{
 "cells": [
  {
   "cell_type": "code",
   "execution_count": 1,
   "metadata": {},
   "outputs": [
    {
     "name": "stdout",
     "output_type": "stream",
     "text": [
      "cve_id: CVE-2024-39468, mainline_commitId: 02c418774f76a0a36a6195c9dbf8971eb4130a15, stable_commitId: b055752675cd1d1db4ac9c2750db3dc3e89ea261, title: smb: client: fix deadlock in smb2_find_smb_tcon(), fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pf203qrSQ5VpDTiG=U0DUa7gC1NJmJAog0y7U=TcuFjA@mail.gmail.com/, all_match_text: CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon()\n",
      "\n",
      "stable 5.10 and 5.15 were fixed.\n",
      "\n",
      "Fixed status\n",
      "mainline: [02c418774f76a0a36a6195c9dbf8971eb4130a15]\n",
      "stable/5.10: [b055752675cd1d1db4ac9c2750db3dc3e89ea261]\n",
      "stable/5.15: [21f5dd36e655d25a7b45b61c1e537198b671f720]\n",
      "stable/6.1: [b09b556e48968317887a11243a5331a7bc00ece5]\n",
      "stable/6.6: [225de871ddf994f69a57f035709cad9c0ab8615a]\n",
      "stable/6.9: [8d0f5f1ccf675454a833a573c53830a49b7d1a47]\n",
      "\n",
      "cve_id: CVE-2024-44938, mainline_commitId: None, stable_commitId: None, title: jfs: Fix shift-out-of-bounds in dbDiscardAG, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/, all_match_text: CVE-2024-44938: jfs: Fix shift-out-of-bounds in dbDiscardAG\n",
      "\n",
      "stable/6.1 was fixed.\n",
      "\n",
      "Fixed status\n",
      "stable/6.1: [bd04a149e3a29e7f71b7956ed41dba34e42d539e]\n",
      "stable/6.10: [234e6ea0855cdb5673d54ecaf7dc5c78f3e84630]\n",
      "stable/6.6: [f650148b43949ca9e37e820804bb6026fff404f3]\n",
      "\n",
      "cve_id: CVE-2024-43901, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-44958, mainline_commitId: e22f910a26cc2a3ac9c66b8e935ef2a7dd881117, stable_commitId: None, title: sched/smt: Fix unbalance sched_smt_present dec/inc, fixes_commitId: Introduced by commit c5511d0 (&#34;sched/smt: Make sched_smt_present track topology&#34;) in v4.20-rc5., cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/, all_match_text: CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024090413-CVE-2024-44958-80e9@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024090413-CVE-2024-44958-80e9@gregkh/</a>\n",
      "\n",
      "Introduced by commit c5511d0 (&#34;sched/smt: Make sched_smt_present track\n",
      "topology&#34;) in v4.20-rc5.\n",
      "Fixed in v6.11-rc2.\n",
      "Bug introduced commit was backported to following branches.\n",
      "cip/4.19 cip/4.19-rt stable/4.19\n",
      "\n",
      "Fixed status\n",
      "mainline: [e22f910a26cc2a3ac9c66b8e935ef2a7dd881117]\n",
      "stable/5.15: [2a3548c7ef2e135aee40e7e5e44e7d11b893e7c4]\n",
      "stable/6.1: [2cf7665efe451e48d27953e6b5bc627d518c902b]\n",
      "stable/6.6: [65727331b60197b742089855ac09464c22b96f66]\n",
      "\n",
      "cve_id: CVE-2024-44982, mainline_commitId: bfa1a6283be390947d3649c482e5167186a37016, stable_commitId: None, title: drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails, fixes_commitId: Introduced by commit 25fdd59 (&#34;drm/msm: Add SDM845 DPU support&#34;) in v4.19-rc1. Fixed in v6.11-rc5., cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/, all_match_text: CVE-2024-44982: drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024090444-CVE-2024-44982-dd24@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024090444-CVE-2024-44982-dd24@gregkh/</a>\n",
      "\n",
      "Introduced by commit 25fdd59 (&#34;drm/msm: Add SDM845 DPU support&#34;) in v4.19-rc1.\n",
      "Fixed in v6.11-rc5.\n",
      "Bug introduced commit is not backported to older stable kernels.\n",
      "\n",
      "Fixed status\n",
      "mainline: [bfa1a6283be390947d3649c482e5167186a37016]\n",
      "stable/5.15: [9b8b65211a880af8fe8330a101e1e239a2d4008f]\n",
      "stable/6.1: [7ecf85542169012765e4c2817cd3be6c2e009962]\n",
      "stable/6.6: [a3c5815b07f4ee19d0b7e2ddf91ff9f03ecbf27d]\n",
      "\n",
      "cve_id: CVE-2024-45028, mainline_commitId: a1e627af32ed60713941cbfc8075d44cad07f6dd, stable_commitId: 9b9ba386d7bfdbc38445932c90fa9444c0524bea, title: mmc: mmc_test: Fix NULL dereference on allocation failure, fixes_commitId: Introduced by commit 2661081 (&#34;mmc_test: highmem tests&#34;) in v2.6.27-rc1. Fixed in v6.11-rc5., cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/, all_match_text: CVE-2024-45028: mmc: mmc_test: Fix NULL dereference on allocation failure\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024091110-CVE-2024-45028-34f7@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024091110-CVE-2024-45028-34f7@gregkh/</a>\n",
      "\n",
      "Introduced by commit 2661081 (&#34;mmc_test: highmem tests&#34;) in v2.6.27-rc1.\n",
      "Fixed in v6.11-rc5.\n",
      "Bug introduced commit is not backported to older stable kernels.\n",
      "\n",
      "Fixed status\n",
      "mainline: [a1e627af32ed60713941cbfc8075d44cad07f6dd]\n",
      "stable/4.19: [e97be13a9f51284da450dd2a592e3fa87b49cdc9]\n",
      "stable/5.10: [9b9ba386d7bfdbc38445932c90fa9444c0524bea]\n",
      "stable/5.15: [e40515582141a9e7c84b269be699c05236a499a6]\n",
      "stable/5.4: [2b507b03991f44dfb202fc2a82c9874d1b1f0c06]\n",
      "stable/6.1: [3b4e76ceae5b5a46c968bd952f551ce173809f63]\n",
      "stable/6.6: [cac2815f49d343b2f0acc4973d2c14918ac3ab0c]\n",
      "\n",
      "cve_id: CVE-2024-45009, mainline_commitId: 1c1f721375989579e46741f59523e39ec9b2a9bd, stable_commitId: None, title: mptcp: pm: only decrement add_addr_accepted for MPJ req, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9rm1=zQVazcf2R5KeOq4QVxGRr6ozVoE+QW1v3WOSKZ=A@mail.gmail.com/, all_match_text: CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ req\n",
      "\n",
      "stable/5.15 was fixed.\n",
      "\n",
      "Fixed status\n",
      "mainline: [1c1f721375989579e46741f59523e39ec9b2a9bd]\n",
      "stable/5.15: [35b31f5549ede4070566b949781e83495906b43d]\n",
      "stable/6.1: [85b866e4c4e63a1d7afb58f1e24273caad03d0b7]\n",
      "stable/6.10: [2060f1efab370b496c4903b840844ecaff324c3c]\n",
      "stable/6.6: [d20bf2c96d7ffd171299b32f562f70e5bf5dc608]\n",
      "\n",
      "cve_id: CVE-2024-46677, mainline_commitId: defd8b3c37b0f9cb3e0f60f47d3d78d459d57fda, stable_commitId: 8bbb9e4e0e66a39282e582d0440724055404b38c, title: gtp: fix a potential NULL pointer dereference, fixes_commitId: Introduced by commit 1e3a3ab (&#34;gtp: make GTP sockets in gtp_newlink optional&#34;) in v4.12-rc1., cve_url: https://lore.kernel.org/all/CAODzB9rm1=zQVazcf2R5KeOq4QVxGRr6ozVoE+QW1v3WOSKZ=A@mail.gmail.com/, all_match_text: CVE-2024-46677: gtp: fix a potential NULL pointer dereference\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46677-b53c@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024091336-CVE-2024-46677-b53c@gregkh/</a>\n",
      "\n",
      "Introduced by commit 1e3a3ab (&#34;gtp: make GTP sockets in gtp_newlink\n",
      "optional&#34;) in v4.12-rc1.\n",
      "Fixed in v6.11-rc6.\n",
      "Bug introduced commit is not backported to older stable kernels.\n",
      "\n",
      "Fixed status\n",
      "mainline: [defd8b3c37b0f9cb3e0f60f47d3d78d459d57fda]\n",
      "stable/4.19: [620fe9809752fae91b4190e897b81ed9976dfb39]\n",
      "stable/5.10: [8bbb9e4e0e66a39282e582d0440724055404b38c]\n",
      "stable/5.15: [4643b91691e969b1b9ad54bf552d7a990cfa3b87]\n",
      "stable/5.4: [bdd99e5f0ad5fa727b16f2101fe880aa2bff2f8e]\n",
      "stable/6.1: [e8b9930b0eb045d19e883c65ff9676fc89320c70]\n",
      "stable/6.6: [28c67f0f84f889fe9f4cbda8354132b20dc9212d]\n",
      "\n",
      "cve_id: CVE-2024-42286, mainline_commitId: eb1d4ce2609584eeb7694866f34d4b213caa3af9, stable_commitId: a3ab508a4853a9f5ae25a7816a4889f09938f63c, title: scsi: qla2xxx: validate nvme_local_port correctly, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pV6wf1Pdm3jYcNbjopB-3HzYfRkDLLMyHzLtH0Hcd3RQ@mail.gmail.com/, all_match_text: CVE-2024-42286: scsi: qla2xxx: validate nvme_local_port correctly\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024081744-CVE-2024-42286-e856@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024081744-CVE-2024-42286-e856@gregkh/</a>\n",
      "\n",
      "There is no mention of the commit that introduced the bug in the CVE\n",
      "announcement.Fixed in v6.11-rc1.\n",
      "It seems as if this bug was introduced by commit 8777e43 (&#34;scsi:\n",
      "qla2xxx: Migrate\n",
      "NVME N2N handling into state machine&#34;) in 4.19-rc1.\n",
      "\n",
      "Fixed status\n",
      "mainline: [eb1d4ce2609584eeb7694866f34d4b213caa3af9]\n",
      "stable/4.19: [549aac9655320c9b245a24271b204668c5d40430]\n",
      "stable/5.10: [a3ab508a4853a9f5ae25a7816a4889f09938f63c]\n",
      "stable/5.15: [cde43031df533751b4ead37d173922feee2f550f]\n",
      "stable/5.4: [e1f010844443c389bc552884ac5cfa47de34d54c]\n",
      "stable/6.1: [7cec2c3bfe84539c415f5e16f989228eba1d2f1e]\n",
      "stable/6.6: [f6be298cc1042f24d521197af29c7c4eb95af4d5]\n",
      "\n",
      "cve_id: CVE-2024-46675, mainline_commitId: 14e497183df28c006603cc67fd3797a537eef7b9, stable_commitId: b72da4d89b97da71e056cc4d1429b2bc426a9c2f, title: usb: dwc3: core: Prevent USB core invalid event buffer, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9rm1=zQVazcf2R5KeOq4QVxGRr6ozVoE+QW1v3WOSKZ=A@mail.gmail.com/, all_match_text: CVE-2024-46675: usb: dwc3: core: Prevent USB core invalid event buffer\n",
      "address access\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024091335-CVE-2024-46675-ba70@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024091335-CVE-2024-46675-ba70@gregkh/</a>\n",
      "\n",
      "There is no mention of the commit that introduced the bug in the CVE\n",
      "announcement.Fixed in v6.11-rc6.\n",
      "\n",
      "Fixed status\n",
      "mainline: [14e497183df28c006603cc67fd3797a537eef7b9]\n",
      "stable/4.19: [eca3f543f817da87c00d1a5697b473efb548204f]\n",
      "stable/5.10: [b72da4d89b97da71e056cc4d1429b2bc426a9c2f]\n",
      "stable/5.15: [111277b881def3153335acfe0d1f43e6cd83ac93]\n",
      "stable/5.4: [d2afc2bffec77316b90d530b07695e3f534df914]\n",
      "stable/6.1: [2189fd13c577d7881f94affc09c950a795064c4b]\n",
      "stable/6.6: [7bb11a75dd4d3612378b90e2a4aa49bdccea28ab]\n",
      "\n",
      "cve_id: CVE-2022-48916, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2022-48905, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-44943, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-42136, mainline_commitId: efb905aeb44b0e99c0e6b07865b1885ae0471ebf, stable_commitId: None, title: cdrom: rearrange last_media_change check to avoid, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pMBYkD3R3zDqMTfQEX6Qj9Nz3=1TRbiEe+KefEmu=N4g@mail.gmail.com/, all_match_text: CVE-2024-42136: cdrom: rearrange last_media_change check to avoid\n",
      "unintentional overflow\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024073029-CVE-2024-42136-5f6e@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024073029-CVE-2024-42136-5f6e@gregkh/</a>\n",
      "\n",
      "There is no mention of the commit that introduced the bug in the CVE\n",
      "announcement.Fixed in v6.10-rc1.\n",
      "It seems as if this bug was introduced by commit 67f1e027c2 (&#34;drivers/cdrom:\n",
      "improved ioctl for media change detection&#34;) in 5.16-rc1.\n",
      "\n",
      "Fixed status\n",
      "mainline: [efb905aeb44b0e99c0e6b07865b1885ae0471ebf]\n",
      "stable/6.1: [0c97527e916054acc4a46ffb02842988acb2e92b]\n",
      "stable/6.6: [3ee21e14c8c329168a0b66bab00ecd18f5d0dee3]\n",
      "\n",
      "cve_id: CVE-2024-43893, mainline_commitId: None, stable_commitId: 52b138f1021113e593ee6ad258ce08fe90693a9e, title: serial: core: check uartclk for zero to avoid divide by zero, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/, all_match_text: CVE-2024-43893: serial: core: check uartclk for zero to avoid divide by zero\n",
      "\n",
      "cip/4.4, cip/4.4-st were fixed.\n",
      "\n",
      "Fixed status\n",
      "cip/4.4: [5f00eb3fc53d99633b99afb1ace18ee3a65a91ff]\n",
      "cip/4.4-st: [5f00eb3fc53d99633b99afb1ace18ee3a65a91ff]\n",
      "stable/4.19: [3bbd90fca824e6fd61fb20f6dd2b0fa5f8b14bba]\n",
      "stable/5.10: [52b138f1021113e593ee6ad258ce08fe90693a9e]\n",
      "stable/5.15: [9196e42a3b8eeff1707e6ef769112b4b6096be49]\n",
      "stable/5.4: [55b2a5d331a6ceb1c4372945fdb77181265ba24f]\n",
      "stable/6.1: [e13ba3fe5ee070f8a9dab60029d52b1f61da5051]\n",
      "stable/6.10: [68dc02f319b9ee54dc23caba742a5c754d1cccc8]\n",
      "stable/6.6: [e3ad503876283ac3fcca922a1bf243ef9eb0b0e2]\n",
      "\n",
      "cve_id: CVE-2024-44948, mainline_commitId: None, stable_commitId: 450b6b22acdaac67a18eaf5ed498421ffcf10051, title: x86/mtrr: Check if fixed MTRRs exist before saving them, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/, all_match_text: CVE-2024-44948: x86/mtrr: Check if fixed MTRRs exist before saving them\n",
      "\n",
      "cip/4.4, cip/4.4-st were fixed.\n",
      "\n",
      "Fixed status\n",
      "cip/4.4: [37bc154f61c9e697fe619eeb4fc40d24951a7417]\n",
      "cip/4.4-st: [37bc154f61c9e697fe619eeb4fc40d24951a7417]\n",
      "stable/4.19: [34f36e6ee5bd7eff8b2adcd9fcaef369f752d82e]\n",
      "stable/5.10: [450b6b22acdaac67a18eaf5ed498421ffcf10051]\n",
      "stable/5.15: [ca7d00c5656d1791e28369919e3e10febe9c3b16]\n",
      "stable/5.4: [06c1de44d378ec5439db17bf476507d68589bfe9]\n",
      "stable/6.1: [8aa79dfb216b865e96ff890bc4ea71650f9bc8d7]\n",
      "stable/6.10: [388f1c954019f253a8383f7eb733f38d541e10b6]\n",
      "stable/6.6: [8a90d3fc7c24608548d3a750671f9dac21d1a462]\n",
      "\n",
      "cve_id: CVE-2022-48914, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2021-47610, mainline_commitId: 26d776fd0f79f093a5d0ce1a4c7c7a992bc3264c, stable_commitId: None, title: drm/msm: Fix null ptr access msm_ioctl_gem_submit(), fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9qccTi6qBXT3gzRzxozhpk86SfisvN6yz1f5bwATyHK4g@mail.gmail.com/, all_match_text: CVE-2021-47610: drm/msm: Fix null ptr access msm_ioctl_gem_submit()\n",
      "\n",
      "Announce: no reference\n",
      "\n",
      "None\n",
      "Since commit 79341eb74 (&#34;drm/msm: Return ERR_PTR() from submit_create()&#34;)\n",
      "in 5.15-rc1, submit_create() returns ERROR reason instead of NULL.\n",
      "So, msm_ioctl_gem_submit() needs to set NULL to submit value because\n",
      "msm_ioctl_gem_submit() check if submit is NULL or not before leaving this\n",
      "function.\n",
      "Fixed in 5.16-rc4.\n",
      "Bug introduced commit is not backported to older stable kernels.\n",
      "\n",
      "Fixed status\n",
      "mainline: [26d776fd0f79f093a5d0ce1a4c7c7a992bc3264c]\n",
      "stable/5.15: [f6db3d98f876870c35e96693cfd54752f6199e59]\n",
      "\n",
      "cve_id: CVE-2024-41060, mainline_commitId: 6fb15dcbcf4f212930350eaee174bb60ed40a536, stable_commitId: None, title: drm/radeon: check bo_va-&gt;bo is non-NULL before using it, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pMBYkD3R3zDqMTfQEX6Qj9Nz3=1TRbiEe+KefEmu=N4g@mail.gmail.com/, all_match_text: CVE-2024-41060: drm/radeon: check bo_va-&gt;bo is non-NULL before using it\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024072905-CVE-2024-41060-b7de@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024072905-CVE-2024-41060-b7de@gregkh/</a>\n",
      "\n",
      "There is no mention of the commit that introduced the bug in the CVE\n",
      "announcement.Fixed in v6.10-rc7.\n",
      "\n",
      "Fixed status\n",
      "mainline: [6fb15dcbcf4f212930350eaee174bb60ed40a536]\n",
      "stable/5.15: [a2b201f83971df03c8e81a480b2f2846ae8ce1a3]\n",
      "stable/6.1: [a9100f17428cb733c4f6fbb132d98bed76318342]\n",
      "stable/6.6: [f13c96e0e325a057c03f8a47734adb360e112efe]\n",
      "\n",
      "cve_id: CVE-2024-43906, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-45003, mainline_commitId: 2a0629834cd82f05d424bbc193374f9a43d1f87d, stable_commitId: 03880af02a78bc9a98b5a581f529cf709c88a9b8, title: vfs: Don&#39;t evict inode under the inode lru traversing context, fixes_commitId: Introduced by commit e50e512 (&#34;ext4: xattr-in-inode support&#34;) in v4.13-rc1. Introduced by commit 7959cf3 (&#34;ubifs: journal: Handle xattrs like, cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/, all_match_text: CVE-2024-45003: vfs: Don&#39;t evict inode under the inode lru traversing context\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024090450-CVE-2024-45003-3bc2@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024090450-CVE-2024-45003-3bc2@gregkh/</a>\n",
      "\n",
      "Introduced by commit e50e512 (&#34;ext4: xattr-in-inode support&#34;) in v4.13-rc1.\n",
      "Introduced by commit 7959cf3 (&#34;ubifs: journal: Handle xattrs like\n",
      "files&#34;) in v5.2-rc1.\n",
      "Fixed in v6.11-rc4.\n",
      "Bug introduced commit is not backported to older stable kernels.\n",
      "\n",
      "Fixed status\n",
      "mainline: [2a0629834cd82f05d424bbc193374f9a43d1f87d]\n",
      "stable/5.10: [03880af02a78bc9a98b5a581f529cf709c88a9b8]\n",
      "stable/5.15: [cda54ec82c0f9d05393242b20b13f69b083f7e88]\n",
      "stable/5.4: [3525ad25240dfdd8c78f3470911ed10aa727aa72]\n",
      "stable/6.1: [437741eba63bf4e437e2beb5583f8633556a2b98]\n",
      "stable/6.6: [b9bda5f6012dd00372f3a06a82ed8971a4c57c32]\n",
      "\n",
      "cve_id: CVE-2024-43904, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2023-52912, mainline_commitId: 99f1a36c90a7524972be5a028424c57fa17753ee, stable_commitId: None, title: drm/amdgpu: Fixed bug on error when unloading amdgpu, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pV6wf1Pdm3jYcNbjopB-3HzYfRkDLLMyHzLtH0Hcd3RQ@mail.gmail.com/, all_match_text: CVE-2023-52912: drm/amdgpu: Fixed bug on error when unloading amdgpu\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024082115-CVE-2023-52912-a6c0@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024082115-CVE-2023-52912-a6c0@gregkh/</a>\n",
      "\n",
      "There is no mention of the commit that introduced the bug in the CVE\n",
      "announcement.Fixed in v6.2-rc4.\n",
      "Affected file was introduced by commit 6a7f76e70fac (&#34;drm/amdgpu: add\n",
      "VRAM manager v2&#34;) in 4.10-rc1.\n",
      "\n",
      "Fixed status\n",
      "mainline: [99f1a36c90a7524972be5a028424c57fa17753ee]\n",
      "stable/6.1: [9196eb7c52e55749a332974f0081f77d53d60199]\n",
      "\n",
      "cve_id: CVE-2024-46798, mainline_commitId: b4a90b543d9f62d3ac34ec1ab97fc5334b048565, stable_commitId: 8ca21e7a27c66b95a4b215edc8e45e5d66679f9f, title: ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object, fixes_commitId: Introduced by commit a72706e (&#34;ASoC: codec2codec: remove ephemeral variables&#34;) in v5.4-rc1., cve_url: https://lore.kernel.org/all/CAODzB9rm1=zQVazcf2R5KeOq4QVxGRr6ozVoE+QW1v3WOSKZ=A@mail.gmail.com/, all_match_text: CVE-2024-46798: ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024091856-CVE-2024-46798-ce16@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024091856-CVE-2024-46798-ce16@gregkh/</a>\n",
      "\n",
      "Introduced by commit a72706e (&#34;ASoC: codec2codec: remove ephemeral\n",
      "variables&#34;) in v5.4-rc1.\n",
      "Fixed in v6.11-rc7.\n",
      "Bug introduced commit is not backported to older stable kernels.\n",
      "\n",
      "Fixed status\n",
      "mainline: [b4a90b543d9f62d3ac34ec1ab97fc5334b048565]\n",
      "stable/5.10: [8ca21e7a27c66b95a4b215edc8e45e5d66679f9f]\n",
      "stable/5.15: [3033ed903b4f28b5e1ab66042084fbc2c48f8624]\n",
      "stable/5.4: [993b60c7f93fa1d8ff296b58f646a867e945ae89]\n",
      "stable/6.1: [fe5046ca91d631ec432eee3bdb1f1c49b09c8b5e]\n",
      "stable/6.6: [5d13afd021eb43868fe03cef6da34ad08831ad6d]\n",
      "\n",
      "cve_id: CVE-2022-48901, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2021-4441, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-44941, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-45018, mainline_commitId: e9767137308daf906496613fd879808a07f006a2, stable_commitId: e5ceff2196dc633c995afb080f6f44a72cff6e1d, title: netfilter: flowtable: initialise extack before use, fixes_commitId: Introduced by commit c29f74e (&#34;netfilter: nf_flow_table: hardware offload support&#34;) in v5.5-rc1., cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/, all_match_text: CVE-2024-45018: netfilter: flowtable: initialise extack before use\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024091108-CVE-2024-45018-7e30@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024091108-CVE-2024-45018-7e30@gregkh/</a>\n",
      "\n",
      "Introduced by commit c29f74e (&#34;netfilter: nf_flow_table: hardware\n",
      "offload support&#34;) in v5.5-rc1.\n",
      "Fixed in v6.11-rc4.\n",
      "Bug introduced commit is not backported to older stable kernels.\n",
      "\n",
      "Fixed status\n",
      "mainline: [e9767137308daf906496613fd879808a07f006a2]\n",
      "stable/5.10: [e5ceff2196dc633c995afb080f6f44a72cff6e1d]\n",
      "stable/5.15: [356beb911b63a8cff34cb57f755c2a2d2ee9dec7]\n",
      "stable/6.1: [7eafeec6be68ebd6140a830ce9ae68ad5b67ec78]\n",
      "stable/6.6: [c7b760499f7791352b49b11667ed04b23d7f5b0f]\n",
      "\n",
      "cve_id: CVE-2023-52916, mainline_commitId: c281355068bc258fd619c5aefd978595bede7bfe, stable_commitId: None, title: media: aspeed: Fix memory overwrite if timing is 1600x, fixes_commitId: Introduced by commit d0876b2 (&#34;mptcp: add the incoming RM_ADDR support&#34;) in v5.10-rc1., cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/, all_match_text: CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024090655-CVE-2023-52916-edc0@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024090655-CVE-2023-52916-edc0@gregkh/</a>\n",
      "\n",
      "There is no mention of the commit that introduced the bug in the CVE\n",
      "announcement.Fixed in v6.6-rc1.\n",
      "CONFIG_VIDEO_ASPEED was added by commit d2b4387f (&#34;media: platform: Add Aspee\n",
      "Video Engine driver&#34;) in 5.0-rc1.\n",
      "\n",
      "Fixed status\n",
      "mainline: [c281355068bc258fd619c5aefd978595bede7bfe]\n",
      "\n",
      "CVE-2024-45009: mptcp: pm: only decrement add_addr_accepted for MPJ req\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024091104-CVE-2024-45009-24ea@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024091104-CVE-2024-45009-24ea@gregkh/</a>\n",
      "\n",
      "Introduced by commit d0876b2 (&#34;mptcp: add the incoming RM_ADDR\n",
      "support&#34;) in v5.10-rc1.\n",
      "Fixed in v6.11-rc5.\n",
      "Bug introduced commit is not backported to older stable kernels.\n",
      "\n",
      "Fixed status\n",
      "mainline: [1c1f721375989579e46741f59523e39ec9b2a9bd]\n",
      "stable/6.1: [85b866e4c4e63a1d7afb58f1e24273caad03d0b7]\n",
      "stable/6.6: [d20bf2c96d7ffd171299b32f562f70e5bf5dc608]\n",
      "\n",
      "cve_id: CVE-2024-43912, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-42123, mainline_commitId: 506c245f3f1cd989cb89811a7f06e04ff8813a0d, stable_commitId: 5ceb40cdee721e13cbe15a0515cacf984e11236b, title: drm/amdgpu: fix double free err_addr pointer warnings, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pMBYkD3R3zDqMTfQEX6Qj9Nz3=1TRbiEe+KefEmu=N4g@mail.gmail.com/, all_match_text: CVE-2024-42123: drm/amdgpu: fix double free err_addr pointer warnings\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024073025-CVE-2024-42123-056d@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024073025-CVE-2024-42123-056d@gregkh/</a>\n",
      "\n",
      "There is no mention of the commit that introduced the bug in the CVE\n",
      "announcement.Fixed in v6.10-rc1.\n",
      "It looks as if this bug was introduced by commit 87d2b92f1 (&#34;drm/amdgpu:\n",
      "save umc error records&#34;) in 5.5-rc1.\n",
      "\n",
      "Fixed status\n",
      "mainline: [506c245f3f1cd989cb89811a7f06e04ff8813a0d]\n",
      "\n",
      "CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024073025-CVE-2024-42124-e4ad@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024073025-CVE-2024-42124-e4ad@gregkh/</a>\n",
      "\n",
      "There is no mention of the commit that introduced the bug in the CVE\n",
      "announcement.Fixed in v6.10-rc1.\n",
      "It looks as if this bug was introduced by commit 61d8658b (&#34;scsi: qedf: Add\n",
      "QLogic FastLinQ offload FCoE driver framework.&#34;) in 4.11-rc1.\n",
      "\n",
      "Fixed status\n",
      "mainline: [0d8b637c9c5eeaa1a4e3dfb336f3ff918eb64fec]\n",
      "stable/5.10: [5ceb40cdee721e13cbe15a0515cacf984e11236b]\n",
      "stable/5.15: [0a8a91932b2772e75bf3f6d133ca4225d1d3e920]\n",
      "stable/5.4: [4f314aadeed8cdf42c8cf30769425b5e44702748]\n",
      "stable/6.1: [fa49c65a1cec6a3901ef884fdb24d98068b63493]\n",
      "stable/6.6: [b6ded5316ec56e973dcf5f9997945aad01a9f062]\n",
      "\n",
      "cve_id: CVE-2024-43895, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-44968, mainline_commitId: 541a900d245536d4809cb1aa322c3fcc2cdb58a6, stable_commitId: 668c6c4a7e9e9f081c06b70f30104fb7013437ed, title: tick/broadcast: Move per CPU pointer access into the, fixes_commitId: Introduced by commit f7d43dd (&#34;tick/broadcast: Make takeover of broadcast hrtimer reliable&#34;) in v6.11-rc1., cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/, all_match_text: CVE-2024-44968: tick/broadcast: Move per CPU pointer access into the\n",
      "atomic section\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024090456-CVE-2024-44968-3e4f@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024090456-CVE-2024-44968-3e4f@gregkh/</a>\n",
      "\n",
      "Introduced by commit f7d43dd (&#34;tick/broadcast: Make takeover of\n",
      "broadcast hrtimer reliable&#34;) in v6.11-rc1.\n",
      "Fixed in v5.15.165.\n",
      "Bug introduced commit was backported to following branches.\n",
      "cip/4.19 cip/6.1 stable/4.19 stable/5.10 stable/5.15 stable/5.4\n",
      "stable/6.1 stable/6.10 stable/6.6\n",
      "\n",
      "Fixed status\n",
      "mainline: [541a900d245536d4809cb1aa322c3fcc2cdb58a6]\n",
      "stable/4.19: [f54abf332a2bc0413cfa8bd6a8511f7aa99faea0]\n",
      "stable/5.10: [668c6c4a7e9e9f081c06b70f30104fb7013437ed]\n",
      "stable/6.1: [f54abf332a2bc0413cfa8bd6a8511f7aa99faea0]\n",
      "stable/6.6: [f91fb47ecacc178a83a77eeebd25cbaec18c01d6]\n",
      "\n",
      "cve_id: CVE-2024-44950, mainline_commitId: 7d3b793faaab1305994ce568b59d61927235f57b, stable_commitId: f098e8fc7227166206256c18d56ab622039108b1, title: serial: sc16is7xx: fix invalid FIFO access with, fixes_commitId: Introduced by commit dfeae61 (&#34;serial: sc16is7xx&#34;) in v3.16-rc1. Fixed in v6.11-rc3., cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/, all_match_text: CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with\n",
      "special register set\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024090410-CVE-2024-44950-67fb@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024090410-CVE-2024-44950-67fb@gregkh/</a>\n",
      "\n",
      "Introduced by commit dfeae61 (&#34;serial: sc16is7xx&#34;) in v3.16-rc1.\n",
      "Fixed in v6.11-rc3.\n",
      "Bug introduced commit is not backported to older stable kernels.\n",
      "\n",
      "Fixed status\n",
      "mainline: [7d3b793faaab1305994ce568b59d61927235f57b]\n",
      "\n",
      "CVE-2024-44951: serial: sc16is7xx: fix TX fifo corruption\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024090411-CVE-2024-44951-9121@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024090411-CVE-2024-44951-9121@gregkh/</a>\n",
      "\n",
      "Introduced by commit 4409df5 (&#34;serial: sc16is7xx: change EFR lock to\n",
      "operate on each channels&#34;) in v6.8-rc1.\n",
      "Fixed in v6.11-rc3.\n",
      "Bug introduced commit was backported to following branches.\n",
      "cip/6.1 cip/6.1-rt stable/6.1 stable/6.6\n",
      "\n",
      "Fixed status\n",
      "mainline: [133f4c00b8b2bfcacead9b81e7e8edfceb4b06c4]\n",
      "\n",
      "CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024090411-CVE-2024-44952-6290@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024090411-CVE-2024-44952-6290@gregkh/</a>\n",
      "\n",
      "Introduced by commit c0a4009 (&#34;drivers: core: synchronize\n",
      "really_probe() and dev_uevent()&#34;) in v6.10-rc4.\n",
      "Fixed in v6.11-rc3.\n",
      "Bug introduced commit was backported to following branches.\n",
      "cip/4.19 cip/4.19-rt cip/4.4 cip/4.4-st cip/5.10 cip/5.10-rt cip/6.1\n",
      "cip/6.1-rt stable/4.19 stable/5.10 stable/5.15 stable/5.4 stable/6.1\n",
      "stable/6.6\n",
      "\n",
      "Fixed status\n",
      "mainline: [15fffc6a5624b13b428bb1c6e9088e32a55eb82c]\n",
      "stable/4.19: [49ea4e0d862632d51667da5e7a9c88a560e9c5a1]\n",
      "stable/5.10: [f098e8fc7227166206256c18d56ab622039108b1]\n",
      "stable/5.15: [9c23fc327d6ec67629b4ad323bd64d3834c0417d]\n",
      "stable/5.4: [dd98c9630b7ee273da87e9a244f94ddf947161e2]\n",
      "stable/6.1: [4a7c2a8387524942171037e70b80e969c3b5c05b]\n",
      "stable/6.6: [4d035c743c3e391728a6f81cbf0f7f9ca700cf62]\n",
      "\n",
      "cve_id: CVE-2022-48931, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-43913, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-44947, mainline_commitId: 3c0da3d163eb32f1f91891efaade027fa9b245b9, stable_commitId: 4690e2171f651e2b415e3941ce17f2f7b813aff6, title: fuse: Initialize beyond-EOF page contents before, fixes_commitId: Introduced by commit a1d75f2 (&#34;fuse: add store request&#34;) in v2.6.36-rc1. Fixed in v6.11-rc4., cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/, all_match_text: CVE-2024-44947: fuse: Initialize beyond-EOF page contents before\n",
      "setting uptodate\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024090219-CVE-2024-44947-f49c@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024090219-CVE-2024-44947-f49c@gregkh/</a>\n",
      "\n",
      "Introduced by commit a1d75f2 (&#34;fuse: add store request&#34;) in v2.6.36-rc1.\n",
      "Fixed in v6.11-rc4.\n",
      "Bug introduced commit is not backported to older stable kernels.\n",
      "\n",
      "Fixed status\n",
      "mainline: [3c0da3d163eb32f1f91891efaade027fa9b245b9]\n",
      "stable/4.19: [49934861514d36d0995be8e81bb3312a499d8d9a]\n",
      "stable/5.10: [4690e2171f651e2b415e3941ce17f2f7b813aff6]\n",
      "stable/5.15: [8c78303eafbf85a728dd84d1750e89240c677dd9]\n",
      "stable/5.4: [33168db352c7b56ae18aa55c2cae1a1c5905d30e]\n",
      "stable/6.1: [831433527773e665bdb635ab5783d0b95d1246f4]\n",
      "stable/6.6: [ac42e0f0eb66af966015ee33fd355bc6f5d80cd6]\n",
      "\n",
      "cve_id: CVE-2024-45008, mainline_commitId: 99d3bf5f7377d42f8be60a6b9cb60fb0be34dceb, stable_commitId: 05dd9aabd04f9b5eb04dab9bb83d8c3e982d7549, title: Input: MT - limit max slots, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/, all_match_text: CVE-2024-45008: Input: MT - limit max slots\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024090452-CVE-2024-45008-1d89@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024090452-CVE-2024-45008-1d89@gregkh/</a>\n",
      "\n",
      "There is no mention of the commit that introduced the bug in the CVE\n",
      "announcement.Fixed in v6.11-rc2.\n",
      "\n",
      "Fixed status\n",
      "mainline: [99d3bf5f7377d42f8be60a6b9cb60fb0be34dceb]\n",
      "stable/4.19: [2829c80614890624456337e47320289112785f3e]\n",
      "stable/5.10: [05dd9aabd04f9b5eb04dab9bb83d8c3e982d7549]\n",
      "stable/5.15: [95f73d01f547dfc67fda3022c51e377a0454b505]\n",
      "stable/5.4: [87f610a1a7fbdb1f2e3d90b54c955bd3b8a0c322]\n",
      "stable/6.1: [94736334b8a25e4fae8daa6934e54a31f099be43]\n",
      "stable/6.6: [8f04edd554d191834e9e1349ef030318ea6b11ba]\n",
      "\n",
      "cve_id: CVE-2024-45016, mainline_commitId: c07ff8592d57ed258afee5a5e04991a48dbaf382, stable_commitId: c414000da1c2ea1ba9a5e5bb1a4ba774e51e202d, title: netem: fix return value if duplicate enqueue fails, fixes_commitId: Introduced by commit 5845f70 (&#34;net: netem: fix skb length BUG_ON in __skb_to_sgvec&#34;) in v5.0., cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/, all_match_text: CVE-2024-45016: netem: fix return value if duplicate enqueue fails\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024091108-CVE-2024-45016-fd5a@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024091108-CVE-2024-45016-fd5a@gregkh/</a>\n",
      "\n",
      "Introduced by commit 5845f70 (&#34;net: netem: fix skb length BUG_ON in\n",
      "__skb_to_sgvec&#34;) in v5.0.\n",
      "Fixed in v6.11-rc5.\n",
      "Bug introduced commit was backported to following branches.\n",
      "cip/4.19 cip/4.19-rt stable/4.19\n",
      "\n",
      "Fixed status\n",
      "mainline: [c07ff8592d57ed258afee5a5e04991a48dbaf382]\n",
      "stable/5.10: [c414000da1c2ea1ba9a5e5bb1a4ba774e51e202d]\n",
      "stable/5.15: [52d99a69f3d556c6426048c9d481b912205919d8]\n",
      "stable/5.4: [759e3e8c4a6a6b4e52ebc4547123a457f0ce90d4]\n",
      "stable/6.1: [0486d31dd8198e22b63a4730244b38fffce6d469]\n",
      "stable/6.6: [577d6c0619467fe90f7e8e57e45cb5bd9d936014]\n",
      "\n",
      "cve_id: CVE-2024-44940, mainline_commitId: None, stable_commitId: None, title: fou: remove warn in gue_gro_receive on unsupported protocol, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/, all_match_text: CVE-2024-44940: fou: remove warn in gue_gro_receive on unsupported protocol\n",
      "\n",
      "stable/6.1 was fixed.\n",
      "\n",
      "Fixed status\n",
      "stable/6.1: [5a2e37bc648a2503bf6d687aed27b9f4455d82eb]\n",
      "stable/6.10: [440ab7f97261bc28501636a13998e1b1946d2e79]\n",
      "stable/6.6: [3db4395332e7050ef9ddeb3052e6b5019f2a2a59]\n",
      "\n",
      "cve_id: CVE-2024-46674, mainline_commitId: ddfcfeba891064b88bb844208b43bef2ef970f0c, stable_commitId: 6aee4c5635d81f4809c3b9f0c198a65adfbb2ada, title: usb: dwc3: st: fix probed platform device ref count on, fixes_commitId: Introduced by commit f83fca0 (&#34;usb: dwc3: add ST dwc3 glue layer to manage dwc3 HC&#34;) in v3.18-rc1., cve_url: https://lore.kernel.org/all/CAODzB9rm1=zQVazcf2R5KeOq4QVxGRr6ozVoE+QW1v3WOSKZ=A@mail.gmail.com/, all_match_text: CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on\n",
      "probe error path\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024091335-CVE-2024-46674-93ed@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024091335-CVE-2024-46674-93ed@gregkh/</a>\n",
      "\n",
      "Introduced by commit f83fca0 (&#34;usb: dwc3: add ST dwc3 glue layer to\n",
      "manage dwc3 HC&#34;) in v3.18-rc1.\n",
      "Fixed in v6.11-rc6.\n",
      "Bug introduced commit is not backported to older stable kernels.\n",
      "\n",
      "Fixed status\n",
      "mainline: [ddfcfeba891064b88bb844208b43bef2ef970f0c]\n",
      "stable/4.19: [b0979a885b9d4df2a25b88e9d444ccaa5f9f495c]\n",
      "stable/5.10: [6aee4c5635d81f4809c3b9f0c198a65adfbb2ada]\n",
      "stable/5.15: [060f41243ad7f6f5249fa7290dda0c01f723d12d]\n",
      "stable/5.4: [f3498650df0805c75b4e1c94d07423c46cbf4ce1]\n",
      "stable/6.1: [4c6735299540f3c82a5033d35be76a5c42e0fb18]\n",
      "stable/6.6: [e1e5e8ea2731150d5ba7c707f9e02fafebcfeb49]\n",
      "\n",
      "cve_id: CVE-2022-48893, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-43909, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2022-48826, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2022-48906, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2022-48923, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-43894, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-43886, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-44960, mainline_commitId: 973a57891608a98e894db2887f278777f564de18, stable_commitId: 7cc9ebcfe58be22f18056ad8bc6272d120bdcb3e, title: usb: gadget: core: Check for unset descriptor, fixes_commitId: Introduced by commit 54f83b8 (&#34;USB: gadget: Reject endpoints with 0 maxpacket value&#34;) in v5.4-rc6., cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/, all_match_text: CVE-2024-44960: usb: gadget: core: Check for unset descriptor\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024090413-CVE-2024-44960-039b@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024090413-CVE-2024-44960-039b@gregkh/</a>\n",
      "\n",
      "Introduced by commit 54f83b8 (&#34;USB: gadget: Reject endpoints with 0\n",
      "maxpacket value&#34;) in v5.4-rc6.\n",
      "Fixed in v6.11-rc3.\n",
      "Bug introduced commit was backported to following branches.\n",
      "cip/4.19 cip/4.19-rt cip/4.4 cip/4.4-rt cip/4.4-st stable/4.19\n",
      "\n",
      "Fixed status\n",
      "mainline: [973a57891608a98e894db2887f278777f564de18]\n",
      "stable/4.19: [ba15815dd24cc5ec0d23e2170dc58c7db1e03b4a]\n",
      "stable/5.10: [7cc9ebcfe58be22f18056ad8bc6272d120bdcb3e]\n",
      "stable/5.15: [50c5248b0ea8aae0529fdf28dac42a41312d3b62]\n",
      "stable/5.4: [df8e734ae5e605348aa0ca2498aedb73e815f244]\n",
      "stable/6.1: [a0362cd6e503278add954123957fd47990e8d9bf]\n",
      "stable/6.6: [1a9df57d57452b104c46c918569143cf21d7ebf1]\n",
      "\n",
      "cve_id: CVE-2024-42253, mainline_commitId: bfc6444b57dc7186b6acc964705d7516cbaf3904, stable_commitId: None, title: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9r0+B=YgU2Wp4oEiiLzFa2oAVPKdD=dOqDQ8Kd=UgaMzA@mail.gmail.com/, all_match_text: CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024080835-CVE-2024-42253-0c21@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024080835-CVE-2024-42253-0c21@gregkh/</a>\n",
      "\n",
      "There is no mention of the commit that introduced the bug in the CVE\n",
      "announcement.Fixed in v6.10-rc6.\n",
      "\n",
      "Fixed status\n",
      "mainline: [bfc6444b57dc7186b6acc964705d7516cbaf3904]\n",
      "stable/6.1: [58a5c93bd1a6e949267400080f07e57ffe05ec34]\n",
      "stable/6.6: [e2ecdddca80dd845df42376e4b0197fe97018ba2]\n",
      "\n",
      "cve_id: CVE-2022-48902, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2022-48910, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-45026, mainline_commitId: 7db4042336580dfd75cb5faa82c12cd51098c90b, stable_commitId: e245a18281c252c8dbc467492e09bb5d4b012118, title: s390/dasd: fix error recovery leading to data, fixes_commitId: Introduced by commit 5e2b17e (&#34;s390/dasd: Add dynamic formatting support for ESE volumes&#34;) in v5.3-rc1., cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/, all_match_text: CVE-2024-45026: s390/dasd: fix error recovery leading to data\n",
      "corruption on ESE devices\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024091110-CVE-2024-45026-eaa8@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024091110-CVE-2024-45026-eaa8@gregkh/</a>\n",
      "\n",
      "Introduced by commit 5e2b17e (&#34;s390/dasd: Add dynamic formatting\n",
      "support for ESE volumes&#34;) in v5.3-rc1.\n",
      "Fixed in v6.11-rc4.\n",
      "Bug introduced commit is not backported to older stable kernels.\n",
      "\n",
      "Fixed status\n",
      "mainline: [7db4042336580dfd75cb5faa82c12cd51098c90b]\n",
      "stable/5.10: [e245a18281c252c8dbc467492e09bb5d4b012118]\n",
      "stable/5.15: [a665e3b7ac7d5cdc26e00e3d0fc8fd490e00316a]\n",
      "stable/5.4: [19f60a55b2fda49bc4f6134a5f6356ef62ee69d8]\n",
      "stable/6.1: [0a228896a1b3654cd461ff654f6a64e97a9c3246]\n",
      "stable/6.6: [93a7e2856951680cd7fe6ebd705ac10c8a8a5efd]\n",
      "\n",
      "cve_id: CVE-2024-46673, mainline_commitId: 919ddf8336f0b84c0453bac583808c9f165a85c2, stable_commitId: 9e96dea7eff6f2bbcd0b42a098012fc66af9eb69, title: scsi: aacraid: Fix double-free on probe failure, fixes_commitId: Introduced by commit 8e0c5eb (&#34;[SCSI] aacraid: Newer adapter communication iterface support&#34;) in v2.6.20.16., cve_url: https://lore.kernel.org/all/CAODzB9rm1=zQVazcf2R5KeOq4QVxGRr6ozVoE+QW1v3WOSKZ=A@mail.gmail.com/, all_match_text: CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024091333-CVE-2024-46673-c49c@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024091333-CVE-2024-46673-c49c@gregkh/</a>\n",
      "\n",
      "Introduced by commit 8e0c5eb (&#34;[SCSI] aacraid: Newer adapter\n",
      "communication iterface support&#34;) in v2.6.20.16.\n",
      "Fixed in v6.11-rc6.\n",
      "Bug introduced commit is not backported to older stable kernels.\n",
      "\n",
      "Fixed status\n",
      "mainline: [919ddf8336f0b84c0453bac583808c9f165a85c2]\n",
      "stable/4.19: [d237c7d06ffddcdb5d36948c527dc01284388218]\n",
      "stable/5.10: [9e96dea7eff6f2bbcd0b42a098012fc66af9eb69]\n",
      "stable/5.15: [85449b28ff6a89c4513115e43ddcad949b5890c9]\n",
      "stable/5.4: [564e1986b00c5f05d75342f8407f75f0a17b94df]\n",
      "stable/6.1: [60962c3d8e18e5d8dfa16df788974dd7f35bd87a]\n",
      "stable/6.6: [8a3995a3ffeca280a961b59f5c99843d81b15929]\n",
      "\n",
      "cve_id: CVE-2024-44939, mainline_commitId: None, stable_commitId: None, title: jfs: fix null ptr deref in dtInsertEntry, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9r8adug8TRWcOzF2oXSj0BCJTRNTCiDqiYSs1j0bePuvg@mail.gmail.com/, all_match_text: CVE-2024-44939: jfs: fix null ptr deref in dtInsertEntry\n",
      "\n",
      "stable/6.1 was fixed.\n",
      "\n",
      "Fixed status\n",
      "stable/6.1: [53023ab11836ac56fd75f7a71ec1356e50920fa9]\n",
      "stable/6.10: [9c2ac38530d1a3ee558834dfa16c85a40fd0e702]\n",
      "stable/6.6: [6ea10dbb1e6c58384136e9adfd75f81951e423f6]\n",
      "\n",
      "cve_id: CVE-2024-1151, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-45015, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-41076, mainline_commitId: aad11473f8f4be3df86461081ce35ec5b145ba68, stable_commitId: None, title: NFSv4: Fix memory leak in nfs4_set_security_label, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pMBYkD3R3zDqMTfQEX6Qj9Nz3=1TRbiEe+KefEmu=N4g@mail.gmail.com/, all_match_text: CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41076-6124@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024072910-CVE-2024-41076-6124@gregkh/</a>\n",
      "\n",
      "There is no mention of the commit that introduced the bug in the CVE\n",
      "announcement.Fixed in v6.10-rc4.\n",
      "\n",
      "Fixed status\n",
      "mainline: [aad11473f8f4be3df86461081ce35ec5b145ba68]\n",
      "stable/6.1: [899604a7c958771840941caff9ee3dd8193d984c]\n",
      "stable/6.6: [b98090699319e64f5de1e8db5bb75870f1eb1c6e]\n",
      "\n",
      "cve_id: CVE-2024-44952, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2023-52915, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2022-48900, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-41066, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-46700, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2023-45896, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-44988, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2022-48920, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-44957, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-25741, mainline_commitId: e587a7633dfee8987a999cf253f7c52a8e09276c, stable_commitId: 2798fc1560716c7945587ad43bef8f31f78c00af, title: usb/f_printer: WARNING in usb_ep_queue, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9pf203qrSQ5VpDTiG=U0DUa7gC1NJmJAog0y7U=TcuFjA@mail.gmail.com/, all_match_text: CVE-2024-25741: usb/f_printer: WARNING in usb_ep_queue\n",
      "\n",
      "stable 5.10, 5.15, 6.1, 6.6, 6.9, and mainline were fixed.\n",
      "\n",
      "Fixed status\n",
      "mainline: [e587a7633dfee8987a999cf253f7c52a8e09276c]\n",
      "stable/5.10: [2798fc1560716c7945587ad43bef8f31f78c00af]\n",
      "stable/5.15: [aa14dca6392ace6b182d15103c40571e66edfb96]\n",
      "stable/6.1: [e9835f39a88e20092a8c5f068c8a34f98af9dc32]\n",
      "stable/6.6: [a96915ffc956d8953c0f54180c6eed7e8c68fdc9]\n",
      "stable/6.9: [01378f3fd7c704c92fbdb87337f1972311779354]\n",
      "\n",
      "cve_id: CVE-2024-42287, mainline_commitId: 4475afa2646d3fec176fc4d011d3879b26cb26e3, stable_commitId: 57ba7563712227647f82a92547e82c96cd350553, title: scsi: qla2xxx: Complete command early within lock, fixes_commitId: Introduced by commit 0367076 (&#34;scsi: qla2xxx: Perform lockless command completion in abort path&#34;) in v6.3-rc4., cve_url: https://lore.kernel.org/all/CAODzB9pV6wf1Pdm3jYcNbjopB-3HzYfRkDLLMyHzLtH0Hcd3RQ@mail.gmail.com/, all_match_text: CVE-2024-42287: scsi: qla2xxx: Complete command early within lock\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024081744-CVE-2024-42287-d635@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024081744-CVE-2024-42287-d635@gregkh/</a>\n",
      "\n",
      "Introduced by commit 0367076 (&#34;scsi: qla2xxx: Perform lockless command\n",
      "completion in abort path&#34;) in v6.3-rc4.\n",
      "Fixed in v6.11-rc1.\n",
      "Bug introduced commit was backported to following branches.\n",
      "cip/5.10 cip/5.10-rt cip/6.1 cip/6.1-rt stable/5.10 stable/5.15\n",
      "stable/5.4 stable/6.1\n",
      "\n",
      "Fixed status\n",
      "mainline: [4475afa2646d3fec176fc4d011d3879b26cb26e3]\n",
      "stable/5.10: [57ba7563712227647f82a92547e82c96cd350553]\n",
      "stable/5.15: [9117337b04d789bd08fdd9854a40bec2815cd3f6]\n",
      "stable/5.4: [af46649304b0c9cede4ccfc2be2561ce8ed6a2ea]\n",
      "stable/6.1: [814f4a53cc86f7ea8b501bfb1723f24fd29ef5ee]\n",
      "stable/6.6: [314efe3f87949a568f512f05df20bf47b81cf232]\n",
      "\n",
      "cve_id: CVE-2024-45025, mainline_commitId: 9a2fa1472083580b6c66bdaf291f591e1170123a, stable_commitId: fe5bf14881701119aeeda7cf685f3c226c7380df, title: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHAR, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/, all_match_text: CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024091109-CVE-2024-45025-94f6@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024091109-CVE-2024-45025-94f6@gregkh/</a>\n",
      "\n",
      "There is no mention of the commit that introduced the bug in the CVE\n",
      "announcement.Fixed in v6.11-rc4.\n",
      "iIt seems as if 4.4 may be affected. It requires backporting\n",
      "bitmap_copy_and_extend() as 4.19 does\n",
      "\n",
      "Fixed status\n",
      "mainline: [9a2fa1472083580b6c66bdaf291f591e1170123a]\n",
      "stable/4.19: [ee501f827f3db02d4e599afbbc1a7f8b792d05d7]\n",
      "stable/5.10: [fe5bf14881701119aeeda7cf685f3c226c7380df]\n",
      "stable/5.15: [5053581fe5dfb09b58c65dd8462bf5dea71f41ff]\n",
      "stable/5.4: [e807487a1d5fd5d941f26578ae826ca815dbfcd6]\n",
      "stable/6.1: [8cad3b2b3ab81ca55f37405ffd1315bcc2948058]\n",
      "stable/6.6: [dd72ae8b0fce9c0bbe9582b9b50820f0407f8d8a]\n",
      "\n",
      "cve_id: CVE-2024-38600, mainline_commitId: 87988a534d8e12f2e6fc01fe63e6c1925dc5307c, stable_commitId: None, title: ALSA: Fix deadlocks with kctl removals at disconnection, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9qccTi6qBXT3gzRzxozhpk86SfisvN6yz1f5bwATyHK4g@mail.gmail.com/, all_match_text: CVE-2024-38600: ALSA: Fix deadlocks with kctl removals at disconnection\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024061957-CVE-2024-38600-aa7e@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024061957-CVE-2024-38600-aa7e@gregkh/</a>\n",
      "\n",
      "There is no mention of the commit that introduced the bug in the CVE\n",
      "announcement.Fixed in v6.10-rc1.\n",
      "\n",
      "Fixed status\n",
      "mainline: [87988a534d8e12f2e6fc01fe63e6c1925dc5307c]\n",
      "stable/5.15: [ff80185e7b7b547a0911fcfc8aefc61c3e8304d7]\n",
      "stable/6.1: [c2fb439f4f1425a961d20bec818fed2c2d9ef70a]\n",
      "stable/6.6: [2f103287ef7960854808930499d1181bd0145d68]\n",
      "\n",
      "cve_id: CVE-2024-43903, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n",
      "cve_id: CVE-2024-46800, mainline_commitId: 3b3a2a9c6349e25a025d2330f479bc33a6ccb54a, stable_commitId: 98c75d76187944296068d685dfd8a1e9fd8c4fdc, title: sch/netem: fix use after free in netem_dequeue, fixes_commitId: Introduced by commit 5061253 (&#34;netem: fix classful handling&#34;) in v3.3-rc1. Fixed in v6.11-rc7., cve_url: https://lore.kernel.org/all/CAODzB9rm1=zQVazcf2R5KeOq4QVxGRr6ozVoE+QW1v3WOSKZ=A@mail.gmail.com/, all_match_text: CVE-2024-46800: sch/netem: fix use after free in netem_dequeue\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024091857-CVE-2024-46800-0f62@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024091857-CVE-2024-46800-0f62@gregkh/</a>\n",
      "\n",
      "Introduced by commit 5061253 (&#34;netem: fix classful handling&#34;) in v3.3-rc1.\n",
      "Fixed in v6.11-rc7.\n",
      "Bug introduced commit is not backported to older stable kernels.\n",
      "\n",
      "Fixed status\n",
      "mainline: [3b3a2a9c6349e25a025d2330f479bc33a6ccb54a]\n",
      "stable/4.19: [f0bddb4de043399f16d1969dad5ee5b984a64e7b]\n",
      "stable/5.10: [98c75d76187944296068d685dfd8a1e9fd8c4fdc]\n",
      "stable/5.15: [14f91ab8d391f249b845916820a56f42cf747241]\n",
      "stable/5.4: [295ad5afd9efc5f67b86c64fce28fb94e26dc4c9]\n",
      "stable/6.1: [db2c235682913a63054e741fe4e19645fdf2d68e]\n",
      "stable/6.6: [dde33a9d0b80aae0c69594d1f462515d7ff1cb3d]\n",
      "\n",
      "cve_id: CVE-2024-45021, mainline_commitId: 046667c4d3196938e992fba0dfcde570aa85cd0e, stable_commitId: ad149f5585345e383baa65f1539d816cd715fd3b, title: memcg_write_event_control(): fix a user-triggerable oops, fixes_commitId: Introduced by commit 0dea116 (&#34;cgroup: implement eventfd-based generic API for notifications&#34;) in v2.6.34-rc2., cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/, all_match_text: CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops\n",
      "\n",
      "Announce: <a\n",
      "href=\"https://lore.kernel.org/linux-cve-announce/2024091109-CVE-2024-45021-68c4@gregkh/\">https://lore.kernel.org/linux-cve-announce/2024091109-CVE-2024-45021-68c4@gregkh/</a>\n",
      "\n",
      "Introduced by commit 0dea116 (&#34;cgroup: implement eventfd-based generic\n",
      "API for notifications&#34;) in v2.6.34-rc2.\n",
      "Fixed in v6.11-rc4.\n",
      "Bug introduced commit is not backported to older stable kernels.\n",
      "\n",
      "Fixed status\n",
      "mainline: [046667c4d3196938e992fba0dfcde570aa85cd0e]\n",
      "stable/4.19: [fa5bfdf6cb5846a00e712d630a43e3cf55ccb411]\n",
      "stable/5.10: [ad149f5585345e383baa65f1539d816cd715fd3b]\n",
      "stable/5.15: [0fbe2a72e853a1052abe9bc2b7df8ddb102da227]\n",
      "stable/5.4: [1b37ec85ad95b612307627758c6018cd9d92cca8]\n",
      "stable/6.1: [43768fa80fd192558737e24ed6548f74554611d7]\n",
      "stable/6.6: [f1aa7c509aa766080db7ab3aec2e31b1df09e57c]\n",
      "\n",
      "cve_id: CVE-2024-44954, mainline_commitId: None, stable_commitId: e7e7d2b180d8f297cea6db43ea72402fd33e1a29, title: ALSA: line6: Fix racy access to midibuf, fixes_commitId: None, cve_url: https://lore.kernel.org/all/CAODzB9rTsq9Mdisjr_+mtkkYxqBSXoddNzqY5Jj_a3msZgx3=A@mail.gmail.com/, all_match_text: CVE-2024-44954: ALSA: line6: Fix racy access to midibuf\n",
      "\n",
      "cip/4.4, cip/4.4-st were fixed.\n",
      "\n",
      "Fixed status\n",
      "cip/4.4: [1ac1b3829b4de84fed73b581b68d3d101c91b267]\n",
      "cip/4.4-st: [1ac1b3829b4de84fed73b581b68d3d101c91b267]\n",
      "stable/4.19: [643293b68fbb6c03f5e907736498da17d43f0d81]\n",
      "stable/5.10: [e7e7d2b180d8f297cea6db43ea72402fd33e1a29]\n",
      "stable/5.15: [a54da4b787dcac60b598da69c9c0072812b8282d]\n",
      "stable/5.4: [40f3d5cb0e0cbf7fa697913a27d5d361373bdcf5]\n",
      "stable/6.1: [c80f454a805443c274394b1db0d1ebf477abd94e]\n",
      "stable/6.10: [51d87f11dd199bbc6a85982b088ff27bde53b48a]\n",
      "stable/6.6: [535df7f896a568a8a1564114eaea49d002cb1747]\n",
      "\n",
      "cve_id: CVE-2022-48945, mainline_commitId: None, stable_commitId: None, title: None, fixes_commitId: None, cve_url: None, all_match_text: None\n"
     ]
    }
   ],
   "source": [
    "import sys\n",
    "sys.path.append('..')\n",
    "import service.CVEService as cve_service\n",
    "import service.CIService as ci_service\n",
    "import service.CommitService as commit_service\n",
    "ciInfoList = ci_service.getCIInfoList('2024/09/24', '2024/10/14')\n",
    "cve_id_list = []\n",
    "for ciInfo in ciInfoList:\n",
    "    cve_id_list.append(ciInfo.cve_id)\n",
    "\n",
    "\n",
    "# 是乱序的，需要修改\n",
    "cve_list = cve_service.get_cve_list(cve_id_list=cve_id_list)\n",
    "# # print \n",
    "for cve in cve_list:\n",
    "    if cve is not None:\n",
    "        print(cve)\n",
    "# ret = commit_service.getCommitIdFromCVE('CVE-2022-48900')\n",
    "# print(ret)\n",
    "# cve_service._get_cve('CVE-2024-44952')"
   ]
  },
  {
   "cell_type": "code",
   "execution_count": 23,
   "metadata": {},
   "outputs": [
    {
     "name": "stdout",
     "output_type": "stream",
     "text": [
      "9b9ba386d7bfdbc38445932c90fa9444c0524bea\n",
      "8bbb9e4e0e66a39282e582d0440724055404b38c\n",
      "b72da4d89b97da71e056cc4d1429b2bc426a9c2f\n",
      "52b138f1021113e593ee6ad258ce08fe90693a9e\n",
      "03880af02a78bc9a98b5a581f529cf709c88a9b8\n",
      "8ca21e7a27c66b95a4b215edc8e45e5d66679f9f\n",
      "e5ceff2196dc633c995afb080f6f44a72cff6e1d\n",
      "\n",
      "7cc9ebcfe58be22f18056ad8bc6272d120bdcb3e\n",
      "\n",
      "f098e8fc7227166206256c18d56ab622039108b1\n",
      "fe5bf14881701119aeeda7cf685f3c226c7380df\n",
      "98c75d76187944296068d685dfd8a1e9fd8c4fdc\n",
      "ad149f5585345e383baa65f1539d816cd715fd3b\n",
      "081105213ff6f661c114781d469233c7d0e09c2e\n",
      "2e201b3d162c6c49417c438ffb30b58c9f85769f\n",
      "a3e52a4c22c846858a6875e1c280030a3849e148\n",
      "be9d08ff102df3ac4f66e826ea935cf3af63a4bd\n",
      "09c1583f0e10c918855d6e7540a79461a353e5d6\n",
      "\n",
      "66fc1600855c05c4ba4e997184c91cf298e0405c\n",
      "648d5490460d38436640da0812bf7f6351c150d2\n"
     ]
    }
   ],
   "source": [
    "import sys\n",
    "sys.path.append('..')\n",
    "import service.CommitService as commit_service\n",
    "cve_id_list = []\n",
    "cve_id_str = \"\"\"CVE-2024-45028\n",
    "CVE-2024-46677\n",
    "CVE-2024-46675\n",
    "CVE-2024-43893\n",
    "CVE-2024-45003\n",
    "CVE-2024-46798\n",
    "CVE-2024-45018\n",
    "CVE-2024-43894\n",
    "CVE-2024-44960\n",
    "CVE-2022-48910\n",
    "CVE-2024-44952\n",
    "CVE-2024-45025\n",
    "CVE-2024-46800\n",
    "CVE-2024-45021\n",
    "CVE-2023-52898\n",
    "CVE-2024-43879\n",
    "CVE-2024-44969\n",
    "CVE-2024-43834\n",
    "CVE-2024-43830\n",
    "CVE-2022-48921\n",
    "CVE-2023-52901\n",
    "CVE-2024-42292\"\"\"\n",
    "cve_id_list = cve_id_str.strip().split('\\n')\n",
    "for cve_id in cve_id_list:\n",
    "    ret = commit_service.getCommitIdFromCVE(cve_id)\n",
    "    if ret is None:\n",
    "        print(\"\")\n",
    "        continue\n",
    "    print(ret['stable/5.10'])"
   ]
  }
 ],
 "metadata": {
  "kernelspec": {
   "display_name": "base",
   "language": "python",
   "name": "python3"
  },
  "language_info": {
   "codemirror_mode": {
    "name": "ipython",
    "version": 3
   },
   "file_extension": ".py",
   "mimetype": "text/x-python",
   "name": "python",
   "nbconvert_exporter": "python",
   "pygments_lexer": "ipython3",
   "version": "3.8.0"
  }
 },
 "nbformat": 4,
 "nbformat_minor": 2
}
