- kernel-uek-5.15.0-308.179.6.el8uek (oel8-uek7)
- 5.15.0-312.187.5.el8uek
- 2025-09-16 10:01:03
- 2025-09-16 13:36:03
- K20250916_01
- CVE-2024-28956
- Description:
Patch meant for use with microcode update
- CVE:
- Patch: skipped/CVE-2024-28956.patch
- From:
- CVE-2024-8805
- Description:
Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE
- CVE: https://linux.oracle.com/cve/CVE-2024-8805.html
- Patch: oel9-uek7/5.15.0-309.180.4.el9uek/CVE-2024-8805-bluetooth-hci-event-align-br-edr-just-works-paring-with-le.patch
- From: 5.15.0-309.180.4.el9uek
- CVE-2025-37758
- Description:
ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe()
- CVE: https://linux.oracle.com/cve/CVE-2025-37758.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37758-ata-pata-pxa-fix-potential-null-pointer-dereference-in-pxa-ata-probe.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37757
- Description:
tipc: fix memory leak in tipc_link_xmit
- CVE: https://linux.oracle.com/cve/CVE-2025-37757.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37757-tipc-fix-memory-leak-in-tipc-link-xmit.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37756
- Description:
net: tls: explicitly disallow disconnect
- CVE: https://linux.oracle.com/cve/CVE-2025-37756.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37756-net-tls-explicitly-disallow-disconnect.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37749
- Description:
net: ppp: Add bound checking for skb data on ppp_sync_txmung
- CVE: https://linux.oracle.com/cve/CVE-2025-37749.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37749-net-ppp-add-bound-checking-for-skb-data-on-ppp-sync-txmung.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37841
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-37841.patch
- From:
- CVE-2025-37892
- Description:
mtd: inftlcore: Add error check for inftl_read_oob()
- CVE: https://linux.oracle.com/cve/CVE-2025-37892.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37892-mtd-inftlcore-add-error-check-for-inftl-read-oob.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37838
- Description:
HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition
- CVE: https://linux.oracle.com/cve/CVE-2025-37838.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37838-hsi-ssi-protocol-fix-use-after-free-vulnerability-in-ssi-protocol-driver-due-to-race-condition.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37982
- Description:
wifi: wl1251: fix memory leak in wl1251_tx_work
- CVE: https://linux.oracle.com/cve/CVE-2025-37982.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37982-wifi-wl1251-fix-memory-leak-in-wl1251-tx-work.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-27402
- Description:
phonet/pep: fix racy skb_queue_empty() use
- CVE: https://linux.oracle.com/cve/CVE-2024-27402.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-27402-phonet-pep-fix-racy-skb-queue-empty-use.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-46774
- Description:
Out of scope as the patch is for powerpc arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-46774.patch
- From:
- CVE-2024-56551
- Description:
drm/amdgpu: fix usage slab after free
- CVE: https://linux.oracle.com/cve/CVE-2024-56551.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-56551-drm-amdgpu-fix-usage-slab-after-free.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-35866
- Description:
smb: client: fix potential UAF in cifs_dump_full_key()
- CVE: https://linux.oracle.com/cve/CVE-2024-35866.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-35866-smb-client-fix-potential-uaf-in-cifs-dump-full-key.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-26952
- Description:
CONFIG_SMB_SERVER is not enabled.
- CVE:
- Patch: skipped/CVE-2024-26952.patch
- From:
- CVE-2024-46742
- Description:
smb/server: fix potential null-ptr-deref of lease_ctx_info in smb2_open()
- CVE: https://linux.oracle.com/cve/CVE-2024-46742.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-46742-smb-server-fix-potential-null-ptr-deref-of-lease-ctx-info-in-smb2-open.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-26928
- Description:
smb: client: fix potential UAF in cifs_debug_files_proc_show()
- CVE: https://linux.oracle.com/cve/CVE-2024-26928.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-26928-smb-client-fix-potential-UAF-in-cifs_debug_files_proc_show.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-35867
- Description:
smb: client: fix potential UAF in cifs_stats_proc_show()
- CVE: https://linux.oracle.com/cve/CVE-2024-35867.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-35867-smb-client-fix-potential-uaf-in-cifs-stats-proc-show.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2023-52621
- Description:
bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers
- CVE: https://linux.oracle.com/cve/CVE-2023-52621.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2023-52621-bpf-check-rcu-read-lock-trace-held-before-calling-bpf-map-helpers.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-36908
- Description:
blk-iocost: do not WARN if iocg was already offlined
- CVE: https://linux.oracle.com/cve/CVE-2024-36908.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-36908-blk-iocost-do-not-warn-if-iocg-was-already-offlined.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-49960
- Description:
ext4: fix timer use-after-free on failed mount
- CVE: https://linux.oracle.com/cve/CVE-2024-49960.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-49960-ext4-fix-timer-use-after-free-on-failed-mount.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-54458
- Description:
scsi: ufs: bsg: Set bsg_queue to NULL after removal
- CVE: https://linux.oracle.com/cve/CVE-2024-54458.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-54458-scsi-ufs-bsg-set-bsg-queue-to-null-after-removal.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://linux.oracle.com/cve/CVE-2024-56658.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-56658
- Description:
net: defer final 'struct net' free in netns dismantle
- CVE: https://linux.oracle.com/cve/CVE-2024-56658.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-56658-net-defer-final-struct-net-free-in-netns-dismantle-kpatch.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-50280
- Description:
dm cache: fix flushing uninitialized delayed_work on cache_ctr error
- CVE: https://linux.oracle.com/cve/CVE-2024-50280.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-50280-dm-cache-fix-flushing-uninitialized-delayed-work-on-cache-ctr-error.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37844
- Description:
cifs: avoid NULL pointer dereference in dbg call
- CVE: https://linux.oracle.com/cve/CVE-2025-37844.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37844-cifs-avoid-null-pointer-dereference-in-dbg-call.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37985
- Description:
USB: wdm: close race between wdm_open and wdm_wwan_port_stop
- CVE: https://linux.oracle.com/cve/CVE-2025-37985.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37985-usb-wdm-close-race-between-wdm-open-and-wdm-wwan-port-stop.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37983
- Description:
qibfs: fix _another_ leak
- CVE: https://linux.oracle.com/cve/CVE-2025-37983.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37983-qibfs-fix-another-leak.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37803
- Description:
udmabuf: fix a buf size overflow issue during udmabuf creation
- CVE: https://linux.oracle.com/cve/CVE-2025-37803.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37803-udmabuf-fix-a-buf-size-overflow-issue-during-udmabuf-creation.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-49989
- Description:
drm/amd/display: fix double free issue during amdgpu module unload
- CVE: https://linux.oracle.com/cve/CVE-2024-49989.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-49989-drm-amd-display-fix-double-free-issue-during-amdgpu-module-unload.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37930
- Description:
drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill()
- CVE: https://linux.oracle.com/cve/CVE-2025-37930.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37930-drm-nouveau-fix-warn-on-in-nouveau-fence-context-kill.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37991
- Description:
Out of scope: PA-RISC architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-37991.patch
- From:
- CVE-2025-37990
- Description:
wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()
- CVE: https://linux.oracle.com/cve/CVE-2025-37990.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37990-wifi-brcm80211-fmac-add-error-handling-for-brcmf-usb-dl-writeimage.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37923
- Description:
tracing: Fix oob write in trace_seq_to_buffer()
- CVE: https://linux.oracle.com/cve/CVE-2025-37923.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37923-tracing-fix-oob-write-in-trace-seq-to-buffer.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37915
- Description:
net_sched: drr: Fix double list add in class with netem as child qdisc
- CVE: https://linux.oracle.com/cve/CVE-2025-37915.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37915-net-sched-drr-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37914
- Description:
net_sched: ets: Fix double list add in class with netem as child qdisc
- CVE: https://linux.oracle.com/cve/CVE-2025-37914.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37914-net-sched-ets-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37913
- Description:
net_sched: qfq: Fix double list add in class with netem as child qdisc
- CVE: https://linux.oracle.com/cve/CVE-2025-37913.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37913-net-sched-qfq-fix-double-list-add-in-class-with-netem-as-child-qdisc.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-38541
- Description:
of: module: add buffer overflow check in of_modalias()
- CVE: https://linux.oracle.com/cve/CVE-2024-38541.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-38541-of-module-add-buffer-overflow-check-in-of-modalias.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37905
- Description:
firmware: arm_scmi: Balance device refcount when destroying devices
- CVE: https://linux.oracle.com/cve/CVE-2025-37905.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37905-firmware-arm-scmi-balance-device-refcount-when-destroying-devices.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37997
- Description:
netfilter: ipset: fix region locking in hash types
- CVE: https://linux.oracle.com/cve/CVE-2025-37997.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37997-netfilter-ipset-fix-region-locking-in-hash-types.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37970
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo
- CVE: https://linux.oracle.com/cve/CVE-2025-37970.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37970-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-fifo.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37969
- Description:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo
- CVE: https://linux.oracle.com/cve/CVE-2025-37969.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37969-iio-imu-st-lsm6dsx-fix-possible-lockup-in-st-lsm6dsx-read-tagged-fifo.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37995
- Description:
module: ensure that kobject_put() is safe for module type kobjects
- CVE: https://linux.oracle.com/cve/CVE-2025-37995.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37995-module-ensure-that-kobject-put-is-safe-for-module-type-kobjects.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37994
- Description:
usb: typec: ucsi: displayport: Fix NULL pointer access
- CVE: https://linux.oracle.com/cve/CVE-2025-37994.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37994-usb-typec-ucsi-displayport-fix-null-pointer-access.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-38024
- Description:
RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug
- CVE: https://linux.oracle.com/cve/CVE-2025-38024.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-38024-rdma-rxe-fix-slab-use-after-free-read-in-rxe-queue-cleanup-bug.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-38009
- Description:
wifi: mt76: disable napi on driver removal
- CVE: https://linux.oracle.com/cve/CVE-2025-38009.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-38009-wifi-mt76-disable-napi-on-driver-removal.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-38005
- Description:
dmaengine: ti: k3-udma: Add missing locking
- CVE: https://linux.oracle.com/cve/CVE-2025-38005.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-38005-dmaengine-ti-k3-udma-add-missing-locking.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-37967
- Description:
usb: typec: ucsi: displayport: Fix deadlock
- CVE: https://linux.oracle.com/cve/CVE-2025-37967.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2025-37967-usb-typec-ucsi-displayport-fix-deadlock.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://linux.oracle.com/cve/CVE-2024-53203.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-53203-usb-typec-fix-potential-array-underflow-in-ucsi-ccg-sync-control.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2024-53203
- Description:
usb: typec: fix potential array underflow in ucsi_ccg_sync_control()
- CVE: https://linux.oracle.com/cve/CVE-2024-53203.html
- Patch: oel9-uek7/5.15.0-310.184.5.2.el9uek/CVE-2024-53203-usb-typec-fix-pm-usage-counter-imbalance-in-ucsi_ccg_sync_control.patch
- From: 5.15.0-310.184.5.2.el9uek
- CVE-2025-38089
- Description:
sunrpc: handle SVC_GARBAGE during svc auth processing as auth error
- CVE: https://linux.oracle.com/cve/CVE-2025-38089.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2025-38089-sunrpc-handle-svc-garbage-during-svc-auth-processing-as-auth-error.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2024-57996
- Description:
net_sched: sch_sfq: don't allow 1 packet limit
- CVE: https://linux.oracle.com/cve/CVE-2024-57996.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2024-57996-net-sched-sch-sfq-don-t-allow-1-packet-limit.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2025-37752
- Description:
net_sched: sch_sfq: move the limit validation
- CVE: https://linux.oracle.com/cve/CVE-2025-37752.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2025-37752-net-sched-sch-sfq-move-the-limit-validation.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2024-53100
- Description:
nvme: tcp: avoid race between queue_lock lock and destroy
- CVE: https://linux.oracle.com/cve/CVE-2024-53100.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2024-53100-nvme-tcp-avoid-race-between-queue-lock-lock-and-destroy.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2023-6931
- Description:
perf: Fix perf_event_validate_size()
- CVE: https://linux.oracle.com/cve/CVE-2023-6931.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2023-6931-perf-fix-perf-event-validate-size.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2023-6931
- Description:
perf: Fix perf_event_validate_size() lockdep splat
- CVE: https://linux.oracle.com/cve/CVE-2023-6931.html
- Patch: oel9-uek7/5.15.0-311.185.9.el9uek/CVE-2023-6931-perf-fix-perf-event-validate-size-lockdep-splat.patch
- From: 5.15.0-311.185.9.el9uek
- CVE-2025-38061
- Description:
net: pktgen: fix access outside of user given buffer in pktgen_thread_write()
- CVE: https://linux.oracle.com/cve/CVE-2025-38061.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38061-net-pktgen-fix-access-outside-of-user-given-buffer-in-pktgen-thread-write-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38051
- Description:
smb: client: Fix use-after-free in cifs_fill_dirent
- CVE: https://linux.oracle.com/cve/CVE-2025-38051.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38051-smb-client-fix-use-after-free-in-cifs-fill-dirent-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38066
- Description:
dm cache: prevent BUG_ON by blocking retries on failed device resumes
- CVE: https://linux.oracle.com/cve/CVE-2025-38066.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38066-dm-cache-prevent-bug-on-by-blocking-retries-on-failed-device-resumes-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38065
- Description:
orangefs: Do not truncate file size
- CVE: https://linux.oracle.com/cve/CVE-2025-38065.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38065-orangefs-do-not-truncate-file-size-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38044
- Description:
media: cx231xx: set device_caps for 417
- CVE: https://linux.oracle.com/cve/CVE-2025-38044.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38044-media-cx231xx-set-device-caps-for-417-5.15.0-310.184.5.3.el9uek.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38159
- Description:
wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
- CVE: https://linux.oracle.com/cve/CVE-2025-38159.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38159-wifi-rtw88-fix-the-para-buffer-size-to-avoid-reading-out-of-bounds.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38352
- Description:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
- CVE: https://linux.oracle.com/cve/CVE-2025-38352.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38352-posix-cpu-timers-fix-race-between-handle-posix-cpu-timers-and-posix-cpu-timer-del.patch
- From: 5.15.0-312.187.5.el9uek
- CVE-2025-38211
- Description:
RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction
- CVE: https://linux.oracle.com/cve/CVE-2025-38211.html
- Patch: oel9-uek7/5.15.0-312.187.5.el9uek/CVE-2025-38211-rdma-iwcm-fix-use-after-free-of-work-objects-after-cm-id-destruction.patch
- From: 5.15.0-312.187.5.el9uek
- N/A
- Description:
kpatch add alt asm definitions
- CVE: https://www.kernel.org
- Patch: 5.15.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.15.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A