Skip to content

Commit 8400970

Browse files
authored
Merge pull request #198 from ginglis13/backfill-kernel-advisories
advisories: add BRSAs for core kit 2.6.0 and 2.7.0
2 parents e5cfeb2 + fc97d4c commit 8400970

13 files changed

+258
-0
lines changed
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
[advisory]
2+
id = "BRSA-1cqkuf5yftei"
3+
title = "kernel CVE-2024-44946"
4+
cve = "CVE-2024-44946"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: kcm: Serialise kcm_sendmsg() for the same socket."
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.1"
10+
patched-version = "kernel-6.1.109-118.189.amzn2023"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[updateinfo]
15+
author = "giinglis"
16+
issue-date = 2024-09-17T22:23:44Z
17+
arches = ["x86_64", "aarch64"]
18+
version = "2.6.0"
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
[advisory]
2+
id = "BRSA-8uhc2lthzlak"
3+
title = "kernel CVE-2024-44974"
4+
cve = "CVE-2024-44974"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: avoid possible UaF when selecting endp"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.1"
10+
patched-version = "kernel-6.1.109-118.189.amzn2023"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[updateinfo]
15+
author = "giinglis"
16+
issue-date = 2024-09-17T22:23:44Z
17+
arches = ["x86_64", "aarch64"]
18+
version = "2.6.0"
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
[advisory]
2+
id = "BRSA-acmimk6cg5ii"
3+
title = "kernel CVE-2024-41098"
4+
cve = "CVE-2024-41098"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: ata: libata-core: Fix null pointer dereference on error"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.1"
10+
patched-version = "kernel-6.1.109-118.189.amzn2023"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[updateinfo]
15+
author = "giinglis"
16+
issue-date = 2024-09-17T22:23:44Z
17+
arches = ["aarch64", "x86_64"]
18+
version = "2.6.0"
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
[advisory]
2+
id = "BRSA-cqwuhssclfvu"
3+
title = "kernel CVE-2024-46763"
4+
cve = "CVE-2024-46763"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: fou: Fix null-ptr-deref in GRO."
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.1"
10+
patched-version = "kernel-6.1.109-118.189.amzn2023"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[updateinfo]
15+
author = "giinglis"
16+
issue-date = 2024-09-17T22:23:44Z
17+
arches = ["aarch64", "x86_64"]
18+
version = "2.6.0"
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
[advisory]
2+
id = "BRSA-dufxuzcdkftf"
3+
title = "kernel CVE-2024-46707"
4+
cve = "CVE-2024-46707"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.1"
10+
patched-version = "kernel-6.1.109-118.189.amzn2023"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[updateinfo]
15+
author = "giinglis"
16+
issue-date = 2024-09-17T22:23:44Z
17+
arches = ["aarch64", "x86_64"]
18+
version = "2.6.0"
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
[advisory]
2+
id = "BRSA-icxrcaupotbs"
3+
title = "kernel CVE-2024-46689"
4+
cve = "CVE-2024-46689"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: soc: qcom: cmd-db: Map shared memory as WC, not WB"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.1"
10+
patched-version = "kernel-6.1.109-118.189.amzn2023"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[updateinfo]
15+
author = "giinglis"
16+
issue-date = 2024-09-17T22:23:44Z
17+
arches = ["x86_64", "aarch64"]
18+
version = "2.6.0"
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
[advisory]
2+
id = "BRSA-khn9m6isqcsk"
3+
title = "kernel CVE-2024-46711"
4+
cve = "CVE-2024-46711"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: fix ID 0 endp usage after multiple re-creations"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.1"
10+
patched-version = "kernel-6.1.109-118.189.amzn2023"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[updateinfo]
15+
author = "giinglis"
16+
issue-date = 2024-09-17T22:23:44Z
17+
arches = ["x86_64", "aarch64"]
18+
version = "2.6.0"
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
[advisory]
2+
id = "BRSA-r1rx21n1lllx"
3+
title = "kernel CVE-2024-46679"
4+
cve = "CVE-2024-46679"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: ethtool: check device is present when getting link settings"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.1"
10+
patched-version = "kernel-6.1.109-118.189.amzn2023"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[updateinfo]
15+
author = "giinglis"
16+
issue-date = 2024-09-17T22:23:44Z
17+
arches = ["aarch64", "x86_64"]
18+
version = "2.6.0"
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
[advisory]
2+
id = "BRSA-e1kreztluzpr"
3+
title = "kernel CVE-2024-46689"
4+
cve = "CVE-2024-46689"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: soc: qcom: cmd-db: Map shared memory as WC, not WB"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-5.10"
10+
patched-version = "kernel-5.10.225-213.878.amzn2"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[[advisory.products]]
15+
package-name = "kernel-5.15"
16+
patched-version = "kernel-5.15.166-111.163.amzn2"
17+
patched-release = "0"
18+
patched-epoch = "0"
19+
20+
[updateinfo]
21+
author = "giinglis"
22+
issue-date = 2024-09-20T01:39:55Z
23+
arches = ["aarch64", "x86_64"]
24+
version = "2.7.0"
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
[advisory]
2+
id = "BRSA-sweufcv6vbzw"
3+
title = "kernel CVE-2024-46763"
4+
cve = "CVE-2024-46763"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: fou: Fix null-ptr-deref in GRO."
7+
8+
[[advisory.products]]
9+
package-name = "kernel-5.10"
10+
patched-version = "kernel-5.10.225-213.878.amzn2"
11+
patched-release = "0"
12+
patched-epoch = "0"
13+
14+
[[advisory.products]]
15+
package-name = "kernel-5.15"
16+
patched-version = "kernel-5.15.166-111.163.amzn2"
17+
patched-release = "0"
18+
patched-epoch = "0"
19+
20+
[updateinfo]
21+
author = "giinglis"
22+
issue-date = 2024-09-20T01:39:55Z
23+
arches = ["x86_64", "aarch64"]
24+
version = "2.7.0"

0 commit comments

Comments
 (0)