diff --git a/data/cve/CVE-2025-37746.json b/data/cve/CVE-2025-37746.json index cb1f9d49601d9bff486cdb62070e0c3905d93032..10f29c5061eda028df3c0c87955ebbc5c2ea43c8 100644 --- a/data/cve/CVE-2025-37746.json +++ b/data/cve/CVE-2025-37746.json @@ -30,6 +30,10 @@ { "rpm_name": "kernel:5.10", "rpm_status": "investigation" + }, + { + "rpm_name": "kernel:4.18", + "rpm_status": "unaffected" } ] } @@ -49,6 +53,7 @@ ], "affected_packages": [ "kernel:6.6", + "kernel:4.18", "kernel:5.10", "kernel:4.19" ], @@ -60,12 +65,12 @@ "abstract": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/dwc_pcie: fix duplicate pci_dev devices\n\nDuring platform_device_register, wrongly using struct device\npci_dev as platform_data caused a kmemdup copy of pci_dev. Worse\nstill, accessing the duplicated device leads to list corruption as its\nmutex content (e.g., list, magic) remains the same as the original.", "description": null, "issue": null, - "acknowledgements": null, - "acknowledgements_en": null, + "acknowledgements": "", + "acknowledgements_en": "", "reference": null, "diagnose": null, "statement": null, "mitigation": null, - "update_user": null, + "update_user": "cve-center", "errata": [] } \ No newline at end of file