From edbc432204a7c8a7f125592b69f21c671bdec945 Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Tue, 9 Apr 2024 08:50:04 +0200 Subject: Add CVE-2024-25742 and CVE-2024-25743 --- active/CVE-2024-25742 | 17 +++++++++++++++++ active/CVE-2024-25743 | 17 +++++++++++++++++ 2 files changed, 34 insertions(+) create mode 100644 active/CVE-2024-25742 create mode 100644 active/CVE-2024-25743 diff --git a/active/CVE-2024-25742 b/active/CVE-2024-25742 new file mode 100644 index 00000000..7f758c34 --- /dev/null +++ b/active/CVE-2024-25742 @@ -0,0 +1,17 @@ +Description: Instruction raise #VC exception at exit +References: + https://bugzilla.redhat.com/show_bug.cgi?id=2270836 + https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html + https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f + https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=f35e46631b28a63ca3887d7afef1a65a5544da52 +Notes: +Bugs: +upstream: released (6.7-rc5) [b82a8dbd3d2f4563156f7150c6f2ecab6e960b30, be5341eb0d43b1e754799498bd2e8756cc167a41, 55617fb991df535f953589586468612351575704, f4116bfc44621882556bbf70f5284fbf429a5cf6], released (6.9-rc1) [e3ef461af35a8c74f2f4ce6616491ddb355a208f] +6.6-upstream-stable: released (6.6.7) [34c686e5be2fa1c03ae09568159a9ef37d1c7cf5, 4591766ff6552339fbaa3d3c71814faef1988c2f, 22ca647c8f880f21881e9b2d38070dc61196a39d, 239bff0171a86e1bafd7da03631d74df1dfec6f1], needed +6.1-upstream-stable: released (6.1.68) [b8ec27ae221eee458b15b700706db311474ac619, d5f999317e83efc07b8a7d26f9556b1271a6d373, e09d243a518b5634201f88a5d894e8dc4d37215c, cde700ceb0eaad67792fb2c22f44bf8a08e548f5], needed +5.10-upstream-stable: +4.19-upstream-stable: +sid: released (6.6.8-1), needed +6.1-bookworm-security: released (6.1.69-1), needed +5.10-bullseye-security: +4.19-buster-security: diff --git a/active/CVE-2024-25743 b/active/CVE-2024-25743 new file mode 100644 index 00000000..7f758c34 --- /dev/null +++ b/active/CVE-2024-25743 @@ -0,0 +1,17 @@ +Description: Instruction raise #VC exception at exit +References: + https://bugzilla.redhat.com/show_bug.cgi?id=2270836 + https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html + https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f + https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=f35e46631b28a63ca3887d7afef1a65a5544da52 +Notes: +Bugs: +upstream: released (6.7-rc5) [b82a8dbd3d2f4563156f7150c6f2ecab6e960b30, be5341eb0d43b1e754799498bd2e8756cc167a41, 55617fb991df535f953589586468612351575704, f4116bfc44621882556bbf70f5284fbf429a5cf6], released (6.9-rc1) [e3ef461af35a8c74f2f4ce6616491ddb355a208f] +6.6-upstream-stable: released (6.6.7) [34c686e5be2fa1c03ae09568159a9ef37d1c7cf5, 4591766ff6552339fbaa3d3c71814faef1988c2f, 22ca647c8f880f21881e9b2d38070dc61196a39d, 239bff0171a86e1bafd7da03631d74df1dfec6f1], needed +6.1-upstream-stable: released (6.1.68) [b8ec27ae221eee458b15b700706db311474ac619, d5f999317e83efc07b8a7d26f9556b1271a6d373, e09d243a518b5634201f88a5d894e8dc4d37215c, cde700ceb0eaad67792fb2c22f44bf8a08e548f5], needed +5.10-upstream-stable: +4.19-upstream-stable: +sid: released (6.6.8-1), needed +6.1-bookworm-security: released (6.1.69-1), needed +5.10-bullseye-security: +4.19-buster-security: -- cgit v1.2.3