File tree Expand file tree Collapse file tree 9 files changed +210
-0
lines changed
Expand file tree Collapse file tree 9 files changed +210
-0
lines changed Original file line number Diff line number Diff line change 1+ [advisory ]
2+ id = " BRSA-1pmwbq0axn1v"
3+ title = " kernel CVE-2024-43870"
4+ cve = " CVE-2024-43870"
5+ severity = " moderate"
6+ description = " In the Linux kernel, the following vulnerability has been resolved: perf: Fix event leak upon exit"
7+
8+ [[advisory .products ]]
9+ package-name = " kernel-6.1"
10+ patched-version = " kernel-6.1.106-116.188.amzn2023"
11+ patched-release = " 0"
12+ patched-epoch = " 0"
13+
14+ [[advisory .products ]]
15+ package-name = " kernel-5.15"
16+ patched-version = " kernel-5.15.165-110.161.amzn2"
17+ patched-release = " 0"
18+ patched-epoch = " 0"
19+
20+ [updateinfo ]
21+ author = " vyaghras"
22+ issue-date = 2024-09-05T19:08:38Z
23+ arches = [" x86_64" , " aarch64" ]
24+ version = " 2.4.0"
Original file line number Diff line number Diff line change 1+ [advisory ]
2+ id = " BRSA-2yike4lvuqs8"
3+ title = " kernel CVE-2024-43873"
4+ cve = " CVE-2024-43873"
5+ severity = " moderate"
6+ description = " In the Linux kernel, the following vulnerability has been resolved: vhost/vsock: always initialize seqpacket_allow"
7+
8+ [[advisory .products ]]
9+ package-name = " kernel-6.1"
10+ patched-version = " kernel-6.1.106-116.188.amzn2023"
11+ patched-release = " 0"
12+ patched-epoch = " 0"
13+
14+ [[advisory .products ]]
15+ package-name = " kernel-5.15"
16+ patched-version = " kernel-5.15.165-110.161.amzn2"
17+ patched-release = " 0"
18+ patched-epoch = " 0"
19+
20+ [updateinfo ]
21+ author = " vyaghras"
22+ issue-date = 2024-09-05T19:08:38Z
23+ arches = [" x86_64" , " aarch64" ]
24+ version = " 2.4.0"
Original file line number Diff line number Diff line change 1+ [advisory ]
2+ id = " BRSA-ccd9v5jgy17j"
3+ title = " kernel CVE-2024-27397"
4+ cve = " CVE-2024-27397"
5+ severity = " moderate"
6+ description = " In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout"
7+
8+ [[advisory .products ]]
9+ package-name = " kernel-5.10"
10+ patched-version = " kernel-5.10.224-212.876.amzn2"
11+ patched-release = " 0"
12+ patched-epoch = " 0"
13+
14+ [[advisory .products ]]
15+ package-name = " kernel-5.15"
16+ patched-version = " kernel-5.15.165-110.161.amzn2"
17+ patched-release = " 0"
18+ patched-epoch = " 0"
19+
20+ [updateinfo ]
21+ author = " vyaghras"
22+ issue-date = 2024-09-05T19:08:38Z
23+ arches = [" x86_64" , " aarch64" ]
24+ version = " 2.4.0"
Original file line number Diff line number Diff line change 1+ [advisory ]
2+ id = " BRSA-cxorjjnipihb"
3+ title = " kernel CVE-2024-42259"
4+ cve = " CVE-2024-42259"
5+ severity = " moderate"
6+ description = " In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Fix Virtual Memory mapping boundaries calculation"
7+
8+ [[advisory .products ]]
9+ package-name = " kernel-5.10"
10+ patched-version = " kernel-5.10.224-212.876.amzn2"
11+ patched-release = " 0"
12+ patched-epoch = " 0"
13+
14+ [[advisory .products ]]
15+ package-name = " kernel-6.1"
16+ patched-version = " kernel-6.1.106-116.188.amzn2023"
17+ patched-release = " 0"
18+ patched-epoch = " 0"
19+
20+ [[advisory .products ]]
21+ package-name = " kernel-5.15"
22+ patched-version = " kernel-5.15.165-110.161.amzn2"
23+ patched-release = " 0"
24+ patched-epoch = " 0"
25+
26+ [updateinfo ]
27+ author = " vyaghras"
28+ issue-date = 2024-09-05T19:08:38Z
29+ arches = [" x86_64" , " aarch64" ]
30+ version = " 2.4.0"
Original file line number Diff line number Diff line change 1+ [advisory ]
2+ id = " BRSA-ewhkjl8vteg4"
3+ title = " kernel CVE-2024-43880"
4+ cve = " CVE-2024-43880"
5+ severity = " moderate"
6+ description = " In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_erp: Fix object nesting warning"
7+
8+ [[advisory .products ]]
9+ package-name = " kernel-5.10"
10+ patched-version = " kernel-5.10.224-212.876.amzn2"
11+ patched-release = " 0"
12+ patched-epoch = " 0"
13+
14+ [updateinfo ]
15+ author = " vyaghras"
16+ issue-date = 2024-09-05T19:08:38Z
17+ arches = [" x86_64" , " aarch64" ]
18+ version = " 2.4.0"
Original file line number Diff line number Diff line change 1+ [advisory ]
2+ id = " BRSA-i8umxk92lrqy"
3+ title = " kernel CVE-2024-42258"
4+ cve = " CVE-2024-42258"
5+ severity = " moderate"
6+ description = " In the Linux kernel, the following vulnerability has been resolved: mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines"
7+
8+ [[advisory .products ]]
9+ package-name = " kernel-6.1"
10+ patched-version = " kernel-6.1.106-116.188.amzn2023"
11+ patched-release = " 0"
12+ patched-epoch = " 0"
13+
14+ [updateinfo ]
15+ author = " vyaghras"
16+ issue-date = 2024-09-05T19:08:38Z
17+ arches = [" x86_64" , " aarch64" ]
18+ version = " 2.4.0"
Original file line number Diff line number Diff line change 1+ [advisory ]
2+ id = " BRSA-kkuswt3ic8ey"
3+ title = " kernel CVE-2024-26585"
4+ cve = " CVE-2024-26585"
5+ severity = " moderate"
6+ description = " In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close."
7+
8+ [[advisory .products ]]
9+ package-name = " kernel-5.15"
10+ patched-version = " kernel-5.15.165-110.161.amzn2"
11+ patched-release = " 0"
12+ patched-epoch = " 0"
13+
14+ [updateinfo ]
15+ author = " vyaghras"
16+ issue-date = 2024-09-05T19:08:38Z
17+ arches = [" x86_64" , " aarch64" ]
18+ version = " 2.4.0"
Original file line number Diff line number Diff line change 1+ [advisory ]
2+ id = " BRSA-lidw5b35uk8v"
3+ title = " kernel CVE-2024-43869"
4+ cve = " CVE-2024-43869"
5+ severity = " moderate"
6+ description = " In the Linux kernel, the following vulnerability has been resolved: perf: Fix event leak upon exec and file release"
7+
8+ [[advisory .products ]]
9+ package-name = " kernel-6.1"
10+ patched-version = " kernel-6.1.106-116.188.amzn2023"
11+ patched-release = " 0"
12+ patched-epoch = " 0"
13+
14+ [[advisory .products ]]
15+ package-name = " kernel-5.15"
16+ patched-version = " kernel-5.15.165-110.161.amzn2"
17+ patched-release = " 0"
18+ patched-epoch = " 0"
19+
20+ [updateinfo ]
21+ author = " vyaghras"
22+ issue-date = 2024-09-05T19:08:38Z
23+ arches = [" x86_64" , " aarch64" ]
24+ version = " 2.4.0"
Original file line number Diff line number Diff line change 1+ [advisory ]
2+ id = " BRSA-lifldjpfhpde"
3+ title = " kernel CVE-2024-43871"
4+ cve = " CVE-2024-43871"
5+ severity = " moderate"
6+ description = " In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu()"
7+
8+ [[advisory .products ]]
9+ package-name = " kernel-5.10"
10+ patched-version = " kernel-5.10.224-212.876.amzn2"
11+ patched-release = " 0"
12+ patched-epoch = " 0"
13+
14+ [[advisory .products ]]
15+ package-name = " kernel-6.1"
16+ patched-version = " kernel-6.1.106-116.188.amzn2023"
17+ patched-release = " 0"
18+ patched-epoch = " 0"
19+
20+ [[advisory .products ]]
21+ package-name = " kernel-5.15"
22+ patched-version = " kernel-5.15.165-110.161.amzn2"
23+ patched-release = " 0"
24+ patched-epoch = " 0"
25+
26+ [updateinfo ]
27+ author = " vyaghras"
28+ issue-date = 2024-09-05T19:08:38Z
29+ arches = [" x86_64" , " aarch64" ]
30+ version = " 2.4.0"
You can’t perform that action at this time.
0 commit comments