Address several kernel and hyperv-daemons cves (#9475)
This commit is contained in:
Родитель
378e43627f
Коммит
9f567535d8
|
@ -0,0 +1,3 @@
|
|||
CVE-2019-10638 - in version 6.6.X
|
||||
upstream: df453700e8d81b1bdafdf684365ee2b9431fb702
|
||||
stable: df453700e8d81b1bdafdf684365ee2b9431fb702
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2019-19076 - in version 6.6.X
|
||||
upstream: 1d1997db870f4058676439ef7014390ba9e24eb2
|
||||
stable: 1d1997db870f4058676439ef7014390ba9e24eb2
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2019-25160 - in version 6.6.X
|
||||
upstream: 5578de4834fe0f2a34fedc7374be691443396d1f
|
||||
stable: 5578de4834fe0f2a34fedc7374be691443396d1f
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2021-45480 - in version 6.6.X
|
||||
upstream: 5f9562ebe710c307adc5f666bf1a2162ee7977c0
|
||||
stable: 5f9562ebe710c307adc5f666bf1a2162ee7977c0
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2023-31084 - in version 6.6.X
|
||||
upstream: b8c75e4a1b325ea0a9433fa8834be97b5836b946
|
||||
stable: b8c75e4a1b325ea0a9433fa8834be97b5836b946
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2023-3338 - in version 6.6.X
|
||||
upstream: 1202cdd665315c525b5237e96e0bedc76d7e754f
|
||||
stables: 1202cdd665315c525b5237e96e0bedc76d7e754f
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-26602 - in version 6.6.18.1
|
||||
upstream: 944d5fe50f3f03daacfea16300e656a1691c4a23
|
||||
stable: b6a2a9cbb67545c825ec95f06adb7ff300a2ad71
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-35848 - in version 6.6.31.1
|
||||
upstream: f42c97027fb75776e2e9358d16bf4a99aeb04cf2
|
||||
stable: 2af84c46b9b8f2d6c0f88d09ee5c849ae1734676
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-35849 - in version 6.6.31.1
|
||||
upstream: 2f7ef5bb4a2f3e481ef05fab946edb97c84f67cf
|
||||
stable: 3a63cee1a5e14a3e52c19142c61dd5fcb524f6dc
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-35852 - in version 6.6.30.1
|
||||
upstream: fb4e2b70a7194b209fc7320bbf33b375f7114bd5
|
||||
stable: de1aaefa75be9d0ec19c9a3e0e2f9696de20c6ab
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-35853 - in version 6.6.31.1
|
||||
upstream: 8ca3f7a7b61393804c46f170743c3b839df13977
|
||||
stable: 0ae8ff7b6d42e33943af462910bdcfa2ec0cb8cf
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-35854 - in version 6.6.31.1
|
||||
upstream: 54225988889931467a9b55fdbef534079b665519
|
||||
stable: 311eeaa7b9e26aba5b3d57b09859f07d8e9fc049
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-35857 - in version 6.6.31.1
|
||||
upstream: c58e88d49097bd12dfcfef4f075b43f5d5830941
|
||||
stable: d68dc711d84fdcf698e5d45308c3ddeede586350
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-36008 - in version 6.6.30.1
|
||||
upstream: 58a4c9b1e5a3e53c9148e80b90e1e43897ce77d1
|
||||
stable: 8240c7308c941db4d9a0a91b54eca843c616a655
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-36009 - in version 6.6.31.1
|
||||
upstream: 467324bcfe1a31ec65d0cf4aa59421d6b7a7d52b
|
||||
stable: 4fee8fa86a15d7790268eea458b1aec69c695530
|
|
@ -0,0 +1,4 @@
|
|||
CVE-1999-0656 impacts a daemon called rpc.ugidd. This daemon is not provided by Azure Linux
|
||||
Azure Linux is therefore not impacted.
|
||||
|
||||
See https://exchange.xforce.ibmcloud.com/vulnerabilities/348
|
|
@ -0,0 +1,7 @@
|
|||
This nopatch clears CVE-2007-4998. The CVE is misrepresentd on NIST as impacting the kernel. It actually impacts coreutils and
|
||||
busybox, but neither of those packages are impacted by this CVE either.
|
||||
|
||||
Exploit instructions are to run the cp utility with certain arguments, see https://bugzilla.redhat.com/show_bug.cgi?id=356471 for details
|
||||
|
||||
The result on Azure Linux is that cp reports warnings and the exploit is not effective.
|
||||
This is not reproducible on Azure Linux
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2010-0298 - already patched in linux-msft-5.4.72 stable kernel
|
||||
Upstream commit: 1871c6020d7308afb99127bba51f04548e7ca84e
|
||||
Stable commit: 1871c6020d7308afb99127bba51f04548e7ca84e
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2010-0309 - already patched in 5.15.2.1 stable kernel
|
||||
Upstream: ee73f656a604d5aa9df86a97102e4e462dd79924
|
||||
Stable: ee73f656a604d5aa9df86a97102e4e462dd79924
|
|
@ -0,0 +1,6 @@
|
|||
CVE-2010-4563 - multiple security assesments (Ubuntu, SUSE, RHEL, Azure Linux) have determined this is a nonissue.
|
||||
Therefore, won't fix
|
||||
|
||||
https://ubuntu.com/security/CVE-2010-4563
|
||||
https://bugzilla.suse.com/show_bug.cgi?id=745296
|
||||
https://access.redhat.com/security/cve/cve-2010-4563
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2019-3819 - already patched in 5.15.18.1 stable kernel
|
||||
Upstream: 13054abbaa4f1fd4e6f3b4b63439ec033b4c8035
|
||||
Stable: 13054abbaa4f1fd4e6f3b4b63439ec033b4c8035
|
|
@ -0,0 +1,6 @@
|
|||
CVE-2019-3887 - already patched in 5.15.2.1 stable kernel
|
||||
Upstream: acff78477b9b4f26ecdf65733a4ed77fe837e9dc
|
||||
Stable: acff78477b9b4f26ecdf65733a4ed77fe837e9dc
|
||||
|
||||
Upstream: c73f4c998e1fd4249b9edfa39e23f4fda2b9b041
|
||||
Stable: c73f4c998e1fd4249b9edfa39e23f4fda2b9b041
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2020-25672 - already patched in 5.15.18.1 stable kernel
|
||||
Upstream: d7737d4257459ca8921ff911c88937be1a11ea9d
|
||||
Stable: d7737d4257459ca8921ff911c88937be1a11ea9d
|
|
@ -0,0 +1 @@
|
|||
CVE-2021-20194 - Mitigated by CONFIG_BPF_UNPRIV_DEFAULT_OFF=y
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2021-3564 - already patched in 6.6.X stable kernel
|
||||
Upstream: bcd0f93353326954817a4f9fa55ec57fb38acbb0
|
||||
Stable: bcd0f93353326954817a4f9fa55ec57fb38acbb0
|
|
@ -0,0 +1,2 @@
|
|||
CVE-2021-3669 - Fix already present in 6.6.X LTS kernel:
|
||||
Commit: 20401d1058f3f841f35a594ac2fc1293710e55b9
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2022-2785 - in version 6.6.X
|
||||
Upstream: 86f44fcec22ce2979507742bc53db8400e454f46
|
||||
Stable: 86f44fcec22ce2979507742bc53db8400e454f46
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2022-38096 - in 6.6.X
|
||||
upstream: 517621b7060096e48e42f545fa6646fc00252eac
|
||||
stable: ff41e0d4f3fa10d7cdd7d40f8026bea9fcc8b000
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2023-46838 - patched in version 6.6.X
|
||||
upstream commit ID c7ec4f2d684e17d69bbdd7c4324db0ef5daac26a
|
||||
stable commit ID 78376d4415602d97773f20b49f4aa5fc8666f7a9
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2023-6200 - fixed in 6.6.9.1
|
||||
Upstream: dade3f6a1e4e35a5ae916d5e78b3229ec34c78ec
|
||||
Stable: b577b9aa1340ee7f36441b0740691550abaad5f2
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2023-6531 - patched in 6.6.X
|
||||
Upstream: 705318a99a138c29a512a72c3e0043b3cd7f55f4
|
||||
Stable: 5a33d385eb36991a91e3dddb189d8679e2aac2be
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2023-6931 - patched in 6.6.X
|
||||
Upstream: 382c27f4ed28f803b1f1473ac2d8db0afc795a1b
|
||||
Stable: cfe9295db0932f1b8e0d94ffc75521898e5a5a8a
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-0565 - fixed in 6.6.X
|
||||
upstream: eec04ea119691e65227a97ce53c0da6b9b74b0b7
|
||||
stable: 534733397da26de0303057ce0b93a22bda150365
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-0646 - patched in 6.6.X
|
||||
Upstream: c5a595000e2677e865a39f249c056bc05d6e55fd
|
||||
Stable: eb30a025982f61910f32e99778db3c0ceceaff5c
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-21803 - fixed in 6.6.X
|
||||
upstream: 2e07e8348ea454615e268222ae3fc240421be768
|
||||
stable: 1d576c3a5af850bf11fbd103f9ba11aa6d6061fb
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-23307 - in version 6.6.24.1
|
||||
upstream: dfd2bf436709b2bccb78c2dda550dde93700efa7
|
||||
stable: 8ec4a68a25a231e2303716a0aba8ff1413d47c87
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-23849 - patched in version 6.6.X
|
||||
upstream commit ID 13e788deb7348cc88df34bed736c3b3b9927ea52
|
||||
stable commit ID 7a73190ea557e7f26914b0fe04c1f57a96cb771f
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-23850 - patched in version 6.6.X
|
||||
upstream commit ID e03ee2fe873eb68c1f9ba5112fee70303ebf9dfb
|
||||
stable commit ID 833775656d447c545133a744a0ed1e189ce61430
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-23851 - patched in version 5.15.149.1
|
||||
upstream commit ID bd504bcfec41a503b32054da5472904b404341a4
|
||||
stable commit ID 438d19492b7f002334573bae43276297eb234c80
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-24857 - in version 6.6.26.1
|
||||
upstream: 7835fcfd132eb88b87e8eb901f88436f63ab60f7
|
||||
stable: d75632d0db3cdc31873d25756066a7f56bc87737
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-24858 - in version 6.6.26.1
|
||||
upstream: 7835fcfd132eb88b87e8eb901f88436f63ab60f7
|
||||
stable: d75632d0db3cdc31873d25756066a7f56bc87737
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-24859 - in version 6.6.26.1 (note that this CVE is not mentioned in the description but is fixed by this patch)
|
||||
upstream: 7835fcfd132eb88b87e8eb901f88436f63ab60f7
|
||||
stable: d75632d0db3cdc31873d25756066a7f56bc87737
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-24860 - in version 6.6.14.1
|
||||
upstream: da9065caa594d19b26e1a030fd0cc27bd365d685
|
||||
stable: f56e715ef1c19c42c6aa6cb9280947dea13aab2e
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-24861 - in version 6.6.24.1
|
||||
upstream: da9065caa594d19b26e1a030fd0cc27bd365d685
|
||||
stable: f56e715ef1c19c42c6aa6cb9280947dea13aab2e
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-25739 - in version 6.6.X
|
||||
upstream: 68a24aba7c593eafa8fd00f2f76407b9b32b47a9
|
||||
stable: d1b505c988b711673d6a2de35222028be081d0d1
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-26900 - in version 6.6.31
|
||||
upstream: 6cf350658736681b9d6b0b6e58c5c76b235bb4c4
|
||||
stable: 9fd0198f7ef06ae0d6636fb0578560857dead995
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-26913 - introducing commit not in 6.6.32.1
|
||||
upstream introducing commit: 7966f319c66d9468623c6a6a017ecbc0dd79be75
|
||||
upstream fix commit: faf51b201bc42adf500945732abb6220c707d6f3
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-26949 - introducing commit not present in 6.6.32.1
|
||||
upstream introducing commit: 7968e9748fbbd7ae49770d9f8a8231d8bce2aebb
|
||||
upstream fix commit: 08ae9ef829b8055c2fdc8cfee37510c1f4721a07
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-26952 - in version 6.6.32.1
|
||||
upstream: c6cd2e8d2d9aa7ee35b1fa6a668e32a22a9753da
|
||||
stable: 39bdc4197acf2ed13269167ccf093ee28cfa2a4e
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-27022 - in version 6.6.30.1
|
||||
upstream: 35e351780fa9d8240dd6f7e4f245f9ea37e96c19
|
||||
stable: cec11fa2eb512ebe3a459c185f4aca1d44059bbf
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-35984 - in version 6.6.30
|
||||
upstream: 91811a31b68d3765b3065f4bb6d7d6d84a7cfc9f
|
||||
stable: e3425674ff68dc521c57c6eabad0cbd20a027d85
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-35990 - in version 6.6.30
|
||||
upstream: 244296cc3a155199a8b080d19e645d7d49081a38
|
||||
stable: 8e3c94767cad5150198e4337c8b91f3bb068e14b
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-35992 - in version 6.6.30.1
|
||||
upstream: e4308bc22b9d46cf33165c9dfaeebcf29cd56f04
|
||||
stable: 610f175d2e16fb2436ba7974b990563002c20d07
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-35997 - in version 6.6.30
|
||||
upstream: 9c0f59e47a90c54d0153f8ddc0f80d7a36207d0e
|
||||
stable: 29e94f295bad5be59cf4271a93e22cdcf5536722
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-36008 - in version 6.6.30
|
||||
upstream: 58a4c9b1e5a3e53c9148e80b90e1e43897ce77d1
|
||||
stable: 8240c7308c941db4d9a0a91b54eca843c616a655
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-36891 - in version 6.6.31.1
|
||||
upstream: 955a923d2809803980ff574270f81510112be9cf
|
||||
stable: 6c9c7c1e63b198a8b979ad963eb21410f10ccb00
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-36893 - in version 6.6.31.1
|
||||
upstream: ae11f04b452b5205536e1c02d31f8045eba249dd
|
||||
stable: 789326cafbd1f67f424436b6bc8bdb887a364637
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-36897 - in version 6.6.31.1
|
||||
upstream: 9a35d205f466501dcfe5625ca313d944d0ac2d60
|
||||
stable: 7e3030774431eb093165a31baff040d35446fb8b
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-36901 - in version 6.6.31.1
|
||||
upstream: 4db783d68b9b39a411a96096c10828ff5dfada7a
|
||||
stable: e31b25cc2066d3f2b6c38579253882008d4469b0
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-36902 - in version 6.6.31.1
|
||||
upstream: d101291b2681e5ab938554e3e323f7a7ee33e3aa
|
||||
stable: 8745a8d74ba17dafe72b6ab461fa6c007d879747
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-36925 - in version 6.6.31.1
|
||||
upstream: 75961ffb5cb3e5196f19cae7683f35cc88b50800
|
||||
stable: f2a6b3ed20f2dea4cb645abc6a73c4595662adca
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-36926 - in version 6.6.31.1
|
||||
upstream: 49a940dbdc3107fecd5e6d3063dc07128177e058
|
||||
stable: 802b13b79ab1fef66c6852fc745cf197dca0cb15
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-36930 - in version 6.6.31.1
|
||||
upstream: 4756fa529b2f12b7cb8f21fe229b0f6f47190829
|
||||
stable: a30659f1576d2c8e62e7426232bb18b885fd951a
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-36938 - in version 6.6.31.1
|
||||
upstream: 6648e613226e18897231ab5e42ffc29e63fa3365
|
||||
stable: b397a0ab8582c533ec0c6b732392f141fc364f87
|
|
@ -0,0 +1,3 @@
|
|||
CVE-2024-36971 - in version 6.6.34.1
|
||||
upstream: 92f1655aa2b2294d0b49925f3b875a634bd3b59e
|
||||
stable: 5af198c387128a9d2ddd620b0f0803564a4d4508
|
Загрузка…
Ссылка в новой задаче