- kernel-uek-5.4.17-2136.335.4.1.el7uek (oel7-uek6)
- 5.4.17-2136.340.4.1.el7uek
- 2025-04-01 15:09:00
- 2025-04-02 11:45:06
- K20250401_04
- CVE-2024-42287, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: Complete command early within lock
- CVE: https://linux.oracle.com/cve/CVE-2024-42287.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42287-scsi-qla2xxx-complete-command-early-within-lock.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44954, CVSSv2 Score: 5.5
- Description:
ALSA: line6: Fix racy access to midibuf
- CVE: https://linux.oracle.com/cve/CVE-2024-44954.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44954-alsa-line6-fix-racy-access-to-midibuf.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41091, CVSSv2 Score: 7.1
- Description:
tun: add missing verification for short frame
- CVE: https://linux.oracle.com/cve/CVE-2024-41091.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41090, CVSSv2 Score: 7.1
- Description:
tap: add missing verification for short frame
- CVE: https://linux.oracle.com/cve/CVE-2024-41090.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41070, CVSSv2 Score: 7.8
- Description:
KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()
- CVE: https://linux.oracle.com/cve/CVE-2024-41070.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41070-kvm-ppc-book3s-hv-prevent-uaf-in-kvm-spapr-tce-attach-iommu-group.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42301, CVSSv2 Score: 7.8
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://linux.oracle.com/cve/CVE-2024-42301.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk-5.4.17-2136.335.4.1.el8uek.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41059, CVSSv2 Score: 7.1
- Description:
hfsplus: fix uninit-value in copy_name
- CVE: https://linux.oracle.com/cve/CVE-2024-41059.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41059-hfsplus-fix-uninit-value-in-copy-name.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42313, CVSSv2 Score: 7.8
- Description:
media: venus: fix use after free in vdec_close
- CVE: https://linux.oracle.com/cve/CVE-2024-42313.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42313-media-venus-fix-use-after-free-in-vdec-close.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42285, CVSSv2 Score: 7.8
- Description:
RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
- CVE: https://linux.oracle.com/cve/CVE-2024-42285.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42285-rdma-iwcm-fix-a-use-after-free-related-to-destroying-cm-ids.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43858, CVSSv2 Score: 7.8
- Description:
jfs: Fix array-index-out-of-bounds in diFree
- CVE: https://linux.oracle.com/cve/CVE-2024-43858.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43858-jfs-fix-array-index-out-of-bounds-in-difree.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42284, CVSSv2 Score: 7.8
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://linux.oracle.com/cve/CVE-2024-42284.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42280, CVSSv2 Score: 7.8
- Description:
mISDN: Fix a use after free in hfcmulti_tx()
- CVE: https://linux.oracle.com/cve/CVE-2024-42280.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42280-misdn-fix-a-use-after-free-in-hfcmulti-tx.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42271, CVSSv2 Score: 7.8
- Description:
net/iucv: fix use after free in iucv_sock_close()
- CVE: https://linux.oracle.com/cve/CVE-2024-42271.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42271-net-iucv-fix-use-after-free-in-iucv-sock-close.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43882, CVSSv2 Score: 7.0
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://linux.oracle.com/cve/CVE-2024-43882.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43882-exec-fix-toctou-between-perm-check-and-set-uid-gid-usage.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-46738, CVSSv2 Score: 7.8
- Description:
VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
- CVE: https://linux.oracle.com/cve/CVE-2024-46738.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-46738-vmci-fix-use-after-free-when-removing-resource-in-vmci-resource-remove.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41072, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
- CVE: https://linux.oracle.com/cve/CVE-2024-41072.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41072-wifi-cfg80211-wext-add-extra-siocsiwscan-data-check.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42297, CVSSv2 Score: 5.5
- Description:
f2fs: fix to don't dirty inode for readonly filesystem
- CVE: https://linux.oracle.com/cve/CVE-2024-42297.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42297-f2fs-fix-to-don-t-dirty-inode-for-readonly-filesystem.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42292, CVSSv2 Score: 5.5
- Description:
kobject_uevent: Fix OOB access within zap_modalias_env()
- CVE: https://linux.oracle.com/cve/CVE-2024-42292.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42292-kobject-uevent-fix-oob-access-within-zap-modalias-env.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43856, CVSSv2 Score: 5.5
- Description:
dma: fix call order in dmam_free_coherent
- CVE: https://linux.oracle.com/cve/CVE-2024-43856.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43856-dma-fix-call-order-in-dmam-free-coherent.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42131, CVSSv2 Score: 5.5
- Description:
mm: avoid overflows in dirty throttling logic
- CVE: https://linux.oracle.com/cve/CVE-2024-42131.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42131-mm-avoid-overflows-in-dirty-throttling-logic.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43867, CVSSv2 Score: 5.5
- Description:
drm/nouveau: prime: fix refcount underflow
- CVE: https://linux.oracle.com/cve/CVE-2024-43867.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43867-drm-nouveau-prime-fix-refcount-underflow.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44969, CVSSv2 Score:
- Description:
s390 arch not supported.
- CVE:
- Patch: skipped/CVE-2024-44969.patch
- From:
- CVE-2024-43894, CVSSv2 Score: 5.5
- Description:
drm/client: fix null pointer dereference in drm_client_modeset_probe
- CVE: https://linux.oracle.com/cve/CVE-2024-43894.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43894-drm-client-fix-null-pointer-dereference-in-drm-client-modeset-probe.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43890, CVSSv2 Score: 5.5
- Description:
tracing: Fix overflow in get_free_elt()
- CVE: https://linux.oracle.com/cve/CVE-2024-43890.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43890-tracing-fix-overflow-in-get-free-elt.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44944, CVSSv2 Score: 5.5
- Description:
netfilter: ctnetlink: use helper function to calculate expect ID
- CVE: https://linux.oracle.com/cve/CVE-2024-44944.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44944-netfilter-ctnetlink-use-helper-function-to-calculate-expect-id.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42289, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: During vport delete send async logout explicitly
- CVE: https://linux.oracle.com/cve/CVE-2024-42289.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42289-scsi-qla2xxx-during-vport-delete-send-async-logout-explicitly.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43880, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_erp: Fix object nesting warning
- CVE: https://linux.oracle.com/cve/CVE-2024-43880.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43880-mlxsw-spectrum-acl-erp-fix-object-nesting-warning.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43880, CVSSv2 Score: 5.5
- Description:
mlxsw: spectrum_acl_erp: Fix object nesting warning
- CVE: https://linux.oracle.com/cve/CVE-2024-43880.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43880-mlxsw-spectrum-acl-erp-fix-object-nesting-warning-kpatch.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43846, CVSSv2 Score: 5.5
- Description:
lib: objagg: Fix general protection fault
- CVE: https://linux.oracle.com/cve/CVE-2024-43846.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43846-lib-objagg-fix-general-protection-fault.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42265, CVSSv2 Score: 5.5
- Description:
protect the fetch of ->fd[fd] in do_dup2() from mispredictions
- CVE: https://linux.oracle.com/cve/CVE-2024-42265.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42265-protect-the-fetch-of-fd-fd-in-do-dup2-from-mispredictions.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42283, CVSSv2 Score: 5.5
- Description:
net: nexthop: Initialize all fields in dumped nexthops
- CVE: https://linux.oracle.com/cve/CVE-2024-42283.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42283-net-nexthop-initialize-all-fields-in-dumped-nexthops.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41068, CVSSv2 Score:
- Description:
Out of scope as the patch is for s390 arch only, x86_64 is not affected
- CVE:
- Patch: skipped/CVE-2024-41068.patch
- From:
- CVE-2024-43830, CVSSv2 Score: 5.5
- Description:
leds: trigger: Unregister sysfs attributes before calling deactivate()
- CVE: https://linux.oracle.com/cve/CVE-2024-43830.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43830-leds-trigger-unregister-sysfs-attributes-before-calling-deactivate.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41015, CVSSv2 Score: 5.5
- Description:
ocfs2: add bounds checking to ocfs2_check_dir_entry()
- CVE: https://linux.oracle.com/cve/CVE-2024-41015.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41015-ocfs2-add-bounds-checking-to-ocfs2-check-dir-entry.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42286, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: validate nvme_local_port correctly
- CVE: https://linux.oracle.com/cve/CVE-2024-42286.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42286-scsi-qla2xxx-validate-nvme-local-port-correctly.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42305, CVSSv2 Score: 5.5
- Description:
ext4: check dot and dotdot of dx_root before making dir indexed
- CVE: https://linux.oracle.com/cve/CVE-2024-42305.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42305-ext4-check-dot-and-dotdot-of-dx-root-before-making-dir-indexed.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42306, CVSSv2 Score: 5.5
- Description:
udf: Avoid using corrupted block bitmap buffer
- CVE: https://linux.oracle.com/cve/CVE-2024-42306.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42306-udf-avoid-using-corrupted-block-bitmap-buffer.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42308, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Check for NULL pointer
- CVE: https://linux.oracle.com/cve/CVE-2024-42308.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42308-drm-amd-display-check-for-null-pointer.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42309, CVSSv2 Score: 5.5
- Description:
drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes
- CVE: https://linux.oracle.com/cve/CVE-2024-42309.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42309-drm-gma500-fix-null-pointer-dereference-in-psb-intel-lvds-get-modes.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43893, CVSSv2 Score: 5.5
- Description:
serial: core: check uartclk for zero to avoid divide by zero
- CVE: https://linux.oracle.com/cve/CVE-2024-43893.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43893-serial-core-check-uartclk-for-zero-to-avoid-divide-by-zero.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43908, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: Fix the null pointer dereference to ras_manager
- CVE: https://linux.oracle.com/cve/CVE-2024-43908.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43908-drm-amdgpu-fix-the-null-pointer-dereference-to-ras-manager.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44968, CVSSv2 Score:
- Description:
This CVE was introduced and fixed in the same kernel verison
- CVE:
- Patch: skipped/CVE-2024-44968.patch
- From:
- CVE-2024-43871, CVSSv2 Score: 5.5
- Description:
devres: Fix memory leakage caused by driver API devm_free_percpu()
- CVE: https://linux.oracle.com/cve/CVE-2024-43871.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43871-devres-fix-memory-leakage-caused-by-driver-api-devm-free-percpu.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43883, CVSSv2 Score: 5.5
- Description:
usb: vhci-hcd: Do not drop references before new references are gained
- CVE: https://linux.oracle.com/cve/CVE-2024-43883.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43883-usb-vhci-hcd-do-not-drop-references-before-new-references-are-gained.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44935, CVSSv2 Score: 5.5
- Description:
sctp: Fix null-ptr-deref in reuseport_add_sock().
- CVE: https://linux.oracle.com/cve/CVE-2024-44935.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44935-sctp-fix-null-ptr-deref-in-reuseport-add-sock.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44948, CVSSv2 Score: 5.5
- Description:
x86/mtrr: Check if fixed MTRRs exist before saving them
- CVE: https://linux.oracle.com/cve/CVE-2024-44948.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44948-x86-mtrr-check-if-fixed-mtrrs-exist-before-saving-them.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42288, CVSSv2 Score: 5.5
- Description:
scsi: qla2xxx: Fix for possible memory corruption
- CVE: https://linux.oracle.com/cve/CVE-2024-42288.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42288-scsi-qla2xxx-fix-for-possible-memory-corruption.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43829, CVSSv2 Score: 5.5
- Description:
drm/qxl: Add check for drm_cvt_mode
- CVE: https://linux.oracle.com/cve/CVE-2024-43829.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43829-drm-qxl-add-check-for-drm-cvt-mode.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43861, CVSSv2 Score: 5.5
- Description:
net: usb: qmi_wwan: fix memory leak for not ip packets
- CVE: https://linux.oracle.com/cve/CVE-2024-43861.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43861-net-usb-qmi-wwan-fix-memory-leak-for-not-ip-packets.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43914, CVSSv2 Score: 5.5
- Description:
md/raid5: avoid BUG_ON() while continue reshape after reassembling
- CVE: https://linux.oracle.com/cve/CVE-2024-43914.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43914-md-raid5-avoid-bug-on-while-continue-reshape-after-reassembling.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44960, CVSSv2 Score: 5.5
- Description:
usb: gadget: core: Check for unset descriptor
- CVE: https://linux.oracle.com/cve/CVE-2024-44960.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44960-usb-gadget-core-check-for-unset-descriptor.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-44965, CVSSv2 Score: 5.5
- Description:
x86/mm: Fix pti_clone_pgtable() alignment assumption
- CVE: https://linux.oracle.com/cve/CVE-2024-44965.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-44965-x86-mm-fix-pti-clone-pgtable-alignment-assumption.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43860, CVSSv2 Score: 5.5
- Description:
remoteproc: imx_rproc: Skip over memory region when node value is NULL
- CVE: https://linux.oracle.com/cve/CVE-2024-43860.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43860-remoteproc-imx-rproc-skip-over-memory-region-when-node-value-is-null-5.4.17-2136.335.4.1.el8uek.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42295, CVSSv2 Score: 5.5
- Description:
nilfs2: handle inconsistent state in nilfs_btnode_create_block()
- CVE: https://linux.oracle.com/cve/CVE-2024-42295.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42295-nilfs2-handle-inconsistent-state-in-nilfs-btnode-create-block.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42304, CVSSv2 Score: 5.5
- Description:
ext4: make sure the first directory block is not a hole
- CVE: https://linux.oracle.com/cve/CVE-2024-42304.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42304-ext4-make-sure-the-first-directory-block-is-not-a-hole.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41017, CVSSv2 Score: 5.5
- Description:
jfs: don't walk off the end of ealist
- CVE: https://linux.oracle.com/cve/CVE-2024-41017.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41017-jfs-don-t-walk-off-the-end-of-ealist.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42310, CVSSv2 Score: 5.5
- Description:
drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes
- CVE: https://linux.oracle.com/cve/CVE-2024-42310.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42310-drm-gma500-fix-null-pointer-dereference-in-cdv-intel-lvds-get-modes.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41042, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: prefer nft_chain_validate
- CVE: https://linux.oracle.com/cve/CVE-2024-41042.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41042-netfilter-nf-tables-prefer-nft-chain-validate.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42281, CVSSv2 Score: 5.5
- Description:
bpf: Fix a segment issue when downgrading gso_size
- CVE: https://linux.oracle.com/cve/CVE-2024-42281.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42281-bpf-fix-a-segment-issue-when-downgrading-gso-size.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43879, CVSSv2 Score: 5.5
- Description:
wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he()
- CVE: https://linux.oracle.com/cve/CVE-2024-43879.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43879-wifi-cfg80211-handle-2x996-ru-allocation-in-cfg80211-calculate-bitrate-he.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43839, CVSSv2 Score: 5.5
- Description:
bna: adjust 'name' buf size of bna_tcb and bna_ccb structures
- CVE: https://linux.oracle.com/cve/CVE-2024-43839.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43839-bna-adjust-name-buf-size-of-bna_tcb-and-bna_ccb-structures.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41081, CVSSv2 Score: 5.5
- Description:
ila: block BH in ila_output()
- CVE: https://linux.oracle.com/cve/CVE-2024-41081.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41081-ila-block-bh-in-ila-output.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-41065, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41065.patch
- From:
- CVE-2024-41064, CVSSv2 Score:
- Description:
CVE patch is for powerpc arch only
- CVE:
- Patch: skipped/CVE-2024-41064.patch
- From:
- CVE-2024-41063, CVSSv2 Score: 5.5
- Description:
Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
- CVE: https://linux.oracle.com/cve/CVE-2024-41063.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-41063-bluetooth-hci-core-cancel-all-works-upon-hci-unregister-dev.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42311, CVSSv2 Score: 5.5
- Description:
hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()
- CVE: https://linux.oracle.com/cve/CVE-2024-42311.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42311-hfs-fix-to-initialize-fields-of-hfs-inode-info-after-hfs-alloc-inode.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42276, CVSSv2 Score: 5.5
- Description:
nvme-pci: add missing condition check for existence of mapped data
- CVE: https://linux.oracle.com/cve/CVE-2024-42276.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42276-nvme-pci-add-missing-condition-check-for-existence-of-mapped-data.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42259, CVSSv2 Score: 5.5
- Description:
drm/i915/gem: Fix Virtual Memory mapping boundaries calculation
- CVE: https://linux.oracle.com/cve/CVE-2024-42259.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42259-drm-i915-gem-fix-virtual-memory-mapping-boundaries-calculation.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43841, CVSSv2 Score: 5.5
- Description:
wifi: virt_wifi: avoid reporting connection success with wrong SSID
- CVE: https://linux.oracle.com/cve/CVE-2024-43841.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43841-wifi-virt_wifi-avoid-reporting-connection-success-with-wrong-SSID.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-43841, CVSSv2 Score: 5.5
- Description:
wifi: virt_wifi: avoid reporting connection success with wrong SSID
- CVE: https://linux.oracle.com/cve/CVE-2024-43841.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-43841-wifi-virt_wifi-avoid-reporting-connection-success-with-wrong-SSID-kpatch.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-42290, CVSSv2 Score: 5.5
- Description:
irqchip/imx-irqsteer: Handle runtime power management correctly
- CVE: https://linux.oracle.com/cve/CVE-2024-42290.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-42290-irqchip-imx-irqsteer-handle-runtime-power-management-correctly.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-27397, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: use timestamp to check for set element timeout
- CVE: https://linux.oracle.com/cve/CVE-2024-27397.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-27397-netfilter-nf-tables-use-timestamp-to-check-for-set-element-timeout.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-27397, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: use timestamp to check for set element timeout
- CVE: https://linux.oracle.com/cve/CVE-2024-27397.html
- Patch: oel8-uek6/5.4.17-2136.336.5.1.el8uek/CVE-2024-27397-netfilter-nf-tables-use-timestamp-to-check-for-set-element-timeout-kpatch.patch
- From: 5.4.17-2136.336.5.1.el8uek
- CVE-2024-47674, CVSSv2 Score: 5.5
- Description:
mm: clarify a confusing comment for remap_pfn_range()
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel8-uek6/5.4.17-2136.336.5.3.1.el8uek/CVE-2024-47674-mm-clarify-a-confusing-comment-for-remap_pfn_range.patch
- From: 5.4.17-2136.336.5.3.1.el8uek
- CVE-2024-47674, CVSSv2 Score: 5.5
- Description:
mm: fix ambiguous comments for better code readability
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel8-uek6/5.4.17-2136.336.5.3.1.el8uek/CVE-2024-47674-mm-fix-ambiguous-comments-for-better-code-readability.patch
- From: 5.4.17-2136.336.5.3.1.el8uek
- CVE-2024-47674, CVSSv2 Score: 5.5
- Description:
mm/memory.c: make remap_pfn_range() reject unaligned addr
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel8-uek6/5.4.17-2136.336.5.3.1.el8uek/CVE-2024-47674-mm-memory.c-make-remap_pfn_range-reject-unaligned-addr.patch
- From: 5.4.17-2136.336.5.3.1.el8uek
- CVE-2024-47674, CVSSv2 Score: 5.5
- Description:
mm: add remap_pfn_range_notrack
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel8-uek6/5.4.17-2136.336.5.3.1.el8uek/CVE-2024-47674-mm-add-remap_pfn_range_notrack.patch
- From: 5.4.17-2136.336.5.3.1.el8uek
- CVE-2024-47674, CVSSv2 Score: 5.5
- Description:
mm: avoid leaving partial pfn mappings around in error case
- CVE: https://linux.oracle.com/cve/CVE-2024-47674.html
- Patch: oel8-uek6/5.4.17-2136.336.5.3.1.el8uek/CVE-2024-47674-mm-avoid-leaving-partial-pfn-mappings-around-in-error-case.patch
- From: 5.4.17-2136.336.5.3.1.el8uek
- CVE-2024-46740, CVSSv2 Score: 7.8
- Description:
binder: fix UAF caused by offsets overwrite
- CVE: https://linux.oracle.com/cve/CVE-2024-46740.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46740-binder-fix-uaf-caused-by-offsets-overwrite.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44998, CVSSv2 Score: 7.8
- Description:
atm: idt77252: prevent use after free in dequeue_rx()
- CVE: https://linux.oracle.com/cve/CVE-2024-44998.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44998-atm-idt77252-prevent-use-after-free-in-dequeue-rx.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44999, CVSSv2 Score: 7.1
- Description:
gtp: pull network headers in gtp_dev_xmit()
- CVE: https://linux.oracle.com/cve/CVE-2024-44999.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44999-gtp-pull-network-headers-in-gtp-dev-xmit.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-42228, CVSSv2 Score: 7.0
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://linux.oracle.com/cve/CVE-2024-42228.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling-amdgpu-vce-cs-reloc.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46674, CVSSv2 Score: 7.8
- Description:
usb: dwc3: st: fix probed platform device ref count on probe error path
- CVE: https://linux.oracle.com/cve/CVE-2024-46674.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46674-usb-dwc3-st-fix-probed-platform-device-ref-count-on-probe-error-path.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46673, CVSSv2 Score: 7.8
- Description:
scsi: aacraid: Fix double-free on probe failure
- CVE: https://linux.oracle.com/cve/CVE-2024-46673.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46673-scsi-aacraid-fix-double-free-on-probe-failure.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46818, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Check gpio_id before used as array index
- CVE: https://linux.oracle.com/cve/CVE-2024-46818.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46818-drm-amd-display-check-gpio-id-before-used-as-array-index.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46723, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://linux.oracle.com/cve/CVE-2024-46723.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46722, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix mc_data out-of-bounds read warning
- CVE: https://linux.oracle.com/cve/CVE-2024-46722.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46722-drm-amdgpu-fix-mc-data-out-of-bounds-read-warning.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46782, CVSSv2 Score: 7.8
- Description:
ila: call nf_unregister_net_hooks() sooner
- CVE: https://linux.oracle.com/cve/CVE-2024-46782.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46782-ila-call-nf-unregister-net-hooks-sooner-kpatch.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46756, CVSSv2 Score: 7.8
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46756.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46747, CVSSv2 Score: 7.1
- Description:
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
- CVE: https://linux.oracle.com/cve/CVE-2024-46747.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46747-hid-cougar-fix-slab-out-of-bounds-read-in-cougar-report-fixup.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46743, CVSSv2 Score: 7.1
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://linux.oracle.com/cve/CVE-2024-46743.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46781, CVSSv2 Score:
- Description:
nilfs2 module is not included
- CVE:
- Patch: skipped/CVE-2024-46781.patch
- From:
- CVE-2024-44946, CVSSv2 Score:
- Description:
module is not included
- CVE:
- Patch: skipped/CVE-2024-44946.patch
- From:
- CVE-2024-45026, CVSSv2 Score:
- Description:
Architecture is not supported
- CVE:
- Patch: skipped/CVE-2024-45026.patch
- From:
- CVE-2024-46844, CVSSv2 Score:
- Description:
Architecture um is not supported
- CVE:
- Patch: skipped/CVE-2024-46844.patch
- From:
- CVE-2024-46781, CVSSv2 Score: 5.5
- Description:
nilfs2: fix missing cleanup on rollforward recovery error
- CVE: https://linux.oracle.com/cve/CVE-2024-46781.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46781-Add-BUILD_BUD_ON-for-nilfs-module.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44946, CVSSv2 Score: 5.5
- Description:
kcm: Serialise kcm_sendmsg() for the same socket.
- CVE: https://linux.oracle.com/cve/CVE-2024-44946.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44946-Add-BUILD_BUG_ON-for-kcm-module.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44988, CVSSv2 Score: 5.5
- Description:
net: dsa: mv88e6xxx: Fix out-of-bound access
- CVE: https://linux.oracle.com/cve/CVE-2024-44988.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44988-net-dsa-mv88e6xxx-fix-out-of-bound-access.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46675, CVSSv2 Score: 5.5
- Description:
usb: dwc3: core: Prevent USB core invalid event buffer address access
- CVE: https://linux.oracle.com/cve/CVE-2024-46675.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46675-usb-dwc3-core-prevent-usb-core-invalid-event-buffer-address-access.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-43853, CVSSv2 Score: 5.5
- Description:
cgroup/cpuset: Prevent UAF in proc_cpuset_show()
- CVE: https://linux.oracle.com/cve/CVE-2024-43853.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-43853-cgroup-cpuset-prevent-uaf-in-proc-cpuset-show.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45008, CVSSv2 Score: 5.5
- Description:
Input: MT - limit max slots
- CVE: https://linux.oracle.com/cve/CVE-2024-45008.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45008-input-mt-limit-max-slots.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45025, CVSSv2 Score: 5.5
- Description:
fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE
- CVE: https://linux.oracle.com/cve/CVE-2024-45025.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45025-fix-bitmap-corruption-on-close-range-with-close-range-unshare.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46714, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Skip wbscl_set_scaler_filter if filter is null
- CVE: https://linux.oracle.com/cve/CVE-2024-46714.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46714-drm-amd-display-skip-wbscl-set-scaler-filter-if-filter-is-null.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46719, CVSSv2 Score: 5.5
- Description:
usb: typec: ucsi: Fix null pointer dereference in trace
- CVE: https://linux.oracle.com/cve/CVE-2024-46719.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46719-usb-typec-ucsi-fix-null-pointer-dereference-in-trace.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-47667, CVSSv2 Score: 5.5
- Description:
PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0)
- CVE: https://linux.oracle.com/cve/CVE-2024-47667.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-47667-pci-keystone-add-workaround-for-errata-i2037-am65x-sr-1-0.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44987, CVSSv2 Score: 7.8
- Description:
ipv6: prevent UAF in ip6_send_skb()
- CVE: https://linux.oracle.com/cve/CVE-2024-44987.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44987-ipv6-prevent-uaf-in-ip6-send-skb.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-41011, CVSSv2 Score: 7.8
- Description:
drm/amdkfd: don't allow mapping the MMIO HDP page with large pages
- CVE: https://linux.oracle.com/cve/CVE-2024-41011.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-41011-drm-amdkfd-don-t-allow-mapping-the-mmio-hdp-page-with-large-pages.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46800, CVSSv2 Score: 7.8
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://linux.oracle.com/cve/CVE-2024-46800.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46798, CVSSv2 Score: 7.8
- Description:
ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object
- CVE: https://linux.oracle.com/cve/CVE-2024-46798.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46798-asoc-dapm-fix-uaf-for-snd-soc-pcm-runtime-object.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46759, CVSSv2 Score: 7.8
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46759.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46758, CVSSv2 Score: 7.8
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46758.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46757, CVSSv2 Score: 7.8
- Description:
hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://linux.oracle.com/cve/CVE-2024-46757.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46757-hwmon-nct6775-core-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46744, CVSSv2 Score: 7.8
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://linux.oracle.com/cve/CVE-2024-46744.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46744-squashfs-sanity-check-symbolic-link-size.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46828, CVSSv2 Score: 5.5
- Description:
sched: sch_cake: fix bulk flow accounting logic for host fairness
- CVE: https://linux.oracle.com/cve/CVE-2024-46828.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46828-sched-sch-cake-fix-bulk-flow-accounting-logic-for-host-fairness.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45006, CVSSv2 Score: 5.5
- Description:
xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
- CVE: https://linux.oracle.com/cve/CVE-2024-45006.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45006-xhci-fix-panther-point-null-pointer-deref-at-full-speed-re-enumeration.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-36028, CVSSv2 Score: 5.5
- Description:
mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when dissolve_free_hugetlb_folio()
- CVE: https://linux.oracle.com/cve/CVE-2024-36028.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-36028-mm-hugetlb-fix-debug-locks-warn-on-1-when-dissolve-free-hugetlb-folio.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45016, CVSSv2 Score: 5.5
- Description:
netem: fix return value if duplicate enqueue fails
- CVE: https://linux.oracle.com/cve/CVE-2024-45016.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45016-netem-fix-return-value-if-duplicate-enqueue-fails.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46817, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6
- CVE: https://linux.oracle.com/cve/CVE-2024-46817.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46817-drm-amd-display-stop-amdgpu-dm-initialize-when-stream-nums-greater-than-6.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46815, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[]
- CVE: https://linux.oracle.com/cve/CVE-2024-46815.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46815-drm-amd-display-check-num-valid-sets-before-accessing-reader-wm-sets.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-43854, CVSSv2 Score: 5.5
- Description:
block: initialize integrity buffer to zero before writing it to media
- CVE: https://linux.oracle.com/cve/CVE-2024-43854.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46783, CVSSv2 Score: 5.5
- Description:
tcp_bpf: fix return value of tcp_bpf_sendmsg()
- CVE: https://linux.oracle.com/cve/CVE-2024-46783.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46783-tcp-bpf-fix-return-value-of-tcp-bpf-sendmsg.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46840, CVSSv2 Score: 5.5
- Description:
btrfs: clean up our handling of refs == 0 in snapshot delete
- CVE: https://linux.oracle.com/cve/CVE-2024-46840.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46840-btrfs-clean-up-our-handling-of-refs-0-in-snapshot-delete.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-47668, CVSSv2 Score: 5.5
- Description:
lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
- CVE: https://linux.oracle.com/cve/CVE-2024-47668.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-47668-lib-generic-radix-tree-c-fix-rare-race-in-genradix-ptr-alloc.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-47663, CVSSv2 Score: 5.5
- Description:
staging: iio: frequency: ad9834: Validate frequency parameter value
- CVE: https://linux.oracle.com/cve/CVE-2024-47663.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-47663-staging-iio-frequency-ad9834-validate-frequency-parameter-value.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46679, CVSSv2 Score: 5.5
- Description:
ethtool: check device is present when getting link settings
- CVE: https://linux.oracle.com/cve/CVE-2024-46679.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46679-ethtool-check-device-is-present-when-getting-link-settings.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46755, CVSSv2 Score: 5.5
- Description:
wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()
- CVE: https://linux.oracle.com/cve/CVE-2024-46755.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46755-wifi-mwifiex-do-not-return-unused-priv-in-mwifiex-get-priv-by-id.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46822, CVSSv2 Score: 5.5
- Description:
arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry
- CVE: https://linux.oracle.com/cve/CVE-2024-46822.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46822-arm64-acpi-harden-get-cpu-for-acpi-id-against-missing-cpu-entry.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-49958, CVSSv2 Score: 5.5
- Description:
ocfs2: reserve space for inline xattr before attaching reflink tree
- CVE: https://linux.oracle.com/cve/CVE-2024-49958.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-49958-ocfs2-reserve-space-for-inline-xattr-before-attaching-reflink-tree.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-43884, CVSSv2 Score: 5.5
- Description:
Bluetooth: MGMT: Add error handling to pair_device()
- CVE: https://linux.oracle.com/cve/CVE-2024-43884.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-43884-bluetooth-mgmt-add-error-handling-to-pair-device.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-41098, CVSSv2 Score: 5.5
- Description:
ata: libata-core: Fix null pointer dereference on error
- CVE: https://linux.oracle.com/cve/CVE-2024-41098.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-41098-ata-libata-core-fix-null-pointer-dereference-on-error.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-43835, CVSSv2 Score: 5.5
- Description:
virtio_net: Fix napi_skb_cache_put warning
- CVE: https://linux.oracle.com/cve/CVE-2024-43835.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-43835-virtio-net-fix-napi-skb-cache-put-warning.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2023-31083, CVSSv2 Score: 4.7
- Description:
Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO
- CVE: https://linux.oracle.com/cve/CVE-2023-31083.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2023-31083-bluetooth-hci_ldisc-check-HCI_UART_PROTO_READY-flag-in-HCIUARTGETPROTO.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45028, CVSSv2 Score: 5.5
- Description:
mmc: mmc_test: Fix NULL dereference on allocation failure
- CVE: https://linux.oracle.com/cve/CVE-2024-45028.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45028-mmc-mmc-test-fix-null-dereference-on-allocation-failure.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46677, CVSSv2 Score: 5.5
- Description:
gtp: fix a potential NULL pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2024-46677.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46677-gtp-fix-a-potential-null-pointer-dereference.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46685, CVSSv2 Score: 5.5
- Description:
pinctrl: single: fix potential NULL dereference in pcs_get_function()
- CVE: https://linux.oracle.com/cve/CVE-2024-46685.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46685-pinctrl-single-fix-potential-null-dereference-in-pcs-get-function.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46739, CVSSv2 Score: 5.5
- Description:
uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind
- CVE: https://linux.oracle.com/cve/CVE-2024-46739.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46739-uio-hv-generic-fix-kernel-null-pointer-dereference-in-hv-uio-rescind.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46745, CVSSv2 Score: 5.5
- Description:
Input: uinput - reject requests with unreasonable number of slots
- CVE: https://linux.oracle.com/cve/CVE-2024-46745.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46745-input-uinput-reject-requests-with-unreasonable-number-of-slots.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46750, CVSSv2 Score:
- Description:
Complex adaptation required. Low impact CVE.
- CVE:
- Patch: skipped/CVE-2024-46750.patch
- From:
- CVE-2024-46761, CVSSv2 Score:
- Description:
Out of scope: CVE patch is for PCI Hotplug Driver for PowerPC PowerNV platform
- CVE:
- Patch: skipped/CVE-2024-46761.patch
- From:
- CVE-2024-46771, CVSSv2 Score: 5.5
- Description:
can: bcm: Remove proc entry when dev is unregistered.
- CVE: https://linux.oracle.com/cve/CVE-2024-46771.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46771-can-bcm-remove-proc-entry-when-dev-is-unregistered.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46829, CVSSv2 Score: 5.5
- Description:
rtmutex: Drop rt_mutex::wait_lock before scheduling
- CVE: https://linux.oracle.com/cve/CVE-2024-46829.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46829-rtmutex-Drop-rt_mutex-wait_lock-before-scheduling.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45003, CVSSv2 Score: 5.5
- Description:
vfs: Don't evict inode under the inode lru traversing context
- CVE: https://linux.oracle.com/cve/CVE-2024-45003.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-45003-vfs-don-t-evict-inode-under-the-inode-lru-traversing-context.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46676, CVSSv2 Score: 5.5
- Description:
nfc: pn533: Add poll mod list filling check
- CVE: https://linux.oracle.com/cve/CVE-2024-46676.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46676-nfc-pn533-add-poll-mod-list-filling-check.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46780, CVSSv2 Score: 5.5
- Description:
nilfs2: protect references to superblock parameters exposed in sysfs
- CVE: https://linux.oracle.com/cve/CVE-2024-46780.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46780-nilfs2-protect-references-to-superblock-parameters-exposed-in-sysfs.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-44947, CVSSv2 Score: 5.5
- Description:
fuse: Initialize beyond-EOF page contents before setting uptodate
- CVE: https://linux.oracle.com/cve/CVE-2024-44947.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44947-fuse-initialize-beyond-eof-page-contents-before-setting-uptodate.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-45021, CVSSv2 Score:
- Description:
Patches a function that is sleepable due to a call to vfs_poll
- CVE:
- Patch: skipped/CVE-2024-45021.patch
- From:
- CVE-2024-44995, CVSSv2 Score: 5.5
- Description:
net: hns3: fix a deadlock problem when config TC during resetting
- CVE: https://linux.oracle.com/cve/CVE-2024-44995.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-44995-net-hns3-fix-a-deadlock-problem-when-config-tc-during-resetting.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46721, CVSSv2 Score: 5.5
- Description:
apparmor: fix possible NULL pointer dereference
- CVE: https://linux.oracle.com/cve/CVE-2024-46721.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46721-apparmor-fix-possible-null-pointer-dereference.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-47669, CVSSv2 Score: 5.5
- Description:
nilfs2: fix state management in error path of log writing function
- CVE: https://linux.oracle.com/cve/CVE-2024-47669.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-47669-nilfs2-fix-state-management-in-error-path-of-log-writing-function.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46777, CVSSv2 Score: 5.5
- Description:
udf: Avoid excessive partition lengths
- CVE: https://linux.oracle.com/cve/CVE-2024-46777.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46777-udf-avoid-excessive-partition-lengths.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46737, CVSSv2 Score: 5.5
- Description:
nvmet-tcp: fix kernel crash if commands allocation fails
- CVE: https://linux.oracle.com/cve/CVE-2024-46737.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-46737-nvmet-tcp-fix-kernel-crash-if-commands-allocation-fails.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-26951, CVSSv2 Score: 5.5
- Description:
wireguard: netlink: check for dangling peer via is_dead instead of empty list
- CVE: https://linux.oracle.com/cve/CVE-2024-26951.html
- Patch: oel8-uek6/5.4.17-2136.337.5.el8uek/CVE-2024-26951-wireguard__netlink__check_for_dangling_peer_via_is.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-26885, CVSSv2 Score: 7.8
- Description:
bpf: Fix DEVMAP_HASH overflow check on 32-bit arches
- CVE: https://linux.oracle.com/cve/CVE-2024-26885.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-26885-bpf-fix-devmap-hash-overflow-check-on-32-bit-arches.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47685, CVSSv2 Score: 9.1
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://linux.oracle.com/cve/CVE-2024-47685.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47685-netfilter-nf-reject-ipv6-fix-nf-reject-ip6-tcphdr-put.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-46849, CVSSv2 Score: 7.8
- Description:
ASoC: meson: axg-card: fix 'use-after-free'
- CVE: https://linux.oracle.com/cve/CVE-2024-46849.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-46849-asoc-meson-axg-card-fix-use-after-free.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49995, CVSSv2 Score: 7.8
- Description:
tipc: guard against string buffer overrun
- CVE: https://linux.oracle.com/cve/CVE-2024-49995.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49995-tipc-guard-against-string-buffer-overrun.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49924, CVSSv2 Score: 7.8
- Description:
fbdev: pxafb: Fix possible use after free in pxafb_task()
- CVE: https://linux.oracle.com/cve/CVE-2024-49924.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49924-fbdev-pxafb-fix-possible-use-after-free-in-pxafb-task.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49882, CVSSv2 Score: 7.8
- Description:
ext4: fix double brelse() the buffer of the extents path
- CVE: https://linux.oracle.com/cve/CVE-2024-49882.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49882-ext4-fix-double-brelse-the-buffer-of-the-extents-path.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50074, CVSSv2 Score: 7.8
- Description:
parport: Proper fix for array out-of-bounds access
- CVE: https://linux.oracle.com/cve/CVE-2024-50074.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50074-parport-proper-fix-for-array-out-of-bounds-access-5.4.17-2136.335.4.1.el8uek.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50262, CVSSv2 Score: 7.8
- Description:
bpf: Fix out-of-bounds write in trie_get_next_key()
- CVE: https://linux.oracle.com/cve/CVE-2024-50262.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50262-bpf-fix-out-of-bounds-write-in-trie-get-next-key.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49894, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix index out of bounds in degamma hardware format translation
- CVE: https://linux.oracle.com/cve/CVE-2024-49894.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49894-drm-amd-display-fix-index-out-of-bounds-in-degamma-hardware-format-translation.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47701, CVSSv2 Score: 7.8
- Description:
ext4: avoid OOB when system.data xattr changes underneath the filesystem
- CVE: https://linux.oracle.com/cve/CVE-2024-47701.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47701-ext4-avoid-oob-when-system-data-xattr-changes-underneath-the-filesystem.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47742, CVSSv2 Score: 7.8
- Description:
firmware_loader: Block path traversal
- CVE: https://linux.oracle.com/cve/CVE-2024-47742.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47742-firmware-loader-block-path-traversal.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49967, CVSSv2 Score: 7.8
- Description:
ext4: no need to continue when the number of entries is 1
- CVE: https://linux.oracle.com/cve/CVE-2024-49967.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49967-ext4-no-need-to-continue-when-the-number-of-entries-is-1.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49883, CVSSv2 Score: 7.8
- Description:
ext4: aovid use-after-free in ext4_ext_insert_extent()
- CVE: https://linux.oracle.com/cve/CVE-2024-49883.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49883-ext4-aovid-use-after-free-in-ext4-ext-insert-extent.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50180, CVSSv2 Score: 7.8
- Description:
fbdev: sisfb: Fix strbuf array overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-50180.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50180-fbdev-sisfb-fix-strbuf-array-overflow.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50143, CVSSv2 Score: 7.8
- Description:
udf: fix uninit-value use in udf_get_fileshortad
- CVE: https://linux.oracle.com/cve/CVE-2024-50143.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50143-udf-fix-uninit-value-use-in-udf-get-fileshortad.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50131, CVSSv2 Score: 7.8
- Description:
tracing: Consider the NULL character when validating the event length
- CVE: https://linux.oracle.com/cve/CVE-2024-50131.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50131-tracing-consider-the-null-character-when-validating-the-event-length.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-46853, CVSSv2 Score: 7.8
- Description:
spi: nxp-fspi: fix the KASAN report out-of-bounds bug
- CVE: https://linux.oracle.com/cve/CVE-2024-46853.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-46853-spi-nxp-fspi-fix-the-kasan-report-out-of-bounds-bug.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50127, CVSSv2 Score: 7.8
- Description:
net: sched: fix use-after-free in taprio_change()
- CVE: https://linux.oracle.com/cve/CVE-2024-50127.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50127-net-sched-fix-use-after-free-in-taprio-change.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47670, CVSSv2 Score: 7.8
- Description:
ocfs2: add bounds checking to ocfs2_xattr_find_entry()
- CVE: https://linux.oracle.com/cve/CVE-2024-47670.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47670-ocfs2-add-bounds-checking-to-ocfs2-xattr-find-entry.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47698, CVSSv2 Score: 7.8
- Description:
drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
- CVE: https://linux.oracle.com/cve/CVE-2024-47698.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47698-drivers-media-dvb-frontends-rtl2832-fix-an-out-of-bounds-write-error.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47697, CVSSv2 Score: 7.8
- Description:
drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error
- CVE: https://linux.oracle.com/cve/CVE-2024-47697.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47697-drivers-media-dvb-frontends-rtl2830-fix-an-out-of-bounds-write-error.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50007, CVSSv2 Score: 7.8
- Description:
ALSA: asihpi: Fix potential OOB array access
- CVE: https://linux.oracle.com/cve/CVE-2024-50007.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50007-alsa-asihpi-fix-potential-oob-array-access.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49966, CVSSv2 Score: 7.8
- Description:
ocfs2: cancel dqi_sync_work before freeing oinfo
- CVE: https://linux.oracle.com/cve/CVE-2024-49966.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49966-ocfs2-cancel-dqi-sync-work-before-freeing-oinfo.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50151, CVSSv2 Score: 7.8
- Description:
smb: client: fix OOBs when building SMB2_IOCTL request
- CVE: https://linux.oracle.com/cve/CVE-2024-50151.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50151-smb-client-fix-oobs-when-building-smb2-ioctl-request.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-53059, CVSSv2 Score: 7.8
- Description:
wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
- CVE: https://linux.oracle.com/cve/CVE-2024-53059.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-53059-wifi-iwlwifi-mvm-fix-response-handling-in-iwl-mvm-send-recovery-cmd.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-53057, CVSSv2 Score: 7.8
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://linux.oracle.com/cve/CVE-2024-53057.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-53057-net-sched-stop-qdisc-tree-reduce-backlog-on-tc-h-root.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50230, CVSSv2 Score: 7.8
- Description:
nilfs2: fix kernel bug due to missing clearing of checked flag
- CVE: https://linux.oracle.com/cve/CVE-2024-50230.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50230-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-checked-flag.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49997, CVSSv2 Score: 7.5
- Description:
net: ethernet: lantiq_etop: fix memory disclosure
- CVE: https://linux.oracle.com/cve/CVE-2024-49997.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49997-net-ethernet-lantiq-etop-fix-memory-disclosure.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47723, CVSSv2 Score: 7.1
- Description:
jfs: fix out-of-bounds in dbNextAG() and diAlloc()
- CVE: https://linux.oracle.com/cve/CVE-2024-47723.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47723-jfs-fix-out-of-bounds-in-dbnextag-and-dialloc.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49900, CVSSv2 Score: 7.1
- Description:
jfs: Fix uninit-value access of new_ea in ea_buffer
- CVE: https://linux.oracle.com/cve/CVE-2024-49900.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49900-jfs-fix-uninit-value-access-of-new-ea-in-ea-buffer.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49860, CVSSv2 Score: 7.1
- Description:
ACPI: sysfs: validate return type of _STR method
- CVE: https://linux.oracle.com/cve/CVE-2024-49860.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49860-acpi-sysfs-validate-return-type-of-str-method.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50033, CVSSv2 Score: 7.1
- Description:
slip: make slhc_remember() more robust against malicious packets
- CVE: https://linux.oracle.com/cve/CVE-2024-50033.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50033-slip-make-slhc-remember-more-robust-against-malicious-packets.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50035, CVSSv2 Score: 7.1
- Description:
ppp: fix ppp_async_encode() illegal access
- CVE: https://linux.oracle.com/cve/CVE-2024-50035.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50035-ppp-fix-ppp-async-encode-illegal-access.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47757, CVSSv2 Score: 7.1
- Description:
nilfs2: fix potential oob read in nilfs_btree_check_delete()
- CVE: https://linux.oracle.com/cve/CVE-2024-47757.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47757-nilfs2-fix-potential-oob-read-in-nilfs-btree-check-delete.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-46854, CVSSv2 Score: 7.1
- Description:
net: dpaa: Pad packets to ETH_ZLEN
- CVE: https://linux.oracle.com/cve/CVE-2024-46854.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-46854-net-dpaa-pad-packets-to-eth-zlen.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50234, CVSSv2 Score: 7.0
- Description:
wifi: iwlegacy: Clear stale interrupts before resuming device
- CVE: https://linux.oracle.com/cve/CVE-2024-50234.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50234-wifi-iwlegacy-clear-stale-interrupts-before-resuming-device.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49981, CVSSv2 Score: 7.0
- Description:
media: venus: fix use after free bug in venus_remove due to race condition
- CVE: https://linux.oracle.com/cve/CVE-2024-49981.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49981-media-venus-fix-use-after-free-bug-in-venus-remove-due-to-race-condition.patch
- From: 5.4.17-2136.338.4.1.el7uek
- CVE-2024-50228, CVSSv2 Score:
- Description:
Vendor reverted in d1aa0c04294 as it causes deadlocks
- CVE:
- Patch: skipped/CVE-2024-50228.patch
- From:
- CVE-2024-49903, CVSSv2 Score: 7.0
- Description:
jfs: Fix uaf in dbFreeBits
- CVE: https://linux.oracle.com/cve/CVE-2024-49903.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49903-jfs-fix-uaf-in-dbfreebits.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50059, CVSSv2 Score: 7.0
- Description:
ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition
- CVE: https://linux.oracle.com/cve/CVE-2024-50059.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50059-ntb-ntb-hw-switchtec-fix-use-after-free-vulnerability-in-switchtec-ntb-remove-due-to-race-condition.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47747, CVSSv2 Score: 7.0
- Description:
net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition
- CVE: https://linux.oracle.com/cve/CVE-2024-47747.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47747-net-seeq-fix-use-after-free-vulnerability-in-ether3-driver-due-to-race-condition.patch
- From: 5.4.17-2136.338.4.1.el7uek
- CVE-2024-49982, CVSSv2 Score: 7.8
- Description:
aoe: fix the potential use-after-free problem in more places
- CVE: https://linux.oracle.com/cve/CVE-2024-49982.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49982-aoe-fix-the-potential-use-after-free-problem-in-more-places.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47696, CVSSv2 Score: 7.8
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
- CVE: https://linux.oracle.com/cve/CVE-2024-47696.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47696-rdma-iwcm-fix-warning-at_kernel-workqueue.c-check_flush_dependency.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47696, CVSSv2 Score: 7.8
- Description:
RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency kpatch
- CVE: https://linux.oracle.com/cve/CVE-2024-47696.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47696-rdma-iwcm-fix-warning-at_kernel-workqueue.c-check_flush_dependency-kpatch-5.4.17-2136.336.5.1.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47692, CVSSv2 Score: 6.5
- Description:
nfsd: return -EINVAL when namelen is 0
- CVE: https://linux.oracle.com/cve/CVE-2024-47692.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47692-nfsd-return-einval-when-namelen-is-0.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47692, CVSSv2 Score: 6.5
- Description:
nfsd: enforce upper limit for namelen in __cld_pipe_inprogress_downcall()
- CVE: https://linux.oracle.com/cve/CVE-2024-47692.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47692-nfsd-enforce-upper-limit-for-namelen-in-__cld_pipe_inprogress_downcall.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50251, CVSSv2 Score: 6.2
- Description:
netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
- CVE: https://linux.oracle.com/cve/CVE-2024-50251.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50251-netfilter-nft-payload-sanitize-offset-and-length-before-calling-skb-checksum.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-44931, CVSSv2 Score: 5.5
- Description:
gpio: prevent potential speculation leaks in gpio_device_get_desc()
- CVE: https://linux.oracle.com/cve/CVE-2024-44931.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-44931-gpio-prevent-potential-speculation-leaks-in-gpio-device-get-desc.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47709, CVSSv2 Score: 5.5
- Description:
can: bcm: Clear bo->bcm_proc_read after remove_proc_entry().
- CVE: https://linux.oracle.com/cve/CVE-2024-47709.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47709-can-bcm-clear-bo-bcm-proc-read-after-remove-proc-entry.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47737, CVSSv2 Score: 5.5
- Description:
nfsd: call cache_put if xdr_reserve_space returns NULL
- CVE: https://linux.oracle.com/cve/CVE-2024-47737.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47737-nfsd-call-cache-put-if-xdr-reserve-space-returns-null.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49985, CVSSv2 Score: 5.5
- Description:
i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume
- CVE: https://linux.oracle.com/cve/CVE-2024-49985.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49985-i2c-stm32f7-do-not-prepare-unprepare-clock-during-runtime-suspend-resume.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50117, CVSSv2 Score: 5.5
- Description:
drm/amd: Guard against bad data for ATIF ACPI method
- CVE: https://linux.oracle.com/cve/CVE-2024-50117.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50117-drm-amd-guard-against-bad-data-for-atif-acpi-method.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50117, CVSSv2 Score: 5.5
- Description:
drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported
- CVE: https://linux.oracle.com/cve/CVE-2024-50117.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50117-drm-amdgpu-prevent-NULL-pointer-dereference-if-ATIF-is-not-supported.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49877, CVSSv2 Score: 5.5
- Description:
ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate
- CVE: https://linux.oracle.com/cve/CVE-2024-49877.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49877-ocfs2-fix-possible-null-ptr-deref-in-ocfs2-set-buffer-uptodate.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49957, CVSSv2 Score: 5.5
- Description:
ocfs2: fix null-ptr-deref when journal load failed.
- CVE: https://linux.oracle.com/cve/CVE-2024-49957.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49957-ocfs2-fix-null-ptr-deref-when-journal-load-failed.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50006, CVSSv2 Score: 5.5
- Description:
ext4: fix i_data_sem unlock order in ext4_ind_migrate()
- CVE: https://linux.oracle.com/cve/CVE-2024-50006.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50006-ext4-fix-i-data-sem-unlock-order-in-ext4-ind-migrate.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-41016, CVSSv2 Score: 5.5
- Description:
ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
- CVE: https://linux.oracle.com/cve/CVE-2024-41016.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-41016-ocfs2-strict-bound-check-before-memcmp-in-ocfs2-xattr-find-entry.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47749, CVSSv2 Score: 5.5
- Description:
RDMA/cxgb4: Added NULL check for lookup_atid
- CVE: https://linux.oracle.com/cve/CVE-2024-47749.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47749-rdma-cxgb4-added-null-check-for-lookup-atid.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49878, CVSSv2 Score: 5.5
- Description:
resource: fix region_intersects() vs add_memory_driver_managed()
- CVE: https://linux.oracle.com/cve/CVE-2024-49878.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49878-resource-fix-region-intersects-vs-add-memory-driver-managed.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49879, CVSSv2 Score: 5.5
- Description:
drm: omapdrm: Add missing check for alloc_ordered_workqueue
- CVE: https://linux.oracle.com/cve/CVE-2024-49879.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49879-drm-omapdrm-add-missing-check-for-alloc-ordered-workqueue.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49938, CVSSv2 Score: 5.5
- Description:
wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
- CVE: https://linux.oracle.com/cve/CVE-2024-49938.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49938-wifi-ath9k-htc-use-skb-set-length-for-resetting-urb-before-resubmit.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49952, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: prevent nf_skb_duplicated corruption
- CVE: https://linux.oracle.com/cve/CVE-2024-49952.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49952-netfilter-nf-tables-prevent-nf-skb-duplicated-corruption.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50008, CVSSv2 Score: 5.5
- Description:
wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext()
- CVE: https://linux.oracle.com/cve/CVE-2024-50008.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50008-wifi-mwifiex-fix-memcpy-field-spanning-write-warning-in-mwifiex-cmd-802-11-scan-ext.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50218, CVSSv2 Score: 5.5
- Description:
ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow
- CVE: https://linux.oracle.com/cve/CVE-2024-50218.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50218-ocfs2-pass-u64-to-ocfs2-truncate-inline-maybe-overflow.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50233, CVSSv2 Score: 5.5
- Description:
staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg()
- CVE: https://linux.oracle.com/cve/CVE-2024-50233.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50233-staging-iio-frequency-ad9832-fix-division-by-zero-in-ad9832-calc-freqreg.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50167, CVSSv2 Score: 5.5
- Description:
be2net: fix potential memory leak in be_xmit()
- CVE: https://linux.oracle.com/cve/CVE-2024-50167.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50167-be2net-fix-potential-memory-leak-in-be-xmit.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50171, CVSSv2 Score: 5.5
- Description:
net: systemport: fix potential memory leak in bcm_sysport_xmit()
- CVE: https://linux.oracle.com/cve/CVE-2024-50171.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50171-net-systemport-fix-potential-memory-leak-in-bcm-sysport-xmit.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50195, CVSSv2 Score: 5.5
- Description:
posix-clock: Fix missing timespec64 check in pc_clock_settime()
- CVE: https://linux.oracle.com/cve/CVE-2024-50195.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50195-posix-clock-Fix-missing-timespec64-check-in-pc_clock_settime.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50210, CVSSv2 Score: 5.5
- Description:
posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime()
- CVE: https://linux.oracle.com/cve/CVE-2024-50210.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50210-posix-clock-posix-clock-fix-unbalanced-locking-in-pc-clock-settime.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50040, CVSSv2 Score: 5.5
- Description:
igb: Do not bring the device up after non-fatal error
- CVE: https://linux.oracle.com/cve/CVE-2024-50040.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50040-igb-do-not-bring-the-device-up-after-non-fatal-error.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-26921, CVSSv2 Score:
- Description:
Live-patching will introduce network performance degradation in the best case scenario, or even some more serious issues. N/A or Low cvss3 score from NVD or vendors.
- CVE:
- Patch: skipped/CVE-2024-26921.patch
- From:
- CVE-2024-49867, CVSSv2 Score: 5.5
- Description:
btrfs: wait for fixup workers before stopping cleaner kthread during umount
- CVE: https://linux.oracle.com/cve/CVE-2024-49867.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49867-btrfs-wait-for-fixup-workers-before-stopping-cleaner-kthread-during-umount.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50082, CVSSv2 Score: 5.5
- Description:
blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race
- CVE: https://linux.oracle.com/cve/CVE-2024-50082.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50082-blk-rq-qos-fix-crash-on-rq-qos-wait-vs-rq-qos-wake-function-race.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50142, CVSSv2 Score: 5.5
- Description:
xfrm: validate new SA's prefixlen using SA family when sel.family is unset
- CVE: https://linux.oracle.com/cve/CVE-2024-50142.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50142-xfrm-validate-new-sa-s-prefixlen-using-sa-family-when-sel-family-is-unset.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50229, CVSSv2 Score: 5.5
- Description:
nilfs2: fix potential deadlock with newly created symlinks
- CVE: https://linux.oracle.com/cve/CVE-2024-50229.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50229-nilfs2-fix-potential-deadlock-with-newly-created-symlinks.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50039, CVSSv2 Score: 5.5
- Description:
net/sched: accept TCA_STAB only for root qdisc
- CVE: https://linux.oracle.com/cve/CVE-2024-50039.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50039-net-sched-accept-tca-stab-only-for-root-qdisc.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50039, CVSSv2 Score: 5.5
- Description:
net/sched: accept TCA_STAB only for root qdisc
- CVE: https://linux.oracle.com/cve/CVE-2024-50039.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50039-net-sched-accept-tca-stab-only-for-root-qdisc-kpatch.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47672, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead
- CVE: https://linux.oracle.com/cve/CVE-2024-47672.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47672-wifi-iwlwifi-mvm-don-t-wait-for-tx-queues-if-firmware-is-dead.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49851, CVSSv2 Score: 5.5
- Description:
tpm: Clean up TPM space after command failure
- CVE: https://linux.oracle.com/cve/CVE-2024-49851.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49851-tpm-clean-up-tpm-space-after-command-failure.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47756, CVSSv2 Score: 5.5
- Description:
PCI: keystone: Fix if-statement expression in ks_pcie_quirk()
- CVE: https://linux.oracle.com/cve/CVE-2024-47756.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47756-pci-keystone-fix-if-statement-expression-in-ks-pcie-quirk.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50179, CVSSv2 Score: 5.5
- Description:
ceph: remove the incorrect Fw reference check when dirtying pages
- CVE: https://linux.oracle.com/cve/CVE-2024-50179.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50179-ceph-remove-the-incorrect-fw-reference-check-when-dirtying-pages.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49948, CVSSv2 Score: 5.5
- Description:
net: add more sanity checks to qdisc_pkt_len_init()
- CVE: https://linux.oracle.com/cve/CVE-2024-49948.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49948-net-add-more-sanity-checks-to-qdisc-pkt-len-init.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49902, CVSSv2 Score: 5.5
- Description:
jfs: check if leafidx greater than num leaves per dmap tree
- CVE: https://linux.oracle.com/cve/CVE-2024-49902.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49902-jfs-check-if-leafidx-greater-than-num-leaves-per-dmap-tree.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49965, CVSSv2 Score: 5.5
- Description:
ocfs2: remove unreasonable unlock in ocfs2_read_blocks
- CVE: https://linux.oracle.com/cve/CVE-2024-49965.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49965-ocfs2-remove-unreasonable-unlock-in-ocfs2-read-blocks.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50199, CVSSv2 Score: 5.5
- Description:
mm/swapfile: skip HugeTLB pages for unuse_vma
- CVE: https://linux.oracle.com/cve/CVE-2024-50199.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50199-mm-swapfile-skip-hugetlb-pages-for-unuse-vma.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49896, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Check stream before comparing them
- CVE: https://linux.oracle.com/cve/CVE-2024-49896.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49896-drm-amd-display-check-stream-before-comparing-them.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50202, CVSSv2 Score: 5.5
- Description:
nilfs2: propagate directory read errors from nilfs_find_entry()
- CVE: https://linux.oracle.com/cve/CVE-2024-50202.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50202-nilfs2-propagate-directory-read-errors-from-nilfs-find-entry.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47699, CVSSv2 Score: 5.5
- Description:
nilfs2: fix potential null-ptr-deref in nilfs_btree_insert()
- CVE: https://linux.oracle.com/cve/CVE-2024-47699.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47699-nilfs2-fix-potential-null-ptr-deref-in-nilfs-btree-insert.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49949, CVSSv2 Score: 5.5
- Description:
net: avoid potential underflow in qdisc_pkt_len_init() with UFO
- CVE: https://linux.oracle.com/cve/CVE-2024-49949.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49949-net-avoid-potential-underflow-in-qdisc-pkt-len-init-with-ufo.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49962, CVSSv2 Score: 5.5
- Description:
ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package()
- CVE: https://linux.oracle.com/cve/CVE-2024-49962.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49962-acpica-check-null-return-of-acpi-allocate-zeroed-in-acpi-db-convert-to-package.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49955, CVSSv2 Score: 5.5
- Description:
ACPI: battery: Fix possible crash when unregistering a battery hook
- CVE: https://linux.oracle.com/cve/CVE-2024-49955.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49955-acpi-battery-fix-possible-crash-when-unregistering-a-battery-hook.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50045, CVSSv2 Score: 5.5
- Description:
netfilter: br_netfilter: fix panic with metadata_dst skb
- CVE: https://linux.oracle.com/cve/CVE-2024-50045.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50045-netfilter-br-netfilter-fix-panic-with-metadata-dst-skb.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50096, CVSSv2 Score: 5.5
- Description:
nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error
- CVE: https://linux.oracle.com/cve/CVE-2024-50096.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50096-nouveau-dmem-fix-vulnerability-in-migrate-to-ram-upon-copy-error.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-40953, CVSSv2 Score: 5.5
- Description:
KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()
- CVE: https://linux.oracle.com/cve/CVE-2024-40953.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-40953-kvm-fix-a-data-race-on-last-boosted-vcpu-in-kvm-vcpu-on-spin.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50194, CVSSv2 Score:
- Description:
Out of scope as the patch is for arm64 arch only, x86_64 not affected
- CVE:
- Patch: skipped/CVE-2024-50194.patch
- From:
- CVE-2024-53060, CVSSv2 Score:
- Description:
Current kernel is not vulnerable.
- CVE:
- Patch: skipped/CVE-2024-53060.patch
- From:
- CVE-2024-26734, CVSSv2 Score:
- Description:
Affects only boot __init stage, already booted kernels are not affected
- CVE:
- Patch: skipped/CVE-2024-26734.patch
- From:
- CVE-2024-49944, CVSSv2 Score: 5.5
- Description:
sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start
- CVE: https://linux.oracle.com/cve/CVE-2024-49944.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49944-sctp-set-sk-state-back-to-closed-if-autobind-fails-in-sctp-listen-start.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49944, CVSSv2 Score: 5.5
- Description:
sctp: ensure sk_state is set to CLOSED if hashing fails in sctp_listen_start
- CVE: https://linux.oracle.com/cve/CVE-2024-49944.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49944-sctp-ensure-sk_state-is-set-to-CLOSED-if-hashing-fails-in-sctp_listen_start.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50024, CVSSv2 Score: 5.5
- Description:
net: Fix an unsafe loop on the list
- CVE: https://linux.oracle.com/cve/CVE-2024-50024.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50024-net-fix-an-unsafe-loop-on-the-list.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50116, CVSSv2 Score: 5.5
- Description:
nilfs2: fix kernel bug due to missing clearing of buffer delay flag
- CVE: https://linux.oracle.com/cve/CVE-2024-50116.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50116-nilfs2-fix-kernel-bug-due-to-missing-clearing-of-buffer-delay-flag.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50168, CVSSv2 Score: 5.5
- Description:
net/sun3_82586: fix potential memory leak in sun3_82586_send_packet()
- CVE: https://linux.oracle.com/cve/CVE-2024-50168.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50168-net-sun3-82586-fix-potential-memory-leak-in-sun3-82586-send-packet.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50236, CVSSv2 Score: 5.5
- Description:
wifi: ath10k: Fix memory leak in management tx
- CVE: https://linux.oracle.com/cve/CVE-2024-50236.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50236-wifi-ath10k-fix-memory-leak-in-management-tx.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47671, CVSSv2 Score: 5.5
- Description:
USB: usbtmc: prevent kernel-usb-infoleak
- CVE: https://linux.oracle.com/cve/CVE-2024-47671.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47671-usb-usbtmc-prevent-kernel-usb-infoleak.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49892, CVSSv2 Score: 5.5
- Description:
drm/amd/display: Initialize get_bytes_per_element's default to 1
- CVE: https://linux.oracle.com/cve/CVE-2024-49892.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49892-drm-amd-display-initialize-get-bytes-per-element-s-default-to-1.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50044, CVSSv2 Score: 5.5
- Description:
Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change
- CVE: https://linux.oracle.com/cve/CVE-2024-50044.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50044-bluetooth-rfcomm-fix-possible-deadlock-in-rfcomm-sk-state-change.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-53097, CVSSv2 Score:
- Description:
Kernel is not vulnerable
- CVE:
- Patch: skipped/CVE-2024-53097.patch
- From:
- CVE-2024-42229, CVSSv2 Score: 4.1
- Description:
crypto: aead,cipher - zeroize key buffer after use
- CVE: https://linux.oracle.com/cve/CVE-2024-42229.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-42229-crypto-aead-cipher-zeroize-key-buffer-after-use.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49868, CVSSv2 Score: 5.5
- Description:
btrfs: fix a NULL pointer dereference when failed to start a new trasacntion
- CVE: https://linux.oracle.com/cve/CVE-2024-49868.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49868-btrfs-fix-a-null-pointer-dereference-when-failed-to-start-a-new-trasacntion.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50184, CVSSv2 Score: 5.5
- Description:
virtio_pmem: Check device status before requesting flush
- CVE: https://linux.oracle.com/cve/CVE-2024-50184.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50184-virtio-pmem-check-device-status-before-requesting-flush.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50148, CVSSv2 Score: 5.5
- Description:
Bluetooth: bnep: fix wild-memory-access in proto_unregister
- CVE: https://linux.oracle.com/cve/CVE-2024-50148.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50148-bluetooth-bnep-fix-wild-memory-access-in-proto-unregister.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50148, CVSSv2 Score: 5.5
- Description:
Bluetooth: bnep: fix wild-memory-access in proto_unregister kpatch
- CVE: https://linux.oracle.com/cve/CVE-2024-50148.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50148-bluetooth-bnep-fix-wild-memory-access-in-proto-unregister-kpatch.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49963, CVSSv2 Score:
- Description:
Out of scope as the patch is for arm64 arch only, x86_64 not affected
- CVE:
- Patch: skipped/CVE-2024-49963.patch
- From:
- CVE-2024-50134, CVSSv2 Score: 5.5
- Description:
drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA
- CVE: https://linux.oracle.com/cve/CVE-2024-50134.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50134-drm-vboxvideo-replace-fake-vla-at-end-of-vbva_mouse_pointer_shape-with-real-vla.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47679, CVSSv2 Score: 5.5
- Description:
vfs: fix race between evice_inodes() and find_inode()&iput()
- CVE: https://linux.oracle.com/cve/CVE-2024-47679.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47679-vfs-fix-race-between-evice_inodes-and-find_inode-iput.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47684, CVSSv2 Score: 5.5
- Description:
tcp: check skb is non-NULL in tcp_rto_delta_us()
- CVE: https://linux.oracle.com/cve/CVE-2024-47684.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47684-tcp-check-skb-is-non-NULL-in-tcp_rto_delta_us.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47712, CVSSv2 Score: 5.5
- Description:
wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param
- CVE: https://linux.oracle.com/cve/CVE-2024-47712.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47712-wifi-wilc1000-fix-potential-RCU-dereference-issue-in-wilc_parse_join_bss_param.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47713, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()
- CVE: https://linux.oracle.com/cve/CVE-2024-47713.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47713-wifi-mac80211-use-two-phase-skb-reclamation-in-ieee80211_do_stop.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47740, CVSSv2 Score: 5.5
- Description:
f2fs: Require FMODE_WRITE for atomic write ioctls
- CVE: https://linux.oracle.com/cve/CVE-2024-47740.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47740-f2fs-Require-FMODE_WRITE-for-atomic-write-ioctls.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50205, CVSSv2 Score: 5.5
- Description:
ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()
- CVE: https://linux.oracle.com/cve/CVE-2024-50205.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50205-ALSA-firewire-lib-Avoid-division-by-zero-in-apply_constraint_to_size.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50237, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
- CVE: https://linux.oracle.com/cve/CVE-2024-50237.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50237-wifi-mac80211-do-not-pass-a-stopped-vif-to-the-driver-in-.get_txpower.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-50089, CVSSv2 Score:
- Description:
This CVE was rejected and fix reverted.
- CVE:
- Patch: skipped/CVE-2024-50089.patch
- From:
- CVE-2024-50099, CVSSv2 Score: 5.5
- Description:
arm64: probes: Remove broken LDR (literal) uprobe support
- CVE: https://linux.oracle.com/cve/CVE-2024-50099.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-50099-arm64-probes-Remove-broken-LDR-literal-uprobe-suppor.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-47710, CVSSv2 Score: 5.5
- Description:
sock_map: Add a cond_resched() in sock_hash_free()
- CVE: https://linux.oracle.com/cve/CVE-2024-47710.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-47710-sock_map-Add-a-cond_resched-in-sock_hash_free.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-49959, CVSSv2 Score: 5.5
- Description:
jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error
- CVE: https://linux.oracle.com/cve/CVE-2024-49959.html
- Patch: oel8-uek6/5.4.17-2136.338.4.1.el8uek/CVE-2024-49959-jbd2-stop-waiting-for-space-when-jbd2-cleanup-journal-tail-returns-error.patch
- From: 5.4.17-2136.338.4.1.el8uek
- CVE-2024-56644, CVSSv2 Score: 5.5
- Description:
net/ipv6: release expired exception dst cached in socket
- CVE: https://linux.oracle.com/cve/CVE-2024-56644.html
- Patch: oel8-uek6/5.4.17-2136.339.5.el8uek/CVE-2024-56644-net-ipv6-release-expired-exception-dst-cached-in-socket.patch
- From: 5.4.17-2136.339.5.el8uek
- n/a, CVSSv2 Score: n/a
- Description:
x86/xen: Add xenpv_restore_regs_and_return_to_usermode()
- CVE: n/a
- Patch: 5.4.17/x86-xen-Add-xenpv_restore_regs_and_return_to_usermode.patch
- From: v5.16
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add alt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-alt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
kpatch add paravirt asm definitions
- CVE: N/A
- Patch: 5.11.0/kpatch-add-paravirt-asm-definitions.patch
- From: N/A
- N/A, CVSSv2 Score: N/A
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 4.15.0/proc-restrict-pagemap-access.patch
- From: N/A
- CVE-2024-38538, CVSSv2 Score: 7.1
- Description:
net: bridge: xmit: make sure we have at least eth header len bytes
- CVE: https://linux.oracle.com/cve/CVE-2024-38538.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-38538-net-bridge-xmit-make-sure-we-have-at-least-eth-header-len-bytes.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50279, CVSSv2 Score: 7.1
- Description:
dm cache: fix out-of-bounds access to the dirty bitset when resizing
- CVE: https://linux.oracle.com/cve/CVE-2024-50279.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50279-dm-cache-fix-out-of-bounds-access-to-the-dirty-bitset-when-resizing.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50278, CVSSv2 Score: 7.1
- Description:
dm cache: optimize dirty bit checking with find_next_bit when resizing
- CVE: https://linux.oracle.com/cve/CVE-2024-50278.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50278-dm-cache-optimize-dirty-bit-checking-with-find_next_.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50278, CVSSv2 Score: 7.1
- Description:
dm cache: fix potential out-of-bounds access on the first resume
- CVE: https://linux.oracle.com/cve/CVE-2024-50278.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50278-dm-cache-fix-potential-out-of-bounds-access-on-the-first-resume.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50301, CVSSv2 Score: 7.1
- Description:
security/keys: fix slab-out-of-bounds in key_task_permission
- CVE: https://linux.oracle.com/cve/CVE-2024-50301.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50301-security-keys-fix-slab-out-of-bounds-in-key-task-permission.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53150, CVSSv2 Score: 7.1
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://linux.oracle.com/cve/CVE-2024-53150.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56650, CVSSv2 Score: 7.1
- Description:
netfilter: x_tables: fix LED ID check in led_tg_check()
- CVE: https://linux.oracle.com/cve/CVE-2024-56650.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56650-netfilter-x-tables-fix-led-id-check-in-led-tg-check.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53155, CVSSv2 Score: 7.1
- Description:
ocfs2: fix uninitialized value in ocfs2_file_read_iter()
- CVE: https://linux.oracle.com/cve/CVE-2024-53155.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53155-ocfs2-fix-uninitialized-value-in-ocfs2-file-read-iter.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53061, CVSSv2 Score: 7.8
- Description:
media: s5p-jpeg: prevent buffer overflows
- CVE: https://linux.oracle.com/cve/CVE-2024-53061.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53061-media-s5p-jpeg-prevent-buffer-overflows.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53104, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://linux.oracle.com/cve/CVE-2024-53104.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53104-media-uvcvideo-skip-parsing-frames-of-type-uvc-vs-undefined-in-uvc-parse-format.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50269, CVSSv2 Score: 7.8
- Description:
usb: musb: sunxi: Fix accessing an released usb phy
- CVE: https://linux.oracle.com/cve/CVE-2024-50269.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50269-usb-musb-sunxi-fix-accessing-an-released-usb-phy.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50267, CVSSv2 Score: 7.8
- Description:
USB: serial: io_edgeport: fix use after free in debug printk
- CVE: https://linux.oracle.com/cve/CVE-2024-50267.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50267-usb-serial-io-edgeport-fix-use-after-free-in-debug-printk.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53103, CVSSv2 Score: 7.8
- Description:
hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
- CVE: https://linux.oracle.com/cve/CVE-2024-53103.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53103-hv-sock-initializing-vsk-trans-to-null-to-prevent-a-dangling-pointer.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50264, CVSSv2 Score: 7.8
- Description:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
- CVE: https://linux.oracle.com/cve/CVE-2024-50264.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50264-vsock-virtio-initialization-of-the-dangling-pointer-occurring-in-vsk-trans.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-49996, CVSSv2 Score: 7.8
- Description:
cifs: Fix buffer overflow when parsing NFS reparse points
- CVE: https://linux.oracle.com/cve/CVE-2024-49996.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-49996-cifs-fix-buffer-overflow-when-parsing-nfs-reparse-points.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53141, CVSSv2 Score: 7.8
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://linux.oracle.com/cve/CVE-2024-53141.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53141-netfilter-ipset-add-missing-range-check-in-bitmap-ip-uadt.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50282, CVSSv2 Score:
- Description:
Kernel is not affected
- CVE:
- Patch: skipped/CVE-2024-50282.patch
- From:
- CVE-2024-53156, CVSSv2 Score: 7.8
- Description:
wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
- CVE: https://linux.oracle.com/cve/CVE-2024-53156.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53156-wifi-ath9k-add-range-check-for-conn-rsp-epid-in-htc-connect-service.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53173, CVSSv2 Score: 7.8
- Description:
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
- CVE: https://linux.oracle.com/cve/CVE-2024-53173.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53173-nfsv4-0-fix-a-use-after-free-problem-in-the-asynchronous-open.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56704, CVSSv2 Score: 7.8
- Description:
9p/xen: fix release of IRQ
- CVE: https://linux.oracle.com/cve/CVE-2024-56704.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56704-9p-xen-fix-release-of-irq.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53165, CVSSv2 Score:
- Description:
Out of scope: SuperH architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53165.patch
- From:
- CVE-2024-56642, CVSSv2 Score: 7.8
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://linux.oracle.com/cve/CVE-2024-56642.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56661, CVSSv2 Score: 5.5
- Description:
tipc: fix NULL deref in cleanup_bearer()
- CVE: https://linux.oracle.com/cve/CVE-2024-56661.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56661-tipc-fix-NULL-deref-in-cleanup_bearer.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56606, CVSSv2 Score: 7.8
- Description:
af_packet: avoid erroring out after sock_init_data() in packet_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56606.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56606-af-packet-avoid-erroring-out-after-sock-init-data-in-packet-create.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56605, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56605.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56605-bluetooth-l2cap-do-not-leave-dangling-sk-pointer-on-error-in-l2cap-sock-create.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56605, CVSSv2 Score: 7.8
- Description:
Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc
- CVE: https://linux.oracle.com/cve/CVE-2024-56605.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56605-Bluetooth-L2CAP-handle-NULL-sock-pointer-in-l2cap_sock_alloc.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56601, CVSSv2 Score: 7.8
- Description:
net: inet: do not leave a dangling sk pointer in inet_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56601.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56601-net-inet-do-not-leave-a-dangling-sk-pointer-in-inet-create.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56615, CVSSv2 Score: 7.8
- Description:
bpf: fix OOB devmap writes when deleting elements
- CVE: https://linux.oracle.com/cve/CVE-2024-56615.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56615-bpf-fix-oob-devmap-writes-when-deleting-elements.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53142, CVSSv2 Score:
- Description:
Patch affects initramfs
- CVE:
- Patch: skipped/CVE-2024-53142.patch
- From:
- CVE-2024-53227, CVSSv2 Score: 7.8
- Description:
scsi: bfa: Fix use-after-free in bfad_im_module_exit()
- CVE: https://linux.oracle.com/cve/CVE-2024-53227.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53227-scsi-bfa-fix-use-after-free-in-bfad-im-module-exit.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53171, CVSSv2 Score: 7.8
- Description:
ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit
- CVE: https://linux.oracle.com/cve/CVE-2024-53171.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53171-ubifs-authentication-fix-use-after-free-in-ubifs-tnc-end-commit.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56603, CVSSv2 Score: 7.8
- Description:
net: af_can: do not leave a dangling sk pointer in can_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56603.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56603-net-af-can-do-not-leave-a-dangling-sk-pointer-in-can-create.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56596, CVSSv2 Score: 7.8
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://linux.oracle.com/cve/CVE-2024-56596.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56595, CVSSv2 Score: 7.8
- Description:
jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
- CVE: https://linux.oracle.com/cve/CVE-2024-56595.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56595-jfs-add-a-check-to-prevent-array-index-out-of-bounds-in-dbadjtree.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56598, CVSSv2 Score: 7.8
- Description:
jfs: array-index-out-of-bounds fix in dtReadFirst
- CVE: https://linux.oracle.com/cve/CVE-2024-56598.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56598-jfs-array-index-out-of-bounds-fix-in-dtreadfirst.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56602, CVSSv2 Score: 7.8
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56602.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56600, CVSSv2 Score: 7.8
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://linux.oracle.com/cve/CVE-2024-56600.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56581, CVSSv2 Score: 7.8
- Description:
btrfs: ref-verify: fix use-after-free after invalid ref action
- CVE: https://linux.oracle.com/cve/CVE-2024-56581.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56581-btrfs-ref-verify-fix-use-after-free-after-invalid-ref-action.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53239, CVSSv2 Score: 7.8
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://linux.oracle.com/cve/CVE-2024-53239.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53239-ALSA-6fire-Release-resources-at-card-release.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53239, CVSSv2 Score: 7.8
- Description:
ALSA: 6fire: Release resources at card release
- CVE: https://linux.oracle.com/cve/CVE-2024-53239.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53239-ALSA-6fire-Release-resources-at-card-release-kpatch.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53240, CVSSv2 Score: 6.8
- Description:
xen/netfront: fix crash when removing device
- CVE: https://linux.oracle.com/cve/CVE-2024-53240.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53240-xen-netfront-fix-crash-when-removing-device.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50302, CVSSv2 Score: 6.1
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://linux.oracle.com/cve/CVE-2024-50302.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50302-hid-core-zero-initialize-the-report-buffer.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53101, CVSSv2 Score: 5.5
- Description:
fs: Fix uninitialized value issue in from_kuid and from_kgid
- CVE: https://linux.oracle.com/cve/CVE-2024-53101.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53101-fs-fix-uninitialized-value-issue-in-from-kuid-and-from-kgid.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53131, CVSSv2 Score: 5.5
- Description:
nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
- CVE: https://linux.oracle.com/cve/CVE-2024-53131.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53131-nilfs2-fix-null-ptr-deref-in-block-touch-buffer-tracepoint.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50287, CVSSv2 Score: 5.5
- Description:
media: v4l2-tpg: prevent the risk of a division by zero
- CVE: https://linux.oracle.com/cve/CVE-2024-50287.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50287-media-v4l2-tpg-prevent-the-risk-of-a-division-by-zero.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50290, CVSSv2 Score: 5.5
- Description:
media: cx24116: prevent overflows on SNR calculus
- CVE: https://linux.oracle.com/cve/CVE-2024-50290.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50290-media-cx24116-prevent-overflows-on-snr-calculus.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50273, CVSSv2 Score: 5.5
- Description:
btrfs: reinitialize delayed ref list after deleting it from the list
- CVE: https://linux.oracle.com/cve/CVE-2024-50273.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50273-btrfs-reinitialize-delayed-ref-list-after-deleting-it-from-the-list.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50299, CVSSv2 Score: 5.5
- Description:
sctp: properly validate chunk size in sctp_sf_ootb()
- CVE: https://linux.oracle.com/cve/CVE-2024-50299.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50299-sctp-properly-validate-chunk-size-in-sctp-sf-ootb.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-50296, CVSSv2 Score: 5.5
- Description:
net: hns3: fix kernel crash when uninstalling driver
- CVE: https://linux.oracle.com/cve/CVE-2024-50296.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-50296-net-hns3-fix-kernel-crash-when-uninstalling-driver.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53063, CVSSv2 Score: 5.5
- Description:
media: dvbdev: prevent the risk of out of memory access
- CVE: https://linux.oracle.com/cve/CVE-2024-53063.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53063-media-dvbdev-prevent-the-risk-of-out-of-memory-access.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53066, CVSSv2 Score: 5.5
- Description:
nfs: Fix KMSAN warning in decode_getfattr_attrs()
- CVE: https://linux.oracle.com/cve/CVE-2024-53066.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53066-nfs-fix-kmsan-warning-in-decode-getfattr-attrs.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53112, CVSSv2 Score: 5.5
- Description:
ocfs2: uncache inode which has failed entering the group
- CVE: https://linux.oracle.com/cve/CVE-2024-53112.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53112-ocfs2-uncache-inode-which-has-failed-entering-the-group.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53130, CVSSv2 Score: 5.5
- Description:
nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint
- CVE: https://linux.oracle.com/cve/CVE-2024-53130.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53130-nilfs2-fix-null-ptr-deref-in-block-dirty-buffer-tracepoint.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53217, CVSSv2 Score: 5.5
- Description:
NFSD: Prevent NULL dereference in nfsd4_process_cb_update()
- CVE: https://linux.oracle.com/cve/CVE-2024-53217.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53217-nfsd-prevent-null-dereference-in-nfsd4-process-cb-update.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53217, CVSSv2 Score: 5.5
- Description:
nfsd: restore callback functionality for NFSv4.0
- CVE: https://linux.oracle.com/cve/CVE-2024-53217.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53217-nfsd-restore-callback-functionality-for-NFSv4.0.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56567, CVSSv2 Score: 5.5
- Description:
ad7780: fix division by zero in ad7780_write_raw()
- CVE: https://linux.oracle.com/cve/CVE-2024-56567.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56567-ad7780-fix-division-by-zero-in-ad7780-write-raw.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56670, CVSSv2 Score: 5.5
- Description:
usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer
- CVE: https://linux.oracle.com/cve/CVE-2024-56670.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56670-usb-gadget-u_serial-Fix-the-issue-that-gs_start_io-crashed.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56558, CVSSv2 Score: 5.5
- Description:
nfsd: make sure exp active before svc_export_show
- CVE: https://linux.oracle.com/cve/CVE-2024-56558.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56558-nfsd-make-sure-exp-active-before-svc_export_show.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56572, CVSSv2 Score: 5.5
- Description:
media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal()
- CVE: https://linux.oracle.com/cve/CVE-2024-56572.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56572-media-platform-allegro-dvt-Fix-possible-memory-leak-in-allocate_buffers_internal.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56574, CVSSv2 Score: 5.5
- Description:
media: ts2020: fix null-ptr-deref in ts2020_probe()
- CVE: https://linux.oracle.com/cve/CVE-2024-56574.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56574-media-ts2020-fix-null-ptr-deref-in-ts2020_probe.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56633, CVSSv2 Score: 5.5
- Description:
tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg
- CVE: https://linux.oracle.com/cve/CVE-2024-56633.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56633-tcp_bpf-Fix-the-sk_mem_uncharge-logic-in-tcp_bpf_sendmsg.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56629, CVSSv2 Score: 5.5
- Description:
HID: wacom: fix when get product name maybe null pointer
- CVE: https://linux.oracle.com/cve/CVE-2024-56629.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56629-HID-wacom-fix-when-get-product-name-maybe-null-pointer.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56630, CVSSv2 Score: 5.5
- Description:
ocfs2: free inode when ocfs2_get_init_inode() fails
- CVE: https://linux.oracle.com/cve/CVE-2024-56630.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56630-ocfs2-free-inode-when-ocfs2_get_init_inode-fails.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53157, CVSSv2 Score: 5.5
- Description:
firmware: arm_scpi: Check the DVFS OPP count returned by the firmware
- CVE: https://linux.oracle.com/cve/CVE-2024-53157.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53157-firmware-arm_scpi-Check-the-DVFS-OPP-count-returned-by-the-firmware.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53172, CVSSv2 Score: 5.5
- Description:
ubi: fastmap: Fix duplicate slab cache names while attaching
- CVE: https://linux.oracle.com/cve/CVE-2024-53172.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53172-ubi-fastmap-Fix-duplicate-slab-cache-names-while-attaching.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53181, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53181.patch
- From:
- CVE-2024-53148, CVSSv2 Score: 5.5
- Description:
comedi: Flush partial mappings in error case
- CVE: https://linux.oracle.com/cve/CVE-2024-53148.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53148-comedi-flush-partial-mappings-in-error-case.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53183, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-53183.patch
- From:
- CVE-2024-53214, CVSSv2 Score: 5.5
- Description:
vfio/pci: Properly hide first-in-list PCIe extended capability
- CVE: https://linux.oracle.com/cve/CVE-2024-53214.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53214-vfio-pci-properly-hide-first-in-list-PCIe-extended-capability.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56586, CVSSv2 Score: 5.5
- Description:
f2fs: fix f2fs_bug_on when uninstalling filesystem call f2fs_evict_inode.
- CVE: https://linux.oracle.com/cve/CVE-2024-56586.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56586-f2fs-fix-f2fs_bug_on-when-uninstalling-filesystem-call-f2fs_evict_inode.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56597, CVSSv2 Score: 5.5
- Description:
jfs: fix shift-out-of-bounds in dbSplit
- CVE: https://linux.oracle.com/cve/CVE-2024-56597.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56597-jfs-fix-shift-out-of-bounds-in-dbSplit.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56688, CVSSv2 Score: 5.5
- Description:
sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport
- CVE: https://linux.oracle.com/cve/CVE-2024-56688.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56688-sunrpc-clear-XPRT_SOCK_UPD_TIMEOUT-when-reset-transport.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56747, CVSSv2 Score: 5.5
- Description:
scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()
- CVE: https://linux.oracle.com/cve/CVE-2024-56747.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56747-scsi-qedi-fix-a-possible-memory-leak-in-qedi_alloc_and_init_sb.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53135, CVSSv2 Score: 6.5
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53135, CVSSv2 Score: 6.5
- Description:
KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
- CVE: https://linux.oracle.com/cve/CVE-2024-53135.html
- Patch: 2024/CVE-2024-53135/CVE-2024-53135-kvm-vmx-bury-intel-pt-virtualization-guest-host-mode-behind-config-broken-kpatch.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56748, CVSSv2 Score: 5.5
- Description:
scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb()
- CVE: https://linux.oracle.com/cve/CVE-2024-56748.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56748-scsi-qedf-Fix-a-possible-memory-leak-in-qedf_alloc_and_init_sb.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56637, CVSSv2 Score: 5.5
- Description:
netfilter: ipset: Hold module reference while requesting a module
- CVE: https://linux.oracle.com/cve/CVE-2024-56637.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56637-netfilter-ipset-Hold-module-reference-while-requesting-a-module.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56739, CVSSv2 Score: 5.5
- Description:
rtc: check if __rtc_read_time was successful in rtc_timer_do_work()
- CVE: https://linux.oracle.com/cve/CVE-2024-56739.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56739-rtc-check-if-__rtc_read_time-was-successful-in-rtc_timer_do_work.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-53145, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported
- CVE:
- Patch: skipped/CVE-2024-53145.patch
- From:
- CVE-2024-53184, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported
- CVE:
- Patch: skipped/CVE-2024-53184.patch
- From:
- CVE-2024-53198, CVSSv2 Score: 5.5
- Description:
xen: Fix the issue of resource not being properly released in xenbus_dev_probe()
- CVE: https://linux.oracle.com/cve/CVE-2024-53198.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-53198-xen-Fix-the-issue-of-resource-not-being-properly-released-in-xenbus_dev_probe.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56746, CVSSv2 Score: 5.5
- Description:
fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem()
- CVE: https://linux.oracle.com/cve/CVE-2024-56746.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56746-fbdev-sh7760fb-Fix-a-possible-memory-leak-in-sh7760fb_alloc_mem.patch
- From: 5.4.17-2136.340.4.1.el8uek
- CVE-2024-56532, CVSSv2 Score: 5.5
- Description:
ALSA: us122l: Use snd_card_free_when_closed() at disconnection
- CVE: https://linux.oracle.com/cve/CVE-2024-56532.html
- Patch: oel8-uek6/5.4.17-2136.340.4.1.el8uek/CVE-2024-56532-ALSA-us122l-Use-snd_card_free_when_closed()-at-disconnection.patch
- From: 5.4.17-2136.340.4.1.el8uek