Skip to content

Commit 6add8b8

Browse files
authored
Merge pull request #139 from vyaghras/backfil_kernels_advisories
Kernel advisories for 2.4.0
2 parents 4a10f89 + 93f83b0 commit 6add8b8

9 files changed

+210
-0
lines changed
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
[advisory]
2+
id = "BRSA-1pmwbq0axn1v"
3+
title = "kernel CVE-2024-43870"
4+
cve = "CVE-2024-43870"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: perf: Fix event leak upon exit"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.1"
10+
patched-version = "kernel-6.1.106-116.188.amzn2023"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[[advisory.products]]
15+
package-name = "kernel-5.15"
16+
patched-version = "kernel-5.15.165-110.161.amzn2"
17+
patched-release = "0"
18+
patched-epoch = "0"
19+
20+
[updateinfo]
21+
author = "vyaghras"
22+
issue-date = 2024-09-05T19:08:38Z
23+
arches = ["x86_64", "aarch64"]
24+
version = "2.4.0"
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
[advisory]
2+
id = "BRSA-2yike4lvuqs8"
3+
title = "kernel CVE-2024-43873"
4+
cve = "CVE-2024-43873"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: vhost/vsock: always initialize seqpacket_allow"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.1"
10+
patched-version = "kernel-6.1.106-116.188.amzn2023"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[[advisory.products]]
15+
package-name = "kernel-5.15"
16+
patched-version = "kernel-5.15.165-110.161.amzn2"
17+
patched-release = "0"
18+
patched-epoch = "0"
19+
20+
[updateinfo]
21+
author = "vyaghras"
22+
issue-date = 2024-09-05T19:08:38Z
23+
arches = ["x86_64", "aarch64"]
24+
version = "2.4.0"
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
[advisory]
2+
id = "BRSA-ccd9v5jgy17j"
3+
title = "kernel CVE-2024-27397"
4+
cve = "CVE-2024-27397"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-5.10"
10+
patched-version = "kernel-5.10.224-212.876.amzn2"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[[advisory.products]]
15+
package-name = "kernel-5.15"
16+
patched-version = "kernel-5.15.165-110.161.amzn2"
17+
patched-release = "0"
18+
patched-epoch = "0"
19+
20+
[updateinfo]
21+
author = "vyaghras"
22+
issue-date = 2024-09-05T19:08:38Z
23+
arches = ["x86_64", "aarch64"]
24+
version = "2.4.0"
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
[advisory]
2+
id = "BRSA-cxorjjnipihb"
3+
title = "kernel CVE-2024-42259"
4+
cve = "CVE-2024-42259"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Fix Virtual Memory mapping boundaries calculation"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-5.10"
10+
patched-version = "kernel-5.10.224-212.876.amzn2"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[[advisory.products]]
15+
package-name = "kernel-6.1"
16+
patched-version = "kernel-6.1.106-116.188.amzn2023"
17+
patched-release = "0"
18+
patched-epoch = "0"
19+
20+
[[advisory.products]]
21+
package-name = "kernel-5.15"
22+
patched-version = "kernel-5.15.165-110.161.amzn2"
23+
patched-release = "0"
24+
patched-epoch = "0"
25+
26+
[updateinfo]
27+
author = "vyaghras"
28+
issue-date = 2024-09-05T19:08:38Z
29+
arches = ["x86_64", "aarch64"]
30+
version = "2.4.0"
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
[advisory]
2+
id = "BRSA-ewhkjl8vteg4"
3+
title = "kernel CVE-2024-43880"
4+
cve = "CVE-2024-43880"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_erp: Fix object nesting warning"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-5.10"
10+
patched-version = "kernel-5.10.224-212.876.amzn2"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[updateinfo]
15+
author = "vyaghras"
16+
issue-date = 2024-09-05T19:08:38Z
17+
arches = ["x86_64", "aarch64"]
18+
version = "2.4.0"
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
[advisory]
2+
id = "BRSA-i8umxk92lrqy"
3+
title = "kernel CVE-2024-42258"
4+
cve = "CVE-2024-42258"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.1"
10+
patched-version = "kernel-6.1.106-116.188.amzn2023"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[updateinfo]
15+
author = "vyaghras"
16+
issue-date = 2024-09-05T19:08:38Z
17+
arches = ["x86_64", "aarch64"]
18+
version = "2.4.0"
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
[advisory]
2+
id = "BRSA-kkuswt3ic8ey"
3+
title = "kernel CVE-2024-26585"
4+
cve = "CVE-2024-26585"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close."
7+
8+
[[advisory.products]]
9+
package-name = "kernel-5.15"
10+
patched-version = "kernel-5.15.165-110.161.amzn2"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[updateinfo]
15+
author = "vyaghras"
16+
issue-date = 2024-09-05T19:08:38Z
17+
arches = ["x86_64", "aarch64"]
18+
version = "2.4.0"
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
[advisory]
2+
id = "BRSA-lidw5b35uk8v"
3+
title = "kernel CVE-2024-43869"
4+
cve = "CVE-2024-43869"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: perf: Fix event leak upon exec and file release"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.1"
10+
patched-version = "kernel-6.1.106-116.188.amzn2023"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[[advisory.products]]
15+
package-name = "kernel-5.15"
16+
patched-version = "kernel-5.15.165-110.161.amzn2"
17+
patched-release = "0"
18+
patched-epoch = "0"
19+
20+
[updateinfo]
21+
author = "vyaghras"
22+
issue-date = 2024-09-05T19:08:38Z
23+
arches = ["x86_64", "aarch64"]
24+
version = "2.4.0"
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
[advisory]
2+
id = "BRSA-lifldjpfhpde"
3+
title = "kernel CVE-2024-43871"
4+
cve = "CVE-2024-43871"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu()"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-5.10"
10+
patched-version = "kernel-5.10.224-212.876.amzn2"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[[advisory.products]]
15+
package-name = "kernel-6.1"
16+
patched-version = "kernel-6.1.106-116.188.amzn2023"
17+
patched-release = "0"
18+
patched-epoch = "0"
19+
20+
[[advisory.products]]
21+
package-name = "kernel-5.15"
22+
patched-version = "kernel-5.15.165-110.161.amzn2"
23+
patched-release = "0"
24+
patched-epoch = "0"
25+
26+
[updateinfo]
27+
author = "vyaghras"
28+
issue-date = 2024-09-05T19:08:38Z
29+
arches = ["x86_64", "aarch64"]
30+
version = "2.4.0"

0 commit comments

Comments
 (0)