From nobody Thu Feb 12 23:05:24 2026 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E2D6E3D96A for ; Thu, 2 Jan 2025 20:48:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=205.220.165.32 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1735850914; cv=none; b=oLurkhs9H+akMQwjcr169HR4JhTvP5qFwkwPUps27w5iQDiFqaJD/F5r1KDs9k9378evlElWJJjejWbnyUvT3GH4qGZ1eendxkX3NpI99AJ8ZNGcVn4Iu0bZ5ydKM2F8g0lu90/sjToY7gx1x1hTjlAujkkcSHsUuaKSLXSwUTQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1735850914; c=relaxed/simple; bh=FFWQhYoMXL0tSn+GQDGU/L3g5mt9sTTY2ERwhJj4M9Q=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=KeZPr3OAmN9CJPsbyGmx9C/jPJ6s8Wxc7ZQRIit59GVj+w/BMOD2Zz2LS3fkG02aoKTgQQpyWFXtNc1kzlnlNkedG3cJwgBZZazq0178XNIBVk7f3MwrDcthCCRxkVva9Xosz1bTYahh2HQ3buyPblIaJlNK2GSZrPMnaFugtD4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com; spf=pass smtp.mailfrom=oracle.com; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b=gxyIMvGL; arc=none smtp.client-ip=205.220.165.32 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oracle.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="gxyIMvGL" Received: from pps.filterd (m0333521.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 502KfuH4015268; Thu, 2 Jan 2025 20:48:30 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:date:from:message-id:mime-version :subject:to; s=corp-2023-11-20; bh=Pmww82fH3lGyOEcwUdXDt23LTfBVl 4eL4iN3Ib0/aV0=; b=gxyIMvGLayZULU+Ugs/nddhh1uPUtQHWCLRDAuCRnC5KP BkXmi/lIPtMbXF5LLS1nvMVOvzhlfT/A9K55BdsOEq2TlMdnMaHmO4uTQOZI5wWn ILXnsdC/eu1qGJpocILo7utThXZak8V+0L0Ey4WZIvC+GSK+AytnPuTO7yt+iG8U /F3g7VhitLu1VrdDmFq5q+YGiLQUqMWlDVql3p1TeemlIkUeQhIjLumAG4XQZMOW CGpfhNp/mzhixOaDuLrOPedaVhXORgJHWF6DOSEo/UdpOI/riJrf+VLUiP9MthrP /pdxpFOgwAWHJHMWAEewa92QMMhrcGT9cO1ke8Yqg== Received: from phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta01.appoci.oracle.com [138.1.114.2]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 43t88a78pw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 02 Jan 2025 20:48:29 +0000 (GMT) Received: from pps.filterd (phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 502J1PP8012978; Thu, 2 Jan 2025 20:48:29 GMT Received: from pps.reinject (localhost [127.0.0.1]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 43t7s915kw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 02 Jan 2025 20:48:29 +0000 Received: from phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by pps.reinject (8.17.1.5/8.17.1.5) with ESMTP id 502KmShL025075; Thu, 2 Jan 2025 20:48:28 GMT Received: from ca-dev112.us.oracle.com (ca-dev112.us.oracle.com [10.129.136.47]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTP id 43t7s915kr-1; Thu, 02 Jan 2025 20:48:28 +0000 From: Harshit Mogalapalli To: cve@kernel.org Cc: vegard.nossum@oracle.com, linux-kernel@vger.kernel.org, Harshit Mogalapalli Subject: [PATCH] CVE-2024-26929: Add vulnerable commit information Date: Thu, 2 Jan 2025 12:48:26 -0800 Message-ID: <20250102204826.4132786-1-harshit.m.mogalapalli@oracle.com> X-Mailer: git-send-email 2.46.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1057,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-01-02_03,2025-01-02_01,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 spamscore=0 bulkscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 suspectscore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2411120000 definitions=main-2501020181 X-Proofpoint-GUID: zKZ67D1el7XTP0DFRswiLwSOX7bWYSvM X-Proofpoint-ORIG-GUID: zKZ67D1el7XTP0DFRswiLwSOX7bWYSvM Content-Type: text/plain; charset="utf-8" This CVE fixes: 4895009c4bb7 ("scsi: qla2xxx: Prevent command send on chip reset") so add that information in vulnerable commit. Signed-off-by: Harshit Mogalapalli --- cve/published/2024/CVE-2024-26929.vulnerable | 1 + 1 file changed, 1 insertion(+) create mode 100644 cve/published/2024/CVE-2024-26929.vulnerable diff --git a/cve/published/2024/CVE-2024-26929.vulnerable b/cve/published/2= 024/CVE-2024-26929.vulnerable new file mode 100644 index 000000000000..b946d6f2786b --- /dev/null +++ b/cve/published/2024/CVE-2024-26929.vulnerable @@ -0,0 +1 @@ +4895009c4bb72f71f2e682f1e7d2c2d96e482087 --=20 2.46.0