f0d5c919a6c0073a9f0b",
                "filename": "CVE-2025-38352-2f3daa04a9328220de46f0d5c919a6c0073a9f0b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38352/CVE-2025-38352-2f3daa04a9328220de46f0d5c919a6c0073a9f0b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/460188bc042a3f40f72d34b9f7fc6ee66b0b757b",
                "patch_url": "https://git.kernel.org/stable/p/460188bc042a3f40f72d34b9f7fc6ee66b0b757b",
                "filename": "CVE-2025-38352-460188bc042a3f40f72d34b9f7fc6ee66b0b757b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38352/CVE-2025-38352-460188bc042a3f40f72d34b9f7fc6ee66b0b757b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/764a7a5dfda23f69919441f2eac2a83e7db6e5bb",
                "patch_url": "https://git.kernel.org/stable/p/764a7a5dfda23f69919441f2eac2a83e7db6e5bb",
                "filename": "CVE-2025-38352-764a7a5dfda23f69919441f2eac2a83e7db6e5bb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38352/CVE-2025-38352-764a7a5dfda23f69919441f2eac2a83e7db6e5bb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/78a4b8e3795b31dae58762bc091bb0f4f74a2200",
                "patch_url": "https://git.kernel.org/stable/p/78a4b8e3795b31dae58762bc091bb0f4f74a2200",
                "filename": "CVE-2025-38352-78a4b8e3795b31dae58762bc091bb0f4f74a2200.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38352/CVE-2025-38352-78a4b8e3795b31dae58762bc091bb0f4f74a2200.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c076635b3a42771ace7d276de8dc3bc76ee2ba1b",
                "patch_url": "https://git.kernel.org/stable/p/c076635b3a42771ace7d276de8dc3bc76ee2ba1b",
                "filename": "CVE-2025-38352-c076635b3a42771ace7d276de8dc3bc76ee2ba1b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38352/CVE-2025-38352-c076635b3a42771ace7d276de8dc3bc76ee2ba1b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c29d5318708e67ac13c1b6fc1007d179fb65b4d7",
                "patch_url": "https://git.kernel.org/stable/p/c29d5318708e67ac13c1b6fc1007d179fb65b4d7",
                "filename": "CVE-2025-38352-c29d5318708e67ac13c1b6fc1007d179fb65b4d7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38352/CVE-2025-38352-c29d5318708e67ac13c1b6fc1007d179fb65b4d7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f90fff1e152dedf52b932240ebbd670d83330eca",
                "patch_url": "https://git.kernel.org/stable/p/f90fff1e152dedf52b932240ebbd670d83330eca",
                "filename": "CVE-2025-38352-f90fff1e152dedf52b932240ebbd670d83330eca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38352/CVE-2025-38352-f90fff1e152dedf52b932240ebbd670d83330eca.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2c72fe18cc5f9f1750f5bc148cf1c94c29e106ff",
            "https://git.kernel.org/stable/c/2f3daa04a9328220de46f0d5c919a6c0073a9f0b",
            "https://git.kernel.org/stable/c/460188bc042a3f40f72d34b9f7fc6ee66b0b757b",
            "https://git.kernel.org/stable/c/764a7a5dfda23f69919441f2eac2a83e7db6e5bb",
            "https://git.kernel.org/stable/c/78a4b8e3795b31dae58762bc091bb0f4f74a2200",
            "https://git.kernel.org/stable/c/c076635b3a42771ace7d276de8dc3bc76ee2ba1b",
            "https://git.kernel.org/stable/c/c29d5318708e67ac13c1b6fc1007d179fb65b4d7",
            "https://git.kernel.org/stable/c/f90fff1e152dedf52b932240ebbd670d83330eca",
            "https://www.cve.org/CVERecord?id=CVE-2025-38352\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38352\nhttps://lore.kernel.org/linux-cve-announce/2025072229-CVE-2025-38352-f1de@gregkh/T\nhttps://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        ]
    },
    "CVE-2025-38380": {
        "cve": "CVE-2025-38380",
        "cvss_v2": null,
        "cvss_v3": "0.0",
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38380",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/475f89e1f9bde45fc948589e7cde1f5d899ae412",
            "patch_url": "https://git.kernel.org/stable/p/475f89e1f9bde45fc948589e7cde1f5d899ae412",
            "filename": "CVE-2025-38380-475f89e1f9bde45fc948589e7cde1f5d899ae412.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38380/CVE-2025-38380-475f89e1f9bde45fc948589e7cde1f5d899ae412.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3d30048958e0d43425f6d4e76565e6249fa71050",
                "patch_url": "https://git.kernel.org/stable/p/3d30048958e0d43425f6d4e76565e6249fa71050",
                "filename": "CVE-2025-38380-3d30048958e0d43425f6d4e76565e6249fa71050.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38380/CVE-2025-38380-3d30048958e0d43425f6d4e76565e6249fa71050.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/475f89e1f9bde45fc948589e7cde1f5d899ae412",
                "patch_url": "https://git.kernel.org/stable/p/475f89e1f9bde45fc948589e7cde1f5d899ae412",
                "filename": "CVE-2025-38380-475f89e1f9bde45fc948589e7cde1f5d899ae412.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38380/CVE-2025-38380-475f89e1f9bde45fc948589e7cde1f5d899ae412.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4c37963d67fb945a59faf53bebe048ca201e44df",
                "patch_url": "https://git.kernel.org/stable/p/4c37963d67fb945a59faf53bebe048ca201e44df",
                "filename": "CVE-2025-38380-4c37963d67fb945a59faf53bebe048ca201e44df.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38380/CVE-2025-38380-4c37963d67fb945a59faf53bebe048ca201e44df.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5b622e672e49e50c33fc64cd06b05ce76e1de460",
                "patch_url": "https://git.kernel.org/stable/p/5b622e672e49e50c33fc64cd06b05ce76e1de460",
                "filename": "CVE-2025-38380-5b622e672e49e50c33fc64cd06b05ce76e1de460.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38380/CVE-2025-38380-5b622e672e49e50c33fc64cd06b05ce76e1de460.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6358cb9c2a31e23b6b51bfcd7fe2b7becaf6b149",
                "patch_url": "https://git.kernel.org/stable/p/6358cb9c2a31e23b6b51bfcd7fe2b7becaf6b149",
                "filename": "CVE-2025-38380-6358cb9c2a31e23b6b51bfcd7fe2b7becaf6b149.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38380/CVE-2025-38380-6358cb9c2a31e23b6b51bfcd7fe2b7becaf6b149.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9b5b600e751fae92ba571b015eaf02c9c58e2083",
                "patch_url": "https://git.kernel.org/stable/p/9b5b600e751fae92ba571b015eaf02c9c58e2083",
                "filename": "CVE-2025-38380-9b5b600e751fae92ba571b015eaf02c9c58e2083.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38380/CVE-2025-38380-9b5b600e751fae92ba571b015eaf02c9c58e2083.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3d30048958e0d43425f6d4e76565e6249fa71050",
            "https://git.kernel.org/stable/c/475f89e1f9bde45fc948589e7cde1f5d899ae412",
            "https://git.kernel.org/stable/c/4c37963d67fb945a59faf53bebe048ca201e44df",
            "https://git.kernel.org/stable/c/5b622e672e49e50c33fc64cd06b05ce76e1de460",
            "https://git.kernel.org/stable/c/6358cb9c2a31e23b6b51bfcd7fe2b7becaf6b149",
            "https://git.kernel.org/stable/c/9b5b600e751fae92ba571b015eaf02c9c58e2083",
            "https://www.cve.org/CVERecord?id=CVE-2025-38380\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38380\nhttps://lore.kernel.org/linux-cve-announce/2025072505-CVE-2025-38380-d1a9@gregkh/T"
        ]
    },
    "CVE-2025-38392": {
        "cve": "CVE-2025-38392",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: convert control queue mutex to a spinlock\n\nWith VIRTCHNL2_CAP_MACFILTER enabled, the following warning is generated\non module load:\n\n[  324.701677] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:578\n[  324.701684] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1582, name: NetworkManager\n[  324.701689] preempt_count: 201, expected: 0\n[  324.701693] RCU nest depth: 0, expected: 0\n[  324.701697] 2 locks held by NetworkManager/1582:\n[  324.701702]  #0: ffffffff9f7be770 (rtnl_mutex){....}-{3:3}, at: rtnl_newlink+0x791/0x21e0\n[  324.701730]  #1: ff1100216c380368 (_xmit_ETHER){....}-{2:2}, at: __dev_open+0x3f0/0x870\n[  324.701749] Preemption disabled at:\n[  324.701752] [<ffffffff9cd23b9d>] __dev_open+0x3dd/0x870\n[  324.701765] CPU: 30 UID: 0 PID: 1582 Comm: NetworkManager Not tainted 6.15.0-rc5+ #2 PREEMPT(voluntary)\n[  324.701771] Hardware name: Intel Corporation M50FCP2SBSTD/M50FCP2SBSTD, BIOS SE5C741.86B.01.01.0001.2211140926 11/14/2022\n[  324.701774] Call Trace:\n[  324.701777]  <TASK>\n[  324.701779]  dump_stack_lvl+0x5d/0x80\n[  324.701788]  ? __dev_open+0x3dd/0x870\n[  324.701793]  __might_resched.cold+0x1ef/0x23d\n<..>\n[  324.701818]  __mutex_lock+0x113/0x1b80\n<..>\n[  324.701917]  idpf_ctlq_clean_sq+0xad/0x4b0 [idpf]\n[  324.701935]  ? kasan_save_track+0x14/0x30\n[  324.701941]  idpf_mb_clean+0x143/0x380 [idpf]\n<..>\n[  324.701991]  idpf_send_mb_msg+0x111/0x720 [idpf]\n[  324.702009]  idpf_vc_xn_exec+0x4cc/0x990 [idpf]\n[  324.702021]  ? rcu_is_watching+0x12/0xc0\n[  324.702035]  idpf_add_del_mac_filters+0x3ed/0xb50 [idpf]\n<..>\n[  324.702122]  __hw_addr_sync_dev+0x1cf/0x300\n[  324.702126]  ? find_held_lock+0x32/0x90\n[  324.702134]  idpf_set_rx_mode+0x317/0x390 [idpf]\n[  324.702152]  __dev_open+0x3f8/0x870\n[  324.702159]  ? __pfx___dev_open+0x10/0x10\n[  324.702174]  __dev_change_flags+0x443/0x650\n<..>\n[  324.702208]  netif_change_flags+0x80/0x160\n[  324.702218]  do_setlink.isra.0+0x16a0/0x3960\n<..>\n[  324.702349]  rtnl_newlink+0x12fd/0x21e0\n\nThe sequence is as follows:\n\trtnl_newlink()->\n\t__dev_change_flags()->\n\t__dev_open()->\n\tdev_set_rx_mode() - >  # disables BH and grabs \"dev->addr_list_lock\"\n\tidpf_set_rx_mode() ->  # proceed only if VIRTCHNL2_CAP_MACFILTER is ON\n\t__dev_uc_sync() ->\n\tidpf_add_mac_filter ->\n\tidpf_add_del_mac_filters ->\n\tidpf_send_mb_msg() ->\n\tidpf_mb_clean() ->\n\tidpf_ctlq_clean_sq()   # mutex_lock(cq_lock)\n\nFix by converting cq_lock to a spinlock. All operations under the new\nlock are safe except freeing the DMA memory, which may use vunmap(). Fix\nby requesting a contiguous physical memory for the DMA mapping.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38392",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9a36715cd6bc6a6f16230e19a7f947bab34b3fe5",
            "patch_url": "https://git.kernel.org/stable/p/9a36715cd6bc6a6f16230e19a7f947bab34b3fe5",
            "filename": "CVE-2025-38392-9a36715cd6bc6a6f16230e19a7f947bab34b3fe5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38392/CVE-2025-38392-9a36715cd6bc6a6f16230e19a7f947bab34b3fe5.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/9a36715cd6bc6a6f16230e19a7f947bab34b3fe5",
                "patch_url": "https://git.kernel.org/stable/p/9a36715cd6bc6a6f16230e19a7f947bab34b3fe5",
                "filename": "CVE-2025-38392-9a36715cd6bc6a6f16230e19a7f947bab34b3fe5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38392/CVE-2025-38392-9a36715cd6bc6a6f16230e19a7f947bab34b3fe5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b2beb5bb2cd90d7939e470ed4da468683f41baa3",
                "patch_url": "https://git.kernel.org/stable/p/b2beb5bb2cd90d7939e470ed4da468683f41baa3",
                "filename": "CVE-2025-38392-b2beb5bb2cd90d7939e470ed4da468683f41baa3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38392/CVE-2025-38392-b2beb5bb2cd90d7939e470ed4da468683f41baa3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dc6c3c2c9dfdaa3a3357f59a80a2904677a71a9a",
                "patch_url": "https://git.kernel.org/stable/p/dc6c3c2c9dfdaa3a3357f59a80a2904677a71a9a",
                "filename": "CVE-2025-38392-dc6c3c2c9dfdaa3a3357f59a80a2904677a71a9a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38392/CVE-2025-38392-dc6c3c2c9dfdaa3a3357f59a80a2904677a71a9a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/9a36715cd6bc6a6f16230e19a7f947bab34b3fe5",
            "https://git.kernel.org/stable/c/b2beb5bb2cd90d7939e470ed4da468683f41baa3",
            "https://git.kernel.org/stable/c/dc6c3c2c9dfdaa3a3357f59a80a2904677a71a9a",
            "https://www.cve.org/CVERecord?id=CVE-2025-38392\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38392\nhttps://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38392-17a6@gregkh/T"
        ]
    },
    "CVE-2025-38403": {
        "cve": "CVE-2025-38403",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/vmci: Clear the vmci transport packet properly when initializing it\n\nIn vmci_transport_packet_init memset the vmci_transport_packet before\npopulating the fields to avoid any uninitialised data being left in the\nstructure.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38403",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0a01021317375b8d1895152f544421ce49299eb1",
            "patch_url": "https://git.kernel.org/stable/p/0a01021317375b8d1895152f544421ce49299eb1",
            "filename": "CVE-2025-38403-0a01021317375b8d1895152f544421ce49299eb1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38403/CVE-2025-38403-0a01021317375b8d1895152f544421ce49299eb1.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0a01021317375b8d1895152f544421ce49299eb1",
                "patch_url": "https://git.kernel.org/stable/p/0a01021317375b8d1895152f544421ce49299eb1",
                "filename": "CVE-2025-38403-0a01021317375b8d1895152f544421ce49299eb1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38403/CVE-2025-38403-0a01021317375b8d1895152f544421ce49299eb1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/19c2cc01ff9a8031398a802676ffb0f4692dd95d",
                "patch_url": "https://git.kernel.org/stable/p/19c2cc01ff9a8031398a802676ffb0f4692dd95d",
                "filename": "CVE-2025-38403-19c2cc01ff9a8031398a802676ffb0f4692dd95d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38403/CVE-2025-38403-19c2cc01ff9a8031398a802676ffb0f4692dd95d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1c1bcb0e78230f533b4103e8cf271d17c3f469f0",
                "patch_url": "https://git.kernel.org/stable/p/1c1bcb0e78230f533b4103e8cf271d17c3f469f0",
                "filename": "CVE-2025-38403-1c1bcb0e78230f533b4103e8cf271d17c3f469f0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38403/CVE-2025-38403-1c1bcb0e78230f533b4103e8cf271d17c3f469f0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/223e2288f4b8c262a864e2c03964ffac91744cd5",
                "patch_url": "https://git.kernel.org/stable/p/223e2288f4b8c262a864e2c03964ffac91744cd5",
                "filename": "CVE-2025-38403-223e2288f4b8c262a864e2c03964ffac91744cd5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38403/CVE-2025-38403-223e2288f4b8c262a864e2c03964ffac91744cd5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2d44723a091bc853272e1a51a488a3d22b80be5e",
                "patch_url": "https://git.kernel.org/stable/p/2d44723a091bc853272e1a51a488a3d22b80be5e",
                "filename": "CVE-2025-38403-2d44723a091bc853272e1a51a488a3d22b80be5e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38403/CVE-2025-38403-2d44723a091bc853272e1a51a488a3d22b80be5e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/75705b44e0b9aaa74f4c163d93d388bcba9e386a",
                "patch_url": "https://git.kernel.org/stable/p/75705b44e0b9aaa74f4c163d93d388bcba9e386a",
                "filename": "CVE-2025-38403-75705b44e0b9aaa74f4c163d93d388bcba9e386a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38403/CVE-2025-38403-75705b44e0b9aaa74f4c163d93d388bcba9e386a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/94d0c326cb3ee6b0f8bd00e209550b93fcc5c839",
                "patch_url": "https://git.kernel.org/stable/p/94d0c326cb3ee6b0f8bd00e209550b93fcc5c839",
                "filename": "CVE-2025-38403-94d0c326cb3ee6b0f8bd00e209550b93fcc5c839.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38403/CVE-2025-38403-94d0c326cb3ee6b0f8bd00e209550b93fcc5c839.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e9a673153d578fd439919a24e99851b2f87ecbce",
                "patch_url": "https://git.kernel.org/stable/p/e9a673153d578fd439919a24e99851b2f87ecbce",
                "filename": "CVE-2025-38403-e9a673153d578fd439919a24e99851b2f87ecbce.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38403/CVE-2025-38403-e9a673153d578fd439919a24e99851b2f87ecbce.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0a01021317375b8d1895152f544421ce49299eb1",
            "https://git.kernel.org/stable/c/19c2cc01ff9a8031398a802676ffb0f4692dd95d",
            "https://git.kernel.org/stable/c/1c1bcb0e78230f533b4103e8cf271d17c3f469f0",
            "https://git.kernel.org/stable/c/223e2288f4b8c262a864e2c03964ffac91744cd5",
            "https://git.kernel.org/stable/c/2d44723a091bc853272e1a51a488a3d22b80be5e",
            "https://git.kernel.org/stable/c/75705b44e0b9aaa74f4c163d93d388bcba9e386a",
            "https://git.kernel.org/stable/c/94d0c326cb3ee6b0f8bd00e209550b93fcc5c839",
            "https://git.kernel.org/stable/c/e9a673153d578fd439919a24e99851b2f87ecbce",
            "https://www.cve.org/CVERecord?id=CVE-2025-38403\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38403\nhttps://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38403-0da0@gregkh/T"
        ]
    },
    "CVE-2025-38415": {
        "cve": "CVE-2025-38415",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: check return result of sb_min_blocksize\n\nSyzkaller reports an \"UBSAN: shift-out-of-bounds in squashfs_bio_read\" bug.\n\nSyzkaller forks multiple processes which after mounting the Squashfs\nfilesystem, issues an ioctl(\"/dev/loop0\", LOOP_SET_BLOCK_SIZE, 0x8000). \nNow if this ioctl occurs at the same time another process is in the\nprocess of mounting a Squashfs filesystem on /dev/loop0, the failure\noccurs.  When this happens the following code in squashfs_fill_super()\nfails.\n\n----\nmsblk->devblksize = sb_min_blocksize(sb, SQUASHFS_DEVBLK_SIZE);\nmsblk->devblksize_log2 = ffz(~msblk->devblksize);\n----\n\nsb_min_blocksize() returns 0, which means msblk->devblksize is set to 0.\n\nAs a result, ffz(~msblk->devblksize) returns 64, and msblk->devblksize_log2\nis set to 64.\n\nThis subsequently causes the\n\nUBSAN: shift-out-of-bounds in fs/squashfs/block.c:195:36\nshift exponent 64 is too large for 64-bit type 'u64' (aka\n'unsigned long long')\n\nThis commit adds a check for a 0 return by sb_min_blocksize().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38415",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/549f9e3d7b60d53808c98b9fde49b4f46d0524a5",
            "patch_url": "https://git.kernel.org/stable/p/549f9e3d7b60d53808c98b9fde49b4f46d0524a5",
            "filename": "CVE-2025-38415-549f9e3d7b60d53808c98b9fde49b4f46d0524a5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38415/CVE-2025-38415-549f9e3d7b60d53808c98b9fde49b4f46d0524a5.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0aff95d9bc7fb5400ca8af507429c4b067bdb425",
                "patch_url": "https://git.kernel.org/stable/p/0aff95d9bc7fb5400ca8af507429c4b067bdb425",
                "filename": "CVE-2025-38415-0aff95d9bc7fb5400ca8af507429c4b067bdb425.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38415/CVE-2025-38415-0aff95d9bc7fb5400ca8af507429c4b067bdb425.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/295ab18c2dbce8d0ac6ecf7c5187e16e1ac8b282",
                "patch_url": "https://git.kernel.org/stable/p/295ab18c2dbce8d0ac6ecf7c5187e16e1ac8b282",
                "filename": "CVE-2025-38415-295ab18c2dbce8d0ac6ecf7c5187e16e1ac8b282.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38415/CVE-2025-38415-295ab18c2dbce8d0ac6ecf7c5187e16e1ac8b282.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f99357dadbf9c979ad737156ad4c37fadf7c56b",
                "patch_url": "https://git.kernel.org/stable/p/4f99357dadbf9c979ad737156ad4c37fadf7c56b",
                "filename": "CVE-2025-38415-4f99357dadbf9c979ad737156ad4c37fadf7c56b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38415/CVE-2025-38415-4f99357dadbf9c979ad737156ad4c37fadf7c56b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/549f9e3d7b60d53808c98b9fde49b4f46d0524a5",
                "patch_url": "https://git.kernel.org/stable/p/549f9e3d7b60d53808c98b9fde49b4f46d0524a5",
                "filename": "CVE-2025-38415-549f9e3d7b60d53808c98b9fde49b4f46d0524a5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38415/CVE-2025-38415-549f9e3d7b60d53808c98b9fde49b4f46d0524a5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5c51aa862cbeed2f3887f0382a2708956710bd68",
                "patch_url": "https://git.kernel.org/stable/p/5c51aa862cbeed2f3887f0382a2708956710bd68",
                "filename": "CVE-2025-38415-5c51aa862cbeed2f3887f0382a2708956710bd68.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38415/CVE-2025-38415-5c51aa862cbeed2f3887f0382a2708956710bd68.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6abf6b78c6fb112eee495f5636ffcc350dd2ce25",
                "patch_url": "https://git.kernel.org/stable/p/6abf6b78c6fb112eee495f5636ffcc350dd2ce25",
                "filename": "CVE-2025-38415-6abf6b78c6fb112eee495f5636ffcc350dd2ce25.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38415/CVE-2025-38415-6abf6b78c6fb112eee495f5636ffcc350dd2ce25.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/734aa85390ea693bb7eaf2240623d41b03705c84",
                "patch_url": "https://git.kernel.org/stable/p/734aa85390ea693bb7eaf2240623d41b03705c84",
                "filename": "CVE-2025-38415-734aa85390ea693bb7eaf2240623d41b03705c84.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38415/CVE-2025-38415-734aa85390ea693bb7eaf2240623d41b03705c84.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/db7096ea160e40d78c67fce52e7cc51bde049497",
                "patch_url": "https://git.kernel.org/stable/p/db7096ea160e40d78c67fce52e7cc51bde049497",
                "filename": "CVE-2025-38415-db7096ea160e40d78c67fce52e7cc51bde049497.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38415/CVE-2025-38415-db7096ea160e40d78c67fce52e7cc51bde049497.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0aff95d9bc7fb5400ca8af507429c4b067bdb425",
            "https://git.kernel.org/stable/c/295ab18c2dbce8d0ac6ecf7c5187e16e1ac8b282",
            "https://git.kernel.org/stable/c/4f99357dadbf9c979ad737156ad4c37fadf7c56b",
            "https://git.kernel.org/stable/c/549f9e3d7b60d53808c98b9fde49b4f46d0524a5",
            "https://git.kernel.org/stable/c/5c51aa862cbeed2f3887f0382a2708956710bd68",
            "https://git.kernel.org/stable/c/6abf6b78c6fb112eee495f5636ffcc350dd2ce25",
            "https://git.kernel.org/stable/c/734aa85390ea693bb7eaf2240623d41b03705c84",
            "https://git.kernel.org/stable/c/db7096ea160e40d78c67fce52e7cc51bde049497",
            "https://www.cve.org/CVERecord?id=CVE-2025-38415\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38415\nhttps://lore.kernel.org/linux-cve-announce/2025072513-CVE-2025-38415-c634@gregkh/T"
        ]
    },
    "CVE-2025-38449": {
        "cve": "CVE-2025-38449",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/gem: Acquire references on GEM handles for framebuffers\n\nA GEM handle can be released while the GEM buffer object is attached\nto a DRM framebuffer. This leads to the release of the dma-buf backing\nthe buffer object, if any. [1] Trying to use the framebuffer in further\nmode-setting operations leads to a segmentation fault. Most easily\nhappens with driver that use shadow planes for vmap-ing the dma-buf\nduring a page flip. An example is shown below.\n\n[  156.791968] ------------[ cut here ]------------\n[  156.796830] WARNING: CPU: 2 PID: 2255 at drivers/dma-buf/dma-buf.c:1527 dma_buf_vmap+0x224/0x430\n[...]\n[  156.942028] RIP: 0010:dma_buf_vmap+0x224/0x430\n[  157.043420] Call Trace:\n[  157.045898]  <TASK>\n[  157.048030]  ? show_trace_log_lvl+0x1af/0x2c0\n[  157.052436]  ? show_trace_log_lvl+0x1af/0x2c0\n[  157.056836]  ? show_trace_log_lvl+0x1af/0x2c0\n[  157.061253]  ? drm_gem_shmem_vmap+0x74/0x710\n[  157.065567]  ? dma_buf_vmap+0x224/0x430\n[  157.069446]  ? __warn.cold+0x58/0xe4\n[  157.073061]  ? dma_buf_vmap+0x224/0x430\n[  157.077111]  ? report_bug+0x1dd/0x390\n[  157.080842]  ? handle_bug+0x5e/0xa0\n[  157.084389]  ? exc_invalid_op+0x14/0x50\n[  157.088291]  ? asm_exc_invalid_op+0x16/0x20\n[  157.092548]  ? dma_buf_vmap+0x224/0x430\n[  157.096663]  ? dma_resv_get_singleton+0x6d/0x230\n[  157.101341]  ? __pfx_dma_buf_vmap+0x10/0x10\n[  157.105588]  ? __pfx_dma_resv_get_singleton+0x10/0x10\n[  157.110697]  drm_gem_shmem_vmap+0x74/0x710\n[  157.114866]  drm_gem_vmap+0xa9/0x1b0\n[  157.118763]  drm_gem_vmap_unlocked+0x46/0xa0\n[  157.123086]  drm_gem_fb_vmap+0xab/0x300\n[  157.126979]  drm_atomic_helper_prepare_planes.part.0+0x487/0xb10\n[  157.133032]  ? lockdep_init_map_type+0x19d/0x880\n[  157.137701]  drm_atomic_helper_commit+0x13d/0x2e0\n[  157.142671]  ? drm_atomic_nonblocking_commit+0xa0/0x180\n[  157.147988]  drm_mode_atomic_ioctl+0x766/0xe40\n[...]\n[  157.346424] ---[ end trace 0000000000000000 ]---\n\nAcquiring GEM handles for the framebuffer's GEM buffer objects prevents\nthis from happening. The framebuffer's cleanup later puts the handle\nreferences.\n\nCommit 1a148af06000 (\"drm/gem-shmem: Use dma_buf from GEM object\ninstance\") triggers the segmentation fault easily by using the dma-buf\nfield more widely. The underlying issue with reference counting has\nbeen present before.\n\nv2:\n- acquire the handle instead of the BO (Christian)\n- fix comment style (Christian)\n- drop the Fixes tag (Christian)\n- rename err_ gotos\n- add missing Link tag",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38449",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/cb4c956a15f8b7f870649454771fc3761f504b5f",
            "patch_url": "https://git.kernel.org/stable/p/cb4c956a15f8b7f870649454771fc3761f504b5f",
            "filename": "CVE-2025-38449-cb4c956a15f8b7f870649454771fc3761f504b5f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38449/CVE-2025-38449-cb4c956a15f8b7f870649454771fc3761f504b5f.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/08480e285c6a82ce689008d643e4a51db0aaef8b",
                "patch_url": "https://git.kernel.org/stable/p/08480e285c6a82ce689008d643e4a51db0aaef8b",
                "filename": "CVE-2025-38449-08480e285c6a82ce689008d643e4a51db0aaef8b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38449/CVE-2025-38449-08480e285c6a82ce689008d643e4a51db0aaef8b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3cf520d9860d4ec9f7f32068825da31f18dd3f25",
                "patch_url": "https://git.kernel.org/stable/p/3cf520d9860d4ec9f7f32068825da31f18dd3f25",
                "filename": "CVE-2025-38449-3cf520d9860d4ec9f7f32068825da31f18dd3f25.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38449/CVE-2025-38449-3cf520d9860d4ec9f7f32068825da31f18dd3f25.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5307dce878d4126e1b375587318955bd019c3741",
                "patch_url": "https://git.kernel.org/stable/p/5307dce878d4126e1b375587318955bd019c3741",
                "filename": "CVE-2025-38449-5307dce878d4126e1b375587318955bd019c3741.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38449/CVE-2025-38449-5307dce878d4126e1b375587318955bd019c3741.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cb4c956a15f8b7f870649454771fc3761f504b5f",
                "patch_url": "https://git.kernel.org/stable/p/cb4c956a15f8b7f870649454771fc3761f504b5f",
                "filename": "CVE-2025-38449-cb4c956a15f8b7f870649454771fc3761f504b5f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38449/CVE-2025-38449-cb4c956a15f8b7f870649454771fc3761f504b5f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/08480e285c6a82ce689008d643e4a51db0aaef8b",
            "https://git.kernel.org/stable/c/3cf520d9860d4ec9f7f32068825da31f18dd3f25",
            "https://git.kernel.org/stable/c/5307dce878d4126e1b375587318955bd019c3741",
            "https://git.kernel.org/stable/c/cb4c956a15f8b7f870649454771fc3761f504b5f",
            "https://www.cve.org/CVERecord?id=CVE-2025-38449\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38449\nhttps://lore.kernel.org/linux-cve-announce/2025072504-CVE-2025-38449-cbf0@gregkh/T"
        ]
    },
    "CVE-2025-38459": {
        "cve": "CVE-2025-38459",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: clip: Fix infinite recursive call of clip_push().\n\nsyzbot reported the splat below. [0]\n\nThis happens if we call ioctl(ATMARP_MKIP) more than once.\n\nDuring the first call, clip_mkip() sets clip_push() to vcc->push(),\nand the second call copies it to clip_vcc->old_push().\n\nLater, when the socket is close()d, vcc_destroy_socket() passes\nNULL skb to clip_push(), which calls clip_vcc->old_push(),\ntriggering the infinite recursion.\n\nLet's prevent the second ioctl(ATMARP_MKIP) by checking\nvcc->user_back, which is allocated by the first call as clip_vcc.\n\nNote also that we use lock_sock() to prevent racy calls.\n\n[0]:\nBUG: TASK stack guard page was hit at ffffc9000d66fff8 (stack is ffffc9000d670000..ffffc9000d678000)\nOops: stack guard page: 0000 [#1] SMP KASAN NOPTI\nCPU: 0 UID: 0 PID: 5322 Comm: syz.0.0 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT(full)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nRIP: 0010:clip_push+0x5/0x720 net/atm/clip.c:191\nCode: e0 8f aa 8c e8 1c ad 5b fa eb ae 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 <41> 57 41 56 41 55 41 54 53 48 83 ec 20 48 89 f3 49 89 fd 48 bd 00\nRSP: 0018:ffffc9000d670000 EFLAGS: 00010246\nRAX: 1ffff1100235a4a5 RBX: ffff888011ad2508 RCX: ffff8880003c0000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888037f01000\nRBP: dffffc0000000000 R08: ffffffff8fa104f7 R09: 1ffffffff1f4209e\nR10: dffffc0000000000 R11: ffffffff8a99b300 R12: ffffffff8a99b300\nR13: ffff888037f01000 R14: ffff888011ad2500 R15: ffff888037f01578\nFS:  000055557ab6d500(0000) GS:ffff88808d250000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000d66fff8 CR3: 0000000043172000 CR4: 0000000000352ef0\nCall Trace:\n <TASK>\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n...\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n vcc_destroy_socket net/atm/common.c:183 [inline]\n vcc_release+0x157/0x460 net/atm/common.c:205\n __sock_release net/socket.c:647 [inline]\n sock_close+0xc0/0x240 net/socket.c:1391\n __fput+0x449/0xa70 fs/file_table.c:465\n task_work_run+0x1d1/0x260 kernel/task_work.c:227\n resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]\n exit_to_user_mode_loop+0xec/0x110 kernel/entry/common.c:114\n exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline]\n syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline]\n syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline]\n do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7ff31c98e929\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fffb5aa1f78 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4\nRAX: 0000000000000000 RBX: 0000000000012747 RCX: 00007ff31c98e929\nRDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003\nRBP: 00007ff31cbb7ba0 R08: 0000000000000001 R09: 0000000db5aa226f\nR10: 00007ff31c7ff030 R11: 0000000000000246 R12: 00007ff31cbb608c\nR13: 00007ff31cbb6080 R14: ffffffffffffffff R15: 00007fffb5aa2090\n </TASK>\nModules linked in:",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38459",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/024876b247a882972095b22087734dcd23396a4e",
            "patch_url": "https://git.kernel.org/stable/p/024876b247a882972095b22087734dcd23396a4e",
            "filename": "CVE-2025-38459-024876b247a882972095b22087734dcd23396a4e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38459/CVE-2025-38459-024876b247a882972095b22087734dcd23396a4e.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/024876b247a882972095b22087734dcd23396a4e",
                "patch_url": "https://git.kernel.org/stable/p/024876b247a882972095b22087734dcd23396a4e",
                "filename": "CVE-2025-38459-024876b247a882972095b22087734dcd23396a4e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38459/CVE-2025-38459-024876b247a882972095b22087734dcd23396a4e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/125166347d5676466d368aadc0bbc31ee7714352",
                "patch_url": "https://git.kernel.org/stable/p/125166347d5676466d368aadc0bbc31ee7714352",
                "filename": "CVE-2025-38459-125166347d5676466d368aadc0bbc31ee7714352.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38459/CVE-2025-38459-125166347d5676466d368aadc0bbc31ee7714352.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1579a2777cb914a249de22c789ba4d41b154509f",
                "patch_url": "https://git.kernel.org/stable/p/1579a2777cb914a249de22c789ba4d41b154509f",
                "filename": "CVE-2025-38459-1579a2777cb914a249de22c789ba4d41b154509f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38459/CVE-2025-38459-1579a2777cb914a249de22c789ba4d41b154509f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31",
                "patch_url": "https://git.kernel.org/stable/p/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31",
                "filename": "CVE-2025-38459-3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38459/CVE-2025-38459-3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5641019dfbaee5e85fe093b590f0451c9dd4d6f8",
                "patch_url": "https://git.kernel.org/stable/p/5641019dfbaee5e85fe093b590f0451c9dd4d6f8",
                "filename": "CVE-2025-38459-5641019dfbaee5e85fe093b590f0451c9dd4d6f8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38459/CVE-2025-38459-5641019dfbaee5e85fe093b590f0451c9dd4d6f8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c489f3283dbfc0f3c00c312149cae90d27552c45",
                "patch_url": "https://git.kernel.org/stable/p/c489f3283dbfc0f3c00c312149cae90d27552c45",
                "filename": "CVE-2025-38459-c489f3283dbfc0f3c00c312149cae90d27552c45.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38459/CVE-2025-38459-c489f3283dbfc0f3c00c312149cae90d27552c45.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/df0312d8859763aa15b8b56ac151a1ea4a4e5b88",
                "patch_url": "https://git.kernel.org/stable/p/df0312d8859763aa15b8b56ac151a1ea4a4e5b88",
                "filename": "CVE-2025-38459-df0312d8859763aa15b8b56ac151a1ea4a4e5b88.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38459/CVE-2025-38459-df0312d8859763aa15b8b56ac151a1ea4a4e5b88.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f493f31a63847624fd3199ac836a8bd8828e50e2",
                "patch_url": "https://git.kernel.org/stable/p/f493f31a63847624fd3199ac836a8bd8828e50e2",
                "filename": "CVE-2025-38459-f493f31a63847624fd3199ac836a8bd8828e50e2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38459/CVE-2025-38459-f493f31a63847624fd3199ac836a8bd8828e50e2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/024876b247a882972095b22087734dcd23396a4e",
            "https://git.kernel.org/stable/c/125166347d5676466d368aadc0bbc31ee7714352",
            "https://git.kernel.org/stable/c/1579a2777cb914a249de22c789ba4d41b154509f",
            "https://git.kernel.org/stable/c/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31",
            "https://git.kernel.org/stable/c/5641019dfbaee5e85fe093b590f0451c9dd4d6f8",
            "https://git.kernel.org/stable/c/c489f3283dbfc0f3c00c312149cae90d27552c45",
            "https://git.kernel.org/stable/c/df0312d8859763aa15b8b56ac151a1ea4a4e5b88",
            "https://git.kernel.org/stable/c/f493f31a63847624fd3199ac836a8bd8828e50e2",
            "https://www.cve.org/CVERecord?id=CVE-2025-38459\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38459\nhttps://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38459-e941@gregkh/T"
        ]
    },
    "CVE-2025-38461": {
        "cve": "CVE-2025-38461",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Fix transport_* TOCTOU\n\nTransport assignment may race with module unload. Protect new_transport\nfrom becoming a stale pointer.\n\nThis also takes care of an insecure call in vsock_use_local_transport();\nadd a lockdep assert.\n\nBUG: unable to handle page fault for address: fffffbfff8056000\nOops: Oops: 0000 [#1] SMP KASAN\nRIP: 0010:vsock_assign_transport+0x366/0x600\nCall Trace:\n vsock_connect+0x59c/0xc40\n __sys_connect+0xe8/0x100\n __x64_sys_connect+0x6e/0xc0\n do_syscall_64+0x92/0x1c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38461",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/8667e8d0eb46bc54fdae30ba2f4786407d3d88eb",
            "patch_url": "https://git.kernel.org/stable/p/8667e8d0eb46bc54fdae30ba2f4786407d3d88eb",
            "filename": "CVE-2025-38461-8667e8d0eb46bc54fdae30ba2f4786407d3d88eb.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38461/CVE-2025-38461-8667e8d0eb46bc54fdae30ba2f4786407d3d88eb.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/36a439049b34cca0b3661276049b84a1f76cc21a",
                "patch_url": "https://git.kernel.org/stable/p/36a439049b34cca0b3661276049b84a1f76cc21a",
                "filename": "CVE-2025-38461-36a439049b34cca0b3661276049b84a1f76cc21a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38461/CVE-2025-38461-36a439049b34cca0b3661276049b84a1f76cc21a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/687aa0c5581b8d4aa87fd92973e4ee576b550cdf",
                "patch_url": "https://git.kernel.org/stable/p/687aa0c5581b8d4aa87fd92973e4ee576b550cdf",
                "filename": "CVE-2025-38461-687aa0c5581b8d4aa87fd92973e4ee576b550cdf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38461/CVE-2025-38461-687aa0c5581b8d4aa87fd92973e4ee576b550cdf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7b73bddf54777fb62d4d8c7729d0affe6df04477",
                "patch_url": "https://git.kernel.org/stable/p/7b73bddf54777fb62d4d8c7729d0affe6df04477",
                "filename": "CVE-2025-38461-7b73bddf54777fb62d4d8c7729d0affe6df04477.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38461/CVE-2025-38461-7b73bddf54777fb62d4d8c7729d0affe6df04477.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8667e8d0eb46bc54fdae30ba2f4786407d3d88eb",
                "patch_url": "https://git.kernel.org/stable/p/8667e8d0eb46bc54fdae30ba2f4786407d3d88eb",
                "filename": "CVE-2025-38461-8667e8d0eb46bc54fdae30ba2f4786407d3d88eb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38461/CVE-2025-38461-8667e8d0eb46bc54fdae30ba2f4786407d3d88eb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ce53e744f18e73059d3124070e960f3aa9902bf",
                "patch_url": "https://git.kernel.org/stable/p/9ce53e744f18e73059d3124070e960f3aa9902bf",
                "filename": "CVE-2025-38461-9ce53e744f18e73059d3124070e960f3aa9902bf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38461/CVE-2025-38461-9ce53e744f18e73059d3124070e960f3aa9902bf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9d24bb6780282b0255b9929abe5e8f98007e2c6e",
                "patch_url": "https://git.kernel.org/stable/p/9d24bb6780282b0255b9929abe5e8f98007e2c6e",
                "filename": "CVE-2025-38461-9d24bb6780282b0255b9929abe5e8f98007e2c6e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38461/CVE-2025-38461-9d24bb6780282b0255b9929abe5e8f98007e2c6e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ae2c712ba39c7007de63cb0c75b51ce1caaf1da5",
                "patch_url": "https://git.kernel.org/stable/p/ae2c712ba39c7007de63cb0c75b51ce1caaf1da5",
                "filename": "CVE-2025-38461-ae2c712ba39c7007de63cb0c75b51ce1caaf1da5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38461/CVE-2025-38461-ae2c712ba39c7007de63cb0c75b51ce1caaf1da5.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/36a439049b34cca0b3661276049b84a1f76cc21a",
            "https://git.kernel.org/stable/c/687aa0c5581b8d4aa87fd92973e4ee576b550cdf",
            "https://git.kernel.org/stable/c/7b73bddf54777fb62d4d8c7729d0affe6df04477",
            "https://git.kernel.org/stable/c/8667e8d0eb46bc54fdae30ba2f4786407d3d88eb",
            "https://git.kernel.org/stable/c/9ce53e744f18e73059d3124070e960f3aa9902bf",
            "https://git.kernel.org/stable/c/9d24bb6780282b0255b9929abe5e8f98007e2c6e",
            "https://git.kernel.org/stable/c/ae2c712ba39c7007de63cb0c75b51ce1caaf1da5",
            "https://www.cve.org/CVERecord?id=CVE-2025-38461\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38461\nhttps://lore.kernel.org/linux-cve-announce/2025072507-CVE-2025-38461-33b1@gregkh/T"
        ]
    },
    "CVE-2025-38464": {
        "cve": "CVE-2025-38464",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Fix use-after-free in tipc_conn_close().\n\nsyzbot reported a null-ptr-deref in tipc_conn_close() during netns\ndismantle. [0]\n\ntipc_topsrv_stop() iterates tipc_net(net)->topsrv->conn_idr and calls\ntipc_conn_close() for each tipc_conn.\n\nThe problem is that tipc_conn_close() is called after releasing the\nIDR lock.\n\nAt the same time, there might be tipc_conn_recv_work() running and it\ncould call tipc_conn_close() for the same tipc_conn and release its\nlast ->kref.\n\nOnce we release the IDR lock in tipc_topsrv_stop(), there is no\nguarantee that the tipc_conn is alive.\n\nLet's hold the ref before releasing the lock and put the ref after\ntipc_conn_close() in tipc_topsrv_stop().\n\n[0]:\nBUG: KASAN: use-after-free in tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165\nRead of size 8 at addr ffff888099305a08 by task kworker/u4:3/435\n\nCPU: 0 PID: 435 Comm: kworker/u4:3 Not tainted 4.19.204-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nWorkqueue: netns cleanup_net\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x1fc/0x2ef lib/dump_stack.c:118\n print_address_description.cold+0x54/0x219 mm/kasan/report.c:256\n kasan_report_error.cold+0x8a/0x1b9 mm/kasan/report.c:354\n kasan_report mm/kasan/report.c:412 [inline]\n __asan_report_load8_noabort+0x88/0x90 mm/kasan/report.c:433\n tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165\n tipc_topsrv_stop net/tipc/topsrv.c:701 [inline]\n tipc_topsrv_exit_net+0x27b/0x5c0 net/tipc/topsrv.c:722\n ops_exit_list+0xa5/0x150 net/core/net_namespace.c:153\n cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:553\n process_one_work+0x864/0x1570 kernel/workqueue.c:2153\n worker_thread+0x64c/0x1130 kernel/workqueue.c:2296\n kthread+0x33f/0x460 kernel/kthread.c:259\n ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415\n\nAllocated by task 23:\n kmem_cache_alloc_trace+0x12f/0x380 mm/slab.c:3625\n kmalloc include/linux/slab.h:515 [inline]\n kzalloc include/linux/slab.h:709 [inline]\n tipc_conn_alloc+0x43/0x4f0 net/tipc/topsrv.c:192\n tipc_topsrv_accept+0x1b5/0x280 net/tipc/topsrv.c:470\n process_one_work+0x864/0x1570 kernel/workqueue.c:2153\n worker_thread+0x64c/0x1130 kernel/workqueue.c:2296\n kthread+0x33f/0x460 kernel/kthread.c:259\n ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415\n\nFreed by task 23:\n __cache_free mm/slab.c:3503 [inline]\n kfree+0xcc/0x210 mm/slab.c:3822\n tipc_conn_kref_release net/tipc/topsrv.c:150 [inline]\n kref_put include/linux/kref.h:70 [inline]\n conn_put+0x2cd/0x3a0 net/tipc/topsrv.c:155\n process_one_work+0x864/0x1570 kernel/workqueue.c:2153\n worker_thread+0x64c/0x1130 kernel/workqueue.c:2296\n kthread+0x33f/0x460 kernel/kthread.c:259\n ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415\n\nThe buggy address belongs to the object at ffff888099305a00\n which belongs to the cache kmalloc-512 of size 512\nThe buggy address is located 8 bytes inside of\n 512-byte region [ffff888099305a00, ffff888099305c00)\nThe buggy address belongs to the page:\npage:ffffea000264c140 count:1 mapcount:0 mapping:ffff88813bff0940 index:0x0\nflags: 0xfff00000000100(slab)\nraw: 00fff00000000100 ffffea00028b6b88 ffffea0002cd2b08 ffff88813bff0940\nraw: 0000000000000000 ffff888099305000 0000000100000006 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff888099305900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ffff888099305980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n>ffff888099305a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                      ^\n ffff888099305a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ffff888099305b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38464",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/03dcdd2558e1e55bf843822fe4363dcb48743f2b",
            "patch_url": "https://git.kernel.org/stable/p/03dcdd2558e1e55bf843822fe4363dcb48743f2b",
            "filename": "CVE-2025-38464-03dcdd2558e1e55bf843822fe4363dcb48743f2b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38464/CVE-2025-38464-03dcdd2558e1e55bf843822fe4363dcb48743f2b.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/03dcdd2558e1e55bf843822fe4363dcb48743f2b",
                "patch_url": "https://git.kernel.org/stable/p/03dcdd2558e1e55bf843822fe4363dcb48743f2b",
                "filename": "CVE-2025-38464-03dcdd2558e1e55bf843822fe4363dcb48743f2b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38464/CVE-2025-38464-03dcdd2558e1e55bf843822fe4363dcb48743f2b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/15a6f4971e2f157d57e09ea748d1fbc714277aa4",
                "patch_url": "https://git.kernel.org/stable/p/15a6f4971e2f157d57e09ea748d1fbc714277aa4",
                "filename": "CVE-2025-38464-15a6f4971e2f157d57e09ea748d1fbc714277aa4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38464/CVE-2025-38464-15a6f4971e2f157d57e09ea748d1fbc714277aa4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1dbf7cd2454a28b1da700085b99346b5445aeabb",
                "patch_url": "https://git.kernel.org/stable/p/1dbf7cd2454a28b1da700085b99346b5445aeabb",
                "filename": "CVE-2025-38464-1dbf7cd2454a28b1da700085b99346b5445aeabb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38464/CVE-2025-38464-1dbf7cd2454a28b1da700085b99346b5445aeabb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3b89e17b2fd64012682bed158d9eb3d2e96dec42",
                "patch_url": "https://git.kernel.org/stable/p/3b89e17b2fd64012682bed158d9eb3d2e96dec42",
                "filename": "CVE-2025-38464-3b89e17b2fd64012682bed158d9eb3d2e96dec42.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38464/CVE-2025-38464-3b89e17b2fd64012682bed158d9eb3d2e96dec42.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/50aa2d121bc2cfe2d825f8a331ea75dfaaab6a50",
                "patch_url": "https://git.kernel.org/stable/p/50aa2d121bc2cfe2d825f8a331ea75dfaaab6a50",
                "filename": "CVE-2025-38464-50aa2d121bc2cfe2d825f8a331ea75dfaaab6a50.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38464/CVE-2025-38464-50aa2d121bc2cfe2d825f8a331ea75dfaaab6a50.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/667eeab4999e981c96b447a4df5f20bdf5c26f13",
                "patch_url": "https://git.kernel.org/stable/p/667eeab4999e981c96b447a4df5f20bdf5c26f13",
                "filename": "CVE-2025-38464-667eeab4999e981c96b447a4df5f20bdf5c26f13.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38464/CVE-2025-38464-667eeab4999e981c96b447a4df5f20bdf5c26f13.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/be4b8392da7978294f2f368799d29dd509fb6c4d",
                "patch_url": "https://git.kernel.org/stable/p/be4b8392da7978294f2f368799d29dd509fb6c4d",
                "filename": "CVE-2025-38464-be4b8392da7978294f2f368799d29dd509fb6c4d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38464/CVE-2025-38464-be4b8392da7978294f2f368799d29dd509fb6c4d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dab8ded2e5ff41012a6ff400b44dbe76ccf3592a",
                "patch_url": "https://git.kernel.org/stable/p/dab8ded2e5ff41012a6ff400b44dbe76ccf3592a",
                "filename": "CVE-2025-38464-dab8ded2e5ff41012a6ff400b44dbe76ccf3592a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38464/CVE-2025-38464-dab8ded2e5ff41012a6ff400b44dbe76ccf3592a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/03dcdd2558e1e55bf843822fe4363dcb48743f2b",
            "https://git.kernel.org/stable/c/15a6f4971e2f157d57e09ea748d1fbc714277aa4",
            "https://git.kernel.org/stable/c/1dbf7cd2454a28b1da700085b99346b5445aeabb",
            "https://git.kernel.org/stable/c/3b89e17b2fd64012682bed158d9eb3d2e96dec42",
            "https://git.kernel.org/stable/c/50aa2d121bc2cfe2d825f8a331ea75dfaaab6a50",
            "https://git.kernel.org/stable/c/667eeab4999e981c96b447a4df5f20bdf5c26f13",
            "https://git.kernel.org/stable/c/be4b8392da7978294f2f368799d29dd509fb6c4d",
            "https://git.kernel.org/stable/c/dab8ded2e5ff41012a6ff400b44dbe76ccf3592a",
            "https://www.cve.org/CVERecord?id=CVE-2025-38464\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38464\nhttps://lore.kernel.org/linux-cve-announce/2025072508-CVE-2025-38464-44a1@gregkh/T"
        ]
    },
    "CVE-2025-38477": {
        "cve": "CVE-2025-38477",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix race condition on qfq_aggregate\n\nA race condition can occur when 'agg' is modified in qfq_change_agg\n(called during qfq_enqueue) while other threads access it\nconcurrently. For example, qfq_dump_class may trigger a NULL\ndereference, and qfq_delete_class may cause a use-after-free.\n\nThis patch addresses the issue by:\n\n1. Moved qfq_destroy_class into the critical section.\n\n2. Added sch_tree_lock protection to qfq_dump_class and\nqfq_dump_class_stats.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38477",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/466e10194ab81caa2ee6a332d33ba16bcceeeba6",
            "patch_url": "https://git.kernel.org/stable/p/466e10194ab81caa2ee6a332d33ba16bcceeeba6",
            "filename": "CVE-2025-38477-466e10194ab81caa2ee6a332d33ba16bcceeeba6.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38477/CVE-2025-38477-466e10194ab81caa2ee6a332d33ba16bcceeeba6.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/466e10194ab81caa2ee6a332d33ba16bcceeeba6",
                "patch_url": "https://git.kernel.org/stable/p/466e10194ab81caa2ee6a332d33ba16bcceeeba6",
                "filename": "CVE-2025-38477-466e10194ab81caa2ee6a332d33ba16bcceeeba6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38477/CVE-2025-38477-466e10194ab81caa2ee6a332d33ba16bcceeeba6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5e28d5a3f774f118896aec17a3a20a9c5c9dfc64",
                "patch_url": "https://git.kernel.org/stable/p/5e28d5a3f774f118896aec17a3a20a9c5c9dfc64",
                "filename": "CVE-2025-38477-5e28d5a3f774f118896aec17a3a20a9c5c9dfc64.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38477/CVE-2025-38477-5e28d5a3f774f118896aec17a3a20a9c5c9dfc64.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a6d735100f602c830c16d69fb6d780eebd8c9ae1",
                "patch_url": "https://git.kernel.org/stable/p/a6d735100f602c830c16d69fb6d780eebd8c9ae1",
                "filename": "CVE-2025-38477-a6d735100f602c830c16d69fb6d780eebd8c9ae1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38477/CVE-2025-38477-a6d735100f602c830c16d69fb6d780eebd8c9ae1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/aa7a22c4d678bf649fd3a1d27debec583563414d",
                "patch_url": "https://git.kernel.org/stable/p/aa7a22c4d678bf649fd3a1d27debec583563414d",
                "filename": "CVE-2025-38477-aa7a22c4d678bf649fd3a1d27debec583563414d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38477/CVE-2025-38477-aa7a22c4d678bf649fd3a1d27debec583563414d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c000a3a330d97f6c073ace5aa5faf94b9adb4b79",
                "patch_url": "https://git.kernel.org/stable/p/c000a3a330d97f6c073ace5aa5faf94b9adb4b79",
                "filename": "CVE-2025-38477-c000a3a330d97f6c073ace5aa5faf94b9adb4b79.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38477/CVE-2025-38477-c000a3a330d97f6c073ace5aa5faf94b9adb4b79.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c6df794000147a3a02f79984aada4ce83f8d0a1e",
                "patch_url": "https://git.kernel.org/stable/p/c6df794000147a3a02f79984aada4ce83f8d0a1e",
                "filename": "CVE-2025-38477-c6df794000147a3a02f79984aada4ce83f8d0a1e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38477/CVE-2025-38477-c6df794000147a3a02f79984aada4ce83f8d0a1e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d841aa5518508ab195b6781ad0d73ee378d713dd",
                "patch_url": "https://git.kernel.org/stable/p/d841aa5518508ab195b6781ad0d73ee378d713dd",
                "filename": "CVE-2025-38477-d841aa5518508ab195b6781ad0d73ee378d713dd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38477/CVE-2025-38477-d841aa5518508ab195b6781ad0d73ee378d713dd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fbe48f06e64134dfeafa89ad23387f66ebca3527",
                "patch_url": "https://git.kernel.org/stable/p/fbe48f06e64134dfeafa89ad23387f66ebca3527",
                "filename": "CVE-2025-38477-fbe48f06e64134dfeafa89ad23387f66ebca3527.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38477/CVE-2025-38477-fbe48f06e64134dfeafa89ad23387f66ebca3527.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/466e10194ab81caa2ee6a332d33ba16bcceeeba6",
            "https://git.kernel.org/stable/c/5e28d5a3f774f118896aec17a3a20a9c5c9dfc64",
            "https://git.kernel.org/stable/c/a6d735100f602c830c16d69fb6d780eebd8c9ae1",
            "https://git.kernel.org/stable/c/aa7a22c4d678bf649fd3a1d27debec583563414d",
            "https://git.kernel.org/stable/c/c000a3a330d97f6c073ace5aa5faf94b9adb4b79",
            "https://git.kernel.org/stable/c/c6df794000147a3a02f79984aada4ce83f8d0a1e",
            "https://git.kernel.org/stable/c/d841aa5518508ab195b6781ad0d73ee378d713dd",
            "https://git.kernel.org/stable/c/fbe48f06e64134dfeafa89ad23387f66ebca3527",
            "https://www.cve.org/CVERecord?id=CVE-2025-38477\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38477\nhttps://lore.kernel.org/linux-cve-announce/2025072813-CVE-2025-38477-8b42@gregkh/T"
        ]
    },
    "CVE-2025-38498": {
        "cve": "CVE-2025-38498",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndo_change_type(): refuse to operate on unmounted/not ours mounts\n\nEnsure that propagation settings can only be changed for mounts located\nin the caller's mount namespace. This change aligns permission checking\nwith the rest of mount(2).",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38498",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/c7d11fdf8e5db5f34a6c062c7e6ba3a0971879d2",
            "patch_url": "https://git.kernel.org/stable/p/c7d11fdf8e5db5f34a6c062c7e6ba3a0971879d2",
            "filename": "CVE-2025-38498-c7d11fdf8e5db5f34a6c062c7e6ba3a0971879d2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38498/CVE-2025-38498-c7d11fdf8e5db5f34a6c062c7e6ba3a0971879d2.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/064014f7812744451d5d0592f3d2bcd727f2ee93",
                "patch_url": "https://git.kernel.org/stable/p/064014f7812744451d5d0592f3d2bcd727f2ee93",
                "filename": "CVE-2025-38498-064014f7812744451d5d0592f3d2bcd727f2ee93.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38498/CVE-2025-38498-064014f7812744451d5d0592f3d2bcd727f2ee93.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/12f147ddd6de7382dad54812e65f3f08d05809fc",
                "patch_url": "https://git.kernel.org/stable/p/12f147ddd6de7382dad54812e65f3f08d05809fc",
                "filename": "CVE-2025-38498-12f147ddd6de7382dad54812e65f3f08d05809fc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38498/CVE-2025-38498-12f147ddd6de7382dad54812e65f3f08d05809fc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/19554c79a2095ddde850906a067915c1ef3a4114",
                "patch_url": "https://git.kernel.org/stable/p/19554c79a2095ddde850906a067915c1ef3a4114",
                "filename": "CVE-2025-38498-19554c79a2095ddde850906a067915c1ef3a4114.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38498/CVE-2025-38498-19554c79a2095ddde850906a067915c1ef3a4114.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/432a171d60056489270c462e651e6c3a13f855b1",
                "patch_url": "https://git.kernel.org/stable/p/432a171d60056489270c462e651e6c3a13f855b1",
                "filename": "CVE-2025-38498-432a171d60056489270c462e651e6c3a13f855b1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38498/CVE-2025-38498-432a171d60056489270c462e651e6c3a13f855b1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f091ad0862b02dc42a19a120b7048de848561f8",
                "patch_url": "https://git.kernel.org/stable/p/4f091ad0862b02dc42a19a120b7048de848561f8",
                "filename": "CVE-2025-38498-4f091ad0862b02dc42a19a120b7048de848561f8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38498/CVE-2025-38498-4f091ad0862b02dc42a19a120b7048de848561f8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/787937c4e373f1722c4343e5a5a4eb0f8543e589",
                "patch_url": "https://git.kernel.org/stable/p/787937c4e373f1722c4343e5a5a4eb0f8543e589",
                "filename": "CVE-2025-38498-787937c4e373f1722c4343e5a5a4eb0f8543e589.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38498/CVE-2025-38498-787937c4e373f1722c4343e5a5a4eb0f8543e589.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9c1ddfeb662b668fff69c5f1cfdd9f5d23d55d23",
                "patch_url": "https://git.kernel.org/stable/p/9c1ddfeb662b668fff69c5f1cfdd9f5d23d55d23",
                "filename": "CVE-2025-38498-9c1ddfeb662b668fff69c5f1cfdd9f5d23d55d23.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38498/CVE-2025-38498-9c1ddfeb662b668fff69c5f1cfdd9f5d23d55d23.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c7d11fdf8e5db5f34a6c062c7e6ba3a0971879d2",
                "patch_url": "https://git.kernel.org/stable/p/c7d11fdf8e5db5f34a6c062c7e6ba3a0971879d2",
                "filename": "CVE-2025-38498-c7d11fdf8e5db5f34a6c062c7e6ba3a0971879d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38498/CVE-2025-38498-c7d11fdf8e5db5f34a6c062c7e6ba3a0971879d2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/064014f7812744451d5d0592f3d2bcd727f2ee93",
            "https://git.kernel.org/stable/c/12f147ddd6de7382dad54812e65f3f08d05809fc",
            "https://git.kernel.org/stable/c/19554c79a2095ddde850906a067915c1ef3a4114",
            "https://git.kernel.org/stable/c/432a171d60056489270c462e651e6c3a13f855b1",
            "https://git.kernel.org/stable/c/4f091ad0862b02dc42a19a120b7048de848561f8",
            "https://git.kernel.org/stable/c/787937c4e373f1722c4343e5a5a4eb0f8543e589",
            "https://git.kernel.org/stable/c/9c1ddfeb662b668fff69c5f1cfdd9f5d23d55d23",
            "https://git.kernel.org/stable/c/c7d11fdf8e5db5f34a6c062c7e6ba3a0971879d2",
            "https://www.cve.org/CVERecord?id=CVE-2025-38498\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38498\nhttps://lore.kernel.org/linux-cve-announce/2025073029-CVE-2025-38498-e3ab@gregkh/T"
        ]
    },
    "CVE-2025-38527": {
        "cve": "CVE-2025-38527",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free in cifs_oplock_break\n\nA race condition can occur in cifs_oplock_break() leading to a\nuse-after-free of the cinode structure when unmounting:\n\n  cifs_oplock_break()\n    _cifsFileInfo_put(cfile)\n      cifsFileInfo_put_final()\n        cifs_sb_deactive()\n          [last ref, start releasing sb]\n            kill_sb()\n              kill_anon_super()\n                generic_shutdown_super()\n                  evict_inodes()\n                    dispose_list()\n                      evict()\n                        destroy_inode()\n                          call_rcu(&inode->i_rcu, i_callback)\n    spin_lock(&cinode->open_file_lock)  <- OK\n                            [later] i_callback()\n                              cifs_free_inode()\n                                kmem_cache_free(cinode)\n    spin_unlock(&cinode->open_file_lock)  <- UAF\n    cifs_done_oplock_break(cinode)       <- UAF\n\nThe issue occurs when umount has already released its reference to the\nsuperblock. When _cifsFileInfo_put() calls cifs_sb_deactive(), this\nreleases the last reference, triggering the immediate cleanup of all\ninodes under RCU. However, cifs_oplock_break() continues to access the\ncinode after this point, resulting in use-after-free.\n\nFix this by holding an extra reference to the superblock during the\nentire oplock break operation. This ensures that the superblock and\nits inodes remain valid until the oplock break completes.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38527",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/09bce2138a30ef10d8821c8c3f73a4ab7a5726bc",
            "patch_url": "https://git.kernel.org/stable/p/09bce2138a30ef10d8821c8c3f73a4ab7a5726bc",
            "filename": "CVE-2025-38527-09bce2138a30ef10d8821c8c3f73a4ab7a5726bc.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38527/CVE-2025-38527-09bce2138a30ef10d8821c8c3f73a4ab7a5726bc.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/09bce2138a30ef10d8821c8c3f73a4ab7a5726bc",
                "patch_url": "https://git.kernel.org/stable/p/09bce2138a30ef10d8821c8c3f73a4ab7a5726bc",
                "filename": "CVE-2025-38527-09bce2138a30ef10d8821c8c3f73a4ab7a5726bc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38527/CVE-2025-38527-09bce2138a30ef10d8821c8c3f73a4ab7a5726bc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0a4eec84d4d2c4085d4ed8630fd74e4b39033c1b",
                "patch_url": "https://git.kernel.org/stable/p/0a4eec84d4d2c4085d4ed8630fd74e4b39033c1b",
                "filename": "CVE-2025-38527-0a4eec84d4d2c4085d4ed8630fd74e4b39033c1b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38527/CVE-2025-38527-0a4eec84d4d2c4085d4ed8630fd74e4b39033c1b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2baaf5bbab2ac474c4f92c10fcb3310f824db995",
                "patch_url": "https://git.kernel.org/stable/p/2baaf5bbab2ac474c4f92c10fcb3310f824db995",
                "filename": "CVE-2025-38527-2baaf5bbab2ac474c4f92c10fcb3310f824db995.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38527/CVE-2025-38527-2baaf5bbab2ac474c4f92c10fcb3310f824db995.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4256a483fe58af66a46cbf3dc48ff26e580d3308",
                "patch_url": "https://git.kernel.org/stable/p/4256a483fe58af66a46cbf3dc48ff26e580d3308",
                "filename": "CVE-2025-38527-4256a483fe58af66a46cbf3dc48ff26e580d3308.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38527/CVE-2025-38527-4256a483fe58af66a46cbf3dc48ff26e580d3308.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/705c79101ccf9edea5a00d761491a03ced314210",
                "patch_url": "https://git.kernel.org/stable/p/705c79101ccf9edea5a00d761491a03ced314210",
                "filename": "CVE-2025-38527-705c79101ccf9edea5a00d761491a03ced314210.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38527/CVE-2025-38527-705c79101ccf9edea5a00d761491a03ced314210.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/da11bd4b697b393a207f19a2ed7d382a811a3ddc",
                "patch_url": "https://git.kernel.org/stable/p/da11bd4b697b393a207f19a2ed7d382a811a3ddc",
                "filename": "CVE-2025-38527-da11bd4b697b393a207f19a2ed7d382a811a3ddc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38527/CVE-2025-38527-da11bd4b697b393a207f19a2ed7d382a811a3ddc.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/09bce2138a30ef10d8821c8c3f73a4ab7a5726bc",
            "https://git.kernel.org/stable/c/0a4eec84d4d2c4085d4ed8630fd74e4b39033c1b",
            "https://git.kernel.org/stable/c/2baaf5bbab2ac474c4f92c10fcb3310f824db995",
            "https://git.kernel.org/stable/c/4256a483fe58af66a46cbf3dc48ff26e580d3308",
            "https://git.kernel.org/stable/c/705c79101ccf9edea5a00d761491a03ced314210",
            "https://git.kernel.org/stable/c/da11bd4b697b393a207f19a2ed7d382a811a3ddc",
            "https://www.cve.org/CVERecord?id=CVE-2025-38527\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38527\nhttps://lore.kernel.org/linux-cve-announce/2025081654-CVE-2025-38527-c389@gregkh/T"
        ]
    },
    "CVE-2025-38556": {
        "cve": "CVE-2025-38556",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: Harden s32ton() against conversion to 0 bits\n\nTesting by the syzbot fuzzer showed that the HID core gets a\nshift-out-of-bounds exception when it tries to convert a 32-bit\nquantity to a 0-bit quantity.  Ideally this should never occur, but\nthere are buggy devices and some might have a report field with size\nset to zero; we shouldn't reject the report or the device just because\nof that.\n\nInstead, harden the s32ton() routine so that it returns a reasonable\nresult instead of crashing when it is called with the number of bits\nset to 0 -- the same as what snto32() does.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38556",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/6cdf6c708717c5c6897d0800a1793e83757c7491",
            "patch_url": "https://git.kernel.org/stable/p/6cdf6c708717c5c6897d0800a1793e83757c7491",
            "filename": "CVE-2025-38556-6cdf6c708717c5c6897d0800a1793e83757c7491.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38556/CVE-2025-38556-6cdf6c708717c5c6897d0800a1793e83757c7491.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3c86548a20d7bc2861aa4de044991a327bebad1a",
                "patch_url": "https://git.kernel.org/stable/p/3c86548a20d7bc2861aa4de044991a327bebad1a",
                "filename": "CVE-2025-38556-3c86548a20d7bc2861aa4de044991a327bebad1a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38556/CVE-2025-38556-3c86548a20d7bc2861aa4de044991a327bebad1a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6cdf6c708717c5c6897d0800a1793e83757c7491",
                "patch_url": "https://git.kernel.org/stable/p/6cdf6c708717c5c6897d0800a1793e83757c7491",
                "filename": "CVE-2025-38556-6cdf6c708717c5c6897d0800a1793e83757c7491.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38556/CVE-2025-38556-6cdf6c708717c5c6897d0800a1793e83757c7491.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/810189546cb6c8f36443ed091d91f1f5d2fc2ec7",
                "patch_url": "https://git.kernel.org/stable/p/810189546cb6c8f36443ed091d91f1f5d2fc2ec7",
                "filename": "CVE-2025-38556-810189546cb6c8f36443ed091d91f1f5d2fc2ec7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38556/CVE-2025-38556-810189546cb6c8f36443ed091d91f1f5d2fc2ec7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/865ad8469fa24de1559f247d9426ab01e5ce3a56",
                "patch_url": "https://git.kernel.org/stable/p/865ad8469fa24de1559f247d9426ab01e5ce3a56",
                "filename": "CVE-2025-38556-865ad8469fa24de1559f247d9426ab01e5ce3a56.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38556/CVE-2025-38556-865ad8469fa24de1559f247d9426ab01e5ce3a56.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8b4a94b1510f6a46ec48494b52ee8f67eb4fc836",
                "patch_url": "https://git.kernel.org/stable/p/8b4a94b1510f6a46ec48494b52ee8f67eb4fc836",
                "filename": "CVE-2025-38556-8b4a94b1510f6a46ec48494b52ee8f67eb4fc836.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38556/CVE-2025-38556-8b4a94b1510f6a46ec48494b52ee8f67eb4fc836.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd",
                "patch_url": "https://git.kernel.org/stable/p/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd",
                "filename": "CVE-2025-38556-a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38556/CVE-2025-38556-a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d3b504146c111548ab60b6ef7aad00bfb1db05a2",
                "patch_url": "https://git.kernel.org/stable/p/d3b504146c111548ab60b6ef7aad00bfb1db05a2",
                "filename": "CVE-2025-38556-d3b504146c111548ab60b6ef7aad00bfb1db05a2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38556/CVE-2025-38556-d3b504146c111548ab60b6ef7aad00bfb1db05a2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eeeaba737919bdce9885e2a00ac2912f61a3684d",
                "patch_url": "https://git.kernel.org/stable/p/eeeaba737919bdce9885e2a00ac2912f61a3684d",
                "filename": "CVE-2025-38556-eeeaba737919bdce9885e2a00ac2912f61a3684d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38556/CVE-2025-38556-eeeaba737919bdce9885e2a00ac2912f61a3684d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3c86548a20d7bc2861aa4de044991a327bebad1a",
            "https://git.kernel.org/stable/c/6cdf6c708717c5c6897d0800a1793e83757c7491",
            "https://git.kernel.org/stable/c/810189546cb6c8f36443ed091d91f1f5d2fc2ec7",
            "https://git.kernel.org/stable/c/865ad8469fa24de1559f247d9426ab01e5ce3a56",
            "https://git.kernel.org/stable/c/8b4a94b1510f6a46ec48494b52ee8f67eb4fc836",
            "https://git.kernel.org/stable/c/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd",
            "https://git.kernel.org/stable/c/d3b504146c111548ab60b6ef7aad00bfb1db05a2",
            "https://git.kernel.org/stable/c/eeeaba737919bdce9885e2a00ac2912f61a3684d",
            "https://www.cve.org/CVERecord?id=CVE-2025-38556\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38556\nhttps://lore.kernel.org/linux-cve-announce/2025081905-CVE-2025-38556-521e@gregkh/T"
        ]
    },
    "CVE-2025-38718": {
        "cve": "CVE-2025-38718",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: linearize cloned gso packets in sctp_rcv\n\nA cloned head skb still shares these frag skbs in fraglist with the\noriginal head skb. It's not safe to access these frag skbs.\n\nsyzbot reported two use-of-uninitialized-memory bugs caused by this:\n\n  BUG: KMSAN: uninit-value in sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211\n   sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211\n   sctp_assoc_bh_rcv+0x1a7/0xc50 net/sctp/associola.c:998\n   sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88\n   sctp_backlog_rcv+0x397/0xdb0 net/sctp/input.c:331\n   sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1122\n   __release_sock+0x1da/0x330 net/core/sock.c:3106\n   release_sock+0x6b/0x250 net/core/sock.c:3660\n   sctp_wait_for_connect+0x487/0x820 net/sctp/socket.c:9360\n   sctp_sendmsg_to_asoc+0x1ec1/0x1f00 net/sctp/socket.c:1885\n   sctp_sendmsg+0x32b9/0x4a80 net/sctp/socket.c:2031\n   inet_sendmsg+0x25a/0x280 net/ipv4/af_inet.c:851\n   sock_sendmsg_nosec net/socket.c:718 [inline]\n\nand\n\n  BUG: KMSAN: uninit-value in sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987\n   sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987\n   sctp_inq_push+0x2a3/0x350 net/sctp/inqueue.c:88\n   sctp_backlog_rcv+0x3c7/0xda0 net/sctp/input.c:331\n   sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148\n   __release_sock+0x1d3/0x330 net/core/sock.c:3213\n   release_sock+0x6b/0x270 net/core/sock.c:3767\n   sctp_wait_for_connect+0x458/0x820 net/sctp/socket.c:9367\n   sctp_sendmsg_to_asoc+0x223a/0x2260 net/sctp/socket.c:1886\n   sctp_sendmsg+0x3910/0x49f0 net/sctp/socket.c:2032\n   inet_sendmsg+0x269/0x2a0 net/ipv4/af_inet.c:851\n   sock_sendmsg_nosec net/socket.c:712 [inline]\n\nThis patch fixes it by linearizing cloned gso packets in sctp_rcv().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38718",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/1bd5214ea681584c5886fea3ba03e49f93a43c0e",
            "patch_url": "https://git.kernel.org/stable/p/1bd5214ea681584c5886fea3ba03e49f93a43c0e",
            "filename": "CVE-2025-38718-1bd5214ea681584c5886fea3ba03e49f93a43c0e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38718/CVE-2025-38718-1bd5214ea681584c5886fea3ba03e49f93a43c0e.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/03d0cc6889e02420125510b5444b570f4bbf53d5",
                "patch_url": "https://git.kernel.org/stable/p/03d0cc6889e02420125510b5444b570f4bbf53d5",
                "filename": "CVE-2025-38718-03d0cc6889e02420125510b5444b570f4bbf53d5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38718/CVE-2025-38718-03d0cc6889e02420125510b5444b570f4bbf53d5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1bd5214ea681584c5886fea3ba03e49f93a43c0e",
                "patch_url": "https://git.kernel.org/stable/p/1bd5214ea681584c5886fea3ba03e49f93a43c0e",
                "filename": "CVE-2025-38718-1bd5214ea681584c5886fea3ba03e49f93a43c0e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38718/CVE-2025-38718-1bd5214ea681584c5886fea3ba03e49f93a43c0e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4506bcaabe004d07be8ff09116a3024fbd6aa965",
                "patch_url": "https://git.kernel.org/stable/p/4506bcaabe004d07be8ff09116a3024fbd6aa965",
                "filename": "CVE-2025-38718-4506bcaabe004d07be8ff09116a3024fbd6aa965.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38718/CVE-2025-38718-4506bcaabe004d07be8ff09116a3024fbd6aa965.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7d757f17bc2ef2727994ffa6d5d6e4bc4789a770",
                "patch_url": "https://git.kernel.org/stable/p/7d757f17bc2ef2727994ffa6d5d6e4bc4789a770",
                "filename": "CVE-2025-38718-7d757f17bc2ef2727994ffa6d5d6e4bc4789a770.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38718/CVE-2025-38718-7d757f17bc2ef2727994ffa6d5d6e4bc4789a770.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cd0e92bb2b7542fb96397ffac639b4f5b099d0cb",
                "patch_url": "https://git.kernel.org/stable/p/cd0e92bb2b7542fb96397ffac639b4f5b099d0cb",
                "filename": "CVE-2025-38718-cd0e92bb2b7542fb96397ffac639b4f5b099d0cb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38718/CVE-2025-38718-cd0e92bb2b7542fb96397ffac639b4f5b099d0cb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d0194e391bb493aa6cec56d177b14df6b29188d5",
                "patch_url": "https://git.kernel.org/stable/p/d0194e391bb493aa6cec56d177b14df6b29188d5",
                "filename": "CVE-2025-38718-d0194e391bb493aa6cec56d177b14df6b29188d5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38718/CVE-2025-38718-d0194e391bb493aa6cec56d177b14df6b29188d5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ea094f38d387d1b0ded5dee4a3e5720aa4ce0139",
                "patch_url": "https://git.kernel.org/stable/p/ea094f38d387d1b0ded5dee4a3e5720aa4ce0139",
                "filename": "CVE-2025-38718-ea094f38d387d1b0ded5dee4a3e5720aa4ce0139.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38718/CVE-2025-38718-ea094f38d387d1b0ded5dee4a3e5720aa4ce0139.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fc66772607101bd2030a4332b3bd0ea3b3605250",
                "patch_url": "https://git.kernel.org/stable/p/fc66772607101bd2030a4332b3bd0ea3b3605250",
                "filename": "CVE-2025-38718-fc66772607101bd2030a4332b3bd0ea3b3605250.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38718/CVE-2025-38718-fc66772607101bd2030a4332b3bd0ea3b3605250.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fd60d8a086191fe33c2d719732d2482052fa6805",
                "patch_url": "https://git.kernel.org/stable/p/fd60d8a086191fe33c2d719732d2482052fa6805",
                "filename": "CVE-2025-38718-fd60d8a086191fe33c2d719732d2482052fa6805.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38718/CVE-2025-38718-fd60d8a086191fe33c2d719732d2482052fa6805.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/03d0cc6889e02420125510b5444b570f4bbf53d5",
            "https://git.kernel.org/stable/c/1bd5214ea681584c5886fea3ba03e49f93a43c0e",
            "https://git.kernel.org/stable/c/4506bcaabe004d07be8ff09116a3024fbd6aa965",
            "https://git.kernel.org/stable/c/7d757f17bc2ef2727994ffa6d5d6e4bc4789a770",
            "https://git.kernel.org/stable/c/cd0e92bb2b7542fb96397ffac639b4f5b099d0cb",
            "https://git.kernel.org/stable/c/d0194e391bb493aa6cec56d177b14df6b29188d5",
            "https://git.kernel.org/stable/c/ea094f38d387d1b0ded5dee4a3e5720aa4ce0139",
            "https://git.kernel.org/stable/c/fc66772607101bd2030a4332b3bd0ea3b3605250",
            "https://git.kernel.org/stable/c/fd60d8a086191fe33c2d719732d2482052fa6805",
            "https://www.cve.org/CVERecord?id=CVE-2025-38718\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38718\nhttps://lore.kernel.org/linux-cve-announce/2025090459-CVE-2025-38718-5bb6@gregkh/T"
        ]
    },
    "CVE-2025-38724": {
        "cve": "CVE-2025-38724",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()\n\nLei Lu recently reported that nfsd4_setclientid_confirm() did not check\nthe return value from get_client_locked(). a SETCLIENTID_CONFIRM could\nrace with a confirmed client expiring and fail to get a reference. That\ncould later lead to a UAF.\n\nFix this by getting a reference early in the case where there is an\nextant confirmed client. If that fails then treat it as if there were no\nconfirmed client found at all.\n\nIn the case where the unconfirmed client is expiring, just fail and\nreturn the result from get_client_locked().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-38724",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/d71abd1ae4e0413707cd42b10c24a11d1aa71772",
            "patch_url": "https://git.kernel.org/stable/p/d71abd1ae4e0413707cd42b10c24a11d1aa71772",
            "filename": "CVE-2025-38724-d71abd1ae4e0413707cd42b10c24a11d1aa71772.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38724/CVE-2025-38724-d71abd1ae4e0413707cd42b10c24a11d1aa71772.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/22f45cedf281e6171817c8a3432c44d788c550e1",
                "patch_url": "https://git.kernel.org/stable/p/22f45cedf281e6171817c8a3432c44d788c550e1",
                "filename": "CVE-2025-38724-22f45cedf281e6171817c8a3432c44d788c550e1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38724/CVE-2025-38724-22f45cedf281e6171817c8a3432c44d788c550e1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/36e83eda90e0e4ac52f259f775b40b2841f8a0a3",
                "patch_url": "https://git.kernel.org/stable/p/36e83eda90e0e4ac52f259f775b40b2841f8a0a3",
                "filename": "CVE-2025-38724-36e83eda90e0e4ac52f259f775b40b2841f8a0a3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38724/CVE-2025-38724-36e83eda90e0e4ac52f259f775b40b2841f8a0a3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3f252a73e81aa01660cb426735eab932e6182e8d",
                "patch_url": "https://git.kernel.org/stable/p/3f252a73e81aa01660cb426735eab932e6182e8d",
                "filename": "CVE-2025-38724-3f252a73e81aa01660cb426735eab932e6182e8d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38724/CVE-2025-38724-3f252a73e81aa01660cb426735eab932e6182e8d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/571a5e46c71490285d2d8c06f6b5a7cbf6c7edd1",
                "patch_url": "https://git.kernel.org/stable/p/571a5e46c71490285d2d8c06f6b5a7cbf6c7edd1",
                "filename": "CVE-2025-38724-571a5e46c71490285d2d8c06f6b5a7cbf6c7edd1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38724/CVE-2025-38724-571a5e46c71490285d2d8c06f6b5a7cbf6c7edd1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/74ad36ed60df561a303a19ecef400c7096b20306",
                "patch_url": "https://git.kernel.org/stable/p/74ad36ed60df561a303a19ecef400c7096b20306",
                "filename": "CVE-2025-38724-74ad36ed60df561a303a19ecef400c7096b20306.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38724/CVE-2025-38724-74ad36ed60df561a303a19ecef400c7096b20306.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/908e4ead7f757504d8b345452730636e298cbf68",
                "patch_url": "https://git.kernel.org/stable/p/908e4ead7f757504d8b345452730636e298cbf68",
                "filename": "CVE-2025-38724-908e4ead7f757504d8b345452730636e298cbf68.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38724/CVE-2025-38724-908e4ead7f757504d8b345452730636e298cbf68.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d35ac850410966010e92f401f4e21868a9ea4d8b",
                "patch_url": "https://git.kernel.org/stable/p/d35ac850410966010e92f401f4e21868a9ea4d8b",
                "filename": "CVE-2025-38724-d35ac850410966010e92f401f4e21868a9ea4d8b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38724/CVE-2025-38724-d35ac850410966010e92f401f4e21868a9ea4d8b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d71abd1ae4e0413707cd42b10c24a11d1aa71772",
                "patch_url": "https://git.kernel.org/stable/p/d71abd1ae4e0413707cd42b10c24a11d1aa71772",
                "filename": "CVE-2025-38724-d71abd1ae4e0413707cd42b10c24a11d1aa71772.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38724/CVE-2025-38724-d71abd1ae4e0413707cd42b10c24a11d1aa71772.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f3aac6cf390d8b80e1d82975faf4ac61175519c0",
                "patch_url": "https://git.kernel.org/stable/p/f3aac6cf390d8b80e1d82975faf4ac61175519c0",
                "filename": "CVE-2025-38724-f3aac6cf390d8b80e1d82975faf4ac61175519c0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-38724/CVE-2025-38724-f3aac6cf390d8b80e1d82975faf4ac61175519c0.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/22f45cedf281e6171817c8a3432c44d788c550e1",
            "https://git.kernel.org/stable/c/36e83eda90e0e4ac52f259f775b40b2841f8a0a3",
            "https://git.kernel.org/stable/c/3f252a73e81aa01660cb426735eab932e6182e8d",
            "https://git.kernel.org/stable/c/571a5e46c71490285d2d8c06f6b5a7cbf6c7edd1",
            "https://git.kernel.org/stable/c/74ad36ed60df561a303a19ecef400c7096b20306",
            "https://git.kernel.org/stable/c/908e4ead7f757504d8b345452730636e298cbf68",
            "https://git.kernel.org/stable/c/d35ac850410966010e92f401f4e21868a9ea4d8b",
            "https://git.kernel.org/stable/c/d71abd1ae4e0413707cd42b10c24a11d1aa71772",
            "https://git.kernel.org/stable/c/f3aac6cf390d8b80e1d82975faf4ac61175519c0",
            "https://www.cve.org/CVERecord?id=CVE-2025-38724\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38724\nhttps://lore.kernel.org/linux-cve-announce/2025090401-CVE-2025-38724-5309@gregkh/T"
        ]
    },
    "CVE-2025-39697": {
        "cve": "CVE-2025-39697",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix a race when updating an existing write\n\nAfter nfs_lock_and_join_requests() tests for whether the request is\nstill attached to the mapping, nothing prevents a call to\nnfs_inode_remove_request() from succeeding until we actually lock the\npage group.\nThe reason is that whoever called nfs_inode_remove_request() doesn't\nnecessarily have a lock on the page group head.\n\nSo in order to avoid races, let's take the page group lock earlier in\nnfs_lock_and_join_requests(), and hold it across the removal of the\nrequest in nfs_inode_remove_request().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39697",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0ff42a32784e0f2cb46a46da8e9f473538c13e1b",
            "patch_url": "https://git.kernel.org/stable/p/0ff42a32784e0f2cb46a46da8e9f473538c13e1b",
            "filename": "CVE-2025-39697-0ff42a32784e0f2cb46a46da8e9f473538c13e1b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39697/CVE-2025-39697-0ff42a32784e0f2cb46a46da8e9f473538c13e1b.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0ff42a32784e0f2cb46a46da8e9f473538c13e1b",
                "patch_url": "https://git.kernel.org/stable/p/0ff42a32784e0f2cb46a46da8e9f473538c13e1b",
                "filename": "CVE-2025-39697-0ff42a32784e0f2cb46a46da8e9f473538c13e1b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39697/CVE-2025-39697-0ff42a32784e0f2cb46a46da8e9f473538c13e1b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/181feb41f0b268e6288bf9a7b984624d7fe2031d",
                "patch_url": "https://git.kernel.org/stable/p/181feb41f0b268e6288bf9a7b984624d7fe2031d",
                "filename": "CVE-2025-39697-181feb41f0b268e6288bf9a7b984624d7fe2031d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39697/CVE-2025-39697-181feb41f0b268e6288bf9a7b984624d7fe2031d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/202a3432d21ac060629a760fff3b0a39859da3ea",
                "patch_url": "https://git.kernel.org/stable/p/202a3432d21ac060629a760fff3b0a39859da3ea",
                "filename": "CVE-2025-39697-202a3432d21ac060629a760fff3b0a39859da3ea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39697/CVE-2025-39697-202a3432d21ac060629a760fff3b0a39859da3ea.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/76d2e3890fb169168c73f2e4f8375c7cc24a765e",
                "patch_url": "https://git.kernel.org/stable/p/76d2e3890fb169168c73f2e4f8375c7cc24a765e",
                "filename": "CVE-2025-39697-76d2e3890fb169168c73f2e4f8375c7cc24a765e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39697/CVE-2025-39697-76d2e3890fb169168c73f2e4f8375c7cc24a765e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/92278ae36935a54e65fef9f8ea8efe7e80481ace",
                "patch_url": "https://git.kernel.org/stable/p/92278ae36935a54e65fef9f8ea8efe7e80481ace",
                "filename": "CVE-2025-39697-92278ae36935a54e65fef9f8ea8efe7e80481ace.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39697/CVE-2025-39697-92278ae36935a54e65fef9f8ea8efe7e80481ace.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c32e3c71aaa1c1ba05da88605e2ddd493c58794f",
                "patch_url": "https://git.kernel.org/stable/p/c32e3c71aaa1c1ba05da88605e2ddd493c58794f",
                "filename": "CVE-2025-39697-c32e3c71aaa1c1ba05da88605e2ddd493c58794f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39697/CVE-2025-39697-c32e3c71aaa1c1ba05da88605e2ddd493c58794f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f230d40147cc37eb3aef4d50e2e2c06ea73d9a77",
                "patch_url": "https://git.kernel.org/stable/p/f230d40147cc37eb3aef4d50e2e2c06ea73d9a77",
                "filename": "CVE-2025-39697-f230d40147cc37eb3aef4d50e2e2c06ea73d9a77.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39697/CVE-2025-39697-f230d40147cc37eb3aef4d50e2e2c06ea73d9a77.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0ff42a32784e0f2cb46a46da8e9f473538c13e1b",
            "https://git.kernel.org/stable/c/181feb41f0b268e6288bf9a7b984624d7fe2031d",
            "https://git.kernel.org/stable/c/202a3432d21ac060629a760fff3b0a39859da3ea",
            "https://git.kernel.org/stable/c/76d2e3890fb169168c73f2e4f8375c7cc24a765e",
            "https://git.kernel.org/stable/c/92278ae36935a54e65fef9f8ea8efe7e80481ace",
            "https://git.kernel.org/stable/c/c32e3c71aaa1c1ba05da88605e2ddd493c58794f",
            "https://git.kernel.org/stable/c/f230d40147cc37eb3aef4d50e2e2c06ea73d9a77",
            "https://www.cve.org/CVERecord?id=CVE-2025-39697\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39697\nhttps://lore.kernel.org/linux-cve-announce/2025090548-CVE-2025-39697-5284@gregkh/T"
        ]
    },
    "CVE-2025-39718": {
        "cve": "CVE-2025-39718",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: Validate length in packet header before skb_put()\n\nWhen receiving a vsock packet in the guest, only the virtqueue buffer\nsize is validated prior to virtio_vsock_skb_rx_put(). Unfortunately,\nvirtio_vsock_skb_rx_put() uses the length from the packet header as the\nlength argument to skb_put(), potentially resulting in SKB overflow if\nthe host has gone wonky.\n\nValidate the length as advertised by the packet header before calling\nvirtio_vsock_skb_rx_put().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39718",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0dab92484474587b82e8e0455839eaf5ac7bf894",
            "patch_url": "https://git.kernel.org/stable/p/0dab92484474587b82e8e0455839eaf5ac7bf894",
            "filename": "CVE-2025-39718-0dab92484474587b82e8e0455839eaf5ac7bf894.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39718/CVE-2025-39718-0dab92484474587b82e8e0455839eaf5ac7bf894.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0dab92484474587b82e8e0455839eaf5ac7bf894",
                "patch_url": "https://git.kernel.org/stable/p/0dab92484474587b82e8e0455839eaf5ac7bf894",
                "filename": "CVE-2025-39718-0dab92484474587b82e8e0455839eaf5ac7bf894.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39718/CVE-2025-39718-0dab92484474587b82e8e0455839eaf5ac7bf894.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/676f03760ca1d69c2470cef36c44dc152494b47c",
                "patch_url": "https://git.kernel.org/stable/p/676f03760ca1d69c2470cef36c44dc152494b47c",
                "filename": "CVE-2025-39718-676f03760ca1d69c2470cef36c44dc152494b47c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39718/CVE-2025-39718-676f03760ca1d69c2470cef36c44dc152494b47c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/969b06bd8b7560efb100a34227619e7d318fbe05",
                "patch_url": "https://git.kernel.org/stable/p/969b06bd8b7560efb100a34227619e7d318fbe05",
                "filename": "CVE-2025-39718-969b06bd8b7560efb100a34227619e7d318fbe05.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39718/CVE-2025-39718-969b06bd8b7560efb100a34227619e7d318fbe05.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ee438c492b2e0705d819ac0e25d04fae758d8f8f",
                "patch_url": "https://git.kernel.org/stable/p/ee438c492b2e0705d819ac0e25d04fae758d8f8f",
                "filename": "CVE-2025-39718-ee438c492b2e0705d819ac0e25d04fae758d8f8f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39718/CVE-2025-39718-ee438c492b2e0705d819ac0e25d04fae758d8f8f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/faf332a10372390ce65d0b803888f4b25a388335",
                "patch_url": "https://git.kernel.org/stable/p/faf332a10372390ce65d0b803888f4b25a388335",
                "filename": "CVE-2025-39718-faf332a10372390ce65d0b803888f4b25a388335.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39718/CVE-2025-39718-faf332a10372390ce65d0b803888f4b25a388335.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0dab92484474587b82e8e0455839eaf5ac7bf894",
            "https://git.kernel.org/stable/c/676f03760ca1d69c2470cef36c44dc152494b47c",
            "https://git.kernel.org/stable/c/969b06bd8b7560efb100a34227619e7d318fbe05",
            "https://git.kernel.org/stable/c/ee438c492b2e0705d819ac0e25d04fae758d8f8f",
            "https://git.kernel.org/stable/c/faf332a10372390ce65d0b803888f4b25a388335",
            "https://www.cve.org/CVERecord?id=CVE-2025-39718\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39718\nhttps://lore.kernel.org/linux-cve-announce/2025090551-CVE-2025-39718-2e2c@gregkh/T"
        ]
    },
    "CVE-2025-39730": {
        "cve": "CVE-2025-39730",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix filehandle bounds checking in nfs_fh_to_dentry()\n\nThe function needs to check the minimal filehandle length before it can\naccess the embedded filehandle.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39730",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/12ad3def2e5e0b120e3d0cb6ce8b7b796819ad40",
            "patch_url": "https://git.kernel.org/stable/p/12ad3def2e5e0b120e3d0cb6ce8b7b796819ad40",
            "filename": "CVE-2025-39730-12ad3def2e5e0b120e3d0cb6ce8b7b796819ad40.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39730/CVE-2025-39730-12ad3def2e5e0b120e3d0cb6ce8b7b796819ad40.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/12ad3def2e5e0b120e3d0cb6ce8b7b796819ad40",
                "patch_url": "https://git.kernel.org/stable/p/12ad3def2e5e0b120e3d0cb6ce8b7b796819ad40",
                "filename": "CVE-2025-39730-12ad3def2e5e0b120e3d0cb6ce8b7b796819ad40.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39730/CVE-2025-39730-12ad3def2e5e0b120e3d0cb6ce8b7b796819ad40.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2ad40b7992aa26bc631afc1a995b0e3ddc30de3f",
                "patch_url": "https://git.kernel.org/stable/p/2ad40b7992aa26bc631afc1a995b0e3ddc30de3f",
                "filename": "CVE-2025-39730-2ad40b7992aa26bc631afc1a995b0e3ddc30de3f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39730/CVE-2025-39730-2ad40b7992aa26bc631afc1a995b0e3ddc30de3f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3570ef5c31314c13274c935a20b91768ab5bf412",
                "patch_url": "https://git.kernel.org/stable/p/3570ef5c31314c13274c935a20b91768ab5bf412",
                "filename": "CVE-2025-39730-3570ef5c31314c13274c935a20b91768ab5bf412.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39730/CVE-2025-39730-3570ef5c31314c13274c935a20b91768ab5bf412.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/763810bb883cb4de412a72f338d80947d97df67b",
                "patch_url": "https://git.kernel.org/stable/p/763810bb883cb4de412a72f338d80947d97df67b",
                "filename": "CVE-2025-39730-763810bb883cb4de412a72f338d80947d97df67b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39730/CVE-2025-39730-763810bb883cb4de412a72f338d80947d97df67b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7dd36f7477d1e03a1fcf8d13531ca326c4fb599f",
                "patch_url": "https://git.kernel.org/stable/p/7dd36f7477d1e03a1fcf8d13531ca326c4fb599f",
                "filename": "CVE-2025-39730-7dd36f7477d1e03a1fcf8d13531ca326c4fb599f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39730/CVE-2025-39730-7dd36f7477d1e03a1fcf8d13531ca326c4fb599f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7f8eca87fef7519e9c41f3258f25ebc2752247ee",
                "patch_url": "https://git.kernel.org/stable/p/7f8eca87fef7519e9c41f3258f25ebc2752247ee",
                "filename": "CVE-2025-39730-7f8eca87fef7519e9c41f3258f25ebc2752247ee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39730/CVE-2025-39730-7f8eca87fef7519e9c41f3258f25ebc2752247ee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7f7866932466332a2528fda099000b035303485",
                "patch_url": "https://git.kernel.org/stable/p/b7f7866932466332a2528fda099000b035303485",
                "filename": "CVE-2025-39730-b7f7866932466332a2528fda099000b035303485.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39730/CVE-2025-39730-b7f7866932466332a2528fda099000b035303485.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cb09afa0948d96b1e385d609ed044bb1aa043536",
                "patch_url": "https://git.kernel.org/stable/p/cb09afa0948d96b1e385d609ed044bb1aa043536",
                "filename": "CVE-2025-39730-cb09afa0948d96b1e385d609ed044bb1aa043536.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39730/CVE-2025-39730-cb09afa0948d96b1e385d609ed044bb1aa043536.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ef93a685e01a281b5e2a25ce4e3428cf9371a205",
                "patch_url": "https://git.kernel.org/stable/p/ef93a685e01a281b5e2a25ce4e3428cf9371a205",
                "filename": "CVE-2025-39730-ef93a685e01a281b5e2a25ce4e3428cf9371a205.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39730/CVE-2025-39730-ef93a685e01a281b5e2a25ce4e3428cf9371a205.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/12ad3def2e5e0b120e3d0cb6ce8b7b796819ad40",
            "https://git.kernel.org/stable/c/2ad40b7992aa26bc631afc1a995b0e3ddc30de3f",
            "https://git.kernel.org/stable/c/3570ef5c31314c13274c935a20b91768ab5bf412",
            "https://git.kernel.org/stable/c/763810bb883cb4de412a72f338d80947d97df67b",
            "https://git.kernel.org/stable/c/7dd36f7477d1e03a1fcf8d13531ca326c4fb599f",
            "https://git.kernel.org/stable/c/7f8eca87fef7519e9c41f3258f25ebc2752247ee",
            "https://git.kernel.org/stable/c/b7f7866932466332a2528fda099000b035303485",
            "https://git.kernel.org/stable/c/cb09afa0948d96b1e385d609ed044bb1aa043536",
            "https://git.kernel.org/stable/c/ef93a685e01a281b5e2a25ce4e3428cf9371a205",
            "https://www.cve.org/CVERecord?id=CVE-2025-39730\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39730\nhttps://lore.kernel.org/linux-cve-announce/2025090730-CVE-2025-39730-72c9@gregkh/T"
        ]
    },
    "CVE-2025-39751": {
        "cve": "CVE-2025-39751",
        "cvss_v2": null,
        "cvss_v3": "0.0",
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39751",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/86a024a5a521da362fb67a3a6a84f54331503326",
            "patch_url": "https://git.kernel.org/stable/p/86a024a5a521da362fb67a3a6a84f54331503326",
            "filename": "CVE-2025-39751-86a024a5a521da362fb67a3a6a84f54331503326.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39751/CVE-2025-39751-86a024a5a521da362fb67a3a6a84f54331503326.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/04fa6f5e94034654da3505d9e908dd9090f0e83c",
                "patch_url": "https://git.kernel.org/stable/p/04fa6f5e94034654da3505d9e908dd9090f0e83c",
                "filename": "CVE-2025-39751-04fa6f5e94034654da3505d9e908dd9090f0e83c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39751/CVE-2025-39751-04fa6f5e94034654da3505d9e908dd9090f0e83c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/0de69bc9b3661e16c4b08b34949529553906f5e1",
                "patch_url": "https://git.kernel.org/stable/p/0de69bc9b3661e16c4b08b34949529553906f5e1",
                "filename": "CVE-2025-39751-0de69bc9b3661e16c4b08b34949529553906f5e1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39751/CVE-2025-39751-0de69bc9b3661e16c4b08b34949529553906f5e1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/195e4cec1007c34ddeb0ce61ef14ce9ab312544f",
                "patch_url": "https://git.kernel.org/stable/p/195e4cec1007c34ddeb0ce61ef14ce9ab312544f",
                "filename": "CVE-2025-39751-195e4cec1007c34ddeb0ce61ef14ce9ab312544f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39751/CVE-2025-39751-195e4cec1007c34ddeb0ce61ef14ce9ab312544f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/417407cdf587e3ae41a0e728daa562ee88fc1bd6",
                "patch_url": "https://git.kernel.org/stable/p/417407cdf587e3ae41a0e728daa562ee88fc1bd6",
                "filename": "CVE-2025-39751-417407cdf587e3ae41a0e728daa562ee88fc1bd6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39751/CVE-2025-39751-417407cdf587e3ae41a0e728daa562ee88fc1bd6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/86a024a5a521da362fb67a3a6a84f54331503326",
                "patch_url": "https://git.kernel.org/stable/p/86a024a5a521da362fb67a3a6a84f54331503326",
                "filename": "CVE-2025-39751-86a024a5a521da362fb67a3a6a84f54331503326.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39751/CVE-2025-39751-86a024a5a521da362fb67a3a6a84f54331503326.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a409c60111e6bb98fcabab2aeaa069daa9434ca0",
                "patch_url": "https://git.kernel.org/stable/p/a409c60111e6bb98fcabab2aeaa069daa9434ca0",
                "filename": "CVE-2025-39751-a409c60111e6bb98fcabab2aeaa069daa9434ca0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39751/CVE-2025-39751-a409c60111e6bb98fcabab2aeaa069daa9434ca0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c2dacfe495b72699a9480c95f8eef2285042e474",
                "patch_url": "https://git.kernel.org/stable/p/c2dacfe495b72699a9480c95f8eef2285042e474",
                "filename": "CVE-2025-39751-c2dacfe495b72699a9480c95f8eef2285042e474.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39751/CVE-2025-39751-c2dacfe495b72699a9480c95f8eef2285042e474.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf494138b9d7f78bcb510b9ea5f5faa6e882a7a3",
                "patch_url": "https://git.kernel.org/stable/p/cf494138b9d7f78bcb510b9ea5f5faa6e882a7a3",
                "filename": "CVE-2025-39751-cf494138b9d7f78bcb510b9ea5f5faa6e882a7a3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39751/CVE-2025-39751-cf494138b9d7f78bcb510b9ea5f5faa6e882a7a3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fb8116c38d67d6e23f3b5e34bbc8d9f8c12e81e5",
                "patch_url": "https://git.kernel.org/stable/p/fb8116c38d67d6e23f3b5e34bbc8d9f8c12e81e5",
                "filename": "CVE-2025-39751-fb8116c38d67d6e23f3b5e34bbc8d9f8c12e81e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39751/CVE-2025-39751-fb8116c38d67d6e23f3b5e34bbc8d9f8c12e81e5.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/04fa6f5e94034654da3505d9e908dd9090f0e83c",
            "https://git.kernel.org/stable/c/0de69bc9b3661e16c4b08b34949529553906f5e1",
            "https://git.kernel.org/stable/c/195e4cec1007c34ddeb0ce61ef14ce9ab312544f",
            "https://git.kernel.org/stable/c/417407cdf587e3ae41a0e728daa562ee88fc1bd6",
            "https://git.kernel.org/stable/c/86a024a5a521da362fb67a3a6a84f54331503326",
            "https://git.kernel.org/stable/c/a409c60111e6bb98fcabab2aeaa069daa9434ca0",
            "https://git.kernel.org/stable/c/c2dacfe495b72699a9480c95f8eef2285042e474",
            "https://git.kernel.org/stable/c/cf494138b9d7f78bcb510b9ea5f5faa6e882a7a3",
            "https://git.kernel.org/stable/c/fb8116c38d67d6e23f3b5e34bbc8d9f8c12e81e5",
            "https://www.cve.org/CVERecord?id=CVE-2025-39751\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39751\nhttps://lore.kernel.org/linux-cve-announce/2025091142-CVE-2025-39751-c340@gregkh/T"
        ]
    },
    "CVE-2025-39757": {
        "cve": "CVE-2025-39757",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Validate UAC3 cluster segment descriptors\n\nUAC3 class segment descriptors need to be verified whether their sizes\nmatch with the declared lengths and whether they fit with the\nallocated buffer sizes, too.  Otherwise malicious firmware may lead to\nthe unexpected OOB accesses.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39757",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/799c06ad4c9c790c265e8b6b94947213f1fb389c",
            "patch_url": "https://git.kernel.org/stable/p/799c06ad4c9c790c265e8b6b94947213f1fb389c",
            "filename": "CVE-2025-39757-799c06ad4c9c790c265e8b6b94947213f1fb389c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39757/CVE-2025-39757-799c06ad4c9c790c265e8b6b94947213f1fb389c.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1034719fdefd26caeec0a44a868bb5a412c2c1a5",
                "patch_url": "https://git.kernel.org/stable/p/1034719fdefd26caeec0a44a868bb5a412c2c1a5",
                "filename": "CVE-2025-39757-1034719fdefd26caeec0a44a868bb5a412c2c1a5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39757/CVE-2025-39757-1034719fdefd26caeec0a44a868bb5a412c2c1a5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/275e37532e8ebe25e8a4069b2d9f955bfd202a46",
                "patch_url": "https://git.kernel.org/stable/p/275e37532e8ebe25e8a4069b2d9f955bfd202a46",
                "filename": "CVE-2025-39757-275e37532e8ebe25e8a4069b2d9f955bfd202a46.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39757/CVE-2025-39757-275e37532e8ebe25e8a4069b2d9f955bfd202a46.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/47ab3d820cb0a502bd0074f83bb3cf7ab5d79902",
                "patch_url": "https://git.kernel.org/stable/p/47ab3d820cb0a502bd0074f83bb3cf7ab5d79902",
                "filename": "CVE-2025-39757-47ab3d820cb0a502bd0074f83bb3cf7ab5d79902.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39757/CVE-2025-39757-47ab3d820cb0a502bd0074f83bb3cf7ab5d79902.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/786571b10b1ae6d90e1242848ce78ee7e1d493c4",
                "patch_url": "https://git.kernel.org/stable/p/786571b10b1ae6d90e1242848ce78ee7e1d493c4",
                "filename": "CVE-2025-39757-786571b10b1ae6d90e1242848ce78ee7e1d493c4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39757/CVE-2025-39757-786571b10b1ae6d90e1242848ce78ee7e1d493c4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/799c06ad4c9c790c265e8b6b94947213f1fb389c",
                "patch_url": "https://git.kernel.org/stable/p/799c06ad4c9c790c265e8b6b94947213f1fb389c",
                "filename": "CVE-2025-39757-799c06ad4c9c790c265e8b6b94947213f1fb389c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39757/CVE-2025-39757-799c06ad4c9c790c265e8b6b94947213f1fb389c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7ef3fd250f84494fb2f7871f357808edaa1fc6ce",
                "patch_url": "https://git.kernel.org/stable/p/7ef3fd250f84494fb2f7871f357808edaa1fc6ce",
                "filename": "CVE-2025-39757-7ef3fd250f84494fb2f7871f357808edaa1fc6ce.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39757/CVE-2025-39757-7ef3fd250f84494fb2f7871f357808edaa1fc6ce.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ae17b3b5e753efc239421d186cd1ff06e5ac296e",
                "patch_url": "https://git.kernel.org/stable/p/ae17b3b5e753efc239421d186cd1ff06e5ac296e",
                "filename": "CVE-2025-39757-ae17b3b5e753efc239421d186cd1ff06e5ac296e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39757/CVE-2025-39757-ae17b3b5e753efc239421d186cd1ff06e5ac296e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dfdcbcde5c20df878178245d4449feada7d5b201",
                "patch_url": "https://git.kernel.org/stable/p/dfdcbcde5c20df878178245d4449feada7d5b201",
                "filename": "CVE-2025-39757-dfdcbcde5c20df878178245d4449feada7d5b201.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39757/CVE-2025-39757-dfdcbcde5c20df878178245d4449feada7d5b201.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ecfd41166b72b67d3bdeb88d224ff445f6163869",
                "patch_url": "https://git.kernel.org/stable/p/ecfd41166b72b67d3bdeb88d224ff445f6163869",
                "filename": "CVE-2025-39757-ecfd41166b72b67d3bdeb88d224ff445f6163869.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39757/CVE-2025-39757-ecfd41166b72b67d3bdeb88d224ff445f6163869.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1034719fdefd26caeec0a44a868bb5a412c2c1a5",
            "https://git.kernel.org/stable/c/275e37532e8ebe25e8a4069b2d9f955bfd202a46",
            "https://git.kernel.org/stable/c/47ab3d820cb0a502bd0074f83bb3cf7ab5d79902",
            "https://git.kernel.org/stable/c/786571b10b1ae6d90e1242848ce78ee7e1d493c4",
            "https://git.kernel.org/stable/c/799c06ad4c9c790c265e8b6b94947213f1fb389c",
            "https://git.kernel.org/stable/c/7ef3fd250f84494fb2f7871f357808edaa1fc6ce",
            "https://git.kernel.org/stable/c/ae17b3b5e753efc239421d186cd1ff06e5ac296e",
            "https://git.kernel.org/stable/c/dfdcbcde5c20df878178245d4449feada7d5b201",
            "https://git.kernel.org/stable/c/ecfd41166b72b67d3bdeb88d224ff445f6163869",
            "https://www.cve.org/CVERecord?id=CVE-2025-39757\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39757\nhttps://lore.kernel.org/linux-cve-announce/2025091144-CVE-2025-39757-e212@gregkh/T"
        ]
    },
    "CVE-2025-39760": {
        "cve": "CVE-2025-39760",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: core: config: Prevent OOB read in SS endpoint companion parsing\n\nusb_parse_ss_endpoint_companion() checks descriptor type before length,\nenabling a potentially odd read outside of the buffer size.\n\nFix this up by checking the size first before looking at any of the\nfields in the descriptor.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39760",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/058ad2b722812708fe90567875704ae36563e33b",
            "patch_url": "https://git.kernel.org/stable/p/058ad2b722812708fe90567875704ae36563e33b",
            "filename": "CVE-2025-39760-058ad2b722812708fe90567875704ae36563e33b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39760/CVE-2025-39760-058ad2b722812708fe90567875704ae36563e33b.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/058ad2b722812708fe90567875704ae36563e33b",
                "patch_url": "https://git.kernel.org/stable/p/058ad2b722812708fe90567875704ae36563e33b",
                "filename": "CVE-2025-39760-058ad2b722812708fe90567875704ae36563e33b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39760/CVE-2025-39760-058ad2b722812708fe90567875704ae36563e33b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4fe6f472f0beef4281e6f03bc38a910a33be663f",
                "patch_url": "https://git.kernel.org/stable/p/4fe6f472f0beef4281e6f03bc38a910a33be663f",
                "filename": "CVE-2025-39760-4fe6f472f0beef4281e6f03bc38a910a33be663f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39760/CVE-2025-39760-4fe6f472f0beef4281e6f03bc38a910a33be663f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5badd56c711e2c8371d1670f9bd486697575423c",
                "patch_url": "https://git.kernel.org/stable/p/5badd56c711e2c8371d1670f9bd486697575423c",
                "filename": "CVE-2025-39760-5badd56c711e2c8371d1670f9bd486697575423c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39760/CVE-2025-39760-5badd56c711e2c8371d1670f9bd486697575423c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5c3097ede7835d3caf6543eb70ff689af4550cd2",
                "patch_url": "https://git.kernel.org/stable/p/5c3097ede7835d3caf6543eb70ff689af4550cd2",
                "filename": "CVE-2025-39760-5c3097ede7835d3caf6543eb70ff689af4550cd2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39760/CVE-2025-39760-5c3097ede7835d3caf6543eb70ff689af4550cd2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9512510cee7d1becdb0e9413fdd3ab783e4e30ee",
                "patch_url": "https://git.kernel.org/stable/p/9512510cee7d1becdb0e9413fdd3ab783e4e30ee",
                "filename": "CVE-2025-39760-9512510cee7d1becdb0e9413fdd3ab783e4e30ee.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39760/CVE-2025-39760-9512510cee7d1becdb0e9413fdd3ab783e4e30ee.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9843bcb187cb933861f7805022e6873905f669e4",
                "patch_url": "https://git.kernel.org/stable/p/9843bcb187cb933861f7805022e6873905f669e4",
                "filename": "CVE-2025-39760-9843bcb187cb933861f7805022e6873905f669e4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39760/CVE-2025-39760-9843bcb187cb933861f7805022e6873905f669e4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b10e0f868067c6f25bbfabdcf3e1e6432c24ca55",
                "patch_url": "https://git.kernel.org/stable/p/b10e0f868067c6f25bbfabdcf3e1e6432c24ca55",
                "filename": "CVE-2025-39760-b10e0f868067c6f25bbfabdcf3e1e6432c24ca55.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39760/CVE-2025-39760-b10e0f868067c6f25bbfabdcf3e1e6432c24ca55.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cf16f408364efd8a68f39011a3b073c83a03612d",
                "patch_url": "https://git.kernel.org/stable/p/cf16f408364efd8a68f39011a3b073c83a03612d",
                "filename": "CVE-2025-39760-cf16f408364efd8a68f39011a3b073c83a03612d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39760/CVE-2025-39760-cf16f408364efd8a68f39011a3b073c83a03612d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/058ad2b722812708fe90567875704ae36563e33b",
            "https://git.kernel.org/stable/c/4fe6f472f0beef4281e6f03bc38a910a33be663f",
            "https://git.kernel.org/stable/c/5badd56c711e2c8371d1670f9bd486697575423c",
            "https://git.kernel.org/stable/c/5c3097ede7835d3caf6543eb70ff689af4550cd2",
            "https://git.kernel.org/stable/c/9512510cee7d1becdb0e9413fdd3ab783e4e30ee",
            "https://git.kernel.org/stable/c/9843bcb187cb933861f7805022e6873905f669e4",
            "https://git.kernel.org/stable/c/b10e0f868067c6f25bbfabdcf3e1e6432c24ca55",
            "https://git.kernel.org/stable/c/cf16f408364efd8a68f39011a3b073c83a03612d",
            "https://www.cve.org/CVERecord?id=CVE-2025-39760\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39760\nhttps://lore.kernel.org/linux-cve-announce/2025091145-CVE-2025-39760-2d5f@gregkh/T"
        ]
    },
    "CVE-2025-39817": {
        "cve": "CVE-2025-39817",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: Fix slab-out-of-bounds in efivarfs_d_compare\n\nObserved on kernel 6.6 (present on master as well):\n\n  BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0\n  Call trace:\n   kasan_check_range+0xe8/0x190\n   __asan_loadN+0x1c/0x28\n   memcmp+0x98/0xd0\n   efivarfs_d_compare+0x68/0xd8\n   __d_lookup_rcu_op_compare+0x178/0x218\n   __d_lookup_rcu+0x1f8/0x228\n   d_alloc_parallel+0x150/0x648\n   lookup_open.isra.0+0x5f0/0x8d0\n   open_last_lookups+0x264/0x828\n   path_openat+0x130/0x3f8\n   do_filp_open+0x114/0x248\n   do_sys_openat2+0x340/0x3c0\n   __arm64_sys_openat+0x120/0x1a0\n\nIf dentry->d_name.len < EFI_VARIABLE_GUID_LEN , 'guid' can become\nnegative, leadings to oob. The issue can be triggered by parallel\nlookups using invalid filename:\n\n  T1\t\t\tT2\n  lookup_open\n   ->lookup\n    simple_lookup\n     d_add\n     // invalid dentry is added to hash list\n\n\t\t\tlookup_open\n\t\t\t d_alloc_parallel\n\t\t\t  __d_lookup_rcu\n\t\t\t   __d_lookup_rcu_op_compare\n\t\t\t    hlist_bl_for_each_entry_rcu\n\t\t\t    // invalid dentry can be retrieved\n\t\t\t     ->d_compare\n\t\t\t      efivarfs_d_compare\n\t\t\t      // oob\n\nFix it by checking 'guid' before cmp.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39817",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/568e7761279b99c6daa3002290fd6d8047ddb6d2",
            "patch_url": "https://git.kernel.org/stable/p/568e7761279b99c6daa3002290fd6d8047ddb6d2",
            "filename": "CVE-2025-39817-568e7761279b99c6daa3002290fd6d8047ddb6d2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39817/CVE-2025-39817-568e7761279b99c6daa3002290fd6d8047ddb6d2.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0f63fbabeaaaaaaf5b742a2f4c1b4590d50bf1f6",
                "patch_url": "https://git.kernel.org/stable/p/0f63fbabeaaaaaaf5b742a2f4c1b4590d50bf1f6",
                "filename": "CVE-2025-39817-0f63fbabeaaaaaaf5b742a2f4c1b4590d50bf1f6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39817/CVE-2025-39817-0f63fbabeaaaaaaf5b742a2f4c1b4590d50bf1f6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/568e7761279b99c6daa3002290fd6d8047ddb6d2",
                "patch_url": "https://git.kernel.org/stable/p/568e7761279b99c6daa3002290fd6d8047ddb6d2",
                "filename": "CVE-2025-39817-568e7761279b99c6daa3002290fd6d8047ddb6d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39817/CVE-2025-39817-568e7761279b99c6daa3002290fd6d8047ddb6d2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/71581a82f38e5a4d807d71fc1bb59aead80ccf95",
                "patch_url": "https://git.kernel.org/stable/p/71581a82f38e5a4d807d71fc1bb59aead80ccf95",
                "filename": "CVE-2025-39817-71581a82f38e5a4d807d71fc1bb59aead80ccf95.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39817/CVE-2025-39817-71581a82f38e5a4d807d71fc1bb59aead80ccf95.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/794399019301944fd6d2e0d7a51b3327e26c410e",
                "patch_url": "https://git.kernel.org/stable/p/794399019301944fd6d2e0d7a51b3327e26c410e",
                "filename": "CVE-2025-39817-794399019301944fd6d2e0d7a51b3327e26c410e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39817/CVE-2025-39817-794399019301944fd6d2e0d7a51b3327e26c410e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/925599eba46045930b850a98ae594d2e3028ac40",
                "patch_url": "https://git.kernel.org/stable/p/925599eba46045930b850a98ae594d2e3028ac40",
                "filename": "CVE-2025-39817-925599eba46045930b850a98ae594d2e3028ac40.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39817/CVE-2025-39817-925599eba46045930b850a98ae594d2e3028ac40.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a6358f8cf64850f3f27857b8ed8c1b08cfc4685c",
                "patch_url": "https://git.kernel.org/stable/p/a6358f8cf64850f3f27857b8ed8c1b08cfc4685c",
                "filename": "CVE-2025-39817-a6358f8cf64850f3f27857b8ed8c1b08cfc4685c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39817/CVE-2025-39817-a6358f8cf64850f3f27857b8ed8c1b08cfc4685c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c2925cd6207079c3f4d040d082515db78d63afbf",
                "patch_url": "https://git.kernel.org/stable/p/c2925cd6207079c3f4d040d082515db78d63afbf",
                "filename": "CVE-2025-39817-c2925cd6207079c3f4d040d082515db78d63afbf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39817/CVE-2025-39817-c2925cd6207079c3f4d040d082515db78d63afbf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d7f5e35e70507d10cbaff5f9e194ed54c4ee14f7",
                "patch_url": "https://git.kernel.org/stable/p/d7f5e35e70507d10cbaff5f9e194ed54c4ee14f7",
                "filename": "CVE-2025-39817-d7f5e35e70507d10cbaff5f9e194ed54c4ee14f7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39817/CVE-2025-39817-d7f5e35e70507d10cbaff5f9e194ed54c4ee14f7.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0f63fbabeaaaaaaf5b742a2f4c1b4590d50bf1f6",
            "https://git.kernel.org/stable/c/568e7761279b99c6daa3002290fd6d8047ddb6d2",
            "https://git.kernel.org/stable/c/71581a82f38e5a4d807d71fc1bb59aead80ccf95",
            "https://git.kernel.org/stable/c/794399019301944fd6d2e0d7a51b3327e26c410e",
            "https://git.kernel.org/stable/c/925599eba46045930b850a98ae594d2e3028ac40",
            "https://git.kernel.org/stable/c/a6358f8cf64850f3f27857b8ed8c1b08cfc4685c",
            "https://git.kernel.org/stable/c/c2925cd6207079c3f4d040d082515db78d63afbf",
            "https://git.kernel.org/stable/c/d7f5e35e70507d10cbaff5f9e194ed54c4ee14f7",
            "https://www.cve.org/CVERecord?id=CVE-2025-39817\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39817\nhttps://lore.kernel.org/linux-cve-announce/2025091615-CVE-2025-39817-90b7@gregkh/T"
        ]
    },
    "CVE-2025-39825": {
        "cve": "CVE-2025-39825",
        "cvss_v2": null,
        "cvss_v3": 4.7,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix race with concurrent opens in rename(2)\n\nBesides sending the rename request to the server, the rename process\nalso involves closing any deferred close, waiting for outstanding I/O\nto complete as well as marking all existing open handles as deleted to\nprevent them from deferring closes, which increases the race window\nfor potential concurrent opens on the target file.\n\nFix this by unhashing the dentry in advance to prevent any concurrent\nopens on the target.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39825",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/24b9ed739c8c5b464d983e12cf308982f3ae93c2",
            "patch_url": "https://git.kernel.org/stable/p/24b9ed739c8c5b464d983e12cf308982f3ae93c2",
            "filename": "CVE-2025-39825-24b9ed739c8c5b464d983e12cf308982f3ae93c2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39825/CVE-2025-39825-24b9ed739c8c5b464d983e12cf308982f3ae93c2.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/24b9ed739c8c5b464d983e12cf308982f3ae93c2",
                "patch_url": "https://git.kernel.org/stable/p/24b9ed739c8c5b464d983e12cf308982f3ae93c2",
                "filename": "CVE-2025-39825-24b9ed739c8c5b464d983e12cf308982f3ae93c2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39825/CVE-2025-39825-24b9ed739c8c5b464d983e12cf308982f3ae93c2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/289f945acb20b9b54fe4d13895e44aa58965ddb2",
                "patch_url": "https://git.kernel.org/stable/p/289f945acb20b9b54fe4d13895e44aa58965ddb2",
                "filename": "CVE-2025-39825-289f945acb20b9b54fe4d13895e44aa58965ddb2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39825/CVE-2025-39825-289f945acb20b9b54fe4d13895e44aa58965ddb2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c9991af5e09924f6f3b3e6996a5e09f9504b4358",
                "patch_url": "https://git.kernel.org/stable/p/c9991af5e09924f6f3b3e6996a5e09f9504b4358",
                "filename": "CVE-2025-39825-c9991af5e09924f6f3b3e6996a5e09f9504b4358.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39825/CVE-2025-39825-c9991af5e09924f6f3b3e6996a5e09f9504b4358.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c9e7de284da0be5b44dbe79d71573f9f7f9b144c",
                "patch_url": "https://git.kernel.org/stable/p/c9e7de284da0be5b44dbe79d71573f9f7f9b144c",
                "filename": "CVE-2025-39825-c9e7de284da0be5b44dbe79d71573f9f7f9b144c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39825/CVE-2025-39825-c9e7de284da0be5b44dbe79d71573f9f7f9b144c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d84291fc7453df7881a970716f8256273aca5747",
                "patch_url": "https://git.kernel.org/stable/p/d84291fc7453df7881a970716f8256273aca5747",
                "filename": "CVE-2025-39825-d84291fc7453df7881a970716f8256273aca5747.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39825/CVE-2025-39825-d84291fc7453df7881a970716f8256273aca5747.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/24b9ed739c8c5b464d983e12cf308982f3ae93c2",
            "https://git.kernel.org/stable/c/289f945acb20b9b54fe4d13895e44aa58965ddb2",
            "https://git.kernel.org/stable/c/c9991af5e09924f6f3b3e6996a5e09f9504b4358",
            "https://git.kernel.org/stable/c/c9e7de284da0be5b44dbe79d71573f9f7f9b144c",
            "https://git.kernel.org/stable/c/d84291fc7453df7881a970716f8256273aca5747",
            "https://www.cve.org/CVERecord?id=CVE-2025-39825\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39825\nhttps://lore.kernel.org/linux-cve-announce/2025091616-CVE-2025-39825-8a7a@gregkh/T"
        ]
    },
    "CVE-2025-39841": {
        "cve": "CVE-2025-39841",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix buffer free/clear order in deferred receive path\n\nFix a use-after-free window by correcting the buffer release sequence in\nthe deferred receive path. The code freed the RQ buffer first and only\nthen cleared the context pointer under the lock. Concurrent paths (e.g.,\nABTS and the repost path) also inspect and release the same pointer under\nthe lock, so the old order could lead to double-free/UAF.\n\nNote that the repost path already uses the correct pattern: detach the\npointer under the lock, then free it after dropping the lock. The\ndeferred path should do the same.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39841",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/367cb5ffd8a8a4c85dc89f55e7fa7cc191425b11",
            "patch_url": "https://git.kernel.org/stable/p/367cb5ffd8a8a4c85dc89f55e7fa7cc191425b11",
            "filename": "CVE-2025-39841-367cb5ffd8a8a4c85dc89f55e7fa7cc191425b11.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39841/CVE-2025-39841-367cb5ffd8a8a4c85dc89f55e7fa7cc191425b11.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/367cb5ffd8a8a4c85dc89f55e7fa7cc191425b11",
                "patch_url": "https://git.kernel.org/stable/p/367cb5ffd8a8a4c85dc89f55e7fa7cc191425b11",
                "filename": "CVE-2025-39841-367cb5ffd8a8a4c85dc89f55e7fa7cc191425b11.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39841/CVE-2025-39841-367cb5ffd8a8a4c85dc89f55e7fa7cc191425b11.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/55658c7501467ca9ef3bd4453dd920010db8bc13",
                "patch_url": "https://git.kernel.org/stable/p/55658c7501467ca9ef3bd4453dd920010db8bc13",
                "filename": "CVE-2025-39841-55658c7501467ca9ef3bd4453dd920010db8bc13.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39841/CVE-2025-39841-55658c7501467ca9ef3bd4453dd920010db8bc13.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/897f64b01c1249ac730329b83f4f40bab71e86c7",
                "patch_url": "https://git.kernel.org/stable/p/897f64b01c1249ac730329b83f4f40bab71e86c7",
                "filename": "CVE-2025-39841-897f64b01c1249ac730329b83f4f40bab71e86c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39841/CVE-2025-39841-897f64b01c1249ac730329b83f4f40bab71e86c7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/95b63d15fce5c54a73bbf195e1aacb5a75b128e2",
                "patch_url": "https://git.kernel.org/stable/p/95b63d15fce5c54a73bbf195e1aacb5a75b128e2",
                "filename": "CVE-2025-39841-95b63d15fce5c54a73bbf195e1aacb5a75b128e2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39841/CVE-2025-39841-95b63d15fce5c54a73bbf195e1aacb5a75b128e2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9dba9a45c348e8460da97c450cddf70b2056deb3",
                "patch_url": "https://git.kernel.org/stable/p/9dba9a45c348e8460da97c450cddf70b2056deb3",
                "filename": "CVE-2025-39841-9dba9a45c348e8460da97c450cddf70b2056deb3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39841/CVE-2025-39841-9dba9a45c348e8460da97c450cddf70b2056deb3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ab34084f42ee06a9028d67c78feafb911d33d111",
                "patch_url": "https://git.kernel.org/stable/p/ab34084f42ee06a9028d67c78feafb911d33d111",
                "filename": "CVE-2025-39841-ab34084f42ee06a9028d67c78feafb911d33d111.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39841/CVE-2025-39841-ab34084f42ee06a9028d67c78feafb911d33d111.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/baa39f6ad79d372a6ce0aa639fbb2f1578479f57",
                "patch_url": "https://git.kernel.org/stable/p/baa39f6ad79d372a6ce0aa639fbb2f1578479f57",
                "filename": "CVE-2025-39841-baa39f6ad79d372a6ce0aa639fbb2f1578479f57.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39841/CVE-2025-39841-baa39f6ad79d372a6ce0aa639fbb2f1578479f57.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d96cc9a1b57725930c60b607423759d563b4d900",
                "patch_url": "https://git.kernel.org/stable/p/d96cc9a1b57725930c60b607423759d563b4d900",
                "filename": "CVE-2025-39841-d96cc9a1b57725930c60b607423759d563b4d900.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39841/CVE-2025-39841-d96cc9a1b57725930c60b607423759d563b4d900.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/367cb5ffd8a8a4c85dc89f55e7fa7cc191425b11",
            "https://git.kernel.org/stable/c/55658c7501467ca9ef3bd4453dd920010db8bc13",
            "https://git.kernel.org/stable/c/897f64b01c1249ac730329b83f4f40bab71e86c7",
            "https://git.kernel.org/stable/c/95b63d15fce5c54a73bbf195e1aacb5a75b128e2",
            "https://git.kernel.org/stable/c/9dba9a45c348e8460da97c450cddf70b2056deb3",
            "https://git.kernel.org/stable/c/ab34084f42ee06a9028d67c78feafb911d33d111",
            "https://git.kernel.org/stable/c/baa39f6ad79d372a6ce0aa639fbb2f1578479f57",
            "https://git.kernel.org/stable/c/d96cc9a1b57725930c60b607423759d563b4d900",
            "https://www.cve.org/CVERecord?id=CVE-2025-39841\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39841\nhttps://lore.kernel.org/linux-cve-announce/2025091902-CVE-2025-39841-2c0f@gregkh/T"
        ]
    },
    "CVE-2025-39849": {
        "cve": "CVE-2025-39849",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()\n\nIf the ssid->datalen is more than IEEE80211_MAX_SSID_LEN (32) it would\nlead to memory corruption so add some bounds checking.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39849",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/31229145e6ba5ace3e9391113376fa05b7831ede",
            "patch_url": "https://git.kernel.org/stable/p/31229145e6ba5ace3e9391113376fa05b7831ede",
            "filename": "CVE-2025-39849-31229145e6ba5ace3e9391113376fa05b7831ede.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39849/CVE-2025-39849-31229145e6ba5ace3e9391113376fa05b7831ede.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/31229145e6ba5ace3e9391113376fa05b7831ede",
                "patch_url": "https://git.kernel.org/stable/p/31229145e6ba5ace3e9391113376fa05b7831ede",
                "filename": "CVE-2025-39849-31229145e6ba5ace3e9391113376fa05b7831ede.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39849/CVE-2025-39849-31229145e6ba5ace3e9391113376fa05b7831ede.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5cb7cab7adf9b1e6a99e2081b0e30e9e59d07523",
                "patch_url": "https://git.kernel.org/stable/p/5cb7cab7adf9b1e6a99e2081b0e30e9e59d07523",
                "filename": "CVE-2025-39849-5cb7cab7adf9b1e6a99e2081b0e30e9e59d07523.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39849/CVE-2025-39849-5cb7cab7adf9b1e6a99e2081b0e30e9e59d07523.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/62b635dcd69c4fde7ce1de4992d71420a37e51e3",
                "patch_url": "https://git.kernel.org/stable/p/62b635dcd69c4fde7ce1de4992d71420a37e51e3",
                "filename": "CVE-2025-39849-62b635dcd69c4fde7ce1de4992d71420a37e51e3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39849/CVE-2025-39849-62b635dcd69c4fde7ce1de4992d71420a37e51e3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8e751d46336205abc259ed3990e850a9843fb649",
                "patch_url": "https://git.kernel.org/stable/p/8e751d46336205abc259ed3990e850a9843fb649",
                "filename": "CVE-2025-39849-8e751d46336205abc259ed3990e850a9843fb649.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39849/CVE-2025-39849-8e751d46336205abc259ed3990e850a9843fb649.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e472f59d02c82b511bc43a3f96d62ed08bf4537f",
                "patch_url": "https://git.kernel.org/stable/p/e472f59d02c82b511bc43a3f96d62ed08bf4537f",
                "filename": "CVE-2025-39849-e472f59d02c82b511bc43a3f96d62ed08bf4537f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39849/CVE-2025-39849-e472f59d02c82b511bc43a3f96d62ed08bf4537f.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/31229145e6ba5ace3e9391113376fa05b7831ede",
            "https://git.kernel.org/stable/c/5cb7cab7adf9b1e6a99e2081b0e30e9e59d07523",
            "https://git.kernel.org/stable/c/62b635dcd69c4fde7ce1de4992d71420a37e51e3",
            "https://git.kernel.org/stable/c/8e751d46336205abc259ed3990e850a9843fb649",
            "https://git.kernel.org/stable/c/e472f59d02c82b511bc43a3f96d62ed08bf4537f",
            "https://www.cve.org/CVERecord?id=CVE-2025-39849\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39849\nhttps://lore.kernel.org/linux-cve-announce/2025091904-CVE-2025-39849-c414@gregkh/T"
        ]
    },
    "CVE-2025-39864": {
        "cve": "CVE-2025-39864",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: fix use-after-free in cmp_bss()\n\nFollowing bss_free() quirk introduced in commit 776b3580178f\n(\"cfg80211: track hidden SSID networks properly\"), adjust\ncfg80211_update_known_bss() to free the last beacon frame\nelements only if they're not shared via the corresponding\n'hidden_beacon_bss' pointer.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39864",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/a97a9791e455bb0cd5e7a38b5abcb05523d4e21c",
            "patch_url": "https://git.kernel.org/stable/p/a97a9791e455bb0cd5e7a38b5abcb05523d4e21c",
            "filename": "CVE-2025-39864-a97a9791e455bb0cd5e7a38b5abcb05523d4e21c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39864/CVE-2025-39864-a97a9791e455bb0cd5e7a38b5abcb05523d4e21c.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/26e84445f02ce6b2fe5f3e0e28ff7add77f35e08",
                "patch_url": "https://git.kernel.org/stable/p/26e84445f02ce6b2fe5f3e0e28ff7add77f35e08",
                "filename": "CVE-2025-39864-26e84445f02ce6b2fe5f3e0e28ff7add77f35e08.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39864/CVE-2025-39864-26e84445f02ce6b2fe5f3e0e28ff7add77f35e08.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5b7ae04969f822283a95c866967e42b4d75e0eef",
                "patch_url": "https://git.kernel.org/stable/p/5b7ae04969f822283a95c866967e42b4d75e0eef",
                "filename": "CVE-2025-39864-5b7ae04969f822283a95c866967e42b4d75e0eef.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39864/CVE-2025-39864-5b7ae04969f822283a95c866967e42b4d75e0eef.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6854476d9e1aeaaf05ebc98d610061c2075db07d",
                "patch_url": "https://git.kernel.org/stable/p/6854476d9e1aeaaf05ebc98d610061c2075db07d",
                "filename": "CVE-2025-39864-6854476d9e1aeaaf05ebc98d610061c2075db07d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39864/CVE-2025-39864-6854476d9e1aeaaf05ebc98d610061c2075db07d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/912c4b66bef713a20775cfbf3b5e9bd71525c716",
                "patch_url": "https://git.kernel.org/stable/p/912c4b66bef713a20775cfbf3b5e9bd71525c716",
                "filename": "CVE-2025-39864-912c4b66bef713a20775cfbf3b5e9bd71525c716.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39864/CVE-2025-39864-912c4b66bef713a20775cfbf3b5e9bd71525c716.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a8bb681e879ca3c9f722aa08d3d7ae41c42a8807",
                "patch_url": "https://git.kernel.org/stable/p/a8bb681e879ca3c9f722aa08d3d7ae41c42a8807",
                "filename": "CVE-2025-39864-a8bb681e879ca3c9f722aa08d3d7ae41c42a8807.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39864/CVE-2025-39864-a8bb681e879ca3c9f722aa08d3d7ae41c42a8807.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a97a9791e455bb0cd5e7a38b5abcb05523d4e21c",
                "patch_url": "https://git.kernel.org/stable/p/a97a9791e455bb0cd5e7a38b5abcb05523d4e21c",
                "filename": "CVE-2025-39864-a97a9791e455bb0cd5e7a38b5abcb05523d4e21c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39864/CVE-2025-39864-a97a9791e455bb0cd5e7a38b5abcb05523d4e21c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7d08929178c16398278613df07ad65cf63cce9d",
                "patch_url": "https://git.kernel.org/stable/p/b7d08929178c16398278613df07ad65cf63cce9d",
                "filename": "CVE-2025-39864-b7d08929178c16398278613df07ad65cf63cce9d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39864/CVE-2025-39864-b7d08929178c16398278613df07ad65cf63cce9d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ff040562c10a540b8d851f7f4145fa112977f853",
                "patch_url": "https://git.kernel.org/stable/p/ff040562c10a540b8d851f7f4145fa112977f853",
                "filename": "CVE-2025-39864-ff040562c10a540b8d851f7f4145fa112977f853.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39864/CVE-2025-39864-ff040562c10a540b8d851f7f4145fa112977f853.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/26e84445f02ce6b2fe5f3e0e28ff7add77f35e08",
            "https://git.kernel.org/stable/c/5b7ae04969f822283a95c866967e42b4d75e0eef",
            "https://git.kernel.org/stable/c/6854476d9e1aeaaf05ebc98d610061c2075db07d",
            "https://git.kernel.org/stable/c/912c4b66bef713a20775cfbf3b5e9bd71525c716",
            "https://git.kernel.org/stable/c/a8bb681e879ca3c9f722aa08d3d7ae41c42a8807",
            "https://git.kernel.org/stable/c/a97a9791e455bb0cd5e7a38b5abcb05523d4e21c",
            "https://git.kernel.org/stable/c/b7d08929178c16398278613df07ad65cf63cce9d",
            "https://git.kernel.org/stable/c/ff040562c10a540b8d851f7f4145fa112977f853",
            "https://www.cve.org/CVERecord?id=CVE-2025-39864\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39864\nhttps://lore.kernel.org/linux-cve-announce/2025091906-CVE-2025-39864-a3a2@gregkh/T"
        ]
    },
    "CVE-2025-39883": {
        "cve": "CVE-2025-39883",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory\n\nWhen I did memory failure tests, below panic occurs:\n\npage dumped because: VM_BUG_ON_PAGE(PagePoisoned(page))\nkernel BUG at include/linux/page-flags.h:616!\nOops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 3 PID: 720 Comm: bash Not tainted 6.10.0-rc1-00195-g148743902568 #40\nRIP: 0010:unpoison_memory+0x2f3/0x590\nRSP: 0018:ffffa57fc8787d60 EFLAGS: 00000246\nRAX: 0000000000000037 RBX: 0000000000000009 RCX: ffff9be25fcdc9c8\nRDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff9be25fcdc9c0\nRBP: 0000000000300000 R08: ffffffffb4956f88 R09: 0000000000009ffb\nR10: 0000000000000284 R11: ffffffffb4926fa0 R12: ffffe6b00c000000\nR13: ffff9bdb453dfd00 R14: 0000000000000000 R15: fffffffffffffffe\nFS:  00007f08f04e4740(0000) GS:ffff9be25fcc0000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000564787a30410 CR3: 000000010d4e2000 CR4: 00000000000006f0\nCall Trace:\n <TASK>\n unpoison_memory+0x2f3/0x590\n simple_attr_write_xsigned.constprop.0.isra.0+0xb3/0x110\n debugfs_attr_write+0x42/0x60\n full_proxy_write+0x5b/0x80\n vfs_write+0xd5/0x540\n ksys_write+0x64/0xe0\n do_syscall_64+0xb9/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f08f0314887\nRSP: 002b:00007ffece710078 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 0000000000000009 RCX: 00007f08f0314887\nRDX: 0000000000000009 RSI: 0000564787a30410 RDI: 0000000000000001\nRBP: 0000564787a30410 R08: 000000000000fefe R09: 000000007fffffff\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009\nR13: 00007f08f041b780 R14: 00007f08f0417600 R15: 00007f08f0416a00\n </TASK>\nModules linked in: hwpoison_inject\n---[ end trace 0000000000000000 ]---\nRIP: 0010:unpoison_memory+0x2f3/0x590\nRSP: 0018:ffffa57fc8787d60 EFLAGS: 00000246\nRAX: 0000000000000037 RBX: 0000000000000009 RCX: ffff9be25fcdc9c8\nRDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff9be25fcdc9c0\nRBP: 0000000000300000 R08: ffffffffb4956f88 R09: 0000000000009ffb\nR10: 0000000000000284 R11: ffffffffb4926fa0 R12: ffffe6b00c000000\nR13: ffff9bdb453dfd00 R14: 0000000000000000 R15: fffffffffffffffe\nFS:  00007f08f04e4740(0000) GS:ffff9be25fcc0000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000564787a30410 CR3: 000000010d4e2000 CR4: 00000000000006f0\nKernel panic - not syncing: Fatal exception\nKernel Offset: 0x31c00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)\n---[ end Kernel panic - not syncing: Fatal exception ]---\n\nThe root cause is that unpoison_memory() tries to check the PG_HWPoison\nflags of an uninitialized page.  So VM_BUG_ON_PAGE(PagePoisoned(page)) is\ntriggered.  This can be reproduced by below steps:\n\n1.Offline memory block:\n\n echo offline > /sys/devices/system/memory/memory12/state\n\n2.Get offlined memory pfn:\n\n page-types -b n -rlN\n\n3.Write pfn to unpoison-pfn\n\n echo <pfn> > /sys/kernel/debug/hwpoison/unpoison-pfn\n\nThis scenario can be identified by pfn_to_online_page() returning NULL. \nAnd ZONE_DEVICE pages are never expected, so we can simply fail if\npfn_to_online_page() == NULL to fix the bug.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39883",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/fb65803ccff37cf9123c50c1c02efd1ed73c4ed5",
            "patch_url": "https://git.kernel.org/stable/p/fb65803ccff37cf9123c50c1c02efd1ed73c4ed5",
            "filename": "CVE-2025-39883-fb65803ccff37cf9123c50c1c02efd1ed73c4ed5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39883/CVE-2025-39883-fb65803ccff37cf9123c50c1c02efd1ed73c4ed5.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/3d278e89c2ea62b1aaa4b0d8a9766a35b3a3164a",
                "patch_url": "https://git.kernel.org/stable/p/3d278e89c2ea62b1aaa4b0d8a9766a35b3a3164a",
                "filename": "CVE-2025-39883-3d278e89c2ea62b1aaa4b0d8a9766a35b3a3164a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39883/CVE-2025-39883-3d278e89c2ea62b1aaa4b0d8a9766a35b3a3164a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/63a327a2375a8ce7a47dec5aaa4d8a9ae0a00b96",
                "patch_url": "https://git.kernel.org/stable/p/63a327a2375a8ce7a47dec5aaa4d8a9ae0a00b96",
                "filename": "CVE-2025-39883-63a327a2375a8ce7a47dec5aaa4d8a9ae0a00b96.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39883/CVE-2025-39883-63a327a2375a8ce7a47dec5aaa4d8a9ae0a00b96.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7618fd443aa4cfa553a64cacf5721581653ee7b0",
                "patch_url": "https://git.kernel.org/stable/p/7618fd443aa4cfa553a64cacf5721581653ee7b0",
                "filename": "CVE-2025-39883-7618fd443aa4cfa553a64cacf5721581653ee7b0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39883/CVE-2025-39883-7618fd443aa4cfa553a64cacf5721581653ee7b0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8e01ea186a52c90694c08a9ff57bea1b0e78256a",
                "patch_url": "https://git.kernel.org/stable/p/8e01ea186a52c90694c08a9ff57bea1b0e78256a",
                "filename": "CVE-2025-39883-8e01ea186a52c90694c08a9ff57bea1b0e78256a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39883/CVE-2025-39883-8e01ea186a52c90694c08a9ff57bea1b0e78256a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/99f7048957f5ae3cee1c01189147e73a9a96de02",
                "patch_url": "https://git.kernel.org/stable/p/99f7048957f5ae3cee1c01189147e73a9a96de02",
                "filename": "CVE-2025-39883-99f7048957f5ae3cee1c01189147e73a9a96de02.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39883/CVE-2025-39883-99f7048957f5ae3cee1c01189147e73a9a96de02.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d613f53c83ec47089c4e25859d5e8e0359f6f8da",
                "patch_url": "https://git.kernel.org/stable/p/d613f53c83ec47089c4e25859d5e8e0359f6f8da",
                "filename": "CVE-2025-39883-d613f53c83ec47089c4e25859d5e8e0359f6f8da.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39883/CVE-2025-39883-d613f53c83ec47089c4e25859d5e8e0359f6f8da.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e4ec6def5643a1c9511115b3884eb879572294c6",
                "patch_url": "https://git.kernel.org/stable/p/e4ec6def5643a1c9511115b3884eb879572294c6",
                "filename": "CVE-2025-39883-e4ec6def5643a1c9511115b3884eb879572294c6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39883/CVE-2025-39883-e4ec6def5643a1c9511115b3884eb879572294c6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fb65803ccff37cf9123c50c1c02efd1ed73c4ed5",
                "patch_url": "https://git.kernel.org/stable/p/fb65803ccff37cf9123c50c1c02efd1ed73c4ed5",
                "filename": "CVE-2025-39883-fb65803ccff37cf9123c50c1c02efd1ed73c4ed5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39883/CVE-2025-39883-fb65803ccff37cf9123c50c1c02efd1ed73c4ed5.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/3d278e89c2ea62b1aaa4b0d8a9766a35b3a3164a",
            "https://git.kernel.org/stable/c/63a327a2375a8ce7a47dec5aaa4d8a9ae0a00b96",
            "https://git.kernel.org/stable/c/7618fd443aa4cfa553a64cacf5721581653ee7b0",
            "https://git.kernel.org/stable/c/8e01ea186a52c90694c08a9ff57bea1b0e78256a",
            "https://git.kernel.org/stable/c/99f7048957f5ae3cee1c01189147e73a9a96de02",
            "https://git.kernel.org/stable/c/d613f53c83ec47089c4e25859d5e8e0359f6f8da",
            "https://git.kernel.org/stable/c/e4ec6def5643a1c9511115b3884eb879572294c6",
            "https://git.kernel.org/stable/c/fb65803ccff37cf9123c50c1c02efd1ed73c4ed5",
            "https://www.cve.org/CVERecord?id=CVE-2025-39883\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39883\nhttps://lore.kernel.org/linux-cve-announce/2025092302-CVE-2025-39883-6015@gregkh/T"
        ]
    },
    "CVE-2025-39898": {
        "cve": "CVE-2025-39898",
        "cvss_v2": null,
        "cvss_v3": "0.0",
        "description": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39898",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/99a8772611e2d7ec318be7f0f072037914a1f509",
            "patch_url": "https://git.kernel.org/stable/p/99a8772611e2d7ec318be7f0f072037914a1f509",
            "filename": "CVE-2025-39898-99a8772611e2d7ec318be7f0f072037914a1f509.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39898/CVE-2025-39898-99a8772611e2d7ec318be7f0f072037914a1f509.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0aec3211283482cfcdd606d1345e1f9acbcabd31",
                "patch_url": "https://git.kernel.org/stable/p/0aec3211283482cfcdd606d1345e1f9acbcabd31",
                "filename": "CVE-2025-39898-0aec3211283482cfcdd606d1345e1f9acbcabd31.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39898/CVE-2025-39898-0aec3211283482cfcdd606d1345e1f9acbcabd31.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/50a84d5c814039ad2abe2748aec3e89324a548a7",
                "patch_url": "https://git.kernel.org/stable/p/50a84d5c814039ad2abe2748aec3e89324a548a7",
                "filename": "CVE-2025-39898-50a84d5c814039ad2abe2748aec3e89324a548a7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39898/CVE-2025-39898-50a84d5c814039ad2abe2748aec3e89324a548a7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/90fb7db49c6dbac961c6b8ebfd741141ffbc8545",
                "patch_url": "https://git.kernel.org/stable/p/90fb7db49c6dbac961c6b8ebfd741141ffbc8545",
                "filename": "CVE-2025-39898-90fb7db49c6dbac961c6b8ebfd741141ffbc8545.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39898/CVE-2025-39898-90fb7db49c6dbac961c6b8ebfd741141ffbc8545.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/99a8772611e2d7ec318be7f0f072037914a1f509",
                "patch_url": "https://git.kernel.org/stable/p/99a8772611e2d7ec318be7f0f072037914a1f509",
                "filename": "CVE-2025-39898-99a8772611e2d7ec318be7f0f072037914a1f509.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39898/CVE-2025-39898-99a8772611e2d7ec318be7f0f072037914a1f509.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b370f7b1f470a8d5485cc1e40e8ff663bb55d712",
                "patch_url": "https://git.kernel.org/stable/p/b370f7b1f470a8d5485cc1e40e8ff663bb55d712",
                "filename": "CVE-2025-39898-b370f7b1f470a8d5485cc1e40e8ff663bb55d712.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39898/CVE-2025-39898-b370f7b1f470a8d5485cc1e40e8ff663bb55d712.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b48adcacc34fbbc49046a7ee8a97839bef369c85",
                "patch_url": "https://git.kernel.org/stable/p/b48adcacc34fbbc49046a7ee8a97839bef369c85",
                "filename": "CVE-2025-39898-b48adcacc34fbbc49046a7ee8a97839bef369c85.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39898/CVE-2025-39898-b48adcacc34fbbc49046a7ee8a97839bef369c85.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ce8829d3d44b8622741bccca9f4408bc3da30b2b",
                "patch_url": "https://git.kernel.org/stable/p/ce8829d3d44b8622741bccca9f4408bc3da30b2b",
                "filename": "CVE-2025-39898-ce8829d3d44b8622741bccca9f4408bc3da30b2b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39898/CVE-2025-39898-ce8829d3d44b8622741bccca9f4408bc3da30b2b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ea832ec0583e2398ea0c5ed8d902c923e16f53c4",
                "patch_url": "https://git.kernel.org/stable/p/ea832ec0583e2398ea0c5ed8d902c923e16f53c4",
                "filename": "CVE-2025-39898-ea832ec0583e2398ea0c5ed8d902c923e16f53c4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39898/CVE-2025-39898-ea832ec0583e2398ea0c5ed8d902c923e16f53c4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0aec3211283482cfcdd606d1345e1f9acbcabd31",
            "https://git.kernel.org/stable/c/50a84d5c814039ad2abe2748aec3e89324a548a7",
            "https://git.kernel.org/stable/c/90fb7db49c6dbac961c6b8ebfd741141ffbc8545",
            "https://git.kernel.org/stable/c/99a8772611e2d7ec318be7f0f072037914a1f509",
            "https://git.kernel.org/stable/c/b370f7b1f470a8d5485cc1e40e8ff663bb55d712",
            "https://git.kernel.org/stable/c/b48adcacc34fbbc49046a7ee8a97839bef369c85",
            "https://git.kernel.org/stable/c/ce8829d3d44b8622741bccca9f4408bc3da30b2b",
            "https://git.kernel.org/stable/c/ea832ec0583e2398ea0c5ed8d902c923e16f53c4",
            "https://www.cve.org/CVERecord?id=CVE-2025-39898\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39898\nhttps://lore.kernel.org/linux-cve-announce/2025100116-CVE-2025-39898-d844@gregkh/T"
        ]
    },
    "CVE-2025-39933": {
        "cve": "CVE-2025-39933",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: let recv_done verify data_offset, data_length and remaining_data_length\n\nThis is inspired by the related server fixes.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39933",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/581fb78e0388b78911b0c920e4073737090c8b5f",
            "patch_url": "https://git.kernel.org/stable/p/581fb78e0388b78911b0c920e4073737090c8b5f",
            "filename": "CVE-2025-39933-581fb78e0388b78911b0c920e4073737090c8b5f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39933/CVE-2025-39933-581fb78e0388b78911b0c920e4073737090c8b5f.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/581fb78e0388b78911b0c920e4073737090c8b5f",
                "patch_url": "https://git.kernel.org/stable/p/581fb78e0388b78911b0c920e4073737090c8b5f",
                "filename": "CVE-2025-39933-581fb78e0388b78911b0c920e4073737090c8b5f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39933/CVE-2025-39933-581fb78e0388b78911b0c920e4073737090c8b5f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f57e53ea252363234f86674db475839e5b87102e",
                "patch_url": "https://git.kernel.org/stable/p/f57e53ea252363234f86674db475839e5b87102e",
                "filename": "CVE-2025-39933-f57e53ea252363234f86674db475839e5b87102e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39933/CVE-2025-39933-f57e53ea252363234f86674db475839e5b87102e.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/581fb78e0388b78911b0c920e4073737090c8b5f",
            "https://git.kernel.org/stable/c/f57e53ea252363234f86674db475839e5b87102e",
            "https://www.cve.org/CVERecord?id=CVE-2025-39933\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39933\nhttps://lore.kernel.org/linux-cve-announce/2025100417-CVE-2025-39933-e224@gregkh/T"
        ]
    },
    "CVE-2025-39955": {
        "cve": "CVE-2025-39955",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().\n\nsyzbot reported the splat below where a socket had tcp_sk(sk)->fastopen_rsk\nin the TCP_ESTABLISHED state. [0]\n\nsyzbot reused the server-side TCP Fast Open socket as a new client before\nthe TFO socket completes 3WHS:\n\n  1. accept()\n  2. connect(AF_UNSPEC)\n  3. connect() to another destination\n\nAs of accept(), sk->sk_state is TCP_SYN_RECV, and tcp_disconnect() changes\nit to TCP_CLOSE and makes connect() possible, which restarts timers.\n\nSince tcp_disconnect() forgot to clear tcp_sk(sk)->fastopen_rsk, the\nretransmit timer triggered the warning and the intended packet was not\nretransmitted.\n\nLet's call reqsk_fastopen_remove() in tcp_disconnect().\n\n[0]:\nWARNING: CPU: 2 PID: 0 at net/ipv4/tcp_timer.c:542 tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7))\nModules linked in:\nCPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.17.0-rc5-g201825fb4278 #62 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\nRIP: 0010:tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7))\nCode: 41 55 41 54 55 53 48 8b af b8 08 00 00 48 89 fb 48 85 ed 0f 84 55 01 00 00 0f b6 47 12 3c 03 74 0c 0f b6 47 12 3c 04 74 04 90 <0f> 0b 90 48 8b 85 c0 00 00 00 48 89 ef 48 8b 40 30 e8 6a 4f 06 3e\nRSP: 0018:ffffc900002f8d40 EFLAGS: 00010293\nRAX: 0000000000000002 RBX: ffff888106911400 RCX: 0000000000000017\nRDX: 0000000002517619 RSI: ffffffff83764080 RDI: ffff888106911400\nRBP: ffff888106d5c000 R08: 0000000000000001 R09: ffffc900002f8de8\nR10: 00000000000000c2 R11: ffffc900002f8ff8 R12: ffff888106911540\nR13: ffff888106911480 R14: ffff888106911840 R15: ffffc900002f8de0\nFS:  0000000000000000(0000) GS:ffff88907b768000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f8044d69d90 CR3: 0000000002c30003 CR4: 0000000000370ef0\nCall Trace:\n <IRQ>\n tcp_write_timer (net/ipv4/tcp_timer.c:738)\n call_timer_fn (kernel/time/timer.c:1747)\n __run_timers (kernel/time/timer.c:1799 kernel/time/timer.c:2372)\n timer_expire_remote (kernel/time/timer.c:2385 kernel/time/timer.c:2376 kernel/time/timer.c:2135)\n tmigr_handle_remote_up (kernel/time/timer_migration.c:944 kernel/time/timer_migration.c:1035)\n __walk_groups.isra.0 (kernel/time/timer_migration.c:533 (discriminator 1))\n tmigr_handle_remote (kernel/time/timer_migration.c:1096)\n handle_softirqs (./arch/x86/include/asm/jump_label.h:36 ./include/trace/events/irq.h:142 kernel/softirq.c:580)\n irq_exit_rcu (kernel/softirq.c:614 kernel/softirq.c:453 kernel/softirq.c:680 kernel/softirq.c:696)\n sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1050 (discriminator 35) arch/x86/kernel/apic/apic.c:1050 (discriminator 35))\n </IRQ>",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39955",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/7ec092a91ff351dcde89c23e795b73a328274db6",
            "patch_url": "https://git.kernel.org/stable/p/7ec092a91ff351dcde89c23e795b73a328274db6",
            "filename": "CVE-2025-39955-7ec092a91ff351dcde89c23e795b73a328274db6.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39955/CVE-2025-39955-7ec092a91ff351dcde89c23e795b73a328274db6.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/17d699727577814198d744d6afe54735c6b54c99",
                "patch_url": "https://git.kernel.org/stable/p/17d699727577814198d744d6afe54735c6b54c99",
                "filename": "CVE-2025-39955-17d699727577814198d744d6afe54735c6b54c99.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39955/CVE-2025-39955-17d699727577814198d744d6afe54735c6b54c99.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/33a4fdf0b4a25f8ce65380c3b0136b407ca57609",
                "patch_url": "https://git.kernel.org/stable/p/33a4fdf0b4a25f8ce65380c3b0136b407ca57609",
                "filename": "CVE-2025-39955-33a4fdf0b4a25f8ce65380c3b0136b407ca57609.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39955/CVE-2025-39955-33a4fdf0b4a25f8ce65380c3b0136b407ca57609.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/45c8a6cc2bcd780e634a6ba8e46bffbdf1fc5c01",
                "patch_url": "https://git.kernel.org/stable/p/45c8a6cc2bcd780e634a6ba8e46bffbdf1fc5c01",
                "filename": "CVE-2025-39955-45c8a6cc2bcd780e634a6ba8e46bffbdf1fc5c01.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39955/CVE-2025-39955-45c8a6cc2bcd780e634a6ba8e46bffbdf1fc5c01.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7ec092a91ff351dcde89c23e795b73a328274db6",
                "patch_url": "https://git.kernel.org/stable/p/7ec092a91ff351dcde89c23e795b73a328274db6",
                "filename": "CVE-2025-39955-7ec092a91ff351dcde89c23e795b73a328274db6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39955/CVE-2025-39955-7ec092a91ff351dcde89c23e795b73a328274db6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a4378dedd6e07e62f2fccb17d78c9665718763d0",
                "patch_url": "https://git.kernel.org/stable/p/a4378dedd6e07e62f2fccb17d78c9665718763d0",
                "filename": "CVE-2025-39955-a4378dedd6e07e62f2fccb17d78c9665718763d0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39955/CVE-2025-39955-a4378dedd6e07e62f2fccb17d78c9665718763d0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ae313d14b45eca7a6bb29cb9bf396d977e7d28fb",
                "patch_url": "https://git.kernel.org/stable/p/ae313d14b45eca7a6bb29cb9bf396d977e7d28fb",
                "filename": "CVE-2025-39955-ae313d14b45eca7a6bb29cb9bf396d977e7d28fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39955/CVE-2025-39955-ae313d14b45eca7a6bb29cb9bf396d977e7d28fb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dfd06131107e7b699ef1e2a24ed2f7d17c917753",
                "patch_url": "https://git.kernel.org/stable/p/dfd06131107e7b699ef1e2a24ed2f7d17c917753",
                "filename": "CVE-2025-39955-dfd06131107e7b699ef1e2a24ed2f7d17c917753.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39955/CVE-2025-39955-dfd06131107e7b699ef1e2a24ed2f7d17c917753.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fa4749c065644af4db496b338452a69a3e5147d9",
                "patch_url": "https://git.kernel.org/stable/p/fa4749c065644af4db496b338452a69a3e5147d9",
                "filename": "CVE-2025-39955-fa4749c065644af4db496b338452a69a3e5147d9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39955/CVE-2025-39955-fa4749c065644af4db496b338452a69a3e5147d9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/17d699727577814198d744d6afe54735c6b54c99",
            "https://git.kernel.org/stable/c/33a4fdf0b4a25f8ce65380c3b0136b407ca57609",
            "https://git.kernel.org/stable/c/45c8a6cc2bcd780e634a6ba8e46bffbdf1fc5c01",
            "https://git.kernel.org/stable/c/7ec092a91ff351dcde89c23e795b73a328274db6",
            "https://git.kernel.org/stable/c/a4378dedd6e07e62f2fccb17d78c9665718763d0",
            "https://git.kernel.org/stable/c/ae313d14b45eca7a6bb29cb9bf396d977e7d28fb",
            "https://git.kernel.org/stable/c/dfd06131107e7b699ef1e2a24ed2f7d17c917753",
            "https://git.kernel.org/stable/c/fa4749c065644af4db496b338452a69a3e5147d9",
            "https://www.cve.org/CVERecord?id=CVE-2025-39955\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39955\nhttps://lore.kernel.org/linux-cve-announce/2025100942-CVE-2025-39955-f36b@gregkh/T"
        ]
    },
    "CVE-2025-39971": {
        "cve": "CVE-2025-39971",
        "cvss_v2": null,
        "cvss_v3": "7.6",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: fix idx validation in config queues msg\n\nEnsure idx is within range of active/initialized TCs when iterating over\nvf->ch[idx] in i40e_vc_config_queues_msg().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39971",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/f5f91d164af22e7147130ef8bebbdb28d8ecc6e2",
            "patch_url": "https://git.kernel.org/stable/p/f5f91d164af22e7147130ef8bebbdb28d8ecc6e2",
            "filename": "CVE-2025-39971-f5f91d164af22e7147130ef8bebbdb28d8ecc6e2.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39971/CVE-2025-39971-f5f91d164af22e7147130ef8bebbdb28d8ecc6e2.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1fa0aadade34481c567cdf4a897c0d4e4d548bd1",
                "patch_url": "https://git.kernel.org/stable/p/1fa0aadade34481c567cdf4a897c0d4e4d548bd1",
                "filename": "CVE-2025-39971-1fa0aadade34481c567cdf4a897c0d4e4d548bd1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39971/CVE-2025-39971-1fa0aadade34481c567cdf4a897c0d4e4d548bd1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2cc26dac0518d2fa9b67ec813ee60e183480f98a",
                "patch_url": "https://git.kernel.org/stable/p/2cc26dac0518d2fa9b67ec813ee60e183480f98a",
                "filename": "CVE-2025-39971-2cc26dac0518d2fa9b67ec813ee60e183480f98a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39971/CVE-2025-39971-2cc26dac0518d2fa9b67ec813ee60e183480f98a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5c1f96123113e0bdc6d8dc2b0830184c93da9f65",
                "patch_url": "https://git.kernel.org/stable/p/5c1f96123113e0bdc6d8dc2b0830184c93da9f65",
                "filename": "CVE-2025-39971-5c1f96123113e0bdc6d8dc2b0830184c93da9f65.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39971/CVE-2025-39971-5c1f96123113e0bdc6d8dc2b0830184c93da9f65.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8b9c7719b0987b1c6c5fc910599f3618a558dbde",
                "patch_url": "https://git.kernel.org/stable/p/8b9c7719b0987b1c6c5fc910599f3618a558dbde",
                "filename": "CVE-2025-39971-8b9c7719b0987b1c6c5fc910599f3618a558dbde.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39971/CVE-2025-39971-8b9c7719b0987b1c6c5fc910599f3618a558dbde.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a6ff2af78343eceb0f77ab1a2fe802183bc21648",
                "patch_url": "https://git.kernel.org/stable/p/a6ff2af78343eceb0f77ab1a2fe802183bc21648",
                "filename": "CVE-2025-39971-a6ff2af78343eceb0f77ab1a2fe802183bc21648.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39971/CVE-2025-39971-a6ff2af78343eceb0f77ab1a2fe802183bc21648.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bfcc1dff429d4b99ba03e40ddacc68ea4be2b32b",
                "patch_url": "https://git.kernel.org/stable/p/bfcc1dff429d4b99ba03e40ddacc68ea4be2b32b",
                "filename": "CVE-2025-39971-bfcc1dff429d4b99ba03e40ddacc68ea4be2b32b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39971/CVE-2025-39971-bfcc1dff429d4b99ba03e40ddacc68ea4be2b32b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f1ad24c5abe1eaef69158bac1405a74b3c365115",
                "patch_url": "https://git.kernel.org/stable/p/f1ad24c5abe1eaef69158bac1405a74b3c365115",
                "filename": "CVE-2025-39971-f1ad24c5abe1eaef69158bac1405a74b3c365115.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39971/CVE-2025-39971-f1ad24c5abe1eaef69158bac1405a74b3c365115.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f5f91d164af22e7147130ef8bebbdb28d8ecc6e2",
                "patch_url": "https://git.kernel.org/stable/p/f5f91d164af22e7147130ef8bebbdb28d8ecc6e2",
                "filename": "CVE-2025-39971-f5f91d164af22e7147130ef8bebbdb28d8ecc6e2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39971/CVE-2025-39971-f5f91d164af22e7147130ef8bebbdb28d8ecc6e2.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1fa0aadade34481c567cdf4a897c0d4e4d548bd1",
            "https://git.kernel.org/stable/c/2cc26dac0518d2fa9b67ec813ee60e183480f98a",
            "https://git.kernel.org/stable/c/5c1f96123113e0bdc6d8dc2b0830184c93da9f65",
            "https://git.kernel.org/stable/c/8b9c7719b0987b1c6c5fc910599f3618a558dbde",
            "https://git.kernel.org/stable/c/a6ff2af78343eceb0f77ab1a2fe802183bc21648",
            "https://git.kernel.org/stable/c/bfcc1dff429d4b99ba03e40ddacc68ea4be2b32b",
            "https://git.kernel.org/stable/c/f1ad24c5abe1eaef69158bac1405a74b3c365115",
            "https://git.kernel.org/stable/c/f5f91d164af22e7147130ef8bebbdb28d8ecc6e2",
            "https://www.cve.org/CVERecord?id=CVE-2025-39971\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39971\nhttps://lore.kernel.org/linux-cve-announce/2025101556-CVE-2025-39971-97e2@gregkh/T"
        ]
    },
    "CVE-2025-39993": {
        "cve": "CVE-2025-39993",
        "cvss_v2": null,
        "cvss_v3": "7.0",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: rc: fix races with imon_disconnect()\n\nSyzbot reports a KASAN issue as below:\nBUG: KASAN: use-after-free in __create_pipe include/linux/usb.h:1945 [inline]\nBUG: KASAN: use-after-free in send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627\nRead of size 4 at addr ffff8880256fb000 by task syz-executor314/4465\n\nCPU: 2 PID: 4465 Comm: syz-executor314 Not tainted 6.0.0-rc1-syzkaller #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nCall Trace:\n <TASK>\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_address_description mm/kasan/report.c:317 [inline]\nprint_report.cold+0x2ba/0x6e9 mm/kasan/report.c:433\nkasan_report+0xb1/0x1e0 mm/kasan/report.c:495\n__create_pipe include/linux/usb.h:1945 [inline]\nsend_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627\nvfd_write+0x2d9/0x550 drivers/media/rc/imon.c:991\nvfs_write+0x2d7/0xdd0 fs/read_write.c:576\nksys_write+0x127/0x250 fs/read_write.c:631\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe iMON driver improperly releases the usb_device reference in\nimon_disconnect without coordinating with active users of the\ndevice.\n\nSpecifically, the fields usbdev_intf0 and usbdev_intf1 are not\nprotected by the users counter (ictx->users). During probe,\nimon_init_intf0 or imon_init_intf1 increments the usb_device\nreference count depending on the interface. However, during\ndisconnect, usb_put_dev is called unconditionally, regardless of\nactual usage.\n\nAs a result, if vfd_write or other operations are still in\nprogress after disconnect, this can lead to a use-after-free of\nthe usb_device pointer.\n\nThread 1 vfd_write                      Thread 2 imon_disconnect\n                                        ...\n                                        if\n                                          usb_put_dev(ictx->usbdev_intf0)\n                                        else\n                                          usb_put_dev(ictx->usbdev_intf1)\n...\nwhile\n  send_packet\n    if\n      pipe = usb_sndintpipe(\n        ictx->usbdev_intf0) UAF\n    else\n      pipe = usb_sndctrlpipe(\n        ictx->usbdev_intf0, 0) UAF\n\nGuard access to usbdev_intf0 and usbdev_intf1 after disconnect by\nchecking ictx->disconnected in all writer paths. Add early return\nwith -ENODEV in send_packet(), vfd_write(), lcd_write() and\ndisplay_open() if the device is no longer present.\n\nSet and read ictx->disconnected under ictx->lock to ensure memory\nsynchronization. Acquire the lock in imon_disconnect() before setting\nthe flag to synchronize with any ongoing operations.\n\nEnsure writers exit early and safely after disconnect before the USB\ncore proceeds with cleanup.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-39993",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2e7fd93b9cc565b839bc55a6662475718963e156",
            "patch_url": "https://git.kernel.org/stable/p/2e7fd93b9cc565b839bc55a6662475718963e156",
            "filename": "CVE-2025-39993-2e7fd93b9cc565b839bc55a6662475718963e156.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39993/CVE-2025-39993-2e7fd93b9cc565b839bc55a6662475718963e156.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2e7fd93b9cc565b839bc55a6662475718963e156",
                "patch_url": "https://git.kernel.org/stable/p/2e7fd93b9cc565b839bc55a6662475718963e156",
                "filename": "CVE-2025-39993-2e7fd93b9cc565b839bc55a6662475718963e156.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39993/CVE-2025-39993-2e7fd93b9cc565b839bc55a6662475718963e156.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/71096a6161a25e84acddb89a9d77f138502d26ab",
                "patch_url": "https://git.kernel.org/stable/p/71096a6161a25e84acddb89a9d77f138502d26ab",
                "filename": "CVE-2025-39993-71096a6161a25e84acddb89a9d77f138502d26ab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39993/CVE-2025-39993-71096a6161a25e84acddb89a9d77f138502d26ab.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/71c52b073922d05e79e6de7fc7f5f38f927929a4",
                "patch_url": "https://git.kernel.org/stable/p/71c52b073922d05e79e6de7fc7f5f38f927929a4",
                "filename": "CVE-2025-39993-71c52b073922d05e79e6de7fc7f5f38f927929a4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39993/CVE-2025-39993-71c52b073922d05e79e6de7fc7f5f38f927929a4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/71da40648741d15b302700b68973fe8b382aef3c",
                "patch_url": "https://git.kernel.org/stable/p/71da40648741d15b302700b68973fe8b382aef3c",
                "filename": "CVE-2025-39993-71da40648741d15b302700b68973fe8b382aef3c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39993/CVE-2025-39993-71da40648741d15b302700b68973fe8b382aef3c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9348976003e39754af344949579e824a0a210fc4",
                "patch_url": "https://git.kernel.org/stable/p/9348976003e39754af344949579e824a0a210fc4",
                "filename": "CVE-2025-39993-9348976003e39754af344949579e824a0a210fc4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39993/CVE-2025-39993-9348976003e39754af344949579e824a0a210fc4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b03fac6e2a38331faf8510b480becfa90cea1c9f",
                "patch_url": "https://git.kernel.org/stable/p/b03fac6e2a38331faf8510b480becfa90cea1c9f",
                "filename": "CVE-2025-39993-b03fac6e2a38331faf8510b480becfa90cea1c9f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39993/CVE-2025-39993-b03fac6e2a38331faf8510b480becfa90cea1c9f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d9f6ce99624a41c3bcb29a8d7d79b800665229dd",
                "patch_url": "https://git.kernel.org/stable/p/d9f6ce99624a41c3bcb29a8d7d79b800665229dd",
                "filename": "CVE-2025-39993-d9f6ce99624a41c3bcb29a8d7d79b800665229dd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39993/CVE-2025-39993-d9f6ce99624a41c3bcb29a8d7d79b800665229dd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fa0f61cc1d828178aa921475a9b786e7fbb65ccb",
                "patch_url": "https://git.kernel.org/stable/p/fa0f61cc1d828178aa921475a9b786e7fbb65ccb",
                "filename": "CVE-2025-39993-fa0f61cc1d828178aa921475a9b786e7fbb65ccb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39993/CVE-2025-39993-fa0f61cc1d828178aa921475a9b786e7fbb65ccb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fd5d3e6b149ec8cce045d86a2b5e3664d6b32ba5",
                "patch_url": "https://git.kernel.org/stable/p/fd5d3e6b149ec8cce045d86a2b5e3664d6b32ba5",
                "filename": "CVE-2025-39993-fd5d3e6b149ec8cce045d86a2b5e3664d6b32ba5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-39993/CVE-2025-39993-fd5d3e6b149ec8cce045d86a2b5e3664d6b32ba5.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2e7fd93b9cc565b839bc55a6662475718963e156",
            "https://git.kernel.org/stable/c/71096a6161a25e84acddb89a9d77f138502d26ab",
            "https://git.kernel.org/stable/c/71c52b073922d05e79e6de7fc7f5f38f927929a4",
            "https://git.kernel.org/stable/c/71da40648741d15b302700b68973fe8b382aef3c",
            "https://git.kernel.org/stable/c/9348976003e39754af344949579e824a0a210fc4",
            "https://git.kernel.org/stable/c/b03fac6e2a38331faf8510b480becfa90cea1c9f",
            "https://git.kernel.org/stable/c/d9f6ce99624a41c3bcb29a8d7d79b800665229dd",
            "https://git.kernel.org/stable/c/fa0f61cc1d828178aa921475a9b786e7fbb65ccb",
            "https://git.kernel.org/stable/c/fd5d3e6b149ec8cce045d86a2b5e3664d6b32ba5",
            "https://www.cve.org/CVERecord?id=CVE-2025-39993\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-39993\nhttps://lore.kernel.org/linux-cve-announce/2025101527-CVE-2025-39993-caef@gregkh/T"
        ]
    },
    "CVE-2025-40064": {
        "cve": "CVE-2025-40064",
        "cvss_v2": null,
        "cvss_v3": "7.1",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)->dev and passes\ndown to pnet_find_base_ndev(), where RTNL is held.  Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst->dev could be swapped with blackhole_netdev,\nand the dev's refcnt by dst will be released.\n\nWe must hold dev's refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet's use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n <TASK>\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n </TASK>\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40064",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/233927b645cb7a14bb98d23ac72e4c7243a9f0d9",
            "patch_url": "https://git.kernel.org/stable/p/233927b645cb7a14bb98d23ac72e4c7243a9f0d9",
            "filename": "CVE-2025-40064-233927b645cb7a14bb98d23ac72e4c7243a9f0d9.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40064/CVE-2025-40064-233927b645cb7a14bb98d23ac72e4c7243a9f0d9.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/233927b645cb7a14bb98d23ac72e4c7243a9f0d9",
                "patch_url": "https://git.kernel.org/stable/p/233927b645cb7a14bb98d23ac72e4c7243a9f0d9",
                "filename": "CVE-2025-40064-233927b645cb7a14bb98d23ac72e4c7243a9f0d9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40064/CVE-2025-40064-233927b645cb7a14bb98d23ac72e4c7243a9f0d9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3d3466878afd8d43ec0ca2facfbc7f03e40d0f79",
                "patch_url": "https://git.kernel.org/stable/p/3d3466878afd8d43ec0ca2facfbc7f03e40d0f79",
                "filename": "CVE-2025-40064-3d3466878afd8d43ec0ca2facfbc7f03e40d0f79.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40064/CVE-2025-40064-3d3466878afd8d43ec0ca2facfbc7f03e40d0f79.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/233927b645cb7a14bb98d23ac72e4c7243a9f0d9",
            "https://git.kernel.org/stable/c/3d3466878afd8d43ec0ca2facfbc7f03e40d0f79",
            "https://www.cve.org/CVERecord?id=CVE-2025-40064\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40064\nhttps://lore.kernel.org/linux-cve-announce/2025102817-CVE-2025-40064-0c16@gregkh/T"
        ]
    },
    "CVE-2025-40096": {
        "cve": "CVE-2025-40096",
        "cvss_v2": null,
        "cvss_v3": "7.0",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies\n\nWhen adding dependencies with drm_sched_job_add_dependency(), that\nfunction consumes the fence reference both on success and failure, so in\nthe latter case the dma_fence_put() on the error path (xarray failed to\nexpand) is a double free.\n\nInterestingly this bug appears to have been present ever since\ncommit ebd5f74255b9 (\"drm/sched: Add dependency tracking\"), since the code\nback then looked like this:\n\ndrm_sched_job_add_implicit_dependencies():\n...\n       for (i = 0; i < fence_count; i++) {\n               ret = drm_sched_job_add_dependency(job, fences[i]);\n               if (ret)\n                       break;\n       }\n\n       for (; i < fence_count; i++)\n               dma_fence_put(fences[i]);\n\nWhich means for the failing 'i' the dma_fence_put was already a double\nfree. Possibly there were no users at that time, or the test cases were\ninsufficient to hit it.\n\nThe bug was then only noticed and fixed after\ncommit 9c2ba265352a (\"drm/scheduler: use new iterator in drm_sched_job_add_implicit_dependencies v2\")\nlanded, with its fixup of\ncommit 4eaf02d6076c (\"drm/scheduler: fix drm_sched_job_add_implicit_dependencies\").\n\nAt that point it was a slightly different flavour of a double free, which\ncommit 963d0b356935 (\"drm/scheduler: fix drm_sched_job_add_implicit_dependencies harder\")\nnoticed and attempted to fix.\n\nBut it only moved the double free from happening inside the\ndrm_sched_job_add_dependency(), when releasing the reference not yet\nobtained, to the caller, when releasing the reference already released by\nthe former in the failure case.\n\nAs such it is not easy to identify the right target for the fixes tag so\nlets keep it simple and just continue the chain.\n\nWhile fixing we also improve the comment and explain the reason for taking\nthe reference and not dropping it.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40096",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/4c38a63ae12ecc9370a7678077bde2d61aa80e9c",
            "patch_url": "https://git.kernel.org/stable/p/4c38a63ae12ecc9370a7678077bde2d61aa80e9c",
            "filename": "CVE-2025-40096-4c38a63ae12ecc9370a7678077bde2d61aa80e9c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40096/CVE-2025-40096-4c38a63ae12ecc9370a7678077bde2d61aa80e9c.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/4c38a63ae12ecc9370a7678077bde2d61aa80e9c",
                "patch_url": "https://git.kernel.org/stable/p/4c38a63ae12ecc9370a7678077bde2d61aa80e9c",
                "filename": "CVE-2025-40096-4c38a63ae12ecc9370a7678077bde2d61aa80e9c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40096/CVE-2025-40096-4c38a63ae12ecc9370a7678077bde2d61aa80e9c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/57239762aa90ad768dac055021f27705dae73344",
                "patch_url": "https://git.kernel.org/stable/p/57239762aa90ad768dac055021f27705dae73344",
                "filename": "CVE-2025-40096-57239762aa90ad768dac055021f27705dae73344.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40096/CVE-2025-40096-57239762aa90ad768dac055021f27705dae73344.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5801e65206b065b0b2af032f7f1eef222aa2fd83",
                "patch_url": "https://git.kernel.org/stable/p/5801e65206b065b0b2af032f7f1eef222aa2fd83",
                "filename": "CVE-2025-40096-5801e65206b065b0b2af032f7f1eef222aa2fd83.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40096/CVE-2025-40096-5801e65206b065b0b2af032f7f1eef222aa2fd83.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e5e3eb2aff92994ee81ce633f1c4e73bd4b87e11",
                "patch_url": "https://git.kernel.org/stable/p/e5e3eb2aff92994ee81ce633f1c4e73bd4b87e11",
                "filename": "CVE-2025-40096-e5e3eb2aff92994ee81ce633f1c4e73bd4b87e11.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40096/CVE-2025-40096-e5e3eb2aff92994ee81ce633f1c4e73bd4b87e11.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fdfb47e85af1e11ec822c82739dde2dd8dff5115",
                "patch_url": "https://git.kernel.org/stable/p/fdfb47e85af1e11ec822c82739dde2dd8dff5115",
                "filename": "CVE-2025-40096-fdfb47e85af1e11ec822c82739dde2dd8dff5115.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40096/CVE-2025-40096-fdfb47e85af1e11ec822c82739dde2dd8dff5115.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/4c38a63ae12ecc9370a7678077bde2d61aa80e9c",
            "https://git.kernel.org/stable/c/57239762aa90ad768dac055021f27705dae73344",
            "https://git.kernel.org/stable/c/5801e65206b065b0b2af032f7f1eef222aa2fd83",
            "https://git.kernel.org/stable/c/e5e3eb2aff92994ee81ce633f1c4e73bd4b87e11",
            "https://git.kernel.org/stable/c/fdfb47e85af1e11ec822c82739dde2dd8dff5115",
            "https://www.cve.org/CVERecord?id=CVE-2025-40096\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40096\nhttps://lore.kernel.org/linux-cve-announce/2025103016-CVE-2025-40096-09cc@gregkh/T"
        ]
    },
    "CVE-2025-40135": {
        "cve": "CVE-2025-40135",
        "cvss_v2": null,
        "cvss_v3": "7.0",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_xmit()\n\nUse RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent\npossible UAF.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40135",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/9085e56501d93af9f2d7bd16f7fcfacdde47b99c",
            "patch_url": "https://git.kernel.org/stable/p/9085e56501d93af9f2d7bd16f7fcfacdde47b99c",
            "filename": "CVE-2025-40135-9085e56501d93af9f2d7bd16f7fcfacdde47b99c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40135/CVE-2025-40135-9085e56501d93af9f2d7bd16f7fcfacdde47b99c.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/9085e56501d93af9f2d7bd16f7fcfacdde47b99c",
                "patch_url": "https://git.kernel.org/stable/p/9085e56501d93af9f2d7bd16f7fcfacdde47b99c",
                "filename": "CVE-2025-40135-9085e56501d93af9f2d7bd16f7fcfacdde47b99c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40135/CVE-2025-40135-9085e56501d93af9f2d7bd16f7fcfacdde47b99c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bd0905e2122e3680968cd0741966983490bf2ed3",
                "patch_url": "https://git.kernel.org/stable/p/bd0905e2122e3680968cd0741966983490bf2ed3",
                "filename": "CVE-2025-40135-bd0905e2122e3680968cd0741966983490bf2ed3.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40135/CVE-2025-40135-bd0905e2122e3680968cd0741966983490bf2ed3.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f0a54d00d2f36de40266f47c27989853e8588656",
                "patch_url": "https://git.kernel.org/stable/p/f0a54d00d2f36de40266f47c27989853e8588656",
                "filename": "CVE-2025-40135-f0a54d00d2f36de40266f47c27989853e8588656.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40135/CVE-2025-40135-f0a54d00d2f36de40266f47c27989853e8588656.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f69fec6287565fdeb61f65e700a1184352306943",
                "patch_url": "https://git.kernel.org/stable/p/f69fec6287565fdeb61f65e700a1184352306943",
                "filename": "CVE-2025-40135-f69fec6287565fdeb61f65e700a1184352306943.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40135/CVE-2025-40135-f69fec6287565fdeb61f65e700a1184352306943.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f7f9e924f23684b4b23cd9f976cceab24a968e34",
                "patch_url": "https://git.kernel.org/stable/p/f7f9e924f23684b4b23cd9f976cceab24a968e34",
                "filename": "CVE-2025-40135-f7f9e924f23684b4b23cd9f976cceab24a968e34.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40135/CVE-2025-40135-f7f9e924f23684b4b23cd9f976cceab24a968e34.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/9085e56501d93af9f2d7bd16f7fcfacdde47b99c",
            "https://git.kernel.org/stable/c/bd0905e2122e3680968cd0741966983490bf2ed3",
            "https://git.kernel.org/stable/c/f0a54d00d2f36de40266f47c27989853e8588656",
            "https://git.kernel.org/stable/c/f69fec6287565fdeb61f65e700a1184352306943",
            "https://git.kernel.org/stable/c/f7f9e924f23684b4b23cd9f976cceab24a968e34",
            "https://www.cve.org/CVERecord?id=CVE-2025-40135\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40135\nhttps://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40135-67ca@gregkh/T"
        ]
    },
    "CVE-2025-40154": {
        "cve": "CVE-2025-40154",
        "cvss_v2": null,
        "cvss_v3": "7.0",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40154",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/dea9c8c9028c9374761224a7f9d824e845a2aa2e",
            "patch_url": "https://git.kernel.org/stable/p/dea9c8c9028c9374761224a7f9d824e845a2aa2e",
            "filename": "CVE-2025-40154-dea9c8c9028c9374761224a7f9d824e845a2aa2e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40154/CVE-2025-40154-dea9c8c9028c9374761224a7f9d824e845a2aa2e.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/29a41bf6422688f0c5a09b18222e1a64b2629fa4",
                "patch_url": "https://git.kernel.org/stable/p/29a41bf6422688f0c5a09b18222e1a64b2629fa4",
                "filename": "CVE-2025-40154-29a41bf6422688f0c5a09b18222e1a64b2629fa4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40154/CVE-2025-40154-29a41bf6422688f0c5a09b18222e1a64b2629fa4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2c27e047bdcba457ec953f7e90e4ed6d5f8aeb01",
                "patch_url": "https://git.kernel.org/stable/p/2c27e047bdcba457ec953f7e90e4ed6d5f8aeb01",
                "filename": "CVE-2025-40154-2c27e047bdcba457ec953f7e90e4ed6d5f8aeb01.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40154/CVE-2025-40154-2c27e047bdcba457ec953f7e90e4ed6d5f8aeb01.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/48880f3cdf2b6d8dcd91219c5b5c8a7526411322",
                "patch_url": "https://git.kernel.org/stable/p/48880f3cdf2b6d8dcd91219c5b5c8a7526411322",
                "filename": "CVE-2025-40154-48880f3cdf2b6d8dcd91219c5b5c8a7526411322.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40154/CVE-2025-40154-48880f3cdf2b6d8dcd91219c5b5c8a7526411322.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5c03ea2ef4ebba75c69c90929d8590eb3d3797a9",
                "patch_url": "https://git.kernel.org/stable/p/5c03ea2ef4ebba75c69c90929d8590eb3d3797a9",
                "filename": "CVE-2025-40154-5c03ea2ef4ebba75c69c90929d8590eb3d3797a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40154/CVE-2025-40154-5c03ea2ef4ebba75c69c90929d8590eb3d3797a9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a97b4d18ecb012c5624cdf2cab2ce5e1312fdd5d",
                "patch_url": "https://git.kernel.org/stable/p/a97b4d18ecb012c5624cdf2cab2ce5e1312fdd5d",
                "filename": "CVE-2025-40154-a97b4d18ecb012c5624cdf2cab2ce5e1312fdd5d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40154/CVE-2025-40154-a97b4d18ecb012c5624cdf2cab2ce5e1312fdd5d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dea9c8c9028c9374761224a7f9d824e845a2aa2e",
                "patch_url": "https://git.kernel.org/stable/p/dea9c8c9028c9374761224a7f9d824e845a2aa2e",
                "filename": "CVE-2025-40154-dea9c8c9028c9374761224a7f9d824e845a2aa2e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40154/CVE-2025-40154-dea9c8c9028c9374761224a7f9d824e845a2aa2e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f58fca15f3bf8b982e799c31e4afa8923788aa40",
                "patch_url": "https://git.kernel.org/stable/p/f58fca15f3bf8b982e799c31e4afa8923788aa40",
                "filename": "CVE-2025-40154-f58fca15f3bf8b982e799c31e4afa8923788aa40.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40154/CVE-2025-40154-f58fca15f3bf8b982e799c31e4afa8923788aa40.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fba404e4b4af4f4f747bb0e41e9fff7d03c7bcc0",
                "patch_url": "https://git.kernel.org/stable/p/fba404e4b4af4f4f747bb0e41e9fff7d03c7bcc0",
                "filename": "CVE-2025-40154-fba404e4b4af4f4f747bb0e41e9fff7d03c7bcc0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40154/CVE-2025-40154-fba404e4b4af4f4f747bb0e41e9fff7d03c7bcc0.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/29a41bf6422688f0c5a09b18222e1a64b2629fa4",
            "https://git.kernel.org/stable/c/2c27e047bdcba457ec953f7e90e4ed6d5f8aeb01",
            "https://git.kernel.org/stable/c/48880f3cdf2b6d8dcd91219c5b5c8a7526411322",
            "https://git.kernel.org/stable/c/5c03ea2ef4ebba75c69c90929d8590eb3d3797a9",
            "https://git.kernel.org/stable/c/a97b4d18ecb012c5624cdf2cab2ce5e1312fdd5d",
            "https://git.kernel.org/stable/c/dea9c8c9028c9374761224a7f9d824e845a2aa2e",
            "https://git.kernel.org/stable/c/f58fca15f3bf8b982e799c31e4afa8923788aa40",
            "https://git.kernel.org/stable/c/fba404e4b4af4f4f747bb0e41e9fff7d03c7bcc0",
            "https://www.cve.org/CVERecord?id=CVE-2025-40154\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40154\nhttps://lore.kernel.org/linux-cve-announce/2025111258-CVE-2025-40154-fd98@gregkh/T"
        ]
    },
    "CVE-2025-40158": {
        "cve": "CVE-2025-40158",
        "cvss_v2": null,
        "cvss_v3": "7.0",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_output()\n\nUse RCU in ip6_output() in order to use dst_dev_rcu() to prevent\npossible UAF.\n\nWe can remove rcu_read_lock()/rcu_read_unlock() pairs\nfrom ip6_finish_output2().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40158",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0393f85c3241c19ba8550f04a812e7d19f6b3082",
            "patch_url": "https://git.kernel.org/stable/p/0393f85c3241c19ba8550f04a812e7d19f6b3082",
            "filename": "CVE-2025-40158-0393f85c3241c19ba8550f04a812e7d19f6b3082.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40158/CVE-2025-40158-0393f85c3241c19ba8550f04a812e7d19f6b3082.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0393f85c3241c19ba8550f04a812e7d19f6b3082",
                "patch_url": "https://git.kernel.org/stable/p/0393f85c3241c19ba8550f04a812e7d19f6b3082",
                "filename": "CVE-2025-40158-0393f85c3241c19ba8550f04a812e7d19f6b3082.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40158/CVE-2025-40158-0393f85c3241c19ba8550f04a812e7d19f6b3082.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/11709573cc4e48dc34c80fc7ab9ce5b159e29695",
                "patch_url": "https://git.kernel.org/stable/p/11709573cc4e48dc34c80fc7ab9ce5b159e29695",
                "filename": "CVE-2025-40158-11709573cc4e48dc34c80fc7ab9ce5b159e29695.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40158/CVE-2025-40158-11709573cc4e48dc34c80fc7ab9ce5b159e29695.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0393f85c3241c19ba8550f04a812e7d19f6b3082",
            "https://git.kernel.org/stable/c/11709573cc4e48dc34c80fc7ab9ce5b159e29695",
            "https://www.cve.org/CVERecord?id=CVE-2025-40158\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40158\nhttps://lore.kernel.org/linux-cve-announce/2025111258-CVE-2025-40158-4c9d@gregkh/T"
        ]
    },
    "CVE-2025-40168": {
        "cve": "CVE-2025-40168",
        "cvss_v2": null,
        "cvss_v3": "7.0",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)->dev could trigger UAF.\n\nLet's use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40168",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/235f81045c008169cc4e1955b4a64e118eebe61b",
            "patch_url": "https://git.kernel.org/stable/p/235f81045c008169cc4e1955b4a64e118eebe61b",
            "filename": "CVE-2025-40168-235f81045c008169cc4e1955b4a64e118eebe61b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40168/CVE-2025-40168-235f81045c008169cc4e1955b4a64e118eebe61b.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/235f81045c008169cc4e1955b4a64e118eebe61b",
                "patch_url": "https://git.kernel.org/stable/p/235f81045c008169cc4e1955b4a64e118eebe61b",
                "filename": "CVE-2025-40168-235f81045c008169cc4e1955b4a64e118eebe61b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40168/CVE-2025-40168-235f81045c008169cc4e1955b4a64e118eebe61b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d26e80f7fb62d77757b67a1b94e4ac756bc9c658",
                "patch_url": "https://git.kernel.org/stable/p/d26e80f7fb62d77757b67a1b94e4ac756bc9c658",
                "filename": "CVE-2025-40168-d26e80f7fb62d77757b67a1b94e4ac756bc9c658.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40168/CVE-2025-40168-d26e80f7fb62d77757b67a1b94e4ac756bc9c658.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/235f81045c008169cc4e1955b4a64e118eebe61b",
            "https://git.kernel.org/stable/c/d26e80f7fb62d77757b67a1b94e4ac756bc9c658",
            "https://www.cve.org/CVERecord?id=CVE-2025-40168\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40168\nhttps://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40168-bdd5@gregkh/T"
        ]
    },
    "CVE-2025-40170": {
        "cve": "CVE-2025-40170",
        "cvss_v2": null,
        "cvss_v3": "7.4",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: use dst_dev_rcu() in sk_setup_caps()\n\nUse RCU to protect accesses to dst->dev from sk_setup_caps()\nand sk_dst_gso_max_size().\n\nAlso use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(),\nand ip_dst_mtu_maybe_forward().\n\nip4_dst_hoplimit() can use dst_dev_net_rcu().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40170",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/5d1be493d1110c9e720b4c51a6e587bb2fb4ac12",
            "patch_url": "https://git.kernel.org/stable/p/5d1be493d1110c9e720b4c51a6e587bb2fb4ac12",
            "filename": "CVE-2025-40170-5d1be493d1110c9e720b4c51a6e587bb2fb4ac12.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40170/CVE-2025-40170-5d1be493d1110c9e720b4c51a6e587bb2fb4ac12.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/5d1be493d1110c9e720b4c51a6e587bb2fb4ac12",
                "patch_url": "https://git.kernel.org/stable/p/5d1be493d1110c9e720b4c51a6e587bb2fb4ac12",
                "filename": "CVE-2025-40170-5d1be493d1110c9e720b4c51a6e587bb2fb4ac12.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40170/CVE-2025-40170-5d1be493d1110c9e720b4c51a6e587bb2fb4ac12.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/99a2ace61b211b0be861b07fbaa062fca4b58879",
                "patch_url": "https://git.kernel.org/stable/p/99a2ace61b211b0be861b07fbaa062fca4b58879",
                "filename": "CVE-2025-40170-99a2ace61b211b0be861b07fbaa062fca4b58879.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40170/CVE-2025-40170-99a2ace61b211b0be861b07fbaa062fca4b58879.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a805729c0091073d8f0415cfa96c7acd1bc17a48",
                "patch_url": "https://git.kernel.org/stable/p/a805729c0091073d8f0415cfa96c7acd1bc17a48",
                "filename": "CVE-2025-40170-a805729c0091073d8f0415cfa96c7acd1bc17a48.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40170/CVE-2025-40170-a805729c0091073d8f0415cfa96c7acd1bc17a48.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/5d1be493d1110c9e720b4c51a6e587bb2fb4ac12",
            "https://git.kernel.org/stable/c/99a2ace61b211b0be861b07fbaa062fca4b58879",
            "https://git.kernel.org/stable/c/a805729c0091073d8f0415cfa96c7acd1bc17a48",
            "https://www.cve.org/CVERecord?id=CVE-2025-40170\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40170\nhttps://lore.kernel.org/linux-cve-announce/2025111259-CVE-2025-40170-d39d@gregkh/T"
        ]
    },
    "CVE-2025-40240": {
        "cve": "CVE-2025-40240",
        "cvss_v2": null,
        "cvss_v3": "7.5",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: avoid NULL dereference when chunk data buffer is missing\n\nchunk->skb pointer is dereferenced in the if-block where it's supposed\nto be NULL only.\n\nchunk->skb can only be NULL if chunk->head_skb is not. Check for frag_list\ninstead and do it just before replacing chunk->skb. We're sure that\notherwise chunk->skb is non-NULL because of outer if() condition.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40240",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/441f0647f7673e0e64d4910ef61a5fb8f16bfb82",
            "patch_url": "https://git.kernel.org/stable/p/441f0647f7673e0e64d4910ef61a5fb8f16bfb82",
            "filename": "CVE-2025-40240-441f0647f7673e0e64d4910ef61a5fb8f16bfb82.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40240/CVE-2025-40240-441f0647f7673e0e64d4910ef61a5fb8f16bfb82.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/03e80a4b04ef1fb2c61dd63216ab8d3a5dcb196f",
                "patch_url": "https://git.kernel.org/stable/p/03e80a4b04ef1fb2c61dd63216ab8d3a5dcb196f",
                "filename": "CVE-2025-40240-03e80a4b04ef1fb2c61dd63216ab8d3a5dcb196f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40240/CVE-2025-40240-03e80a4b04ef1fb2c61dd63216ab8d3a5dcb196f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/08165c296597075763130919f2aae59b5822f016",
                "patch_url": "https://git.kernel.org/stable/p/08165c296597075763130919f2aae59b5822f016",
                "filename": "CVE-2025-40240-08165c296597075763130919f2aae59b5822f016.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40240/CVE-2025-40240-08165c296597075763130919f2aae59b5822f016.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/441f0647f7673e0e64d4910ef61a5fb8f16bfb82",
                "patch_url": "https://git.kernel.org/stable/p/441f0647f7673e0e64d4910ef61a5fb8f16bfb82",
                "filename": "CVE-2025-40240-441f0647f7673e0e64d4910ef61a5fb8f16bfb82.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40240/CVE-2025-40240-441f0647f7673e0e64d4910ef61a5fb8f16bfb82.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4f6da435fb5d8a21cbf8cae5ca5a2ba0e1012b71",
                "patch_url": "https://git.kernel.org/stable/p/4f6da435fb5d8a21cbf8cae5ca5a2ba0e1012b71",
                "filename": "CVE-2025-40240-4f6da435fb5d8a21cbf8cae5ca5a2ba0e1012b71.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40240/CVE-2025-40240-4f6da435fb5d8a21cbf8cae5ca5a2ba0e1012b71.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/61cda2777b07d27459f5cac5a047c3edf9c8a1a9",
                "patch_url": "https://git.kernel.org/stable/p/61cda2777b07d27459f5cac5a047c3edf9c8a1a9",
                "filename": "CVE-2025-40240-61cda2777b07d27459f5cac5a047c3edf9c8a1a9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40240/CVE-2025-40240-61cda2777b07d27459f5cac5a047c3edf9c8a1a9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7a832b0f99be19df608cb75c023f8027b1789bd1",
                "patch_url": "https://git.kernel.org/stable/p/7a832b0f99be19df608cb75c023f8027b1789bd1",
                "filename": "CVE-2025-40240-7a832b0f99be19df608cb75c023f8027b1789bd1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40240/CVE-2025-40240-7a832b0f99be19df608cb75c023f8027b1789bd1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/89b465b54227c245ddc7cc9ed822231af21123ef",
                "patch_url": "https://git.kernel.org/stable/p/89b465b54227c245ddc7cc9ed822231af21123ef",
                "filename": "CVE-2025-40240-89b465b54227c245ddc7cc9ed822231af21123ef.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40240/CVE-2025-40240-89b465b54227c245ddc7cc9ed822231af21123ef.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cb9055ba30306ede4ad920002233d0659982f1cb",
                "patch_url": "https://git.kernel.org/stable/p/cb9055ba30306ede4ad920002233d0659982f1cb",
                "filename": "CVE-2025-40240-cb9055ba30306ede4ad920002233d0659982f1cb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40240/CVE-2025-40240-cb9055ba30306ede4ad920002233d0659982f1cb.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/03e80a4b04ef1fb2c61dd63216ab8d3a5dcb196f",
            "https://git.kernel.org/stable/c/08165c296597075763130919f2aae59b5822f016",
            "https://git.kernel.org/stable/c/441f0647f7673e0e64d4910ef61a5fb8f16bfb82",
            "https://git.kernel.org/stable/c/4f6da435fb5d8a21cbf8cae5ca5a2ba0e1012b71",
            "https://git.kernel.org/stable/c/61cda2777b07d27459f5cac5a047c3edf9c8a1a9",
            "https://git.kernel.org/stable/c/7a832b0f99be19df608cb75c023f8027b1789bd1",
            "https://git.kernel.org/stable/c/89b465b54227c245ddc7cc9ed822231af21123ef",
            "https://git.kernel.org/stable/c/cb9055ba30306ede4ad920002233d0659982f1cb",
            "https://www.cve.org/CVERecord?id=CVE-2025-40240\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40240\nhttps://lore.kernel.org/linux-cve-announce/2025120403-CVE-2025-40240-745a@gregkh/T"
        ]
    },
    "CVE-2025-40248": {
        "cve": "CVE-2025-40248",
        "cvss_v2": null,
        "cvss_v3": "7.0",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Ignore signal/timeout on connect() if already established\n\nDuring connect(), acting on a signal/timeout by disconnecting an already\nestablished socket leads to several issues:\n\n1. connect() invoking vsock_transport_cancel_pkt() ->\n   virtio_transport_purge_skbs() may race with sendmsg() invoking\n   virtio_transport_get_credit(). This results in a permanently elevated\n   `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling.\n\n2. connect() resetting a connected socket's state may race with socket\n   being placed in a sockmap. A disconnected socket remaining in a sockmap\n   breaks sockmap's assumptions. And gives rise to WARNs.\n\n3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a\n   transport change/drop after TCP_ESTABLISHED. Which poses a problem for\n   any simultaneous sendmsg() or connect() and may result in a\n   use-after-free/null-ptr-deref.\n\nDo not disconnect socket on signal/timeout. Keep the logic for unconnected\nsockets: they don't linger, can't be placed in a sockmap, are rejected by\nsendmsg().\n\n[1]: https://lore.kernel.org/netdev/e07fd95c-9a38-4eea-9638-133e38c2ec9b@rbox.co/\n[2]: https://lore.kernel.org/netdev/20250317-vsock-trans-signal-race-v4-0-fc8837f3f1d4@rbox.co/\n[3]: https://lore.kernel.org/netdev/60f1b7db-3099-4f6a-875e-af9f6ef194f6@rbox.co/",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40248",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/002541ef650b742a198e4be363881439bb9d86b4",
            "patch_url": "https://git.kernel.org/stable/p/002541ef650b742a198e4be363881439bb9d86b4",
            "filename": "CVE-2025-40248-002541ef650b742a198e4be363881439bb9d86b4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40248/CVE-2025-40248-002541ef650b742a198e4be363881439bb9d86b4.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/002541ef650b742a198e4be363881439bb9d86b4",
                "patch_url": "https://git.kernel.org/stable/p/002541ef650b742a198e4be363881439bb9d86b4",
                "filename": "CVE-2025-40248-002541ef650b742a198e4be363881439bb9d86b4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40248/CVE-2025-40248-002541ef650b742a198e4be363881439bb9d86b4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3f71753935d648082a8279a97d30efe6b85be680",
                "patch_url": "https://git.kernel.org/stable/p/3f71753935d648082a8279a97d30efe6b85be680",
                "filename": "CVE-2025-40248-3f71753935d648082a8279a97d30efe6b85be680.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40248/CVE-2025-40248-3f71753935d648082a8279a97d30efe6b85be680.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5998da5a8208ae9ad7838ba322bccb2bdcd95e81",
                "patch_url": "https://git.kernel.org/stable/p/5998da5a8208ae9ad7838ba322bccb2bdcd95e81",
                "filename": "CVE-2025-40248-5998da5a8208ae9ad7838ba322bccb2bdcd95e81.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40248/CVE-2025-40248-5998da5a8208ae9ad7838ba322bccb2bdcd95e81.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/67432915145848658149683101104e32f9fd6559",
                "patch_url": "https://git.kernel.org/stable/p/67432915145848658149683101104e32f9fd6559",
                "filename": "CVE-2025-40248-67432915145848658149683101104e32f9fd6559.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40248/CVE-2025-40248-67432915145848658149683101104e32f9fd6559.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ab6b19f690d89ae4709fba73a3c4a7911f495b7a",
                "patch_url": "https://git.kernel.org/stable/p/ab6b19f690d89ae4709fba73a3c4a7911f495b7a",
                "filename": "CVE-2025-40248-ab6b19f690d89ae4709fba73a3c4a7911f495b7a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40248/CVE-2025-40248-ab6b19f690d89ae4709fba73a3c4a7911f495b7a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/da664101fb4a0de5cb70d2bae6a650df954df2af",
                "patch_url": "https://git.kernel.org/stable/p/da664101fb4a0de5cb70d2bae6a650df954df2af",
                "filename": "CVE-2025-40248-da664101fb4a0de5cb70d2bae6a650df954df2af.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40248/CVE-2025-40248-da664101fb4a0de5cb70d2bae6a650df954df2af.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/eeca93f06df89be5a36305b7b9dae1ed65550dfc",
                "patch_url": "https://git.kernel.org/stable/p/eeca93f06df89be5a36305b7b9dae1ed65550dfc",
                "filename": "CVE-2025-40248-eeca93f06df89be5a36305b7b9dae1ed65550dfc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40248/CVE-2025-40248-eeca93f06df89be5a36305b7b9dae1ed65550dfc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f1c170cae285e4b8f61be043bb17addc3d0a14b5",
                "patch_url": "https://git.kernel.org/stable/p/f1c170cae285e4b8f61be043bb17addc3d0a14b5",
                "filename": "CVE-2025-40248-f1c170cae285e4b8f61be043bb17addc3d0a14b5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40248/CVE-2025-40248-f1c170cae285e4b8f61be043bb17addc3d0a14b5.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/002541ef650b742a198e4be363881439bb9d86b4",
            "https://git.kernel.org/stable/c/3f71753935d648082a8279a97d30efe6b85be680",
            "https://git.kernel.org/stable/c/5998da5a8208ae9ad7838ba322bccb2bdcd95e81",
            "https://git.kernel.org/stable/c/67432915145848658149683101104e32f9fd6559",
            "https://git.kernel.org/stable/c/ab6b19f690d89ae4709fba73a3c4a7911f495b7a",
            "https://git.kernel.org/stable/c/da664101fb4a0de5cb70d2bae6a650df954df2af",
            "https://git.kernel.org/stable/c/eeca93f06df89be5a36305b7b9dae1ed65550dfc",
            "https://git.kernel.org/stable/c/f1c170cae285e4b8f61be043bb17addc3d0a14b5",
            "https://lore.kernel.org/netdev/",
            "https://www.cve.org/CVERecord?id=CVE-2025-40248\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40248\nhttps://lore.kernel.org/linux-cve-announce/2025120430-CVE-2025-40248-506e@gregkh/T"
        ]
    },
    "CVE-2025-40258": {
        "cve": "CVE-2025-40258",
        "cvss_v2": null,
        "cvss_v3": "7.8",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix race condition in mptcp_schedule_work()\n\nsyzbot reported use-after-free in mptcp_schedule_work() [1]\n\nIssue here is that mptcp_schedule_work() schedules a work,\nthen gets a refcount on sk->sk_refcnt if the work was scheduled.\nThis refcount will be released by mptcp_worker().\n\n[A] if (schedule_work(...)) {\n[B]     sock_hold(sk);\n        return true;\n    }\n\nProblem is that mptcp_worker() can run immediately and complete before [B]\n\nWe need instead :\n\n    sock_hold(sk);\n    if (schedule_work(...))\n        return true;\n    sock_put(sk);\n\n[1]\nrefcount_t: addition on 0; use-after-free.\n WARNING: CPU: 1 PID: 29 at lib/refcount.c:25 refcount_warn_saturate+0xfa/0x1d0 lib/refcount.c:25\nCall Trace:\n <TASK>\n __refcount_add include/linux/refcount.h:-1 [inline]\n  __refcount_inc include/linux/refcount.h:366 [inline]\n  refcount_inc include/linux/refcount.h:383 [inline]\n  sock_hold include/net/sock.h:816 [inline]\n  mptcp_schedule_work+0x164/0x1a0 net/mptcp/protocol.c:943\n  mptcp_tout_timer+0x21/0xa0 net/mptcp/protocol.c:2316\n  call_timer_fn+0x17e/0x5f0 kernel/time/timer.c:1747\n  expire_timers kernel/time/timer.c:1798 [inline]\n  __run_timers kernel/time/timer.c:2372 [inline]\n  __run_timer_base+0x648/0x970 kernel/time/timer.c:2384\n  run_timer_base kernel/time/timer.c:2393 [inline]\n  run_timer_softirq+0xb7/0x180 kernel/time/timer.c:2403\n  handle_softirqs+0x22f/0x710 kernel/softirq.c:622\n  __do_softirq kernel/softirq.c:656 [inline]\n  run_ktimerd+0xcf/0x190 kernel/softirq.c:1138\n  smpboot_thread_fn+0x542/0xa60 kernel/smpboot.c:160\n  kthread+0x711/0x8a0 kernel/kthread.c:463\n  ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158\n  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40258",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/99908e2d601236842d705d5fd04fb349577316f5",
            "patch_url": "https://git.kernel.org/stable/p/99908e2d601236842d705d5fd04fb349577316f5",
            "filename": "CVE-2025-40258-99908e2d601236842d705d5fd04fb349577316f5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40258/CVE-2025-40258-99908e2d601236842d705d5fd04fb349577316f5.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/035bca3f017ee9dea3a5a756e77a6f7138cc6eea",
                "patch_url": "https://git.kernel.org/stable/p/035bca3f017ee9dea3a5a756e77a6f7138cc6eea",
                "filename": "CVE-2025-40258-035bca3f017ee9dea3a5a756e77a6f7138cc6eea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40258/CVE-2025-40258-035bca3f017ee9dea3a5a756e77a6f7138cc6eea.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3fc7723ed01d1130d4bf7063c50e0af60ecccbb4",
                "patch_url": "https://git.kernel.org/stable/p/3fc7723ed01d1130d4bf7063c50e0af60ecccbb4",
                "filename": "CVE-2025-40258-3fc7723ed01d1130d4bf7063c50e0af60ecccbb4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40258/CVE-2025-40258-3fc7723ed01d1130d4bf7063c50e0af60ecccbb4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8f9ba1a99a89feef9b5867c15a0141a97e893309",
                "patch_url": "https://git.kernel.org/stable/p/8f9ba1a99a89feef9b5867c15a0141a97e893309",
                "filename": "CVE-2025-40258-8f9ba1a99a89feef9b5867c15a0141a97e893309.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40258/CVE-2025-40258-8f9ba1a99a89feef9b5867c15a0141a97e893309.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/99908e2d601236842d705d5fd04fb349577316f5",
                "patch_url": "https://git.kernel.org/stable/p/99908e2d601236842d705d5fd04fb349577316f5",
                "filename": "CVE-2025-40258-99908e2d601236842d705d5fd04fb349577316f5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40258/CVE-2025-40258-99908e2d601236842d705d5fd04fb349577316f5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ac28dfddedf6f209190950fc71bcff65ec4ab47b",
                "patch_url": "https://git.kernel.org/stable/p/ac28dfddedf6f209190950fc71bcff65ec4ab47b",
                "filename": "CVE-2025-40258-ac28dfddedf6f209190950fc71bcff65ec4ab47b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40258/CVE-2025-40258-ac28dfddedf6f209190950fc71bcff65ec4ab47b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/db4f7968a75250ca6c4ed70d0a78beabb2dcee18",
                "patch_url": "https://git.kernel.org/stable/p/db4f7968a75250ca6c4ed70d0a78beabb2dcee18",
                "filename": "CVE-2025-40258-db4f7968a75250ca6c4ed70d0a78beabb2dcee18.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40258/CVE-2025-40258-db4f7968a75250ca6c4ed70d0a78beabb2dcee18.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f865e6595acf33083168db76921e66ace8bf0e5b",
                "patch_url": "https://git.kernel.org/stable/p/f865e6595acf33083168db76921e66ace8bf0e5b",
                "filename": "CVE-2025-40258-f865e6595acf33083168db76921e66ace8bf0e5b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40258/CVE-2025-40258-f865e6595acf33083168db76921e66ace8bf0e5b.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/035bca3f017ee9dea3a5a756e77a6f7138cc6eea",
            "https://git.kernel.org/stable/c/3fc7723ed01d1130d4bf7063c50e0af60ecccbb4",
            "https://git.kernel.org/stable/c/8f9ba1a99a89feef9b5867c15a0141a97e893309",
            "https://git.kernel.org/stable/c/99908e2d601236842d705d5fd04fb349577316f5",
            "https://git.kernel.org/stable/c/ac28dfddedf6f209190950fc71bcff65ec4ab47b",
            "https://git.kernel.org/stable/c/db4f7968a75250ca6c4ed70d0a78beabb2dcee18",
            "https://git.kernel.org/stable/c/f865e6595acf33083168db76921e66ace8bf0e5b",
            "https://www.cve.org/CVERecord?id=CVE-2025-40258\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40258\nhttps://lore.kernel.org/linux-cve-announce/2025120433-CVE-2025-40258-d10d@gregkh/T"
        ]
    },
    "CVE-2025-40269": {
        "cve": "CVE-2025-40269",
        "cvss_v2": null,
        "cvss_v3": "7.3",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix potential overflow of PCM transfer buffer\n\nThe PCM stream data in USB-audio driver is transferred over USB URB\npacket buffers, and each packet size is determined dynamically.  The\npacket sizes are limited by some factors such as wMaxPacketSize USB\ndescriptor.  OTOH, in the current code, the actually used packet sizes\nare determined only by the rate and the PPS, which may be bigger than\nthe size limit above.  This results in a buffer overflow, as reported\nby syzbot.\n\nBasically when the limit is smaller than the calculated packet size,\nit implies that something is wrong, most likely a weird USB\ndescriptor.  So the best option would be just to return an error at\nthe parameter setup time before doing any further operations.\n\nThis patch introduces such a sanity check, and returns -EINVAL when\nthe packet size is greater than maxpacksize.  The comparison with\nep->packsize[1] alone should suffice since it's always equal or\ngreater than ep->packsize[0].",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40269",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/05a1fc5efdd8560f34a3af39c9cf1e1526cc3ddf",
            "patch_url": "https://git.kernel.org/stable/p/05a1fc5efdd8560f34a3af39c9cf1e1526cc3ddf",
            "filename": "CVE-2025-40269-05a1fc5efdd8560f34a3af39c9cf1e1526cc3ddf.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40269/CVE-2025-40269-05a1fc5efdd8560f34a3af39c9cf1e1526cc3ddf.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/05a1fc5efdd8560f34a3af39c9cf1e1526cc3ddf",
                "patch_url": "https://git.kernel.org/stable/p/05a1fc5efdd8560f34a3af39c9cf1e1526cc3ddf",
                "filename": "CVE-2025-40269-05a1fc5efdd8560f34a3af39c9cf1e1526cc3ddf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40269/CVE-2025-40269-05a1fc5efdd8560f34a3af39c9cf1e1526cc3ddf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/217d47255a2ec8b246f2725f5db9ac3f1d4109d7",
                "patch_url": "https://git.kernel.org/stable/p/217d47255a2ec8b246f2725f5db9ac3f1d4109d7",
                "filename": "CVE-2025-40269-217d47255a2ec8b246f2725f5db9ac3f1d4109d7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40269/CVE-2025-40269-217d47255a2ec8b246f2725f5db9ac3f1d4109d7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/282aba56713bbc58155716b55ca7222b2d9cf3c8",
                "patch_url": "https://git.kernel.org/stable/p/282aba56713bbc58155716b55ca7222b2d9cf3c8",
                "filename": "CVE-2025-40269-282aba56713bbc58155716b55ca7222b2d9cf3c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40269/CVE-2025-40269-282aba56713bbc58155716b55ca7222b2d9cf3c8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/480a1490c595a242f27493a4544b3efb21b29f6a",
                "patch_url": "https://git.kernel.org/stable/p/480a1490c595a242f27493a4544b3efb21b29f6a",
                "filename": "CVE-2025-40269-480a1490c595a242f27493a4544b3efb21b29f6a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40269/CVE-2025-40269-480a1490c595a242f27493a4544b3efb21b29f6a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6a5da3fa80affc948923f20a4e086177f505e86e",
                "patch_url": "https://git.kernel.org/stable/p/6a5da3fa80affc948923f20a4e086177f505e86e",
                "filename": "CVE-2025-40269-6a5da3fa80affc948923f20a4e086177f505e86e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40269/CVE-2025-40269-6a5da3fa80affc948923f20a4e086177f505e86e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/98e9d5e33bda8db875cc1a4fe99c192658e45ab6",
                "patch_url": "https://git.kernel.org/stable/p/98e9d5e33bda8db875cc1a4fe99c192658e45ab6",
                "filename": "CVE-2025-40269-98e9d5e33bda8db875cc1a4fe99c192658e45ab6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40269/CVE-2025-40269-98e9d5e33bda8db875cc1a4fe99c192658e45ab6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ab0b5e92fc36ee82c1bd01fe896d0f775ed5de41",
                "patch_url": "https://git.kernel.org/stable/p/ab0b5e92fc36ee82c1bd01fe896d0f775ed5de41",
                "filename": "CVE-2025-40269-ab0b5e92fc36ee82c1bd01fe896d0f775ed5de41.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40269/CVE-2025-40269-ab0b5e92fc36ee82c1bd01fe896d0f775ed5de41.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c4dc012b027c9eb101583011089dea14d744e314",
                "patch_url": "https://git.kernel.org/stable/p/c4dc012b027c9eb101583011089dea14d744e314",
                "filename": "CVE-2025-40269-c4dc012b027c9eb101583011089dea14d744e314.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40269/CVE-2025-40269-c4dc012b027c9eb101583011089dea14d744e314.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d2c04f20ccc6c0d219e6d3038bab45bc66a178ad",
                "patch_url": "https://git.kernel.org/stable/p/d2c04f20ccc6c0d219e6d3038bab45bc66a178ad",
                "filename": "CVE-2025-40269-d2c04f20ccc6c0d219e6d3038bab45bc66a178ad.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40269/CVE-2025-40269-d2c04f20ccc6c0d219e6d3038bab45bc66a178ad.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d67dde02049e632ba58d3c44a164a74b6a737154",
                "patch_url": "https://git.kernel.org/stable/p/d67dde02049e632ba58d3c44a164a74b6a737154",
                "filename": "CVE-2025-40269-d67dde02049e632ba58d3c44a164a74b6a737154.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40269/CVE-2025-40269-d67dde02049e632ba58d3c44a164a74b6a737154.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e0ed5a36fb3ab9e7b9ee45cd17f09f6d5f594360",
                "patch_url": "https://git.kernel.org/stable/p/e0ed5a36fb3ab9e7b9ee45cd17f09f6d5f594360",
                "filename": "CVE-2025-40269-e0ed5a36fb3ab9e7b9ee45cd17f09f6d5f594360.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40269/CVE-2025-40269-e0ed5a36fb3ab9e7b9ee45cd17f09f6d5f594360.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ece3b981bb6620e47fac826a2156c090b1a936a0",
                "patch_url": "https://git.kernel.org/stable/p/ece3b981bb6620e47fac826a2156c090b1a936a0",
                "filename": "CVE-2025-40269-ece3b981bb6620e47fac826a2156c090b1a936a0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40269/CVE-2025-40269-ece3b981bb6620e47fac826a2156c090b1a936a0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ef592bf2232a2daa9fffa8881881fc9957ea56e9",
                "patch_url": "https://git.kernel.org/stable/p/ef592bf2232a2daa9fffa8881881fc9957ea56e9",
                "filename": "CVE-2025-40269-ef592bf2232a2daa9fffa8881881fc9957ea56e9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40269/CVE-2025-40269-ef592bf2232a2daa9fffa8881881fc9957ea56e9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/05a1fc5efdd8560f34a3af39c9cf1e1526cc3ddf",
            "https://git.kernel.org/stable/c/217d47255a2ec8b246f2725f5db9ac3f1d4109d7",
            "https://git.kernel.org/stable/c/282aba56713bbc58155716b55ca7222b2d9cf3c8",
            "https://git.kernel.org/stable/c/480a1490c595a242f27493a4544b3efb21b29f6a",
            "https://git.kernel.org/stable/c/6a5da3fa80affc948923f20a4e086177f505e86e",
            "https://git.kernel.org/stable/c/98e9d5e33bda8db875cc1a4fe99c192658e45ab6",
            "https://git.kernel.org/stable/c/ab0b5e92fc36ee82c1bd01fe896d0f775ed5de41",
            "https://git.kernel.org/stable/c/c4dc012b027c9eb101583011089dea14d744e314",
            "https://git.kernel.org/stable/c/d2c04f20ccc6c0d219e6d3038bab45bc66a178ad",
            "https://git.kernel.org/stable/c/d67dde02049e632ba58d3c44a164a74b6a737154",
            "https://git.kernel.org/stable/c/e0ed5a36fb3ab9e7b9ee45cd17f09f6d5f594360",
            "https://git.kernel.org/stable/c/ece3b981bb6620e47fac826a2156c090b1a936a0",
            "https://git.kernel.org/stable/c/ef592bf2232a2daa9fffa8881881fc9957ea56e9",
            "https://www.cve.org/CVERecord?id=CVE-2025-40269\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40269\nhttps://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40269-9769@gregkh/T"
        ]
    },
    "CVE-2025-40271": {
        "cve": "CVE-2025-40271",
        "cvss_v2": null,
        "cvss_v3": "7.0",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/proc: fix uaf in proc_readdir_de()\n\nPde is erased from subdir rbtree through rb_erase(), but not set the node\nto EMPTY, which may result in uaf access.  We should use RB_CLEAR_NODE()\nset the erased node to EMPTY, then pde_subdir_next() will return NULL to\navoid uaf access.\n\nWe found an uaf issue while using stress-ng testing, need to run testcase\ngetdent and tun in the same time.  The steps of the issue is as follows:\n\n1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current\n   pde is tun3;\n\n2) in the [time windows] unregister netdevice tun3 and tun2, and erase\n   them from rbtree.  erase tun3 first, and then erase tun2.  the\n   pde(tun2) will be released to slab;\n\n3) continue to getdent process, then pde_subdir_next() will return\n   pde(tun2) which is released, it will case uaf access.\n\nCPU 0                                      |    CPU 1\n-------------------------------------------------------------------------\ntraverse dir /proc/pid/net/dev_snmp6/      |   unregister_netdevice(tun->dev)   //tun3 tun2\nsys_getdents64()                           |\n  iterate_dir()                            |\n    proc_readdir()                         |\n      proc_readdir_de()                    |     snmp6_unregister_dev()\n        pde_get(de);                       |       proc_remove()\n        read_unlock(&proc_subdir_lock);    |         remove_proc_subtree()\n                                           |           write_lock(&proc_subdir_lock);\n        [time window]                      |           rb_erase(&root->subdir_node, &parent->subdir);\n                                           |           write_unlock(&proc_subdir_lock);\n        read_lock(&proc_subdir_lock);      |\n        next = pde_subdir_next(de);        |\n        pde_put(de);                       |\n        de = next;    //UAF                |\n\nrbtree of dev_snmp6\n                        |\n                    pde(tun3)\n                     /    \\\n                  NULL  pde(tun2)",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40271",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/03de7ff197a3d0e17d0d5c58fdac99a63cba8110",
            "patch_url": "https://git.kernel.org/stable/p/03de7ff197a3d0e17d0d5c58fdac99a63cba8110",
            "filename": "CVE-2025-40271-03de7ff197a3d0e17d0d5c58fdac99a63cba8110.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40271/CVE-2025-40271-03de7ff197a3d0e17d0d5c58fdac99a63cba8110.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/03de7ff197a3d0e17d0d5c58fdac99a63cba8110",
                "patch_url": "https://git.kernel.org/stable/p/03de7ff197a3d0e17d0d5c58fdac99a63cba8110",
                "filename": "CVE-2025-40271-03de7ff197a3d0e17d0d5c58fdac99a63cba8110.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40271/CVE-2025-40271-03de7ff197a3d0e17d0d5c58fdac99a63cba8110.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1d1596d68a6f11d28f677eedf6cf5b17dbfeb491",
                "patch_url": "https://git.kernel.org/stable/p/1d1596d68a6f11d28f677eedf6cf5b17dbfeb491",
                "filename": "CVE-2025-40271-1d1596d68a6f11d28f677eedf6cf5b17dbfeb491.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40271/CVE-2025-40271-1d1596d68a6f11d28f677eedf6cf5b17dbfeb491.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4cba73c4c89219beef7685a47374bf88b1022369",
                "patch_url": "https://git.kernel.org/stable/p/4cba73c4c89219beef7685a47374bf88b1022369",
                "filename": "CVE-2025-40271-4cba73c4c89219beef7685a47374bf88b1022369.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40271/CVE-2025-40271-4cba73c4c89219beef7685a47374bf88b1022369.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/623bb26127fb581a741e880e1e1a47d79aecb6f8",
                "patch_url": "https://git.kernel.org/stable/p/623bb26127fb581a741e880e1e1a47d79aecb6f8",
                "filename": "CVE-2025-40271-623bb26127fb581a741e880e1e1a47d79aecb6f8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40271/CVE-2025-40271-623bb26127fb581a741e880e1e1a47d79aecb6f8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/67272c11f379d9aa5e0f6b16286b9d89b3f76046",
                "patch_url": "https://git.kernel.org/stable/p/67272c11f379d9aa5e0f6b16286b9d89b3f76046",
                "filename": "CVE-2025-40271-67272c11f379d9aa5e0f6b16286b9d89b3f76046.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40271/CVE-2025-40271-67272c11f379d9aa5e0f6b16286b9d89b3f76046.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6f2482745e510ae1dacc9b090194b9c5f918d774",
                "patch_url": "https://git.kernel.org/stable/p/6f2482745e510ae1dacc9b090194b9c5f918d774",
                "filename": "CVE-2025-40271-6f2482745e510ae1dacc9b090194b9c5f918d774.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40271/CVE-2025-40271-6f2482745e510ae1dacc9b090194b9c5f918d774.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/895b4c0c79b092d732544011c3cecaf7322c36a1",
                "patch_url": "https://git.kernel.org/stable/p/895b4c0c79b092d732544011c3cecaf7322c36a1",
                "filename": "CVE-2025-40271-895b4c0c79b092d732544011c3cecaf7322c36a1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40271/CVE-2025-40271-895b4c0c79b092d732544011c3cecaf7322c36a1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c81d0385500446efe48c305bbb83d47f2ae23a50",
                "patch_url": "https://git.kernel.org/stable/p/c81d0385500446efe48c305bbb83d47f2ae23a50",
                "filename": "CVE-2025-40271-c81d0385500446efe48c305bbb83d47f2ae23a50.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40271/CVE-2025-40271-c81d0385500446efe48c305bbb83d47f2ae23a50.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/03de7ff197a3d0e17d0d5c58fdac99a63cba8110",
            "https://git.kernel.org/stable/c/1d1596d68a6f11d28f677eedf6cf5b17dbfeb491",
            "https://git.kernel.org/stable/c/4cba73c4c89219beef7685a47374bf88b1022369",
            "https://git.kernel.org/stable/c/623bb26127fb581a741e880e1e1a47d79aecb6f8",
            "https://git.kernel.org/stable/c/67272c11f379d9aa5e0f6b16286b9d89b3f76046",
            "https://git.kernel.org/stable/c/6f2482745e510ae1dacc9b090194b9c5f918d774",
            "https://git.kernel.org/stable/c/895b4c0c79b092d732544011c3cecaf7322c36a1",
            "https://git.kernel.org/stable/c/c81d0385500446efe48c305bbb83d47f2ae23a50",
            "https://www.cve.org/CVERecord?id=CVE-2025-40271\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40271\nhttps://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40271-7612@gregkh/T"
        ]
    },
    "CVE-2025-40277": {
        "cve": "CVE-2025-40277",
        "cvss_v2": null,
        "cvss_v3": "7.8",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE\n\nThis data originates from userspace and is used in buffer offset\ncalculations which could potentially overflow causing an out-of-bounds\naccess.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40277",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/b5df9e06eed3df6a4f5c6f8453013b0cabb927b4",
            "patch_url": "https://git.kernel.org/stable/p/b5df9e06eed3df6a4f5c6f8453013b0cabb927b4",
            "filename": "CVE-2025-40277-b5df9e06eed3df6a4f5c6f8453013b0cabb927b4.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40277/CVE-2025-40277-b5df9e06eed3df6a4f5c6f8453013b0cabb927b4.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/32b415a9dc2c212e809b7ebc2b14bc3fbda2b9af",
                "patch_url": "https://git.kernel.org/stable/p/32b415a9dc2c212e809b7ebc2b14bc3fbda2b9af",
                "filename": "CVE-2025-40277-32b415a9dc2c212e809b7ebc2b14bc3fbda2b9af.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40277/CVE-2025-40277-32b415a9dc2c212e809b7ebc2b14bc3fbda2b9af.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/54d458b244893e47bda52ec3943fdfbc8d7d068b",
                "patch_url": "https://git.kernel.org/stable/p/54d458b244893e47bda52ec3943fdfbc8d7d068b",
                "filename": "CVE-2025-40277-54d458b244893e47bda52ec3943fdfbc8d7d068b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40277/CVE-2025-40277-54d458b244893e47bda52ec3943fdfbc8d7d068b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5aea2cde03d4247cdcf53f9ab7d0747c9dca1cfc",
                "patch_url": "https://git.kernel.org/stable/p/5aea2cde03d4247cdcf53f9ab7d0747c9dca1cfc",
                "filename": "CVE-2025-40277-5aea2cde03d4247cdcf53f9ab7d0747c9dca1cfc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40277/CVE-2025-40277-5aea2cde03d4247cdcf53f9ab7d0747c9dca1cfc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/709e5c088f9c99a5cf2c1d1c6ce58f2cca7ab173",
                "patch_url": "https://git.kernel.org/stable/p/709e5c088f9c99a5cf2c1d1c6ce58f2cca7ab173",
                "filename": "CVE-2025-40277-709e5c088f9c99a5cf2c1d1c6ce58f2cca7ab173.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40277/CVE-2025-40277-709e5c088f9c99a5cf2c1d1c6ce58f2cca7ab173.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a3abb54c27b2c393c44362399777ad2f6e1ff17e",
                "patch_url": "https://git.kernel.org/stable/p/a3abb54c27b2c393c44362399777ad2f6e1ff17e",
                "filename": "CVE-2025-40277-a3abb54c27b2c393c44362399777ad2f6e1ff17e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40277/CVE-2025-40277-a3abb54c27b2c393c44362399777ad2f6e1ff17e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b5df9e06eed3df6a4f5c6f8453013b0cabb927b4",
                "patch_url": "https://git.kernel.org/stable/p/b5df9e06eed3df6a4f5c6f8453013b0cabb927b4",
                "filename": "CVE-2025-40277-b5df9e06eed3df6a4f5c6f8453013b0cabb927b4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40277/CVE-2025-40277-b5df9e06eed3df6a4f5c6f8453013b0cabb927b4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e58559845021c3bad5e094219378b869157fad53",
                "patch_url": "https://git.kernel.org/stable/p/e58559845021c3bad5e094219378b869157fad53",
                "filename": "CVE-2025-40277-e58559845021c3bad5e094219378b869157fad53.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40277/CVE-2025-40277-e58559845021c3bad5e094219378b869157fad53.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f3f3a8eb3f0ba799fae057091d8c67cca12d6fa0",
                "patch_url": "https://git.kernel.org/stable/p/f3f3a8eb3f0ba799fae057091d8c67cca12d6fa0",
                "filename": "CVE-2025-40277-f3f3a8eb3f0ba799fae057091d8c67cca12d6fa0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40277/CVE-2025-40277-f3f3a8eb3f0ba799fae057091d8c67cca12d6fa0.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/32b415a9dc2c212e809b7ebc2b14bc3fbda2b9af",
            "https://git.kernel.org/stable/c/54d458b244893e47bda52ec3943fdfbc8d7d068b",
            "https://git.kernel.org/stable/c/5aea2cde03d4247cdcf53f9ab7d0747c9dca1cfc",
            "https://git.kernel.org/stable/c/709e5c088f9c99a5cf2c1d1c6ce58f2cca7ab173",
            "https://git.kernel.org/stable/c/a3abb54c27b2c393c44362399777ad2f6e1ff17e",
            "https://git.kernel.org/stable/c/b5df9e06eed3df6a4f5c6f8453013b0cabb927b4",
            "https://git.kernel.org/stable/c/e58559845021c3bad5e094219378b869157fad53",
            "https://git.kernel.org/stable/c/f3f3a8eb3f0ba799fae057091d8c67cca12d6fa0",
            "https://www.cve.org/CVERecord?id=CVE-2025-40277\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40277\nhttps://lore.kernel.org/linux-cve-announce/2025120717-CVE-2025-40277-d511@gregkh/T"
        ]
    },
    "CVE-2025-40300": {
        "cve": "CVE-2025-40300",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/vmscape: Add conditional IBPB mitigation\n\nVMSCAPE is a vulnerability that exploits insufficient branch predictor\nisolation between a guest and a userspace hypervisor (like QEMU). Existing\nmitigations already protect kernel/KVM from a malicious guest. Userspace\ncan additionally be protected by flushing the branch predictors after a\nVMexit.\n\nSince it is the userspace that consumes the poisoned branch predictors,\nconditionally issue an IBPB after a VMexit and before returning to\nuserspace. Workloads that frequently switch between hypervisor and\nuserspace will incur the most overhead from the new IBPB.\n\nThis new IBPB is not integrated with the existing IBPB sites. For\ninstance, a task can use the existing speculation control prctl() to\nget an IBPB at context switch time. With this implementation, the\nIBPB is doubled up: one at context switch and another before running\nuserspace.\n\nThe intent is to integrate and optimize these cases post-embargo.\n\n[ dhansen: elaborate on suboptimal IBPB solution ]",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40300",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/15006289e5c38b2a830e1fba221977a27598176c",
            "patch_url": "https://git.kernel.org/stable/p/15006289e5c38b2a830e1fba221977a27598176c",
            "filename": "CVE-2025-40300-15006289e5c38b2a830e1fba221977a27598176c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40300/CVE-2025-40300-15006289e5c38b2a830e1fba221977a27598176c.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/15006289e5c38b2a830e1fba221977a27598176c",
                "patch_url": "https://git.kernel.org/stable/p/15006289e5c38b2a830e1fba221977a27598176c",
                "filename": "CVE-2025-40300-15006289e5c38b2a830e1fba221977a27598176c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40300/CVE-2025-40300-15006289e5c38b2a830e1fba221977a27598176c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f4f2f8f860cb4c3336a7435ebe8dcfded0c9c6e",
                "patch_url": "https://git.kernel.org/stable/p/2f4f2f8f860cb4c3336a7435ebe8dcfded0c9c6e",
                "filename": "CVE-2025-40300-2f4f2f8f860cb4c3336a7435ebe8dcfded0c9c6e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40300/CVE-2025-40300-2f4f2f8f860cb4c3336a7435ebe8dcfded0c9c6e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f8f173413f1cbf52660d04df92d0069c4306d25",
                "patch_url": "https://git.kernel.org/stable/p/2f8f173413f1cbf52660d04df92d0069c4306d25",
                "filename": "CVE-2025-40300-2f8f173413f1cbf52660d04df92d0069c4306d25.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40300/CVE-2025-40300-2f8f173413f1cbf52660d04df92d0069c4306d25.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/34e5667041050711a947e260fc9ebebe08bddee5",
                "patch_url": "https://git.kernel.org/stable/p/34e5667041050711a947e260fc9ebebe08bddee5",
                "filename": "CVE-2025-40300-34e5667041050711a947e260fc9ebebe08bddee5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40300/CVE-2025-40300-34e5667041050711a947e260fc9ebebe08bddee5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/459274c77b37ac63b78c928b4b4e748d1f9d05c8",
                "patch_url": "https://git.kernel.org/stable/p/459274c77b37ac63b78c928b4b4e748d1f9d05c8",
                "filename": "CVE-2025-40300-459274c77b37ac63b78c928b4b4e748d1f9d05c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40300/CVE-2025-40300-459274c77b37ac63b78c928b4b4e748d1f9d05c8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/510603f504796c3535f67f55fb0b124a303b44c8",
                "patch_url": "https://git.kernel.org/stable/p/510603f504796c3535f67f55fb0b124a303b44c8",
                "filename": "CVE-2025-40300-510603f504796c3535f67f55fb0b124a303b44c8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40300/CVE-2025-40300-510603f504796c3535f67f55fb0b124a303b44c8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/893387c18612bb452336a5881da0d015a7e8f4a2",
                "patch_url": "https://git.kernel.org/stable/p/893387c18612bb452336a5881da0d015a7e8f4a2",
                "filename": "CVE-2025-40300-893387c18612bb452336a5881da0d015a7e8f4a2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40300/CVE-2025-40300-893387c18612bb452336a5881da0d015a7e8f4a2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9c23a90648e831d611152ac08dbcd1283d405e7f",
                "patch_url": "https://git.kernel.org/stable/p/9c23a90648e831d611152ac08dbcd1283d405e7f",
                "filename": "CVE-2025-40300-9c23a90648e831d611152ac08dbcd1283d405e7f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40300/CVE-2025-40300-9c23a90648e831d611152ac08dbcd1283d405e7f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ac60717f9a8d21c58617d0b34274babf24135835",
                "patch_url": "https://git.kernel.org/stable/p/ac60717f9a8d21c58617d0b34274babf24135835",
                "filename": "CVE-2025-40300-ac60717f9a8d21c58617d0b34274babf24135835.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40300/CVE-2025-40300-ac60717f9a8d21c58617d0b34274babf24135835.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c08192b5d6730a914dee6175bc71092ee6a65f14",
                "patch_url": "https://git.kernel.org/stable/p/c08192b5d6730a914dee6175bc71092ee6a65f14",
                "filename": "CVE-2025-40300-c08192b5d6730a914dee6175bc71092ee6a65f14.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40300/CVE-2025-40300-c08192b5d6730a914dee6175bc71092ee6a65f14.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d5490dfa35427a2967e00a4c7a1b95fdbc8ede34",
                "patch_url": "https://git.kernel.org/stable/p/d5490dfa35427a2967e00a4c7a1b95fdbc8ede34",
                "filename": "CVE-2025-40300-d5490dfa35427a2967e00a4c7a1b95fdbc8ede34.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40300/CVE-2025-40300-d5490dfa35427a2967e00a4c7a1b95fdbc8ede34.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d7ddc93392e4a7ffcccc86edf6ef3e64c778db52",
                "patch_url": "https://git.kernel.org/stable/p/d7ddc93392e4a7ffcccc86edf6ef3e64c778db52",
                "filename": "CVE-2025-40300-d7ddc93392e4a7ffcccc86edf6ef3e64c778db52.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40300/CVE-2025-40300-d7ddc93392e4a7ffcccc86edf6ef3e64c778db52.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f866eef8d1c65504d30923c3f14082ad294d0e6d",
                "patch_url": "https://git.kernel.org/stable/p/f866eef8d1c65504d30923c3f14082ad294d0e6d",
                "filename": "CVE-2025-40300-f866eef8d1c65504d30923c3f14082ad294d0e6d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40300/CVE-2025-40300-f866eef8d1c65504d30923c3f14082ad294d0e6d.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/15006289e5c38b2a830e1fba221977a27598176c",
            "https://git.kernel.org/stable/c/2f4f2f8f860cb4c3336a7435ebe8dcfded0c9c6e",
            "https://git.kernel.org/stable/c/2f8f173413f1cbf52660d04df92d0069c4306d25",
            "https://git.kernel.org/stable/c/34e5667041050711a947e260fc9ebebe08bddee5",
            "https://git.kernel.org/stable/c/459274c77b37ac63b78c928b4b4e748d1f9d05c8",
            "https://git.kernel.org/stable/c/510603f504796c3535f67f55fb0b124a303b44c8",
            "https://git.kernel.org/stable/c/893387c18612bb452336a5881da0d015a7e8f4a2",
            "https://git.kernel.org/stable/c/9c23a90648e831d611152ac08dbcd1283d405e7f",
            "https://git.kernel.org/stable/c/ac60717f9a8d21c58617d0b34274babf24135835",
            "https://git.kernel.org/stable/c/c08192b5d6730a914dee6175bc71092ee6a65f14",
            "https://git.kernel.org/stable/c/d5490dfa35427a2967e00a4c7a1b95fdbc8ede34",
            "https://git.kernel.org/stable/c/d7ddc93392e4a7ffcccc86edf6ef3e64c778db52",
            "https://git.kernel.org/stable/c/f866eef8d1c65504d30923c3f14082ad294d0e6d",
            "https://www.cve.org/CVERecord?id=CVE-2025-40300\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40300\nhttps://lore.kernel.org/linux-cve-announce/2025091128-CVE-2025-40300-5569@gregkh/"
        ]
    },
    "CVE-2025-40304": {
        "cve": "CVE-2025-40304",
        "cvss_v2": null,
        "cvss_v3": "7.3",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds\n\nAdd bounds checking to prevent writes past framebuffer boundaries when\nrendering text near screen edges. Return early if the Y position is off-screen\nand clip image height to screen boundary. Break from the rendering loop if the\nX position is off-screen. When clipping image width to fit the screen, update\nthe character count to match the clipped width to prevent buffer size\nmismatches.\n\nWithout the character count update, bit_putcs_aligned and bit_putcs_unaligned\nreceive mismatched parameters where the buffer is allocated for the clipped\nwidth but cnt reflects the original larger count, causing out-of-bounds writes.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40304",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/3637d34b35b287ab830e66048841ace404382b67",
            "patch_url": "https://git.kernel.org/stable/p/3637d34b35b287ab830e66048841ace404382b67",
            "filename": "CVE-2025-40304-3637d34b35b287ab830e66048841ace404382b67.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40304/CVE-2025-40304-3637d34b35b287ab830e66048841ace404382b67.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/15ba9acafb0517f8359ca30002c189a68ddbb939",
                "patch_url": "https://git.kernel.org/stable/p/15ba9acafb0517f8359ca30002c189a68ddbb939",
                "filename": "CVE-2025-40304-15ba9acafb0517f8359ca30002c189a68ddbb939.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40304/CVE-2025-40304-15ba9acafb0517f8359ca30002c189a68ddbb939.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/1943b69e87b0ab35032d47de0a7fca9a3d1d6fc1",
                "patch_url": "https://git.kernel.org/stable/p/1943b69e87b0ab35032d47de0a7fca9a3d1d6fc1",
                "filename": "CVE-2025-40304-1943b69e87b0ab35032d47de0a7fca9a3d1d6fc1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40304/CVE-2025-40304-1943b69e87b0ab35032d47de0a7fca9a3d1d6fc1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2d1359e11674ed4274934eac8a71877ae5ae7bbb",
                "patch_url": "https://git.kernel.org/stable/p/2d1359e11674ed4274934eac8a71877ae5ae7bbb",
                "filename": "CVE-2025-40304-2d1359e11674ed4274934eac8a71877ae5ae7bbb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40304/CVE-2025-40304-2d1359e11674ed4274934eac8a71877ae5ae7bbb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3637d34b35b287ab830e66048841ace404382b67",
                "patch_url": "https://git.kernel.org/stable/p/3637d34b35b287ab830e66048841ace404382b67",
                "filename": "CVE-2025-40304-3637d34b35b287ab830e66048841ace404382b67.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40304/CVE-2025-40304-3637d34b35b287ab830e66048841ace404382b67.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/86df8ade88d290725554cefd03101ecd0fbd3752",
                "patch_url": "https://git.kernel.org/stable/p/86df8ade88d290725554cefd03101ecd0fbd3752",
                "filename": "CVE-2025-40304-86df8ade88d290725554cefd03101ecd0fbd3752.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40304/CVE-2025-40304-86df8ade88d290725554cefd03101ecd0fbd3752.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/996bfaa7372d6718b6d860bdf78f6618e850c702",
                "patch_url": "https://git.kernel.org/stable/p/996bfaa7372d6718b6d860bdf78f6618e850c702",
                "filename": "CVE-2025-40304-996bfaa7372d6718b6d860bdf78f6618e850c702.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40304/CVE-2025-40304-996bfaa7372d6718b6d860bdf78f6618e850c702.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ebc0730b490c7f27340b1222e01dd106e820320d",
                "patch_url": "https://git.kernel.org/stable/p/ebc0730b490c7f27340b1222e01dd106e820320d",
                "filename": "CVE-2025-40304-ebc0730b490c7f27340b1222e01dd106e820320d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40304/CVE-2025-40304-ebc0730b490c7f27340b1222e01dd106e820320d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f0982400648a3e00580253e0c48e991f34d2684c",
                "patch_url": "https://git.kernel.org/stable/p/f0982400648a3e00580253e0c48e991f34d2684c",
                "filename": "CVE-2025-40304-f0982400648a3e00580253e0c48e991f34d2684c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40304/CVE-2025-40304-f0982400648a3e00580253e0c48e991f34d2684c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/15ba9acafb0517f8359ca30002c189a68ddbb939",
            "https://git.kernel.org/stable/c/1943b69e87b0ab35032d47de0a7fca9a3d1d6fc1",
            "https://git.kernel.org/stable/c/2d1359e11674ed4274934eac8a71877ae5ae7bbb",
            "https://git.kernel.org/stable/c/3637d34b35b287ab830e66048841ace404382b67",
            "https://git.kernel.org/stable/c/86df8ade88d290725554cefd03101ecd0fbd3752",
            "https://git.kernel.org/stable/c/996bfaa7372d6718b6d860bdf78f6618e850c702",
            "https://git.kernel.org/stable/c/ebc0730b490c7f27340b1222e01dd106e820320d",
            "https://git.kernel.org/stable/c/f0982400648a3e00580253e0c48e991f34d2684c",
            "https://www.cve.org/CVERecord?id=CVE-2025-40304\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40304\nhttps://lore.kernel.org/linux-cve-announce/2025120820-CVE-2025-40304-47b3@gregkh/T"
        ]
    },
    "CVE-2025-40322": {
        "cve": "CVE-2025-40322",
        "cvss_v2": null,
        "cvss_v3": "7.1",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: bitblit: bound-check glyph index in bit_putcs*\n\nbit_putcs_aligned()/unaligned() derived the glyph pointer from the\ncharacter value masked by 0xff/0x1ff, which may exceed the actual font's\nglyph count and read past the end of the built-in font array.\nClamp the index to the actual glyph count before computing the address.\n\nThis fixes a global out-of-bounds read reported by syzbot.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-40322",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/a10cede006f9614b465cf25609a8753efbfd45cc",
            "patch_url": "https://git.kernel.org/stable/p/a10cede006f9614b465cf25609a8753efbfd45cc",
            "filename": "CVE-2025-40322-a10cede006f9614b465cf25609a8753efbfd45cc.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40322/CVE-2025-40322-a10cede006f9614b465cf25609a8753efbfd45cc.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0998a6cb232674408a03e8561dc15aa266b2f53b",
                "patch_url": "https://git.kernel.org/stable/p/0998a6cb232674408a03e8561dc15aa266b2f53b",
                "filename": "CVE-2025-40322-0998a6cb232674408a03e8561dc15aa266b2f53b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40322/CVE-2025-40322-0998a6cb232674408a03e8561dc15aa266b2f53b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/18c4ef4e765a798b47980555ed665d78b71aeadf",
                "patch_url": "https://git.kernel.org/stable/p/18c4ef4e765a798b47980555ed665d78b71aeadf",
                "filename": "CVE-2025-40322-18c4ef4e765a798b47980555ed665d78b71aeadf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40322/CVE-2025-40322-18c4ef4e765a798b47980555ed665d78b71aeadf.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/901f44227072be60812fe8083e83e1533c04eed1",
                "patch_url": "https://git.kernel.org/stable/p/901f44227072be60812fe8083e83e1533c04eed1",
                "filename": "CVE-2025-40322-901f44227072be60812fe8083e83e1533c04eed1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40322/CVE-2025-40322-901f44227072be60812fe8083e83e1533c04eed1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/9ba1a7802ca9a2590cef95b253e6526f4364477f",
                "patch_url": "https://git.kernel.org/stable/p/9ba1a7802ca9a2590cef95b253e6526f4364477f",
                "filename": "CVE-2025-40322-9ba1a7802ca9a2590cef95b253e6526f4364477f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40322/CVE-2025-40322-9ba1a7802ca9a2590cef95b253e6526f4364477f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/a10cede006f9614b465cf25609a8753efbfd45cc",
                "patch_url": "https://git.kernel.org/stable/p/a10cede006f9614b465cf25609a8753efbfd45cc",
                "filename": "CVE-2025-40322-a10cede006f9614b465cf25609a8753efbfd45cc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40322/CVE-2025-40322-a10cede006f9614b465cf25609a8753efbfd45cc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c12003bf91fdff381c55ef54fef3e961a5af2545",
                "patch_url": "https://git.kernel.org/stable/p/c12003bf91fdff381c55ef54fef3e961a5af2545",
                "filename": "CVE-2025-40322-c12003bf91fdff381c55ef54fef3e961a5af2545.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40322/CVE-2025-40322-c12003bf91fdff381c55ef54fef3e961a5af2545.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/db5c9a162d2f42bcc842b76b3d935dcc050a0eec",
                "patch_url": "https://git.kernel.org/stable/p/db5c9a162d2f42bcc842b76b3d935dcc050a0eec",
                "filename": "CVE-2025-40322-db5c9a162d2f42bcc842b76b3d935dcc050a0eec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40322/CVE-2025-40322-db5c9a162d2f42bcc842b76b3d935dcc050a0eec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/efaf89a75a29b2d179bf4fe63ca62852e93ad620",
                "patch_url": "https://git.kernel.org/stable/p/efaf89a75a29b2d179bf4fe63ca62852e93ad620",
                "filename": "CVE-2025-40322-efaf89a75a29b2d179bf4fe63ca62852e93ad620.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-40322/CVE-2025-40322-efaf89a75a29b2d179bf4fe63ca62852e93ad620.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0998a6cb232674408a03e8561dc15aa266b2f53b",
            "https://git.kernel.org/stable/c/18c4ef4e765a798b47980555ed665d78b71aeadf",
            "https://git.kernel.org/stable/c/901f44227072be60812fe8083e83e1533c04eed1",
            "https://git.kernel.org/stable/c/9ba1a7802ca9a2590cef95b253e6526f4364477f",
            "https://git.kernel.org/stable/c/a10cede006f9614b465cf25609a8753efbfd45cc",
            "https://git.kernel.org/stable/c/c12003bf91fdff381c55ef54fef3e961a5af2545",
            "https://git.kernel.org/stable/c/db5c9a162d2f42bcc842b76b3d935dcc050a0eec",
            "https://git.kernel.org/stable/c/efaf89a75a29b2d179bf4fe63ca62852e93ad620",
            "https://www.cve.org/CVERecord?id=CVE-2025-40322\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-40322\nhttps://lore.kernel.org/linux-cve-announce/2025120823-CVE-2025-40322-6355@gregkh/T"
        ]
    },
    "CVE-2025-4373": {
        "cve": "CVE-2025-4373",
        "cvss_v2": null,
        "cvss_v3": 4.8,
        "description": "A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-4373",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-47273": {
        "cve": "CVE-2025-47273",
        "cvss_v2": null,
        "cvss_v3": 8.8,
        "description": "setuptools is a package that allows users to download, build, install, upgrade, and uninstall Python packages. A path traversal vulnerability in `PackageIndex` is present in setuptools prior to version 78.1.1. An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to remote code execution depending on the context. Version 78.1.1 fixes the issue.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-47273",
        "selected_patch": {
            "url": "https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b",
            "patch_url": "https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b.patch",
            "filename": "CVE-2025-47273-250a6d17978f9f6ac3ac887091f2d32886fbbb0b.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-47273/CVE-2025-47273-250a6d17978f9f6ac3ac887091f2d32886fbbb0b.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b",
                "patch_url": "https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b.patch",
                "filename": "CVE-2025-47273-250a6d17978f9f6ac3ac887091f2d32886fbbb0b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-47273/CVE-2025-47273-250a6d17978f9f6ac3ac887091f2d32886fbbb0b.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b"
        ]
    },
    "CVE-2025-49794": {
        "cve": "CVE-2025-49794",
        "cvss_v2": null,
        "cvss_v3": 9.1,
        "description": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path=\"...\"/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-49794",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-49796": {
        "cve": "CVE-2025-49796",
        "cvss_v2": null,
        "cvss_v3": 9.1,
        "description": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-49796",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-5318": {
        "cve": "CVE-2025-5318",
        "cvss_v2": null,
        "cvss_v3": 8.1,
        "description": "A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-5318",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-5372": {
        "cve": "CVE-2025-5372",
        "cvss_v2": null,
        "cvss_v3": 5,
        "description": "A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success\u2014the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-5372",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-53905": {
        "cve": "CVE-2025-53905",
        "cvss_v2": null,
        "cvss_v3": 4.1,
        "description": "Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim\u2019s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-53905",
        "selected_patch": {
            "url": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239",
            "patch_url": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239.patch",
            "filename": "CVE-2025-53905-87757c6b0a4b2c1f71c72ea8e1438b8fb116b239.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-53905/CVE-2025-53905-87757c6b0a4b2c1f71c72ea8e1438b8fb116b239.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239",
                "patch_url": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239.patch",
                "filename": "CVE-2025-53905-87757c6b0a4b2c1f71c72ea8e1438b8fb116b239.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-53905/CVE-2025-53905-87757c6b0a4b2c1f71c72ea8e1438b8fb116b239.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239"
        ]
    },
    "CVE-2025-53906": {
        "cve": "CVE-2025-53906",
        "cvss_v2": null,
        "cvss_v3": 4.1,
        "description": "Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim\u2019s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-53906",
        "selected_patch": {
            "url": "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8",
            "patch_url": "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8.patch",
            "filename": "CVE-2025-53906-586294a04179d855c3d1d4ee5ea83931963680b8.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-53906/CVE-2025-53906-586294a04179d855c3d1d4ee5ea83931963680b8.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8",
                "patch_url": "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8.patch",
                "filename": "CVE-2025-53906-586294a04179d855c3d1d4ee5ea83931963680b8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-53906/CVE-2025-53906-586294a04179d855c3d1d4ee5ea83931963680b8.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8"
        ]
    },
    "CVE-2025-5914": {
        "cve": "CVE-2025-5914",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-5914",
        "selected_patch": {
            "url": "https://github.com/libarchive/libarchive/pull/2598",
            "patch_url": "https://github.com/libarchive/libarchive/pull/2598.patch",
            "filename": "CVE-2025-5914-https___github_com_libarchive_libarchive_pull_2598_patch.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-5914/CVE-2025-5914-https___github_com_libarchive_libarchive_pull_2598_patch.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/libarchive/libarchive/pull/2598",
                "patch_url": "https://github.com/libarchive/libarchive/pull/2598.patch",
                "filename": "CVE-2025-5914-https___github_com_libarchive_libarchive_pull_2598_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-5914/CVE-2025-5914-https___github_com_libarchive_libarchive_pull_2598_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/libarchive/libarchive/pull/2598"
        ]
    },
    "CVE-2025-59375": {
        "cve": "CVE-2025-59375",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-59375",
        "selected_patch": {
            "url": "https://github.com/libexpat/libexpat/pull/1034",
            "patch_url": "https://github.com/libexpat/libexpat/pull/1034.patch",
            "filename": "CVE-2025-59375-https___github_com_libexpat_libexpat_pull_1034_patch.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-59375/CVE-2025-59375-https___github_com_libexpat_libexpat_pull_1034_patch.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/libexpat/libexpat/pull/1034",
                "patch_url": "https://github.com/libexpat/libexpat/pull/1034.patch",
                "filename": "CVE-2025-59375-https___github_com_libexpat_libexpat_pull_1034_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-59375/CVE-2025-59375-https___github_com_libexpat_libexpat_pull_1034_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/libexpat/libexpat/pull/1034"
        ]
    },
    "CVE-2025-5994": {
        "cve": "CVE-2025-5994",
        "cvss_v2": null,
        "cvss_v3": "7.5",
        "description": "A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-5994",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-6020": {
        "cve": "CVE-2025-6020",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-6020",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-6021": {
        "cve": "CVE-2025-6021",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-6021",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-61662": {
        "cve": "CVE-2025-61662",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-61662",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-6176": {
        "cve": "CVE-2025-6176",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-6176",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-61984": {
        "cve": "CVE-2025-61984",
        "cvss_v2": null,
        "cvss_v3": 3.6,
        "description": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-61984",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-61985": {
        "cve": "CVE-2025-61985",
        "cvss_v2": null,
        "cvss_v3": 3.6,
        "description": "ssh in OpenSSH before 10.1 allows the '\\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-61985",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-64720": {
        "cve": "CVE-2025-64720",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component \u2264 alpha \u00d7 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-64720",
        "selected_patch": {
            "url": "https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643",
            "patch_url": "https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643.patch",
            "filename": "CVE-2025-64720-08da33b4c88cfcd36e5a706558a8d7e0e4773643.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-64720/CVE-2025-64720-08da33b4c88cfcd36e5a706558a8d7e0e4773643.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643",
                "patch_url": "https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643.patch",
                "filename": "CVE-2025-64720-08da33b4c88cfcd36e5a706558a8d7e0e4773643.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-64720/CVE-2025-64720-08da33b4c88cfcd36e5a706558a8d7e0e4773643.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/pnggroup/libpng/pull/751",
                "patch_url": "https://github.com/pnggroup/libpng/pull/751.patch",
                "filename": "CVE-2025-64720-https___github_com_pnggroup_libpng_pull_751_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-64720/CVE-2025-64720-https___github_com_pnggroup_libpng_pull_751_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643",
            "https://github.com/pnggroup/libpng/pull/751"
        ]
    },
    "CVE-2025-65018": {
        "cve": "CVE-2025-65018",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-65018",
        "selected_patch": {
            "url": "https://github.com/pnggroup/libpng/commit/16b5e3823918840aae65c0a6da57c78a5a496a4d",
            "patch_url": "https://github.com/pnggroup/libpng/commit/16b5e3823918840aae65c0a6da57c78a5a496a4d.patch",
            "filename": "CVE-2025-65018-16b5e3823918840aae65c0a6da57c78a5a496a4d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-65018/CVE-2025-65018-16b5e3823918840aae65c0a6da57c78a5a496a4d.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/pnggroup/libpng/commit/16b5e3823918840aae65c0a6da57c78a5a496a4d",
                "patch_url": "https://github.com/pnggroup/libpng/commit/16b5e3823918840aae65c0a6da57c78a5a496a4d.patch",
                "filename": "CVE-2025-65018-16b5e3823918840aae65c0a6da57c78a5a496a4d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-65018/CVE-2025-65018-16b5e3823918840aae65c0a6da57c78a5a496a4d.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea",
                "patch_url": "https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea.patch",
                "filename": "CVE-2025-65018-218612ddd6b17944e21eda56caf8b4bf7779d1ea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-65018/CVE-2025-65018-218612ddd6b17944e21eda56caf8b4bf7779d1ea.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/pnggroup/libpng/pull/757",
                "patch_url": "https://github.com/pnggroup/libpng/pull/757.patch",
                "filename": "CVE-2025-65018-https___github_com_pnggroup_libpng_pull_757_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-65018/CVE-2025-65018-https___github_com_pnggroup_libpng_pull_757_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/pnggroup/libpng/commit/16b5e3823918840aae65c0a6da57c78a5a496a4d",
            "https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea",
            "https://github.com/pnggroup/libpng/pull/757"
        ]
    },
    "CVE-2025-66293": {
        "cve": "CVE-2025-66293",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng's simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng's internal state management. Upgrade to libpng 1.6.52 or later.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-66293",
        "selected_patch": {
            "url": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1",
            "patch_url": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1.patch",
            "filename": "CVE-2025-66293-788a624d7387a758ffd5c7ab010f1870dea753a1.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-66293/CVE-2025-66293-788a624d7387a758ffd5c7ab010f1870dea753a1.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1",
                "patch_url": "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1.patch",
                "filename": "CVE-2025-66293-788a624d7387a758ffd5c7ab010f1870dea753a1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-66293/CVE-2025-66293-788a624d7387a758ffd5c7ab010f1870dea753a1.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a",
                "patch_url": "https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a.patch",
                "filename": "CVE-2025-66293-a05a48b756de63e3234ea6b3b938b8f5f862484a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-66293/CVE-2025-66293-a05a48b756de63e3234ea6b3b938b8f5f862484a.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1",
            "https://github.com/pnggroup/libpng/commit/a05a48b756de63e3234ea6b3b938b8f5f862484a"
        ]
    },
    "CVE-2025-68285": {
        "cve": "CVE-2025-68285",
        "cvss_v2": null,
        "cvss_v3": "7.0",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: fix potential use-after-free in have_mon_and_osd_map()\n\nThe wait loop in __ceph_open_session() can race with the client\nreceiving a new monmap or osdmap shortly after the initial map is\nreceived.  Both ceph_monc_handle_map() and handle_one_map() install\na new map immediately after freeing the old one\n\n    kfree(monc->monmap);\n    monc->monmap = monmap;\n\n    ceph_osdmap_destroy(osdc->osdmap);\n    osdc->osdmap = newmap;\n\nunder client->monc.mutex and client->osdc.lock respectively, but\nbecause neither is taken in have_mon_and_osd_map() it's possible for\nclient->monc.monmap->epoch and client->osdc.osdmap->epoch arms in\n\n    client->monc.monmap && client->monc.monmap->epoch &&\n        client->osdc.osdmap && client->osdc.osdmap->epoch;\n\ncondition to dereference an already freed map.  This happens to be\nreproducible with generic/395 and generic/397 with KASAN enabled:\n\n    BUG: KASAN: slab-use-after-free in have_mon_and_osd_map+0x56/0x70\n    Read of size 4 at addr ffff88811012d810 by task mount.ceph/13305\n    CPU: 2 UID: 0 PID: 13305 Comm: mount.ceph Not tainted 6.14.0-rc2-build2+ #1266\n    ...\n    Call Trace:\n    <TASK>\n    have_mon_and_osd_map+0x56/0x70\n    ceph_open_session+0x182/0x290\n    ceph_get_tree+0x333/0x680\n    vfs_get_tree+0x49/0x180\n    do_new_mount+0x1a3/0x2d0\n    path_mount+0x6dd/0x730\n    do_mount+0x99/0xe0\n    __do_sys_mount+0x141/0x180\n    do_syscall_64+0x9f/0x100\n    entry_SYSCALL_64_after_hwframe+0x76/0x7e\n    </TASK>\n\n    Allocated by task 13305:\n    ceph_osdmap_alloc+0x16/0x130\n    ceph_osdc_init+0x27a/0x4c0\n    ceph_create_client+0x153/0x190\n    create_fs_client+0x50/0x2a0\n    ceph_get_tree+0xff/0x680\n    vfs_get_tree+0x49/0x180\n    do_new_mount+0x1a3/0x2d0\n    path_mount+0x6dd/0x730\n    do_mount+0x99/0xe0\n    __do_sys_mount+0x141/0x180\n    do_syscall_64+0x9f/0x100\n    entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n    Freed by task 9475:\n    kfree+0x212/0x290\n    handle_one_map+0x23c/0x3b0\n    ceph_osdc_handle_map+0x3c9/0x590\n    mon_dispatch+0x655/0x6f0\n    ceph_con_process_message+0xc3/0xe0\n    ceph_con_v1_try_read+0x614/0x760\n    ceph_con_workfn+0x2de/0x650\n    process_one_work+0x486/0x7c0\n    process_scheduled_works+0x73/0x90\n    worker_thread+0x1c8/0x2a0\n    kthread+0x2ec/0x300\n    ret_from_fork+0x24/0x40\n    ret_from_fork_asm+0x1a/0x30\n\nRewrite the wait loop to check the above condition directly with\nclient->monc.mutex and client->osdc.lock taken as appropriate.  While\nat it, improve the timeout handling (previously mount_timeout could be\nexceeded in case wait_event_interruptible_timeout() slept more than\nonce) and access client->auth_err under client->monc.mutex to match\nhow it's set in finish_auth().\n\nmonmap_show() and osdmap_show() now take the respective lock before\naccessing the map as well.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-68285",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/05ec43e9a9de67132dc8cd3b22afef001574947f",
            "patch_url": "https://git.kernel.org/stable/p/05ec43e9a9de67132dc8cd3b22afef001574947f",
            "filename": "CVE-2025-68285-05ec43e9a9de67132dc8cd3b22afef001574947f.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68285/CVE-2025-68285-05ec43e9a9de67132dc8cd3b22afef001574947f.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/05ec43e9a9de67132dc8cd3b22afef001574947f",
                "patch_url": "https://git.kernel.org/stable/p/05ec43e9a9de67132dc8cd3b22afef001574947f",
                "filename": "CVE-2025-68285-05ec43e9a9de67132dc8cd3b22afef001574947f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68285/CVE-2025-68285-05ec43e9a9de67132dc8cd3b22afef001574947f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/076381c261374c587700b3accf410bdd2dba334e",
                "patch_url": "https://git.kernel.org/stable/p/076381c261374c587700b3accf410bdd2dba334e",
                "filename": "CVE-2025-68285-076381c261374c587700b3accf410bdd2dba334e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68285/CVE-2025-68285-076381c261374c587700b3accf410bdd2dba334e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/183ad6e3b651e8fb0b66d6a2678f4b80bfbba092",
                "patch_url": "https://git.kernel.org/stable/p/183ad6e3b651e8fb0b66d6a2678f4b80bfbba092",
                "filename": "CVE-2025-68285-183ad6e3b651e8fb0b66d6a2678f4b80bfbba092.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68285/CVE-2025-68285-183ad6e3b651e8fb0b66d6a2678f4b80bfbba092.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3fc43120b22a3d4f1fbeff56a35ce2105b6a5683",
                "patch_url": "https://git.kernel.org/stable/p/3fc43120b22a3d4f1fbeff56a35ce2105b6a5683",
                "filename": "CVE-2025-68285-3fc43120b22a3d4f1fbeff56a35ce2105b6a5683.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68285/CVE-2025-68285-3fc43120b22a3d4f1fbeff56a35ce2105b6a5683.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7c8ccdc1714d9fabecd26e1be7db1771061acc6e",
                "patch_url": "https://git.kernel.org/stable/p/7c8ccdc1714d9fabecd26e1be7db1771061acc6e",
                "filename": "CVE-2025-68285-7c8ccdc1714d9fabecd26e1be7db1771061acc6e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68285/CVE-2025-68285-7c8ccdc1714d9fabecd26e1be7db1771061acc6e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bb4910c5fd436701faf367e1b5476a5a6d2aff1c",
                "patch_url": "https://git.kernel.org/stable/p/bb4910c5fd436701faf367e1b5476a5a6d2aff1c",
                "filename": "CVE-2025-68285-bb4910c5fd436701faf367e1b5476a5a6d2aff1c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68285/CVE-2025-68285-bb4910c5fd436701faf367e1b5476a5a6d2aff1c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e08021b3b56b2407f37b5fe47b654be80cc665fb",
                "patch_url": "https://git.kernel.org/stable/p/e08021b3b56b2407f37b5fe47b654be80cc665fb",
                "filename": "CVE-2025-68285-e08021b3b56b2407f37b5fe47b654be80cc665fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68285/CVE-2025-68285-e08021b3b56b2407f37b5fe47b654be80cc665fb.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/05ec43e9a9de67132dc8cd3b22afef001574947f",
            "https://git.kernel.org/stable/c/076381c261374c587700b3accf410bdd2dba334e",
            "https://git.kernel.org/stable/c/183ad6e3b651e8fb0b66d6a2678f4b80bfbba092",
            "https://git.kernel.org/stable/c/3fc43120b22a3d4f1fbeff56a35ce2105b6a5683",
            "https://git.kernel.org/stable/c/7c8ccdc1714d9fabecd26e1be7db1771061acc6e",
            "https://git.kernel.org/stable/c/bb4910c5fd436701faf367e1b5476a5a6d2aff1c",
            "https://git.kernel.org/stable/c/e08021b3b56b2407f37b5fe47b654be80cc665fb",
            "https://www.cve.org/CVERecord?id=CVE-2025-68285\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-68285\nhttps://lore.kernel.org/linux-cve-announce/2025121638-CVE-2025-68285-8339@gregkh/T"
        ]
    },
    "CVE-2025-68301": {
        "cve": "CVE-2025-68301",
        "cvss_v2": null,
        "cvss_v3": "7.0",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atlantic: fix fragment overflow handling in RX path\n\nThe atlantic driver can receive packets with more than MAX_SKB_FRAGS (17)\nfragments when handling large multi-descriptor packets. This causes an\nout-of-bounds write in skb_add_rx_frag_netmem() leading to kernel panic.\n\nThe issue occurs because the driver doesn't check the total number of\nfragments before calling skb_add_rx_frag(). When a packet requires more\nthan MAX_SKB_FRAGS fragments, the fragment index exceeds the array bounds.\n\nFix by assuming there will be an extra frag if buff->len > AQ_CFG_RX_HDR_SIZE,\nthen all fragments are accounted for. And reusing the existing check to\nprevent the overflow earlier in the code path.\n\nThis crash occurred in production with an Aquantia AQC113 10G NIC.\n\nStack trace from production environment:\n```\nRIP: 0010:skb_add_rx_frag_netmem+0x29/0xd0\nCode: 90 f3 0f 1e fa 0f 1f 44 00 00 48 89 f8 41 89\nca 48 89 d7 48 63 ce 8b 90 c0 00 00 00 48 c1 e1 04 48 01 ca 48 03 90\nc8 00 00 00 <48> 89 7a 30 44 89 52 3c 44 89 42 38 40 f6 c7 01 75 74 48\n89 fa 83\nRSP: 0018:ffffa9bec02a8d50 EFLAGS: 00010287\nRAX: ffff925b22e80a00 RBX: ffff925ad38d2700 RCX:\nfffffffe0a0c8000\nRDX: ffff9258ea95bac0 RSI: ffff925ae0a0c800 RDI:\n0000000000037a40\nRBP: 0000000000000024 R08: 0000000000000000 R09:\n0000000000000021\nR10: 0000000000000848 R11: 0000000000000000 R12:\nffffa9bec02a8e24\nR13: ffff925ad8615570 R14: 0000000000000000 R15:\nffff925b22e80a00\nFS: 0000000000000000(0000)\nGS:ffff925e47880000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffff9258ea95baf0 CR3: 0000000166022004 CR4:\n0000000000f72ef0\nPKRU: 55555554\nCall Trace:\n<IRQ>\naq_ring_rx_clean+0x175/0xe60 [atlantic]\n? aq_ring_rx_clean+0x14d/0xe60 [atlantic]\n? aq_ring_tx_clean+0xdf/0x190 [atlantic]\n? kmem_cache_free+0x348/0x450\n? aq_vec_poll+0x81/0x1d0 [atlantic]\n? __napi_poll+0x28/0x1c0\n? net_rx_action+0x337/0x420\n```\n\nChanges in v4:\n- Add Fixes: tag to satisfy patch validation requirements.\n\nChanges in v3:\n- Fix by assuming there will be an extra frag if buff->len > AQ_CFG_RX_HDR_SIZE,\n  then all fragments are accounted for.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-68301",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/34147477eeab24077fcfe9649e282849347d760c",
            "patch_url": "https://git.kernel.org/stable/p/34147477eeab24077fcfe9649e282849347d760c",
            "filename": "CVE-2025-68301-34147477eeab24077fcfe9649e282849347d760c.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68301/CVE-2025-68301-34147477eeab24077fcfe9649e282849347d760c.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/34147477eeab24077fcfe9649e282849347d760c",
                "patch_url": "https://git.kernel.org/stable/p/34147477eeab24077fcfe9649e282849347d760c",
                "filename": "CVE-2025-68301-34147477eeab24077fcfe9649e282849347d760c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68301/CVE-2025-68301-34147477eeab24077fcfe9649e282849347d760c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3be37c3c96b16462394fcb8e15e757c691377038",
                "patch_url": "https://git.kernel.org/stable/p/3be37c3c96b16462394fcb8e15e757c691377038",
                "filename": "CVE-2025-68301-3be37c3c96b16462394fcb8e15e757c691377038.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68301/CVE-2025-68301-3be37c3c96b16462394fcb8e15e757c691377038.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3fd2105e1b7e041cc24be151c9a31a14d5fc50ab",
                "patch_url": "https://git.kernel.org/stable/p/3fd2105e1b7e041cc24be151c9a31a14d5fc50ab",
                "filename": "CVE-2025-68301-3fd2105e1b7e041cc24be151c9a31a14d5fc50ab.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68301/CVE-2025-68301-3fd2105e1b7e041cc24be151c9a31a14d5fc50ab.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5d6051ea1b0417ae2f06a8440d22e48fbc8f8997",
                "patch_url": "https://git.kernel.org/stable/p/5d6051ea1b0417ae2f06a8440d22e48fbc8f8997",
                "filename": "CVE-2025-68301-5d6051ea1b0417ae2f06a8440d22e48fbc8f8997.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68301/CVE-2025-68301-5d6051ea1b0417ae2f06a8440d22e48fbc8f8997.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5ffcb7b890f61541201461580bb6622ace405aec",
                "patch_url": "https://git.kernel.org/stable/p/5ffcb7b890f61541201461580bb6622ace405aec",
                "filename": "CVE-2025-68301-5ffcb7b890f61541201461580bb6622ace405aec.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68301/CVE-2025-68301-5ffcb7b890f61541201461580bb6622ace405aec.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/64e47cd1fd631a21bf5a630cebefec6c8fc381cd",
                "patch_url": "https://git.kernel.org/stable/p/64e47cd1fd631a21bf5a630cebefec6c8fc381cd",
                "filename": "CVE-2025-68301-64e47cd1fd631a21bf5a630cebefec6c8fc381cd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68301/CVE-2025-68301-64e47cd1fd631a21bf5a630cebefec6c8fc381cd.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b0c4d5135b04ea100988e2458c98f2d8564cda16",
                "patch_url": "https://git.kernel.org/stable/p/b0c4d5135b04ea100988e2458c98f2d8564cda16",
                "filename": "CVE-2025-68301-b0c4d5135b04ea100988e2458c98f2d8564cda16.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68301/CVE-2025-68301-b0c4d5135b04ea100988e2458c98f2d8564cda16.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/34147477eeab24077fcfe9649e282849347d760c",
            "https://git.kernel.org/stable/c/3be37c3c96b16462394fcb8e15e757c691377038",
            "https://git.kernel.org/stable/c/3fd2105e1b7e041cc24be151c9a31a14d5fc50ab",
            "https://git.kernel.org/stable/c/5d6051ea1b0417ae2f06a8440d22e48fbc8f8997",
            "https://git.kernel.org/stable/c/5ffcb7b890f61541201461580bb6622ace405aec",
            "https://git.kernel.org/stable/c/64e47cd1fd631a21bf5a630cebefec6c8fc381cd",
            "https://git.kernel.org/stable/c/b0c4d5135b04ea100988e2458c98f2d8564cda16",
            "https://www.cve.org/CVERecord?id=CVE-2025-68301\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-68301\nhttps://lore.kernel.org/linux-cve-announce/2025121643-CVE-2025-68301-be31@gregkh/T"
        ]
    },
    "CVE-2025-68349": {
        "cve": "CVE-2025-68349",
        "cvss_v2": null,
        "cvss_v3": "7.5",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid\n\nFixes a crash when layout is null during this call stack:\n\nwrite_inode\n    -> nfs4_write_inode\n        -> pnfs_layoutcommit_inode\n\npnfs_set_layoutcommit relies on the lseg refcount to keep the layout\naround. Need to clear NFS_INO_LAYOUTCOMMIT otherwise we might attempt\nto reference a null layout.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-68349",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/38694f9aae00459ab443a7dc8b3949a6b33b560a",
            "patch_url": "https://git.kernel.org/stable/p/38694f9aae00459ab443a7dc8b3949a6b33b560a",
            "filename": "CVE-2025-68349-38694f9aae00459ab443a7dc8b3949a6b33b560a.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68349/CVE-2025-68349-38694f9aae00459ab443a7dc8b3949a6b33b560a.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/084bebe82ad86f718a3af84f34761863e63164ed",
                "patch_url": "https://git.kernel.org/stable/p/084bebe82ad86f718a3af84f34761863e63164ed",
                "filename": "CVE-2025-68349-084bebe82ad86f718a3af84f34761863e63164ed.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68349/CVE-2025-68349-084bebe82ad86f718a3af84f34761863e63164ed.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/104080582ae0aa6dce6c6d75ff89062efe84673b",
                "patch_url": "https://git.kernel.org/stable/p/104080582ae0aa6dce6c6d75ff89062efe84673b",
                "filename": "CVE-2025-68349-104080582ae0aa6dce6c6d75ff89062efe84673b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68349/CVE-2025-68349-104080582ae0aa6dce6c6d75ff89062efe84673b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/38694f9aae00459ab443a7dc8b3949a6b33b560a",
                "patch_url": "https://git.kernel.org/stable/p/38694f9aae00459ab443a7dc8b3949a6b33b560a",
                "filename": "CVE-2025-68349-38694f9aae00459ab443a7dc8b3949a6b33b560a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68349/CVE-2025-68349-38694f9aae00459ab443a7dc8b3949a6b33b560a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/59947dff0fb7c19c09ce6dccbcd253fd542b6c25",
                "patch_url": "https://git.kernel.org/stable/p/59947dff0fb7c19c09ce6dccbcd253fd542b6c25",
                "filename": "CVE-2025-68349-59947dff0fb7c19c09ce6dccbcd253fd542b6c25.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68349/CVE-2025-68349-59947dff0fb7c19c09ce6dccbcd253fd542b6c25.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b6e4e3a08c03200cc4b8067ec8ab3172a989d6fc",
                "patch_url": "https://git.kernel.org/stable/p/b6e4e3a08c03200cc4b8067ec8ab3172a989d6fc",
                "filename": "CVE-2025-68349-b6e4e3a08c03200cc4b8067ec8ab3172a989d6fc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68349/CVE-2025-68349-b6e4e3a08c03200cc4b8067ec8ab3172a989d6fc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ca2e7fdad7c683b64821c94a58b9b68733214dad",
                "patch_url": "https://git.kernel.org/stable/p/ca2e7fdad7c683b64821c94a58b9b68733214dad",
                "filename": "CVE-2025-68349-ca2e7fdad7c683b64821c94a58b9b68733214dad.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68349/CVE-2025-68349-ca2e7fdad7c683b64821c94a58b9b68733214dad.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e0f8058f2cb56de0b7572f51cd563ca5debce746",
                "patch_url": "https://git.kernel.org/stable/p/e0f8058f2cb56de0b7572f51cd563ca5debce746",
                "filename": "CVE-2025-68349-e0f8058f2cb56de0b7572f51cd563ca5debce746.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68349/CVE-2025-68349-e0f8058f2cb56de0b7572f51cd563ca5debce746.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f718f9ea6094843b8c059b073af49ad61e9f49bb",
                "patch_url": "https://git.kernel.org/stable/p/f718f9ea6094843b8c059b073af49ad61e9f49bb",
                "filename": "CVE-2025-68349-f718f9ea6094843b8c059b073af49ad61e9f49bb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68349/CVE-2025-68349-f718f9ea6094843b8c059b073af49ad61e9f49bb.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/084bebe82ad86f718a3af84f34761863e63164ed",
            "https://git.kernel.org/stable/c/104080582ae0aa6dce6c6d75ff89062efe84673b",
            "https://git.kernel.org/stable/c/38694f9aae00459ab443a7dc8b3949a6b33b560a",
            "https://git.kernel.org/stable/c/59947dff0fb7c19c09ce6dccbcd253fd542b6c25",
            "https://git.kernel.org/stable/c/b6e4e3a08c03200cc4b8067ec8ab3172a989d6fc",
            "https://git.kernel.org/stable/c/ca2e7fdad7c683b64821c94a58b9b68733214dad",
            "https://git.kernel.org/stable/c/e0f8058f2cb56de0b7572f51cd563ca5debce746",
            "https://git.kernel.org/stable/c/f718f9ea6094843b8c059b073af49ad61e9f49bb",
            "https://www.cve.org/CVERecord?id=CVE-2025-68349\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-68349\nhttps://lore.kernel.org/linux-cve-announce/2025122453-CVE-2025-68349-12d5@gregkh/T"
        ]
    },
    "CVE-2025-68800": {
        "cve": "CVE-2025-68800",
        "cvss_v2": null,
        "cvss_v3": "7.3",
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats\n\nCited commit added a dedicated mutex (instead of RTNL) to protect the\nmulticast route list, so that it will not change while the driver\nperiodically traverses it in order to update the kernel about multicast\nroute stats that were queried from the device.\n\nOne instance of list entry deletion (during route replace) was missed\nand it can result in a use-after-free [1].\n\nFix by acquiring the mutex before deleting the entry from the list and\nreleasing it afterwards.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_mr_stats_update+0x4a5/0x540 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:1006 [mlxsw_spectrum]\nRead of size 8 at addr ffff8881523c2fa8 by task kworker/2:5/22043\n\nCPU: 2 UID: 0 PID: 22043 Comm: kworker/2:5 Not tainted 6.18.0-rc1-custom-g1a3d6d7cd014 #1 PREEMPT(full)\nHardware name: Mellanox Technologies Ltd. MSN2010/SA002610, BIOS 5.6.5 08/24/2017\nWorkqueue: mlxsw_core mlxsw_sp_mr_stats_update [mlxsw_spectrum]\nCall Trace:\n <TASK>\n dump_stack_lvl+0xba/0x110\n print_report+0x174/0x4f5\n kasan_report+0xdf/0x110\n mlxsw_sp_mr_stats_update+0x4a5/0x540 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:1006 [mlxsw_spectrum]\n process_one_work+0x9cc/0x18e0\n worker_thread+0x5df/0xe40\n kthread+0x3b8/0x730\n ret_from_fork+0x3e9/0x560\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\nAllocated by task 29933:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x8f/0xa0\n mlxsw_sp_mr_route_add+0xd8/0x4770 [mlxsw_spectrum]\n mlxsw_sp_router_fibmr_event_work+0x371/0xad0 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:7965 [mlxsw_spectrum]\n process_one_work+0x9cc/0x18e0\n worker_thread+0x5df/0xe40\n kthread+0x3b8/0x730\n ret_from_fork+0x3e9/0x560\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 29933:\n kasan_save_stack+0x30/0x50\n kasan_save_track+0x14/0x30\n __kasan_save_free_info+0x3b/0x70\n __kasan_slab_free+0x43/0x70\n kfree+0x14e/0x700\n mlxsw_sp_mr_route_add+0x2dea/0x4770 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:444 [mlxsw_spectrum]\n mlxsw_sp_router_fibmr_event_work+0x371/0xad0 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:7965 [mlxsw_spectrum]\n process_one_work+0x9cc/0x18e0\n worker_thread+0x5df/0xe40\n kthread+0x3b8/0x730\n ret_from_fork+0x3e9/0x560\n ret_from_fork_asm+0x1a/0x30",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-68800",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/216afc198484fde110ebeafc017992266f4596ce",
            "patch_url": "https://git.kernel.org/stable/p/216afc198484fde110ebeafc017992266f4596ce",
            "filename": "CVE-2025-68800-216afc198484fde110ebeafc017992266f4596ce.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68800/CVE-2025-68800-216afc198484fde110ebeafc017992266f4596ce.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/216afc198484fde110ebeafc017992266f4596ce",
                "patch_url": "https://git.kernel.org/stable/p/216afc198484fde110ebeafc017992266f4596ce",
                "filename": "CVE-2025-68800-216afc198484fde110ebeafc017992266f4596ce.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68800/CVE-2025-68800-216afc198484fde110ebeafc017992266f4596ce.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/37ca08b35a27ce8fd8e74dd3fd2ae21c23b63b73",
                "patch_url": "https://git.kernel.org/stable/p/37ca08b35a27ce8fd8e74dd3fd2ae21c23b63b73",
                "filename": "CVE-2025-68800-37ca08b35a27ce8fd8e74dd3fd2ae21c23b63b73.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68800/CVE-2025-68800-37ca08b35a27ce8fd8e74dd3fd2ae21c23b63b73.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4049a6ace209f4ed150429f86ae796d7d6a4c22b",
                "patch_url": "https://git.kernel.org/stable/p/4049a6ace209f4ed150429f86ae796d7d6a4c22b",
                "filename": "CVE-2025-68800-4049a6ace209f4ed150429f86ae796d7d6a4c22b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68800/CVE-2025-68800-4049a6ace209f4ed150429f86ae796d7d6a4c22b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5f2831fc593c2b2efbff7dd0dd7441cec76adcd5",
                "patch_url": "https://git.kernel.org/stable/p/5f2831fc593c2b2efbff7dd0dd7441cec76adcd5",
                "filename": "CVE-2025-68800-5f2831fc593c2b2efbff7dd0dd7441cec76adcd5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68800/CVE-2025-68800-5f2831fc593c2b2efbff7dd0dd7441cec76adcd5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6e367c361a523a4b54fe618215c64a0ee189caf0",
                "patch_url": "https://git.kernel.org/stable/p/6e367c361a523a4b54fe618215c64a0ee189caf0",
                "filename": "CVE-2025-68800-6e367c361a523a4b54fe618215c64a0ee189caf0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68800/CVE-2025-68800-6e367c361a523a4b54fe618215c64a0ee189caf0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8ac1dacec458f55f871f7153242ed6ab60373b90",
                "patch_url": "https://git.kernel.org/stable/p/8ac1dacec458f55f871f7153242ed6ab60373b90",
                "filename": "CVE-2025-68800-8ac1dacec458f55f871f7153242ed6ab60373b90.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68800/CVE-2025-68800-8ac1dacec458f55f871f7153242ed6ab60373b90.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b957366f5611bbaba03dd10ef861283347ddcc88",
                "patch_url": "https://git.kernel.org/stable/p/b957366f5611bbaba03dd10ef861283347ddcc88",
                "filename": "CVE-2025-68800-b957366f5611bbaba03dd10ef861283347ddcc88.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68800/CVE-2025-68800-b957366f5611bbaba03dd10ef861283347ddcc88.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/216afc198484fde110ebeafc017992266f4596ce",
            "https://git.kernel.org/stable/c/37ca08b35a27ce8fd8e74dd3fd2ae21c23b63b73",
            "https://git.kernel.org/stable/c/4049a6ace209f4ed150429f86ae796d7d6a4c22b",
            "https://git.kernel.org/stable/c/5f2831fc593c2b2efbff7dd0dd7441cec76adcd5",
            "https://git.kernel.org/stable/c/6e367c361a523a4b54fe618215c64a0ee189caf0",
            "https://git.kernel.org/stable/c/8ac1dacec458f55f871f7153242ed6ab60373b90",
            "https://git.kernel.org/stable/c/b957366f5611bbaba03dd10ef861283347ddcc88",
            "https://www.cve.org/CVERecord?id=CVE-2025-68800\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-68800\nhttps://lore.kernel.org/linux-cve-announce/2026011307-CVE-2025-68800-39d2@gregkh/T"
        ]
    },
    "CVE-2025-68973": {
        "cve": "CVE-2025-68973",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-68973",
        "selected_patch": {
            "url": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9",
            "patch_url": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9.patch",
            "filename": "CVE-2025-68973-115d138ba599328005c5321c0ef9f00355838ca9.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68973/CVE-2025-68973-115d138ba599328005c5321c0ef9f00355838ca9.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9",
                "patch_url": "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9.patch",
                "filename": "CVE-2025-68973-115d138ba599328005c5321c0ef9f00355838ca9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-68973/CVE-2025-68973-115d138ba599328005c5321c0ef9f00355838ca9.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/gpg/gnupg/commit/115d138ba599328005c5321c0ef9f00355838ca9"
        ]
    },
    "CVE-2025-69419": {
        "cve": "CVE-2025-69419",
        "cvss_v2": null,
        "cvss_v3": 7.4,
        "description": "Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously\ncrafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing\nnon-ASCII BMP code point can trigger a one byte write before the allocated\nbuffer.\n\nImpact summary: The out-of-bounds write can cause a memory corruption\nwhich can have various consequences including a Denial of Service.\n\nThe OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12\nBMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,\nthe helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16\nsource byte count as the destination buffer capacity to UTF8_putc(). For BMP\ncode points above U+07FF, UTF-8 requires three bytes, but the forwarded\ncapacity can be just two bytes. UTF8_putc() then returns -1, and this negative\nvalue is added to the output length without validation, causing the\nlength to become negative. The subsequent trailing NUL byte is then written\nat a negative offset, causing write outside of heap allocated buffer.\n\nThe vulnerability is reachable via the public PKCS12_get_friendlyname() API\nwhen parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a\ndifferent code path that avoids this issue, PKCS12_get_friendlyname() directly\ninvokes the vulnerable function. Exploitation requires an attacker to provide\na malicious PKCS#12 file to be parsed by the application and the attacker\ncan just trigger a one zero byte write before the allocated buffer.\nFor that reason the issue was assessed as Low severity according to our\nSecurity Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-69419",
        "selected_patch": {
            "url": "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296",
            "patch_url": "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296.patch",
            "filename": "CVE-2025-69419-41be0f216404f14457bbf3b9cc488dba60b49296.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-69419/CVE-2025-69419-41be0f216404f14457bbf3b9cc488dba60b49296.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296",
                "patch_url": "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296.patch",
                "filename": "CVE-2025-69419-41be0f216404f14457bbf3b9cc488dba60b49296.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-69419/CVE-2025-69419-41be0f216404f14457bbf3b9cc488dba60b49296.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb",
                "patch_url": "https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb.patch",
                "filename": "CVE-2025-69419-7e9cac9832e4705b91987c2474ed06a37a93cecb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-69419/CVE-2025-69419-7e9cac9832e4705b91987c2474ed06a37a93cecb.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2",
                "patch_url": "https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2.patch",
                "filename": "CVE-2025-69419-a26a90d38edec3748566129d824e664b54bee2e2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-69419/CVE-2025-69419-a26a90d38edec3748566129d824e664b54bee2e2.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015",
                "patch_url": "https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015.patch",
                "filename": "CVE-2025-69419-cda12de3bc0e333ea8d2c6fd15001dbdaf280015.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-69419/CVE-2025-69419-cda12de3bc0e333ea8d2c6fd15001dbdaf280015.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535",
                "patch_url": "https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535.patch",
                "filename": "CVE-2025-69419-ff628933755075446bca8307e8417c14d164b535.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-69419/CVE-2025-69419-ff628933755075446bca8307e8417c14d164b535.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296",
            "https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb",
            "https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2",
            "https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015",
            "https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535"
        ]
    },
    "CVE-2025-6965": {
        "cve": "CVE-2025-6965",
        "cvss_v2": null,
        "cvss_v3": 9.8,
        "description": "There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-6965",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-71085": {
        "cve": "CVE-2025-71085",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()\n\nThere exists a kernel oops caused by a BUG_ON(nhead < 0) at\nnet/core/skbuff.c:2232 in pskb_expand_head().\nThis bug is triggered as part of the calipso_skbuff_setattr()\nroutine when skb_cow() is passed headroom > INT_MAX\n(i.e. (int)(skb_headroom(skb) + len_delta) < 0).\n\nThe root cause of the bug is due to an implicit integer cast in\n__skb_cow(). The check (headroom > skb_headroom(skb)) is meant to ensure\nthat delta = headroom - skb_headroom(skb) is never negative, otherwise\nwe will trigger a BUG_ON in pskb_expand_head(). However, if\nheadroom > INT_MAX and delta <= -NET_SKB_PAD, the check passes, delta\nbecomes negative, and pskb_expand_head() is passed a negative value for\nnhead.\n\nFix the trigger condition in calipso_skbuff_setattr(). Avoid passing\n\"negative\" headroom sizes to skb_cow() within calipso_skbuff_setattr()\nby only using skb_cow() to grow headroom.\n\nPoC:\n\tUsing `netlabelctl` tool:\n\n        netlabelctl map del default\n        netlabelctl calipso add pass doi:7\n        netlabelctl map add default address:0::1/128 protocol:calipso,7\n\n        Then run the following PoC:\n\n        int fd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP);\n\n        // setup msghdr\n        int cmsg_size = 2;\n        int cmsg_len = 0x60;\n        struct msghdr msg;\n        struct sockaddr_in6 dest_addr;\n        struct cmsghdr * cmsg = (struct cmsghdr *) calloc(1,\n                        sizeof(struct cmsghdr) + cmsg_len);\n        msg.msg_name = &dest_addr;\n        msg.msg_namelen = sizeof(dest_addr);\n        msg.msg_iov = NULL;\n        msg.msg_iovlen = 0;\n        msg.msg_control = cmsg;\n        msg.msg_controllen = cmsg_len;\n        msg.msg_flags = 0;\n\n        // setup sockaddr\n        dest_addr.sin6_family = AF_INET6;\n        dest_addr.sin6_port = htons(31337);\n        dest_addr.sin6_flowinfo = htonl(31337);\n        dest_addr.sin6_addr = in6addr_loopback;\n        dest_addr.sin6_scope_id = 31337;\n\n        // setup cmsghdr\n        cmsg->cmsg_len = cmsg_len;\n        cmsg->cmsg_level = IPPROTO_IPV6;\n        cmsg->cmsg_type = IPV6_HOPOPTS;\n        char * hop_hdr = (char *)cmsg + sizeof(struct cmsghdr);\n        hop_hdr[1] = 0x9; //set hop size - (0x9 + 1) * 8 = 80\n\n        sendmsg(fd, &msg, 0);",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-71085",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/58fc7342b529803d3c221101102fe913df7adb83",
            "patch_url": "https://git.kernel.org/stable/p/58fc7342b529803d3c221101102fe913df7adb83",
            "filename": "CVE-2025-71085-58fc7342b529803d3c221101102fe913df7adb83.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71085/CVE-2025-71085-58fc7342b529803d3c221101102fe913df7adb83.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2bb759062efa188ea5d07242a43e5aa5464bbae1",
                "patch_url": "https://git.kernel.org/stable/p/2bb759062efa188ea5d07242a43e5aa5464bbae1",
                "filename": "CVE-2025-71085-2bb759062efa188ea5d07242a43e5aa5464bbae1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71085/CVE-2025-71085-2bb759062efa188ea5d07242a43e5aa5464bbae1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/58fc7342b529803d3c221101102fe913df7adb83",
                "patch_url": "https://git.kernel.org/stable/p/58fc7342b529803d3c221101102fe913df7adb83",
                "filename": "CVE-2025-71085-58fc7342b529803d3c221101102fe913df7adb83.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71085/CVE-2025-71085-58fc7342b529803d3c221101102fe913df7adb83.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6b7522424529556c9cbc15e15e7bd4eeae310910",
                "patch_url": "https://git.kernel.org/stable/p/6b7522424529556c9cbc15e15e7bd4eeae310910",
                "filename": "CVE-2025-71085-6b7522424529556c9cbc15e15e7bd4eeae310910.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71085/CVE-2025-71085-6b7522424529556c9cbc15e15e7bd4eeae310910.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/73744ad5696dce0e0f43872aba8de6a83d6ad570",
                "patch_url": "https://git.kernel.org/stable/p/73744ad5696dce0e0f43872aba8de6a83d6ad570",
                "filename": "CVE-2025-71085-73744ad5696dce0e0f43872aba8de6a83d6ad570.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71085/CVE-2025-71085-73744ad5696dce0e0f43872aba8de6a83d6ad570.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/86f365897068d09418488165a68b23cb5baa37f2",
                "patch_url": "https://git.kernel.org/stable/p/86f365897068d09418488165a68b23cb5baa37f2",
                "filename": "CVE-2025-71085-86f365897068d09418488165a68b23cb5baa37f2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71085/CVE-2025-71085-86f365897068d09418488165a68b23cb5baa37f2.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/bf3709738d8a8cc6fa275773170c5c29511a0b24",
                "patch_url": "https://git.kernel.org/stable/p/bf3709738d8a8cc6fa275773170c5c29511a0b24",
                "filename": "CVE-2025-71085-bf3709738d8a8cc6fa275773170c5c29511a0b24.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71085/CVE-2025-71085-bf3709738d8a8cc6fa275773170c5c29511a0b24.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c53aa6a5086f03f19564096ee084a202a8c738c0",
                "patch_url": "https://git.kernel.org/stable/p/c53aa6a5086f03f19564096ee084a202a8c738c0",
                "filename": "CVE-2025-71085-c53aa6a5086f03f19564096ee084a202a8c738c0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71085/CVE-2025-71085-c53aa6a5086f03f19564096ee084a202a8c738c0.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2bb759062efa188ea5d07242a43e5aa5464bbae1",
            "https://git.kernel.org/stable/c/58fc7342b529803d3c221101102fe913df7adb83",
            "https://git.kernel.org/stable/c/6b7522424529556c9cbc15e15e7bd4eeae310910",
            "https://git.kernel.org/stable/c/73744ad5696dce0e0f43872aba8de6a83d6ad570",
            "https://git.kernel.org/stable/c/86f365897068d09418488165a68b23cb5baa37f2",
            "https://git.kernel.org/stable/c/bf3709738d8a8cc6fa275773170c5c29511a0b24",
            "https://git.kernel.org/stable/c/c53aa6a5086f03f19564096ee084a202a8c738c0",
            "https://www.cve.org/CVERecord?id=CVE-2025-71085\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-71085\nhttps://lore.kernel.org/linux-cve-announce/2026011340-CVE-2025-71085-e6c1@gregkh/T"
        ]
    },
    "CVE-2025-71238": {
        "cve": "CVE-2025-71238",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix bsg_done() causing double free\n\nKernel panic observed on system,\n\n[5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000\n[5353358.825194] #PF: supervisor write access in kernel mode\n[5353358.825195] #PF: error_code(0x0002) - not-present page\n[5353358.825196] PGD 100006067 P4D 0\n[5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI\n[5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G        W    L    -------  ---  5.14.0-503.34.1.el9_5.x86_64 #1\n[5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025\n[5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10\n[5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246\n[5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000\n[5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000\n[5353358.825214] RBP: 0000000000010000 R08: ff5f5e897b024000 R09: 0000000000000000\n[5353358.825215] R10: ff46cf8c40517000 R11: 0000000000000001 R12: 0000000000008090\n[5353358.825216] R13: ff591da8f4f6b720 R14: 0000000000001000 R15: 0000000000000000\n[5353358.825218] FS:  00007f1e88d47740(0000) GS:ff46cf935f940000(0000) knlGS:0000000000000000\n[5353358.825219] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[5353358.825220] CR2: ff5f5e897b024000 CR3: 0000000231532004 CR4: 0000000000771ef0\n[5353358.825221] PKRU: 55555554\n[5353358.825222] Call Trace:\n[5353358.825223]  <TASK>\n[5353358.825224]  ? show_trace_log_lvl+0x1c4/0x2df\n[5353358.825229]  ? show_trace_log_lvl+0x1c4/0x2df\n[5353358.825232]  ? sg_copy_buffer+0xc8/0x110\n[5353358.825236]  ? __die_body.cold+0x8/0xd\n[5353358.825238]  ? page_fault_oops+0x134/0x170\n[5353358.825242]  ? kernelmode_fixup_or_oops+0x84/0x110\n[5353358.825244]  ? exc_page_fault+0xa8/0x150\n[5353358.825247]  ? asm_exc_page_fault+0x22/0x30\n[5353358.825252]  ? memcpy_erms+0x6/0x10\n[5353358.825253]  sg_copy_buffer+0xc8/0x110\n[5353358.825259]  qla2x00_process_vendor_specific+0x652/0x1320 [qla2xxx]\n[5353358.825317]  qla24xx_bsg_request+0x1b2/0x2d0 [qla2xxx]\n\nMost routines in qla_bsg.c call bsg_done() only for success cases.\nHowever a few invoke it for failure case as well leading to a double\nfree. Validate before calling bsg_done().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-71238",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/057a5bdc481e58ab853117254867ffb22caf9f6e",
            "patch_url": "https://git.kernel.org/stable/p/057a5bdc481e58ab853117254867ffb22caf9f6e",
            "filename": "CVE-2025-71238-057a5bdc481e58ab853117254867ffb22caf9f6e.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71238/CVE-2025-71238-057a5bdc481e58ab853117254867ffb22caf9f6e.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/057a5bdc481e58ab853117254867ffb22caf9f6e",
                "patch_url": "https://git.kernel.org/stable/p/057a5bdc481e58ab853117254867ffb22caf9f6e",
                "filename": "CVE-2025-71238-057a5bdc481e58ab853117254867ffb22caf9f6e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71238/CVE-2025-71238-057a5bdc481e58ab853117254867ffb22caf9f6e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/27ac9679c43a09e54e2d9aae9980ada045b428e0",
                "patch_url": "https://git.kernel.org/stable/p/27ac9679c43a09e54e2d9aae9980ada045b428e0",
                "filename": "CVE-2025-71238-27ac9679c43a09e54e2d9aae9980ada045b428e0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71238/CVE-2025-71238-27ac9679c43a09e54e2d9aae9980ada045b428e0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/31f33b856d2324d86bcaef295f4d210477a1c018",
                "patch_url": "https://git.kernel.org/stable/p/31f33b856d2324d86bcaef295f4d210477a1c018",
                "filename": "CVE-2025-71238-31f33b856d2324d86bcaef295f4d210477a1c018.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71238/CVE-2025-71238-31f33b856d2324d86bcaef295f4d210477a1c018.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/708003e1bc857dd014d4c44278d7d77c26f91b1c",
                "patch_url": "https://git.kernel.org/stable/p/708003e1bc857dd014d4c44278d7d77c26f91b1c",
                "filename": "CVE-2025-71238-708003e1bc857dd014d4c44278d7d77c26f91b1c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71238/CVE-2025-71238-708003e1bc857dd014d4c44278d7d77c26f91b1c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/74e7458537cd9349cf019862e51491f670871707",
                "patch_url": "https://git.kernel.org/stable/p/74e7458537cd9349cf019862e51491f670871707",
                "filename": "CVE-2025-71238-74e7458537cd9349cf019862e51491f670871707.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71238/CVE-2025-71238-74e7458537cd9349cf019862e51491f670871707.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/871f6236da96c4a9712b8a29d7f555f767a47e95",
                "patch_url": "https://git.kernel.org/stable/p/871f6236da96c4a9712b8a29d7f555f767a47e95",
                "filename": "CVE-2025-71238-871f6236da96c4a9712b8a29d7f555f767a47e95.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71238/CVE-2025-71238-871f6236da96c4a9712b8a29d7f555f767a47e95.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0",
                "patch_url": "https://git.kernel.org/stable/p/c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0",
                "filename": "CVE-2025-71238-c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71238/CVE-2025-71238-c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f2bbb4db0e4a4fbd5e649c0b5d8733f61da24720",
                "patch_url": "https://git.kernel.org/stable/p/f2bbb4db0e4a4fbd5e649c0b5d8733f61da24720",
                "filename": "CVE-2025-71238-f2bbb4db0e4a4fbd5e649c0b5d8733f61da24720.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-71238/CVE-2025-71238-f2bbb4db0e4a4fbd5e649c0b5d8733f61da24720.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/057a5bdc481e58ab853117254867ffb22caf9f6e",
            "https://git.kernel.org/stable/c/27ac9679c43a09e54e2d9aae9980ada045b428e0",
            "https://git.kernel.org/stable/c/31f33b856d2324d86bcaef295f4d210477a1c018",
            "https://git.kernel.org/stable/c/708003e1bc857dd014d4c44278d7d77c26f91b1c",
            "https://git.kernel.org/stable/c/74e7458537cd9349cf019862e51491f670871707",
            "https://git.kernel.org/stable/c/871f6236da96c4a9712b8a29d7f555f767a47e95",
            "https://git.kernel.org/stable/c/c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0",
            "https://git.kernel.org/stable/c/f2bbb4db0e4a4fbd5e649c0b5d8733f61da24720",
            "https://www.cve.org/CVERecord?id=CVE-2025-71238\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-71238\nhttps://lore.kernel.org/linux-cve-announce/2026030437-CVE-2025-71238-76bc@gregkh/T"
        ]
    },
    "CVE-2025-7425": {
        "cve": "CVE-2025-7425",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-7425",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-8941": {
        "cve": "CVE-2025-8941",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a \"complete\" fix for CVE-2025-6020.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-8941",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-9086": {
        "cve": "CVE-2025-9086",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "1. A cookie is set using the `secure` keyword for `https://target` \n 2. curl is redirected to or otherwise made to speak with `http://target` (same \n   hostname, but using clear text HTTP) using the same cookie set \n 3. The same cookie name is set - but with just a slash as path (`path=\\\"/\\\",`).\n   Since this site is not secure, the cookie *should* just be ignored.\n4. A bug in the path comparison logic makes curl read outside a heap buffer\n   boundary\n\nThe bug either causes a crash or it potentially makes the comparison come to\nthe wrong conclusion and lets the clear-text site override the contents of the\nsecure cookie, contrary to expectations and depending on the memory contents\nimmediately following the single-byte allocation that holds the path.\n\nThe presumed and correct behavior would be to plainly ignore the second set of\nthe cookie since it was already set as secure on a secure host so overriding\nit on an insecure host should not be okay.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-9086",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2025-9230": {
        "cve": "CVE-2025-9230",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "Issue summary: An application trying to decrypt CMS messages encrypted using\npassword based encryption can trigger an out-of-bounds read and write.\n\nImpact summary: This out-of-bounds read may trigger a crash which leads to\nDenial of Service for an application. The out-of-bounds write can cause\na memory corruption which can have various consequences including\na Denial of Service or Execution of attacker-supplied code.\n\nAlthough the consequences of a successful exploit of this vulnerability\ncould be severe, the probability that the attacker would be able to\nperform it is low. Besides, password based (PWRI) encryption support in CMS\nmessages is very rarely used. For that reason the issue was assessed as\nModerate severity according to our Security Policy.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-9230",
        "selected_patch": {
            "url": "https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45",
            "patch_url": "https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45.patch",
            "filename": "CVE-2025-9230-5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-9230/CVE-2025-9230-5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45",
                "patch_url": "https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45.patch",
                "filename": "CVE-2025-9230-5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-9230/CVE-2025-9230-5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/openssl/openssl/commit/9e91358f365dee6c446dcdcdb01c04d2743fd280",
                "patch_url": "https://github.com/openssl/openssl/commit/9e91358f365dee6c446dcdcdb01c04d2743fd280.patch",
                "filename": "CVE-2025-9230-9e91358f365dee6c446dcdcdb01c04d2743fd280.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-9230/CVE-2025-9230-9e91358f365dee6c446dcdcdb01c04d2743fd280.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/openssl/openssl/commit/a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def",
                "patch_url": "https://github.com/openssl/openssl/commit/a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def.patch",
                "filename": "CVE-2025-9230-a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-9230/CVE-2025-9230-a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/openssl/openssl/commit/b5282d677551afda7d20e9c00e09561b547b2dfd",
                "patch_url": "https://github.com/openssl/openssl/commit/b5282d677551afda7d20e9c00e09561b547b2dfd.patch",
                "filename": "CVE-2025-9230-b5282d677551afda7d20e9c00e09561b547b2dfd.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-9230/CVE-2025-9230-b5282d677551afda7d20e9c00e09561b547b2dfd.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/openssl/openssl/commit/bae259a211ada6315dc50900686daaaaaa55f482",
                "patch_url": "https://github.com/openssl/openssl/commit/bae259a211ada6315dc50900686daaaaaa55f482.patch",
                "filename": "CVE-2025-9230-bae259a211ada6315dc50900686daaaaaa55f482.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-9230/CVE-2025-9230-bae259a211ada6315dc50900686daaaaaa55f482.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45",
            "https://github.com/openssl/openssl/commit/9e91358f365dee6c446dcdcdb01c04d2743fd280",
            "https://github.com/openssl/openssl/commit/a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def",
            "https://github.com/openssl/openssl/commit/b5282d677551afda7d20e9c00e09561b547b2dfd",
            "https://github.com/openssl/openssl/commit/bae259a211ada6315dc50900686daaaaaa55f482"
        ]
    },
    "CVE-2025-9820": {
        "cve": "CVE-2025-9820",
        "cvss_v2": null,
        "cvss_v3": 4,
        "description": "A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2025-9820",
        "selected_patch": {
            "url": "https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5",
            "patch_url": "https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5.patch",
            "filename": "CVE-2025-9820-1d56f96f6ab5034d677136b9d50b5a75dff0faf5.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-9820/CVE-2025-9820-1d56f96f6ab5034d677136b9d50b5a75dff0faf5.patch",
            "type": "gitlab"
        },
        "available_patches": [
            {
                "url": "https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5",
                "patch_url": "https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5.patch",
                "filename": "CVE-2025-9820-1d56f96f6ab5034d677136b9d50b5a75dff0faf5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2025-9820/CVE-2025-9820-1d56f96f6ab5034d677136b9d50b5a75dff0faf5.patch",
                "type": "gitlab"
            }
        ],
        "all_links": [
            "https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5"
        ]
    },
    "CVE-2026-0865": {
        "cve": "CVE-2026-0865",
        "cvss_v2": null,
        "cvss_v3": "4.5",
        "description": "User-controlled header names and values containing newlines can allow injecting HTTP headers.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2026-0865",
        "selected_patch": {
            "url": "https://github.com/python/cpython/commit/22e4d55285cee52bc4dbe061324e5f30bd4dee58",
            "patch_url": "https://github.com/python/cpython/commit/22e4d55285cee52bc4dbe061324e5f30bd4dee58.patch",
            "filename": "CVE-2026-0865-22e4d55285cee52bc4dbe061324e5f30bd4dee58.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-0865/CVE-2026-0865-22e4d55285cee52bc4dbe061324e5f30bd4dee58.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/python/cpython/commit/22e4d55285cee52bc4dbe061324e5f30bd4dee58",
                "patch_url": "https://github.com/python/cpython/commit/22e4d55285cee52bc4dbe061324e5f30bd4dee58.patch",
                "filename": "CVE-2026-0865-22e4d55285cee52bc4dbe061324e5f30bd4dee58.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-0865/CVE-2026-0865-22e4d55285cee52bc4dbe061324e5f30bd4dee58.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/23e3c0ae867cca0130e441e776c9955b9027c510",
                "patch_url": "https://github.com/python/cpython/commit/23e3c0ae867cca0130e441e776c9955b9027c510.patch",
                "filename": "CVE-2026-0865-23e3c0ae867cca0130e441e776c9955b9027c510.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-0865/CVE-2026-0865-23e3c0ae867cca0130e441e776c9955b9027c510.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/286e3ac39984fe85a17f4ab39c64d382137aae5f",
                "patch_url": "https://github.com/python/cpython/commit/286e3ac39984fe85a17f4ab39c64d382137aae5f.patch",
                "filename": "CVE-2026-0865-286e3ac39984fe85a17f4ab39c64d382137aae5f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-0865/CVE-2026-0865-286e3ac39984fe85a17f4ab39c64d382137aae5f.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/2f840249550e082dc351743f474ba56da10478d2",
                "patch_url": "https://github.com/python/cpython/commit/2f840249550e082dc351743f474ba56da10478d2.patch",
                "filename": "CVE-2026-0865-2f840249550e082dc351743f474ba56da10478d2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-0865/CVE-2026-0865-2f840249550e082dc351743f474ba56da10478d2.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/4802b96a2cde58570c24c13ef3289490980961c5",
                "patch_url": "https://github.com/python/cpython/commit/4802b96a2cde58570c24c13ef3289490980961c5.patch",
                "filename": "CVE-2026-0865-4802b96a2cde58570c24c13ef3289490980961c5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-0865/CVE-2026-0865-4802b96a2cde58570c24c13ef3289490980961c5.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/66da7bf6fe7b81e3ecc9c0a25bd47d4616c8d1a6",
                "patch_url": "https://github.com/python/cpython/commit/66da7bf6fe7b81e3ecc9c0a25bd47d4616c8d1a6.patch",
                "filename": "CVE-2026-0865-66da7bf6fe7b81e3ecc9c0a25bd47d4616c8d1a6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-0865/CVE-2026-0865-66da7bf6fe7b81e3ecc9c0a25bd47d4616c8d1a6.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/83ecd18779f286d872f68bfce175651e407d9fff",
                "patch_url": "https://github.com/python/cpython/commit/83ecd18779f286d872f68bfce175651e407d9fff.patch",
                "filename": "CVE-2026-0865-83ecd18779f286d872f68bfce175651e407d9fff.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-0865/CVE-2026-0865-83ecd18779f286d872f68bfce175651e407d9fff.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/8bb044d29310bb05d15086cdaa8bf64867d61a97",
                "patch_url": "https://github.com/python/cpython/commit/8bb044d29310bb05d15086cdaa8bf64867d61a97.patch",
                "filename": "CVE-2026-0865-8bb044d29310bb05d15086cdaa8bf64867d61a97.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-0865/CVE-2026-0865-8bb044d29310bb05d15086cdaa8bf64867d61a97.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/bfba660085767f8c2d582134e9d511a85eda04cf",
                "patch_url": "https://github.com/python/cpython/commit/bfba660085767f8c2d582134e9d511a85eda04cf.patch",
                "filename": "CVE-2026-0865-bfba660085767f8c2d582134e9d511a85eda04cf.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-0865/CVE-2026-0865-bfba660085767f8c2d582134e9d511a85eda04cf.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/c592227ffb48679af9845a45dbb0875d975bb219",
                "patch_url": "https://github.com/python/cpython/commit/c592227ffb48679af9845a45dbb0875d975bb219.patch",
                "filename": "CVE-2026-0865-c592227ffb48679af9845a45dbb0875d975bb219.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-0865/CVE-2026-0865-c592227ffb48679af9845a45dbb0875d975bb219.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/e4846a93ac07a8ae9aa18203af0dd13d6e7a6995",
                "patch_url": "https://github.com/python/cpython/commit/e4846a93ac07a8ae9aa18203af0dd13d6e7a6995.patch",
                "filename": "CVE-2026-0865-e4846a93ac07a8ae9aa18203af0dd13d6e7a6995.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-0865/CVE-2026-0865-e4846a93ac07a8ae9aa18203af0dd13d6e7a6995.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/f7fceed79ca1bceae8dbe5ba5bc8928564da7211",
                "patch_url": "https://github.com/python/cpython/commit/f7fceed79ca1bceae8dbe5ba5bc8928564da7211.patch",
                "filename": "CVE-2026-0865-f7fceed79ca1bceae8dbe5ba5bc8928564da7211.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-0865/CVE-2026-0865-f7fceed79ca1bceae8dbe5ba5bc8928564da7211.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/pull/143917",
                "patch_url": "https://github.com/python/cpython/pull/143917.patch",
                "filename": "CVE-2026-0865-https___github_com_python_cpython_pull_143917_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-0865/CVE-2026-0865-https___github_com_python_cpython_pull_143917_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/python/cpython/commit/22e4d55285cee52bc4dbe061324e5f30bd4dee58",
            "https://github.com/python/cpython/commit/23e3c0ae867cca0130e441e776c9955b9027c510",
            "https://github.com/python/cpython/commit/286e3ac39984fe85a17f4ab39c64d382137aae5f",
            "https://github.com/python/cpython/commit/2f840249550e082dc351743f474ba56da10478d2",
            "https://github.com/python/cpython/commit/4802b96a2cde58570c24c13ef3289490980961c5",
            "https://github.com/python/cpython/commit/66da7bf6fe7b81e3ecc9c0a25bd47d4616c8d1a6",
            "https://github.com/python/cpython/commit/83ecd18779f286d872f68bfce175651e407d9fff",
            "https://github.com/python/cpython/commit/8bb044d29310bb05d15086cdaa8bf64867d61a97",
            "https://github.com/python/cpython/commit/bfba660085767f8c2d582134e9d511a85eda04cf",
            "https://github.com/python/cpython/commit/c592227ffb48679af9845a45dbb0875d975bb219",
            "https://github.com/python/cpython/commit/e4846a93ac07a8ae9aa18203af0dd13d6e7a6995",
            "https://github.com/python/cpython/commit/f7fceed79ca1bceae8dbe5ba5bc8928564da7211",
            "https://github.com/python/cpython/pull/143917"
        ]
    },
    "CVE-2026-1299": {
        "cve": "CVE-2026-1299",
        "cvss_v2": null,
        "cvss_v3": "7.1",
        "description": "The \nemail module, specifically the \"BytesGenerator\" class, didn\u2019t properly quote newlines for email headers when \nserializing an email message allowing for header injection when an email\n is serialized. This is only applicable if using \"LiteralHeader\" writing headers that don't respect email folding rules, the new behavior will reject the incorrectly folded headers in \"BytesGenerator\".",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2026-1299",
        "selected_patch": {
            "url": "https://github.com/python/cpython/commit/052e55e7d44718fe46cbba0ca995cb8fcc359413",
            "patch_url": "https://github.com/python/cpython/commit/052e55e7d44718fe46cbba0ca995cb8fcc359413.patch",
            "filename": "CVE-2026-1299-052e55e7d44718fe46cbba0ca995cb8fcc359413.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-1299/CVE-2026-1299-052e55e7d44718fe46cbba0ca995cb8fcc359413.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/python/cpython/commit/052e55e7d44718fe46cbba0ca995cb8fcc359413",
                "patch_url": "https://github.com/python/cpython/commit/052e55e7d44718fe46cbba0ca995cb8fcc359413.patch",
                "filename": "CVE-2026-1299-052e55e7d44718fe46cbba0ca995cb8fcc359413.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-1299/CVE-2026-1299-052e55e7d44718fe46cbba0ca995cb8fcc359413.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/0a925ab591c45d6638f37b5e57796f36fa0e56d8",
                "patch_url": "https://github.com/python/cpython/commit/0a925ab591c45d6638f37b5e57796f36fa0e56d8.patch",
                "filename": "CVE-2026-1299-0a925ab591c45d6638f37b5e57796f36fa0e56d8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-1299/CVE-2026-1299-0a925ab591c45d6638f37b5e57796f36fa0e56d8.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/7877fe424415bc4a13045e62a90a7277413d8cb9",
                "patch_url": "https://github.com/python/cpython/commit/7877fe424415bc4a13045e62a90a7277413d8cb9.patch",
                "filename": "CVE-2026-1299-7877fe424415bc4a13045e62a90a7277413d8cb9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-1299/CVE-2026-1299-7877fe424415bc4a13045e62a90a7277413d8cb9.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/842ce19a0c0b58d61591e8f6a708c38db1fb94e4",
                "patch_url": "https://github.com/python/cpython/commit/842ce19a0c0b58d61591e8f6a708c38db1fb94e4.patch",
                "filename": "CVE-2026-1299-842ce19a0c0b58d61591e8f6a708c38db1fb94e4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-1299/CVE-2026-1299-842ce19a0c0b58d61591e8f6a708c38db1fb94e4.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/8cdf6204f4ae821f32993f8fc6bad0d318f95f36",
                "patch_url": "https://github.com/python/cpython/commit/8cdf6204f4ae821f32993f8fc6bad0d318f95f36.patch",
                "filename": "CVE-2026-1299-8cdf6204f4ae821f32993f8fc6bad0d318f95f36.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-1299/CVE-2026-1299-8cdf6204f4ae821f32993f8fc6bad0d318f95f36.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/e417f05ad77a4c30ddc07f99e90fc0cef43e831a",
                "patch_url": "https://github.com/python/cpython/commit/e417f05ad77a4c30ddc07f99e90fc0cef43e831a.patch",
                "filename": "CVE-2026-1299-e417f05ad77a4c30ddc07f99e90fc0cef43e831a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-1299/CVE-2026-1299-e417f05ad77a4c30ddc07f99e90fc0cef43e831a.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/pull/144126",
                "patch_url": "https://github.com/python/cpython/pull/144126.patch",
                "filename": "CVE-2026-1299-https___github_com_python_cpython_pull_144126_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-1299/CVE-2026-1299-https___github_com_python_cpython_pull_144126_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/python/cpython/commit/052e55e7d44718fe46cbba0ca995cb8fcc359413",
            "https://github.com/python/cpython/commit/0a925ab591c45d6638f37b5e57796f36fa0e56d8",
            "https://github.com/python/cpython/commit/7877fe424415bc4a13045e62a90a7277413d8cb9",
            "https://github.com/python/cpython/commit/842ce19a0c0b58d61591e8f6a708c38db1fb94e4",
            "https://github.com/python/cpython/commit/8cdf6204f4ae821f32993f8fc6bad0d318f95f36",
            "https://github.com/python/cpython/commit/e417f05ad77a4c30ddc07f99e90fc0cef43e831a",
            "https://github.com/python/cpython/pull/144126"
        ]
    },
    "CVE-2026-22695": {
        "cve": "CVE-2026-22695",
        "cvss_v2": null,
        "cvss_v3": 6.1,
        "description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in the libpng simplified API function png_image_finish_read when processing interlaced 16-bit PNGs with 8-bit output format and non-minimal row stride. This is a regression introduced by the fix for CVE-2025-65018. This vulnerability is fixed in 1.6.54.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2026-22695",
        "selected_patch": {
            "url": "https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea",
            "patch_url": "https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea.patch",
            "filename": "CVE-2026-22695-218612ddd6b17944e21eda56caf8b4bf7779d1ea.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-22695/CVE-2026-22695-218612ddd6b17944e21eda56caf8b4bf7779d1ea.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea",
                "patch_url": "https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea.patch",
                "filename": "CVE-2026-22695-218612ddd6b17944e21eda56caf8b4bf7779d1ea.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-22695/CVE-2026-22695-218612ddd6b17944e21eda56caf8b4bf7779d1ea.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/pnggroup/libpng/commit/e4f7ad4ea2",
                "patch_url": "https://github.com/pnggroup/libpng/commit/e4f7ad4ea2.patch",
                "filename": "CVE-2026-22695-e4f7ad4ea2.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-22695/CVE-2026-22695-e4f7ad4ea2.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea",
            "https://github.com/pnggroup/libpng/commit/e4f7ad4ea2"
        ]
    },
    "CVE-2026-22801": {
        "cve": "CVE-2026-22801",
        "cvss_v2": null,
        "cvss_v3": 6.8,
        "description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2026-22801",
        "selected_patch": null,
        "available_patches": [],
        "all_links": []
    },
    "CVE-2026-22998": {
        "cve": "CVE-2026-22998",
        "cvss_v2": null,
        "cvss_v3": 7.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec\n\nCommit efa56305908b (\"nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length\")\nadded ttag bounds checking and data_offset\nvalidation in nvmet_tcp_handle_h2c_data_pdu(), but it did not validate\nwhether the command's data structures (cmd->req.sg and cmd->iov) have\nbeen properly initialized before processing H2C_DATA PDUs.\n\nThe nvmet_tcp_build_pdu_iovec() function dereferences these pointers\nwithout NULL checks. This can be triggered by sending H2C_DATA PDU\nimmediately after the ICREQ/ICRESP handshake, before\nsending a CONNECT command or NVMe write command.\n\nAttack vectors that trigger NULL pointer dereferences:\n1. H2C_DATA PDU sent before CONNECT \u2192 both pointers NULL\n2. H2C_DATA PDU for READ command \u2192 cmd->req.sg allocated, cmd->iov NULL\n3. H2C_DATA PDU for uninitialized command slot \u2192 both pointers NULL\n\nThe fix validates both cmd->req.sg and cmd->iov before calling\nnvmet_tcp_build_pdu_iovec(). Both checks are required because:\n- Uninitialized commands: both NULL\n- READ commands: cmd->req.sg allocated, cmd->iov NULL\n- WRITE commands: both allocated",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2026-22998",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/32b63acd78f577b332d976aa06b56e70d054cbba",
            "patch_url": "https://git.kernel.org/stable/p/32b63acd78f577b332d976aa06b56e70d054cbba",
            "filename": "CVE-2026-22998-32b63acd78f577b332d976aa06b56e70d054cbba.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-22998/CVE-2026-22998-32b63acd78f577b332d976aa06b56e70d054cbba.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/32b63acd78f577b332d976aa06b56e70d054cbba",
                "patch_url": "https://git.kernel.org/stable/p/32b63acd78f577b332d976aa06b56e70d054cbba",
                "filename": "CVE-2026-22998-32b63acd78f577b332d976aa06b56e70d054cbba.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-22998/CVE-2026-22998-32b63acd78f577b332d976aa06b56e70d054cbba.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/374b095e265fa27465f34780e0eb162ff1bef913",
                "patch_url": "https://git.kernel.org/stable/p/374b095e265fa27465f34780e0eb162ff1bef913",
                "filename": "CVE-2026-22998-374b095e265fa27465f34780e0eb162ff1bef913.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-22998/CVE-2026-22998-374b095e265fa27465f34780e0eb162ff1bef913.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/3def5243150716be86599c2a1767c29c68838b6d",
                "patch_url": "https://git.kernel.org/stable/p/3def5243150716be86599c2a1767c29c68838b6d",
                "filename": "CVE-2026-22998-3def5243150716be86599c2a1767c29c68838b6d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-22998/CVE-2026-22998-3def5243150716be86599c2a1767c29c68838b6d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/76abc83a9d25593c2b7613c549413079c14a4686",
                "patch_url": "https://git.kernel.org/stable/p/76abc83a9d25593c2b7613c549413079c14a4686",
                "filename": "CVE-2026-22998-76abc83a9d25593c2b7613c549413079c14a4686.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-22998/CVE-2026-22998-76abc83a9d25593c2b7613c549413079c14a4686.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7d75570002929d20e40110d6b03e46202c9d1bc7",
                "patch_url": "https://git.kernel.org/stable/p/7d75570002929d20e40110d6b03e46202c9d1bc7",
                "filename": "CVE-2026-22998-7d75570002929d20e40110d6b03e46202c9d1bc7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-22998/CVE-2026-22998-7d75570002929d20e40110d6b03e46202c9d1bc7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/baabe43a0edefac8cd7b981ff87f967f6034dafe",
                "patch_url": "https://git.kernel.org/stable/p/baabe43a0edefac8cd7b981ff87f967f6034dafe",
                "filename": "CVE-2026-22998-baabe43a0edefac8cd7b981ff87f967f6034dafe.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-22998/CVE-2026-22998-baabe43a0edefac8cd7b981ff87f967f6034dafe.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fdecd3b6aac10d5a18d0dc500fe57f8648b66cd4",
                "patch_url": "https://git.kernel.org/stable/p/fdecd3b6aac10d5a18d0dc500fe57f8648b66cd4",
                "filename": "CVE-2026-22998-fdecd3b6aac10d5a18d0dc500fe57f8648b66cd4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-22998/CVE-2026-22998-fdecd3b6aac10d5a18d0dc500fe57f8648b66cd4.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/32b63acd78f577b332d976aa06b56e70d054cbba",
            "https://git.kernel.org/stable/c/374b095e265fa27465f34780e0eb162ff1bef913",
            "https://git.kernel.org/stable/c/3def5243150716be86599c2a1767c29c68838b6d",
            "https://git.kernel.org/stable/c/76abc83a9d25593c2b7613c549413079c14a4686",
            "https://git.kernel.org/stable/c/7d75570002929d20e40110d6b03e46202c9d1bc7",
            "https://git.kernel.org/stable/c/baabe43a0edefac8cd7b981ff87f967f6034dafe",
            "https://git.kernel.org/stable/c/fdecd3b6aac10d5a18d0dc500fe57f8648b66cd4",
            "https://www.cve.org/CVERecord?id=CVE-2026-22998\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-22998\nhttps://lore.kernel.org/linux-cve-announce/2026012533-CVE-2026-22998-8392@gregkh/T"
        ]
    },
    "CVE-2026-23001": {
        "cve": "CVE-2026-23001",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacvlan: fix possible UAF in macvlan_forward_source()\n\nAdd RCU protection on (struct macvlan_source_entry)->vlan.\n\nWhenever macvlan_hash_del_source() is called, we must clear\nentry->vlan pointer before RCU grace period starts.\n\nThis allows macvlan_forward_source() to skip over\nentries queued for freeing.\n\nNote that macvlan_dev are already RCU protected, as they\nare embedded in a standard netdev (netdev_priv(ndev)).\n\nhttps: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2026-23001",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/15f6faf36e162532bec5cc05eb3fc622108bf2ed",
            "patch_url": "https://git.kernel.org/stable/p/15f6faf36e162532bec5cc05eb3fc622108bf2ed",
            "filename": "CVE-2026-23001-15f6faf36e162532bec5cc05eb3fc622108bf2ed.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23001/CVE-2026-23001-15f6faf36e162532bec5cc05eb3fc622108bf2ed.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/15f6faf36e162532bec5cc05eb3fc622108bf2ed",
                "patch_url": "https://git.kernel.org/stable/p/15f6faf36e162532bec5cc05eb3fc622108bf2ed",
                "filename": "CVE-2026-23001-15f6faf36e162532bec5cc05eb3fc622108bf2ed.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23001/CVE-2026-23001-15f6faf36e162532bec5cc05eb3fc622108bf2ed.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/232afc74a6dde0fe1830988e5827921f5ec9bb3f",
                "patch_url": "https://git.kernel.org/stable/p/232afc74a6dde0fe1830988e5827921f5ec9bb3f",
                "filename": "CVE-2026-23001-232afc74a6dde0fe1830988e5827921f5ec9bb3f.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23001/CVE-2026-23001-232afc74a6dde0fe1830988e5827921f5ec9bb3f.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/484919832e2db6ce1e8add92c469e5d459a516b5",
                "patch_url": "https://git.kernel.org/stable/p/484919832e2db6ce1e8add92c469e5d459a516b5",
                "filename": "CVE-2026-23001-484919832e2db6ce1e8add92c469e5d459a516b5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23001/CVE-2026-23001-484919832e2db6ce1e8add92c469e5d459a516b5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/6dbead9c7677186f22b7981dd085a0feec1f038e",
                "patch_url": "https://git.kernel.org/stable/p/6dbead9c7677186f22b7981dd085a0feec1f038e",
                "filename": "CVE-2026-23001-6dbead9c7677186f22b7981dd085a0feec1f038e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23001/CVE-2026-23001-6dbead9c7677186f22b7981dd085a0feec1f038e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7470a7a63dc162f07c26dbf960e41ee1e248d80e",
                "patch_url": "https://git.kernel.org/stable/p/7470a7a63dc162f07c26dbf960e41ee1e248d80e",
                "filename": "CVE-2026-23001-7470a7a63dc162f07c26dbf960e41ee1e248d80e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23001/CVE-2026-23001-7470a7a63dc162f07c26dbf960e41ee1e248d80e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8133e85b8a3ec9f10d861e0002ec6037256e987e",
                "patch_url": "https://git.kernel.org/stable/p/8133e85b8a3ec9f10d861e0002ec6037256e987e",
                "filename": "CVE-2026-23001-8133e85b8a3ec9f10d861e0002ec6037256e987e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23001/CVE-2026-23001-8133e85b8a3ec9f10d861e0002ec6037256e987e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8518712a2ca952d6da2238c6f0a16b4ae5ea3f13",
                "patch_url": "https://git.kernel.org/stable/p/8518712a2ca952d6da2238c6f0a16b4ae5ea3f13",
                "filename": "CVE-2026-23001-8518712a2ca952d6da2238c6f0a16b4ae5ea3f13.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23001/CVE-2026-23001-8518712a2ca952d6da2238c6f0a16b4ae5ea3f13.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "//lore.kernel.org/netdev/",
            "https://git.kernel.org/stable/c/15f6faf36e162532bec5cc05eb3fc622108bf2ed",
            "https://git.kernel.org/stable/c/232afc74a6dde0fe1830988e5827921f5ec9bb3f",
            "https://git.kernel.org/stable/c/484919832e2db6ce1e8add92c469e5d459a516b5",
            "https://git.kernel.org/stable/c/6dbead9c7677186f22b7981dd085a0feec1f038e",
            "https://git.kernel.org/stable/c/7470a7a63dc162f07c26dbf960e41ee1e248d80e",
            "https://git.kernel.org/stable/c/8133e85b8a3ec9f10d861e0002ec6037256e987e",
            "https://git.kernel.org/stable/c/8518712a2ca952d6da2238c6f0a16b4ae5ea3f13",
            "https://www.cve.org/CVERecord?id=CVE-2026-23001\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-23001\nhttps://lore.kernel.org/linux-cve-announce/2026012534-CVE-2026-23001-7ab0@gregkh/T"
        ]
    },
    "CVE-2026-23074": {
        "cve": "CVE-2026-23074",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Enforce that teql can only be used as root qdisc\n\nDesign intent of teql is that it is only supposed to be used as root qdisc.\nWe need to check for that constraint.\n\nAlthough not important, I will describe the scenario that unearthed this\nissue for the curious.\n\nGangMin Kim <km.kim1503@gmail.com> managed to concot a scenario as follows:\n\nROOT qdisc 1:0 (QFQ)\n  \u251c\u2500\u2500 class 1:1 (weight=15, lmax=16384) netem with delay 6.4s\n  \u2514\u2500\u2500 class 1:2 (weight=1, lmax=1514) teql\n\nGangMin sends a packet which is enqueued to 1:1 (netem).\nAny invocation of dequeue by QFQ from this class will not return a packet\nuntil after 6.4s. In the meantime, a second packet is sent and it lands on\n1:2. teql's enqueue will return success and this will activate class 1:2.\nMain issue is that teql only updates the parent visible qlen (sch->q.qlen)\nat dequeue. Since QFQ will only call dequeue if peek succeeds (and teql's\npeek always returns NULL), dequeue will never be called and thus the qlen\nwill remain as 0. With that in mind, when GangMin updates 1:2's lmax value,\nthe qfq_change_class calls qfq_deact_rm_from_agg. Since the child qdisc's\nqlen was not incremented, qfq fails to deactivate the class, but still\nfrees its pointers from the aggregate. So when the first packet is\nrescheduled after 6.4 seconds (netem's delay), a dangling pointer is\naccessed causing GangMin's causing a UAF.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2026-23074",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/0686bedfed34155520f3f735cbf3210cb9044380",
            "patch_url": "https://git.kernel.org/stable/p/0686bedfed34155520f3f735cbf3210cb9044380",
            "filename": "CVE-2026-23074-0686bedfed34155520f3f735cbf3210cb9044380.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23074/CVE-2026-23074-0686bedfed34155520f3f735cbf3210cb9044380.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/0686bedfed34155520f3f735cbf3210cb9044380",
                "patch_url": "https://git.kernel.org/stable/p/0686bedfed34155520f3f735cbf3210cb9044380",
                "filename": "CVE-2026-23074-0686bedfed34155520f3f735cbf3210cb9044380.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23074/CVE-2026-23074-0686bedfed34155520f3f735cbf3210cb9044380.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/16ed73c1282d376b956bff23e5139add061767ba",
                "patch_url": "https://git.kernel.org/stable/p/16ed73c1282d376b956bff23e5139add061767ba",
                "filename": "CVE-2026-23074-16ed73c1282d376b956bff23e5139add061767ba.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23074/CVE-2026-23074-16ed73c1282d376b956bff23e5139add061767ba.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4c7e8aa71c9232cba84c289b4b56cba80b280841",
                "patch_url": "https://git.kernel.org/stable/p/4c7e8aa71c9232cba84c289b4b56cba80b280841",
                "filename": "CVE-2026-23074-4c7e8aa71c9232cba84c289b4b56cba80b280841.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23074/CVE-2026-23074-4c7e8aa71c9232cba84c289b4b56cba80b280841.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/50da4b9d07a7a463e2cfb738f3ad4cff6b2c9c3b",
                "patch_url": "https://git.kernel.org/stable/p/50da4b9d07a7a463e2cfb738f3ad4cff6b2c9c3b",
                "filename": "CVE-2026-23074-50da4b9d07a7a463e2cfb738f3ad4cff6b2c9c3b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23074/CVE-2026-23074-50da4b9d07a7a463e2cfb738f3ad4cff6b2c9c3b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/73d970ff0eddd874a84c953387c7f4464b705fc6",
                "patch_url": "https://git.kernel.org/stable/p/73d970ff0eddd874a84c953387c7f4464b705fc6",
                "filename": "CVE-2026-23074-73d970ff0eddd874a84c953387c7f4464b705fc6.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23074/CVE-2026-23074-73d970ff0eddd874a84c953387c7f4464b705fc6.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ae810e6a8ac4fe25042e6825d2a401207a2e41fb",
                "patch_url": "https://git.kernel.org/stable/p/ae810e6a8ac4fe25042e6825d2a401207a2e41fb",
                "filename": "CVE-2026-23074-ae810e6a8ac4fe25042e6825d2a401207a2e41fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23074/CVE-2026-23074-ae810e6a8ac4fe25042e6825d2a401207a2e41fb.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dad49a67c2d817bfec98e6e45121b351e3a0202c",
                "patch_url": "https://git.kernel.org/stable/p/dad49a67c2d817bfec98e6e45121b351e3a0202c",
                "filename": "CVE-2026-23074-dad49a67c2d817bfec98e6e45121b351e3a0202c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23074/CVE-2026-23074-dad49a67c2d817bfec98e6e45121b351e3a0202c.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/0686bedfed34155520f3f735cbf3210cb9044380",
            "https://git.kernel.org/stable/c/16ed73c1282d376b956bff23e5139add061767ba",
            "https://git.kernel.org/stable/c/4c7e8aa71c9232cba84c289b4b56cba80b280841",
            "https://git.kernel.org/stable/c/50da4b9d07a7a463e2cfb738f3ad4cff6b2c9c3b",
            "https://git.kernel.org/stable/c/73d970ff0eddd874a84c953387c7f4464b705fc6",
            "https://git.kernel.org/stable/c/ae810e6a8ac4fe25042e6825d2a401207a2e41fb",
            "https://git.kernel.org/stable/c/dad49a67c2d817bfec98e6e45121b351e3a0202c",
            "https://www.cve.org/CVERecord?id=CVE-2026-23074\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-23074\nhttps://lore.kernel.org/linux-cve-announce/2026020419-CVE-2026-23074-6bb8@gregkh/T"
        ]
    },
    "CVE-2026-23097": {
        "cve": "CVE-2026-23097",
        "cvss_v2": null,
        "cvss_v3": 5.5,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmigrate: correct lock ordering for hugetlb file folios\n\nSyzbot has found a deadlock (analyzed by Lance Yang):\n\n1) Task (5749): Holds folio_lock, then tries to acquire i_mmap_rwsem(read lock).\n2) Task (5754): Holds i_mmap_rwsem(write lock), then tries to acquire\nfolio_lock.\n\nmigrate_pages()\n  -> migrate_hugetlbs()\n    -> unmap_and_move_huge_page()     <- Takes folio_lock!\n      -> remove_migration_ptes()\n        -> __rmap_walk_file()\n          -> i_mmap_lock_read()       <- Waits for i_mmap_rwsem(read lock)!\n\nhugetlbfs_fallocate()\n  -> hugetlbfs_punch_hole()           <- Takes i_mmap_rwsem(write lock)!\n    -> hugetlbfs_zero_partial_page()\n     -> filemap_lock_hugetlb_folio()\n      -> filemap_lock_folio()\n        -> __filemap_get_folio        <- Waits for folio_lock!\n\nThe migration path is the one taking locks in the wrong order according to\nthe documentation at the top of mm/rmap.c.  So expand the scope of the\nexisting i_mmap_lock to cover the calls to remove_migration_ptes() too.\n\nThis is (mostly) how it used to be after commit c0d0381ade79.  That was\nremoved by 336bf30eb765 for both file & anon hugetlb pages when it should\nonly have been removed for anon hugetlb pages.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2026-23097",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/e7396d23f9d5739f56cf9ab430c3a169f5508394",
            "patch_url": "https://git.kernel.org/stable/p/e7396d23f9d5739f56cf9ab430c3a169f5508394",
            "filename": "CVE-2026-23097-e7396d23f9d5739f56cf9ab430c3a169f5508394.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23097/CVE-2026-23097-e7396d23f9d5739f56cf9ab430c3a169f5508394.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/1b68efce6dd483d22f50d0d3800c4cfda14b1305",
                "patch_url": "https://git.kernel.org/stable/p/1b68efce6dd483d22f50d0d3800c4cfda14b1305",
                "filename": "CVE-2026-23097-1b68efce6dd483d22f50d0d3800c4cfda14b1305.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23097/CVE-2026-23097-1b68efce6dd483d22f50d0d3800c4cfda14b1305.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/526394af4e8ade89cacd1a9ce2b97712712fcc34",
                "patch_url": "https://git.kernel.org/stable/p/526394af4e8ade89cacd1a9ce2b97712712fcc34",
                "filename": "CVE-2026-23097-526394af4e8ade89cacd1a9ce2b97712712fcc34.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23097/CVE-2026-23097-526394af4e8ade89cacd1a9ce2b97712712fcc34.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5edb9854f8df5428b40990a1c7d60507da5bd330",
                "patch_url": "https://git.kernel.org/stable/p/5edb9854f8df5428b40990a1c7d60507da5bd330",
                "filename": "CVE-2026-23097-5edb9854f8df5428b40990a1c7d60507da5bd330.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23097/CVE-2026-23097-5edb9854f8df5428b40990a1c7d60507da5bd330.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/ad97b9a55246eb940a26ac977f80892a395cabf9",
                "patch_url": "https://git.kernel.org/stable/p/ad97b9a55246eb940a26ac977f80892a395cabf9",
                "filename": "CVE-2026-23097-ad97b9a55246eb940a26ac977f80892a395cabf9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23097/CVE-2026-23097-ad97b9a55246eb940a26ac977f80892a395cabf9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b75070823b89009f5123fd0e05a8e0c3d39937c1",
                "patch_url": "https://git.kernel.org/stable/p/b75070823b89009f5123fd0e05a8e0c3d39937c1",
                "filename": "CVE-2026-23097-b75070823b89009f5123fd0e05a8e0c3d39937c1.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23097/CVE-2026-23097-b75070823b89009f5123fd0e05a8e0c3d39937c1.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/b7880cb166ab62c2409046b2347261abf701530e",
                "patch_url": "https://git.kernel.org/stable/p/b7880cb166ab62c2409046b2347261abf701530e",
                "filename": "CVE-2026-23097-b7880cb166ab62c2409046b2347261abf701530e.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23097/CVE-2026-23097-b7880cb166ab62c2409046b2347261abf701530e.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e7396d23f9d5739f56cf9ab430c3a169f5508394",
                "patch_url": "https://git.kernel.org/stable/p/e7396d23f9d5739f56cf9ab430c3a169f5508394",
                "filename": "CVE-2026-23097-e7396d23f9d5739f56cf9ab430c3a169f5508394.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23097/CVE-2026-23097-e7396d23f9d5739f56cf9ab430c3a169f5508394.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/1b68efce6dd483d22f50d0d3800c4cfda14b1305",
            "https://git.kernel.org/stable/c/526394af4e8ade89cacd1a9ce2b97712712fcc34",
            "https://git.kernel.org/stable/c/5edb9854f8df5428b40990a1c7d60507da5bd330",
            "https://git.kernel.org/stable/c/ad97b9a55246eb940a26ac977f80892a395cabf9",
            "https://git.kernel.org/stable/c/b75070823b89009f5123fd0e05a8e0c3d39937c1",
            "https://git.kernel.org/stable/c/b7880cb166ab62c2409046b2347261abf701530e",
            "https://git.kernel.org/stable/c/e7396d23f9d5739f56cf9ab430c3a169f5508394",
            "https://www.cve.org/CVERecord?id=CVE-2026-23097\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-23097\nhttps://lore.kernel.org/linux-cve-announce/2026020427-CVE-2026-23097-a591@gregkh/T"
        ]
    },
    "CVE-2026-23193": {
        "cve": "CVE-2026-23193",
        "cvss_v2": null,
        "cvss_v3": 8.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()\n\nIn iscsit_dec_session_usage_count(), the function calls complete() while\nholding the sess->session_usage_lock. Similar to the connection usage count\nlogic, the waiter signaled by complete() (e.g., in the session release\npath) may wake up and free the iscsit_session structure immediately.\n\nThis creates a race condition where the current thread may attempt to\nexecute spin_unlock_bh() on a session structure that has already been\ndeallocated, resulting in a KASAN slab-use-after-free.\n\nTo resolve this, release the session_usage_lock before calling complete()\nto ensure all dereferences of the sess pointer are finished before the\nwaiter is allowed to proceed with deallocation.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2026-23193",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2b64015550a13bcc72910be0565548d9a754d46d",
            "patch_url": "https://git.kernel.org/stable/p/2b64015550a13bcc72910be0565548d9a754d46d",
            "filename": "CVE-2026-23193-2b64015550a13bcc72910be0565548d9a754d46d.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23193/CVE-2026-23193-2b64015550a13bcc72910be0565548d9a754d46d.patch",
            "type": "gitkernel",
            "livepatch_compatible": true
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/11ebafffce31efc6abeb28c509017976fc49f1ca",
                "patch_url": "https://git.kernel.org/stable/p/11ebafffce31efc6abeb28c509017976fc49f1ca",
                "filename": "CVE-2026-23193-11ebafffce31efc6abeb28c509017976fc49f1ca.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23193/CVE-2026-23193-11ebafffce31efc6abeb28c509017976fc49f1ca.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2b64015550a13bcc72910be0565548d9a754d46d",
                "patch_url": "https://git.kernel.org/stable/p/2b64015550a13bcc72910be0565548d9a754d46d",
                "filename": "CVE-2026-23193-2b64015550a13bcc72910be0565548d9a754d46d.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23193/CVE-2026-23193-2b64015550a13bcc72910be0565548d9a754d46d.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/41b86a9ec037bd3435d68dd3692f0891a207e7e7",
                "patch_url": "https://git.kernel.org/stable/p/41b86a9ec037bd3435d68dd3692f0891a207e7e7",
                "filename": "CVE-2026-23193-41b86a9ec037bd3435d68dd3692f0891a207e7e7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23193/CVE-2026-23193-41b86a9ec037bd3435d68dd3692f0891a207e7e7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/4530f4e4d0e6a207110b0ffed0c911bca43531a4",
                "patch_url": "https://git.kernel.org/stable/p/4530f4e4d0e6a207110b0ffed0c911bca43531a4",
                "filename": "CVE-2026-23193-4530f4e4d0e6a207110b0ffed0c911bca43531a4.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23193/CVE-2026-23193-4530f4e4d0e6a207110b0ffed0c911bca43531a4.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/84dc6037390b8607c5551047d3970336cb51ba9a",
                "patch_url": "https://git.kernel.org/stable/p/84dc6037390b8607c5551047d3970336cb51ba9a",
                "filename": "CVE-2026-23193-84dc6037390b8607c5551047d3970336cb51ba9a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23193/CVE-2026-23193-84dc6037390b8607c5551047d3970336cb51ba9a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/d8dbdc146e9e9a976931b78715be2e91299049f9",
                "patch_url": "https://git.kernel.org/stable/p/d8dbdc146e9e9a976931b78715be2e91299049f9",
                "filename": "CVE-2026-23193-d8dbdc146e9e9a976931b78715be2e91299049f9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23193/CVE-2026-23193-d8dbdc146e9e9a976931b78715be2e91299049f9.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/fd8b0900173307039d3a84644c2fee041a7ed4fb",
                "patch_url": "https://git.kernel.org/stable/p/fd8b0900173307039d3a84644c2fee041a7ed4fb",
                "filename": "CVE-2026-23193-fd8b0900173307039d3a84644c2fee041a7ed4fb.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23193/CVE-2026-23193-fd8b0900173307039d3a84644c2fee041a7ed4fb.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/11ebafffce31efc6abeb28c509017976fc49f1ca",
            "https://git.kernel.org/stable/c/2b64015550a13bcc72910be0565548d9a754d46d",
            "https://git.kernel.org/stable/c/41b86a9ec037bd3435d68dd3692f0891a207e7e7",
            "https://git.kernel.org/stable/c/4530f4e4d0e6a207110b0ffed0c911bca43531a4",
            "https://git.kernel.org/stable/c/84dc6037390b8607c5551047d3970336cb51ba9a",
            "https://git.kernel.org/stable/c/d8dbdc146e9e9a976931b78715be2e91299049f9",
            "https://git.kernel.org/stable/c/fd8b0900173307039d3a84644c2fee041a7ed4fb",
            "https://www.cve.org/CVERecord?id=CVE-2026-23193\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-23193\nhttps://lore.kernel.org/linux-cve-announce/2026021434-CVE-2026-23193-2c6c@gregkh/T"
        ]
    },
    "CVE-2026-23204": {
        "cve": "CVE-2026-23204",
        "cvss_v2": null,
        "cvss_v3": 7.1,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: cls_u32: use skb_header_pointer_careful()\n\nskb_header_pointer() does not fully validate negative @offset values.\n\nUse skb_header_pointer_careful() instead.\n\nGangMin Kim provided a report and a repro fooling u32_classify():\n\nBUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0\nnet/sched/cls_u32.c:221",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2026-23204",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/cfa745830e45ecb75c061aa34330ee0cac941cc7",
            "patch_url": "https://git.kernel.org/stable/p/cfa745830e45ecb75c061aa34330ee0cac941cc7",
            "filename": "CVE-2026-23204-cfa745830e45ecb75c061aa34330ee0cac941cc7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23204/CVE-2026-23204-cfa745830e45ecb75c061aa34330ee0cac941cc7.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/13336a6239b9d7c6e61483017bb8bdfe3ceb10a5",
                "patch_url": "https://git.kernel.org/stable/p/13336a6239b9d7c6e61483017bb8bdfe3ceb10a5",
                "filename": "CVE-2026-23204-13336a6239b9d7c6e61483017bb8bdfe3ceb10a5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23204/CVE-2026-23204-13336a6239b9d7c6e61483017bb8bdfe3ceb10a5.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/8a672f177ebe19c93d795fbe967846084fbc7943",
                "patch_url": "https://git.kernel.org/stable/p/8a672f177ebe19c93d795fbe967846084fbc7943",
                "filename": "CVE-2026-23204-8a672f177ebe19c93d795fbe967846084fbc7943.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23204/CVE-2026-23204-8a672f177ebe19c93d795fbe967846084fbc7943.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cabd1a976375780dabab888784e356f574bbaed8",
                "patch_url": "https://git.kernel.org/stable/p/cabd1a976375780dabab888784e356f574bbaed8",
                "filename": "CVE-2026-23204-cabd1a976375780dabab888784e356f574bbaed8.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23204/CVE-2026-23204-cabd1a976375780dabab888784e356f574bbaed8.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cfa745830e45ecb75c061aa34330ee0cac941cc7",
                "patch_url": "https://git.kernel.org/stable/p/cfa745830e45ecb75c061aa34330ee0cac941cc7",
                "filename": "CVE-2026-23204-cfa745830e45ecb75c061aa34330ee0cac941cc7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23204/CVE-2026-23204-cfa745830e45ecb75c061aa34330ee0cac941cc7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/e41a23e61259f5526af875c3b86b3d42a9bae0e5",
                "patch_url": "https://git.kernel.org/stable/p/e41a23e61259f5526af875c3b86b3d42a9bae0e5",
                "filename": "CVE-2026-23204-e41a23e61259f5526af875c3b86b3d42a9bae0e5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23204/CVE-2026-23204-e41a23e61259f5526af875c3b86b3d42a9bae0e5.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/13336a6239b9d7c6e61483017bb8bdfe3ceb10a5",
            "https://git.kernel.org/stable/c/8a672f177ebe19c93d795fbe967846084fbc7943",
            "https://git.kernel.org/stable/c/cabd1a976375780dabab888784e356f574bbaed8",
            "https://git.kernel.org/stable/c/cfa745830e45ecb75c061aa34330ee0cac941cc7",
            "https://git.kernel.org/stable/c/e41a23e61259f5526af875c3b86b3d42a9bae0e5",
            "https://www.cve.org/CVERecord?id=CVE-2026-23204\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-23204\nhttps://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23204-be85@gregkh/T"
        ]
    },
    "CVE-2026-23209": {
        "cve": "CVE-2026-23209",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacvlan: fix error recovery in macvlan_common_newlink()\n\nvalis provided a nice repro to crash the kernel:\n\nip link add p1 type veth peer p2\nip link set address 00:00:00:00:00:20 dev p1\nip link set up dev p1\nip link set up dev p2\n\nip link add mv0 link p2 type macvlan mode source\nip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20\n\nping -c1 -I p1 1.2.3.4\n\nHe also gave a very detailed analysis:\n\n<quote valis>\n\nThe issue is triggered when a new macvlan link is created  with\nMACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or\nMACVLAN_MACADDR_SET) parameter, lower device already has a macvlan\nport and register_netdevice() called from macvlan_common_newlink()\nfails (e.g. because of the invalid link name).\n\nIn this case macvlan_hash_add_source is called from\nmacvlan_change_sources() / macvlan_common_newlink():\n\nThis adds a reference to vlan to the port's vlan_source_hash using\nmacvlan_source_entry.\n\nvlan is a pointer to the priv data of the link that is being created.\n\nWhen register_netdevice() fails, the error is returned from\nmacvlan_newlink() to rtnl_newlink_create():\n\n        if (ops->newlink)\n                err = ops->newlink(dev, &params, extack);\n        else\n                err = register_netdevice(dev);\n        if (err < 0) {\n                free_netdev(dev);\n                goto out;\n        }\n\nand free_netdev() is called, causing a kvfree() on the struct\nnet_device that is still referenced in the source entry attached to\nthe lower device's macvlan port.\n\nNow all packets sent on the macvlan port with a matching source mac\naddress will trigger a use-after-free in macvlan_forward_source().\n\n</quote valis>\n\nWith all that, my fix is to make sure we call macvlan_flush_sources()\nregardless of @create value whenever \"goto destroy_macvlan_port;\"\npath is taken.\n\nMany thanks to valis for following up on this issue.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2026-23209",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/11ba9f0dc865136174cb98834280fb21bbc950c7",
            "patch_url": "https://git.kernel.org/stable/p/11ba9f0dc865136174cb98834280fb21bbc950c7",
            "filename": "CVE-2026-23209-11ba9f0dc865136174cb98834280fb21bbc950c7.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23209/CVE-2026-23209-11ba9f0dc865136174cb98834280fb21bbc950c7.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/11ba9f0dc865136174cb98834280fb21bbc950c7",
                "patch_url": "https://git.kernel.org/stable/p/11ba9f0dc865136174cb98834280fb21bbc950c7",
                "filename": "CVE-2026-23209-11ba9f0dc865136174cb98834280fb21bbc950c7.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23209/CVE-2026-23209-11ba9f0dc865136174cb98834280fb21bbc950c7.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/5dae6b36a7cb7a4fcf4121b95e9ca7f96f816c8a",
                "patch_url": "https://git.kernel.org/stable/p/5dae6b36a7cb7a4fcf4121b95e9ca7f96f816c8a",
                "filename": "CVE-2026-23209-5dae6b36a7cb7a4fcf4121b95e9ca7f96f816c8a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23209/CVE-2026-23209-5dae6b36a7cb7a4fcf4121b95e9ca7f96f816c8a.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/986967a162142710076782d5b93daab93a892980",
                "patch_url": "https://git.kernel.org/stable/p/986967a162142710076782d5b93daab93a892980",
                "filename": "CVE-2026-23209-986967a162142710076782d5b93daab93a892980.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23209/CVE-2026-23209-986967a162142710076782d5b93daab93a892980.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/c43d0e787cbba569ec9d11579ed370b50fab6c9c",
                "patch_url": "https://git.kernel.org/stable/p/c43d0e787cbba569ec9d11579ed370b50fab6c9c",
                "filename": "CVE-2026-23209-c43d0e787cbba569ec9d11579ed370b50fab6c9c.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23209/CVE-2026-23209-c43d0e787cbba569ec9d11579ed370b50fab6c9c.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/cdedcd5aa3f3cb8b7ae0f87ab3a936d0bd583d66",
                "patch_url": "https://git.kernel.org/stable/p/cdedcd5aa3f3cb8b7ae0f87ab3a936d0bd583d66",
                "filename": "CVE-2026-23209-cdedcd5aa3f3cb8b7ae0f87ab3a936d0bd583d66.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23209/CVE-2026-23209-cdedcd5aa3f3cb8b7ae0f87ab3a936d0bd583d66.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/da5c6b8ae47e414be47e5e04def15b25d5c962dc",
                "patch_url": "https://git.kernel.org/stable/p/da5c6b8ae47e414be47e5e04def15b25d5c962dc",
                "filename": "CVE-2026-23209-da5c6b8ae47e414be47e5e04def15b25d5c962dc.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23209/CVE-2026-23209-da5c6b8ae47e414be47e5e04def15b25d5c962dc.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f8db6475a83649689c087a8f52486fcc53e627e9",
                "patch_url": "https://git.kernel.org/stable/p/f8db6475a83649689c087a8f52486fcc53e627e9",
                "filename": "CVE-2026-23209-f8db6475a83649689c087a8f52486fcc53e627e9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23209/CVE-2026-23209-f8db6475a83649689c087a8f52486fcc53e627e9.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/11ba9f0dc865136174cb98834280fb21bbc950c7",
            "https://git.kernel.org/stable/c/5dae6b36a7cb7a4fcf4121b95e9ca7f96f816c8a",
            "https://git.kernel.org/stable/c/986967a162142710076782d5b93daab93a892980",
            "https://git.kernel.org/stable/c/c43d0e787cbba569ec9d11579ed370b50fab6c9c",
            "https://git.kernel.org/stable/c/cdedcd5aa3f3cb8b7ae0f87ab3a936d0bd583d66",
            "https://git.kernel.org/stable/c/da5c6b8ae47e414be47e5e04def15b25d5c962dc",
            "https://git.kernel.org/stable/c/f8db6475a83649689c087a8f52486fcc53e627e9",
            "https://www.cve.org/CVERecord?id=CVE-2026-23209\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-23209\nhttps://lore.kernel.org/linux-cve-announce/2026021439-CVE-2026-23209-9ad6@gregkh/T"
        ]
    },
    "CVE-2026-23231": {
        "cve": "CVE-2026-23231",
        "cvss_v2": null,
        "cvss_v3": 7.8,
        "description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix use-after-free in nf_tables_addchain()\n\nnf_tables_addchain() publishes the chain to table->chains via\nlist_add_tail_rcu() (in nft_chain_add()) before registering hooks.\nIf nf_tables_register_hook() then fails, the error path calls\nnft_chain_del() (list_del_rcu()) followed by nf_tables_chain_destroy()\nwith no RCU grace period in between.\n\nThis creates two use-after-free conditions:\n\n 1) Control-plane: nf_tables_dump_chains() traverses table->chains\n    under rcu_read_lock(). A concurrent dump can still be walking\n    the chain when the error path frees it.\n\n 2) Packet path: for NFPROTO_INET, nf_register_net_hook() briefly\n    installs the IPv4 hook before IPv6 registration fails.  Packets\n    entering nft_do_chain() via the transient IPv4 hook can still be\n    dereferencing chain->blob_gen_X when the error path frees the\n    chain.\n\nAdd synchronize_rcu() between nft_chain_del() and the chain destroy\nso that all RCU readers -- both dump threads and in-flight packet\nevaluation -- have finished before the chain is freed.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2026-23231",
        "selected_patch": {
            "url": "https://git.kernel.org/stable/c/2a6586ecfa4ce1413daaafee250d2590e05f1a33",
            "patch_url": "https://git.kernel.org/stable/p/2a6586ecfa4ce1413daaafee250d2590e05f1a33",
            "filename": "CVE-2026-23231-2a6586ecfa4ce1413daaafee250d2590e05f1a33.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23231/CVE-2026-23231-2a6586ecfa4ce1413daaafee250d2590e05f1a33.patch",
            "type": "gitkernel"
        },
        "available_patches": [
            {
                "url": "https://git.kernel.org/stable/c/2a6586ecfa4ce1413daaafee250d2590e05f1a33",
                "patch_url": "https://git.kernel.org/stable/p/2a6586ecfa4ce1413daaafee250d2590e05f1a33",
                "filename": "CVE-2026-23231-2a6586ecfa4ce1413daaafee250d2590e05f1a33.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23231/CVE-2026-23231-2a6586ecfa4ce1413daaafee250d2590e05f1a33.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/2f9a4ffeb763aec822f8ff3d1e82202d27d46d4b",
                "patch_url": "https://git.kernel.org/stable/p/2f9a4ffeb763aec822f8ff3d1e82202d27d46d4b",
                "filename": "CVE-2026-23231-2f9a4ffeb763aec822f8ff3d1e82202d27d46d4b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23231/CVE-2026-23231-2f9a4ffeb763aec822f8ff3d1e82202d27d46d4b.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/7017745068a9068904e1e7a1b170a5785647cc81",
                "patch_url": "https://git.kernel.org/stable/p/7017745068a9068904e1e7a1b170a5785647cc81",
                "filename": "CVE-2026-23231-7017745068a9068904e1e7a1b170a5785647cc81.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23231/CVE-2026-23231-7017745068a9068904e1e7a1b170a5785647cc81.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/71e99ee20fc3f662555118cf1159443250647533",
                "patch_url": "https://git.kernel.org/stable/p/71e99ee20fc3f662555118cf1159443250647533",
                "filename": "CVE-2026-23231-71e99ee20fc3f662555118cf1159443250647533.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23231/CVE-2026-23231-71e99ee20fc3f662555118cf1159443250647533.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/dbd0af8083dd201f07c49110b2ee93710abdff28",
                "patch_url": "https://git.kernel.org/stable/p/dbd0af8083dd201f07c49110b2ee93710abdff28",
                "filename": "CVE-2026-23231-dbd0af8083dd201f07c49110b2ee93710abdff28.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23231/CVE-2026-23231-dbd0af8083dd201f07c49110b2ee93710abdff28.patch",
                "type": "gitkernel"
            },
            {
                "url": "https://git.kernel.org/stable/c/f3fe58ce37926a10115ede527d59b91bcc05400a",
                "patch_url": "https://git.kernel.org/stable/p/f3fe58ce37926a10115ede527d59b91bcc05400a",
                "filename": "CVE-2026-23231-f3fe58ce37926a10115ede527d59b91bcc05400a.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-23231/CVE-2026-23231-f3fe58ce37926a10115ede527d59b91bcc05400a.patch",
                "type": "gitkernel"
            }
        ],
        "all_links": [
            "https://git.kernel.org/stable/c/2a6586ecfa4ce1413daaafee250d2590e05f1a33",
            "https://git.kernel.org/stable/c/2f9a4ffeb763aec822f8ff3d1e82202d27d46d4b",
            "https://git.kernel.org/stable/c/7017745068a9068904e1e7a1b170a5785647cc81",
            "https://git.kernel.org/stable/c/71e99ee20fc3f662555118cf1159443250647533",
            "https://git.kernel.org/stable/c/dbd0af8083dd201f07c49110b2ee93710abdff28",
            "https://git.kernel.org/stable/c/f3fe58ce37926a10115ede527d59b91bcc05400a",
            "https://www.cve.org/CVERecord?id=CVE-2026-23231\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-23231\nhttps://lore.kernel.org/linux-cve-announce/2026030436-CVE-2026-23231-1a96@gregkh/T"
        ]
    },
    "CVE-2026-25646": {
        "cve": "CVE-2026-25646",
        "cvss_v2": null,
        "cvss_v3": 8.1,
        "description": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user's display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification. This vulnerability is fixed in 1.6.55.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2026-25646",
        "selected_patch": {
            "url": "https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88",
            "patch_url": "https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88.patch",
            "filename": "CVE-2026-25646-01d03b8453eb30ade759cd45c707e5a1c7277d88.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-25646/CVE-2026-25646-01d03b8453eb30ade759cd45c707e5a1c7277d88.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88",
                "patch_url": "https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88.patch",
                "filename": "CVE-2026-25646-01d03b8453eb30ade759cd45c707e5a1c7277d88.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-25646/CVE-2026-25646-01d03b8453eb30ade759cd45c707e5a1c7277d88.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88"
        ]
    },
    "CVE-2026-25749": {
        "cve": "CVE-2026-25749",
        "cvss_v2": null,
        "cvss_v3": 6.6,
        "description": "Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2026-25749",
        "selected_patch": {
            "url": "https://github.com/vim/vim/commit/0714b15940b245108e6e9d7aa2260dd849a26fa9",
            "patch_url": "https://github.com/vim/vim/commit/0714b15940b245108e6e9d7aa2260dd849a26fa9.patch",
            "filename": "CVE-2026-25749-0714b15940b245108e6e9d7aa2260dd849a26fa9.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-25749/CVE-2026-25749-0714b15940b245108e6e9d7aa2260dd849a26fa9.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/vim/vim/commit/0714b15940b245108e6e9d7aa2260dd849a26fa9",
                "patch_url": "https://github.com/vim/vim/commit/0714b15940b245108e6e9d7aa2260dd849a26fa9.patch",
                "filename": "CVE-2026-25749-0714b15940b245108e6e9d7aa2260dd849a26fa9.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-25749/CVE-2026-25749-0714b15940b245108e6e9d7aa2260dd849a26fa9.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/vim/vim/commit/0714b15940b245108e6e9d7aa2260dd849a26fa9"
        ]
    },
    "CVE-2026-4519": {
        "cve": "CVE-2026-4519",
        "cvss_v2": null,
        "cvss_v3": "7.1",
        "description": "The webbrowser.open() API would accept leading dashes in the URL which \ncould be handled as command line options for certain web browsers. New \nbehavior rejects leading dashes. Users are recommended to sanitize URLs \nprior to passing to webbrowser.open().",
        "cve_url": "https://access.redhat.com/security/cve/CVE-2026-4519",
        "selected_patch": {
            "url": "https://github.com/python/cpython/commit/43fe06b96f6a6cf5cfd5bdab20b8649374956866",
            "patch_url": "https://github.com/python/cpython/commit/43fe06b96f6a6cf5cfd5bdab20b8649374956866.patch",
            "filename": "CVE-2026-4519-43fe06b96f6a6cf5cfd5bdab20b8649374956866.patch",
            "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-4519/CVE-2026-4519-43fe06b96f6a6cf5cfd5bdab20b8649374956866.patch",
            "type": "github"
        },
        "available_patches": [
            {
                "url": "https://github.com/python/cpython/commit/43fe06b96f6a6cf5cfd5bdab20b8649374956866",
                "patch_url": "https://github.com/python/cpython/commit/43fe06b96f6a6cf5cfd5bdab20b8649374956866.patch",
                "filename": "CVE-2026-4519-43fe06b96f6a6cf5cfd5bdab20b8649374956866.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-4519/CVE-2026-4519-43fe06b96f6a6cf5cfd5bdab20b8649374956866.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/82a24a4442312bdcfc4c799885e8b3e00990f02b",
                "patch_url": "https://github.com/python/cpython/commit/82a24a4442312bdcfc4c799885e8b3e00990f02b.patch",
                "filename": "CVE-2026-4519-82a24a4442312bdcfc4c799885e8b3e00990f02b.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-4519/CVE-2026-4519-82a24a4442312bdcfc4c799885e8b3e00990f02b.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/9669a912a0e329c094e992204d6bdb8787024d76",
                "patch_url": "https://github.com/python/cpython/commit/9669a912a0e329c094e992204d6bdb8787024d76.patch",
                "filename": "CVE-2026-4519-9669a912a0e329c094e992204d6bdb8787024d76.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-4519/CVE-2026-4519-9669a912a0e329c094e992204d6bdb8787024d76.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/ad4d5ba32af4d80b0dfa2ba9d8203bfb219e60a5",
                "patch_url": "https://github.com/python/cpython/commit/ad4d5ba32af4d80b0dfa2ba9d8203bfb219e60a5.patch",
                "filename": "CVE-2026-4519-ad4d5ba32af4d80b0dfa2ba9d8203bfb219e60a5.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-4519/CVE-2026-4519-ad4d5ba32af4d80b0dfa2ba9d8203bfb219e60a5.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/cbba6119391112aba9c5aebf7b94aea447922c48",
                "patch_url": "https://github.com/python/cpython/commit/cbba6119391112aba9c5aebf7b94aea447922c48.patch",
                "filename": "CVE-2026-4519-cbba6119391112aba9c5aebf7b94aea447922c48.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-4519/CVE-2026-4519-cbba6119391112aba9c5aebf7b94aea447922c48.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/commit/ceac1efc66516ac387eef2c9a0ce671895b44f03",
                "patch_url": "https://github.com/python/cpython/commit/ceac1efc66516ac387eef2c9a0ce671895b44f03.patch",
                "filename": "CVE-2026-4519-ceac1efc66516ac387eef2c9a0ce671895b44f03.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-4519/CVE-2026-4519-ceac1efc66516ac387eef2c9a0ce671895b44f03.patch",
                "type": "github"
            },
            {
                "url": "https://github.com/python/cpython/pull/143931",
                "patch_url": "https://github.com/python/cpython/pull/143931.patch",
                "filename": "CVE-2026-4519-https___github_com_python_cpython_pull_143931_patch.patch",
                "path": "/root/rebootless/rebootlessdata/kernel_cve_patches/CVE-2026-4519/CVE-2026-4519-https___github_com_python_cpython_pull_143931_patch.patch",
                "type": "github"
            }
        ],
        "all_links": [
            "https://github.com/python/cpython/commit/43fe06b96f6a6cf5cfd5bdab20b8649374956866",
            "https://github.com/python/cpython/commit/82a24a4442312bdcfc4c799885e8b3e00990f02b",
            "https://github.com/python/cpython/commit/9669a912a0e329c094e992204d6bdb8787024d76",
            "https://github.com/python/cpython/commit/ad4d5ba32af4d80b0dfa2ba9d8203bfb219e60a5",
            "https://github.com/python/cpython/commit/cbba6119391112aba9c5aebf7b94aea447922c48",
            "https://github.com/python/cpython/commit/ceac1efc66516ac387eef2c9a0ce671895b44f03",
            "https://github.com/python/cpython/pull/143931"
        ]
    }
}