- kernel-uek-4.14.35-2047.510.5.5.el7uek (oel7-uek5)
- 4.14.35-2047.543.3.1.el7uek
- 2025-07-23 22:30:54
- 2025-07-24 13:13:00
- K20250724_01
- CVE-2022-0492
- Description:
cgroup-v1: Require capabilities to set release_agent
- CVE: https://access.redhat.com/security/cve/CVE-2022-0492
- Patch: 4.14.35/CVE-2022-0492-cgroup-v1-Require-capabilities-to-set-release_agent.patch
- From: 4.14.35-2047.511.5.2
- CVE-2022-1016
- Description:
Initialize registers to avoid stack leak into userspace.
- CVE: https://access.redhat.com/security/cve/cve-2022-1016
- Patch: 4.14.0/CVE-2022-1016.patch
- From: 4.14.273-207.502
- CVE-2022-0847
- Description:
lib/iov_iter: initialize "flags" in new pipe_buffer
- CVE: https://access.redhat.com/security/cve/CVE-2022-0847
- Patch: 4.18.0/CVE-2022-0847-lib-iov_iter-initialize-flags-in-new-pipe_buffer.patch
- From: >kernel-4.18.0-348.12.2.el8_5
- CVE-2021-20317
- Description:
lib/timerqueue: Rely on rbtree semantics for next timer
- CVE: https://access.redhat.com/security/cve/CVE-2021-20317
- Patch: 4.18.0/CVE-2021-20317-lib-timerqueue-Rely-on-rbtree-semantics-for-next-timer.patch
- From: 4.18.0-348.2.1.el8_5
- CVE-2021-20317
- Description:
lib/timerqueue: Rely on rbtree semantics for next timer (adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2021-20317
- Patch: 4.18.0/CVE-2021-20317-lib-timerqueue-Rely-on-rbtree-semantics-for-next-timer-kpatch.patch
- From: 4.18.0-348.2.1.el8_5
- CVE-2021-4002
- Description:
hugetlbfs: flush TLBs correctly after huge_pmd_unshare
- CVE: https://access.redhat.com/security/cve/CVE-2021-4002
- Patch: 4.14.35/CVE-2021-4002-hugetlbfs-flush-TLBs-correctly-after-huge_pmd_unshare.patch
- From: 4.14.35-2047.512.6.el7uek
- CVE-2021-4149
- Description:
btrfs: unlock newly allocated extent buffer after error
- CVE: https://access.redhat.com/security/cve/CVE-2021-4149
- Patch: 4.19.0/CVE-2021-4149.patch
- From: 4.19.235-1
- CVE-2022-0330
- Description:
drm/i915: Flush TLBs before releasing backing store
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.14.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0330
- Description:
drm/i915: Flush TLBs before releasing backing store (kpatch adaptation)
- CVE: https://access.redhat.com/security/cve/CVE-2022-0330
- Patch: 4.14.0/CVE-2022-0330-drm-i915-Flush-TLBs-before-releasing-backing-store-kpatch-1.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-22942
- Description:
stale file descriptors on failed usercopy
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-22942
- Patch: 4.19.0/CVE-2022-22942.patch
- From: <kernel-4.19.208-1
- CVE-2022-24448
- Description:
NFSv4: Handle case where the lookup of a directory fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-24448
- Patch: 4.14.0/CVE-2022-24448-NFSv4-Handle-case-where-the-lookup-of-a-directory-fails.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0435
- Description:
tipc: improve size validations for received domain records
- CVE: https://access.redhat.com/security/cve/CVE-2022-0435
- Patch: 4.14.0/CVE-2022-0435-tipc-improve-size-validations-for-received-domain-records.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0617
- Description:
udf: Restore i_lenAlloc when inode expansion fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.14.0/CVE-2022-0617-udf-Restore-i_lenAlloc-when-inode-expansion-fails.patch
- From: 4.14.268-205.500.amzn2
- CVE-2022-0617
- Description:
udf: Fix NULL ptr deref when converting from inline format
- CVE: https://access.redhat.com/security/cve/CVE-2022-0617
- Patch: 4.14.0/CVE-2022-0617-udf-Fix-NULL-ptr-deref-when-converting-from-inline-format.patch
- From: 4.14.268-205.500.amzn2
- CVE-2020-36516
- Description:
ipv4: avoid using shared IP generator for connected sockets
- CVE: https://access.redhat.com/security/cve/CVE-2020-36516
- Patch: 4.1.12/CVE-2020-36516-ipv4-avoid-using-shared-IP-generator-for-connected-sockets.patch
- From: 4.1.12-124.61.2
- CVE-2022-26966
- Description:
sr9700: sanity check for packet length
- CVE: https://access.redhat.com/security/cve/CVE-2022-26966
- Patch: 4.1.12/CVE-2022-26966-sr9700-sanity-check-for-packet-length.patch
- From: 4.1.12-124.61.2
- CVE-2021-26401
- Description:
An introduction of required changes through KernelCare could cause unavoidable problems to applications which use unprivileged eBPF.
- CVE:
- Patch: skipped/CVE-2021-26401.patch
- From:
- CVE-2022-27666
- Description:
esp: Fix possible buffer overflow in ESP transformation
- CVE: https://access.redhat.com/security/cve/CVE-2022-27666
- Patch: 4.14.35/CVE-2022-27666-esp-Fix-possible-buffer-overflow-in-ESP-transformation.patch
- From: 4.14.35-2047.513.1
- CVE-2022-21499
- Description:
Not affected without certain conditions - Secure Boot, configured kgdb/kdb. Complex adaptation
- CVE:
- Patch: skipped/CVE-2022-21499.patch
- From:
- CVE-2022-0487
- Description:
memstick: rtsx_usb_ms: fix UAF
- CVE: https://access.redhat.com/security/cve/CVE-2022-0487
- Patch: 4.14.35/CVE-2022-0487-memstick-rtsx_usb_ms-fix-UAF.patch
- From: 4.14.35-2047.514.3.el7uek
- CVE-2022-23036 CVE-2022-23038
- Description:
xen/grant-table: add gnttab_try_end_foreign_access()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23036
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23036-CVE-2022-23038-xen-grant-table-add-gnttab_try_end_foreign_access.patch
- From: 4.15.0-177.186
- CVE-2022-23040
- Description:
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23040
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23040-xen-xenbus-dont-let-xenbus_grant_ring-remove-grants-in-error-case.patch
- From: 4.15.0-177.186
- CVE-2022-23038
- Description:
xen/scsifront: don't use gnttab_query_foreign_access() for mapped status
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23038
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23038-xen-scsifront-dont-use-gnttab_query_foreign_access-for-mapped-status.patch
- From: 4.15.0-177.186
- CVE-2022-23039
- Description:
xen/gntalloc: don't use gnttab_query_foreign_access()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23039
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23039-xen-gntalloc-dont-use-gnttab_query_foreign_access.patch
- From: 4.15.0-177.186
- CVE-2022-23041
- Description:
xen/9p: use alloc/free_pages_exact()
- CVE: https://people.canonical.com/~ubuntu-security/cve/2022/CVE-2022-23041
- Patch: ubuntu-bionic/4.15.0-177.186/CVE-2022-23041-xen-9p-use-alloc-free_pages_exact.patch
- From: 4.15.0-177.186
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent read/write and buffer changes
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 5.10.0/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-read-write-and-buffer-changes.patch
- From: 5.10.113-1
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent prealloc proc writes
- CVE: https://access.redhat.com/security/cve/CVE-2022-1048
- Patch: 4.14.35/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prealloc-proc-writes.patch
- From: 4.14.35-2047.514.3.el7uek
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent prepare and
- CVE: https://access.redhat.com/security/cve/CVE-2022-1048
- Patch: 4.14.35/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-prepare-and.patch
- From: 4.14.35-2047.514.3.el7uek
- CVE-2022-1048
- Description:
ALSA: pcm: Fix races among concurrent hw_params and hw_free
- CVE: https://access.redhat.com/security/cve/CVE-2022-1048
- Patch: 4.14.35/CVE-2022-1048-ALSA-pcm-Fix-races-among-concurrent-hw_params-and-hw_free.patch
- From: 4.14.35-2047.514.3.el7uek
- CVE-2022-1048
- Description:
N/A
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-1048
- Patch: 4.14.35/CVE-2022-1048-kpatch.patch
- From: N/A
- CVE-2022-21123 CVE-2022-21125 CVE-2022-21166 CVE-2022-21127
- Description:
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
- CVE: https://access.redhat.com/security/cve/cve-2022-21127
- Patch: mmio-enable.patch
- From: 5.18
- CVE-2022-1652
- Description:
floppy: use a statically allocated error counter
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: 4.14.0/CVE-2022-1652-floppy-use-a-statically-allocated-error-counter.patch
- From: 4.14.35-2047.515.0
- CVE-2022-1652
- Description:
floppy: use a statically allocated error counter (kpatch adaptation)
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-1652
- Patch: 4.14.0/CVE-2022-1652-floppy-use-a-statically-allocated-error-counter-kpatch.patch
- From: 4.14.35-2047.515.0
- CVE-2022-2588
- Description:
net_sched: cls_route: remove from list when handle is 0
- CVE: https://access.redhat.com/security/cve/CVE-2022-2588
- Patch: 5.4.17/CVE-2022-2588.patch
- From: kernel-uek-5.4.17-2136.309.5.1.el8uek
- CVE-2022-21385
- Description:
rds: copy_from_user only once per rds_sendmsg system call
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-21385
- Patch: 4.14.35/CVE-2022-21385-rds-copy_from_user-only-once-per-rds_sendmsg-system-call-511.patch
- From: 4.14.35-2047.516.2.1
- CVE-2022-21546
- Description:
scsi: target: Fix WRITE_SAME No Data Buffer crash
- CVE: n/a
- Patch: 4.14.35/CVE-2022-21546-scsi-target-Fix-WRITE_SAME-No-Data-Buffer-crash.patch
- From: kernel-uek-4.14.35-2047.517.3.el7uek
- CVE-2022-3028
- Description:
af_key: Do not call xfrm_probe_algs in parallel
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-3028
- Patch: 4.14.35/CVE-2022-3028-af_key-Do-not-call-xfrm_probe_algs-in-parallel-1.patch
- From: 5.10.140-1
- CVE-2022-3239
- Description:
media: em28xx: initialize refcount before kref_get
- CVE: https://linux.oracle.com/cve/CVE-2022-3239.html
- Patch: oel7-uek5/4.14.35-2047.519.2.1.el7uek/CVE-2022-3239-media-em28xx-initialize-refcount-before-kref-get.patch
- From: 4.14.35-2047.519.2.1.el7uek
- CVE-2022-4378
- Description:
proc: avoid integer type confusion in get_proc_long
- CVE: https://linux.oracle.com/cve/CVE-2022-4378.html
- Patch: 4.14.35/CVE-2022-4378-0200-proc-avoid-integer-type-confusion-in-get_proc_long.patch
- From: 4.14.35-2047.520.3.1
- CVE-2022-4378
- Description:
proc: proc_skip_spaces() shouldn't think it is working on C strings
- CVE: https://linux.oracle.com/cve/CVE-2022-4378.html
- Patch: 4.14.35/CVE-2022-4378-0300-proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-C-strings.patch
- From: 4.14.35-2047.520.3.1
- CVE-2022-40768
- Description:
scsi: stex: Properly zero out the passthrough command structure
- CVE: https://linux.oracle.com/cve/CVE-2022-40768.html
- Patch: 4.14.35/CVE-2022-40768-scsi-stex-Properly-zero-out-the-passthrough-command-structure.patch
- From: 4.14.35-2047.520.1.el7uek
- CVE-2022-3565
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers
- CVE: https://ubuntu.com/security/CVE-2022-3565
- Patch: ubuntu-bionic/4.15.0-200.211/0009-CVE-2022-3565-mISDN-fix-use-after-free-bugs-in-l1oip-timer-handler.patch
- From: 4.15.0-200.211
- CVE-2022-3565
- Description:
mISDN: fix use-after-free bugs in l1oip timer handlers (adaptation)
- CVE: https://linux.oracle.com/cve/CVE-2022-3565.html
- Patch: 4.14.35/CVE-2022-3565-kpatch.patch
- From: 4.14.35-2047.520.0
- CVE-2022-3303
- Description:
ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC
- CVE: https://access.redhat.com/security/cve/CVE-2022-3303
- Patch: 4.14.35/CVE-2022-3303-ALSA-pcm-oss-Fix-race-at-SNDCTL_DSP_SYNC.patch
- From: 4.14.35-2047.522.3.el7uek
- CVE-2022-3524
- Description:
tcp/udp: Fix memory leak in ipv6_renew_options()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3524
- Patch: 4.14.35/CVE-2022-3524-tcp-udp-Fix-memory-leak-in-ipv6_renew_options.patch
- From: 4.14.35-2047.522.3.el7uek
- CVE-2022-3640
- Description:
Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3640
- Patch: 4.14.35/CVE-2022-3640-Bluetooth-L2CAP-fix-use-after-free-in-l2cap_conn_del.patch
- From: 4.14.35-2047.522.3.el7uek
- CVE-2022-42895
- Description:
Bluetooth: L2CAP: Fix attempting to access uninitialized memory
- CVE: https://access.redhat.com/security/cve/CVE-2022-42895
- Patch: 4.14.35/CVE-2022-42895-Bluetooth-L2CAP-Fix-attempting-to-access-uninitialized-memory.patch
- From: 4.14.35-2047.522.3.el7uek
- CVE-2022-42896
- Description:
Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: 4.14.35/CVE-2022-42896-0001-Bluetooth-L2CAP-Fix-l2cap_global_chan_by_psm.patch
- From: 4.14.35-2047.522.3.el7uek
- CVE-2022-42896
- Description:
Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- CVE: https://access.redhat.com/security/cve/CVE-2022-42896
- Patch: 4.14.35/CVE-2022-42896-0002-Bluetooth-L2CAP-Fix-accepting-connection-request-for-invalid-SPSM.patch
- From: 4.14.35-2047.522.3.el7uek
- CVE-2022-0394
- Description:
ipv6: raw: Deduct extension header length in rawv6_push_pending_frames
- CVE: https://access.redhat.com/security/cve/CVE-2023-0394
- Patch: 4.14.35/CVE-2023-0394-ipv6-raw-Deduct-extension-header-length-in-rawv6_push_pending_frames.patch
- From: 4.14.35-2047.523.4.1.el7uek
- CVE-2022-2873
- Description:
i2c: ismt: Fix an out-of-bounds bug in ismt_access()
- CVE: https://access.redhat.com/security/cve/CVE-2022-2873
- Patch: 4.14.35/CVE-2022-2873-i2c-ismt-Fix-an-out-of-bounds-bug-in-ismt_access.patch
- From: 4.14.35-2047.523.4.1.el7uek
- CVE-2022-3545
- Description:
nfp: fix use-after-free in area_cache_get()
- CVE: https://access.redhat.com/security/cve/CVE-2022-3545
- Patch: 4.14.35/CVE-2022-3545-nfp-fix-use-after-free-in-area_cache_get.patch
- From: 4.14.35-2047.523.4.1.el7uek
- CVE-2023-23455
- Description:
net: sched: atm: dont intepret cls results when asked to drop
- CVE: https://access.redhat.com/security/cve/CVE-2023-23455
- Patch: 4.14.35/CVE-2023-23455-net-sched-atm-dont-intepret-cls-results-when-asked-to-drop.patch
- From: 4.14.35-2047.523.4.1.el7uek
- CVE-2022-41218
- Description:
media: dvb-core: Fix UAF due to refcount races at releasing
- CVE: https://access.redhat.com/security/cve/CVE-2022-41218
- Patch: 4.14.35/CVE-2022-41218-media-dvb-core-Fix-UAF-due-to-refcount-races-at-releasing.patch
- From: 4.14.35-2047.523.4.1.el7uek
- CVE-2022-45934
- Description:
Bluetooth: L2CAP: Fix u8 overflow
- CVE: https://access.redhat.com/security/cve/CVE-2022-45934
- Patch: 4.14.35/CVE-2022-45934-Bluetooth-L2CAP-Fix-u8-overflow.patch
- From: 4.14.35-2047.523.4.1.el7uek
- CVE-2022-47929
- Description:
net: sched: disallow noqueue for qdisc classes
- CVE: https://access.redhat.com/security/cve/CVE-2022-47929
- Patch: 4.14.35/CVE-2022-47929-net-sched-disallow-noqueue-for-qdisc-classes.patch
- From: 4.14.35-2047.523.4.1.el7uek
- CVE-2023-23559
- Description:
wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid
- CVE: https://access.redhat.com/security/cve/CVE-2023-23559
- Patch: oel7-uek5/4.14.35-2047.524.5.el7uek/CVE-2023-23559-patch-wifi-rndis_wlan-Prevent-buffer-overflow-in-rndis_que.patch
- From: 4.14.35-2047.524.5
- CVE-2022-3107
- Description:
hv_netvsc: Add check for kvmalloc_array
- CVE: https://access.redhat.com/security/cve/CVE-2022-3107
- Patch: oel7-uek5/4.14.35-2047.524.5.el7uek/CVE-2022-3107-patch-add-check-for-kvmalloc_array.patch
- From: 4.14.35-2047.524.5
- CVE-2023-3567
- Description:
vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
- CVE: https://linux.oracle.com/cve/CVE-2023-3567.html
- Patch: oel7-uek5/4.14.35-2047.529.3.el7uek/CVE-2023-3567-vc_screen-move-load-of-struct-vc_data-pointer-in-vcs_read-to-avoid-UAF.patch
- From: 4.14.35-2047.529.3
- CVE-2023-22024
- Description:
rds: Fix lack of reentrancy for connection reset with dst addr zero
- CVE: https://linux.oracle.com/cve/CVE-2023-22024.html
- Patch: oel7-uek5/4.14.35-2047.529.3.el7uek/CVE-2023-22024-rds-Fix-lack-of-reentrancy-for-connection-reset-with-dst-addr-zero.patch
- From: 4.14.35-2047.529.3.2
- CVE-2023-42753
- Description:
netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c
- CVE: https://linux.oracle.com/cve/CVE-2023-42753.html
- Patch: oel7-uek5/4.14.35-2047.529.3.el7uek/CVE-2023-42753-netfilter-ipset-add-the-missing-IP_SET_HASH_WITH_NET0-macro-for-ip_set_hash_netportnet-c.patch
- From: 4.14.35-2047.529.3.2
- CVE-2023-4623
- Description:
net/sched: sch_hfsc: Ensure inner classes have fsc curve
- CVE: https://linux.oracle.com/cve/CVE-2023-4623.html
- Patch: oel7-uek5/4.14.35-2047.532.3.el7uek/CVE-2023-4623-patch-net-sched-sch-hfsc-ensure-inner-classes-have-fsc-curve.patch
- From: 4.14.35-2047.532.3.el7uek
- CVE-2022-29900
- Description:
Livepatching Retbleed may decrease kernel stability and performance. This vulnerability has medium security impact and applies to certain hardware environments only.
- CVE:
- Patch: skipped/CVE-2022-29900.patch
- From:
- CVE-2022-29901
- Description:
Livepatching Retbleed may decrease the stability and performance of the kernel, while vulnerability has a medium security impact and only for a certain hardware environment.
- CVE:
- Patch: skipped/CVE-2022-29901.patch
- From:
- CVE-2023-0590
- Description:
net: sched: fix race condition in qdisc_graft()
- CVE: https://linux.oracle.com/cve/CVE-2023-0590.html
- Patch: oel7-uek5/4.14.35-2047.533.3.el7uek/CVE-2023-0590-net-sched-fix-race-condition-in-qdisc_graft.patch
- From: 4.14.35-2047.533.3
- CVE-2023-1077
- Description:
sched/rt: pick_next_rt_entity(): check list_entry
- CVE: https://linux.oracle.com/cve/CVE-2023-1077.html
- Patch: oel7-uek5/4.14.35-2047.533.3.el7uek/CVE-2023-1077-sched-rt-pick_next_rt_entity-check-list_entry.patch
- From: 4.14.35-2047.533.3
- CVE-2023-45863
- Description:
kobject: Fix slab-out-of-bounds in fill_kobj_path()
- CVE: https://linux.oracle.com/cve/CVE-2023-45863.html
- Patch: oel7-uek5/4.14.35-2047.533.3.el7uek/CVE-2023-45863-kobject-Fix-slab-out-of-bounds-in-fill_kobj_path.patch
- From: 4.14.35-2047.533.3
- CVE-2023-25775
- Description:
RDMA/irdma: Prevent zero-length STAG registration
- CVE: https://linux.oracle.com/cve/CVE-2023-25775.html
- Patch: oel7-uek5/4.14.35-2047.533.3.el7uek/CVE-2023-25775-RDMA-irdma-Prevent-zero-length-STAG-registration.patch
- From: 4.14.35-2047.533.3
- CVE-2023-6040
- Description:
netfilter: nf_tables: Reject tables of unsupported family
- CVE: https://linux.oracle.com/cve/CVE-2023-6040.html
- Patch: oel7-uek5/4.14.35-2047.535.2.1.el7uek/CVE-2023-6040-netfilter-nf_tables-Reject-tables-of-unsupported-family.patch
- From: 4.14.35-2047.535.2.1.el7uek
- CVE-2024-1086
- Description:
netfilter: nf_tables: reject QUEUE/DROP verdict parameters
- CVE: https://linux.oracle.com/cve/CVE-2024-1086.html
- Patch: oel7-uek5/4.14.35-2047.535.2.1.el7uek/CVE-2024-1086-netfilter-nf_tables-reject-QUEUE-DROP-verdict-parameters-pre-529.3.2.patch
- From: 4.14.35-2047.535.2.1.el7uek
- CVE-2024-41090 CVE-2024-41091
- Description:
net/mlx5e: drop shorter ethernet frames
- CVE: https://access.redhat.com/security/cve/CVE-2024-41091
- Patch: 4.14.35/CVE-2024-41090_CVE-2024-41091.patch
- From: 4.14.35-2047.538.5.1
- CVE-2024-38627
- Description:
stm class: Fix a double free in stm_register_device()
- CVE: https://linux.oracle.com/cve/CVE-2024-38627.html
- Patch: oel7-uek5/4.14.35-2047.540.4.1.el7uek/CVE-2024-38627-stm-class-fix-a-double-free-in-stm-register-device.patch
- From: 4.14.35-2047.540.4.1.el7uek
- CVE-2024-39480
- Description:
kdb: Fix buffer overflow during tab-complete
- CVE: https://linux.oracle.com/cve/CVE-2024-39480.html
- Patch: oel7-uek5/4.14.35-2047.540.4.1.el7uek/CVE-2024-39480-kdb-fix-buffer-overflow-during-tab-complete.patch
- From: 4.14.35-2047.540.4.1.el7uek
- CVE-2024-38583
- Description:
nilfs2: We cannot patch functions that sleep in kthread().
- CVE:
- Patch: skipped/CVE-2024-38583.patch
- From:
- N/A
- Description:
vhost/scsi: null-ptr-dereference in vhost_scsi_get_req()
- CVE: https://linux.oracle.com/errata/ELSA-2024-12678.html
- Patch: oel7-uek5/4.14.35-2047.540.4.2.el7uek/vhost-scsi-null-ptr-dereference-in-vhost_scsi_get_req-uek5.patch
- From: 4.14.35-2047.540.4.2.el7uek
- CVE-2024-41046
- Description:
net: ethernet: lantiq_etop: fix double free in detach
- CVE: https://linux.oracle.com/cve/CVE-2024-41046.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-41046-net-ethernet-lantiq-etop-fix-double-free-in-detach.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-36905
- Description:
tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
- CVE: https://linux.oracle.com/cve/CVE-2024-36905.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-36905-tcp-defer-shutdown-send-shutdown-for-tcp-syn-recv-sockets.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-40902
- Description:
jfs: xattr: fix buffer overflow for invalid xattr
- CVE: https://linux.oracle.com/cve/CVE-2024-40902.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-40902-jfs-xattr-fix-buffer-overflow-for-invalid-xattr.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42094
- Description:
net/iucv: Avoid explicit cpumask var allocation on stack
- CVE: https://linux.oracle.com/cve/CVE-2024-42094.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-42094-net-iucv-avoid-explicit-cpumask-var-allocation-on-stack.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42224
- Description:
net: dsa: mv88e6xxx: Correct check for empty list
- CVE: https://linux.oracle.com/cve/CVE-2024-42224.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-42224-net-dsa-mv88e6xxx-correct-check-for-empty-list.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42154
- Description:
tcp_metrics: validate source addr length
- CVE: https://linux.oracle.com/cve/CVE-2024-42154.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-42154-tcp-metrics-validate-source-addr-length.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42154
- Description:
tcp_metrics: validate source addr length
- CVE: https://linux.oracle.com/cve/CVE-2024-42154.html
- Patch: oel9-uek7/5.15.0-210.163.7.el9uek/CVE-2024-42154-tcp-metrics-validate-source-addr-length-kpatch.patch
- From: 5.15.0-210.163.7.el9uek
- CVE-2024-39487
- Description:
bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()
- CVE: https://linux.oracle.com/cve/CVE-2024-39487.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-39487-bonding-fix-out-of-bounds-read-in-bond-option-arp-ip-targets-set.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42105
- Description:
nilfs2: fix inode number range checks
- CVE: https://linux.oracle.com/cve/CVE-2024-42105.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-42105-nilfs2-fix-inode-number-range-checks.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42104
- Description:
nilfs2: add missing check for inode numbers on directory entries
- CVE: https://linux.oracle.com/cve/CVE-2024-42104.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-42104-nilfs2-add-missing-check-for-inode-numbers-on-directory-entries.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-46738
- Description:
VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
- CVE: https://linux.oracle.com/cve/CVE-2024-46738.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-46738-vmci-fix-use-after-free-when-removing-resource-in-vmci-resource-remove.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2022-3567
- Description:
ipv6: annotate some data-races around sk->sk_prot
- CVE: https://linux.oracle.com/cve/CVE-2022-3567.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2022-3567-ipv6-annotate-some-data-races-around-sk-sk_prot.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2022-3567
- Description:
ipv6: Fix data races around sk->sk_prot.
- CVE: https://linux.oracle.com/cve/CVE-2022-3567.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2022-3567-ipv6-Fix-data-races-around-sk-sk_prot.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2022-3566
- Description:
tcp: Fix data races around icsk->icsk_af_ops
- CVE: https://linux.oracle.com/cve/CVE-2022-3566.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2022-3566-tcp-Fix-data-races-around-icsk-icsk_af_ops.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-39469
- Description:
nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors
- CVE: https://linux.oracle.com/cve/CVE-2024-39469.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-39469-nilfs2-fix-nilfs-empty-dir-misjudgment-and-long-loop-on-i-o-errors-4.14.35-2047.540.4.2.el7uek.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-36894
- Description:
USB composite function controllers related patch
- CVE:
- Patch: skipped/CVE-2024-36894.patch
- From:
- CVE-2024-40904
- Description:
USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
- CVE: https://linux.oracle.com/cve/CVE-2024-40904.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-40904-usb-class-cdc-wdm-fix-cpu-lockup-caused-by-excessive-log-messages.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-39509
- Description:
HID: core: remove unnecessary WARN_ON() in implement()
- CVE: https://linux.oracle.com/cve/CVE-2024-39509.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-39509-hid-core-remove-unnecessary-warn-on-in-implement.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-38619
- Description:
usb-storage: alauda: Fix uninit-value in alauda_check_media()
- CVE: https://access.redhat.com/security/cve/CVE-2024-38619
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-38619-0001-usb-storage-alauda-fix-uninit-value-in-alauda_check_media.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-38619
- Description:
usb-storage: alauda: Check whether the media is initialized
- CVE: https://linux.oracle.com/cve/CVE-2024-38619.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-38619-0002-usb-storage-alauda-check-whether-the-media-is-initialized.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-38619
- Description:
usb-storage: alauda: Check whether the media is initialized
- CVE: https://linux.oracle.com/cve/CVE-2024-38619.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-38619-0002-usb-storage-alauda-check-whether-the-media-is-initialized-kpatch.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2023-52803
- Description:
SUNRPC: Fix RPC client cleaned up the freed pipefs dentries
- CVE: https://linux.oracle.com/cve/CVE-2023-52803.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2023-52803-sunrpc-fix-rpc-client-cleaned-up-the-freed-pipefs-dentries-kpatch.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42223
- Description:
media: dvb-frontends: tda10048: Fix integer overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-42223.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-42223-media-dvb-frontends-tda10048-fix-integer-overflow.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42157
- Description:
s390 architecture related CVE.
- CVE:
- Patch: skipped/CVE-2024-42157.patch
- From:
- CVE-2024-41044
- Description:
ppp: ensure minimum packet size in ppp_write()
- CVE: https://linux.oracle.com/cve/CVE-2024-41044.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-41044-0001-ppp-ensure-minimum-packet-size-in-ppp_write.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-41044
- Description:
ppp: reject claimed-as-LCP but actually malformed packets
- CVE: https://linux.oracle.com/cve/CVE-2024-41044.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-41044-0002-ppp-reject-claimed-as-lcp-but-actually-malformed-packets.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-41035
- Description:
USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor
- CVE: https://linux.oracle.com/cve/CVE-2024-41035.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-41035-usb-core-fix-duplicate-endpoint-bug-by-clearing-reserved-bits-in-the-descriptor.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-37078
- Description:
nilfs2 is not enabled
- CVE:
- Patch: skipped/CVE-2024-37078.patch
- From:
- CVE-2024-40988
- Description:
drm/radeon: fix UBSAN warning in kv_dpm.c
- CVE: https://linux.oracle.com/cve/CVE-2024-40988.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-40988-drm-radeon-fix-ubsan-warning-in-kv-dpm-c.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-41097
- Description:
usb: atm: cxacru: fix endpoint checking in cxacru_bind()
- CVE: https://linux.oracle.com/cve/CVE-2024-41097.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-41097-usb-atm-cxacru-fix-endpoint-checking-in-cxacru-bind.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42096
- Description:
x86: stop playing stack games in profile_pc()
- CVE: https://linux.oracle.com/cve/CVE-2024-42096.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-42096-x86-stop-playing-stack-games-in-profile-pc.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-40932
- Description:
drm/exynos/vidi: fix memory leak in .get_modes()
- CVE: https://linux.oracle.com/cve/CVE-2024-40932.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-40932-drm-exynos-vidi-fix-memory-leak-in-get-modes.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-39501
- Description:
drivers: core: synchronize really_probe() and dev_uevent()
- CVE: https://linux.oracle.com/cve/CVE-2024-39501.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-39501-drivers-core-synchronize-really-probe-and-dev-uevent.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-41034
- Description:
nilfs2 related patch
- CVE:
- Patch: skipped/CVE-2024-41034.patch
- From:
- CVE-2024-41089
- Description:
drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes
- CVE: https://linux.oracle.com/cve/CVE-2024-41089.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-41089-drm-nouveau-dispnv04-fix-null-pointer-dereference-in-nv17-tv-get-hd-modes.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42153
- Description:
Patch is for ARM32, which KernelCare does not support.
- CVE:
- Patch: skipped/CVE-2024-42153.patch
- From:
- CVE-2024-42236
- Description:
usb: gadget: configfs: Prevent OOB read/write in usb_string_copy()
- CVE: https://linux.oracle.com/cve/CVE-2024-42236.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-42236-usb-gadget-configfs-prevent-oob-read-write-in-usb-string-copy.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-39499
- Description:
vmci: prevent speculation leaks by sanitizing event in event_deliver()
- CVE: https://linux.oracle.com/cve/CVE-2024-39499.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-39499-vmci-prevent-speculation-leaks-by-sanitizing-event-in-event-deliver.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42090
- Description:
pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
- CVE: https://linux.oracle.com/cve/CVE-2024-42090.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-42090-pinctrl-fix-deadlock-in-create-pinctrl-when-handling-eprobe-defer.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42232
- Description:
libceph: fix race between delayed_work() and ceph_monc_stop()
- CVE: https://linux.oracle.com/cve/CVE-2024-42232.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-42232-libceph-fix-race-between-delayed-work-and-ceph-monc-stop.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-40987
- Description:
drm/amdgpu: fix UBSAN warning in kv_dpm.c
- CVE: https://linux.oracle.com/cve/CVE-2024-40987.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-40987-drm-amdgpu-fix-ubsan-warning-in-kv-dpm-c.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42115
- Description:
jffs2: Fix potential illegal address access in jffs2_free_inode
- CVE: https://linux.oracle.com/cve/CVE-2024-42115.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-42115-jffs2-fix-potential-illegal-address-access-in-jffs2-free-inode.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-40901
- Description:
scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory
- CVE: https://linux.oracle.com/cve/CVE-2024-40901.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-40901-scsi-mpt3sas-avoid-test-set-bit-operating-in-non-allocated-memory.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-40912
- Description:
wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()
- CVE: https://linux.oracle.com/cve/CVE-2024-40912.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-40912-wifi-mac80211-fix-deadlock-in-ieee80211-sta-ps-deliver-wakeup.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-40942
- Description:
wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects
- CVE: https://linux.oracle.com/cve/CVE-2024-40942.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-40942-wifi-mac80211-mesh-fix-leak-of-mesh-preq-queue-objects.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-40943
- Description:
ocfs2: fix races between hole punching and AIO+DIO
- CVE: https://linux.oracle.com/cve/CVE-2024-40943.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-40943-ocfs2-fix-races-between-hole-punching-and-aio-dio.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-40959
- Description:
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
- CVE: https://linux.oracle.com/cve/CVE-2024-40959.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-40959-xfrm6-check-ip6-dst-idev-return-value-in-xfrm6-get-saddr.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-41006
- Description:
netrom: Fix a memory leak in nr_heartbeat_expiry()
- CVE: https://linux.oracle.com/cve/CVE-2024-41006.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-41006-netrom-fix-a-memory-leak-in-nr-heartbeat-expiry-523.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42084
- Description:
ftruncate: pass a signed offset
- CVE: https://linux.oracle.com/cve/CVE-2024-42084.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-42084-ftruncate-pass-a-signed-offset.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42097
- Description:
ALSA: emux: improve patch ioctl data validation
- CVE: https://linux.oracle.com/cve/CVE-2024-42097.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-42097-alsa-emux-improve-patch-ioctl-data-validation.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-42143
- Description:
orangefs: fix out-of-bounds fsid access
- CVE: https://linux.oracle.com/cve/CVE-2024-42143.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-42143-orangefs-fix-out-of-bounds-fsid-access.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-44952
- Description:
driver core: Fix uevent_show() vs driver detach race
- CVE: https://linux.oracle.com/cve/CVE-2024-44952.html
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2024-44952-driver-core-fix-uevent-show-vs-driver-detach-race.patch
- From: 4.14.35-2047.541.4.1.el7uek
- CVE-2024-41081
- Description:
ila: block BH in ila_output()
- CVE: https://linux.oracle.com/cve/CVE-2024-41081.html
- Patch: oel7-uek5/4.14.35-2047.542.2.el7uek/CVE-2024-41081-ila-block-bh-in-ila-output.patch
- From: 4.14.35-2047.542.2.el7uek
- CVE-2024-41072
- Description:
wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
- CVE: https://linux.oracle.com/cve/CVE-2024-41072.html
- Patch: oel7-uek5/4.14.35-2047.542.2.el7uek/CVE-2024-41072-wifi-cfg80211-wext-add-extra-siocsiwscan-data-check.patch
- From: 4.14.35-2047.542.2.el7uek
- CVE-2024-41068
- Description:
Out of scope as the patch is for s390 arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-41068.patch
- From:
- CVE-2024-41063
- Description:
Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
- CVE: https://linux.oracle.com/cve/CVE-2024-41063.html
- Patch: oel7-uek5/4.14.35-2047.542.2.el7uek/CVE-2024-41063-bluetooth-hci-core-cancel-all-works-upon-hci-unregister-dev.patch
- From: 4.14.35-2047.542.2.el7uek
- CVE-2024-41059
- Description:
hfsplus: fix uninit-value in copy_name
- CVE: https://linux.oracle.com/cve/CVE-2024-41059.html
- Patch: oel7-uek5/4.14.35-2047.542.2.el7uek/CVE-2024-41059-hfsplus-fix-uninit-value-in-copy-name.patch
- From: 4.14.35-2047.542.2.el7uek
- CVE-2024-41015
- Description:
ocfs2: add bounds checking to ocfs2_check_dir_entry()
- CVE: https://linux.oracle.com/cve/CVE-2024-41015.html
- Patch: oel7-uek5/4.14.35-2047.542.2.el7uek/CVE-2024-41015-ocfs2-add-bounds-checking-to-ocfs2-check-dir-entry.patch
- From: 4.14.35-2047.542.2.el7uek
- CVE-2024-41017
- Description:
jfs: don't walk off the end of ealist
- CVE: https://linux.oracle.com/cve/CVE-2024-41017.html
- Patch: oel7-uek5/4.14.35-2047.542.2.el7uek/CVE-2024-41017-jfs-don-t-walk-off-the-end-of-ealist.patch
- From: 4.14.35-2047.542.2.el7uek
- CVE-2024-43882
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://linux.oracle.com/cve/CVE-2024-43882.html
- Patch: oel7-uek5/4.14.35-2047.543.3.el7uek/CVE-2024-43882-exec-fix-toctou-between-perm-check-and-set-uid-gid-usage.patch
- From: 4.14.35-2047.543.3.el7uek
- CVE-2024-42271
- Description:
net/iucv: fix use after free in iucv_sock_close()
- CVE: https://linux.oracle.com/cve/CVE-2024-42271.html
- Patch: oel7-uek5/4.14.35-2047.543.3.el7uek/CVE-2024-42271-net-iucv-fix-use-after-free-in-iucv-sock-close.patch
- From: 4.14.35-2047.543.3.el7uek
- CVE-2024-42313
- Description:
media: venus: fix use after free in vdec_close
- CVE: https://linux.oracle.com/cve/CVE-2024-42313.html
- Patch: oel7-uek5/4.14.35-2047.543.3.el7uek/CVE-2024-42313-media-venus-fix-use-after-free-in-vdec-close.patch
- From: 4.14.35-2047.543.3.el7uek
- CVE-2024-43839
- Description:
bna: adjust 'name' buf size of bna_tcb and bna_ccb structures
- CVE: https://linux.oracle.com/cve/CVE-2024-43839.html
- Patch: oel7-uek5/4.14.35-2047.543.3.el7uek/CVE-2024-43839-bna-adjust-name-buf-size-of-bna-tcb-and-bna-ccb-structures.patch
- From: 4.14.35-2047.543.3.el7uek
- CVE-2024-43858
- Description:
jfs: Fix array-index-out-of-bounds in diFree
- CVE: https://linux.oracle.com/cve/CVE-2024-43858.html
- Patch: oel7-uek5/4.14.35-2047.543.3.el7uek/CVE-2024-43858-jfs-fix-array-index-out-of-bounds-in-difree.patch
- From: 4.14.35-2047.543.3.el7uek
- CVE-2024-46673
- Description:
scsi: aacraid: Fix double-free on probe failure
- CVE: https://linux.oracle.com/cve/CVE-2024-46673.html
- Patch: oel7-uek5/4.14.35-2047.543.3.el7uek/CVE-2024-46673-scsi-aacraid-fix-double-free-on-probe-failure.patch
- From: 4.14.35-2047.543.3.el7uek
- CVE-2024-46674
- Description:
usb: dwc3: st: fix probed platform device ref count on probe error path
- CVE: https://linux.oracle.com/cve/CVE-2024-46674.html
- Patch: oel7-uek5/4.14.35-2047.543.3.el7uek/CVE-2024-46674-usb-dwc3-st-fix-probed-platform-device-ref-count-on-probe-error-path.patch
- From: 4.14.35-2047.543.3.el7uek
- CVE-2024-46744
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://linux.oracle.com/cve/CVE-2024-46744.html
- Patch: oel7-uek5/4.14.35-2047.543.3.el7uek/CVE-2024-46744-squashfs-sanity-check-symbolic-link-size.patch
- From: 4.14.35-2047.543.3.el7uek
- CVE-2024-46756
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46756.html
- Patch: oel7-uek5/4.14.35-2047.543.3.el7uek/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 4.14.35-2047.543.3.el7uek
- CVE-2024-42285
- Description:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://linux.oracle.com/cve/CVE-2024-42285.html
- Patch: oel7-uek5/4.14.35-2047.543.3.el7uek/CVE-2024-42285-rdma-iwcm-fix-a-use-after-free-related-to-destroying-cm-ids.patch
- From: 4.14.35-2047.543.3.el7uek
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://linux.oracle.com/cve/CVE-2024-47696.html
- Patch: oel7-uek5/4.14.35-2047.543.3.el7uek/CVE-2024-47696-rdma-iwcm-fix-warning-at-kernel-workqueue-c-check-flush-dependency.patch
- From: 4.14.35-2047.543.3.el7uek
- CVE-2024-47696
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://linux.oracle.com/cve/CVE-2024-47696.html
- Patch: oel7-uek5/4.14.35-2047.543.3.el7uek/CVE-2024-47696-rdma-iwcm-fix-warning-at-kernel-workqueue-c-check-flush-dependency-kpatch.patch
- From: 4.14.35-2047.543.3.el7uek
- CVE-2025-21916
- Description:
USB: core: Add routines for endpoint checks in old drivers
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2025-21916
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2025-21916-USB-core-Add-routines-for-endpoint-checks-in-old-drivers.patch
- From: kernel-uek-4.14.35-2047.543.3.1.el7uek
- CVE-2025-21916
- Description:
usb: atm: cxacru: fix a flaw in existing endpoint checks
- CVE: https://nvd.nist.gov/vuln/detail/CVE-2025-21916
- Patch: oel7-uek5/4.14.35-2047.541.4.1.el7uek/CVE-2025-21916-usb-atm-cxacru-fix-a-flaw-in-existing-endpoint-checks.patch
- From: kernel-uek-4.14.35-2047.543.3.1.el7uek
- n/a
- Description:
x86/xen: Add xenpv_restore_regs_and_return_to_usermode()
- CVE: n/a
- Patch: 4.14.35/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode.patch
- From: v5.16
- N/A
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 4.15.0/proc-restrict-pagemap-access.patch
- From: N/A
- N/A
- Description:
N/A
- CVE: N/A
- Patch: 4.14.0/kpatch-add-asm-definitions-uek-1.patch
- From: N/A
- CVE-2022-1729
- Description:
perf: Fix sys_perf_event_open() race against self
- CVE: https://access.redhat.com/security/cve/CVE-2022-1729
- Patch: 4.14.0/CVE-2022-1729-perf-Fix-sys-perf-event-open-race-against-itself.patch
- From: 4.14.35-2047.513.2.1.el7uek